Next: Conclusion
Up: SECURE HIGH DATA EMBEDDING
Previous: System Security
In this section we give some simulation results. We used the popular image
LENNA of size as a cover image, and the image
CAMERAMAN, also of size , as the image to be embedded. The
embedded image is first compressed using any lossy compression scheme such as JPEG
compression. The resulting file is converted into a vector of binary data. The
binary data is then encrypted to produce the embedded sequence . Because of
the large size of the embedded data we utilized all transform coefficients, i.e.,
the data embedding rate is 1 bit per coefficient. Figure 5-a shows the original
image and Figure 5-b shows the stego image. The hidden image is shown in Figure 6.
We used the peak signal-to-noise ratio PSNR, as our measure of perceptual
quality. For this experiment the average value of the PSNR= 43 dB, which results
in a stego image which is perceptually identical to the host image. The average
value of the variance for the cover image is ,
while the average value of the variance for the stego image is
.
Next: Conclusion
Up: SECURE HIGH DATA EMBEDDING
Previous: System Security
Muhammad Zubair Ikram
7/14/2000