Advanced Hiding Technique For Rotated Text Message in Digital Images
Advanced Hiding Technique For Rotated Text Message in Digital Images
Advanced Hiding Technique For Rotated Text Message in Digital Images
Abstract- Data hiding techniques have taken the very process and top-secret key provided by the sender. Generally
important role with the speedy growth of intensive transfer of this can be done by embedding the stealthy message within
multimedia matter and stealthy communications. Steganography another digital medium like text, image, audio or video. A
is the skill of hiding information in such a way that prevents model of the Steganography process is illustrated in Fig. 1.
recognition of the data. There are different kinds of carrier file
formats can be used, but digital images are the most popular
because of their existence on the Internet. In this paper, data Secret
hiding method is introduced that utilizes Rotation of the letters, Key
Message
JPEG compression and two new techniques. First, rotation of
letters is done by matrix rotation. Then JPEG compression takes
place, which includes two new techniques, i.e. Permutation
straddling and Matrix Encoding. Results came from the research Embedding Stego
show that the proposed method can hide a large amount of secret
Function Object
data and also keep very high security as PSNR is to be more than
35 dB, and there is a comparision between the old technique and
proposed technique.
I. INTRODUCTION
The plain need of every rising area in todays world is Key
communication. One and all want to keep the secret
information of work to be top-secret and safe. We use Fig. 1. Steganography System Scenario
numerous insecure pathways in our everyday life for
transmitting and sharing material using internet or any other JPEG Compression: - The goal of the most common style
medium, but at a certain level it's not safe. Steganography is of JPEG is to deliver the best possible quality at a given
one of the methods which can be used to transfer information compression ratio. Therefore the original records must be
in a concealed manner. carried into a suitable form allowing to distinguish between
Steganography: - The secret message is made to hide in significant (relevant) and less significant (irrelevant) matters.
digital image so that it couldnt be visible to any intermediate The JPEG standard insists on coding process carried out at
person. Intermediate person will not be able to detect whether multi-level:
there is any message concealed in the matter which is being 1) Image Preparation: - The image will be divided into
shared or not. The cover image containing the stealthy components, which are modified to the different
message is then transferred to the recipient. The receiver is quality requirements.
able to take out the message with the help of retrieving
978-1-5090-0669-4/16/$31.00 2016 IEEE
2016 Symposium on Colossal Data Analysis and Networking (CDAN)
2) Transformation: - Each specific component is A data hiding method which is established on interpolation
transferred into a format that allows making and LSB substitution. In this proposed method, first
conclusions about the arrangement of the contents. interpolation method are used to balance up and down the
This proposals the option to make a distinction cover image before hiding stealthy data for the wish of higher
between basic and more complex contents. capacity and quality. After that, the LSB substitution method
3) Quantization: - The transformed matter is weighted is used to implant stealthy data. The supreme common
according to their sense for the image matters. techniques for burying the data are Least Significant Bit
4) Entropy: - Removal of redundant information. (LSB) substitution and pixel-value differencing (PVD). LSB
substitution swaps the least significant bit with a top-secret bit
II. RELATED WORK stream. LSB similar is either added or subtracted haphazardly
from the pixel value of the cover data when the embedding bit
Ki-Hyun Jung [2014] projected the data hiding method does not match. Also, LSB technique is not resistant to visual
which is established on interpolation and LSB substitution. attacks. Changes reside crowded at the start of the file.
The interpolation method has been introduced before burying Therefore, a part of the le remains unused. Attacks profit
secret data for the purpose of advanced capacity and best from the high change density. This is called continuous
quality. After that, the LSB substitution method was embedding.
introduced for implanting the secret data.
IV. PROPOSED APPROACH
Mehdi Hussein [2013] provided an overview of different
Steganography techniques, its main types and classification of A data hiding method that is the combination of Rotation of
Steganography which have been planned in the literature the letters, then JPEG compression which includes two new
through last few years. We have seriously analyzed different technique is introduced, permutation straddling and Matrix
proposed techniques using LSB based methods, which show Encoding. The part of rotation is done by rotating the letters of
that pictorial and visual quality of the image is tumble down the word, one by one by 85. Then JPEG compression takes
when size of hidden data increased up to certain limit. And place which is of four main steps:
many of them implanting techniques can be wrecked or shows
sign of modification of image by cautious analysis of the 1) Image Preparation
properties of noise. 2) Transformation
3) Quantization
Atallah M [2012] suggests a new Steganography technique 4) Entropy Coding
which was presented, also implemented and analyzed. In
planned method, identical bits between the stealthy messages But there is a pause after the Quantization process in which
and image pixels values are searched, on the basis of which, two processes takes place. We know that, a buried message
data should be hidden. The planned method was compared does not require the full Space. Thats why, a portion of the
with the LSB method for hiding the stealthy message which le remain as unused. Fig. 2 shows, that the changes
bury the stealthy message straight in the least two significant concentrates on the starting portion of the le, and the
bits of the image pixels. remaining portion exist on the end. This is called continuous
embedding. These are the invitations to the intruder for visual
Mamta Juneja [2014] projected the technique which attacks. To prevent these attacks, the implanting function
achieves the aim of an implementation of new steganography should use the carrier medium as usual as possible. The
method for images which is the mixture of three new density of embedding the data should be the equal
techniques It attains the target of 50% hiding capacity and everywhere.
Noiselessness (PSNR value) with minimum MSE.
So first we apply Permutative Straddling. In this, message will
Our literature review finds that significant work has been done be widen out over the whole carrier medium. The straddling
on the state of Steganography which is using the LSB tool shues whole coecients using permutation. Then,
technique. Various good hard work have also been made by implants it into the permuted order. The contraction which
using PSNR values and mean square errors (MSE). However, takes place here does not change the number of coecients. It
visual attacks still be possible in the LSB techniques. This only changes the value of coefficients. The permutation based
problem of visual attacks needs to be addressed through a very on a key derived from a password. It delivers the coecients
responsive solution. which is changed steganographically, in its original
arrangement to the Human coder. With the use of correct
III. PROBLEM DEFINITION key, the receiver is able to repeat the permutation. Fig. 3
2016 Symposium on Colossal Data Analysis and Networking (CDAN)
1. Rotation
2. JPEG Compression
Fig. 2. Continuous embedding concentrates changes
A) Image Preparation
B) Transformation
Message
C) Quantization
2.1 Permutation
Fig. 3. Permutative embedding scatters the changes Straddling
KEY
Estimate of Stego
Message System
Fig 5 shows that the sender recruits the message as text for
attaching on the cover image then it is processed with the help
of the rotation which means that it will be rotated by 85 so
that letters are slanted. It will helpful for our method and after
this JPEG compression is done which includes two
techniques. This data uploaded with the cover image and that
image not slanted in any manner. Send it to the receiver with
Fig. 4. Seven cover images the protected medium and at the end of the receiver key is
used for the decryption of the data which is hideen and
successfully receive it.
2016 Symposium on Colossal Data Analysis and Networking (CDAN)
10 log 255
PSNR =
MSE
x x
MSE =
WH
embedding the data is the PSNR. The values of PSNR are Modification Based on Private Stego-Keys, International Journal
of Computer Science and Security (IJCSS), vol. 4, (2010) March
achieved using the software under this study were all above
1.
the benchmark for the high quality image. 16) H. Yang, X. Sun and G. Sun, A High-Capacity Image Data
Hiding Scheme Using Adaptive LSB Substitution, Journal:
VI. CONCLUSION Radioengineering, vol. 18, no. 4, (2009), pp. 509-516.
17) K.-H. Jung, K.-J. Ha and K.-Y. Yoo, Image data hiding method
We conclude that the image quality of the stego-image can be based on multi-pixel differencing and LSB substitution methods,
Proc. 2008 International Conference on Convergence and Hybrid
greatly enhanced with low extra computational complexity. A Information Technology (ICHIT '08), Daejeon (Korea), (2008)
good balance between the security and the image quality is August 28-30, pp. 355-358.
achieved. This proposed algorithm is applicable on both gray 18) J, Corporation, Steganography. http://www.webopedia.com/
scale images & color images. It has also been concluded that TERM/S/steganography.html. 2005
proposed method is better than LSB based Steganography on
the basis of values of MSE & PSNR as shown by the
experimental results.
VII. REFERENCES