next up previous
Next: Conclusion Up: SECURE HIGH DATA EMBEDDING Previous: System Security

Example and Results

In this section we give some simulation results. We used the popular image LENNA of size as a cover image, and the image CAMERAMAN, also of size , as the image to be embedded. The embedded image is first compressed using any lossy compression scheme such as JPEG compression. The resulting file is converted into a vector of binary data. The binary data is then encrypted to produce the embedded sequence . Because of the large size of the embedded data we utilized all transform coefficients, i.e., the data embedding rate is 1 bit per coefficient. Figure 5-a shows the original image and Figure 5-b shows the stego image. The hidden image is shown in Figure 6. We used the peak signal-to-noise ratio PSNR, as our measure of perceptual quality. For this experiment the average value of the PSNR= 43 dB, which results in a stego image which is perceptually identical to the host image. The average value of the variance for the cover image is , while the average value of the variance for the stego image is .
  
Figure:


 
Figure: Hidden image.


next up previous
Next: Conclusion Up: SECURE HIGH DATA EMBEDDING Previous: System Security
Muhammad Zubair Ikram
7/14/2000