SlideShare a Scribd company logo
1 of 7
Steganography Using Reversible Texture Synthesis
ABSTRACT:
We propose a novel approach for steganography using a reversible texture
synthesis. A texture synthesis process resamples a smaller texture image, which
synthesizes a new texture image with a similar local appearance and an arbitrary
size. We weave the texture synthesis process into steganography to conceal secret
messages. In contrast to using an existing cover image to hide messages, our
algorithm conceals the source texture image and embeds secret messages through
the process of texture synthesis. This allows us to extract the secret messages and
source texture from a stego synthetic texture. Our approach offers three distinct
advantages. First, our scheme offers the embedding capacity that is proportional to
the size of the stego texture image. Second, a steganalytic algorithm is not likely to
defeat our steganographic approach. Third, the reversible capability inherited from
our scheme provides functionality, which allows recovery of the source texture.
Experimental results have verified that our proposed algorithm can provide various
numbers of embedding capacities, produce a visually plausible texture images, and
recover the source texture.
EXISTING SYSTEM:
 Most image steganographic algorithms adopt an existing image as a cover
medium. The expense of embedding secret messages into this cover image is
the image distortion encountered in the stego image.
 The most recent work has focused on texture synthesis by example, in which
a source texture image is re-sampled using either pixel-based or patch-based
algorithms to produce a new synthesized texture image with similar local
appearance and arbitrary size.
 Otori and Kuriyama pioneered the work of combining data coding with
pixel-based texture synthesis. Secret messages to be concealed are encoded
into colored dotted patterns and they are directly painted on a blank image.
DISADVANTAGES OF EXISTING SYSTEM:
 Two Drawbacks of Existing system are:
 First, since the size of the cover image is fixed, the more secret messages
which are embedded allow for more image distortion. Consequently, a
compromise must be reached between the embedding capacity and the
image quality which results in the limited capacity provided in any specific
cover image. Recall that image steganalysis is an approach used to detect
secret messages hidden in the stego image.
 A stego image contains some distortion, and regardless of how minute it is,
this will interfere with the natural features of the cover image. This leads to
the second drawback because it is still possible that an image steganalytic
algorithm can defeat the image steganography and thus reveal that a hidden
message is being conveyed in a stego image.
PROPOSED SYSTEM:
 In this paper, we propose a novel approach for steganography using
reversible texture synthesis. A texture synthesis process re-samples a small
texture image drawn by an artist or captured in a photograph in order to
synthesize a new texture image with a similar local appearance and arbitrary
size.
 We weave the texture synthesis process into steganography concealing
secret messages as well as the source texture. In particular, in contrast to
using an existing cover image to hide messages, our algorithm conceals the
source texture image and embeds secret messages through the process of
texture synthesis. This allows us to extract the secret messages and the
sourcetexture from a stego synthetic texture.
 The three fundamental differences between our proposed message-oriented
texture synthesis and the conventional patchbased texture synthesis are
described in following: The first difference is the shape of the overlapped
area. During the conventional synthesis process, an L-shape overlapped area
is normally used to determine the similarity of every candidate patch. In
contrast, the shape of the overlapped area in our algorithm varies because we
have pasted source patches into the workbench. Consequently, our algorithm
needs to provide more flexibility in order to cope with a number of variable
shapes formed by the overlapped area.
ADVANTAGES OF PROPOSED SYSTEM:
 Our approachoffers three advantages.
 First, since the texture synthesis can synthesize an arbitrary size of texture
images, the embedding capacity which our scheme offers is proportional to
the size of the stego texture image.
 Secondly, a steganalytic algorithm is not likely to defeat this steganographic
approach since the stego texture image is composed of a source texture
rather than by modifying the existing image contents.
 Third, the reversible capability inherited from our scheme provides
functionality to recover the source texture. Since the recovered source
texture is exactly the same as the original source texture, it can be employed
to proceed onto the second round of secret messages for steganography if
needed.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : MATLAB
 Tool : MATLAB R 2007B
REFERENCE:
Kuo-Chen Wu and Chung-Ming Wang, Member, IEEE, “Steganography Using
Reversible Texture Synthesis”, IEEE TRANSACTIONS ON IMAGE
PROCESSING, VOL. 24, NO. 1, JANUARY 2015.
Steganography using reversible texture synthesis

More Related Content

More from jpstudcorner

More from jpstudcorner (20)

Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 
Optimal configuration of network
Optimal configuration of networkOptimal configuration of network
Optimal configuration of network
 
Multiview alignment hashing for
Multiview alignment hashing forMultiview alignment hashing for
Multiview alignment hashing for
 
Mobile data gathering with load balanced
Mobile data gathering with load balancedMobile data gathering with load balanced
Mobile data gathering with load balanced
 
Location aware and personalized
Location aware and personalizedLocation aware and personalized
Location aware and personalized
 
Learning fingerprint reconstruction
Learning fingerprint reconstructionLearning fingerprint reconstruction
Learning fingerprint reconstruction
 
Key recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyedKey recovery attacks on kids, a keyed
Key recovery attacks on kids, a keyed
 
Improved privacy preserving p2 p multimedia
Improved privacy preserving p2 p multimediaImproved privacy preserving p2 p multimedia
Improved privacy preserving p2 p multimedia
 
Identity based distributed provable data
Identity based distributed provable dataIdentity based distributed provable data
Identity based distributed provable data
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 

Steganography using reversible texture synthesis

  • 1. Steganography Using Reversible Texture Synthesis ABSTRACT: We propose a novel approach for steganography using a reversible texture synthesis. A texture synthesis process resamples a smaller texture image, which synthesizes a new texture image with a similar local appearance and an arbitrary size. We weave the texture synthesis process into steganography to conceal secret messages. In contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image and embeds secret messages through the process of texture synthesis. This allows us to extract the secret messages and source texture from a stego synthetic texture. Our approach offers three distinct advantages. First, our scheme offers the embedding capacity that is proportional to the size of the stego texture image. Second, a steganalytic algorithm is not likely to defeat our steganographic approach. Third, the reversible capability inherited from our scheme provides functionality, which allows recovery of the source texture. Experimental results have verified that our proposed algorithm can provide various numbers of embedding capacities, produce a visually plausible texture images, and recover the source texture.
  • 2. EXISTING SYSTEM:  Most image steganographic algorithms adopt an existing image as a cover medium. The expense of embedding secret messages into this cover image is the image distortion encountered in the stego image.  The most recent work has focused on texture synthesis by example, in which a source texture image is re-sampled using either pixel-based or patch-based algorithms to produce a new synthesized texture image with similar local appearance and arbitrary size.  Otori and Kuriyama pioneered the work of combining data coding with pixel-based texture synthesis. Secret messages to be concealed are encoded into colored dotted patterns and they are directly painted on a blank image. DISADVANTAGES OF EXISTING SYSTEM:  Two Drawbacks of Existing system are:  First, since the size of the cover image is fixed, the more secret messages which are embedded allow for more image distortion. Consequently, a compromise must be reached between the embedding capacity and the image quality which results in the limited capacity provided in any specific
  • 3. cover image. Recall that image steganalysis is an approach used to detect secret messages hidden in the stego image.  A stego image contains some distortion, and regardless of how minute it is, this will interfere with the natural features of the cover image. This leads to the second drawback because it is still possible that an image steganalytic algorithm can defeat the image steganography and thus reveal that a hidden message is being conveyed in a stego image. PROPOSED SYSTEM:  In this paper, we propose a novel approach for steganography using reversible texture synthesis. A texture synthesis process re-samples a small texture image drawn by an artist or captured in a photograph in order to synthesize a new texture image with a similar local appearance and arbitrary size.  We weave the texture synthesis process into steganography concealing secret messages as well as the source texture. In particular, in contrast to using an existing cover image to hide messages, our algorithm conceals the source texture image and embeds secret messages through the process of texture synthesis. This allows us to extract the secret messages and the sourcetexture from a stego synthetic texture.
  • 4.  The three fundamental differences between our proposed message-oriented texture synthesis and the conventional patchbased texture synthesis are described in following: The first difference is the shape of the overlapped area. During the conventional synthesis process, an L-shape overlapped area is normally used to determine the similarity of every candidate patch. In contrast, the shape of the overlapped area in our algorithm varies because we have pasted source patches into the workbench. Consequently, our algorithm needs to provide more flexibility in order to cope with a number of variable shapes formed by the overlapped area. ADVANTAGES OF PROPOSED SYSTEM:  Our approachoffers three advantages.  First, since the texture synthesis can synthesize an arbitrary size of texture images, the embedding capacity which our scheme offers is proportional to the size of the stego texture image.  Secondly, a steganalytic algorithm is not likely to defeat this steganographic approach since the stego texture image is composed of a source texture rather than by modifying the existing image contents.  Third, the reversible capability inherited from our scheme provides functionality to recover the source texture. Since the recovered source
  • 5. texture is exactly the same as the original source texture, it can be employed to proceed onto the second round of secret messages for steganography if needed. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 6.  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : MATLAB  Tool : MATLAB R 2007B REFERENCE: Kuo-Chen Wu and Chung-Ming Wang, Member, IEEE, “Steganography Using Reversible Texture Synthesis”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 24, NO. 1, JANUARY 2015.