Professional Documents
Culture Documents
Abstract— The world in modern days is being more and more tied covering them with wax, and tattooing a shaved messenger's
up to the use of technology for facilitating day to day tasks. In this head, letting his hair grow back, and then shaving it again
regard, information security is turning to be great challenge when when he arrived at his contact point.
sending information from one place to another with the aid of
technology. Steganography is one of the techniques for the safe The advantage of steganography over cryptography alone is
transmission which involves hiding information generally with other that the intended secret message does not attract attention to
information that only the receiver will know. In this research, itself as an object of scrutiny. Plainly visible encrypted
steganography technique using Daubechies Discrete Wavelet messages no matter how unbreakable will arouse interest, and
Transform (DWT) is implemented. First the cover image is may in themselves be incriminating in countries
transformed using Daubechies DWT and secret information is where encryption is illegal. Thus, whereas cryptography is the
embedded in coefficients of Daubechies DWT which gives stego practice of protecting the contents of a message alone,
image. Reverse process is applied to obtain secret information from steganography is concerned with concealing the fact that a
stego image. The performance of the proposed approach is evaluated secret message is being sent, as well as concealing the contents
using PSNR and MSE. Also analysis is done to find the best sub-band of the message.
to hide information among different sub-bands of Daubechies DWT.
Secret Image
Keywords—Stego Image; Discrete Wavelet Transform (DWT);
Peak Signal to Noise Ratio (PSNR); Mean Square Error (MSE)
978-1-4673-6744-8/15/$31.00@2015 IEEE
2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
components, while the low frequency part is split again into C. Daubechies Wavelet
high and low frequency parts which is shown in figure 2 [1].
Daubechies wavelets are the most popular wavelets. They
represent the foundations of wavelet signal processing and are
used in various applications. These are also called Maxflat
wavelets as their frequency responses have maximum flatness
at frequencies 0 and π. The Daubechies wavelet transforms are
defined in the same way as the Haar wavelet transform—by
computing running averages and differences via scalar
products with scaling signals and wavelets—the only
difference between them consists in how these scaling signals
and wavelets are defined. For the Daubechies wavelet
Fig. 2. Block Diagram of 1-Step 2-D DWT transforms, the scaling signals and wavelets have slightly
longer supports, i.e., they produce averages and differences
The high frequency components are usually used for using just a few more values from the signal. This slight
steganography since the human eye is less sensitive to changes change, however, provides a tremendous improvement in the
in edges [2]. In two dimensional applications, for each level of capabilities of these new transforms. The names of the
decompositions, we first perform the DWT in the vertical Daubechies family wavelets are written dbN, where N is the
direction, followed by the DWT in the horizontal direction. As order, and db the "surname" of the wavelet.
we can see in figure 3 [2], after the first level of
decomposition, there are four sub-bands: LL, LH, HL and HH. D. Peak Signal to Noise Ratio(PSNR)
It is the measure of reconstruction of the transformed
image. This metric is used for discriminating between
the cover and stego image which is given by equation 1
[13].
10 255 / (1)
E. Mean Square Error(MSE)
It is one of the most frequently used quality measurement
Fig. 3. First Level Wavelet Decomposition technique followed by PSNR. The MSE can be defined as the
B. Haar Wavelet measure of average of the squares of the difference between
the intensities of the stego image and the cover image. It is
Haar wavelet is one of the oldest and simplest wavelet. It is popularly used because of the mathematical tractability it
also the symmetric wavelet. In discrete form Haar wavelets offers. It is represented in equation 2 [13].
are related to a mathematical operation called the Haar
∑ ∑ ′
transform. The Haar transform works as a prototype for all , , (2)
other wavelet transforms. In mathematics, the Haar wavelet is
a sequence of rescaled "square-shaped" functions which III. LITERATURE REVIEW
together form a wavelet family or basis. Wavelet analysis is There are many steganography techniques which are capable
homogeneous to Fourier analysis in that it allows a target of hiding data within an image. These techniques can be
function over an interval to be represented in terms of an classified into two categories based on their algorithms: (1)
orthonormal function basis. It represents the same wavelet as spatial domain based techniques; (2) transform domain based
Daubechies db1. The Haar wavelet transform has a number of techniques. The spatial domain based steganography technique
advantages such as it is conceptually fast, simple, memory use either the LSB or Bit Plane Complexity Segmentation
efficient, since it can be calculated in place without a algorithm. The most widely used technique to hide data is the
temporary array. usage of the LSB [5]. The existing techniques are mainly
The Haar wavelet also has limitations. In generating each of based on LSB (Least Significant Bit) where LSBs of the cover
averages for the next level and each set of coefficients, the file are directly changed with message bits. S. M Karim et al.
Haar transform performs an average and difference on a pair [6] has proposed a LSB technique for RGB true color image
of values. Then the algorithm shifts over by two values and by enhancing the existing LSB substitution techniques to
calculates another average and difference on the next pair. The improve the security level of hidden information. LSB
high frequency coefficient spectrum should reflect all high matching image steganography and edge adaptive scheme was
frequency changes. The Haar window is only two elements proposed which can select the embedding regions according to
wide. If a big change takes place from an even value to an odd the size of secret message and the difference between two
value, the change will not be reflected in the high frequency consecutive pixels in the cover image. In [7] designing of
coefficients. robust and secure image steganography based on LSB
insertion and RSA encryption technique has been used.
978-1-4673-6744-8/15/$31.00@2015 IEEE
2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
M. A. Ahmed et al. [8] proposed a method in which a message iv. Get higher four bits of secret information
hidden inside an image by using the Least Significant Bit and embed into the lower four bits of
technique and after creation of the hidden message, the image wavelet coefficients of other band selected.
will pass it in hash function to obtain hashing value using the 5. Calculate inverse daubechies wavelet transform.
MD5 technique. In [9] a hash based approach proposed for 6. Stego image is generated.
secure keyless steganography in lossless RGB images that an
improved steganography approach for hiding text messages in B. Algorithm for Extraction Process
lossless RGB images. 1. Get stego image.
Transform domain techniques embed secret information in a 2. Calculate daubechies wavelet transform of the stego
transform space of the signal means the process of embedding image.
data in the frequency domain of a signal to make them more 3. Obtain the coefficients of the selected band where the
robust to attack such as adding noise, compression, cropping, pixel value of secret image is hidden.
some image processing etc[10]. Many transform domain 4. Extract the pixel values of secret image from wavelet
variations exist. One method is to use the Discrete Cosine coefficients. The extraction is done in following
Transformation (DCT) as a vehicle to embed information in method.
image. Another method would be the use of wavelet i. Get coefficients from one of the selected
transforms. Advantages of transform domain include higher bands of wavelet.
level of robustness against simple statistical analysis. ii. Obtain lower four bits of the coefficients.
iii. Get coefficients from other selected bands of
JSteg sequentially replaces the LSB of the non-zero quantized wavelet.
DCT coefficients with secret message bits whereas in JPHide iv. Obtain lower four bits of the coefficients.
the quantized DCT coefficients are not selected sequentially v. Combine this four bits with the four bits
but selected randomly by a pseudo-random number generator obtained in (ii) by making this four bits as
[10]. F5 comes after a series of F3 and F4 [11]. F5 higher bits and other four bits as lower bits.
steganographic algorithm was introduced by Westfield and it vi. Decrypt the obtained value by XORing it
embeds message bits into randomly chosen DCT coefficients. with secret key.
The F5 algorithm employs matrix embedding that minimizes
the necessary number of changes to hide a message of certain 5. Secret image is generated.
length. V. EXPERIMENTS AND EVALUATIONS
The discrete wavelet transform (DWT) method is favored over A. Simulation Parameters
the DCT method in steganography because DWT provides
better image resolution at various levels. DWT converts spatial x Coding Platform: Matlab
domain information to the frequency domain information and it x Cover and Secret Image: 24-bit color
clearly partitions the high-frequency and low-frequency x Cover Image size: 512 X 512
information on a pixel by pixel basis [12]. Wavelets are x Secret Image size: 128 X 128
mathematical functions that divide data into frequency
components, which makes them ideal for image compression. B. Comparison of different bands of Daubechies wavelet
Haar wavelet transform is the widely used wavelet transform transform for embedding secret image
due to the simplicity in implementation [13].
5 different secret images and 17 different cover images are
IV. METHODOLOGY taken and secret image is embedded in different combination
of bands (horizontal/diagonal, vertical/diagonal,
A. Algorithm for Embedding Process vertical/horizontal) and performance is evaluated in terms of
1. Get cover image and secret image. mean square error and peak signal to noise ratio.
2. Calculate daubechies wavelet transform of the cover
image. In table I, out of 17 tests, 12 give less mean square error and
3. Encrypt the pixel value of secret image by XORing hence more peak signal to noise ratio in horizontal/diagonal
pixel value with secret key. band and 5 give less mean square error in vertical/diagonal
4. Embed the encrypted pixel values of secret image band.
into the wavelet coefficients. This is done in
following method. In table II, out of 17 tests, 12 give less mean square error and
i. Select any two bands (i.e. HL/HH or LH/HH hence more peak signal to noise ratio in horizontal/diagonal
or HL/LH). band, 4 give less mean square error in vertical/diagonal band
ii. Get the secret information (image). and 1 gives less mean square error in vertical/horizontal band.
iii. Get lower four bits of secret information and
embed into the lower four bits of wavelet
coefficients of one of the band selected.
978-1-4673-6744-8/15/$31.00@2015 IEEE
2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
Table I: Calculation of MSE and PSNR at different bands with secret7.jpg as Table III: Calculation of MSE and PSNR at different bands with secret9.jpg as
secret image secret image
Table II: Calculation of MSE and PSNR at different bands with secret2.jpg as Table IV: Calculation of MSE and PSNR at different bands with secret6.jpg
secret image as secret image
978-1-4673-6744-8/15/$31.00@2015 IEEE
2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
Table V: Calculation of MSE and PSNR at different bands with secret4.jpg as x Case I:- Secret Image: secret7.jpg
secret image
In this case, 14 cover images out of 17 images have less mean
square error in Daubechies wavelet transform than in Haar
Secret4.jpg (Secret Image) wavelet transform.
Cover horizontal/ Vertical/ vertical/
Image diagonal diagonal horizontal
MSE PSNR MSE PSNR MSE PSNR
im 162.27 26.02 243.17 24.27 227.559 24.56
image1 338.68 22.83 867.44 18.74 1593.80 16.10
image2 218.33 24.74 271.86 23.78 1069.40 17.83
image3 304.62 23.29 373.66 22.40 825.990 18.96
image4 332.22 22.91 453.26 21.56 1263.80 17.11
image5 272.03 23.78 386.66 22.25 1474.00 16.44
image6 216.54 24.77 230.78 24.49 357.139 22.60
image8 220.32 24.70 226.89 24.57 770.203 19.26
image10 308.57 23.23 302.59 23.32 400.939 22.10
image11 238.77 24.35 343.85 22.76 504.226 21.10
image12 268.73 23.83 315.11 23.14 458.779 21.51
image13 265.43 23.89 412.87 21.97 1717.00 15.78
image14 156.52 26.18 358.21 22.58 1082.10 17.78
image15 333.94 22.89 366.54 22.48 1029.30 18.00
image16 324.90 23.01 341.85 22.79 1231.60 17.22
image17 218.68 24.73 226.78 24.57 421.911 21.87
image19 256.95 24.03 249.36 24.16 199.966 25.12
In table III, out of 17 tests, 13 give less mean square error and
hence more peak signal to noise ratio in horizontal/diagonal
band and 4 give less mean square error in vertical/diagonal
band. x Case II:- Secret Image: secret2.jpg
In this case, 12 cover images out of 17 images have less mean
In table IV, out of 17 tests, 12 give less mean square error and square error in Daubechies wavelet transform than in Haar
hence more peak signal to noise ratio in horizontal/diagonal wavelet transform.
band and 5 give less mean square error in vertical/diagonal
band.
978-1-4673-6744-8/15/$31.00@2015 IEEE
2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
x Case III:- Secret Image: secret9.jpg x Case III:- Secret Image: secret4.jpg
In this case, 12 cover images out of 17 images have less mean In this case, 13 cover images out of 17 images have less mean
square error of Daubechies wavelet transform than in Haar square error in Daubechies wavelet transform than in Haar
wavelet transform. wavelet transform.
x Case IV:- Secret Image: secret6.jpg In above 5 cases, a total of 65 out of 85 tests give less mean
square error in Daubechies wavelet transform than Haar
In this case, 14 cover images out of 17 images have less mean wavelet transform. Hence experiments showed that
square error in Daubechies wavelet transform than in Haar Daubechies wavelet transform gives better quality of secret
wavelet transform. image extracted from stego image.
VI. CONCLUSION
In steganography, secret information is to be embedded in
such a way that it does not make significant change to cover
file. In this research, Daubechies discrete wavelet transform
technique is used to embed the secret information and
different tests have been performed. Different results show
that diagonal band of wavelet transform carries less
information of original image and hence coefficients of this
band can be used to embed the secret information without
much change to an original image. Instead of taking single
band, embedding secret information in combination of bands
such as vertical/diagonal or horizontal/diagonal band gives
better result in terms of MSE.
Also the performance of Daubechies DWT and Haar DWT is
evaluated in terms of PSNR and MSE. Different tests show
that Daubechies DWT gives less MSE and hence more PSNR
compared to Haar DWT.
978-1-4673-6744-8/15/$31.00@2015 IEEE
2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
APPENDIX
Cover Image