AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

Similar documents
Robust Lossless Data Hiding. Outline

Multilayer Data Embedding Using Reduced Difference Expansion

A reversible data hiding based on adaptive prediction technique and histogram shifting

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding Based on Median Difference Histogram

A Reversible Data Hiding Scheme for BTC- Compressed Images

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Reversible Blind Watermarking for Medical Images Based on Wavelet Histogram Shifting

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

A Framework to Reversible Data Hiding Using Histogram-Modification

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

I. Introduction. II Integer-To-Integer Wavelet Transforms

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

A New Reversible Watermarking Method. Based on Histogram Shifting

Robust Image Watermarking based on DCT-DWT- SVD Method

Literature Survey on Performance of Reversible Data Hiding Algorithm

Robust Steganography Using Texture Synthesis

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Reversible Data Hiding

REVERSIBLE DATA HIDING SCHEME BASED ON PREDICTION ERROR SORTING AND DOUBLE PREDICTION.

Reversible Watermarking in JPEG Images Based on Modified RZL Codes and Histogram Shift

A New Approach to Compressed Image Steganography Using Wavelet Transform

Introduction to Visible Watermarking. IPR Course: TA Lecture 2002/12/18 NTU CSIE R105

Research Article Robust and Reversible Audio Watermarking by Modifying Statistical Features in Time Domain

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Adaptive Pixel Pair Matching Technique for Data Embedding

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

Interleaving Max-Min Difference Histogram Shifting Data Hiding Method

Breaking the OutGuess

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

Data Hiding in Video

Digital Image Steganography Techniques: Case Study. Karnataka, India.

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

Reversible Texture Synthesis for Data Security

Image and Video Watermarking

Image Error Concealment Based on Watermarking

ANALYSIS OF DIFFERENT DOMAIN WATERMARKING TECHNIQUES

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

International Journal of Innovative Research in Computer and Communication Engineering

Image Steganography (cont.)

Data Hiding on Text Using Big-5 Code

Reversible Watermarking Technique using Histogram Shifting Modulations

ROBUST LOSSLESS IMAGE DATA HIDING

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Implementation of ContourLet Transform For Copyright Protection of Color Images

Information Cloaking Technique with Tree Based Similarity

Concealing Information in Images using Progressive Recovery

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Digital Signal Processing

A New Approach to Automatic Generation of Tile Mosaic Images for Data Hiding Applications

Block-based Watermarking Using Random Position Key

Reversible Watermarking: A Complete Review

Hierarchical Image Authentication Based on Reversible Data Hiding

A Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence

Comparison of wavelet based watermarking techniques Using SVD

A Video Watermarking Algorithm Based on the Human Visual System Properties

IN DIGITAL watermarking or steganography, a hardly noticeable

A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique

Jeff Hinson CS525, Spring 2010

Application of Data Hiding in Audio-Video Using Advance Algorithm

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

High Capacity Data Hiding Scheme for DCT-based Images

Difference Expansion Reversible Image Watermarking Schemes Using Integer Wavelet Transform Based Approach

Digital Watermarking on Micro Image using Reversible Optical Reproduction

Multimedia Security: So What s the Big Deal?

An Efficient Information Hiding Scheme with High Compression Rate

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Analysis of Reversible Data Hiding Technique In Encrypted Domain

Digital Image Steganography Using Bit Flipping

STEREOSCOPIC vision has an extensive range of applications, Reversible Watermarking on Stereo Image Sequences. John N. Ellinas

A Novel Reversible Digital Watermark Based on 2D Difference Histogram Pair Mapping

Hiding Depth Map in JPEG Image and MPEG-2 Video

Wavelet-based reversible watermarking for authentication

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

Reversible Authentication Watermark for Image

Reversible Steganographic Technique Based on IWT for Enhanced Security

2013, IJARCSSE All Rights Reserved Page 1637

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

A Novel Reversible Data Hiding Technique Based on Pixel Prediction and Histogram Shifting

Mr Mohan A Chimanna 1, Prof.S.R.Khot 2

QR-Code Image Steganography

Robust Hash Functions for Digital Watermarking

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Transcription:

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007), INDIA sss222shaik@gmail.com, suravarapuls@yahoo.co.in Abstract Digitalizationhasimplemented in all security based applications ranging from home based security to data hiding. Although tremendous progress has been made in past years but still achieving lossless data hiding without any loss of information is concerned area. An optimized lossless data hiding algorithm based on histogram modification technique is proposed in this paper for authentication and the proposed algorithm handles the embedding distortion in effective way. Embedding distortion removal from image is unresolved issue in data hiding and it is handled in efficient manner in this work by taking pixel differences (underflow and overflow) into consideration. Underflow and overflowis prevented by histogram shifting technique and experimental results shows better performance overconventional state-of-art methods. Keywords:Lossless data hiding, image authentication,self-authentication, fragile watermarks 1. INTRODUCTION The techonology gradually changes from analog to digital. Digital technology makes the multimedia data (image, video, and text) storage, replication, and communication become very convenient. Therefore, how to implement effective copyright protection and information security measures in the network environment has become an urgent realistic problem. Data hiding (also called information hiding) plays an important role in multimedia security. The main purpose is to conceal messages in the original medium to protect intellectual property rights, to share secret message, or for content authentication. Nevertheless, the original medium will be permanently altered and cannot be completely reconstructed after the secret message is extracted if the recovering information is not provided. In some applications, such as medical imaging, remote sensing, and military imaging, a slight distortion is not allowed. Therefore, reversible data hiding techniques have become an important research topic in recent years. To increase hiding ability, in this paper an efficient extension of the histogram modification technique by considering the pixel difference instead of simple pixel value is proposed along with the histogram shifting technique to prevent problems that are raised about overflow and underflow. As a result, characteristics of the pixel difference enable the proposed algorithm to obtain the higher peak point to embed a large amount of message. 2. OVER/UNDERFLOW PROBLEM

In some cases, the pixel values in a block are very close to the ends of histogram, such as 0 or 255 in the 8-bit case. The modification of the pixel values may lead to over/underflow problem, which means the modified pixel values are beyond the range of [0,255]. Instead of using modulo 256 addition, we propose a new technique to solve this issue. That is, if the pixel values only fall into one side of the histogram, we may shift the pixel value towards the other side to avoid the over/underflow problem. In the worst case, if there are some pixel values with the block, which are close to the both sides, respectively we do nothing to the block, which means we actually embed bit 0 to that block no matter the actual bit to be embedded is 1 or 0. The introduced error bit will be corrected by using ECC. 3. RELATED WORK An innovative approach for hiding data the data in digital images for providing robust copy right protection is presented by authors W. L. Lin and W. H. Tsai (1) in the year 2004. The introduction of the boundary stream related to the data embedded is an idea in this approach and this boundary stream related to data are later embedded into mosaic image by detecting the respective boundary regions of preselected mosaic image in the Steganography application. The copyright protection has been consistent concerned area in field of digital image processing and the respective method in this method helps to protect copyright protection by inserting the meaningful mosaic images into the paper copies. But this method fails when the attacks are done beyond limits. The generation of the mosaic images for protecting the copyright by using square shape tiles are introduced by S. C. Hung, T. Y. Liu and W. H. Tsai (2)in the year 2005. The main motto of this work is creating mosaic images to embed more data but the square shape data is not always done in all applications. The mosaic image generation in other shapes can increase embedded capacity in watermarking application. In this work the tiles used are not overlap with each others as occurs in conventional and the tiles orientation are always deterministic. The rotation and movement of tiles especially in the edges can pose problems of attacks. The work proposed in this method are tends for invisible watermarking which is used to providing robust copyright protection. This work leaves the future scope for creation of meaningful images in other shapes rather than square to increase the embedding capacity. An high equipped fast processed watermarking scheme based on Reversible contrast mapping has been implanted in the year 2007 by DinuColtuc and Jean-Marc Chassery (4)to resolve two important issues which commonly faced in the past works namely resolving the high complexity issue by resulting low complexity in the results and simultaneously a new to provide robustness against all unnecessary cropping by creating the look up table. 4. PROPOSED METHODOLOGY The image histogram modification is very important concern while adding some data to image but two images having equal histogram then these techniques can t work well. So to overcome this type of problems we are implemented a new algorithm

known as an efficient extension of histogram Modification in which we are going to consider the pixel value differences instead of going for one by one pixel values. As we know the gray images having high correlation as well as spatial redundancy, are having the distribution of pixel differences are very high. The value of these differences is expected to zero, so the number of candidates are very high. By using this algorithm we can say that the data is hided in difference between the pixels. So these all the simulation results also show that the proposed algorithm works well. Our proposed algorithm is outlined as below for the lossless data hiding algorithm. A. Embedding Procedure For embedding process the basic requirments Grayscale image,message,histogram modification, Inverse- s-order 2. From pixel difference we get a peak point P Inverse S-order for grayscale image can be shown in below figure Scan order: inverse s-order 3. Apply inverse S-order for total image using peak point P value d < P by shifting x pixel values with 3 units. x, ifi = 0 ord < P y = x + 3, ifd > Pandx x x 3, ifd > Pandx < x y is the marked image value of pixel i. Let us consider a gray scale host image with N- pixels havingx pixel values it denotes grayscale value of i pixel 0 i N 1x [0,255](range of pixel 0 (min) to 255 (max) value). And have to embed M message in gray scale host image by using inverse S-order method. 1. Inverse S-order method can be applied on grayscale host image to embed the M message. Here the pixel value of host image can be inter changed and d difference between pixels x andx can be calculated as given below x d =, ifi = 0, x x, otherwise 4. Whend = P, x can be changed according to the message y = x + M, ifd = Pandx x x M, ifd = Px < x From the above process data hiding processes is completed by using one peak point. For large data process we need to repeat the embedding process. B. Extraction procedure Requirements: Grayscale image, Inverse S-order,,Message,, To Extract the embedding message from the marked image. The reverse process of the embedding

processing is done. Inverse S-order is applied to calculate the pixel difference between the pixels x, i.e; varies from 0 to 255.To recover the marked message loselesssly from the host image, we need to consider the grayscale value of the ith pixel in the image as y, 0 i N 1, y [0, 255]. The following are the steps to recover the marked message from an image as shown: 1) Scan the marked image in the same order and position as done is the embedding process 2) Set x = y, it indicates that recovering the marked message (x ) from the embedded image (y ) 3) Extract message M by the following conditions 0, if y x = P, 1, if y M = x = P + 1, 2, if y x = P + 2, 3, if y x = P + 3, wherex denotes the restored value of y. 4) Restore the original value of host pixel x by 5) Go to step 3 continuously until the embedded message is completely extracted. As a result, the exact copy of the original host image will be obtained. 155 156 155 158 159 158 156 157 160 158 158 160 155 157 156 159 Host image 155 156 153 161 162 161 155 154 162 155 158 163 152 157 153 158 Marked image x y + ( y x P), ifp < y x P + 3 andy < x, y ( y x P), ifp < y x P + 3 andy > x, = y + 3, if y x > P + 3 andy < x, y 3, if y x > P + 3 andy < x, y, otherwise. Fig.4.1: An example of the proposed lossless data hiding 5. APPLICATIONS Message to be embedded (a) Covert communication (b) Copyright protection of images (authentication) (c) Fingerprinting (traitor-tracing)

(d) Adding captions to images, additional information, such as subtitles, to videos (e) Image integrity protection (fraud detection) (f) Copy control in DVD (g) Intelligent browsers, automatic copyright information, viewing movies in given rated version 6. SIMULATION RESULTS amount of information in image is concerned area in digital image processing. In proposed methodology, Laplacian distributed is used in proposed method to hide more payload than traditional methods which help to increase the data hiding capacity at invertible distortion and this process adaptively modify according to compressed image formats in effective way. Two operations namely embedding and extraction are carried out to support different domains to achieve good authentication REFERENCES Fig 5.1: Original and marked images [1] J. Fridrich, M. Goljan, and R. Du, Invertible authentication, Proceedings of the SPIE, Security and Watermarking of Multimedia Contents III, vol. 3971, San Jose, California, Jan. 2001, pp. 197-208. [2] W. L. Lin and W. H. Tsai, Data Hiding in Image Mosaics by Visible Boundary Regions and Its Copyright Protection Application against Print- AndScan Attacks, Proceedings of International Computer Symposium 2004, Taipei, Taiwan, Dec. 15-17, 2004. [3]DinuColtuc and Jean-Marc Chassery Very fast watermarking by reversible contrast mapping.ieee signal process.lett.14 (4):255-258(2007). Fig 5.2: Histogram of the above images 6. CONCLUSION Pixel difference between adjacent pixels is implemented in this paper for histogram modification technique to attain simple pixel value. Hiding large [4] M. Van der Veen, F. Bruekers, A. Van Leest, and S. Cavin, High capacity reversible watermarking for audio, Proceedings of the SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020, Santa Clara CA, Jan. 2003, pp. 1-11. [5] D. Rui and J. Fridrich, Lossless authentication of MPEG-2 video, Proceedings of IEEE International

Conference on Image Processing, vol. 2, Rochester, NY, 2002, pp. 893-896. [6] C. C. Chang, W. L. Tai, and C. C. Lin, A reversible data hiding scheme based on side match vector quantization, IEEE Transactions on Circuits 510 510 510 and Systems for Video Technology, vol. 16, no. 10, pp. 1301-1308, Oct. 2006. [7] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, Mar. 2006.