Steganography using Reversible Texture Synthesis based on Error Histogram Shift

Page 1

IJIRST –International Journal for Innovative Research in Science & Technology| Volume 3 | Issue 04 | September 2016 ISSN (online): 2349-6010

Steganography using Reversible Texture Synthesis based on Error Histogram Shift Anumol Antony PG Student Department of Computer Science & Engineering Federal Institute of Science & Technology

Dr. Arun Kumar M N Assistant Professor Department of Computer Science & Engineering Federal Institute of Science & Technology

Abstract Steganography is the method for concealing data inside another file, message, image, or video. The purpose of steganography is to hide data in a manner that existence of communication is unknown by an attacker. This proposed work presents stegnography in texture images utilizing reversible texture synthesis based on error histogram shift. Texture synthesis process synthesizes a large texture image from a smaller texture image, which has same local appearance. The texture synthesis procedure is fabricated into steganography concealing secret messages and in addition the source texture. The algorithm conceals the source texture image and embeds the secret messages through the procedure of texture synthesis and error histogram shift. This permits us to extract the secret messages and the source texture from a stego synthetic texture. Keywords: Steganography, Reversible Texture Synthesis, Texture Synthesis, Error Histogram Shift, Stego Synthetic Texture _______________________________________________________________________________________________________ I.

INTRODUCTION

Steganography is the method of hiding a message, file, image, or video within another file, message, image, or video. The word steganography combines from the two Greek words steganos means protected, and grapheins means writing. The advantage of steganography than cryptography is that the secret message does not attract the attention of the attackers by simple observation. The cryptography protects only the content of the message, while steganography protects the both messages and communication environment. Most stenographic methods take over an existing image as a cover medium. When embedding secret messages into this cover image, distortion of the image may occur. Because of this reason two drawbacks occur. First, since the size of the cover image is fixed, the more secret messages which are embedded leads to more image distortion. Therefore to maintain image quality it will provide limited embedding capacity to any specific cover image. Second, that image steganalysis approach is used to detect hidden messages in the stego image. This approach can defeat the image steganography and reveals that a hidden message is being carried in a stego image. Embedding capacity is one of the most important requirements for steganography methods, and it is important for steganography process not to leave any noticeable traceable to the human eyes after hiding the secret data. The proposed method uses error histogram shift. The use of error histogram shift leads to a better embedding capacity. The method uses a secret key for source texture recovery. Secret Key Steganography is defined as a steganographic system that requires the exchange of a secret key (stego-key) prior to communication. The source texture is embedded using the secret key. Only the parties who know the secret key can reverse the process and recover the source texture. Here a perceived invisible communication channel is present. This steganography method exchanges a stego-key, which makes it more susceptible to interception. Our approach offers three advantages. First, since the texture synthesis can synthesize an arbitrary size of texture images, the embedding capacity which the scheme offers is proportional to the size of the stego texture image. Secondly, a steganalytic algorithm is not likely to defeat this steganographic approach since the stego texture image is composed of a source texture rather than by modifying the existing image contents. Third, the reversible capability inherited from the scheme provides functionality to recover the source texture. Since the recovered source texture is exactly the same as the original source texture, it can be employed to proceed onto the second round of secret messages for steganography if needed. Experimental results have verified that the proposed algorithm can provide more embedding capacities, produce visually plausible texture images, and recover the source texture. Theoretical analysis indicates that there is an insignificant probability of breaking down the steganographic approach, and the scheme can resist an RS steganalysis attack. The rest of this paper is organized as follows. In section II, literature survey is briefly described. Section III describes the methodology. In section IV presents the experimental results and analysis and finally section V summarizes the system.

All rights reserved by www.ijirst.org

184


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.