SlideShare a Scribd company logo
Journal for Research | Volume 02 | Issue 04 | June 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 9
Image Steganography using Block Level Entropy
Thresholding Technique
Souma Pal Prof. Samir Kumar Bandyopadhyay
Research Scholar Professor
Department of Computer Science & Engineering Department of Computer Science & Engineering
University of Calcutta, West Bengal, India University of Calcutta, West Bengal, India
Abstract
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible
by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide
information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret
message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium.
Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the
sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the
existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so
on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Keywords: Steganography, Cryptography, Data hiding, Entropy
_______________________________________________________________________________________________________
I. INTRODUCTION
The information hiding system uses two algorithms: embedding algorithm and extraction algorithm. The embedding algorithm
hides the information which is to be kept secret within a cover image in such a way that no one else than the sender and receiver
can understand the existence of the secret message and finally produces the stego-image. The extraction algorithm retrieves the
original message from stego-image by omitting the irrelevant or redundant information presence in the cover image. There are
two kinds of steganographic techniques: spatial domain and frequency domain.
Spatial/Time Domain:A.
Spatial domain techniques embed messages in the intensity of the pixels directly. Least Significant Bit (LSB) is the first most
famous and easy spatial domain Steganography technique. It embeds the bits of a message in a sequential way in the LSB of the
image pixels but the problem of this technique is that if the image is compressed then the embedded data may be destroyed [1].
Thus, there is a fear for damage of the message that may have sensitive information. Moreover, these kinds of methods are easy
to attack by Steganalysis techniques.
Transform/Frequency Domain:B.
Transform domain technique is done with a set of transform coefficients(DCT,entropy ) in the mid frequency bands as these are
preserved better under compression attacks as compared to high frequency coefficients [7]. Transform domain technique
performs well against attacks such as compression, cropping etc. and is imperceptible to human sensory system. Hence it is more
undetectable and robust than spatial domain.
This paper highlights the transform domain method. The cover image is splitted into non-overlapping 8x8 blocks and DCT
(discrete cosine transforms) is computed for each block. Data embedding is done in the transform domain with a set of transform
coefficients in the mid frequency bands as these are preserved better under compression attacks as compared to high frequency
coefficients. In this paper, entropy property of an image block is considered for decision of data embedding. Two methods for
applying local criteria which results in high volume data hiding are considered. First is the block level Entropy Thresholding
(ET) method which decides whether or not to embed data in each block (typically 8X8) of transform coefficients depending on
the entropy within that block. If a particular block fails this test, we keep it as it is and embed the same data in the next block that
passes the test. The second is selectively Embedding in Coefficients (SEC) method, which decides whether or not to embed data
based on the magnitude of the coefficient.
II. REVIEW WORKS
Steganalysis is the art of how to detect the existence of hidden information or hidden message in a multimedia document, and to
discriminate stego object and non-stego-object with little or no knowledge about the steganography algorithm. The goal of
steganalysis is to collect any evidence about the presence of embedded message [1]. If the steganography is the art of hiding
messages into multimedia documents; the steganalysis is the art of detecting such the hidden messages. A message can be hidden
Image Steganography using Block Level Entropy Thresholding Technique
(J4R/ Volume 02 / Issue 04 / 03)
All rights reserved by www.journalforresearch.org 10
in a document only if the content of a document has high redundancy [2]. Although the embedded message changes the
characteristics and nature of the document, it is required that these changes are difficult to be identified by an unsuspecting user.
On the other hand, steganalysis develops theories, methods and techniques that can be used to detect hidden messages in
multimedia documents. The documents without any hidden messages or hidden information are called cover documents and the
documents with hidden messages are named stego documents [3][4]. The multimedia document may be text, image, audio or
video, this paper will concentrate on the image. Also stego document or stego object in this paper will be the stego image which
is the image with hidden message or hidden information, and the cover document or cover object is the cover image which is the
original image without and hidden message. The primary step of steganography and steganalysis process is to identify the image
that the secret message will be hidden in, which will called cover image, then use any steganography algorithm to embed the
message in the cover image, sometimes by the help of secret key, so the cover image become stego image as shown in Figure 1.
After that steganalysis process determines whether that image contains hidden message or not and then try to recover the
message from it. In the cryptanalysis it is clear that the intercepted message is encrypted and it certainly contains the hidden
message because the message is scrambled. But this may not be true in the case of steganalysis. The stego image may or may not
be with hidden message. The steganalysis process starts with a set of unknown information streams. Then the set is reduced with
the help of advanced statistical methods [5]. Siva Jana Kiraman et.al [6] proposed a gray block embedding method, in this
method the LSB bits are modified based on the MSB bit plane. In the embedding process the gray image is divided into the 4*4
blocks further this is divided into 2*2 blocks. The embedding process is done in 2 phase outer embedding and the inner
embedding. In the outer a reference point is found in each of the 2*2 blocks and base o the MSB bit plane of then reference point
in the 2*2 block the secret data is embedded into the other pixels. In the inner embedding the values of the reference point has
been changed to increase the security. In the extracting process the reference point value are bought back and based on the
reference point value the actual value are extracted from the stego image. The proposed scheme increases the embedding
capacity and security by the complexity. Prabakaran G et.al [7] aims to develop a Steganography scheme to secure the medical
digital images. The proposed method is based on the integer wavelet transform and the Arnold transform. In the embedding
process the container image is taken and the flip left is applied, a dummy container image is obtained. The patient‟s medical
image is taken and the Arnold transform is applied and scrambled secret image is obtained. This scrambled secret image was
embedded into the dummy container image and the inverse IWT was taken to get dummy secret image. This dummy secret
image is embedded into the container image and transferred to receiver. The reverse with sub band subtraction is applied to get
the actual data in extraction phase. The algorithm increases the capacity and the quality. Vn Mai et.al [8] proposed a
Steganography scheme to have control over the access of the data stored in the ECG (Electrocardiogram). The scheme requires
that the patient‟s data to be stored in a tree structure which consists of leaf node and branch and each node represents a kind of
data. Each leaf node or a branch is protected from access by Steganographic keys. The normal Steganography algorithm is used
to embed data into ECG. Once data is embedded the data is stored in the public cloud and the data owner can upload some access
keys and the interested users can request for keys to cloud server and retrieve some information and if there are some restricted
data then the key has to be obtained from owner itself. In the extraction process the user key is compared with the key file on the
cloud and only if the key matches the access is allowed. Confidentiality of the patient‟s information is maintained.
III. PROPOSED METHOD
Embedding Procedure:A.
 At first, a cover image C (JPEG) is partitioned into non overlapping blocks of 8X8 pixels.DCT is computed for each
block into DCT coefficients.
 To find embedding region first Compute entropy (E) of all 8x8 DCT blocks. Entropy formula is E= | Xi,j |^2 𝑖,𝑗 (i,j)
≠(0,0).
 Then calculate Mean Entropy (ME) from all blocks entropy.
 Now, to obtain the valid block (VB), compare the entropy of each block with mean entropy (ME). For embedding the
information, a block having entropy higher than the mean entropy value is selected and is named as valid block.
 Middle coefficients of K Matrix for each valid block are one‟s and other coefficients are zero this is because our secret
message will be embedded in the middle-frequency part of the quantized DCT coefficients matrix say k. In k matrix
there are 26 coefficients located in the middle part that are set to be one. Here K[a,b] is the value of the ath row and bth
column element of K .
 Based on this table, the secret messages can be reserved and the reconstructed Image will not be too much distorted.
The secret image S will be embedded in the middle frequency part of the DCT coefficients for valid block Vb.
 After embedding the secret image IDCT is computed for all blocks. The blocks which are not used for embedding are
taken as it is in stego image. At the end, add DC coefficient of each block in its respective block and organize all the
blocks to get image, which is called stego image Stego (i, j).
Extraction Procedure:B.
 While extracting the secret data,the said embedding steps are repeated for stego image.
Image Steganography using Block Level Entropy Thresholding Technique
(J4R/ Volume 02 / Issue 04 / 03)
All rights reserved by www.journalforresearch.org 11
 Extract 26 mid frequency Bit information (BI) from Valid Coefficient of all Valid Block in zigzag order of stego image.
 Then we order the extracted BI.
 Finally decode the image information and acquire input secret image file S.
IV. RESULT
Several experiments are performed to evaluate our proposed methods. Eleven grayscale images with size 512 · 512 are used in
the experiments as cover images namely „Lena‟, ‟Baboon‟, ‟Peppers‟, ‟F16‟, ‟Boat‟, ‟Man‟, ‟Tiffany‟, ‟Barbara‟, ‟Elaine‟,
‟Couple‟, ‟Splash‟, and are shown in Fig. 1. The proposed schemes have been implemented using the MATLAB 7.8.0.347
(R2009a) program on Windows XP platform.
Fig. 1: Eleven cover images are used for the proposed schemes
V. CONCLUSION
The cover image is taken as a graysacle image of 256X256 pixels for experiment. The secret message is embedded in the middle
frequency part of the DCT coefficients. The PSNR (decibel format) and MSE are used as measurement of the quality of image
coding and compression. If PSNR is high then images are best quality. This method provides acceptable image quality and
highly robust system.
REFERENCES
[1] Manveer Kaur1, Gagandeep Kaur2, 2014,” Review of Various Steganalysis Techniques”, International Journal of Computer Science and Information
Technologies, Vol.5 (2).
[2] Natarajan Meghanathan, Lopamudra Nayak, January 2010, "STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN
IMAGE, AUDIO AND VIDEO COVER MEDIA”, International Journal of Network Security & Its Application (IJNSA).
[3] Dr.P.Sujatha, Dr.S.Purushothaman, P.Rajeswari, January 2014, “Computational Complexity Evaluation of ANN Algorithms for Image Steganalysis”,
International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 3 Issue 3.
[4] Manu Devi, Ms. Nidhi Sharma, August, 2013, “Improvements of Steganography Parameter in Binary Images and JPEG Images against Steganalysis”,
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY.
[5] Krati vyas1, B.L.Pal, January 2014 , “A PROPOSED METHOD IN IMAGE STEGANOGRAPHY TO IMPROVE IMAGE QUALITY WITH LSB
TECHNIQUE”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 1.
[6] Siva Janakiraman, Suriya.N, Nithiya.V, Badrinath Radhakrishnan, Janani Ramanathan and Rengarajan Amirtharajan, " Reflective Code for Gray Block
Embedding," Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering,IEEE, pp: 215-220, 2012.
[7] Prabakaran G, Dr. Bhavani R and Rajeswari P. S, “Multi Secure and Robustness for Medical Image Based Steganography Scheme”, International
Conference on Circuits, Power and Computing Technologies [ICCPCT-], IEEE, and pp: 1188-1193, 2013.
[8] Vu Mai, Ibrahim Khalil, Ayman Ibaida, “Steganography-based Access Control to Medical Data Hidden in Electrocardiogram”, 35th Annual International
Conference of the IEEE EMBS, pp: 1302-1305, 2013.

More Related Content

PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
PDF
Analysis of image steganalysis techniques to defend against statistical attac...
eSAT Publishing House
 
DOCX
(Sample) image encryption
AnsabArshad
 
PDF
Conditional entrench spatial domain steganography
sipij
 
PDF
A novel steganographic scheme based on
acijjournal
 
PDF
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
PDF
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
Analysis of image steganalysis techniques to defend against statistical attac...
eSAT Publishing House
 
(Sample) image encryption
AnsabArshad
 
Conditional entrench spatial domain steganography
sipij
 
A novel steganographic scheme based on
acijjournal
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 

What's hot (15)

PDF
Image encryption
rakshit2105
 
PDF
Bi34381384
IJERA Editor
 
PDF
www.ijerd.com
IJERD Editor
 
PDF
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
 
PDF
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
 
PDF
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
 
PDF
Digital Steganography in Computer Forensics
IJCSIS Research Publications
 
PDF
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
PDF
Customized and Secure Image Steganography Through Random Numbers Logic.
CSCJournals
 
PDF
A Survey of different Data Hiding Techniques in Digital Images
ijsrd.com
 
PDF
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
PDF
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
ijcsit
 
DOCX
Image encryption using aes key expansion
Sreeda Perikamana
 
PDF
Enhanced Secret Communication Using Multilevel Audio Steganography
ijceronline
 
PDF
Image Steganography Techniques: An Overview
CSCJournals
 
Image encryption
rakshit2105
 
Bi34381384
IJERA Editor
 
www.ijerd.com
IJERD Editor
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
CSCJournals
 
Digital Steganography in Computer Forensics
IJCSIS Research Publications
 
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
Customized and Secure Image Steganography Through Random Numbers Logic.
CSCJournals
 
A Survey of different Data Hiding Techniques in Digital Images
ijsrd.com
 
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
ijcsit
 
Image encryption using aes key expansion
Sreeda Perikamana
 
Enhanced Secret Communication Using Multilevel Audio Steganography
ijceronline
 
Image Steganography Techniques: An Overview
CSCJournals
 
Ad

Viewers also liked (20)

PDF
STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...
Journal For Research
 
PDF
AUTOMATIC SORTING MACHINE
Journal For Research
 
PDF
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...
Journal For Research
 
PDF
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVE
Journal For Research
 
PDF
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULD
Journal For Research
 
PDF
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURE
Journal For Research
 
PDF
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
Journal For Research
 
PDF
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFER
Journal For Research
 
PDF
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCE
Journal For Research
 
PDF
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...
Journal For Research
 
PDF
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...
Journal For Research
 
PDF
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURE
Journal For Research
 
PDF
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERS
Journal For Research
 
PDF
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREEN
Journal For Research
 
PDF
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
Journal For Research
 
PDF
OBJECT DETECTION AND RECOGNITION: A SURVEY
Journal For Research
 
PDF
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
Journal For Research
 
PDF
GREENHOUSE CULTIVATION
Journal For Research
 
PDF
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATION
Journal For Research
 
PDF
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...
Journal For Research
 
STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...
Journal For Research
 
AUTOMATIC SORTING MACHINE
Journal For Research
 
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...
Journal For Research
 
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVE
Journal For Research
 
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULD
Journal For Research
 
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURE
Journal For Research
 
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
Journal For Research
 
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFER
Journal For Research
 
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCE
Journal For Research
 
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...
Journal For Research
 
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...
Journal For Research
 
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURE
Journal For Research
 
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERS
Journal For Research
 
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREEN
Journal For Research
 
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
Journal For Research
 
OBJECT DETECTION AND RECOGNITION: A SURVEY
Journal For Research
 
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
Journal For Research
 
GREENHOUSE CULTIVATION
Journal For Research
 
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATION
Journal For Research
 
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...
Journal For Research
 
Ad

Similar to IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE (20)

PDF
Bp34412415
IJERA Editor
 
PDF
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
PDF
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
PDF
Efficiency of LSB steganography on medical information
IJECEIAES
 
PDF
Ijetcas14 527
Iasir Journals
 
PDF
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
PDF
A Survey of Image Steganography
Editor IJCATR
 
PDF
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
 
PDF
Blind Key Steganography Based on Multilevel Wavelet and CSF
irjes
 
PDF
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
 
PDF
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
 
PDF
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
PDF
Securing Web Communication Using Three Layer Image Shielding
Kamal Pradhan
 
PDF
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
International Journal of Technical Research & Application
 
PDF
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
INFOGAIN PUBLICATION
 
PDF
Ijariie1132
IJARIIE JOURNAL
 
PDF
A Literature Review on Image Steganography Using AES
IRJET Journal
 
PDF
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
PDF
Paper id 212014145
IJRAT
 
PDF
A Study of Various Steganographic Techniques Used for Information Hiding
ijcses
 
Bp34412415
IJERA Editor
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
Efficiency of LSB steganography on medical information
IJECEIAES
 
Ijetcas14 527
Iasir Journals
 
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
A Survey of Image Steganography
Editor IJCATR
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
irjes
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
 
A Survey on Different Data Hiding Techniques in Encrypted Images
ijsrd.com
 
Securing Web Communication Using Three Layer Image Shielding
Kamal Pradhan
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
International Journal of Technical Research & Application
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
INFOGAIN PUBLICATION
 
Ijariie1132
IJARIIE JOURNAL
 
A Literature Review on Image Steganography Using AES
IRJET Journal
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
Paper id 212014145
IJRAT
 
A Study of Various Steganographic Techniques Used for Information Hiding
ijcses
 

More from Journal For Research (20)

PDF
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Journal For Research
 
PDF
Experimental Verification and Validation of Stress Distribution of Composite ...
Journal For Research
 
PDF
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Journal For Research
 
PDF
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
Journal For Research
 
PDF
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
Journal For Research
 
PDF
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
Journal For Research
 
PDF
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
Journal For Research
 
PDF
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
Journal For Research
 
PDF
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
Journal For Research
 
PDF
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
Journal For Research
 
PDF
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
Journal For Research
 
PDF
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
Journal For Research
 
PDF
LINE FOLLOWER ROBOT | J4RV4I1010
Journal For Research
 
PDF
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
PDF
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
Journal For Research
 
PDF
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
Journal For Research
 
PDF
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
Journal For Research
 
PDF
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
Journal For Research
 
PDF
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
Journal For Research
 
PDF
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
Journal For Research
 
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
Journal For Research
 
LINE FOLLOWER ROBOT | J4RV4I1010
Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
Journal For Research
 

Recently uploaded (20)

PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
DOCX
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
SAROCES Action-Plan FOR ARAL PROGRAM IN DEPED
Levenmartlacuna1
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Basics and rules of probability with real-life uses
ravatkaran694
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
CDH. pptx
AneetaSharma15
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 

IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE

  • 1. Journal for Research | Volume 02 | Issue 04 | June 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 9 Image Steganography using Block Level Entropy Thresholding Technique Souma Pal Prof. Samir Kumar Bandyopadhyay Research Scholar Professor Department of Computer Science & Engineering Department of Computer Science & Engineering University of Calcutta, West Bengal, India University of Calcutta, West Bengal, India Abstract Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique. Keywords: Steganography, Cryptography, Data hiding, Entropy _______________________________________________________________________________________________________ I. INTRODUCTION The information hiding system uses two algorithms: embedding algorithm and extraction algorithm. The embedding algorithm hides the information which is to be kept secret within a cover image in such a way that no one else than the sender and receiver can understand the existence of the secret message and finally produces the stego-image. The extraction algorithm retrieves the original message from stego-image by omitting the irrelevant or redundant information presence in the cover image. There are two kinds of steganographic techniques: spatial domain and frequency domain. Spatial/Time Domain:A. Spatial domain techniques embed messages in the intensity of the pixels directly. Least Significant Bit (LSB) is the first most famous and easy spatial domain Steganography technique. It embeds the bits of a message in a sequential way in the LSB of the image pixels but the problem of this technique is that if the image is compressed then the embedded data may be destroyed [1]. Thus, there is a fear for damage of the message that may have sensitive information. Moreover, these kinds of methods are easy to attack by Steganalysis techniques. Transform/Frequency Domain:B. Transform domain technique is done with a set of transform coefficients(DCT,entropy ) in the mid frequency bands as these are preserved better under compression attacks as compared to high frequency coefficients [7]. Transform domain technique performs well against attacks such as compression, cropping etc. and is imperceptible to human sensory system. Hence it is more undetectable and robust than spatial domain. This paper highlights the transform domain method. The cover image is splitted into non-overlapping 8x8 blocks and DCT (discrete cosine transforms) is computed for each block. Data embedding is done in the transform domain with a set of transform coefficients in the mid frequency bands as these are preserved better under compression attacks as compared to high frequency coefficients. In this paper, entropy property of an image block is considered for decision of data embedding. Two methods for applying local criteria which results in high volume data hiding are considered. First is the block level Entropy Thresholding (ET) method which decides whether or not to embed data in each block (typically 8X8) of transform coefficients depending on the entropy within that block. If a particular block fails this test, we keep it as it is and embed the same data in the next block that passes the test. The second is selectively Embedding in Coefficients (SEC) method, which decides whether or not to embed data based on the magnitude of the coefficient. II. REVIEW WORKS Steganalysis is the art of how to detect the existence of hidden information or hidden message in a multimedia document, and to discriminate stego object and non-stego-object with little or no knowledge about the steganography algorithm. The goal of steganalysis is to collect any evidence about the presence of embedded message [1]. If the steganography is the art of hiding messages into multimedia documents; the steganalysis is the art of detecting such the hidden messages. A message can be hidden
  • 2. Image Steganography using Block Level Entropy Thresholding Technique (J4R/ Volume 02 / Issue 04 / 03) All rights reserved by www.journalforresearch.org 10 in a document only if the content of a document has high redundancy [2]. Although the embedded message changes the characteristics and nature of the document, it is required that these changes are difficult to be identified by an unsuspecting user. On the other hand, steganalysis develops theories, methods and techniques that can be used to detect hidden messages in multimedia documents. The documents without any hidden messages or hidden information are called cover documents and the documents with hidden messages are named stego documents [3][4]. The multimedia document may be text, image, audio or video, this paper will concentrate on the image. Also stego document or stego object in this paper will be the stego image which is the image with hidden message or hidden information, and the cover document or cover object is the cover image which is the original image without and hidden message. The primary step of steganography and steganalysis process is to identify the image that the secret message will be hidden in, which will called cover image, then use any steganography algorithm to embed the message in the cover image, sometimes by the help of secret key, so the cover image become stego image as shown in Figure 1. After that steganalysis process determines whether that image contains hidden message or not and then try to recover the message from it. In the cryptanalysis it is clear that the intercepted message is encrypted and it certainly contains the hidden message because the message is scrambled. But this may not be true in the case of steganalysis. The stego image may or may not be with hidden message. The steganalysis process starts with a set of unknown information streams. Then the set is reduced with the help of advanced statistical methods [5]. Siva Jana Kiraman et.al [6] proposed a gray block embedding method, in this method the LSB bits are modified based on the MSB bit plane. In the embedding process the gray image is divided into the 4*4 blocks further this is divided into 2*2 blocks. The embedding process is done in 2 phase outer embedding and the inner embedding. In the outer a reference point is found in each of the 2*2 blocks and base o the MSB bit plane of then reference point in the 2*2 block the secret data is embedded into the other pixels. In the inner embedding the values of the reference point has been changed to increase the security. In the extracting process the reference point value are bought back and based on the reference point value the actual value are extracted from the stego image. The proposed scheme increases the embedding capacity and security by the complexity. Prabakaran G et.al [7] aims to develop a Steganography scheme to secure the medical digital images. The proposed method is based on the integer wavelet transform and the Arnold transform. In the embedding process the container image is taken and the flip left is applied, a dummy container image is obtained. The patient‟s medical image is taken and the Arnold transform is applied and scrambled secret image is obtained. This scrambled secret image was embedded into the dummy container image and the inverse IWT was taken to get dummy secret image. This dummy secret image is embedded into the container image and transferred to receiver. The reverse with sub band subtraction is applied to get the actual data in extraction phase. The algorithm increases the capacity and the quality. Vn Mai et.al [8] proposed a Steganography scheme to have control over the access of the data stored in the ECG (Electrocardiogram). The scheme requires that the patient‟s data to be stored in a tree structure which consists of leaf node and branch and each node represents a kind of data. Each leaf node or a branch is protected from access by Steganographic keys. The normal Steganography algorithm is used to embed data into ECG. Once data is embedded the data is stored in the public cloud and the data owner can upload some access keys and the interested users can request for keys to cloud server and retrieve some information and if there are some restricted data then the key has to be obtained from owner itself. In the extraction process the user key is compared with the key file on the cloud and only if the key matches the access is allowed. Confidentiality of the patient‟s information is maintained. III. PROPOSED METHOD Embedding Procedure:A.  At first, a cover image C (JPEG) is partitioned into non overlapping blocks of 8X8 pixels.DCT is computed for each block into DCT coefficients.  To find embedding region first Compute entropy (E) of all 8x8 DCT blocks. Entropy formula is E= | Xi,j |^2 𝑖,𝑗 (i,j) ≠(0,0).  Then calculate Mean Entropy (ME) from all blocks entropy.  Now, to obtain the valid block (VB), compare the entropy of each block with mean entropy (ME). For embedding the information, a block having entropy higher than the mean entropy value is selected and is named as valid block.  Middle coefficients of K Matrix for each valid block are one‟s and other coefficients are zero this is because our secret message will be embedded in the middle-frequency part of the quantized DCT coefficients matrix say k. In k matrix there are 26 coefficients located in the middle part that are set to be one. Here K[a,b] is the value of the ath row and bth column element of K .  Based on this table, the secret messages can be reserved and the reconstructed Image will not be too much distorted. The secret image S will be embedded in the middle frequency part of the DCT coefficients for valid block Vb.  After embedding the secret image IDCT is computed for all blocks. The blocks which are not used for embedding are taken as it is in stego image. At the end, add DC coefficient of each block in its respective block and organize all the blocks to get image, which is called stego image Stego (i, j). Extraction Procedure:B.  While extracting the secret data,the said embedding steps are repeated for stego image.
  • 3. Image Steganography using Block Level Entropy Thresholding Technique (J4R/ Volume 02 / Issue 04 / 03) All rights reserved by www.journalforresearch.org 11  Extract 26 mid frequency Bit information (BI) from Valid Coefficient of all Valid Block in zigzag order of stego image.  Then we order the extracted BI.  Finally decode the image information and acquire input secret image file S. IV. RESULT Several experiments are performed to evaluate our proposed methods. Eleven grayscale images with size 512 · 512 are used in the experiments as cover images namely „Lena‟, ‟Baboon‟, ‟Peppers‟, ‟F16‟, ‟Boat‟, ‟Man‟, ‟Tiffany‟, ‟Barbara‟, ‟Elaine‟, ‟Couple‟, ‟Splash‟, and are shown in Fig. 1. The proposed schemes have been implemented using the MATLAB 7.8.0.347 (R2009a) program on Windows XP platform. Fig. 1: Eleven cover images are used for the proposed schemes V. CONCLUSION The cover image is taken as a graysacle image of 256X256 pixels for experiment. The secret message is embedded in the middle frequency part of the DCT coefficients. The PSNR (decibel format) and MSE are used as measurement of the quality of image coding and compression. If PSNR is high then images are best quality. This method provides acceptable image quality and highly robust system. REFERENCES [1] Manveer Kaur1, Gagandeep Kaur2, 2014,” Review of Various Steganalysis Techniques”, International Journal of Computer Science and Information Technologies, Vol.5 (2). [2] Natarajan Meghanathan, Lopamudra Nayak, January 2010, "STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA”, International Journal of Network Security & Its Application (IJNSA). [3] Dr.P.Sujatha, Dr.S.Purushothaman, P.Rajeswari, January 2014, “Computational Complexity Evaluation of ANN Algorithms for Image Steganalysis”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 3 Issue 3. [4] Manu Devi, Ms. Nidhi Sharma, August, 2013, “Improvements of Steganography Parameter in Binary Images and JPEG Images against Steganalysis”, INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY. [5] Krati vyas1, B.L.Pal, January 2014 , “A PROPOSED METHOD IN IMAGE STEGANOGRAPHY TO IMPROVE IMAGE QUALITY WITH LSB TECHNIQUE”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 1. [6] Siva Janakiraman, Suriya.N, Nithiya.V, Badrinath Radhakrishnan, Janani Ramanathan and Rengarajan Amirtharajan, " Reflective Code for Gray Block Embedding," Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering,IEEE, pp: 215-220, 2012. [7] Prabakaran G, Dr. Bhavani R and Rajeswari P. S, “Multi Secure and Robustness for Medical Image Based Steganography Scheme”, International Conference on Circuits, Power and Computing Technologies [ICCPCT-], IEEE, and pp: 1188-1193, 2013. [8] Vu Mai, Ibrahim Khalil, Ayman Ibaida, “Steganography-based Access Control to Medical Data Hidden in Electrocardiogram”, 35th Annual International Conference of the IEEE EMBS, pp: 1302-1305, 2013.