0% found this document useful (0 votes)
55 views5 pages

New Proposed Practice For Secure Image Combing Cryptography Stegnography and Watermarking Based On Various Parameters

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views5 pages

New Proposed Practice For Secure Image Combing Cryptography Stegnography and Watermarking Based On Various Parameters

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

New Proposed Practice for Secure Image

Combing Cryptography Stegnography and


Watermarking based on Various
Parameters
Rupesh Gupta Dr.Tanu Preet Singh
Computer Science and Engineering Department Electronics and Communication Engineering
DepartmentACET Amritsar, PTU Jalandhar, Indi ACET Amritsar, PTU Jalandhar, India
gupta_rupesh_mani@yahoo.co.in tanupreet.singh@gmail.com

Abstract – Since the rise of usage of internet in the as follow Section II will give detail about the
world security is becoming the major concern all purposes on which we have worked. Section III
over. So making this thing clear in mind developers will give a view of our proposed
are continuously working to make internet a safe technique/algorithm and its comparison with the
environment for all the users. Many algorithm or
previous work. Section IV will cover all the
techniques are proposed and they worked but as the
intruders are acting smartly to hack information parameters which are covered in this paper. Section
developers are also supposed to invent new V will consist of results and discussions.
techniques to stop hacker’s intentions. As per the Conclusion will be described in section VI.
basic knowledge more is the PSNR value and lesser is
the MSE results are better so, here in this paper we II. PURPOSES
are proposing a new method by combing three major
security techniques that is cryptography, In this paper we are working on these objectives
stegnography and watermarking that will not only which will provide better results than the previous
hide the information but produce better results for techniques
MSE. PSNR and Embedding capacity still after the
A. To propose a new algorithm for
noise attack. The purpose this paper is to provide a
new technique that will provide better security for transmitting the secret image over a
hiding data in an image and watermarked video. network by combining the cryptography
steganography & watermarking
Keywords— PSNR, MSE, Embedding Capacity, techniques.
Cryptography, watermarking, Stegnography, Security, B. To implement the above algorithm on
Data hiding and Image Processing various picture format like (jpeg, png, tiff,
bmp) & video format like (mpeg, avi, flv).
I. INTRODUCTION C. To evaluate the performance of proposed
algorithm and basis of parameters like
Let’s start our discussion with security first. As all PSNR, MSE.
of us know that during the recent years due to fast D. To perform the comparison of above
growth of internet security is becoming an issue for algorithm (A Secure Image Based
internet users. Cryptography; stegnography and Steganography, Cryptography and
watermarking are three favorite techniques used by Watermarking with security key) with the
developers for security reasons [4]. As existing algorithm (Analysis of Secured
cryptography is the process of encrypting and Video Steganography Using Computer
decrypting the data. Here data gets encrypted Forensics Technique for Enhance Data
which sender wants to send to the receiving party Security) based on parameters like PSNR,
and decrypted on the other side [1][7]. MSE.
Stegnography is another technique which totally
denies the existence of information in an image or III. PROPOSED WORK
video so there is no knowledge of existence of any
message in image or video. Watermarking Proposed work is derived for two algorithms
technique is the mark of ownership or the purpose
of copyright protection of data which ensures that A. Encryption side
the data is being read by the authenticated person to B. Decryption side.
whom the data belongs. Stegnography can be
classified as linguistic stegnography and technical Applying encryption algorithm to the data which
stegnography[4]. Watermarking is further of two we want to hide and then on the receiving side we
types robust and fragile [7]. This paper is organized apply decryption algorithm for decrypting the data

978-1-4799-6629-5/14/$31.00 2014
c IEEE 475
which is hidden in image or video [1][13]. Here we
will combine both decryption and encryption
algorithm and compare it with the existing
algorithm which will show better results for PSNR,
MSE and Embedding Capacity after noise attacks.
Algorithm is firstly loading the color RGB image
then after RGB image is converted in YCbCr. Then
we applied 4 level and 5 level DWT techniques to
image later we selected Y band to embed
watermark and applied lower to lower, lower to
higher and higher to higher and higher to lower
band to the watermarked image. Than we added
secret massage using least significant bit (LSB)
algorithm continuing further we added secret key
[8]. That’s all we did on the encryption side.

Then on decryption side we implement inverse


wavelet transformation. Here we will convert
YcbCr image (which was generated in encryption
side) to RGB color image. Then we will find the
results which are fidelity measure (PSNR) between
original and watermarked image and then we
extract watermark and secret message and at last
we will display PSNR values and graph between
4L and 5L DWT also the graphs of embedding
capacity and PSNR after noise attack and its values
as compared to previous results[10].
A. Encryption Algorithm
Step 1: Load original color image (RGB).

Step 2: Convert RGB to YCbCr.


Fig I: Flow chart representation of proposed work
Step 3: Apply 4L and 5L wavelet transform.
Traditional Algorithm
Step 4: Select Y band to embed the watermark
4.1: Add to LL, HL, LH and HH Step 1: Load original color image (RGB).
separately Step 2: Convert RGB to YCbCr.
4.2: Add to (HL + LH) together Step 3: Apply 4L wavelet transform.
4.3: Add to (HL + LH) and some Step 4: Select Y band to embed the watermark
frequencies of HH 4.1: Add to LL, HL, LH and HH
separately
Step 5: Store the position of the original image 4.2: Add to (HL + LH) together
affected by the watermark. 4.3: Add to (HL + LH) and some
frequencies of HH
Step 6: Add secret message using LSB technique. Step 5: Store the position of the original image
affected by the watermark.
Step 7: Add secret key. Step 6: Apply inverse wavelet transform.
B. Decryption Algorithm Step 7: Convert YCbCr to RGB.
Step 8: Apply inverse wavelet transform. Step 8: Find fidelity measure (PSNR) between
original and watermarked image.
Step 9: Convert YCbCr to RGB. Step 9: Extract watermark.
Step 10: Display PSNR values and graph between
Step 10: Find fidelity measure (PSNR) between 4L DWT.
original and watermarked image. Step 11: EXIT

Step 11: Extract watermark and secret message. IV. PARAMETERS COVERED

Step 12: Display PSNR values and graph between In our proposed work we have worked on
4L and 5L DWT, also embedding capacity graph parameters like PSNR, MSE and embedding
and its values and PSNR after noise attack. capacity. Here the basic idea is to evaluate a single
number that will show the quality of our
Step 13: EXIT reconstructed image. Reconstructed image can be

476 2014 International Conference on Contemporary Computing and Informatics (IC3I)


judged better with higher metrics [6]. Also the Figure III is enabling user to load video of any
traditional SNR measures are not supposed to format like mpeg, avi or flv. After loading video it
compare human subjective perceptions [7]. Here took approx 5 sec to load and to creating frames of
we will use signal to noise ratios because of their that video.
easy computation, as we believe that always higher
measures do not mean better quality [3]. First we
will compute mean square error (MSE) of
reconstructed image as follows

¦ [f (i, j) − F (i, j )]
2

MSE =
N2
In different way to calculate PSNR we will first
calculate MSE as per following equation

¦ [I (m, n ) − I (m, n )]
1 2
2

MSE = M ,N

M *N Figure III: Input Video is loaded

Figure IV is the snap shot after the video is loaded


In this equation, M and N are the number of rows and the secret image is about to load in video
and columns in the input images, respectively.
Then the block computes the PSNR using the
following equation:

§ R2 ·
PSNR = 10 log10 ¨¨ ¸¸
© MSE ¹

PSNR in decibels (dB) is computed by


using

§ 255 ·
PSNR = 20 log10 ¨ ¸
© RMSE ¹
Figure IV: Secret Image Is loaded
V. RESULTS AND DISCUSSION
Figure V is showing the buttons of 4 level DWT
Figure II is the main GUI window which appears
and 5 level DWT which will be applied to video in
on home screen contains two buttons for adding
next step. Also in this step watermark will be
watermark and stegnography on video and another
applied on the video and secret key will be added
for extracting it

Fig II: Opening GUI Fig V: Watermark and secret key is added on video

2014 International Conference on Contemporary Computing and Informatics (IC3I) 477


Figure VI is the process of applying stegnography Figure IX is another graphical representation of
parameter PSNR which is again showing that new
technique is providing better PNSR.

Figure VI: Stegnography is applied

Figure VII is last screenshot which is showing the


buttons of embedding capacity, value of PSNR
after noise attack will show results later on.

Figure IX: PSNR between watermarked and original video


frames

Figure X is showing the comparison between the


values of embedding capacity of previous
technique and our new proposed technique.

Figure VII: All parameters and first screen shot on decryption


side

Figure VIII is the graphical representation of the


parameter MSE which clearly shows that the new
technique that is 5L DWT is showing better results
that the previous technique

Fig X: Embedding capacity comparison


Figure VIII: Graph of MSE between 5L and 4L DWT.

478 2014 International Conference on Contemporary Computing and Informatics (IC3I)


Figure XI again showing the results in values
between two techniques. [1] Sunil.K. Moon Rajshree.D.Raut “Analysis of Secured Video
Steganography UsingComputer Forensics Technique for
Enhance Data Security” Proceedings of the 2013 IEEE
Second International Conference on Image Information
Processing (ICIIP-2013)
[2] S.Lyu and H. Farid , “Steganography using higher order
image statistics , “ IEEE Trans. Inf. Forens. Secur. 2006.
[3] Z.Zhou, G.R.Arce, and G.Di Crescenzo, “Halftone Visual
Cryptography”, IEEE Tans. On Image Processing, vol.15,
No.8, August 2006, pp. 2441-2453
[4] http:/ aakash.ece.ucsb.edu./data hiding/stegdemo.aspx.Ucsb
data hiding online demonstration. Released on Mar
.09,2005.
[5] N .Provos, “Defending Against Statistical Steganography,”
Proc 10th USENEX Security Symposium 2005.
[6] Venkatraman , s, Abraham , A . & Paprzycki M.”
Significance of Steganography on Data Security “
,Proceedings of the International Conference on Information
Technology : Coding and computing , 2004.
[7] N. Provos and P. Honeyman, “Hide and Seek: An
introduction to Steganography,” IEEE Security & Privacy
Journal 2003.
[8] Fredric, J., Goljan M., and Hogea , D ; New Methodology
Fig XI: Embedding capacity results in values for Breaking stenographic Techniques for JPEGs.
“Electronic Imaging 2003”.
[9] Mitsugu Iwanmoto and Hirosuke Yamamoto, “The Optimal
Figure XII is screen shot of parameter PSNR after n-out-of-n Visual Secret Sharing Scheme for GrayScale
the noise attack which is comparing our technique Images”, IEICE Trans. Fundamentals, vol.E85- A, No.10,
October 2002, pp. 2238-2247.
with the traditional one and producing better [10] Katzenbeisser and Petitcolas , ”Information Hiding
results. Techniques for Stenography and Digital
watermaking” Artech House, Norwood, MA. 2000.
[11 ]Doron Shaked, Nur Arad, Andrew Fitzhugh, Irwin Sobel,
“Color Diffusion: Error Diffusion for Color Halftones”,
HP Laboratories Israel, May 1999.
[12] E.R.Verheul and H.C.A. Van Tilborg, “Constructions and
properties of k out of n visual secret sharing scheme”,
Designs, Codes, and Cryptography, vol.1, no.2, 1997,
pp.179-196.
[13] M.Naor and A.Shamir, “Visual Cryptography”, in
Proceedings of Eurocrypt 1994, lecture notes in computer
science, 1994, vol.950, pp. 1-12.
[14] Robert Ulichney, “The void-and-cluster method for dither
array generation”, IS&T/SPIE Symposium on Electronic
Imaging and Science, San Jose, CA, 1993, vol.1913,
pp.332-343.
[15] Steven W. Smith , The Scientist and Engineer's Guide to
Digital Signal Processing.

Fig XII: PSNR after noise attack

VI. CONCLUSION AND FUTURE WORKS

In this paper we have proposed a new technique


which is combing three major techniques of data
security which are cryptography, stegnography and
watermarking. We worked on various parameters
like PSNR, MSE and Embedding capacity which
proved better results than the tradition approach.
That’s not all as day by day new threats to security
are coming so new techniques with higher level of
security which covers more parameters will be
invented.

REFERENCES

2014 International Conference on Contemporary Computing and Informatics (IC3I) 479

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy