An Effective Multiple-Bit Data Abstraction and Lossless Retrieval Without Shifting
An Effective Multiple-Bit Data Abstraction and Lossless Retrieval Without Shifting
II. PROPOSED ARCHITECTURE The next three bits and two bits denote the offset andflag
bits respectively. If the flag bits F(i, 2j) = 11 and the offset Q(i,
The proposed scheme consists of two algorithms, namely:- 2j) = T, then no secret can be stored and the first three bits are
Embedding algorithm Retrieval Algorithm occupied by another offset Q1(i, 2j) , which is calculated as
shown in the following equation.
A. Embedding Algorithm
The embedding algorithm makes use of correlation of Fig 1.2 Binary format of new pixel value when F=11 and
three horizontally pixels at a time, to conceal multiple bits. Offset = 2n – 1
Considering a grayscale image, I with width w and height h
pixels, the possible values for each pixel in theimage would lie Finally, the new pixel value is calculated by: -
between 0 to 255. For i ∈ [1, h] and j ∈[1, ⌊w/2⌋], the difference 7
d for any pixel p(i,2j) isgiven by : - 𝑝′(𝑖,2𝑗) = Σ𝑎𝑖×2𝑖
𝑖=0
For a threshold T, the embeddability e (i, j) is determined
asper the following equation: -
B. Retrieval Algorithm
If e(i, 2j) is 1, then the point is classified as an embeddable Now, for the received stego image I and for a threshold T,
point (EP). If e(i,2j) is 0, then the point is a non-embeddable the reverse process of the embedding algorithm can be
point (NEP). A NEP cannot be used to embed any secret, as performed to extract the secret bits and the carrier image I′,
there is very correlation between three adjacent pixels. where that p(i,2j) is a stego pixel in I and p′(i, 2j) is the
corresponding pixel in retrieved image I′.
Then the EMAX (i, 2j) and EMIN (i, 2j) of p(i,2j), which
denotes the local maximum and minimum respectively, is given III. RELATED WORK
by the following equations: -
Reversible Data Hiding is a prevalent task in Image
Hence, it’s local offset OS(i, 2j) is calculated by: - Steganography. There are various Image Steganography
methodologies that are prevalent to achieve Reversible Data
Now, a new value p’ (i, 2j) consisting of secret to be Hiding (RDH).
embedded, offset bits and flag bits is calculated. The newvalue is
constructed in binary format as shown in Figure 1.1. The EP One of the most popular techniques for RDH is Difference
p(i,2j) is then replaced by the calculated value. It’s two flag bits, Expansion (DE), which is simple to implement. In one such
denoted by F(i,2j) can be calculated by: - scheme, an image is split into multiple blocks of pixels, eachof
size 2 × 2, and each block is converted into a vector by
Also, T must hold the following condition: - Where n is calculating the difference between the pixel values.
the length of offset (in bits) in p’(i,2j).
A set of equations, depending on the algorithm, is used to
The offset Q(i,2j) can be calculated as per the following: manipulate the pixel values. Another set of equations, which are
an inverse of the former set, is used to retrieve the secret and
Where Dec2Bin() is a procedure that converts a decimal old pixel value. However, in this method, the location map
number to its binary equivalent. Depending on the flag, local becomes significantly high.
offset bits, local maximum and minimum, p’(i, 2j) can be
calculated as per the following figure: - A. Merits:
Fig 1.1 Binary format of new pixel value One more technique that is commonly used is Histogram
Shifting (HS). In this technique, two types of pixel values,
If F = 00, 01 or 10 then the first three bits denote the secret, namely zero point and peak point arefound. Zero point is the
the middle three bits denotethe offset Q(i,2j) which is calculated pixel value which appears theminimum number of times in
using Eq.19 , and the last two bits denote the flag bits F(i,2j), the image, and Peak Point is the value, which appears
which is calculated by Eq. 17. maximum in the image. Then, a pixel with zero-point value
and a pixel with peak value is taken together to hide the
If the flag bits F(i,2j) = 11 and the offset Q(i,2j) is not T, secret.
then three secret bits can be embedded as three most significant The value of pixels in between the pair is increased by 1
bits of p’(i,2j). unit. In other words, the values of pixels between the zero
and peak points in the histogram are shifted by 1 unit.
However, in this method, the embedding capacity varies
greatly as it depends on the number of peak and zero points,
Integration with third-party APIs enriches the system with real-time data and services, including travel booking.
VI. RESULTS
Fig 7: 1PSNRvs.Payloadplot
FUTURE WORKS
REFERENCES