International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
An Improved Noise Resistant Image Steganography Technique Using Zero Cross Edge Detection Method Mohan Singh Kachera1, Gaurav Gupta2 and Neeraj Jain3 1M.Tech.
Scholar, Department of Electronics and Communication, Rajasthan Technical University, India
2Assistant
Professor, Department of Electronics and Communication, Rajasthan Technical University, India
3Assistant
Professor, Department of Electronics and Communication, Rajasthan Technical University, India
---------------------------------------------------------------------***--------------------------------------------------------------------Abstract— Steganography is derived from two Greek used invisible ink or hidden tattoos to convey words i.e. ‘Stegno’ and ‘Graphy’. ‘Stegno’ means ‘cover’ steganographic data. Today, computer and internet and ‘graphy’ means ‘writing’. It is an essential part of technologies provide easy to use communication information security which secures the secret data from channels for steganography. Essentially, the eavesdropper. Steganography hides the existence of information hiding process starts by identifying a cover secret data in order to secure it. Least Significant Bit medium’s redundant bits (those that can be changes Insertion technique is applied to hide the secret without destroying that medium’s integrity).The information. This method modifies the least significant bit of each pixel of cover image. An interesting feature of embedding process generate a stego medium by randomization is that it provides improved image replaced these redundant bits with data from the secret parameters i.e. Peak Signal to Noise Ratio (PSNR), Mean message. Square Error (MSE) and Tamper Assessment Function (TAF). At the retrieval side, retrieve the bit stream from 2. Literature review LSB of the edge pixels of the stego image for extracting Aruna Mittal [1] proposes a new method for the secret message from the cover image. Deembedding secret information within skin and as well randomization is applied to the bit stream using the same stego keys which were used for randomization. The as in the edge area, as it is not much sensitive to proposed method gives much better results in terms of Human Visual System. Firstly, skin tone detection PSNR, MSE and Robustness against various noises like method is performed on input image using HSV (Hue, Salt & pepper noise, Poisson noise, Gaussian noise and Saturation and Value) color model. Second the cover Speckle noise. image is transferred in frequency domain. It is Keywords— Least Significant Bit (LSB) Technique, Mean performed by using double density discrete wavelet Square (MSE), Peak Signal to Noise Ratio (PSNR), Tamper transform. After that the payload is calculated. Finally Assessment Function (TAF), Region of Interest (ROI). the secret information embedding is performed of high frequency sub band by tracking skin pixels. 1. Introduction Before performing all steps cropping on input image is Steganography is the art and science of imperceptible performed. Then cropped image region embedding is communication. This is accomplished through hiding done. In which the embedding process affects only secret information in other information, thus hiding the certain Region of Interest other than entire image. survival of the communicated information. The word Then DD-DWT stego image is produced. Thereafter Steganography is derived from Greek words “stegos” IDD-DWT image is merged with original image and means “cover” and “grafia” means “writing” defines it final stego image is produced. This paper gives a has “covered writing”. In image steganography the review of steganography and its various techniques, secret information of data is hidden exclusively in its advantages and disadvantages, applications and images. Steganographic technology thus embeds hidden comparison with cryptography techniques. Nowadays, information in unreadable cover media so as not to data communication with security is basic necessity in stimulate an auditor’s suspicion. In the past, people © 2017, IRJET
|
Impact Factor value: 5.181
| ISO 9001:2008 Certified Journal
|
Page 1881