SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -180
Resourceful and protected Biometric Image Stenography
using Discrete Wavelet Transform
PATIL S.T M.E. (Communication), Dr. Patil A.J (PRINCIPAL) Prof.Patil C.S
North Maharashtra University Department of E&TC H.O.D E&TC
SGD College of Engineering Jalgaon SGD College of Engineering, Jalgaon SGD College of Engineering, Jalgaon
Abstract— Steganography is the science of concealing the existence of data in another transmission intermediate It
does not return cryptography but rather boosts the security using its gloom features. As proposed method is Biometric
Steganography, here the Biometric feature used to implement Steganography is Skin tone region of images. Proposed
method introduces a new method of embedding covert data within the skin portion of the image of a person, as it is
not that much receptive to HVS (Human Visual System). in its place of embedding secret data anywhere in image, it
will be embedded in only skin tone region. This skin region provide superb secure location for data hiding. So, firstly
skin detection is performed in cover images and then Secret data embedding will be performed in DWT domain as
DWT gives better performance than DCT while compression. This biometric method of Steganography enhances
robustness than existing methods.
Keywords—Biometrics, Matlab, Skin Tone Detection, IDWT, Cropping PSNR, RGB Panel, MSE
I. INTRODUCTION
Steganography differ from cryptography in the sense that where cryptography focuses on keeping the contents of a
message secret, steganography focuses on keeping the life of a message secret . Steganography and cryptography are
both ways to protect information from unwanted parties but neither technology alone is perfect and can be compromised.
Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly overcome.
The strength of stenography can thus be amplified by combining it with cryptography. Two other technologies that are
closely related to steganography are watermarking and fingerprinting. The kind of information hidden in objects when
using watermarking is usually a signature to signify origin or ownership for the purpose of copyright protection. With
fingerprinting on the other hand, different, unique marks are embedded in distinct copies of the carrier object that are
supplied to different customers. This enables the logical property owner to identify customers who break their licensing
agreement by supplying the property to third party In steganography secret data is the data that the sender wishes to send
to the receiver. It can be audio, video, image, text file, or other data. They is represented as the stream of bits. This secret
data is hidden on the medium or cover or host. Medium of communication is also the image. In this paper secret data is
restricted to digital images. Cover image with secret data embedded is called Stego-Image.
II. LITERATURE SURVEY
Instead of embedding data anywhere in the image secret data is needed to be embedded in the skin region of the image.
For that input image is converted into an appropriate color space [1].Mainly two kinds of color spaces are suitable for
biometric operations. HSV (Hue, Saturation and Value) and YCbCr (Yellow, Chromatic Blue, Chromatic red) spaces.
For the skin color tone detection [7] a skin detector and a skin classifier was there. Skin detector converts the cover
image of RGB color space into appropriate color space. Skin classifier will classify pixels in the cover image to skin and
non skin pixels by defining a boundary. The skin detection algorithm produces a mask, which is simply a black and white
image. The black pixel values are 0 (false) and the white pixel values are 1 (true). For this paper HSV color space is
choose. For that first, the image in RGB was converted to HSV color space, because it is more related to human color
perception. Hue-saturation based color spaces were introduced when there was a need for the user to specify color
properties numerically. In HSV, responsible vales for skin detection are Hue & Saturation so extract the Hue and
Saturation dimensions into separate new variables (H & S). For skin detection threshold should be chosen as [H1, S1] &
[H2, S2]. A pixel is classified as skin pixel if the values [H, S] fall within the threshold. Threshold is predefined range
associated with the target skin pixel values. Most of the researchers determined threshold as h_range = [0, 0.11] and
s_range = [0.2, 0.7].
Fig gives overview of stenographic system with the basic steps involved .This section describes different techniques with
its types, advantages and disadvantages to give clear idea about specific techniques which have been selected for
proposed stenographic system like selection of cropping part from whole image ,selection of which wavelet
transform ,techniques for feature extraction etc. Steganography is the art and science of writing hidden messages in such
a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security
through obscurity.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -181
The word steganographyis of Greek origin and means "concealed writing "from the Greek words steganos (στεγανός)
meaning “covered or protected", and graphei (γραφή) meaning “writing". The first recorded use of the term was in
1499by Johannes Trithemius in his Steganographia, a treatiseon cryptography and steganography disguised as a bookon
magic.
Generally, messages will appear to be something else: images, articles, shopping lists, or some othercover text and,
classically, the hidden message may be ininvisible ink between the visible lines of a private letter.The advantage of
steganography over cryptography aloneis that messages do not attract attention to themselves
III BLOCK DIAGRAM
Fig. skin tone detection
.Plainly visible encrypted messages—no matter how unbreakable will arouse suspicion, and may in themselves be
incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a
message, steganography can be said to protect both messages and communicating parties. can extract message without
having value of cropped region. In one of the high frequency sub band of DWT of the cover image To enhance the high
security feature secret images are dispersed within each band using a pseudorandom sequence and a session key. This
combined approach of using skin pixels and spread spectrum for embedding the secret images provides a high degree of
security. The stego image generated is of acceptable level of imperceptibility and distortion compared to the cover image.
Steganography is a way that no one apart from the intended recipient knows of the existence of the message; this is in
contrast to Cryptography, where the existence of the message itself is not disguised, but the meaning is
obscured."Steganography" is a Greek word and means ‘covered or hidden writing’. Its origins can be traced back to440
BC. Steganography has been widely used in historical times, especially before crypto graphical systems were developed.
Examples of historical usage include: Hidden messages in Wax tablets: In ancient Greece, people wrote messages on the
wood, and then covered it with wax so that it looked like an ordinary, unused, tablet. Hidden messages on messenger's
body: Also in ancient Greece. Herodotus tells the story of a message tattooed one slave's shaved head, covered by hair re
growth, and exposed by resaving. The message, if the story is true, carried a warning to Greece about Persian invasion
plans. Hidden messages on paper written in secure inks under other messages or on the blank parts of other
messages .During and after World War II, Espionage agents used microdots to send information back and forth. Since the
dots were typically extremely small -- the size of a period produced by a Typewriter (perhaps in a font with 10 or
12characters per inch) or even smaller --the stego text was whatever the dot was hidden within. If a letter or an address, it
was some alphabetic characters. If under postage Stamp, it was the presence of the stamp. The one-time pad is a
theoretically unbreakable cipher that produces cipher texts in distinguishable from random texts: only those who have the
private key can distinguish these cipher texts from any Other perfectly random texts. Thus, any perfectly random data can
be used as a cover text for a theoretically unbreakable steganography.
IV. RESULTS
Image Type Image Resolution DWT levels (Haar Transform)
After resizing(256x256)
2.jpg 320x400 LL =65x65
LL1=33x33
LL2=17x17
Image Type Image Resolution DWT levels MSE PSNR
2.jpg 320x400
(after resizing 256x256)
DWT1 (Haar) 0.0053 70.39
DWT1db 0.0041 71.53
DWT1db5 0.0041 71.98
DWT1db7 0.0043 71.83
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -182
V. CONCLUSION & FUTURE SCOPE
Digital Steganography is a fascinating scientific area which falls under the umbrella of security systems. In this
paper biometric steganography is presented that uses skin region of images in DWT domain for embedding secret data.
By embedding data in only certain region (here skin region) and not in whole image security is enhanced. Also image
cropping concept introduced, maintains security at respectable level since no one can extract message without having
value of cropped region. Features obtained from DWT coefficients are utilized for secret data embedding. This also
increases the quality of stego because secret messages are embedded in high frequency sub-bands which human eyes are
less sensitive to. According to simulation results, proposed approach provides fine image quality.
According to results I have concluded that for DWT level1 with Haar transform gives better extraction results
compare to daubeshian wavelets which decrasws certain amount of extraction coefficients’ which affects extracted logo
image. As well as optimized level of daubeshian is db5 after trail and error because for db7 psnr value will change.
REFERENCES
[1] Simon ClippingdaleMahitoFujii “Skin Region Extraction andPerson- independent” NHK (Japan Broadcasting
Corporation),Science & Technology Research Labs IEEE 2011.
[2] Anjali A. Shejul Prof. U.L Kulkarni “A DWT baseApproachfor Steganography Using Biometrics” International
Conferenceon Data Storages &Data engg,IEEE 2010.
[3] Johnson, N. F. and Jajodia, S.: Exploring Steganography:Seeing the Unseen. IEEE Computer, 31 (2): 26-34, Feb
1998.
[4] Johnson, N. F. and Jajodia, S.: “Exploring Steganography: Seeing the Unseen.” IEEE Computer, 31 (2): 26-34,
Feb 1998.
[5] Fridrich, J., Goljan, M. and Du, R.., (2001). “Reliable Detection of LSB Steganography in Grayscale and Color
Images.” Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada,
October 5, 2001, pp. 27- 30.
[6] Po-Yueh Chen and Hung-Ju Lin “A DWT Based Approach for Image Steganography”, International Journal of
Applied Science and Engineering, 2006. 4, 3: 275-290.

More Related Content

PDF
Hi3612991303
PDF
D010312230
PDF
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
PDF
Image Steganography V2 i11 0143
PDF
Image Steganography Techniques
PDF
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
PDF
A Novel Steganography Technique that Embeds Security along with Compression
PDF
Iaetsd design of image steganography using haar dwt
Hi3612991303
D010312230
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
Image Steganography V2 i11 0143
Image Steganography Techniques
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
A Novel Steganography Technique that Embeds Security along with Compression
Iaetsd design of image steganography using haar dwt

What's hot (18)

PDF
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
PDF
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
PDF
Securing Web Communication Using Three Layer Image Shielding
PDF
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
PDF
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
DOCX
Steganography using visual cryptography: Report
PDF
akashreport
PDF
A0 ad276c eacf-6f38-e32efa1adf1e36cc
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PPTX
DWT based approach for steganography using biometrics
PDF
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PPTX
Skin tone based steganography
PDF
Data Hiding and Retrieval using Visual Cryptography
PDF
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
PDF
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
PDF
Fz2510901096
PDF
Advanced image processing notes ankita_dubey
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...
Securing Web Communication Using Three Layer Image Shielding
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
Steganography using visual cryptography: Report
akashreport
A0 ad276c eacf-6f38-e32efa1adf1e36cc
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
DWT based approach for steganography using biometrics
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Welcome to International Journal of Engineering Research and Development (IJERD)
Skin tone based steganography
Data Hiding and Retrieval using Visual Cryptography
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
Fz2510901096
Advanced image processing notes ankita_dubey
Ad

Viewers also liked (20)

PPT
Biometric steganography
PPTX
Biometrics verification techniques combine
PDF
Zahid Akhtar - Ph.D. Defense Slides
DOCX
Final report
PDF
Thesis presentation
PPTX
Multi modal biometric system
PPTX
Chapter1 2
PPT
A secure Crypto-biometric verification protocol
PPTX
Paper multi-modal biometric system using fingerprint , face and speech
PPT
Digital watermarking
PPT
Digital Watermarking
PPTX
digital watermarking
PPTX
Digitalwatermarking
PPT
Digital Watermarking
PPTX
Digital watermarking
PPT
Bio-metrics Technology
PDF
المراجعة النهائية لنصف العام للصف السادس الإبتدائي 2016
PDF
Tower verticality for Tall Building using DGPS
PPTX
Ict (mystery words) latest 1 copy - copy
PPTX
Sec b group 9_polarizing brands
Biometric steganography
Biometrics verification techniques combine
Zahid Akhtar - Ph.D. Defense Slides
Final report
Thesis presentation
Multi modal biometric system
Chapter1 2
A secure Crypto-biometric verification protocol
Paper multi-modal biometric system using fingerprint , face and speech
Digital watermarking
Digital Watermarking
digital watermarking
Digitalwatermarking
Digital Watermarking
Digital watermarking
Bio-metrics Technology
المراجعة النهائية لنصف العام للصف السادس الإبتدائي 2016
Tower verticality for Tall Building using DGPS
Ict (mystery words) latest 1 copy - copy
Sec b group 9_polarizing brands
Ad

Similar to Resourceful and protected Biometric Image Stenography using Discrete Wavelet Transform (20)

PDF
Implementation of Image Steganography in Image by using FMM nested with LSB S...
PDF
Implementation of Steganographic Techniques and its Detection.
PDF
Ijetr011937
PDF
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
PDF
Dual Steganography for Hiding Video in Video
PDF
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
PDF
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DOCX
Steganography
PDF
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
PDF
A Tutorial Review On Steganography
PDF
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
PDF
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
PDF
A Survey of Image Steganography
PDF
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
PDF
A Survey Paper On Different Steganography Technique
PDF
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
PDF
IRJET- Image Processing using Steganography
PDF
Data security using stegnography and quantum cryptography
PDF
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
PPTX
Visual Cryptography part 1-1.pptx.pptx
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Steganographic Techniques and its Detection.
Ijetr011937
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Dual Steganography for Hiding Video in Video
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
Steganography
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
A Tutorial Review On Steganography
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A Survey of Image Steganography
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
A Survey Paper On Different Steganography Technique
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
IRJET- Image Processing using Steganography
Data security using stegnography and quantum cryptography
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
Visual Cryptography part 1-1.pptx.pptx

More from AM Publications (20)

PDF
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
PDF
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
PDF
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
PDF
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
PDF
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
PDF
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
PDF
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
PDF
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
PDF
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PDF
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PDF
INTELLIGENT BLIND STICK
PDF
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
PDF
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
PDF
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
PDF
OPTICAL CHARACTER RECOGNITION USING RBFNN
PDF
DETECTION OF MOVING OBJECT
PDF
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PDF
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PDF
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
PDF
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
INTELLIGENT BLIND STICK
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
OPTICAL CHARACTER RECOGNITION USING RBFNN
DETECTION OF MOVING OBJECT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY

Recently uploaded (20)

PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
Visual Aids for Exploratory Data Analysis.pdf
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
communication and presentation skills 01
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Total quality management ppt for engineering students
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
introduction to high performance computing
R24 SURVEYING LAB MANUAL for civil enggi
Information Storage and Retrieval Techniques Unit III
Visual Aids for Exploratory Data Analysis.pdf
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
communication and presentation skills 01
Categorization of Factors Affecting Classification Algorithms Selection
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Safety Seminar civil to be ensured for safe working.
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Soil Improvement Techniques Note - Rabbi
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Total quality management ppt for engineering students
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
introduction to high performance computing

Resourceful and protected Biometric Image Stenography using Discrete Wavelet Transform

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -180 Resourceful and protected Biometric Image Stenography using Discrete Wavelet Transform PATIL S.T M.E. (Communication), Dr. Patil A.J (PRINCIPAL) Prof.Patil C.S North Maharashtra University Department of E&TC H.O.D E&TC SGD College of Engineering Jalgaon SGD College of Engineering, Jalgaon SGD College of Engineering, Jalgaon Abstract— Steganography is the science of concealing the existence of data in another transmission intermediate It does not return cryptography but rather boosts the security using its gloom features. As proposed method is Biometric Steganography, here the Biometric feature used to implement Steganography is Skin tone region of images. Proposed method introduces a new method of embedding covert data within the skin portion of the image of a person, as it is not that much receptive to HVS (Human Visual System). in its place of embedding secret data anywhere in image, it will be embedded in only skin tone region. This skin region provide superb secure location for data hiding. So, firstly skin detection is performed in cover images and then Secret data embedding will be performed in DWT domain as DWT gives better performance than DCT while compression. This biometric method of Steganography enhances robustness than existing methods. Keywords—Biometrics, Matlab, Skin Tone Detection, IDWT, Cropping PSNR, RGB Panel, MSE I. INTRODUCTION Steganography differ from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the life of a message secret . Steganography and cryptography are both ways to protect information from unwanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly overcome. The strength of stenography can thus be amplified by combining it with cryptography. Two other technologies that are closely related to steganography are watermarking and fingerprinting. The kind of information hidden in objects when using watermarking is usually a signature to signify origin or ownership for the purpose of copyright protection. With fingerprinting on the other hand, different, unique marks are embedded in distinct copies of the carrier object that are supplied to different customers. This enables the logical property owner to identify customers who break their licensing agreement by supplying the property to third party In steganography secret data is the data that the sender wishes to send to the receiver. It can be audio, video, image, text file, or other data. They is represented as the stream of bits. This secret data is hidden on the medium or cover or host. Medium of communication is also the image. In this paper secret data is restricted to digital images. Cover image with secret data embedded is called Stego-Image. II. LITERATURE SURVEY Instead of embedding data anywhere in the image secret data is needed to be embedded in the skin region of the image. For that input image is converted into an appropriate color space [1].Mainly two kinds of color spaces are suitable for biometric operations. HSV (Hue, Saturation and Value) and YCbCr (Yellow, Chromatic Blue, Chromatic red) spaces. For the skin color tone detection [7] a skin detector and a skin classifier was there. Skin detector converts the cover image of RGB color space into appropriate color space. Skin classifier will classify pixels in the cover image to skin and non skin pixels by defining a boundary. The skin detection algorithm produces a mask, which is simply a black and white image. The black pixel values are 0 (false) and the white pixel values are 1 (true). For this paper HSV color space is choose. For that first, the image in RGB was converted to HSV color space, because it is more related to human color perception. Hue-saturation based color spaces were introduced when there was a need for the user to specify color properties numerically. In HSV, responsible vales for skin detection are Hue & Saturation so extract the Hue and Saturation dimensions into separate new variables (H & S). For skin detection threshold should be chosen as [H1, S1] & [H2, S2]. A pixel is classified as skin pixel if the values [H, S] fall within the threshold. Threshold is predefined range associated with the target skin pixel values. Most of the researchers determined threshold as h_range = [0, 0.11] and s_range = [0.2, 0.7]. Fig gives overview of stenographic system with the basic steps involved .This section describes different techniques with its types, advantages and disadvantages to give clear idea about specific techniques which have been selected for proposed stenographic system like selection of cropping part from whole image ,selection of which wavelet transform ,techniques for feature extraction etc. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -181 The word steganographyis of Greek origin and means "concealed writing "from the Greek words steganos (στεγανός) meaning “covered or protected", and graphei (γραφή) meaning “writing". The first recorded use of the term was in 1499by Johannes Trithemius in his Steganographia, a treatiseon cryptography and steganography disguised as a bookon magic. Generally, messages will appear to be something else: images, articles, shopping lists, or some othercover text and, classically, the hidden message may be ininvisible ink between the visible lines of a private letter.The advantage of steganography over cryptography aloneis that messages do not attract attention to themselves III BLOCK DIAGRAM Fig. skin tone detection .Plainly visible encrypted messages—no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. can extract message without having value of cropped region. In one of the high frequency sub band of DWT of the cover image To enhance the high security feature secret images are dispersed within each band using a pseudorandom sequence and a session key. This combined approach of using skin pixels and spread spectrum for embedding the secret images provides a high degree of security. The stego image generated is of acceptable level of imperceptibility and distortion compared to the cover image. Steganography is a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to Cryptography, where the existence of the message itself is not disguised, but the meaning is obscured."Steganography" is a Greek word and means ‘covered or hidden writing’. Its origins can be traced back to440 BC. Steganography has been widely used in historical times, especially before crypto graphical systems were developed. Examples of historical usage include: Hidden messages in Wax tablets: In ancient Greece, people wrote messages on the wood, and then covered it with wax so that it looked like an ordinary, unused, tablet. Hidden messages on messenger's body: Also in ancient Greece. Herodotus tells the story of a message tattooed one slave's shaved head, covered by hair re growth, and exposed by resaving. The message, if the story is true, carried a warning to Greece about Persian invasion plans. Hidden messages on paper written in secure inks under other messages or on the blank parts of other messages .During and after World War II, Espionage agents used microdots to send information back and forth. Since the dots were typically extremely small -- the size of a period produced by a Typewriter (perhaps in a font with 10 or 12characters per inch) or even smaller --the stego text was whatever the dot was hidden within. If a letter or an address, it was some alphabetic characters. If under postage Stamp, it was the presence of the stamp. The one-time pad is a theoretically unbreakable cipher that produces cipher texts in distinguishable from random texts: only those who have the private key can distinguish these cipher texts from any Other perfectly random texts. Thus, any perfectly random data can be used as a cover text for a theoretically unbreakable steganography. IV. RESULTS Image Type Image Resolution DWT levels (Haar Transform) After resizing(256x256) 2.jpg 320x400 LL =65x65 LL1=33x33 LL2=17x17 Image Type Image Resolution DWT levels MSE PSNR 2.jpg 320x400 (after resizing 256x256) DWT1 (Haar) 0.0053 70.39 DWT1db 0.0041 71.53 DWT1db5 0.0041 71.98 DWT1db7 0.0043 71.83
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -182 V. CONCLUSION & FUTURE SCOPE Digital Steganography is a fascinating scientific area which falls under the umbrella of security systems. In this paper biometric steganography is presented that uses skin region of images in DWT domain for embedding secret data. By embedding data in only certain region (here skin region) and not in whole image security is enhanced. Also image cropping concept introduced, maintains security at respectable level since no one can extract message without having value of cropped region. Features obtained from DWT coefficients are utilized for secret data embedding. This also increases the quality of stego because secret messages are embedded in high frequency sub-bands which human eyes are less sensitive to. According to simulation results, proposed approach provides fine image quality. According to results I have concluded that for DWT level1 with Haar transform gives better extraction results compare to daubeshian wavelets which decrasws certain amount of extraction coefficients’ which affects extracted logo image. As well as optimized level of daubeshian is db5 after trail and error because for db7 psnr value will change. REFERENCES [1] Simon ClippingdaleMahitoFujii “Skin Region Extraction andPerson- independent” NHK (Japan Broadcasting Corporation),Science & Technology Research Labs IEEE 2011. [2] Anjali A. Shejul Prof. U.L Kulkarni “A DWT baseApproachfor Steganography Using Biometrics” International Conferenceon Data Storages &Data engg,IEEE 2010. [3] Johnson, N. F. and Jajodia, S.: Exploring Steganography:Seeing the Unseen. IEEE Computer, 31 (2): 26-34, Feb 1998. [4] Johnson, N. F. and Jajodia, S.: “Exploring Steganography: Seeing the Unseen.” IEEE Computer, 31 (2): 26-34, Feb 1998. [5] Fridrich, J., Goljan, M. and Du, R.., (2001). “Reliable Detection of LSB Steganography in Grayscale and Color Images.” Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5, 2001, pp. 27- 30. [6] Po-Yueh Chen and Hung-Ju Lin “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering, 2006. 4, 3: 275-290.