24.11.2014 Views

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

Elektronika 2009-11.pdf - Instytut Systemów Elektronicznych

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Signal to Noise Ratio (PSNR). We propose it along with one<br />

of the most appropriate distortion metrics, which is correlated<br />

with the Human Visual System (HVS) [2] i.e. Relative Peak<br />

Signal to Noise Ratio (RPSNR). Also, report module can contain<br />

other useful informations such as size of decoded message<br />

or output of steganalysis modules. Because of the fact<br />

that the robustness is a crucial requirement for digital watermarking,<br />

investigating the resistance against typical signal<br />

processing methods can be useful and thus the VSL contains<br />

some popular image processing algorithms. Within application,<br />

hidden content (e.g. invisible watermark) could be attacked<br />

with noise addition (Gaussian noise, Salt-and-Pepper<br />

noise), resizing (using most popular bicubic interpolation),<br />

cropping, JPEG lossy compression, median filtering, Gaussian<br />

blurring, gamma correction or sharpening. Any parameter<br />

of the distortion method can be easily adjusted.<br />

All tools presented above are designated to replace any<br />

external software like image viewers, file managers, text editors,<br />

etc. All these elements form the entire, fully independent<br />

workbench making possible to conduct any type of steganographic<br />

experiment.<br />

The initial assumption regarding architecture was to use<br />

SOAP (Simple Object Access Protocol) for communication,<br />

as it provides mechanisms for exchanging structured and<br />

typed information between peers in a decentralized, distributed<br />

environment such as proposed virtual laboratory [20].<br />

Each workbench element (node) can be treated as a peer<br />

which exchanges SOAP messages, formally specified as an<br />

XML structures, which provide an abstract description of its<br />

contents. Despite SOAP is fundamentally a stateless, oneway<br />

message exchange paradigm, our idea is to create more<br />

complex interaction patterns (e.g., request/response, request/multiple<br />

responses, etc.) by combining such one-way<br />

exchanges with features provided by an underlying protocol<br />

and/or application-specific information [22]. Because of the<br />

concept of an open and distributed processing, the first, and<br />

the most obvious idea was to build the VSL as Web Services<br />

which are defined by the W3C as a software system designed<br />

to support interoperable machine-to-machine interaction over<br />

a network [23]. The VSL was meant to be a set of Web Services<br />

with one privileged core Web Service, which exactly represents<br />

the proposed architecture. Initial framework was build<br />

using Java API for XML Web Services (JAX-WS) [21], however<br />

the system in this form had significant limitations. The<br />

main two constraints were a complexity of API and a lack of<br />

possibility to construct plugin architecture. Those restrictions<br />

could be a great disadvantage for potential users regarding<br />

extending and/or altering the whole system. Another inconvenience<br />

was communication issue - Web Services should<br />

use in this case secure transfer protocol. In result, we<br />

changed system architecture to a main application and a set<br />

of plugins which are also standalone applications that can run<br />

independently (typical to the client-server approach). Thanks<br />

to Java, which provides multi-platform compatibility, the VSL<br />

application can be executed on almost every personal computer<br />

running any popular operating system (MS Windows,<br />

MacOS, Linux). It is an often unnoticeable, yet very important<br />

economical aspect of research. Basic programming skills, together<br />

with given architecture make possible for everyone to<br />

build his own plugin, without much effort (regardless of the<br />

type - steganographic, steganalytic or distortion module) and<br />

to attach it to the main application of VSL. Free and open<br />

source of VSL (along with openness of technologies used for<br />

development) and its modularity, make it useful and adequate<br />

tool for both scientists and students.<br />

User interface<br />

Graphical user interface of the application is shown in figures<br />

below (see Fig. 3-5). It was build with the usage of typical<br />

Swing GUI gadgets, however thanks to the look-an-feel technology,<br />

it can be easily switched to standard MS Windows or<br />

MacOS visual schemes. It features drag-and-drop technology<br />

which means it is easy to operate by any, even not advanced<br />

user. The main window of laboratory contains plain workspace<br />

and a list of block elements (Modules). Each block element<br />

represents corresponding operation i.e. block named LSB<br />

processes an image with Least Significant Bit embedding. Any<br />

processing starts from the Input block which has a list of input<br />

files designated for processing (the processing flow is sequentially<br />

performed for all input files). Between any two<br />

blocks a package of control data is being transferred - every<br />

block performs its own operations on data and transfers the<br />

data package further to the next block. All parameters and<br />

properties of an operation represented by a block, can be easily<br />

adjusted, simply by showing the parameters dialog after<br />

the double-click on the block that needs to be configured. The<br />

application provides both batch and parallel processing, and<br />

loops as well, hence it should be noticed that considerably<br />

complex flows, as described in next section, are available to<br />

be arranged by users. Moreover, all specific properties of an<br />

application (i.e. file formats, size of blocks, area of workspace,<br />

colors, etc.) can be specified in an external, freely editable<br />

configuration file.<br />

Sample experiments<br />

The virtual laboratory has one considerable advantage over<br />

typical set of individual applications since it makes it possible<br />

to conduct experiments in a flow form. Each operation being<br />

a part of the flow can be performed once or several times, giving<br />

an opportunity to change its parameters during each iteration<br />

and passing the results to the next stage. Thus, it is more<br />

usable for scientific and educational purposes, where the experiments<br />

involve many time-consuming and often not clearly<br />

determined investigations. Figures below provide sample<br />

flows of processing. Figure 3 shows a simple process of embedding<br />

after which cover image is distorted three times. Then<br />

it is stored in a Display module and a LSB Decoder tries to<br />

read the hidden message. In the end report is created from<br />

whole process.<br />

Fig. 3. Example flow of experiment representing an attack on chosen<br />

steganographic method<br />

Rys. 3. Przykładowy przebieg eksperymentu odpowiadającemu<br />

atakowi na wybraną metodę staganograficzną<br />

ELEKTRONIKA 11/<strong>2009</strong> 63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!