5. 2016
5. 2016
Alejandro A. Valenzuela
EMT department
BRS university of Applied Sciences
Sankt Augustin, Germany
[email protected]
131
images are separated to three layers at the transmitter part: B. The Receiver Part
red, green and blue. Then a two level DWT is applied to The receiver cannot extract the secret information
each layer of the cover image and three chaotic systems without knowing the secret keys that have been used in the
generated: ch1, ch2 and ch3. Each layer of the secret image embedding process (ch1, ch2 and ch3). By applying a two
is scrambled or encrypted using ch3 and a one level DWT is level DWT to the stego image, the secret image is extracted
applied to each scrambled layer after the scrambling process. from the coefficients of the stego image using replicas of
The embedding process is done using ch1 and ch2. Channel ch1 and ch2 that were used at the transmitter side. The
ch1 will select the suitable coefficients in the cover image resulting scrambled or encrypted image will be decrypted
for the embedding process and ch2 will select the suitable using the replica of ch3. The secret image is then
bits in the selected coefficients and replace them with the successfully extracted by the inverse processes that have
coefficients of the secret image. Each layer of the secret been used for embedding the secret image. The flow chart of
image is embedded in the corresponding layer of the cover the proposed system at the receiver side is shown in Fig. 5.
image. The preparation of the cover and the secret image are
shown in Figs. 2 and 3 respectively. After the embedding
process is successfully completed and all coefficients of the
secret image are embedded in the coefficients of the cover
image, an Inverse Discrete Wavelet Transform (IDWT) is
applied to each layer of the cover image: red, green and blue.
The final step is concatenating the three layers to obtain the
stego image as shown in Fig. 4. The stego image is very
similar to the cover image.
(a) (b)
Figure 2. (a) Cover image, (b) 2-level DWT of the cover image.
Figure 3. (a) Secret image, (b) Scrambled image, (c) 1-level DWT of the
scrambled image.
(a) (b)
Figure 1. The flow chart of the proposed system at the transmitter side. Figure 4. (a) Cover image, (b) Stego image.
132
for the two secret images Baboon and Airplane with different
sizes. The results are given in Tables I and II for the cover
image Girl and the secret image Airplane. The results are
given in terms of embedding capacity and the objective tests:
MSE, PSNR, Correlation (Cor.) and SNR for the stego
image and for the extracted secret image. Tables III and IV
show the summary of the results obtained in the four study
cases considered for the stego images and for the extracted
secret images respectively.
TABLE I. CH1, CH2 AND CH3 ARE LOGISTIC MAPS
Dimension of the
32*32 64*64 128*128 256*256
secret image
Capacity
0.39 1.56 6.25 25
(%)
Stego image
MSE 0.0010 0.0023 0.0047 0.0126
PSNR (dB) 78.0102 74.5157 71.4048 67.1275
Cor. 0.9999 0.9999 0.9999 0.9998
SNR (dB) 67.0920 63.5976 60.4866 56.2093
MSE 0.2148 0.2135 0.2167 0.2171
secret image
Extracted PSNR (dB) 54.8096 54.8360 54.7727 54.7632
Cor. 1 1 1 1
SNR (dB) 52.0331 52.0988 52.0622 52.0673
TABLE II. CH1 IS LOGISTIC MAP, CH2 IS HENNON MAP AND CH3 IS
ARNOD CAT MAP.
Dimension of the
32*32 64*64 128*128 256*256
secret image
Capacity
(%) 0.39 1.56 6.25 25
Stego image
(MSE), which represents the difference between the cover PSNR (dB) 58.8553 58.8303 58.7267 58.7598
image
133
TABLE III. SUMMARY OF RESULTS OBTAINED IN THE FOUR STUDY method, as compared with ref. [4], which has the maximum
CASES CONSIDERED FOR THE STEGO IMAGES: LENA AND GIRL PSNR, is 8.2dB. Furthermore, the extracted secret image of
the proposed system is compared with the extracted secret
image of the references [7] and [8]. The results of the
comparison are given in Table VII. As from this table, the
extracted secret image using the proposed system provides
better results than other existing methods. The gains
obtained in PSNR by the proposed method, as compared
with ref. [7], which has the maximum PSNR, is 32.4dB.
TABLE VI. COMPARISION BETWEEN THE PROPOSED METHOD AND
OTHER EXISTING METHODS WITHOUT ATTACK
Ref. [3] Ref. Ref. [6] Ref. [7] Ref. [8] Proposed
[4] method
PSNR 47.3158 58.94 30.8231 42.7789 49.5629 67.1338
(dB)
TABLE IV. SUMMARY OF RESULTS OBTAINED IN THE FOUR STUDY TABLE VII. COMPARISION BETWEEN THE EXTRACTED SECRET IMAGE
CASES CONSIDERED FOR THE STEGO IMAGES: BABOON AND AIRPLANE AIRPLANE IN THE PROPOSED METHOD AND OTHER METHODS WITHOUT
ATTACK
Ref. [7] Ref. [8] Proposed method
PSNR(dB) 26.3730 12.0818 58.7598
Ref. [7] Ref. [8] Proposed method
PSNR(dB) 26.3730 12.0818 58.7598
B. With Attack
Table VIII compares the stego image Girl of the
proposed method with the methods in reference [12] with
attacks. Table IX compares the extracted secret image
Airplane of the proposed method with the method in
TABLE V. THE RESULTS OF ATTACKS ON THE STEGO IMAGE GIRL reference [13] with attacks. As shown from Table VIII, the
AND THE EXTRACTED SECRET IMAGE AIRPLANE
proposed system is robust against filtering attacks, salt and
pepper noise attack, when compared with other existing
methods. The gains obtained in PSNR and correlation by the
proposed method, as compared with ref. [12], for salt and
pepper noise attack are 12.3dB and 0.0653 respectively. For
median filter attack, the gains obtained and compared with
the same reference are 11.3dB and 0.0447 respectively. For
low pass filter attacks, the gains obtained and compared with
the same reference are 9.9dB and 0.0635 respectively.
TABLE VIII. COMPARISION BETWEEN THE STEGO IMAGE GIRL IN THE
PROPOSED METHOD AND OTHER METHODS WITH ATTACKS
Ref. [12] Proposed method
Attack type PSNR PSNR
Cor. Cor.
(dB) (dB)
Salt and pepper
noise 22.1052 0.9284 34.3944 0.9937
Strength (0.1)
Median filter (3*3) 31.0038 0.9543 42.3437 0.9990
VII. PERFORMANCE EVALUATION Low pass filter (3*3) 28.1968 0.9338 38.0473 0.9973
In order to evaluate the performance of the proposed Wiener filter (3*3) 34.2973 0.9716 36.3780 0.9960
system, its results are compared with the some existing
methods in the literature as follows:
TABLE IX. COMPARISION BETWEEN THE EXTRACTED SECRET IMAGE
AIRPLANE IN THE PROPOSED METHOD AND OTHER METHODS WITH
A. Without Attack ATTACK
In the without attack case, the performance of the
Attack type Ref. [13] Proposed method
proposed system is compared with the methods in
references [3, 4, 6-8]. In this comparison, the secret image PSNR(dB) PSNR(dB)
Salt and pepper noise 11.325 12.2045
Airplane of size 256x256 pixels from Table II is used and Strength (0.1)
the results depicted in Table VI. This table shows that the
proposed method gives better results than other existing Speckle noise 11.517 12.4209
Strength (0.01)
methods. The gain obtained in PSNR by the proposed
134
Finally, for Wiener filter attacks, the gains obtained and Science and Technology, Vol.2, No.10, November 2010, pp.5985-
compared with the same reference are 2.1dB and 0.0244 5992.
respectively. [3] S. Atawneh, P. Sumari, "Hybrid and blind steganographic method for
digital images based on DWT and chaotic map," Journal of
Communications, Vol.8, No.11, November 2013, pp.690-699.
VIII. CONCLUSIONS
[4] D. Bandyopadhyay, K. Dasgupta, J. Mandal and P. Dutta, "A Novel
In this paper, an efficient, robust and secure approach for secure image steganography method based on chaos theory in spatial
image steganography using DWT and chaotic systems has domain," International Journal of Security, Privacy and Trust
been proposed. Both cover and secret images are Management, Vol.3, No.1, February 2014, pp.11-22.
decomposed using DWT to increase the invisibility of the [5] L. Jia, S. Shin and K. Yoo, "A reversible data hiding scheme using
proposed system. High security is achieved by using chaotic inverse embedding methods in double-embedding strategies," IEEE
International Conference on Informatics and Systems (INFOS 2010).
systems such that without knowing the three keys: chaotic
[6] M. Boora and M. Gambhir, "Binary text-image steganography,"
system1, chaotic system2 and chaotic system3, it is difficult International Journal on Recent Technology and Engineering, Vol.2,
to the attacker to break the proposed system. Even if he No.5, November 2013, pp.126-131.
knows that there is a hidden message, and he manages to [7] Z. Abdulhameed and M. Mahmood, "Steganography based on chaos
extract it, he will get the encrypted or scrambled image not and contourlet transform for hiding multimedia data," International
the original secret image. Tables I and II show that the Journal of Electronics and Communication Engineering &
proposed system has good performance for both stego and Technology, Vol.5, No.1, January 2014, pp.26-42.
extracted secret images in terms of MSE, PSNR, correlation, [8] P. Manju and H. Rohil, "Optimized image steganography using
discrete wavelet transform," International Journal of Recent
SNR and high embedding capacity which reaches up to one Development in Engineering and Technology, Vol.2, No.2, February
quarter of the size of the cover image (256x256) without 2014, pp.75-81.
any distortion to the stego image. As compared with other [9] A. Mummert, S. Sara and J. Silver, "Numerical calculation of
methods, the proposed method achieves gains without any Lyapunov exponents for three-dimensional systems of ordinary
attack of 8.2dB for the stego image and 32.4dB for the differential equations," M.Sc. Thesis, The Graduate College of
extracted secret image in PSNR when the secret image is Marshall University, 2011.
Airplane with 256x256 pixels and the cover image is Girl [10] P. Addison, Fractals and chaos. Institute of Physics Publishing, Dirac
House, Temple Back, Bristol, UK, 1997.
with 512x512 pixels. By comparing the proposed approach
with other existing approaches, the analysis is accomplished [11] M. Alwa, T. El-Tobely, M. Fahmy, M. Nasr and M. Abd El-Aziz,
"Fidelity and robust digital watermarking adaptivity pixel based on
and it can be concluded in terms of PSNR, correlation for medial pyramid of embedding error gray scale images," International
both stego image and extracted secret image with and Journal of Computer Science and Network Security, Vol.10, No.6,
without attacks, that the proposed approach is superior to June 2010, pp.284-314.
other existing approaches. [12] Z. Ruimei, W. Mei, H. Boning and L. Hua, "Digital image
watermarking based on wavelet transform," Proceedings of third
REFERENCES IEEE International Symposium on Intelligent Information
Technology Applications, 2009, pp.437-440.
[1] S. Thakar and M. Aggarwal, "A review –steganography,
"International Journal of Advanced Research in Computer Science [13] A. Verma, A. Nolkha, A. Singh and G. Jaiswal, "Implementation of
and Software Engineering, Vol.3, No.12, December 2013, pp.528-532. image steganography using 2-level DWT technique," International
Journal of Computer Science and Business Informatics, Vol.1, No.1,
[2] J. Ashok, Y. Raju, S. Munishankaralah and K. Srinivas, May 2013, pp.1-14.
"Steganography: An overview," International Journal of Engineering
135