10.01.2015 Views

Effect of Noise on image steganography based on LSB ... - IOSRJEN

Effect of Noise on image steganography based on LSB ... - IOSRJEN

Effect of Noise on image steganography based on LSB ... - IOSRJEN

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IOSR Journal <str<strong>on</strong>g>of</str<strong>on</strong>g> Engineering<br />

Mar. 2012, Vol. 2(3) pp: 473-477<br />

When these <strong>image</strong>s are transmitted through AWGN channel,<br />

noises are introduced in it, thereby this stego <strong>image</strong>s may be<br />

corrupted by noise and also hidden secret data bits are affected<br />

by that noise. The experimental results have shown in table 4,<br />

5, and 6 that how much stego bits and data bits are corrupted<br />

by noise. The size <str<strong>on</strong>g>of</str<strong>on</strong>g> <strong>image</strong> is 256x256 i.e.65536 total no <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

pixels or 524288 data streams are transmitted through noisy<br />

channel. Additive white Gaussian noises are used in this<br />

experiment. The characteristic <str<strong>on</strong>g>of</str<strong>on</strong>g> this communicati<strong>on</strong> system<br />

with bit error rate (BER) versus signal noise ratio (SNR, E b /N 0 ,<br />

dB), where E 0 is energy per bit and N 0 is noise spectral<br />

density. Such a c<strong>on</strong>trolled noise was added in every channel<br />

and that stego <strong>image</strong> is transmitted over the channel bit by bit.<br />

The number <str<strong>on</strong>g>of</str<strong>on</strong>g> error bits was measured at every c<strong>on</strong>trolled<br />

noise level to obtain BERs for test <strong>image</strong> during the stego<br />

<strong>image</strong> transmissi<strong>on</strong>. The received stego bits are used to<br />

rec<strong>on</strong>struct the stego <strong>image</strong>, and extract secret data bits by<br />

using decrypti<strong>on</strong> algorithm. The error correcti<strong>on</strong> results <str<strong>on</strong>g>of</str<strong>on</strong>g> the<br />

proposed method are given in the table 4, 5, 6.<br />

B. simulati<strong>on</strong> results when Babo<strong>on</strong> stego <strong>image</strong> (data stream)<br />

is transmitted through AWGN channel.<br />

Table 4 simulati<strong>on</strong> results when stego <strong>image</strong> is transmit<br />

through AWGN channel<br />

SNR IN No <str<strong>on</strong>g>of</str<strong>on</strong>g> bits corrupted No <str<strong>on</strong>g>of</str<strong>on</strong>g> hidden data<br />

db through AWGN/ bits corrupted<br />

524288<br />

through AWGN<br />

/65536<br />

0 41086 5080<br />

1 29086 3688<br />

2 11958 1466<br />

3 6491 815<br />

4 3231 411<br />

6 1217 146<br />

8 86 14<br />

9 24 4<br />

10 2 1<br />

C. simulati<strong>on</strong> results when Lena stego <strong>image</strong> (data stream) is<br />

transmitted through AWGN channel .<br />

Table 5 simulati<strong>on</strong> results when stego <strong>image</strong> is transmit<br />

through AWGN channel<br />

SNR IN db No <str<strong>on</strong>g>of</str<strong>on</strong>g> bits corrupted No <str<strong>on</strong>g>of</str<strong>on</strong>g> hidden data<br />

through AWGN bits corrupted<br />

/524288<br />

through AWGN<br />

/65536<br />

0 40086 5180<br />

1 20086 3088<br />

2 10958 1566<br />

3 6291 715<br />

4 3331 401<br />

6 1227 136<br />

8 76 13<br />

9 10 3<br />

10 3 1<br />

D.simulati<strong>on</strong> results when Boat stego <strong>image</strong> (data stream) is<br />

transmitted through awgn channel.<br />

Table 6 simulati<strong>on</strong> results when stego <strong>image</strong> is transmit<br />

through AWGN channel<br />

SNR IN No <str<strong>on</strong>g>of</str<strong>on</strong>g> bits corrupted No <str<strong>on</strong>g>of</str<strong>on</strong>g> hidden data<br />

db through AWGN/ bits corrupted<br />

524288<br />

through AWGN<br />

/65536<br />

0 42086 5180<br />

1 23086 3788<br />

2 10958 1366<br />

3 6391 715<br />

4 3031 421<br />

6 1117 136<br />

8 96 13<br />

9 20 3<br />

10 2 1<br />

V CONCLUSION<br />

The c<strong>on</strong>clusi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> these experimental results is that- The<br />

proposed data hiding scheme is an efficient data hiding<br />

scheme <strong>based</strong> <strong>on</strong> the <strong>LSB</strong> inserti<strong>on</strong> and RSA encrypti<strong>on</strong><br />

method by its PSNR value <str<strong>on</strong>g>of</str<strong>on</strong>g> <strong>image</strong> like babo<strong>on</strong> is 54.34 dB,<br />

53.32dB, 52.55dB which is not noticeable by human eyes.<br />

Enhance security <str<strong>on</strong>g>of</str<strong>on</strong>g> hidden data by 7x10 6 times than the<br />

RSA-512 in terms <str<strong>on</strong>g>of</str<strong>on</strong>g> its time complexity, and 2650 times in<br />

space complexity. The <strong>steganography</strong> <strong>image</strong>s are transmitted<br />

through AWGN channel, and rec<strong>on</strong>structi<strong>on</strong> performance is<br />

simulated. The <strong>image</strong> and hidden data are rec<strong>on</strong>structed with<br />

the SNR level ≥9 dB.<br />

REFERENCES<br />

1. Implementing Cisco IOS Network Security (IINS)<br />

Catherine Piquet Copyright © 2009 Cisco Systems, Inc.<br />

Published by: Cisco Press 800 East 96th Street<br />

Indianapolis, IN 46240 USA.<br />

2. Ming, Chen, Z. Ru, N. Xinxin, and Y. Yixian, “Analysis<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> Current Steganography Tools: Classificati<strong>on</strong>s &<br />

Features”, Informati<strong>on</strong> Security Beijing University <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

Posts & Telecommunicati<strong>on</strong>, Beijing, December 2006.<br />

Centre.<br />

3. Chandramouli R and Mem<strong>on</strong> N, “Analysis <str<strong>on</strong>g>of</str<strong>on</strong>g> <strong>LSB</strong> <strong>based</strong><br />

<strong>image</strong><br />

<strong>steganography</strong> techniques”,<br />

Proceedings 2001 Internati<strong>on</strong>al C<strong>on</strong>ference <strong>on</strong> Image,<br />

Vol. 3, pp. 1019-1022.<br />

4. StegCure: An Amalgamati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> Different Steganographic<br />

Methods inGIF Image L.Y. Por1, W.K. Lai2, Z. Alireza3,<br />

B. Delina4 Faculty <str<strong>on</strong>g>of</str<strong>on</strong>g> Computer Science and Informati<strong>on</strong><br />

Technology University <str<strong>on</strong>g>of</str<strong>on</strong>g> Malaya 50603, Kuala Lumpur<br />

MALAYSIA .<br />

5. S. Katzenbeisser, Fabien A.P. Petitcolas, Informati<strong>on</strong><br />

Techniques for Steganography and Digital Watermarking,<br />

Artech House, Bost<strong>on</strong>, L<strong>on</strong>d<strong>on</strong>, 2000.<br />

6. John Kadvany, “Positi<strong>on</strong>al Value and Linguistic<br />

Recursi<strong>on</strong>”, Springer Netherlands,Vol. 35, December<br />

2007, pp. 487-520.<br />

ISSN: 2250-3021 www.iosrjen.org 476 | P a g e

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!