digital image steganography based on combination of dct and dwt_springer2010
TRANSCRIPT
-
7/27/2019 Digital Image Steganography Based on Combination of DCT and DWT_springer2010
1/6
V. V Das, R. Vijaykumar et al. (Eds.): ICT 2010, CCIS 101, pp. 596601, 2010.
Springer-Verlag Berlin Heidelberg 2010
Digital Image Steganography Based on Combination of
DCT and DWT
Vijay Kumar1
and Dinesh Kumar2
1 CSE Department, JCDMCOE, Sirsa, Haryana, India
[email protected] CSE Department, GJUS&T, Hisar, Haryana, India
Abstract. In this paper, a copyright protection scheme that combines theDiscrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) is
proposed. The proposed scheme first extracts the DCT coefficients of secret
image by applying DCT. After that, image features are extracted from cover
image and from DCT coefficients by applying DWT on both separately. Hiding
of extracted features of DCT coefficients in the features of cover image is done
using two different secret keys. Experimentation has been done using eight
different attacks. Experimental results demonstrate that combining the two
transforms improves the performance of the steganography technique in terms
of PSNR value and the performance is better as compared to that achieved
using DWT transform only. The extracted image has good visual quality also.
Keywords: Discrete Cosine Transform, Discrete Wavelet Transform,
Steganography.
1 Introduction
The rapid growth of multimedia processing and Internet technologies in recent years
has made it possible to distribute and exchange huge amount of multimedia data moreeasily and quickly than ever at low cost. The data can be easily edited with almost
negligible loss using multimedia processing techniques. Therefore, the need for the
copyright protection of digital data has emerged. Nowadays, Steganography has
become the focus of research for copyright protection.
There are two approaches related to steganography i.e., spatial-domain and
frequency-domain approach [13]. In the former approach, the secret messages are
embedded into least significant pixels of cover images. They are fast but sensitive to
image processing attacks. The latter approach contains transforming the cover image
into the frequency domain coefficients before embedding secret messages in it. Thetransformation can be either Discrete Cosine transform (DCT) or Discrete Wavelet
Transform (DWT) etc. Though these methods are more difficult and slower than
spatial domain, yet they have an advantage of being more secure and noise tolerant
[12]. Among these methods, DWT has been widely used in digital image
steganography due to its multi-resolution characteristics.
-
7/27/2019 Digital Image Steganography Based on Combination of DCT and DWT_springer2010
2/6
Digital Image Steganography Based on Combination of DCT and DWT 597
In this paper, steganography based on combination of two transforms DWT and
DCT has been described. The proposed technique showed high robustness against
many image processing attacks. The remainder of this paper is organized as follows.
Section 2 presents the related work. Section 3 presents the proposed DCT-DWT based
digital image steganography approach. Section 4 shows the experimentation andresults followed by conclusions in section 5.
2 Related Work
Least Significant Bit Substitution (LSB) [1] is the most commonly used
steganography technique. Sinha and Singh [2] proposed a technique to encrypt an
image for secured transmission using digital signature of the image. Digital signatures
enable the recipient of a message to verify the sender of a message and validate that
the message is intact. In [3], a spatial domain approach, the authors proposed the
exploitation of correlation between adjoining pixels for determining the bit number to
be embedded at certain specific pixel.
In [4], a frequency domain approach, the authors proposed that embedding is
realized in bit planes of subband wavelet coefficients obtained by using the Integer
Wavelet Transform. In [5], authors proposed an algorithm that utilized the probability
density function to generate discriminator features fed into a neural network system
which detected hidden data in this domain. Tsuang-Yuan et al. [6] proposed a new
method for data hiding in Microsoft word documents by a change tracking technique.
Kisik et al. [7] proposed a stegnographic algorithm which embeded a secret messageinto bitmap images and palette-based images. The algorithm divided a bitmap image
into bit plane images from LSB-plane to MSB-plane for each pixel. Satish et al. [8]
proposed a chaos based spread spectrum image steganography method. The majority
of LSB steganography algorithm embed message in spatial domain such as pixel
value differencing [9].
McKeon [10] proposed a methodology for steganography based on fourier domain
of an image by using the properties of zero-padding. These zeros can be changed
slightly where the change in the image is not noticeable. In [11], authors discussed the
effects of steganography in different image formats and DWT. They also introducedthe number of payload bits and the place to embed. In [14], authors proposed method
to spread hidden information within encrypted image data randomly based on the
secret key. Li et al. [17] proposed loseless data hiding using difference value of
adjacent pixels instead of the whole image. Tsai et al. [15] divide the image into
blocks where redual image was calculated using linear prediction. Then, the secret
data was embedded into the residual values, followed by block reconstruction. Chao
et al. [16] presented the embedding scheme that hide secret messages in the vertices
of 3D polygen models.
3 DWT-DCT Based Digital Image Steganography Approach
In this paper, we combine the algorithm [12] with Discrete Cosine Transform (DCT).
The proposed algorithm is as follows.
-
7/27/2019 Digital Image Steganography Based on Combination of DCT and DWT_springer2010
3/6
598 V. Kumar and D. Kumar
3.1 Embedding Procedure
The steps of embedding procedure are as follows:
1. Apply DCT to the secret image Sto get DCT coefficients.2. Decompose the cover image (Imatrix) and the DCT coefficients of secret image
into four sub-images (ICA, ICH, ICV, ICD) and (CCA, CCH, CCV, CCD)
respectively using DWT.
3. Each ofCCA,ICA, and ICHare partitioned into blocks of4 4 pixels and can be
represented by:
{ }nsiBSCCA i = 1, (1)
ncjBCICA j = 1, (2)
{ }kICH BH ,1 k nc= (3)
where iBS , jBC ,and kBH represent theth
i block in CCA, the thj block in
ICA and theth
k block in ICH respectively. ns is the total number of the4 4 blocks in CCA and nc is the total number of the 4 4 blocks in each of
ICA andICH.
4. For each block iBS in CCA, the best matched block jBC of minimum error in
ICA is searched by using the root mean squared error (RMSE).The first secret
key K1 consists of the addressesj of the best matched blocks inICA.
5. Calculate the error block iEB between iBS and jBC as follows:
iji BSBCEB = (4)
6. For each error block iEB , the best matched block kBH in ICH is searched for
using the RMSE criteria as before and that kBH is replaced with the error
block iEB . The second secret key K2 consists of the addresses k of the best
matched blocks inICH.
7. Repeat the steps 4 to 6 until all the produced error blocks are embedded inICH.
8. Apply the inverse DWT to theICA,ICV,ICD, and the modified sub-imageICH
to obtain the stegano-image G.
3.2 Extraction Procedure
The steps of secret image extraction procedure are as follows:
1. Decompose the stegano-image G into four sub-images (GCA, GCH, GCV, GCD)
using DWT transform.
-
7/27/2019 Digital Image Steganography Based on Combination of DCT and DWT_springer2010
4/6
Digital Image Steganography Based on Combination of DCT and DWT 599
2. Extract the block jBC from the sub-image GCA by using the first secret key
K1. Use the second secret key K2 to extract the error blocks. The secret
blocks iBS can be obtained by:
iji EBBCBS = (5)
3. Repeat step 2 until all the secret blocks are extracted and form the sub-image
CCA.4. Using detail coefficients from sender such as CCD, CCV, CCH and extracted
CCA from above step, apply the inverse DWT to obtain the DCT coefficients.
5. Apply the inverse DCT on DCT coefficients obtained from step 4.
4 Experimentation and Results
4.1 Experiment 1 and Results
We evaluate the performance of the combined DCT-DWT based digital image
steganography using four cover images: Peppers, Lena, Goldhill and Boat, each of
size 256 256 and four secret images: Redfort, Watch, C.V. Raman and Taj Mahal,
each of size 128 128. Figure 1 shows all the secret images.
(a) (b) (c) (d)
Fig. 1. Secret images (a) Redfort (b) Watch (c) Raman (d) Taj Mahal
We compare the two techniques, LSB [1] and Ahmed A. Abdelwahab [12] withproposed method using above mentioned four cover images and Redfort as secret
image. The PSNR values of stegano-images after embedding secret image for above
said methods are tabulated in table 1. The results reveal that proposed method has
higher PSNR value than the other two methods.
Table 1. Comparison between LSB [1], Ahmed [12] and Proposed methods in terms of PSNR
using Redfort as secret image
Image PSNR
Cover Image
(256x256)
LSB[1] Ahmed[12] Proposed
method
Peppers 10.75 31.59 42.09
Lena 09.66 31.86 41.93
Goldhill 11.16 31.86 41.84
Boat 12.91 32.37 42.45
-
7/27/2019 Digital Image Steganography Based on Combination of DCT and DWT_springer2010
5/6
600 V. Kumar and D. Kumar
4.2 Experiment 2 and Results
The next experiment was performed to see the effect of chosen attacks such as
Gaussian Noise, Sharpening, Median Filtering, Gaussian Blur, Histogram
Equalization, Gamma Correction, Transform and Cropping. The PSNR values forfour different stegano images and extracted secret images after different image
processing attacks are illustrated in table 2. The results reveal that after applying
attacks on stegano images, the secret images have high value of PSNR and hence the
good visual quality.
Table 2. PSNR of stegano-images and extracted secret images under different image
processinh attacks
Image PSNR with different attacks
G.
Noise
Sharp. Hist.
Equl.
G. Blur Gamm.
Corr.
Trans-
form
Median
Filter.
Crop.
Stegano-Peppers 19.72 17.15 20.01 26.19 52.80 11.75 27.61 08.69
Extract-Redfort 19.50 17.10 13.26 25.36 12.44 38.92 23.32 09.51
Stegano-Lena 19.89 13.65 16.25 25.42 40.48 11.78 25.37 08.70
Extract-Watch 19.37 31.01 27.08 37.65 36.34 40.03 37.27 30.64
Stegano-Goldhill 18.69 11.95 16.51 25.06 25.54 12.61 24.87 10.07
Extract-Raman 18.66 31.64 30.06 32.68 20.19 38.66 32.38 16.97
Stegano-Boat 19.61 16.10 16.16 19.61 38.42 13.26 26.63 08.83
Extract-Taj 15.52 22.05 20.12 15.52 12.35 38.23 21.19 15.84
5 Conclusion
This paper presented a digital image steganography technique in which DCT was
combined with DWT. The experimentation was done using different attacks. The
simulation results depict that there is substantial increase in the PSNR value of the
stegano images. Further a comparison of proposed technique with the earlier existing
techniques [1] and [12] establishes supremacy of the proposed algorithm.
References
1. Chan, C.K., Chang, L.M.: Hiding data in image by simple LSB substitution. PatternRecognition 37, 469471 (2003)
2. Sinha, A., Singh, K.: A technique for image encryption using digital signature. Optics.Communications 218(4), 229234 (2003)
3. Chang, C.C., Tseng, H.W.: A Steganographic method for digital images using side match.Pattern Recognition 25, 14311437 (2004)
4. Tarres, S., Nakano, M., Perez, H.: An Image Steganography Systems based on BPCS andIWT. In: 16th International Conference on Electronics, Communications and Computers,pp. 5156 (2006)
5. Manikopoulos, C., Yun-Qing, S., Sui, S., Dekun, Z.: Detection of block DCT basedstegnography in gray scale images. In: IEEE Workshop on Multimedia Signal Processing,
pp. 355358 (2002)
-
7/27/2019 Digital Image Steganography Based on Combination of DCT and DWT_springer2010
6/6
Digital Image Steganography Based on Combination of DCT and DWT 601
6. Tsung-Yuan, L., Wen-Hsiang, T.: A New Steganography method for data hiding inMicrosoft Word documents by a Change Tracking Technique. IEEE Transaction on
Information Forensics and Security 2(1), 2430 (2007)
7. Kisik Chang, E., Chango, J., Sangjin, L.: High Quality Perceptual SteganographyTechniques. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp.518531. Springer, Heidelberg (2004)
8. Satish, K., Jayakar, T., Tobin, C., Madhavi, K., Murali, K.: Chaos based spread spectrumimage steganography. IEEE transactions on consumer Electronics 50(2), 587590 (2004)
9. Zhang, X., Wang, S.Z.: Vulnerability of pixel-value differencing steganography tohistogram analysis and modification for enhanced security. Pattern Recognition, 331339
(2004)
10. McKeon, R.T.: Steganography Using the Fourier Transform and Zero-Padding AliasingProperties. In: IEEE International Conference on Electro/Information Technology, pp.
492497 (2006)
11. Mastronadri, G., Castellano, M., Marino, F.: Steganography Effects in various Formats ofImages-A preliminary study. In: International Workshop on Intelligent Data Acquisition
and Advanced Computing Systems: Technology and Applications, pp. 116119 (2001)
12. Abdelwahab, Ahmed, A., Hassan, Lobha, A.: A Discrete Wavelet Transform basedTechnique for Image Data Hiding. In: National Radio Conference, Egypt, pp. 19 (2008)
13. Chang, C.C., Chen, T.S., Chang, L.Z.: A Steganographic method based upon JPEG andQuantization table modification. Information Science 141, 123138 (2002)
14. Younes, M.B., Jantan, A.: A New Steganography approach for image encryption exchangeby using the Least Significant Bit Insertion. Computer Science and Network Security 8,
247253 (2008)
15. Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding andhistogram shifting. Signal Processing 89(6), 11291143 (2009)
16. Chao, M.W., Lin, C.H., Yu, C.W., Lee, T.Y.: A high capcity 3D steganography algorithm.IEEE Trnasctions on Visualtion and computer Graphics 15(2), 274284 (2009)
17. Li, Z., Chen, X., Pan, X., Zeng, X.: Lossless data hiding scheme based on adjacent pixeldifference. In: International Conference on Computer Engineering and Technology, pp.
588592 (2009)