Skin Tone Based Secret Data Hiding in Images Using Wavelet Transform

Authors

  • JEEVAN KISHOR GANGEPOGU VARDHAM COLLEGE OF ENGINEERING
  • Harini Vemula VARDHAMAN COLLEGE OF ENGINEERING

Keywords:

Biometrics, Skin tone detection, DWT, DCT, Cropping, secret key, Security, PSNR.

Abstract

Biometric feature accustomed implement steganography is skin tone region of pictures. Here secret information is embedded inside skin region of image that may offer a wonderful secure location for information activity. For this skin tone detection is performed exploitation HSV (Hue, Saturation and Value) colour area to boot secret information embedding is performed exploitation frequency domain approach – DWT (Discrete rippling Transform), DWT outperforms than DCT (Discrete Cosine Transform). Secret data is hidden in one in all the high frequency sub-band of DWT by tracing skin pixels therein sub-band. Four bit secret key and cropping results into associate degree increased security than activity information without cropping i.e. in whole image therefore cropped region works as a key at secret writing aspect. This study shows that by adopting an object orienting steganography mechanism, in the sense that, we have a tendency to track skin tone objects in image, we get a higher security

 

 

Author Biographies

JEEVAN KISHOR GANGEPOGU, VARDHAM COLLEGE OF ENGINEERING

ELECTRONICS AND COMMUNICATION ENGINEERING

Harini Vemula, VARDHAMAN COLLEGE OF ENGINEERING

ELECTRONICS AND COMMUNICATIONS ENGINEERING

References

A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Biometric inspired digital image Steganography”, in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS’08), Belfast, 2008, pp. 159-168.[2] Petitcolas, F.A.P.: “Introduction to info Hiding”. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) info activity Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.[3] Lin, E. T. and Delp, E. J.:“A Review of information activity in Digital Images”. Retrieved on one.Dec.2006 from laptop Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr 1999[4] Johnson, N. F. and Jajodia, S.: “Exploring Steganography: Seeing the Unseen.” IEEE laptop, thirty one (2): 26-34, Feb 1998.7

Fridrich, J., Goljan, M. and Du, R.., (2001). “Reliable Detection ofLSB Steganography in Grayscale and Colour pictures.” Proceedings of ACM, session on multimedia system Security and Watermarking, Ottawa, Canada, October 5, 2001, pp. 27- 30.[6] Po-Yueh subgenus Chen and Hung-Ju designer “A DWT primarily based Approach for Image Steganography”, International Journal of subject area and Engineering, 2006. 4, 3: 275-290 [7] Chang, C. C., Chen, T.S and Chung, L. Z., ”A steganographic methodology based upon JPEG and quantisation table modification,” info Sciences, vol.[4], pp. 123-138(2002).[8] Provos,N. and Honeyman, P: “Hide and Seek: Associate in Nursing introduction to steganography”. IEEE security and privacy, 01 (3): 32-44,May-June 2003[9] Abbas Chedda, Joan Condell, Kevin Curran and Paul megacycle Kevitt “A Skin Tone Detection formula for Associate in Nursing adaptational Approach to Steganography” , college of Computing and Intelligent Systems, Faculty of Computing and Engineering, University of Ulster, BT48 7JL, Londonderry, European country, UK,2008 [10] Ahmed E., Crystal M. and Dunxu H.: “Skin Detection-a short Tutorial”, reference of biometry by Springer-Verlag Berlin Heidelberg 2009[11] Sobottka, K. and Pitas, I.:”Extraction of facial regionsand options using Colour and form info.” Proc. IEEE International Conference on Image process, pp. 483-486.(1996)8

Downloads

Published

2013-10-17

How to Cite

GANGEPOGU, J. K., & Vemula, H. (2013). Skin Tone Based Secret Data Hiding in Images Using Wavelet Transform. International Journal of Computer (IJC), 9(1), 1–8. Retrieved from https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/218

Issue

Section

Articles