QR-Code Image Steganography

Similar documents
Digital Image Steganography Techniques: Case Study. Karnataka, India.

Efficient Image Steganography Using Integer Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform

Improved Qualitative Color Image Steganography Based on DWT

Robust DWT Based Technique for Digital Watermarking

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

Comparative Analysis of Different Transformation Techniques in Image Steganography

Metamorphosis of High Capacity Steganography Schemes

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

QR Code Watermarking Algorithm based on Wavelet Transform

DWT-SVD based Multiple Watermarking Techniques

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Digital Watermarking with Copyright Authentication for Image Communication

An Improved Performance of Watermarking In DWT Domain Using SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Reversible Data Hiding VIA Optimal Code for Image

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Random Image Embedded in Videos using LSB Insertion Algorithm

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Reversible Data Hiding in Colour Images using AES Data Encryption System

Robust Image Watermarking based on DCT-DWT- SVD Method

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Digital Image Steganography Using Bit Flipping

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Robust Lossless Image Watermarking in Integer Wavelet Domain using SVD

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

Fingerprint Image Compression

DIGITAL IMAGE WATERMARKING APPROACH BASED ON QR AND DWT METHOD

Feature Based Watermarking Algorithm by Adopting Arnold Transform

A Framework to Reversible Data Hiding Using Histogram-Modification

STEGANOGRAPHY IN IMAGE SEGMENTS BY LSB SUBSTITUTION USING GENETIC ALGORITHM

A Robust Watermarking Algorithm For JPEG Images

International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February ISSN

COMPARISON OF WATERMARKING TECHNIQUES DWT, DWT-DCT & DWT-DCT-PSO ON THE BASIS OF PSNR & MSE

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

A New Color Image Watermarking Frame through Dwt and Alpha Channel

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Invisible Digital Watermarking using Discrete Wavelet Transformation and Singular Value Decomposition

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Robust Digital Image Watermarking. Using Quantization and Back Propagation. Neural Network

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

A Novel Method for Compressing Encrypted Images using Auxiliary Information

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Keywords PSNR, NCC, DCT, DWT, HAAR

Navjot Singh *1, Deepak Sharma 2 ABSTRACT I. INTRODUCTION

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

A DWT Based Steganography Approach

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Efficient & Secure Data Hiding Using Secret Reference Matrix

ISSN (ONLINE): , VOLUME-3, ISSUE-1,

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

Comparison of wavelet based watermarking techniques Using SVD

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

A new robust watermarking scheme based on PDE decomposition *

Comparative Analysis of Different Spatial and Transform Domain based Image Watermarking Techniques

A Reversible Data Hiding Scheme for BTC- Compressed Images

Digital Watermarking: Combining DCT and DWT Techniques

A Secure Steganography Technique using DCT and Modified RC4

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Comparative Analysis of Video Watermarking Scheme Using Different Wavelets & SVD

CHAPTER-6 WATERMARKING OF JPEG IMAGES

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Image Steganography Method Using Integer Wavelet Transform

LSB Based Audio Steganography Using Pattern Matching

Webpage: Volume 4, Issue V, May 2016 ISSN

A Survey on An Advanced Approach For Motion Video Steganography Using LSB Technique

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Image Error Concealment Based on Watermarking

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Steganography using MATLAB

DWT-SVD Based Digital Image Watermarking Using GA

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Data Hiding in Video

HISTOGRAM BASED WATERMARKING USING ENTROPY TECHNIQUE IN DIGITAL IMAGES

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

DWT AND LSB ALGORITHM BASED IMAGE HIDING IN A VIDEO

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Implementation of Audio Watermarking Using Wavelet Families

Implementation of Audio Watermarking Using Wavelet Families

DATA hiding [1] and watermarking in digital images

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform

Discrete Wavelet Transform Based Steganography for Transmitting Images

Transcription:

M. Ramesh 1,,G.Prabakaran 2 and R. Bhavani 3 1 Department of CSE, Assistant Professor, AVS college of Engineering & Technology, Nellore 524 111, India. 2,3 Department of CSE, Faculty of Engineering & Technology, Annamalai University, Annamalai Nagar 608 002, India. e-mail: mramesh2609@yahoo.co.in, gpaucse@yahoo.com Abstract. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. The proposed algorithm is a hybrid Steganography scheme based on (Quick Response) QR-code and (Discrete Wavelet Transform) DWT. This technique includes encoding and decoding operation in frequency domain only. The text message is hidden in the QR-code image. The QR code image is hidden into the Discrete Wavelet Transform. This technique performed well and additional security given to the information. The performance evaluation is done by using statistical parameters. This work was compared to other techniques. Our method achieved high security and more imperceptibility. Keywords: Steganography, Discrete wavelet transform, Quick response code. 1. Introduction The Steganography is of Greek source and means enclosed or hidden writing. Data hiding should be used concealed transmissions, closed captioning, indexing, or watermarking. It is in contrast to cryptography, where the survival of the message itself is not masked, but the content is hidden. Steganography is implemented in different fields such as military and Industrial applications. The original practice dates back to ancient times when messenger s concealed tattooed messages on their scalps that were revealed by shaving. Since the 1980 s, computer technologies have made steganography easier. Today everything from voice over IP to digital filing systems can be exploited to hide more information in ever more sophisticated ways. Hundreds of computer programs can read and encode messages in digital files. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. In this paper, we focus on frequency domain technique. The DWT has received considerable attention in various signal processing applications, including image Watermarking. The main idea DWT results from multi resolution analysis. This involves decomposition of an image in frequency channels of constant bandwidth on a logarithmic scale. With many useful applications are in signal processing and statistics. Quick Response Code is the trademark for a type of matrix barcode QR Code has become a focus of advertising strategy, since it provides quick and effortless access to the brand s website. Popular uses include storing URLs, addresses and various forms of data on posters, signs, business cards, public transport vehicles, etc. Indeed, this mechanism has a vast number of potential applications. 2. Related Work Z. Xiong et al., [1] has presented a scheme embeds a larger-sized secret image while Maintaining acceptable image quality of the stego-image and also improved image hiding scheme for gray scale images based on Integer Wavelet transformation. Mamta Juneja et al., [2] proposed a robust image Steganography. A technique based LSB insertion and encryption B.Shiva Kumar et al., [3] proposed the performance comparison of robust steganography based on multiple transformation techniques. This technique ensures more security than individual transformation techniques, which has excellent PSNR with high levels of security. Sushil Kumar et al., [4] presented a multi-layered secure, robust and high capacity image Corresponding author 180 Elsevier Publications 2014.

steganography Algorithm. This algorithm achieved three layers of security, better in terms of imperceptibility, robustness and embedding capacity compared with corresponding algorithms based on DWT. Espejel-Trujillo et al., [5] has proposed a scheme allows using the security capacity of the VSS scheme together with robustness and easy acquisition of QR code. This technique was performed ID-document authentication with secure and easy way without using sophisticated equipment. Shanjun Zhang et al., [6] has proposed a robust method of embedding QR code into the DWT domain of divided blocks of the still image. This technique was embedded information and extracted correctly even if the images are compressed to less percentage of the original according to the contents of the images. Thitapa Poomvichid et al., [7] has proposed audio based data hiding by applying the QR Code technique and using an AI technique achieved the quality of this technique was watermarked image and the similarity value of the extracted watermark after certain attacks will be poor. The inaudibility and robust performance can be achieved. The paper is organized as following sections. Methodology is described in section 3. Testing and statistical analysis is discussed in section 4. Experimental results are illustrated in section 5. The conclusion and references are given in the last section. 3. Proposed Methodology 3.1 QR code QR codes are very related to barcodes, But with one difference added advantage they have a matrix format that allows them to store a large volume of unique data. Normal linear barcodes are one-dimensional and can only hold up to 20 alphanumeric digits, but QR codes are two-dimensional (2D) so they can hold up to 7,089 numeric characters and up to 4,296 alphanumeric letterings worth of data. QR codes are free to create and to use and there are many inventive uses of a QR code that make it a very versatile technology. The usual specifies 40 versions (sizes) of the QR code from the small 21 21 up to 177 177 modules in size. An improvement with QR code is also there relatively small size for a given amount of data The QR code is accessible in 40 different square sizes each with a user selectable inaccuracy correction level in four steps (referred to as inaccuracy correction level L, M, Q and H). 3.2 Discrete wavelet transform An image that undergoes Haar wavelet transform will be divided into four bands at each of the transform level. The work presented in this paper is based on frequency domain processing in image hiding mechanism provides imperceptibility and robustness. The first band represents the input image filtered with a low pass filter and compressed to half. This band is also called approximation. The other three bands are called details where the high pass filter is applied. These bands contain directional characteristics. The size of each of the bands is also compressed to half. Specifically, the second band contains vertical characteristics, the third Band shows characteristics in the horizontal direction and the last band represents diagonal characteristics of the input image. Conceptually, Haar wavelet is very simple because it is constructed from a square wave. Moreover, the Haar wavelet computation is fast since it only contains two coefficients and it does not need a temporary array for multilevel transformation. Thus, each pixel in an image that will go through the wavelet transform computation will be used only once and no pixel overlapping during the computation. 3.3 Proposed model Figure 1. The proposed encoding model. Figure 2. The proposed decoding model. Elsevier Publications 2014. 181

M. Ramesh, et al. 3.4 Proposed steganography encoding process During the proposed embedding process first read one cover image and secret images. Apply Discrete Wavelet Transform on the cover image and a secret image to get a DWT cover image. Then apply fusion process on both DWT cover image and QR-code secret image to get composite image and get stego image. The schematic diagram of the proposed embedding process is shown in figure 1. 3.5 Embedding algorithm Step 1: Read the cover image as a cover image. Step 2: Generate a QR code with a secret message. Step 3: Apply DWT on both cover and QR code image. Step 4: Embed the QR code image into cover image. Step 5: Reconstruction of cover image to apply IDWT. Step 6: Finally get a stego image 3.6 Proposed steganography decoding process The decoding process is the reverse process of the proposed steganography embedding process. Here to read the cover image and stego image first and apply Subtract stego image coefficients with cover image components and reconstructed the image. The Schematic diagram of the proposed decoding the process is shown in figure 2. 3.7 Decoding algorithm Step 1: Read the stego image and original image. Step 2: Apply DWT on both images. Step 3: Subtract stego image Discrete Wavelet Transform component with the original Image DWT component and get the QR code image. Step 4: By using QR code reader extract secret message from the QR code image. 4. Testing and Performance Analysis 4.1 Matlab MATLAB is a high performance language for technical computer, integrates computation, visualization and programming in an easy to use environment. One of the aims for selecting To evaluate the performance of the proposed method, we implement the proposed method by using Matlab R2010a and 7.10 version. MATLAB is to fit perfectly in the necessities of an image processing research due to its inherent characteristics and helpful to solve problems with matrix and vector formulations. Figure 3. Secret message. Figure 4. Secret message QR Code image. Figure 5. Original image. 182 Elsevier Publications 2014.

Figure 6. Stego image. Figure 7. Recovered QR code image. Figure 8. Recovered secret message. 4.2 Quality metrics Image Quality of watermarked image are tested on various quality parameters i) Mean Square Error (MSE): It is defined as the square of the error between cover image and watermarked image. The distortion in the image can be measured using MSE and is calculated using Equation (1). MSE = 1 MN M j=1 k=1 N (x j,k x j,k )2 (1) where x j,k cover image, x j,k stego image. ii) Peak Signal to Noise Ratio (PSNR): It is the measure of the quality of the image by comparing the cover image with the watermarked image, i.e., it measures the statistical difference between the cover and watermarked image is calculated by using below Equation (2). PSNR = 10 log 10 (255)2 db (2) MSE iii). Normalized Cross Correlation (NCC): This is also similarity measurement method to evaluate the performance given in Equation (3). M N NCC = (x j,k x j,k ) 1 Mj=1 Nk=1 (3) (X j,k ) 2 5. Simulation Results and Discussion j=1 k=1 The image quality factors MSE, PSNR and NCC other quality measurement are observed. The image quality of the proposed method has been completed, which is better than the most cases compared to the existing methods. The experimental results are shown in the figure 3 to 8. The figure 3 shows the text message and figure 4 shows the corresponding QR code. The figure 5 shows the Cover image and figure 6 shows the corresponding stego image. The figure 7 shows recover the QR code image and figure 8 shows the recovered secret text message. The value of NCC lies between 1 and+1. If two images are identical, then its value will be +1, if they are completely opposite, then its value will be 1 and it will be 0 if images are completely uncorrelated. If value close to one then it shows highest correspondence with the original image. The image quality metrics values are reported in table 1. We observed that the best quality of stego image formed by the other image quality metrics followed in the ranges. The PSNR value ranges from 48 to 52. NCC is observed ranges from 0.99 to 1.00 Robustness measures are the ability of the watermarking technique to survive the attempts of removing the hidden information. Such attempts include image manipulations like image contrast, image suppression, image rotation. We are checking the couple of small attacks like parameter 0.001, 0.002 and 0.003 applied to image contrast and image suppression. We observed that very less distortion in PSNR values. The 0.05 degree rotation of the Stego image that also gives high PSNR values. Elsevier Publications 2014. 183

M. Ramesh, et al. Table 1. The quality of cover image vs stego images. Cover images MSE PSNR NCC Flower.jpg 0.8975 48.64 0.96 Team.jpg 0.7483 49.38 0.97 Real.jpg 0.4617 51.487 0.99 Empty.jpg 0.3958 52.156 0.99 Own.jpg 0.9249 48.3362 0.97 6. Conclusion In this paper, we have proposed a new image steganography scheme under DWT decomposition technique. The encoding and decoding operation in the spatial domain is proposed. The text message is hidden in the QR-code image. The QR-code image is hidden into the singular value component. This technique performed well and additional security given to the information. Performance analysis of these two transforms is done based on parameters PSNR and MSE are better than the earlier techniques. References [1] Luo, Z. Chen, M. Chen, X. Zeng and Z. Xiong, Reversible image watermarking using interpolation techniques, IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 187 193, Mar. (2010). [2] Ahkil Khare, Meenu Kumari and Pallavi Khatre, Efficient algorithm for digital image steganography, Journal of information, knowledge and research in computer science and application, vol. 10, issue 1, pp. 001 005, Oct. (2010). [3] Sabyasachi Pattnaik, R. K. Chhotaray, K. B. Raja and K. B. Shiva Kumar, Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques, International Journal on Computer Technology Applications, vol.2(4), pp. 1035 1047, (2011). [4] S. K. Mutoo and Sushil Kumar, A Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm, World of Computer Science and Information Technology Journal, vol. 6, pp. 239 246, (2011). [5] A. Espejel-Trujillo, I. Castillo-Camacho, M. Nakano-Miyatake, H. Perez-Meana, Identity Document Authentication Based on VSS and QR Codes, Iberoamerican Conference on Electronic Engineering and Computer Science, vol. 3, pp. 241 250, (2012). [6] Shanjun, Zhang, Kazuyoshi and Yoshino, DWT-Based Watermarking Using QR Code, Science Journal of Kanagawa University, pp. 3 6, (2008). [7] Thitapa Poomvichid, Pantida Patirupanusara and Mahasak Ketcham, The QR Code for Audio Watermarking using Genetic Algorithm, IMLCS 2012, pp. 11 12, (2012). 184 Elsevier Publications 2014.