Template Jurnal
Template Jurnal
Reggie C. Gustilo1. Ron Michael Castillo2, Nicole Anthonnie Gonzales3, John Gerard Raz4, Trisha Jane Tejones5
Electronics & Communications Engineering Department
De La Salle University Manila, Philippines
1
reggie.gustilo@dlsu.edu.ph
2
ron_castillo@dlsu.edu.ph
3
nicole_gonzales@dlsu.edu.ph
4
john_gerard_raz@dlsu.edu.ph
5
trisha_tejones@dlsu.edu.ph
LSB of a pixel that contains the bits of the hidden message. 2. PROBLEM STATEMENT
The LSB method is the most common and the simplest
technique used for embedding messages in a cover media. A complex method of hiding information using audio signals
The LSB method also allows embedding large capacity of was proposed using image and video steganography. Audio
information [4] signal considered information signals are embedded in either
an image cover media or a video cover media.
Video Steganography uses video files as cover media. The
use of video steganography is one of the most secure type of 3. METHODOLOGY AND DESIGN
steganography due to its capacity and complexity. The video CONSIDERATIONS
file is converted into frames where the bits of the encrypted Here are the techniques and methods used in this research to
message are embedded. The use of the video file as the cover fully implement an audio and video steganography.
media, the bits of the message or information embedded is
unnoticeable.
347
Reggie C. Gustilo et al., International Journal of Emerging Trends in Engineering Research, 7(9), September 2019, 346 - 352
In this technique, the pixels recognized as dark are For security measures, passwords consisting of 10
designated as the carriers of the audio data. The grayscale alphanumeric and special characters are generated in both
values of the pixel images determine the darkness or image and video embedding. The password’s binary data
whiteness of the pixel. The dark pixels are then identified comprises of a total of 57 bits which corresponds to 7
and used as carriers. pixels (three color value RGB for each pixel, 3 bits per
color value). The sampling frequency of the audio
In the identifying the carrier pixel locations, the equivalent information used 18 bits of data that requires to pixels for
grayscale image of the original true colored image aree used embedding and lastly, the number of channels of the
as the basis for visual examination. The equation for getting audio information that requires 2 bits and embedded in a
the equivalent gray values are shown below. red color data of a pixel. Table 3 below shows the bit
configuration of the password for both image and video
Gray value = 0.299R + 0.587G + 0.114B (1) cover media.
Where R = red pixel component value Table 3: Bit Configuration for Passwords
G = green pixel component value Image Video
Nth
B = blue pixel component value password password
Character
bit count bit count
Pixels with a grayscale values ranging from 0 to 120 are 1 7 3
assigned as carrier pixels. The maximum absolute deviation 2 3 7
from the original pixel value is 7 due to the fact that up to 3 7 4
the third least significant bit of the RGB values may be 4 4 4
modified. With this, the upper range limit was extended to 5 4 7
127 during the extraction process. This is also done in order 6 7 7
for the program to distinguish which are non- embedded and 7 7 4
embedded pixels. Embedded pixels have values in the range 8 4 7
from 121 to 127 while the non-embedded pixels are
modified in such a way that its equivalent gray values 3.3 Carrier Frame Selection for Video
become at least 128. This modification was done using the Steganography
equations below used in computing the new RGB values of
the pixel components. For video steganography, the audio data is scattered
throughout the video frames. The binary audio data are
Rnew = Rold+ (128 - Gray value) (2) embedded on either every 10th frame or 2nd frame. This
Gnew = Gold+ (128 - Gray value) (3) depends on the size of the audio data that must be
Bnew = Bold+ (128 - Gray value) (4) embedded for every frame as well as the total number of
video frames. By default, the frame interval for
Where Rnew, Gnew,Bnew = new pixel component values embedding is 10. The total number of frames in the video
Rold , Gold , Bold = old pixel component values is used to determine how many frames, in intervals of 10
may be processed for embedding. The audio data is then
The Pixel Intensity Based Selection is done by firswt divided into the number of carrier frames to determine
converting the color images into grayscale. The grayscale how many audio bits must be embedded for every carrier
values are then divided into two groups, values from 0 to 120 frame.
and values from 128 to 255. All pixel colors with an
equivalent gray value of 127 and below are replaced by 0 3.4 Output File Formats
(black) while the remaining upper range is represented by 1
(white). The coordinates of all pixels represented by zero The proposed file formats after the embedding process are
serve as carrier pixel locations. Portable Network Graphics (PNG) for images, Audio Video
Interleaved (AVI) for videos and Waveform Audio (WAV)
3.1.3 Side-most Pixel Selection for the recovered audio data. It is found the in this
implementation, file format MPEG- 4 (MP4) for videos is
In this technique, 80 percent of the total columns in an not compatible for writing the output steganographic video
image or frame are located and assigned as carrier pixels. because it uses standard compression techniques that corrupt
Half of these columns are taken from the leftmost side and or alter the original data.
the other half from the rightmost side. The length of audio
information than can be carried by the cover image or video 3.5 Systems Integration
is limited by the number of carrier pixels of the image or
frame of the cover media. Multiple audio information with The user interface for the system is the android based
variable lengths are used in this research. program used to load or capture the audio information to be
348
Reggie C. Gustilo et al., International Journal of Emerging Trends in Engineering Research, 7(9), September 2019, 346 - 352
transmitted, password generation and extraction and parameters such as MSE and PSNR were computed between
selection of embedding technique to be used. The basic block the embedded file and the received file.
diagram of the system integration is shown in figure 1 below.
The sender and the receiver are linked via a webhost 4. DATA AND DISCUSSIONS
program that overlooks the transmission and reception of the
embedded signal. A server is also used to perform all the Image steganography and video steganography are
complex processing needed in the system such as embedding implemented and tested using the same audio information
of the audio signal into either the image or video cover signals.
media.
Transmission is done in two modes, Bluetooth and In the image steganography, the audio signal is embedded in
email. Steganographic video files are limited to 25MB the image using any of the six embedding techniques that is
for email transmission. chosen by the user. The original image, image with
embedded information and the original audio information is
shown in figure 2.
3.6 Extraction Process
3.7 Evaluation of the system a. Original Image Used for Image Steganography
Qualitative analyses were also done by examining the visual b. Steganographic Image Using Technique 1
changes between the original file and the produced
steganographic file. In support the qualitative method, a
survey was conducted involving 85 participants by asking
them to determine whether or not visual and audible changes
were noticeable. The produced steganographic files were
transmitted using Bluetooth or E-mail. Error checking
349
Reggie C. Gustilo et al., International Journal of Emerging Trends in Engineering Research, 7(9), September 2019, 346 - 352
Figure 2a shows the original image and the embedded image In video steganography, the six embedding techniques are used to
in figure 2b after using embedding technique 1 using the test the performance of the system. Table 8 shows the password
generated by each technique.
audio signal shown in figure 2c. there is very little or almost
no difference between the original image and the embedded Table 8: Technique and Password Details
image using the naked eye. Technique Password
The password generated during embedding and the 1 1j03z&4H~E
qualitative comparison of the original image and the
2 2j03z&4H~E
embedded image are shown in table 5 below.
3 3j03z&4H~E
Table 5: Qualitative Analysis using Image Steganography 4 4j03z&4H~E
Sample Tech Password MSE PSNR (dB) 5 5j03z&4H~E
1 1 D1j38v#5I| 0.7837 49.2229 6 6j03z&4H~E
2 2 D2j25y$6O+ 2.2569 44.6295
The embedded videos are transmitted wirelessly using
3 3 D3j38v#5I| 1.2384 47.2359
Bluetooth and email. The average performance of the
4 4 D4j25y$6O+ 2.5444 44.1088
transmission is shown in table 9.
5 5 D5j38v#5I| 0.7228 49.5740
6 6 D6j25y$6O+ 1.9691 45.2219 Table 9: Average Transmission Performance for
Video Steganography
From table 5, it can be seen that using image steganography, Technique MSE PSNR (dB)
the original image and the embedded image are visually 1 0.1176 57.4609
similar but qualitatively different as shown by the MSE and 2 0.3351 52.9128
PSNR values that proves the difference in the pixel values of 3 0.1429 56.6133
the two images. 4 0.3588 52.6167
5 0.1168 57.4903
After the extraction and recovery of the audio information 6 0.3344 52.9216
signal, the BER during transmission is measured to check if
the images are altered during the wireless transfer.
Lastly, the original audio messages were compared to the
Afterwards, the original audio data and the recovered audio
recovered audio messages and were tested for accuracy.
data are compared by evaluating the accuracy of the
Table 10 shows the average accuracy of the recovered audio
recovered audio data. Table 6 shows the error checking of
messages.
the audio signal.
Table 10: Audio Error Measurements
Table 6: Audio Error Checking
Technique BER Accuracy
Sample Tech BER Accuracy
1 0 99.5656
1 1 0 99.99998741
2 0 99.5656
2 2 0 99.99998741
3 0 99.5656
3 3 0 99.99998741
4 0 99.5656
4 4 0 99.99998741
5 0 99.5656
5 5 0 99.99998741
6 0 99.5656
6 6 0 99.99998741
5. CONCLUSION
4.2 Video Steganography
A complex android driven system was developed to
The details of the data used for video steganography is
implement image and video Steganography. The user
shown in table 7 below.
interface was driven an android application that was able to
350
Reggie C. Gustilo et al., International Journal of Emerging Trends in Engineering Research, 7(9), September 2019, 346 - 352
load or record the audio signal to be transmitted, choose the wavelet transform, TENCON 2014 - 2014 IEEE Region
type of embedding technique to be used and generate the 10 Conference, 2014.
password for added security during transmission. On the 7. R. A. A. Masilang, M. K. Cabatuan, E. P. Dadios, and L.
receiver side, this android application can extract and recover G. Lim, Computer-aided BSE torso tracking
the embedded audio signal with at least 99.99% accuracy. algorithm using neural networks, contours, and edge
The length of the audio signal is variable and the duration features, TENCON 2014 - 2014 IEEE Region 10
depends on the size of the image cover media or the video Conference, 2014.
cover media. 8. Del Espiritu, J., Rolluqui, G.,Gustilo, R.C., Neural
network based partial fingerprint recognition as
Matlab is used to perform all the complex tasks such as the support for forensics, 8th International Conference on
actual embedding, extraction and recovery of the audio Humanoid, Nanotechnology, Information Technology,
signal. The android program and the Matlab program are Communication and Control, Environment and
linked using a webhost and a server that process and saves Management, HNICEM 2015
all the data of the system. 9. Abinoja, D.D., Roque, M.A., Atienza, R., Materum, L.,
Landmark-based audio fingerprinting algorithm for
The embedded images and videos are transmitted wirelessly a transmitter-less alert recognition device for the
via Bluetooth and email. BER and PSNR are used to hearing-impaired, 8th International Conference on
quantify the performance of the system during the Humanoid, Nanotechnology, Information Technology,
transmission stage. Communication and Control, Environment and
Management, HNICEM 2015, .
Experiment results show that the presented steganography 10. A. Africa, A Rough Set Based Solar Powered Flood
methods are proven to be efficient and effective way of Water Purification System with a Fuzzy Logic
concealing audio information inside images or videos. Model. ARPN Journal of Engineering and Applied
Sciences. Vol. 12, No. 3, pp.638-647, 2017
REFERENCES 11. A. Africa and J. Velasco, Development of a Urine
Strip Analyzer using Artificial Neural Network using
1. Gustilo, R.C., Dadios, E.P., Machine vision support an Android Phone. ARPN Journal of Engineering and
system for monitoring water quality in a small scale Applied Sciences. Vol. 12, No. 6, pp. 1706-1712, 2017
tiger prawn aquaculture, Journal of Advanced 12. S. Brucal, A. Africa, and E. Dadios, Female Voice
Computational Intelligence and Intelligent Informatics, Recognition using Artificial Neural Networks and
20(1), pp. 111-116, 2016 MATLAB Voicebox Toolbox. Journal of
https://doi.org/10.20965/jaciii.2016.p0111 Telecommunication, Electronic and Computer
2. Gustilo, R.C., Dadios, E.P., Behavioural response Engineering. Vol. 10, Nos. 1-4, pp. 133-138, 2018.
analysis using vision engineering (BRAVENet), 13. Villanueva, L., Gustilo, R.C., Artificial neural network
Journal of Advanced Computational Intelligence and based antenna sensitivity assignments for chaotic
Intelligent Informatics, 21(2), pp. 211-220, 2017 Internet Service Provider network architecture,
https://doi.org/10.20965/jaciii.2017.p0211 International Journal of Engineering and Technology
3. E. Mohammadi, E. P. Dadios, L. A. G. Lim, M. K. (UAE), 7(2), pp. 14-17, 2018
Cabatuan, R. N. G. Naguib, J. M. C. Avila, and A. 14. Dulay, A., Sze, R., Tan, A., Yap, R., Materum, L.,
Oikonomou, Real-Time Evaluation of Breast Self- Development of a wideband PLC channel emulator
Examination Using Computer Vision, International with random noise scenarios, Journal of
Journal of Biomedical Imaging, vol. 2014, pp. 1–12, Telecommunication, Electronic and Computer
2014. Engineering, 2018
4. R. A. A. Masilang, M. K. Cabatuan, and E. P. Dadios, 15. Hanpinitsak, P., Saito, K., Takada, J.-I., Kim, M.,
Hand initialization and tracking using a modified Materum, L., Multipath clustering and cluster
KLT tracker for a computer vision-based breast self- tracking for geometry-based stochastic channel
examination system, 2014 International Conference on modeling, IEEE Transactions on Antennas and
Humanoid, Nanotechnology, Information Technology, Propagation, 2017
Communication and Control, Environment and https://doi.org/10.1109/TAP.2017.2754417
Management (HNICEM), 2014. 16. Abinoja, D.D.N., Materum, L.Y., BIC-based
5. M. K. Cabatuan, E. P. Dadios, R. N. Naguib, and A. optimization of the identification of multipath
Oikonomu Computer vision-based breast self- propagation clusters in MIMO wireless systems,
examination palpation pressure level classification ISAP 2016 - International Symposium on Antennas and
using artificial neural networks and wavelet Propagation, 2016
transforms, TENCON 2012 IEEE Region 10 17. Dulay, A.E., Yap, R., Materum, L., Hardware
Conference, 2012. Modelling of a PLC Multipath Channel Transfer
https://doi.org/10.1109/TENCON.2012.6412282 Function, Journal of Telecommunication, Electronic
6. J. A. C. Jose, M. K. Cabatuan, E. P. Dadios, and L. A. and Computer Engineering, 2017
G. Lim, Stroke position classification in breast self- 18. Materum, L., Stochastic tapped delay line based one-
examination using parallel neural network and sided beamformed channel impulse response models
351
Reggie C. Gustilo et al., International Journal of Emerging Trends in Engineering Research, 7(9), September 2019, 346 - 352
352