Genetic algorithm for optimal imperceptibility in image communication through noisy channel

Similar documents
in this topic of research to achieve an optimal solution in multidimensional

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Digital Image Steganography Techniques: Case Study. Karnataka, India.

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Optimal Parameter Selection for Image Watermarking Using MOGA

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Multilayer Data Embedding Using Reduced Difference Expansion

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Improved Qualitative Color Image Steganography Based on DWT

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Data Hiding in Video

DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS

A Robust Image Watermarking Scheme using Image Moment Normalization

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

CHAPTER-4 WATERMARKING OF GRAY IMAGES

Robust Lossless Data Hiding. Outline

Robust Image Watermarking based on DCT-DWT- SVD Method

Reversible Data Hiding VIA Optimal Code for Image

A New Approach to Compressed Image Steganography Using Wavelet Transform

Adaptive Fuzzy Watermarking for 3D Models

Image and Video Watermarking

A Video Watermarking Algorithm Based on the Human Visual System Properties

A Digital Video Watermarking Algorithm Based on LSB and DCT

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Framework to Reversible Data Hiding Using Histogram-Modification

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

International Journal of Innovative Research in Computer and Communication Engineering

An Efficient Digital Watermarking Scheme for Dynamic Estimation of Wireless Channel Condition

A ROBUST WATERMARKING SCHEME BASED ON EDGE DETECTION AND CONTRAST SENSITIVITY FUNCTION

Comparative Study on VQ with Simple GA and Ordain GA

GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY

Digital Image Watermarking Scheme Based on LWT and DCT

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Digital Image Steganography Using Bit Flipping

Enhancing the Image Compression Rate Using Steganography

Genetic algorithms for optimal image enhancement

DWT-SVD based Multiple Watermarking Techniques

An Improved Blind Watermarking Scheme in Wavelet Domain

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

Image Authentication and Recovery Scheme Based on Watermarking Technique

Breaking the OutGuess

CHAPTER-6 WATERMARKING OF JPEG IMAGES

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

Robust Watermark Algorithm using Genetic Algorithm

A Robust and Oblivious Watermarking Method Using Wavelet Transform and Genetic Algorithm

Available online at ScienceDirect

Towards a Telltale Watermarking Technique for Tamper-Proofing

Digital Watermarking with Copyright Authentication for Image Communication

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

The Genetic Algorithm for finding the maxima of single-variable functions

A New DCT based Color Video Watermarking using Luminance Component

An Improved Performance of Watermarking In DWT Domain Using SVD

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

DATA hiding [1] and watermarking in digital images

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

A Robust Watermarking Algorithm For JPEG Images

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Removing Salt and Pepper Noise using Modified Decision- Based Approach with Boundary Discrimination

CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

A new robust watermarking scheme based on PDE decomposition *

Jamuna S R Assistant professor Dept of CSE Sri Eshwar college of Engineering. `Coimbatore

Secret Image Sharing Scheme Based on a Boolean Operation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Image Quality Assessment Techniques: An Overview

Recent Researches in Applied Informatics and Remote Sensing

Speech Modulation for Image Watermarking

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Multimedia Security: So What s the Big Deal?

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Efficient Object Extraction Using Fuzzy Cardinality Based Thresholding and Hopfield Network

Optimizing Image Steganography using Genetic Algorithm

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

CHAPTER-5 WATERMARKING OF COLOR IMAGES

Robust Steganography Using Texture Synthesis

Block Mean Value Based Image Perceptual Hashing for Content Identification

A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality

Hiding Depth Map in JPEG Image and MPEG-2 Video

A NEW APPROACH OF DIGITAL IMAGE COPYRIGHT PROTECTION USING MULTI-LEVEL DWT ALGORITHM

Transcription:

Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden, Howrah, India, 711 103 2 Machine Intelligence Unit, 203 B. T. Road, Kolkata, India, 700 108 3 Bengal Engineering College (DU), P.O.-Botanic Garden, Howrah, India, 711 103 Abstract. Data embedding in digital images involves a trade off relationship among imperceptibility, robustness, data security and embedding rate etc. Genetic Algorithms (GA) can be used to achieve optimal solution in this multidimensional nonlinear problem of conflicting nature. The use of the tool has been explored very little in this topic of research. The current paper attempts to use GA for finding out values of parameters, namely reference amplitude (A) and modulation index (µ) both with linear and non linear transformation functions, for achieving the optimal data imperceptibility. Results on security for the embedded data and robustness against linear, non linear filtering, noise addition, and lossy compression are reported here for some benchmark images. 1 Introduction The properties of data hiding techniques in digital images such as perceptual transparency, higher capacity, statistical invisibility or security of the hidden data, and robustness to some types of attacks are related in a conflicting manner and the design tradeoff depends on the applications (see [1]and [2]). Genetic Algorithms (GAs) can be used to optimize the conflicting requirements of data hiding problem but the use of the tool has been explored very little in this topic of research although there are many problems in the area of pattern recognition and image processing [3] where GAs perform an efficient search in complex spaces in order to achieve an optimal solution. In the present paper GA is used to find two parameter values, namely reference amplitude (A) and modulation index (µ) in linear and non linear transformation functions used to modulate the auxiliary message. The cover object (image) is chosen in which the message is well hidden unlike in watermarking applications where the message must be hidden in the cover work to which it refers and no other. Image regions with relatively low information content and having pixel values in the lower and upper portion of the dynamic range are used for data hiding as the characteristics of human visual system (HVS) are less sensitive to the change at these two ends. The paper is organized as follows. Sections 2 describes transformation functions for message modulation and how to calculate the range of parameters. Genetic algorithm for data embedding is presented in section 3 with embed-

ding and recovery process in section 4. Sections 5 and 6 present some results for highlighting the use of GA and conclusions respectively. 2 Modulation function and calculation of parameters The cover and the auxiliary message are chosen as gray level images and the auxiliary message is modulated using suitable transformation functions to match the characteristics of the cover image regions. Distortions are then created over stego image to simulate the behavior of a noisy channel. The power-law function X = A(X + ε) µ which is widely used for image enhancement operation is considered as modulation function. Here X denotes the pixel value in auxiliary message and transformation function modulates X to X, the pixel value of the cover image selected for embedding. Two other transformation functions, One is linear transformation function of the form X = A(1 + µx) and other one is parabolic function of the form X = A(1 + µ X), are compared for their suitability on imperceptibility, security and robustness issues of data embedding. The following sub sections describe how to calculate the range of parameter values. 2.1 Calculation of A The modulation function is as follows: X = A(X + ε) µ (1) Differentiating X with respect to X, weget dx /dx = Aµ(X+ε) µ 1 (2) Here dx /dx is positive provided A>0, µ>0 and (X + ε) > 0, which implies X increases monotonically with X. The upper (U ) and lower (L ) bound of the modulated pixel values are U =X max = A(X max + ε) µ (3) L =X min = A(X min + ε) µ (4) The range (Ψ) of the modulated pixel values is given as follows: Ψ=U L = A[(X max + ε) µ (X min + ε) µ ](5) The relation shows that for large A value, the span of the modulated pixel values (Ψ) will be large leading to smaller probability of matching between the modulated message and embedding regions. This in turn suggests to select lower value of A for better imperceptibility. The small span (Ψ) is also possible for large A value provided very small value is selected for µ. But it is shown in the detection process that small value of µ will make the auxiliary message vulnerable to elimination in noisy transmission media. Similar argument also holds good for the value of A. The value of A depends on selection of the auxiliary message as well as regions selected for embedding. As rule of thumb A is selected as A=X mode /(X mode + ε) µ (6) where X mode and X mode respectively denote the mode of the gray values for the embedding regions and the auxiliary messgaes.

2.2 Calculation of µ Power-law transformation suggests if µ value is taken small (µ < 1.0) keeping A constant, auxiliary message is mapped into a narrow range of gray values. This fact is also supported by equation (5). Confinement of gray values inside a narrow range increases the probability of matching between the modulated message and the data embedding region. But very small value of µ makes the detection of message impossible even after a very small image distortion. The upper and lower value of µ are calculated as follows: It is found that X is a monotonically increasing function of X. The value of ε, acts as offset value in image display, is set to ( 0.01). From equation (1), we write X max = A(255 + 0.01) µ = A(255.01) µ The maximum X value is taken 255 for monochrome gray level image. The corresponding µ value is designated as µ max and is related with X max and A as follows: µ max log X max log A log 255 Similarly, µ min value can be written as follows: µ min log X min log A log 0.01 = log A log X min 2.0 The value of µ will be positive if A lies between X max and X min where the later values represent the maximum and minimum gray values of the embedding regions respectively. 3 GA for data hiding Let us analyze the use of GA in data hiding problem (any problem) and the main steps are as follows [4]: (1) Chromosomal representation of the parameter values, namely the reference amplitude (A) and modulation index (µ) associated with the problem. (2) Creation of an initial population of chromosomes for possible solutions by using random binary strings of length pq where p represents the number of parameters and q are the bits assigned for each parameter. (3) To quantify the closeness measure among pixel values over sub image or image, average Euclidean distance is considered here as fitness function. The value of pay-off function can be expressed mathematically as follows: F(A, µ)= N 1 i=0 N 1 j=0 [Sij eij(a,µ)] N 2 (7) where S ij is the gray value of (i, j)-th pixel of the embedding region, e ij (A, µ) = A(X ij + c) µ, is the gray value of (i, j)-th pixel of the message after modulation and N 2 is the total number of pixels in the embedding regions as well as in the auxiliary message. (4) According to De Jong s elitist model [5], the best fit string obtained is included in the new population to preserve the best structure in the population. (5) Although the high mutation probability leads to exhaustive search which

may results in better imperceptibility at higher computation cost. Here moderate value of mutation probability is chosen in order to achieve imperceptibility at comparatively lower cost. Size of the population is 20, Number of generations are 800, Probability of crossover per generation is 0.95, probability of mutation is 0.005. 4 Message hiding and recovery The particular cover image can be selected from its histogram on the basis of higher frequency of occurrence in pixel values in either end and the auxiliary message is modulated using the transformation functions. The message modulated by transformation function using GA replaces the selected regions of the cover image. Fig. 1. (a) Cover image; (b), (c), (d) Stego images using power-law (PSNR=41.77 db), parabolic function (PSNR=51.58 db), linear function (PSNR= 47. 45 db) respectively; (e) Auxiliary message; (f), (g), (h) Extracted messages from (b), (c), (d) respectively; (i), (j), (k) Extracted messages from mean filtered stego images when power law, parabolic, linear functions are used respectively; (l), (m), (n) Extracted messages from median filtered stego images when power law, parabolic, linear functions are used respectively; (o), (p) Extracted messages from compressed (JPEG) stego images (PSNR=31.06 db) and (PSNR=31.88 db) using power law and linear function respectively. Data recovery process uses inverse transformation function that maps X into X and thus message is recovered. If power-law, linear and parabolic functions are

used for message modulation, extracted message can be represented respectively as follows: X=(X /A) 1/µ ε (8) X=(1/µA)(X A) (9) X=1/(µA) 2 (X A) 2 (10) Differentiating equations (8),(9) and (10) with respect to X the following equations are obtained respectively, dx/dx =(1/µ)(1/A) 1/µ (X ) 1/µ 1 (11) dx/dx =1/µA (12) dx/dx =2(X A)/(µA) 2 (13) dx/dx denotes the change of X with respect to the change of X i.e. a measure of noise immunity in the detection process. The large values of A and µ are preferable for reliable decoding whereas small values of the same are desirable for better imperceptibility. Lower value of dx/dx indicates better reliability in detection process. 5 Results and discussions The efficiency of the proposed algorithm is tested by embedding different messages in several cover images like Cameraman (results reported), Black bear, Bandron [6] etc. and the messages are extracted from various noisy version of the stego images. Peak signal to Noise Ratio (PSNR), relative entropy distance (Kulback Leibler distance)[7], and mutual information [8] are used as representative objective measures of data imperceptibility, security and robustness respectively. Table 1 shows the robustness results where 1, 2, and 3 used in the objective measures indicate the results for power-law, linear and parabolic functions respectively. Robustness efficiency against mean, median filtering and lossy compression are shown in respective figures. Poor robustness in the case of power law function is supported by eqn. (11) where small values of A and µ causes change in X manifold even for the small change in X. Linear transformation function offers better imperceptibility as large range of message gray values can be mapped to smaller range by choosing the small slope i.e. the product of A and µ. At the same time better resiliency is achieved since dx/dx (equation 12) is no way dependent on X although very small values of A and µ will affect the detection process. Best data imperceptibility and security result is possible in case of parabolic function, as small values of A and µ map wide range of message gray values to the narrow region in the lower range of pixel values of the cover image. Detection reliability in such case is also satisfactory since dx/dx does not contain X with power term of A and µ like power law transformation function, although small values of the parameters affect detection process little more compared to linear transformation function.

Table 1. Performance results of different modulation functions Generation PSNR ε value I(X; Y ) PSNR ε value I(X; Y ) PSNR ε value I(X; Y ) number (db) 1 (1) value(1) (db) 2 (2) value(2) (db) 3 (3) value(3) 50 40.56 0.046 0.28 43.49 0.037 0.48 45.42 0.037 0.38 150 40.79 0.045 0.21 44.36 0.040 0.44 46.74 0.037 0.39 400 40.90 0.041 0.20 47.90 0.036 0.42 48.73 0.036 0.34 600 41.50 0.039 0.19 48.36 0.030 0.39 50.37 0.025 0.35 800 41.77 0.038 0.15 47.45 0.034 0.40 51.53 0.023 0.32 6 Conclusions The paper proposes an invisible image-in-image communication through noisy channel where linear, power-law and parabolic functions are used to modulate the auxiliary messages. GA is used to find the optimal parameter values, viz. reference amplitude (A) and modulation index (µ) for data imperceptibility. Experimental results show that parabolic function offers higher visual and statistical invisibility and reasonably good robustness, whereas, linear function offers higher robustness with reasonably good invisibility. Power-law function neither provides good resiliency nor imperceptibility. Future work can be directed to develop better form of modulation functions in order to improve the robustness performance against various types of distortions in stego images along with higher embedding rate. References 1. Macq, B.:Special issue on identification and protection of multimedia information. Proc. IEEE. 87 (1997) 1673 1687 2. Vleeschouwer, C., Delaigle, J., Macq,B.: Invisibility and application functionalities in perceptual watermarking-an overview. Proc. IEEE. 90 (2002) 64 77 3. Ankerbrandt, A., Unckles, B., Petry, F.: Scene recognition using genetic algorithms with semantic nets. Pattern Recognition Lett. 11 (1990) 285-293 4. Pal, S., Bhandari, D., Kundu, M.: Genetic algorithms for optimal image enhancement. Pattern Recognition Lett. 15 (1994) 261 271 5. Goldberg, D.: Genetic Algorithms: Search, Optimization and Machine Learning. Addison-Wesley, Reading, M.A., (1989) 6. http:// www.cl.cam.ac.uk/ fapp2/watermarking 7. Cachin, C.: An information theoretic model for steganography. Proceedings of 2nd Workshop on Information Hiding. D. Aucsmith (Eds.). Lecture Notes in Computer Sciences, Springer-verlag, USA, 1525 (1998) 8. Lathi, B.: Modern Digital and Analog Communication Systems (Third Edition). Oxford University Press, New Delhi, India (1999) This article was processed using the L A TEX macro package with LLNCS style