1a S Naga Jyothi Message
1a S Naga Jyothi Message
1a S Naga Jyothi Message
INTRODUCTION
and how far apart in the image each piece of the message is
to be encoded. This method of encoding can be discovered if
a bitwise comparison of the cover image is done with the
steganographic image, which is the image that contains the
secret message. Such a comparison may reveal manipulation
but not the message. One way to thwart this discovery is to
prevent access to the original image.
II.
IMAGE FORMAT
www.ijireeice.com
389
Alpha
Red
Green
Blue
Bit Position
31 24
23 16
15 8
t0
d0
S0 S1
d1
..
..
tn
dn
S2 S3
..
..
Sn-1
Sn
t1
..
tn
d0
.. dn
..
S(n/2)-1
S(n/2)
.. Sn
A. Image Entropy
The definition of entropy is the measure of disorder or
randomness in a closed system [4]. When applied to digital
images, entropy is a measure of the amount of detail in the
image. The application created from this research, computes
an entropy value for the image selected by the user. The
entropy value can be useful because it can provide an idea
of how much detail is in the image before the user adds
noise to the image by inserting a message. Adding a
message to an image modifies some of the bits of the pixels,
thus modifying the randomness of the image as well. The
entropy is calculated using 2.1.
Entropy Pr(a j ) log2 Pr(a j ),
j
(2.1)
trend: s
s , j 0,1,...,
i,2 j
i,2 j1
i,2 j1
, j 0,1,...,
(3.1)
(3.2)
2
2
th
where aj represents the j unique intensity value observed These calculations are done in the order shown above
in a reading of the images pixel values and Pr(aj) is the because the detail value calculated in 3.1 is used in the
second term of 3.2.
probability of that pixel value occurring within the image.
i,2 j
i,2 j
LIFTING SCHEMES
Copyright to IJIREEICE
390
s s
inverse trend:
i,2 j
inverse detail:
i,2 j 1
i,2 j
i,2 j 1
i,2 j 1
i,2 j
2
, j 0,1,...,
Details with
respect to y
Trend
L2
L2
Details with
respect to x
, j 0,1,...,
L2
L2
L1
Details with
respect to xy
L1
L1
Fig. 5. Haar Lifting at Level 1 and Level 2 (L1 & L2)
inverse trend:
si,2 j si,2 j
n1
n1
(4.1)
)
(4.2)
where
n
is
the
transformation
level
and
w
and
h represent the
inverse detail:
n
si ,2 j 1 si ,2 j 1 1si ,2 j si, 2 j 2 , j 0,1,...,
(3.8) number of pixels in the width a nd height of the image,
respectively. If the trends section of a distorted image is used,
2
2
the maximum message size is calculated using 4.1. If the
IV.
INFORMATION HIDING PROCESS JJJ.
details section of a distorted image is used then the maximum
Characters in the ASCII code can be represented using 8 size is calculated using 4.2.
bits. The value of lifting coefficients can be manipulated
slightly without being noticed by visual inspection after the A. Process of Adding a Message
image is reconstructed using the manipulated lifting
4
Copyright to IJIREEICE
(3.7)
www.ijireeice.com
391
Copyright to IJIREEICE
www.ijireeice.com
392
CONCLUSIONS
Copyright to IJIREEICE
www.ijireeice.com
393