Steganography Based on Human Perception

Today internet has become a trusted factotum of everyone. Almost all payments like tax, insurance, bank transaction, healthcare payment, payment in e-commerce are done digitally through debit or credit card or through e-wallet. People share their personal information through social media like Facebook. Twitter, WhatsApp etc. The government of every developing country is going to embrace e-Governance system to interact with people more promptly. The information shares through these applications are the burning target to intruders. This paper utilized the imperceptibility as well as the robustness of steganography techniques which are increased by embedding multiple bits in a particular region selected either based on some image attributes or by Human Visual Perception. oriental Journal of Computer Science and technology Journal Website: www.computerscijournal.org ISSN: 0974-6471, Vol. 10, No. (4) 2017, Pg. 817-823


introduction
In the field of Data Communication, security-issues have got the top priority.So, of late the degree of security provided by a security tool has become the main evolutionary criteria of it.Classical cryptography is one of the ways to secure plain text messages.Along with that at the time of data transmission, security is also implemented by introducing the concept of steganography, watermarking, etc.In this types of combined approach, there exits some drawbacks.In remote networking, at the time of transmission of hidden encrypted text message, if the eavesdroppers get the track of the hidden text, then they could easily get the encrypted text.Now breaking of encrypted text message can be achieved by applying some brute force technique.So, there remains some probability of snooping of information.So, this type of techniques incurs another level of security which can route the Crypto-analyzer or Stegoanalyzer in a different direction.
Different techniques are already plays an important role in the field to information security for a long decade.The famous one is cryptography that keeps the content of the message secret, but it is not sufficient at all.On the other hand the watermarking hides data to keep copyright related information 1-2 .It is also not secure at all because many techniques are available to remove watermark easily.Now-a-days people prefer a system that hides the existence of message secret.The technique, Steganography highlights the concept of security through obscurity.
The word "Steganography" is the combination of two Greek words Stegano(Cover) and Grafia(Writing) and its aim is "to hide in plain sight" 3 .It has been used throughout 2500 years and was coined at the end of the 15 th Century after the appearance of Trithemius book on the subject "Steganographia".Modern steganography is generally understood to deal with electronic media rather than physical objects.The synopsis introduces noble methods of steganography by considering Image and Audio as cover media.
The rapid use of digital images for communication through internet makes image a popular cover media in steganography.Not only this reason, there are some other factors like content adaptability, redundancy, limited power of HVS, continuous growth of strong graphics power in computer, and the fruitful contribution of the researcher in the field of digital image processing also stand behind this popularity 4 .The reason for considering audio as cover media is the representation of amplitudes in real number format causes very small distortions after embedding the bits of target data.Instead of that the audio also has some unique characteristics like gradual change in amplitudes rather than sudden change, high frequency suppress lower frequency components etc., whereas the strong sensitivity of Human Auditory System (HAS) makes audio steganography a more challenging security technique 5 .The proposed work designs some new approaches which are efficient and gives researchers an opportunity to come up with new ideas in information security.

literature Survey
The better understanding on different state-of-theart works is very helpful for the validation of new implementation and also analyzing its performance accuracy in terms of security.The synopsis starts with the solution of the loopholes of standard LSb technique and then tries to enrich the thoughts.The standard LSb technique is very easy to implement where the Least Significant bit of a pixel/samples of cover media is replaced with target bit 6 .The method can preserve imperceptibility but suffers from low robustness and capacity.T. Penvy et al. introduce a secure steganography algorithm HUGO which can able to defeat almost all steganalysis attacks by defining distortion based on feature vector already used in steganalysis.It supports capacity of stego media seven times more than standard LSb technique.However, the results were not satisfying at all in the case of multi-bit approach 7 9 .The all above discussion does not meet robustness up to the level.The robustness of the LSb Substitution technique may increase by embedding data at higher LSb layer or through embedding at random positions of the cover and also introducing double layer security.N. Cvejic et al., in their work embeds target data at the higher bit-plane then preserves quality through bit adjustment.

Proposed method
Human visual perception is the ability to interpret the surrounding environment using light in the visible spectrum reflected by the objects in the environment.Color creates a clear sensation about an object to human eye.The color perception is a subjective process is controlled by three cone cells -"red" (64 %), "green" (32 %), and "blue" (2 %).The green and red cones are concentrated in the fovea centralis whereas the "blue" cones are mostly found outside the fovea but have highest sensitivity and leading to some distinctions in the eye's blue perception.The absorption and sensitivity curve in Figure 1 support this thought and it is suggested that some selective "blue amplifier" somewhere in the brain makes some boosting mechanism to blue light.

Fig. 1: absorption and Sensitivity curve
The embedding is done on Red and Green Channel whereas the blue channel keeps unchanged for region selection and channel selection during embedding at blue region.Human visual perception is more sensitive to blue color which claims more careful embedding at blue region than the embedding at non-blue region.In blue region the three target bits are embedded in each of the selected channel.In non-blue region three bits of target data are embedded in each color channel helps in the increase of capacity.The result and analysis shows that the method successfully meets three challenges of steganography.The results and analysis are shown in Figure 2 and Table 1.The HVS depends on three different independent attributes of HSV model -Hue, Saturation and Value.Among these the Saturation and Hue is responsible for brightness.The method first converts the color RGb image into HSV image.Then consider S and V component and perform fusion among them.The brighter and Non-brighter region is now segregated from this fused image based on some threshold.The threshold selection phase initially selects two thresholds -upper and lower based on statistical analysis and Weber Constant.The final threshold is calculated based these two thresholds and the message length.Embedding of secret data is done on both the region but in different capacity using the proposed method.The target bits are embedded in those pixel region which are fully belongs to its corresponding region with their 8 neighbours.The boundary pixels are not considered for proper extraction of target data at the receiver side.before embedding secret data is compressed based on the method and then two bits of target data is embedded in each color channel (i.e. one character) of bright region whereas four bits of target data in color channel (i.e. two character) of non-bright region.The proposed method helps in increase capacity with high robustness by maintaining imperceptibility.The result and analyses are shown in Figure 3,Figure 4, Table 2 and Table 3.

Fig. 2 :
Fig. 2: Sample results.Cover images, image with segmented Blue & non-Blue region and Stego images

Fig
Fig. 3: HSV model Figure 4 (a) Cover image.(b) -(g) the steps for the selection of brightness region table 2: Sample results . b. C. Nguyen et al., improves the capacity of LSb substitution techniques by introducing popular multi bit-plane image steganography technique.The increase in capacity again reduces imperceptibility 8 .W. C. kuo et al., increases capacity by embedding multiple bits of target data encoded through runlength encoding (RLE), but maintain imperceptibility by considering Multi-bit Generalized Exploiting Modification Direction (MGEMD) characteristics.MGEMD features not only reduce distortion but help to resist modern steganalysis attacks