• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (2), 2013
  3. 181-190
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 181-190
crossmark

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
Research Article

Graceful Labeling of Assignable Information Hiding in Image

G. Sathiamoorthy, T.N. Janakiraman, N. Sairam, N.R. Raajan, K.S. Mathavan, P. Praveenkumar, R. Krishnakumar, M. Malligaraj and K. Karthikeyan

ABSTRACT


Ever since the world war, the call for information security raised. The explosion in World Trade Centre alarmed the people to work more towards secured travel of data. Then Steganography came to rescue, as here communication is also obscured. In many of the applications size of the secret data will be less than that of the size of the Cover Image which results in wastage of bandwidth. In this proposed study, multi-user embedding is carried out and is implemented for 5 users. Secret data of all the users is first encrypted by using Advanced Encryption Standarad (AES) and then by Ron Rivest, Adi shamir and Leonard Adleman(RSA) which escalates the complexity. A graceful graph is used for fixing the randomized order of embedding. Priority in the order of embedding among the five users will be changed during every cycle.
PDF Abstract XML References Citation
Received: April 29, 2013;   Accepted: June 17, 2013;   Published: August 01, 2013

How to cite this article

G. Sathiamoorthy, T.N. Janakiraman, N. Sairam, N.R. Raajan, K.S. Mathavan, P. Praveenkumar, R. Krishnakumar, M. Malligaraj and K. Karthikeyan, 2013. Graceful Labeling of Assignable Information Hiding in Image. Research Journal of Information Technology, 5: 181-190.

URL: https://scialert.net/abstract/?doi=rjit.2013.181.190

Search


INTRODUCTION


The hackers also grew up to counter these safety measures. Rupert Murdoch, Julian Assange to name a few. Hence, Emphasis given on a powerful algorithm. Conventional steganography involves the concept of one image per user, where only one user can embed the information within an image. The proposed work here has gone up a level where up to five users can use a single colour image to embed and transmit their data. Each user has been assigned a pixel to embed ones data and after embedding, one has to go to other pixel for embedding which will be determined by the Graceful Labeling methodology and the order of user index will be all combinations of five users i.e., 1, 2, 3, 4, 5; 3, 1, 4, 2, 5 and so on. This introduces the randomization in the order of embedding. Randomization in the selection of planes is done by using a slightly altered PIT. The strength of the whole system is enhanced further by the RSA public crypto system and AES. Each user first has to encrypt his data by using AES and then RSA will be employed. This Randomized multi-user steganography amplify the strength of the system and thus making attack nohow. Finally the quality of the proposed system is justified using the parameters MSE and PSNR.

A decade back, Information technology was just a branch of study. But now it’s become the way of life with so many developments and new technology added in it. In the world of internet, people have reached such great heights that anything is just but surely possible. The communication sector taking IT and its developments as a platform has also made renovations in itself. The Stone Age communication was replaced by paper and then to the mobiles, then was the computer laptops and presently we are in the TAB’s era.

This all innovations exhibit major platform is the Internet and again the base being the Information technology. With so many advantages of IT, there are again equivalent or rather more number of disadvantages and one of the major being security. The security of data in this mode of communication is almost nothing. A deeper insight into it, leads to a conclusion that the inventor of the technology is itself the creator the security issues.

So to tackle such crisis of security, lot of new methods and algorithms of encryption for the data have been formulated and were collectively called “Cryptography”. The then efficient means of security for the data was widely accepted. But over time, as this method leaves out traces of data modification, the search started again.

Then into the race was steganography, with much vibrant and safer algorithms to just tackle any security in any domain. May it be audio, video, or images. Every form of communication has just the place for steganography as its principles are simple but with lot of security. The concept of steganography deals simply with a cover image, which hides (Karzenbeisser and Perircolas, 2000; Provos and Honeyman, 2003) the secret information in it. The cover being a very common image has a lot of pixel modification being done to it with many randomizations in the bits.

The changed image is now again retrieved back to its original form, but still keeping the bits just in place. This piece of technology has reached ever dreaming heights of security (Marvel et al., 1999) and the end still to be discovered.

The color image steganography (Petitcolas et al., 1999) is a most widely used technique used in the field of information hiding. The steganographic techniques used keeps the existence of the data secret. LSB substitution (Thien and Lin, 2003; Chan and Cheng, 2004; Yang, 2008) is a simple technique in spatial domain steganography .It involves the substitution of least significant bits of the image pixels, by the secret data in binary format.

RSA is an effective algorithm for public-key cryptosystem (Rivest et al., 1978). This is the first cryptoscheme cognized to be worthy for signing as well as encryption and was one of the first groovy advances of public-key cryptoprotocol. A involves key generation, encryption and decryption. The secret data is encrypted (Karzenbeisser and Perircolas, 2000) with a public-key which is known to all. It can only be decrypted by a private key.

The planes in which the data is embedded can be controlled by a technique called the Pixel indicator (Gutub et al., 2008; Gutub, 2010; Amirtharajan and Balaguru, 2009; Amirtharajan et al., 2010a, b, c, 2011, 2012). The pixel indicator technique assigns one of the three planes as the indicator channel and based on the last two bits of the indicator channel the embedding is done in the other two planes. The embedding order in the planes can be changed for increasing the complexity of the algorithm. In this proposed study, the conventional pixel indicator has been changed. If the LSB is 0 the embedding is done in the blue plane and if the LSB is 1 the embedding is done in the green plane.

Sometimes the same image can be used by the different users for embedding their data (Padmaa et al., 2011).

Graphs considered in this paper are simple, tree, finite and undirected. In general G (V, E) denotes the graph G with vertex set V (G) and edge set E (G), such that |V (G)| = p , |E (G)| = q. A labeling of the vertices of G with the numbers from 0 to q is an injective map f: V→{0, 1,..., q}. Let G: E →{1, 2, …, q} be a bijective. Then a graph G is graceful (Rosa, 1967) introduced as a β-valuation), if there exists a labeling of its vertices and edges with the condition for all u, v εV (G) with u vεE (G) such that g (u v) = | f (u)-f (v)|.

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 1: A Random Tree in which its branches are non decreasing order

The same type of analysis by Golomb (1972) is called Graceful labeling. An extensive survey of contributions to graceful labeling of variety of graphs is made (Gallian, 2011).The structure of the graceful labeling is shown in the Fig. 1.

Let Pn(s1-s2-…-sn) be basic path of TS(n) tree. The vertices of the path Pn are also termed as supporting vertices of TS(n) tree. In TS(n) at each si, a star Si hangs with i branches having centre ci with one of the branch vertices of Si is merged with si. The special tree with hanging stars whose branches satisfy the condition |E (S1)| = |E (S2)| = …= |E (Sn)| (non-decreasing number of branches in the hanging stars).

Let TS(n) be a tree with n stars T1, T2, ..., Tn be stars with |v(si)| = i for i = 1, 2, 3,..., n. Free leaves of each of the stars Si are denoted by uim for i = 1, 2 ,…, n.

Let T1, T2, …, Tn be the central values of the stars S1, S2, S3, …, Sn respectively. It can be verified that|V(Ts(n))| = |V(S1)|+|V(S2) |+…+|V(Sn)|and |E(Ts(n))| = |E(S1)|+|E(S2) |+ …+ |E(Sn)| +(n-1).

Let |E(Si)| = qi for i = 1, 2, …, n and Q= q1+q2+…+qn+(n-1). Labeling of vertices in general denoted by l(v):

• l (s1) = 0; l (c1) = Q; l (c2) = q1 and l (s2) = Q-q1
• l(c2j +1) = Q- (Image for - Graceful Labeling of Assignable Information Hiding in Image), j = 1
• l(c2j) = Image for - Graceful Labeling of Assignable Information Hiding in Image, j = 1.
• l(s2j) = Q - (Image for - Graceful Labeling of Assignable Information Hiding in Image), j = 1.
• l(s2j+1) = Image for - Graceful Labeling of Assignable Information Hiding in Image, j = 1

Let the users in growing ith star of TS(i) at si be ui1, ui2, …, uin.

Let the users in S1 are labeled with values 1 to q1-1. Then for i = 1, the labeling of users in odd stars of S2i+1 based on its supporting vertex s2i+1 as follows:

• Labeling of users in S2i + 1 is {integers starting from l(c2i) + 1 to the number of users in the particular star assigned in ascending order except the value of l(s2i +1)}

The labeling of users in even stars S2i based on its supporting vertex s2i as follows.

• Labeling of users in S2i is {integers starting from l(c2i-1)-1 to the number of users in the particular branch assigned in descending order except the value of l(s2i)}

The labeling of Si’s in which s2i+1, i≥1 are increasing order and s2i, i = 2 are decreasing order in relation with q.

PROPOSED ALGORITHM

In the conventional Image Steganography (Amirtharajan et al., 2010a-c, 2011, 2012; Janakiraman et al., 2012; Thanikaiselvan et al., 2011) algorithms mostly one user will use one image for his covert communication. In many of the Stego (Karzenbeisser and Perircolas, 2000) applications size of the secret data will be less than that of the size of the carrier (Cover Image). This is equivalent to the wastage of bandwidth in a good communication Padmaa et al. (2011) proposed a method, where in embedding of two user’s data in the same image with high non linearity which is essential for security.

In this proposed study, a novel method for multi-user embedding is proposed as shown in Fig. 2 and implementation is done for 5 users and has been tabulated.

Secret data of all the users will be first encrypted by using AES and then RSA will be employed which escalates the complexity. A graceful graph (Janakiraman and Sathiamoorthy, 2011) has been used for fixing the randomized order of embedding. Priority in the order of embedding among the five users will be changed during every cycle. This precedence is provided by taking all 120 combinations (5!) which introduces more randomness (Lu et al., 2009; Amirtharajan and Rayappan, 2012a, b; Bandyopadhyay et al., 2008; Schneier, 2007) in the order of embedding.

Complexity has reached to next level by slightly modified PI technique where LSB of the Red Channel will indicate the embedding in the other two channels. This scheme can be effectively employed in Banks, Office, Universities, etc., where resource sharing by multiple users are involved.

Embedding algorithm:

• Inputs: Secret data (DU) from all the 5 users, Coverimage (C) and the number of bits to be embedded in each pixel for all the users (which may differ for one from the other)
• Output: Stego image(S) with the entire user’s data embedded in it

Image for - Graceful Labeling of Assignable Information Hiding in Image

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 2: Flowchart of the proposed methodology

Recovery algorithm:

• Input: Stego image(S) with the entire user’s data embedded in it
• Output: Secret data (DU) of all the 5 users

Image for - Graceful Labeling of Assignable Information Hiding in Image

ERROR METRICS

Parameters that are helpful in estimating the standard of the Stego (Sutaone and Khandare, 2008) object are MSE and PSNR. The Mean Square Error is calculated by using the equation:

Image for - Graceful Labeling of Assignable Information Hiding in Image

where, Xi, j is Stego value and Yi,j is the cover object.

The PSNR is calculated using the Eq.:

Image for - Graceful Labeling of Assignable Information Hiding in Image

where, Imax is the intensity value of each pixel, which is equal to 255 for 8-bit gray scale images.

Higher the value of PSNR betters the image quality. Here in implementation Tree, Football, Lena and baboon (256x256) color digital images has been taken as cover images and tested for full embedding capacity. The effectiveness of the Stego process proposed has been studied by calculating MSE and PSNR for all the four digital images in RGB planes and displayed in Table 1.

Table 1: Results obtained through number of bits embedded on the respective images
Image for - Graceful Labeling of Assignable Information Hiding in Image

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 3: Sample images taken as cover images

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 4: Images after processing of stego

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 5(a-f): k=1 bit embedding users (a) Red plane of cover, (b) Red plane of stego, (c) Green plane of cover, (d) Green plane of stego, (e) Blue plane of cover and (f) Blue plane of stego

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 6(a-f): k=2 bit embedding for all users, (a) Red plane of cover, (b) Red plane of stego, (c) Green plane of cover, (d) green plane of stego, (e) Blue plane of cover and (f) Blue plane of stego

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 7(a-f): k=3 bit embedding for all users, (a) Red plane of cover, (b) Red plane of stego, (c) Green plane of cover, (d) green plane of stego, (e) Blue plane of cover and (f) Blue plane of stego

Image for - Graceful Labeling of Assignable Information Hiding in Image
Fig. 8(a-f): k=4 bit embedding for all users, (a) Red plane of cover, (b) Red plane of stego, (c) Green plane of cover, (d) green plane of stego, (e) Blue plane of cover and (f) Blue plane of stego

Figure 3 represents the cover images and Fig. 4 represents the stego image after processing. The following are the histograms that are obtained for k = 1, 2, 3 and 4 bit embedding in Lena image are given in Fig. 5, 6, 7 and 8, respectively.

CONCLUSION


Thus a Multi-user public Cryptic-Stego system has been implemented and data is embedded by using the LSB substitution (Mielikainen, 2006) method. And the randomization introduced by the concept of graceful labeling and the combinational user index in the order of embedding will puzzle the user and even he will not be aware of where his confidential data is hidden inside the carrier. Further the PI technique has been used for increasing the complexity. The data to be embedded is encrypted by Individual users using AES and the use of RSA for the public cryptography provides a two layer security. MSE and PSNR of the Stego image (Gonzalez and Woods, 2002) have been analyzed. From the experimental results given above, the system proves to be a good method and the complexity is increased. This can be applied in places where the resources are shared by many users.

REFERENCES


  1. Gutub, A.A.A., 2010. Pixel indicator technique for RGB image steganography. J. Emerg. Technol. Web Intell., 2: 56-64.
    CrossRefDirect Link

  2. Amirtharajan, R. and R.J.B. Balaguru, 2009. Tri-layer stego for enhanced security-a keyless random approach. Proceedings of the IEEE International Conference on Internet Multimedia Services Architecture and Applications, December 9-11, 2009, Bangalore, India, pp: 1-6.
    CrossRefDirect Link

  3. Amirtharajan, R., D. Adharsh, V. Vignesh and R.J.B. Balaguru, 2010. PVD blend with pixel indicator-OPAP composite for high fidelity steganography. Int. J. Comput. Applic., 7: 31-37.
    CrossRefDirect Link

  4. Amirtharajan, R., S.K. Behera, M.A. Swarup, K.M. Ashfaaq and J.B.B. Rayappan, 2010. Colour guided colour image steganography. Universal J. Comput. Sci. Eng. Technol., 1: 16-23.
    Direct Link

  5. Amirtharajan, R., G. Aishwarya, M. Rameshbabu and J.B.B. Rayappan, 2010. Optimum pixel and bit location for colour image stego-a distortion resistant approach. Int. J. Comput. Appl., 10: 17-24.
    CrossRefDirect Link

  6. Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6.
    CrossRef

  7. Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRefDirect Link

  8. Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRefDirect Link

  9. Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRefDirect Link

  10. Bandyopadhyay, S.K., D. Bhattacharyya, D. Ganguly, S. Mukherjee and P. Das, 2008. A secure scheme for image transformation. Proceedings of the 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, August 6-8, 2008, Phuket, Thailand, pp: 490-493.
    CrossRef

  11. Schneier, B., 2007. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New Delhi, India, ISBN-13: 9788126513680, Pages: 784.

  12. Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
    CrossRefDirect Link

  13. Gallian, J.A.A., 2011. A dynamic survey of graceful labeling. Electron. J. Comb.
    Direct Link

  14. Golomb, S.W., 1972. How to Number a Graph. In: Graph Theory and Computing, Read, R.C. (Ed.). Academic Press, New York, USA., pp: 23-37.

  15. Gutub, A., M. Ankeer, M. Abu-Ghalioun, A. Shaheen and A. Alvi, 2008. Pixel indicator high capacity technique for RGB image based steganography. Proceedings of the 5th IEEE International Workshop on Signal Processing and its Applications, March 18-20, 2008, Sharjah, UAE.

  16. Janakiraman, T.N. and G. Sathiamoorthy, 2011. Graceful labeling of a family of special tree with hanging stars having non-decreasing number of branches in random order. Int. J. Eng. Sci. Adv. Comput. BioTechnol., 2: 130-138.

  17. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRefDirect Link

  18. Karzenbeisser, S. and F.A.P. Perircolas, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, UK., ISBN: 9781580530354, Pages: 220.

  19. Marvel, L.M., C.G. Boncelet and C.T. Retter, 1999. Spread spectrum image steganography. IEEE Trans. Image Process., 8: 1075-1083.
    CrossRefDirect Link

  20. Mielikainen, J., 2006. LSB matching revisited. IEEE Signal Process. Lett., 13: 285-287.
    CrossRefDirect Link

  21. Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRefDirect Link

  22. Petitcolas, F.A.P., R.J. Anderson and M.G. Kuhn, 1999. Information hiding-a survey. Proc. IEEE, 87: 1062-1078.
    CrossRefDirect Link

  23. Provos, N. and P. Honeyman, 2003. Hide and seek: An introduction to steganography. IEEE Secur. Privacy, 1: 32-44.
    CrossRef

  24. Gonzalez, R.C. and R.E. Woods, 2002. Digital Image Processing. 2nd Edn., Prentice Hall, New Jersey, USA., ISBN-10: 8120327586, Pages: 793.

  25. Rivest, R.L., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM., 21: 120-126.
    CrossRefDirect Link

  26. Rosa, A., 1967. On certain valuations of the vertices of a graph. Proceedings of the International Symposium on Theory of Graphs, July, 1966, Rome, Italy, pp: 349-355.

  27. Sutaone, M.S. and M.V. Khandare, 2008. Image based steganography using LSB insertion technique. Proceedings of the IET International Conference on Wireless, Mobile and Multimedia Networks, January 11-12, 2008, Mumbai, India, pp: 146-151.
    Direct Link

  28. Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link

  29. Thien, C.C. and J.C. Lin, 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognit., 36: 2875-2881.
    CrossRefDirect Link

  30. Lu, T.C., S.R. Liao, P.L. Chen, C.C.C. Chang and Z.H. Wang, 2009. Information hiding technology based on block-segmentation strategy. Proceedings of the ISECS International Colloquium on Computing on Communication, Control and Management, Volume 1, August 8-9, 2009, Sanya, pp: 500-506.
    CrossRef

  31. Yang, C.H., 2008. Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognit., 41: 2674-2683.
    CrossRefDirect Link

Search


Related Articles

Inverted Pattern in Inverted Time Domain for Icon Steganography
Random Image Steganography and Steganalysis: Present Status and Future Directions
Pixel Forefinger for Gray in Color: A Layer by Layer Stego
Stego on 2n:1 Platform for Users and Embedding

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved