1
1
1. Introduction2
1.1 Problem Specification..2
1.2 Objective..2
2. Literature review....4
2.1 Image....4
2.2 MATLAB.6
2.3 Secure Image Transmission..7
3. Design9
3.1 Mosaic Image Creation.. 10
3.2 Image Recovery. 11
4. Partial Results... 15
5. Conclusion. 24
References... 26
1. INTRODUCTION
Currently, images from various sources are frequently utilized and transmitted through the
internet for various applications, such as online personal photograph albums, confidential
1
enterprise archives, document storage systems, medical imaging systems, and military image
databases. These images usually contain private or confidential information so that they should
be protected from leakages during transmissions.
The common approaches for secure image transmission are
1. Image Encryption
2. Data Hiding
Image Encryption is a technique where the data is modified using some key. The data is
modified according to the technique. In this approach there is a possibility of hacking the data
because the hacker may observe the pattern of change in the data.
To avoid that problem data hiding technique is being used. In data hiding technique the
secret image is being hidden into a cover image so that no one can realize the existence of data
behind that. The various data hiding techniques are LSB substitution, Histogram shifting,
prediction error expansion, recursive histogram modification, discrete cosine transformation.
All the above mentioned data hiding techniques results in distortion of the images.
1.2 Objective
The objective is to transmit the images securely with the same size and provide
confidentiality to the images.
For this purpose we transform the secret image into a meaningful mosaic image with the
same size and which looks similar as a target image which is selected priorly.
At first we select an image for transforming the secret image into that image. The
preselected image is called as Target Image. The secret image is divided into tiles and the target
image is divided into blocks. Color transformations are done on the tiles so as to resemble as the
blocks. Later one-one mapping is done and a mosaic image is formed.
2
Some information is embedded into the mosaic image for better security and also to recover
the image losslessly.
2. LITERATURE SURVEY
2.1 Image
An image is essentially a 2-D signal processed by the human visual system. The signals
representing images are usually in analog form. However, for image processing, storage and
transmission, they are converted from analog to digital form. A digital image is basically a 2-D
array of pixels. Images are formed of the significant part of data, particularly in remote sensing,
biomedical and video conferencing applications. The use of and dependence on information and
computers continue to grow, so does our need for efficient ways of storing and transmitting large
amounts of data.
2.1.1 Pixel
In digital image, a pixel is a single point in a raster image. It is the smallest unit of picture
that can be controlled, and is the smallest addressable screen element as shown in Fig. 2.1. Each
pixel has its own address. The address of a pixel corresponds to its coordinates. They are usually
arranged in a 2-D grid, and are often represented with dots or squares. Each pixel is a sample of
an original image. More samples typically provide more accurate representations of the original.
The intensity of each pixel is variable. In color image systems, a color is typically represented by
three or four component intensities such as red, green, and blue.
maximum.
with
This
range
incremental
is
steps
according to the bit-depth of the image. The greater the number of steps is, the larger the bitdepth is. If each intensity value is represented as an 8-bit number, then there are 256 variations.
If the intensity values are represented as 16-bit numbers, there are 32,000 variations between
absolute black and pure white. Fig. 2.4 demonstrates a black to white gradient in 4-bits of
intensity.
2.2 MATLAB
MATLAB is a multi-paradigm numerical computing environment and fourth generation
programming language. A proprietary programming language developed by MATHWORKS.
MATLAB allows matrix manipulations, plotting of functions and data, implementation of
algorithms, creation of user interfaces, and interfacing with programs written in other languages
including C, C++, Java, Fortran and Python.
This technique converts original image to another image which is hard to understand and
to keeps the image confidential between users, in other word, its important that without
decryption key no one can access the content. Image encryption has applications in internet
communication, multimedia systems, medical imaging, telemedicine, military communication
etc. For privacy protection of digital images, encrypted databases is an important technological
capability in multiparty information management.
And the other is data hiding. In data hiding we cover our image with other image so that
no one can realize the existence of other image behind that cover image.
raster scan to improve the stego image quality by adapting an inverted pattern (IP) approach. In
this technique, secret message has been processed prior to embedding .
The main disadvantage of this is its low embedding capacity.
3. DESIGN
In the design phase actual flow of the process will be shown. In this technique there are two
phases. One is the creation of mosaic image and the other is image recovery.
The flow of the process can be shown in the below figure
Target Image
1.
Mosaic creation
Secret image
1.2 Transform the color
characteristics of the
image blocks
Mosaic
image
2. Image Recovery
2.2 recover secret
image
Target image
Secret image
Transform the
color
characteristics
Rotate the
blocks in
direction with
minimum
RMSE
Embed relevant
information
Mosaic image
10
Extract the
embedded
information
Secret image
Fitting the tile images of the secret image into the target blocks of the pre-selected target
ii.
image
Transforming the color characteristics of each tile image to become that of the
iii.
iv.
11
i.
ii.
Algorithm flow
Phase 1
Stage 1 . Fitting the tile images into the target blocks.
Step 1: Here first we need to compare the sizes of the target and secret image sizes if they are
not equal we need to resize and equalize them and divide the secret image into tile
images {T1,T2,T3.........................Tn} and also the target image as {B1,B2BN}
and each Ti, Bj belongs to size of Nt.
Step 2: Then calculate both mean and standard deviation for each tile image
Ti
and target
image
Bj
respectively.
c =
1
c (3.1)
n i=1 i
'c =
1
c , (3.2)
n i=1 i
c = 1/n ( c ic )
i=1
.. ..(3.3)
S title ={T 1 .T 2 ,T 3 T n
as
12
S target =
B 1 , B 2 B3 . B N
and
standard deviation values we need to map the two tile image set to the target blocks in
1-to-1 manner then resulting mapping sequence L of the form T1
Bj1.TN Bjn
Step 4: so create the mosaic image F by fitting the tile images into the corresponding blocks
according to L.
Stage 2: performing color transformation
For color transformation we use
} = {q} rsub {c} left ({c} rsub {i} - {} rsub {c} right ) + {} rsub {c} rsup {'}
ci
. (3.4)
Stage 3: Rotating Images
For each colored transformed tile image
corresponding target block
B Ji
T1
after rotating
Ti
into directios of
=0,90,180,270,360
respectively.
Stage 4: embedding
Now we embed the relevant information into the image.
Construct a bit stream Mi including
1.
2.
3.
4.
Mi
T1
ji of
the block
B ij
in F corresponding to
Ti
Ti
; 3)
the means
of
Ti
and
B ij
Ti
Ti
Step2: use the extracted means and related standard deviation quotients to recover the original
pixel values in
Ti
Step 3: combine the all final tile images to get desired secret image T.
14
4. RESULTS
1.
15
//* green
component
//* blue
component
16
//*blue component
17
Fig4.5. Pixel intensities of red, green and blue colors of target image
Divide the secret image into tiles with 4*4as the size
18
19
Dividing the target image into blocks with 4*4 size each
20
21
22
The process which is used for calculating the standard deviation values of tiles is repeated for
blocks in order to get the standard deviation values for blocks.
Fig 4.16 Ascending order of standard deviation values of tiles and their indices
Fig 4.17 Ascending order of standard deviation values of blocks and their indices
23
5. CONCLUSION
For providing security to the images data hiding technique is being used where a mosaic image is
created from target image and secret image.
In this process first step of mosaic image creation is done i.e., diving the images into
tiles and blocks and calculating their standard deviation values is done.
Further steps of the process has to be implemented.
24
REFERENCES
[1] C. H. Yang Inverted Pattern Approach to improve image quality of information hiding by
LSB substitution, Pattern Recognition., vol. 41 no. 8. Pp. 2647-2683, 2008.
[2] C. k. Chan and L. M. Cheng. Hiding data in images by LSB substitution, Pattern
Recognition vol 37, pp.469-47 Mar. 2004.
[3] J. Lai and W.H.Tsai, , Secret-fragment-visible mosaic imageA new computer art and its
Application to information hiding,IEEE Trans. Inf. Forens. Secur., vol.6, no. 3, pp. 936945, Sep. 2011.
[4] W. Zhang, X. Hu, X. Li, and N. Yu, Recursive histogram modification:Establishing
Equivalency between reversible data hiding and lossless data compression, IEEE Trans.
Image Process., vol. 22, no. 7,pp.2775-2785, Jul. 2013.
[5] C. C. Chang.C. C. Linc, C. S. Tseng, and W. L. Tai, Reversible hiding in DCT-based
Compressed images, Inf. Sci., vol. 177, no. 13, pp. 2768-2786, 2007.
25
26