0% found this document useful (0 votes)
45 views

Steganography Using An Enhancedconvertible Texture Synthesis

This document proposes a novel steganography technique using reversible texture synthesis. The technique embeds secret messages by synthesizing a texture image through texture synthesis rather than directly modifying an existing cover image. This allows for high embedding capacity comparable to the size of the synthesized texture image. It also makes steganalysis difficult since the stego image is synthesized rather than modified. The reversibility of the technique also allows recovery of the original source texture. Experimental results confirm the technique can provide varying embedding capacities, generate perceptually natural texture images, and recover the source texture.

Uploaded by

Anil Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Steganography Using An Enhancedconvertible Texture Synthesis

This document proposes a novel steganography technique using reversible texture synthesis. The technique embeds secret messages by synthesizing a texture image through texture synthesis rather than directly modifying an existing cover image. This allows for high embedding capacity comparable to the size of the synthesized texture image. It also makes steganalysis difficult since the stego image is synthesized rather than modified. The reversibility of the technique also allows recovery of the original source texture. Experimental results confirm the technique can provide varying embedding capacities, generate perceptually natural texture images, and recover the source texture.

Uploaded by

Anil Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

STEGANOGRAPHY USING AN

ENHANCEDCONVERTIBLE TEXTURE SYNTHESIS


1
Apoorva Shirish, E.Prasad2, V.Anil Kumar3
1
pursuingM.Tech (CSE),
2
working as anAssistant Professor,
3
working as anAssistant Professor.
Department of CSE from Kamala Institute Of Technology & Science, Huzurabad, Karimnagar,
Telangana, Affiliated to JNTUH, (India)

ABSTRACT
I propose a novel strategy for steganography using a reversible surface mix. A surface blend process re-tests a
tinier surface picture which consolisdates another surface picture with a practically identical close-by
appearance and self-self-assured size. I work the organization union system into steganography to shroud riddle
messages. As opposed to using a present spread picture to cover messages, our estimation camouflages the
source surface picture and introduces riddle messages through the system of synthesis union. This grants us to
think puzzle messages and the source surface from a stego built synthesis. Our approach offers three specific
central focuses. Regardless, our arrangement offers the embedding furthest reaches that is comparing to the
range of the stego creation picture. Second, a steganalytic figuring is not inclined to vanquish our
steganographic approach. Third, the reversible limit procured from our arrangement gives convenience which
licenses recovery of the source surface. Trial results have affirmed that our proposed computation can give
distinctive amounts of embedding cutoff points, make an outwardly possible structure pictures, besides, recover
the source surface.

Keywords: Data Embedding, Example-Based Approach, Reversible, Steganography, Texture


Synthesis.

I. INTRODUCTION

In the latest decade various advances have been made in the scope of modernized media, and much concern has
risen as for steganography for mechanized media. Steganography [1] a single methodology for information
disguising systems. It embeds messages into a host medium remembering the finished objective to conceal
riddle messages so as not to energize suspicion by a spy [2]. A normal steganographic application joins mystery
trades between two social events whose nearness is dark to a possible assailant and whose accomplishment
depends on after distinguishing the nearness of this correspondence [3]. When in doubt, the host medium used
as a piece of steganography consolidates critical mechanized media, for instance, propelled picture, content,
sound, video, 3D model [4], et cetera. An immense number of picture steganographic counts have been
inspected with the extending universality and usage of cutting edge pictures [5], [6].

113 | P a g e
Most picture steganographic computations get a present picture as a spread medium. The expense of embedding
secret messages into this spread picture is the photo mutilation experienced in the stego picture. This prompts
two drawbacks. To begin with, since the measure of the spread picture is settled, the more secret messages
which are embedded think about more picture mutilation. In this manner, a deal must be come to between as far
as possible and the photo quality which results in as far as possible gave in a specific spread picture. Audit that
photo steganalysis is a system used to recognize riddle messages concealed in the stego picture. A stego picture
contains some bowing, and paying little notice to how minute it is, this will interfere with the customary parts of
the spread picture. This prompts the second hindrance since it is still possible that a photo steganalytic figuring
can pound the photo steganography and thusly reveal a disguised message is being gone on in a stego picture. In
this paper, I propose a novel procedure for steganography using reversible structure amalgamation. A piece
union technique re-tests a little arrangement picture drawn by a specialist or got in a photograph to mix another
surface picture with a practically identical adjacent appearance and optional size. I mesh the piece mix process
into steganography masking riddle messages and what's more the source surface. In particular, alternately to
using a present spread picture to cover messages, our count covers the source piece picture and introduces
puzzle messages through the system of surface amalgamation. This grants us to evacuate the riddle messages
and the source arrangement from a stego produced piece. To the best of our understanding, steganography
misusing the reversibility has ever been shown inside the written work of piece union.

Fig 1.0 System Architecture

Our technique offers three central focuses. In the first place, subsequent to the surface mix can consolidate an
optional size of surface pictures, as far as possible which our arrangement offers is relating to the degree of the
stego Composition picture. Besides, a steganalytic computation is not inclined to whipping this steganographic
approach subsequent to the stego organization picture is made out of a source surface rather than by adjusting
the present picture substance. Third, the reversible capacity gained from our arrangement offers convenience to
recover the source surface. Since the recovered source synthesis is exactly the same as the primary source
surface, it can be used to proceed onto the second round of puzzle messages for steganography if important.
Trial results have affirmed that our proposed computation can give diverse amounts of embedding’s breaking

114 | P a g e
points, convey ostensibly possible surface pictures, and recover the source synthesis. Speculative examination
shows that there is an insignificant probability of Isolating our steganographic approach and the arrangement
can contradict a RS steganalysis strike [7]. Whatever is left of this paper is formed as takes after: in Area II, I
review the organization mix frameworks. In Area III, I detail our count including introducing and isolating
system. I depict test results and theoretical examination in Section IV, trailed by our choices moreover, future
work showed in the last fragment.

II. RELATED WORKS

Texture synthesis has gotten a great deal of consideration as of late in PC vision and PC illustrations [8]. The
latest work has concentrated on texture synthesis by case, in which a source composition picture is re-inspected
utilizing either pixel-based or patch-based calculations to create another integrated composition picture with
comparable neighborhood appearance and subjective size. Pixel-based calculations [9], [10], [11] create the
combined picture pixel by pixel and use spatial neighborhood correlations with pick the most comparable pixel
in a specimen composition as the yield pixel. Since every yield pixel is dictated by the as of now blended pixels,
any wrongly integrated pixels amid the procedure impact whatever is left of the result creating spread of
mistakes. Otori and Kuriyama [12], [13] spearheaded the work of joining information coding with pixel-based
surface amalgamation. Mystery messages to be covered are encoded into hued specked examples and they are
straightforwardly painted on a clear picture. A pixel-based calculation coats whatever is left of the pixels
utilizing the pixel-based surface blend strategy, subsequently disguising the presence of specked examples. To
concentrate messages the printout of the stego blended surface picture is shot some time recently applying the
information recognizing system. The limit gave by the strategy for Otori and Kuriyamarelies on upon the
quantity of the specked examples. Notwithstanding, their technique had a little blunder rate of the message
extraction.
Patch-based algorithms glue patches from a source composition rather than a pixel to orchestrate surfaces. This
methodology of Cohen et al. also, Xu et al. enhances the picture nature of pixel-based engineered surfaces since
composition structures inside the patches are kept up. Be that as it may, following patches are stuck with a little
covered district amid the engineered procedure, one requirements to try to guarantee that the patches concur
with their neighbors. Liang et al. [16] presented the patch-based testing technique and utilized the feathering
approach for the covered zones of nearby fixes. Efros and Freeman [17] present a patch sewing approach called
"picture stitching". For each new patch to be incorporated and sewed, the calculation first pursuits the source
surface and picks one competitor fix that fulfills the pre-characterized mistake resilience regarding neighbors
along the covered locale. Next, a dynamic programming procedure is received to uncover the base mistake way
through the covered area. This announces an ideal limit between the picked hopeful patch and the combined
patch, delivering outwardly conceivable patch sewing.
Ni et al. [18] proposed a picture reversible information covering up calculation which can recoup the spread
picture with no bending from the stego picture after the shrouded information have been extricated. Histogram
moving is a favored system among existing methodologies of reversible picture information concealing since it
can control the alteration to pixels, in this manner constraining the inserting twisting, and it just requires a little
size area map, in this manner decreasing the overhead experienced. The current cutting edge for reversible

115 | P a g e
picture information stowing away is the general structure introduced by Li et al. [19]. To the best of our insight,
I were not able uncover any writing that related patch-based composition amalgamation with steganography. In
this paper, I display our work which takes point of interest of the patch-based strategies to implant a mystery
message amid the orchestrating method. This permits the source surface to be recuperated in a message
removing strategy, giving the usefulness of reversibility. I point of interest our strategy in the following
segment.

III. EXISTING SYSTEM

Rather than utilizing a current spread picture to shroud messages, our calculation covers the source surface
picture and implants mystery messages through the procedure of composition combination. A run of the mill
steganographic application incorporates undercover correspondences between two gatherings whose presence is
obscure to a conceivable aggressor and whose achievement relies on upon distinguishing the presence of this
correspondence.
Most picture steganographic calculations embrace a current picture as a spread medium. The cost of installing
mystery messages into this spread picture is the picture twisting experienced in the stego picture. No huge visual
distinction exists between the two stego manufactured surfaces and the unadulterated engineered composition.

IV. PROPOSED SYSTEM

Test results have confirmed that our proposed calculation can give different quantities of inserting limits, deliver
outwardly conceivable surface pictures, and recuperate the source composition. proposed a picture reversible
information concealing calculation which can recoup the spread picture with no contortion from the stego
picture after the shrouded information have been separated. I delineate our proposed technique in this segment.
In the first place, I will characterize some essential phrasing to be utilized as a part of our calculation. The
essential unit utilized for our steganographic surface blend is alluded to as a "patch." The three major contrasts
between our proposed message-arranged surface combination and the ordinary patch-based composition blend
are portrayed in Table I. The primary contrast is the state of the covered territory. I trust our proposed plan
offers significant advantages and gives a chance to augment steganographic applications.

V. ADVANTAGES

Our methodology offers three unmistakable preferences. In the first place, our plan offers the implanting limit
that is relative to the measure of the stego composition picture. Second, a steganalytic calculation is not liable to
overcome our steganographic approach. Third, the reversible ability acquired from our plan gives usefulness
which permits recuperation of the source surface.

VI. METHODOLOGY

6.1 Steganography Process

116 | P a g e
In this module, Steganography uses characteristics of English language such as inflexion, fixed word order and
use of periphrases for hiding data rather than using properties of a sentence. This gives flexibility and freedom
from the point view of sentence construction but it increases computational complexity.

6.2 Encoding
Representation of each letter in secret message by its equivalent ASCII code.
Conversion of ASCII code to equivalent 8 bit binary number.
Division of 8 bit binary number into two 4 bit parts.
Choosing of suitable letters from table 1 corresponding to the 4 bit parts.
Meaningful sentence construction by using letters obtained as the first letters of suitable words.
Encoding is not case sensitive.

6.3 Decoding Steps


First letter in each word of cover message is taken and represented by corresponding 4 bit number.
4 bit binary numbers of combined to obtain 8 bit number.
ASCII codes are obtained from 8 bit numbers.
Finally secret message is recovered from ASCII codes.

Transaction Online Shopping: In this module traditional online shopping consumer selects items from
online shopping portal and then is directed to the payment page. Online merchant may have its own payment
system or can take advantage of third party payment systems such as PayPal, pay online system, Web Money
and others. In the payment portal consumer submit his or her credit or debit card details such as credit or debit
card number, name on the card, expiry date of the card.

Customer Authentication: Client interesting confirmation secret key in association with the bank is covered
up inside a spread content utilizing the content based Steganography technique. Client validation data (account
no) regarding dealer is put over the spread content in its unique structure. Presently a depiction of two writings
is taken. From the preview picture, two shares are created utilizing visual cryptography. Presently one offer is
kept by the client and the other offer is kept in the database of the ensured power.

Certification Authority Access: During shopping on the web, after choice of craved thing and adding it to
the truck, favored installment arrangement of the dealer guides the client to the Certified Authority entryway. In
the entrance, customer presents its own offer and dealer presents its own record points of interest. Presently the
CA joins its own particular offer with customer's offer and acquires the first picture. From CA now, trader
account points of interest, spread content are sent to the bank where client confirmation secret key is recouped
from the spread content.
Final Authenticated Information Results: Client confirmation data is sent to the vendor by CA. After
accepting client validation secret word, bank matches it with its own database and in the wake of confirming
real client, exchanges store from the client record to the submitted shipper account. Subsequent to accepting the
asset, trader's installment framework approves receipt of installment utilizing client verification data.

117 | P a g e
Steganalysis: I have chosen so far that our arrangement is secure. In any case, I need to coordinate
steganalysis, the craftsmanship and study of recognizing hid messages using steganography. While there are
different steganalysis figuring’s made, I use the RS steganalytic arrangement [7] since this estimation is without
a doubt comprehended, and having been gotten for by and large steganalysis strikes. In the RS area method, the
relative number of ordinary groups for shroud M = [0110] and –M = [0 − 1 − 10] is implied as (RM, R−M),
independently. Along these lines, the relative number of specific social affairs for spreads M and −M is meant as
(SM, S−M), independently. If the degree of RM is comparable to that of R−M, or the same proportionality
happens to the specific social occasion (SM, S−M), the embedded picture will pass the RS steganalysis. Else, it
would reveal the proximity of the riddle message. In area taking care of, I process the preeminent complexity of
the standard social occasion |RM–R−M| and that of the lone get-together |SM–S−M| with cloak M = [0110] and
–M = [0 − 1 − 10]. A little qualification as a general rule suggests that the stego picture is more secure to the RS
steganalysis.

VII. CONCLUSION

This paper proposes a reversible steganographic calculation utilizing surface combination. Given a unique
source surface, our plan can deliver a huge stego manufactured surface disguising mystery messages. To the
best of our insight, I am the to begin with that can wonderfully mesh the steganography into a routine patch-
based composition blend. Our technique is novel and gives reversibility to recover the first source surface from
the stego engineered compositions, making conceivable a second round of surface combination if needed. With
the two procedures I have presented, our calculation can deliver outwardly conceivable stego engineered
compositions regardless of the fact that the mystery messages comprising of bit "0" or "1" have an uneven
appearance of probabilities. The introduced calculation is secure and hearty against a RS steganalysisassault. I
trust our proposed plan offers significant advantages and gives an open door to expand steganographic
applications. One conceivable future study is to extend our plan to support different sorts of composition
combination ways to deal with progress the picture nature of the manufactured compositions. Another
conceivable study would be to join other steganography approaches to build the inserting limits.

REFERENCES

[1] N. F. Johnson and S. Jajodia, ―Exploring steganography: Seeing theunseen,‖ Computer, vol. 31, no. 2, pp.
26–34, 1998.
[2] N. Provos and P. Honeyman, ―Hide and seek: An introduction to steganography,‖ IEEE Security Privacy,
vol. 1, no. 3, pp. 32–44, May/Jun. 2003.
[3] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, ―Information hiding survey,‖ Proc. IEEE, vol. 87,
no. 7, pp. 1062–1078, Jul. 1999.
[4] Y.-M. Cheng and C.-M. Wang, ―A high-capacity steganographicapproach for 3D polygonal meshes,‖
Vis. Comput., vol. 22, nos. 9–11, pp. 845–855, 2006.
[5] S.-C. Liu and W.-H.Tsai, ―Line-based cubism-like image—A new type of art image and its application to
lossless data hiding,‖ IEEE Trans.Inf. Forensics Security, vol. 7, no. 5, pp. 1448–1458, Oct. 2012.

118 | P a g e
[6] I.-C. Dragoi and D. Coltuc, ―Local-prediction-based difference expansion reversible watermarking,‖
IEEE Trans. Image Process., vol. 23, no. 4, pp. 1779–1790, Apr. 2014.
[7] J. Fridrich, M. Goljan, and R. Du, ―Detecting LSB steganography in color, and gray-scale images,‖ IEEE
MultiMedia, vol. 8, no. 4, pp. 22–28, Oct./Dec. 2001.
[8] Y. Guo, G. Zhao, Z. Zhou, and M. Pietikäinen, ―Video texture synthesis with multi-frame LBP-TOP and
diffeomorphic growth model,‖ IEEETrans. Image Process., vol. 22, no. 10, pp. 3879–3891, Oct. 2013.
[9] L.-Y. Wei and M. Levoy, ―Fast texture synthesis using tree-structured vector quantization,‖ in Proc. 27th
Annu. Conf. Comput. Graph.Interact.Techn., 2000, pp. 479–488.
[10] A. A. Efros and T. K. Leung, ―Texture synthesis by non-parametric sampling,‖ in Proc. 7th IEEE Int.
Conf. Comput. Vis., Sep. 1999, pp. 1033–1038.
[11] C. Han, E. Risser, R. Ramamoorthi, and E. Grinspun, ―Multiscale texture synthesis,‖ ACM Trans.
Graph., vol. 27, no. 3, 2008, Art. ID 51.
[12] H. Otori and S. Kuriyama, ―Data-embeddable texture synthesis,‖ in Proc. 8th Int. Symp. Smart Graph.,
Kyoto, Japan, 2007, pp. 146–157.
[13] H. Otori and S. Kuriyama, ―Texture synthesis for mobile data communications,‖ IEEE Comput.Graph.
Appl., vol. 29, no. 6, pp. 74–81, Nov./Dec. 2009.
[14] M. F. Cohen, J. Shade, S. Hiller, and O. Deussen, ―Wang tiles for image and texture generation,‖ ACM
Trans. Graph., vol. 22, no. 3, pp. 287–294, 2003.
[15] K. Xuet al., ―Feature-aligned shape texturing,‖ ACM Trans. Graph., vol. 28, no. 5, 2009, Art. ID 108.
[16] L. Liang, C. Liu, Y.-Q.Xu, B. Guo, and H.-Y.Shum, ―Real-time texture synthesis by patch-based
sampling,‖ ACM Trans. Graph., vol. 20, no. 3, pp. 127–150, 2001.
[17] A. A. Efros and W. T. Freeman, ―Image quilting for texture synthesis and transfer,‖ in Proc. 28th Annu.
Conf. Comput. Graph. Interact. Techn.,2001, pp. 341–346.
[18] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, ―Reversible data hiding,‖ IEEE Trans. Circuits Syst. Video
Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[19] X. Li, B. Li, B. Yang, and T. Zeng, ―General framework to histogramshifting- based reversible data
hiding,‖ IEEE Trans. Image Process., vol. 22, no. 6, pp. 2181–2191, Jun. 2013.
[20] J. L. Rodgers and W. A. Nicewander, ―Thirteen ways to look at the correlation coefficient,‖ Amer.
Statist., vol. 42, no. 1, pp. 59–66, 1988.

Author Details
ApoorvaShirish pursuing M.Tech (CSE) from Kamala Institute Of Technology & Science, Huzurabad, Karimnagar,
Telangana, Affiliated to JNTUH, India

E.Prasadworking as an Assistant Professor Department of CSE from Kamala Institute Of Technology & Science,
Huzurabad, Karimnagar, Telangana, Affiliated to JNTUH, India.
V.Anil Kumarworking as an Assistant Professor Department of CSE from Kamala Institute Of Technology &
Science, Huzurabad, Karimnagar, Telangana, Affiliated to JNTUH, India.

119 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy