A Robustness Steganographic Method Against Noise For RGB Images Based On PCA
A Robustness Steganographic Method Against Noise For RGB Images Based On PCA
are then embedded into the web page through the upper and
Abstract: In this paper an effective color image steganography lower cases of letters in HTML tags. When a watermarked
method based on Principle Component Analysis (PCA) is web page is tampered, the extracted watermarks can detect
proposed. After applying the PCA technique on the RGB the modifications to the web page. A. Abadpour and S.
trichromatic system, eigenimages obtained, the least significant Kasaei [7] use the PCA to compression and watermarking of
bit of the Eigenimages pixels value are replaced with the data color images. However steganography based on PCA
bits. Then inverse PCA applied and stego-image is resulted. The technique is typically a novel and first attempt scheme.
method used the correlation between the colors of RGB image.
The rest of this paper is organized as follows: first, Section 2
Experimental results show that the proposed algorithm robust
against noises, attacks and detection comparable to LSB
PCA technique briefly discussed. The proposed PCA-based
methods that replace the LSBs of pixel value directly. Hope with steganography scheme is specifically described in Section 3.
optimizing the method, makes it an effective steganographic The paper continues with Section 4 which contains the
technique in security communication. experimental results and discussions. Finally, Section 5
concludes the paper.
Keywords: Steganography, Principle Component Analysis,
RGB image, correlation. 2. Principle Component Analysis
Let I be an N×N matrix, denoted by I ∈ , where F
1. Introduction represents either the real number domain or the complex
Steganography is combination of science and art concealing number domain. The first step of PCA is to calculate the
the secret message so that the very existence of it is not covariance matrix V of I, which is defined as
detectable [1]. The major steganography characteristics are
V= ,
providing a larger hidden capacity for data-hiding and
maintaining a good perceived quality [2]. In the Where is the row vector in I, t denotes the transpose
steganography process, first and more important term that operation, and ∈ is the average vector of the row
must regarded is undetectability and then robustness vectors in I, i.e.
(resistance to various image processing methods and
compression) and capacity of the hidden data, that separate .
it from related techniques such as watermarking and
Then eigen decomposition (ED) is applied to V:
cryptography. The steganographic algorithms can be divided
into two groups: spatial/time domain and transform domain V = UL ,
techniques. In the spatial domain in the case of images,
Where denotes the inverse matrix of U. L is a diagonal
secret message directly embedding in pixels value of image.
matrix with eigenvalues of V as its diagonal
The transform domain methods operate in the Discrete
elements , and the columns of U, , , . . . ,
Cosine Transform, Fourier or wavelet transform domains of
, are the eigenvectors of V.
the host signal [2]. The proposed method belongs to
According to theory of linear algebra, the primary
transform domain but color transform domain. Applying
information of V is in the larger eigenvalues and
PCA transform caused images that called eigenimages [3].
corresponding eigenvectors. Without loss of generality, we
In natural RGB images, R-, G- and B-component have high
assume that these diagonal elements in L have been sorted
correlation: , and [4],
in descending order ( . A property of
while eigenimages aren’t correlated and distribution of data
PCA is its optimal signal reconstruction in the sense of
is quite heterogeneous. Hence changing pixels value of RGB
minimum mean square error (MSE) when only a subset of
image caused most sensible variation of changing pixels
eigenvectors, called principal vectors, is used as basis
value of eigenimages [5]. Tow characteristics uncorrelation
vectors of a feature space S:
and data distribution of eigenimages can be used for
effective steganographic. Watermarking based on PCA S = span ( , ,..., ), m N.
transform for tamper-proof of web pages is proposed by
With the feature space S, we can obtain another
Qijun and Hongtao [6]. The proposed scheme generates
representation of the original data I by projecting them into
watermarks based on the PCA technique. The watermarks
the space S. Specifically this is as the following equation:
(IJCNS) International Journal of Computer and Network Security, 113
Vol. 2, No. 10, 2010
Table 1: The average PSNR and percent of correct retrieval data for different bpp and optimum locations.
Reference