Content uploaded by Jyoti Chaudhary
Author content
All content in this area was uploaded by Jyoti Chaudhary on Oct 14, 2023
Content may be subject to copyright.
ISSN(Online): 2320-9801
ISSN (Print) : 2320-
9798
International Journal of Innovative Research in Computer
and Communication Engineering
(An ISO 3297: 2007 Certified Organization)
Vol. 4, Issue 5, May 2016
Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0405321 9633
A Review on "Locating Secret Images Using DWT
Techniques and RSA Algorithm"
Sneha, Jyoti
M.Tech Scholar, Dept. of CSE, Technological Institute of Textile & Sciences, Bhiwani, Haryana, India
Asst. Professor, Dept. of IT, Technological Institute of Textile & Sciences, Bhiwani, Haryana, India
ABSTRACT: Steganography is the science that involves communicating secret data in an appropriate multimedia
carrier like image, video and audio files. it does not replace cryptography but rather boots the security using its
obscurity features. When we work on a network the security requirements of a user as well as a network increases.
There are number of available ways over the network to achieve the information security. Till now the available
methods hide the secret data over the image on a fixed pattern that makes a user identify the pattern easily. We are
providing a dynamic pattern extraction approach using biometric. It advocates an object oriented approach in which
skin to ne detected areas in the image are selected for embedding where possible. After detecting the skin area, edge
detection is performed by using the canny edge detection method. As the edges will be detected we will use this area as
the pattern to hide the data over the image. The secret data is compressed using the DWT technique and then further
compressed secret information is encrypted using RSA algorithm with bit shift method. This proposed technique
provides more security to the data as data is embedded not in the whole image but only at some specified location. Due
to this image distortion of the carrier image is less and it is difficult to identify the Secret image.
KEYWORDS: secret data, rsa, edge detection, DWT
I. INTRODUCTION
A. Steganography
The word Steganography is originally derived from Greek words which mean “Covered Writing”. Steganography is a
technique that embedding the secret information into an another image so that unknown user cannot identify that secret
information. Steganography is the skills of writing secrete messages in such a way that no one, other than the sender
and receiver, suspects the survival of the message, a form of security through obscurity
B. Cryptography
Cryptography is the science of using mathematics to encrypt and decrypt data. The word cryptography is derived from
the Greek word kryptos, meaning ’hidden’. Cryptography enables us to store sensitive information or transmit it across
insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient.
II. PROPOSED ALGORITHM
Step 1: Cover image is loaded & skin color detection is performed for the biometric image.
Step 2: Apply canny edge detector algorithm for the biometric image.
Step 3: Once the edges of cover image are found then load the secret image.
Step 4: After loading the secret image, DWT technique is applied to compress the secret image as
compressed image will less distort the cover image.
Step 5: Then RSA encryption algorithm with bit shift method is performed.
Step 6: Encrypted message is then embed behind the cover image.
Step 7: Stego image with better quality is obtained.
ISSN(Online): 2320-9801
ISSN (Print) : 2320-
9798
International Journal of Innovative Research in Computer
and Communication Engineering
(An ISO 3297: 2007 Certified Organization)
Vol. 4, Issue 5, May 2016
Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0405321 9634
III. RSA ALGORITM WITH BIT SHIFT METHOD
There are various steps to implement RSA algorithm:
1. Choose two large prime numbers p, q randomly.
2. Compute n = pq.
3. Calculate φ(n) as follow:
φ(n) = (p-1)(q-1)
4. Choose an integer e such that e is relatively prime to φ(n).
1 < e < φ(n)
such that
gcd (φ(n),e) =1
5. Determine d, 1 < d < φ, such that
d = e-1(mod(φ(n)))
6. Encryption:
Plaintext M < n
Ciphertext C=Me mod n
7. After the encryption bit shift method is used where left four bits of a byte are XOR with the right four bits
and resultant bits are set at the place of right 4 bits.
8. Decryption:
Ciphertext C
Plaintext M=Cd mod n
IV. FLOWCHART
The flowchart shows that first the cover image is loaded and then skin tone detection is done when the cover image is
biometric and if the image is non-biometric then edge detection algorithm is applied. After that the secret image is
loaded and DWT method is applied to it which will give compressed secret image. Then this image is encrypted by
using the RSA with bit shift method. Encrypted image is then embed into the edge pixels of the cover image. This
method of data hiding is more secure as secret image only uses the edge pixels and data is not dispersed in the whole
cover image. As distortion of cover image is less and then the image quality of stego image is good.
ISSN(Online): 2320-9801
ISSN (Print) : 2320-
9798
International Journal of Innovative Research in Computer
and Communication Engineering
(An ISO 3297: 2007 Certified Organization)
Vol. 4, Issue 5, May 2016
Copyright to IJIRCCE DOI: 10.15680/IJIRCCE.2016. 0405321 9635
V. CONCLUSION
As Steganography is concerned with security purpose and it is consider as a fascinating scientific area .the proposed
algorithm pre processes the data before hiding it behind the cover image. the compression step involved in the
algorithm reduces the size of text and thus allows more data to be hidden behind the same image. so, using compression
more data can be hidden acknowledgment behind the same image. The skin area and the edge pixels are evaluated and
secret data which is encrypted with RSA algorithm is embedded into specific area .As data is embedded in certain
region rather than whole image so security as well as quality of stego image is enhanced. The data is hidden only in the
edge pixels of cover image which is least imperceptible to human eye thus providing a higher PSNR value and no
visual distortion of image quality. Moreover, the size of the image does not change after hiding the text in it.
VI. ACKNOWLEDGEMENT
It is great opportunity to write about “Locating Secret Images Using DWT Techniques and RSA Algorithm”. For
preparing this paper I am gone through different books and websites to understand this topic easily.
I acknowledge with gratitude to Astt professor JYOTI CHOUDHRY who has always been sincere and helpful in
making me understand this research.
REFERENCES
1. Abadpour, A. & Kasaei, S., 2005. Pixel-based skin detection for pornography filtering. Iranian Journal of Electrical and Electronic Engineering,
1(3), pp.21-41.
2. Abdelwahab, A.A. & Hassan, L.A., 2008. A discrete Wavelet transform based technique for image data hiding. In Proceedings of 25th National
Radio Science Conference, NRSC 2008. Egypt, 2008. March 18-20.pp.1-9.
3. Abdulaziz, N.K. & Pang, K.K., 2000. Robust data hiding for images. In Proceedings of IEEE International Conference on Communication
Technology, WCC-ICCT. Beijing , China, 2000. 21-25 Aug. pp. 380-383.
4. Abdullah-Al-Wadud, M. & Chae, O., 2008. Skin segmentation using color distance map and water-flow property. In Proceedings of International
Conference on Information Assurance and Security. Italy, 2008. 8-10 Sept. pp. 83-88.
5. Böhme, R. & Westfeld, A., 2005. Exploiting preserved statistics for steganalysis. In Proceedings of 6th International Workshop Information
Hiding. Toronto, Canada, 2005 Lecture Notes in Computer Science, Springer. 23-25 May. pp.82-96.
6. Bourdon, R., 2009. WampServer. [Online] Availablat: HYPERLINK"http://www.wampserver.com/en/" http://www.wampserver.com/en/
[Accessed 04 August 2009].
Buchholz, J.J., 2001. Matlab Implementation of the Advanced Encryption Standard.http://buchholz.hsbremen.de/aes/aes.htm.
7.Cancelli, G., Doërr, G.J., Barni, M. & Cox, I.J., 2008. A comparative study of +/-1 steganalyzers. In Proceedings of IEEE 10th Workshop on
Multimedia Signal Processing. Queensland, Australia, 2008. 8-10 Oct. pp.791-796.
8.Chang, C.C., Chen, T.S. & Chung, L.Z., 2002. A steganographic method based upon JPEG and quantization table modification. Information
Sciences, 141(1-2), pp.123-38.
9.Chao, M.W., Lin, C.H., Yu, C.W. & Lee, T.Y., 2009. A high capacity 3D Steganography algorithm. IEEE Transactions on Visualization and
Computer Graphics, 15(2), pp.274-84.
10..Cheddad, A., Condell, J., Curran, K. & Mc Kevitt, P., 2008a. An encryption method. United Kingdom Patent Application No. 0819976.2.
University of Ulster.
11.Cheddad, A., Condell, J., Curran, K. & Mc Kevitt, P., 2008c. Method for skin tone detection. United Kingdom Patent Application No. 0819982.0.
University of Ulster.
12.Cheddad, A., Condell, J., Curran, K. & Mc Kevitt, P., 2008d. Securing information content using new encryption method and steganography. In
Proceedings of the 3rd IEEE International Conference on Digital Information Management. London, UK, 2008d. 13-16 Nov. pp. 563-568.