Automatic Ascii Art Conversion of Color Images Using Nmf and Steganography

Automatic Ascii Art Conversion of Color Images Using Nmf and Steganography

Int. J. Elec&Electr.Eng&Telecoms. 2012 S Prabagar and S Vasuki, 2012 ISSN 2319 – 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 © 2012 IJEETC. All Rights Reserved Research Paper AUTOMATIC ASCII ART CONVERSION OF COLOR IMAGES USING NMF AND STEGANOGRAPHY S Prabagar1* and S Vasuki2 *Corresponding Author: S Prabagar, [email protected] It is hard to avoid ASCII Art in today’s digital world, from the ubiquitous emoticons to the esoteric artistic creations that reside in many people’s e-mail signatures, everybody has come across ASCII art at some stage. Here, we treat automatic ASCII art conversion of color images as an optimization problem, and present an application of our work on Non-Negative Matrix Factorization to this task. In the computer world, there is a constant struggle to keep secret information secret, private information private, and when profits are involved, protect the copyrights of data. To accomplish these increasingly difficult tasks, new methods based on the principals of steganography are being developed and used. Keywords: ASCII art, Non-negative matrix factorization, Information hiding, Steganography INTRODUCTION in your e-mails, documents or even in the ASCII Generator is a powerful ASCII Art forums on the web will be a good idea. In generation application. You can make ASCII Convert Image into ASCII Generator, drawing Art Words, ASCII Art Photos and even ASCII your own ASCII Art Photos is like drawing a Art Animations easily by using Convert Image picture in the Paint application of Windows. into ASCII Generator. Convert Image into ASCII All these are very easy, no experience need. Generator can take an image and process it We propose a new method for strengthening to an HTML, RTF, BMP or TEXT file of color- the security of information through a coded text characters, that when combined, combination of signal processing, cryptography resemble an image. It is an ASCII Art Photo. and steganography And the files are very worthy of being published to the Web or in the document. Also, you can HIDING INFORMATION make your individual ASCII Art Signatures in As much of today’s communication is being Convert Image into ASCII Generator. Use them done over technologically advanced systems 1 Excel College of Technology, Komarapalayam, Tamil Nadu, India. 2 Department of ECE, Velammal College of Engineering & Technology, Tamil Nadu, India. 67 Int. J. Elec&Electr.Eng&Telecoms. 2012 S Prabagar and S Vasuki, 2012 (e-mail, instant messaging services, etc.), prove that NMF will give correct secrecy of that communication is ever present. decompositions. However, it has been shown The hidden data/file is the message which we in practice to give correct results. wish to keep secret. If data looks random and We use the following procedure for adding information into this data does not automatic conversion of binary images to change the randomness, then we have ASCII art: achieved steganography • Construct W from a monospace font, e.g., Since this byte can contain any value, this Courier, where the glyphs that represent the implies randomness. By changing the Least 95 printable characters (numbered 33 to Significant Bit (LSB) of any byte within the 126) of the 7-bit ASCII character encoding image file, a human eye viewing the image will scheme are stored as M N bitmaps, not be able to tell a difference from one shade which are arranged as vectors of size R and to the next. This allows us to only hide a placed in each column, wj. Rescale each message one-eighth the size of the original column to the unit L2-norm, wj = wj kwjk, j = cover file. This is not much if you think that 1, ..., R. having a cover image of 128 bytes will only yield us a 16 byte hidden message. • Partition the binary image X € RPXQ into The growing field of cyber forensics M N blocks forming a P/M Q/N grid, detective work in the digital domain should where each block corresponds to a font create greater demand for steganalysis tools glyph in the final ASCII art image. in the near future. Construct V from the blocks by arranging as vectors and placing in columns. If X is TO SOLVE THE NON- not evenly divisible into M N blocks then NEGATIVE MATRIX perform zero padding to the required FACTORIZATION dimensions. Non-Negative Matrix Factorization is a method • Randomly initialise H; specify and ... for the decomposition of multivariate data, • Fit V to W using the H update rule (Equation where a nonnegative matrix, V, is (1)), and repeat for the desired number of approximated as a product of two non- iterations. negative matrices, V =WH. NMF is a parts- based approach that makes no statistical M 2 assumption about the data. In-stead, it w ij v ik /WHik i 1 assumes for the domain at hand, e.g., binary hjk hjk M 1 ...(1) images, that negative numbers are physically w ij WHik i 1 meaningless—which is the foundation for the assumption that the search for decomposition • Assign each block location in the original should be confined to a non-negative space, image a glyph based an a winner-takes-all i.e., non negativity assumption. The lack of approach, where the maximum value in statistical assumptions makes it difficult to each column of H corresponds to the 68 Int. J. Elec&Electr.Eng&Telecoms. 2012 S Prabagar and S Vasuki, 2012 winning glyph in W (Equation (2)). Reverse Finally, in this work we concentrate on binary the block partitioning procedure of step 2 images, where the resultant ASCII art is and render the ASCII art image using the monochromatic. However, it is possible to identified glyphs in the specified create multicolor ASCII art, where a binary monospace font. image is created from a color image and ASCII art conversion is performed giving a V W maxcol (H, €) ...(2) monochromatic ASCII art representation, which It may be possible to improve the resultant is subsequently used to mask the original color ASCII art representations by finding the most image. natural grid for the binary image, which may We demonstrate the utility of the approach be achieved by shifting the image both we select a test image (UCD CASL logo) and vertically and horizontally and fitting the image to W. The grid that results in the best Figure 1: A Test Image (UCD CASL Logo) and Three ASCII Art Representations, reconstruction, as indicated by the signal-to- Which are Created Using the noise ratio for example, may be considered Pseudoinverse and NMF Utilising the SED to be the most natural grid. ( = 2) and KLD ( = 1) Cost Function. Inspection of the Logo Text Reveals that The chosen glyphs in an ASCII art image NMF Preserves the Curves Best and Minimises Black Space. Furthermore, the are selected based on a winner-takes-all Selection of a Different Creates a approach. It is possible to reduce the number Different ASCII Art Representation of activations in H by using a sparse NMF algorithm, which may result in less iteration to achieve the same ASCII art representation. For the glyph set used to construct W in our M had the largest amount of black space as indicated by the Frobenius norm. However, M was not chosen as the fully black block glyph using any of the presented cost functions, which suggests that a more suitable cost function exists. The utility of ASCII Art in the early computing era is clear. In today’s world, where transmission of photograph quality images is not a problem, ASCII art still has relevance. For example, the proposed method may be employed in image manipulation software, or may be used to create ASCII art for the many bulletin board systems that are still popular today. 69 Int. J. Elec&Electr.Eng&Telecoms. 2012 S Prabagar and S Vasuki, 2012 perform conversion using SED (â = 2) and KLD The basic idea of our proposed encryption ( = 1). The glyph basis is fitted to our 1209 × algorithm is hiding a number of bits from plain 962 pixel test image, resulting in a ASCII text message into a random victor of bits. The representation with 91 × 37 characters. As a location of the hiding bits are determined by a way of comparison, we also convert the test pre agreedupon key by the sender and the image using the pseudoinverse, H = receiver. The following subsection gives more |(WTW)”1WTV|, and present the resultant details about our algorithm. ASCII art images in Figure 1. On initial The Encryption Process inspection, the most notice-able difference between the three ASCII art images is the The method is reasonably simple. We have a glyph used to represent a fully black block (p key matrix KL 2 where, for pseudoinverse, Q for SED and | for KLD), i ,1 , L; L 16 The different ASCII art can be produced for Kij ,1 ,2 ,3 ,4 ,5 ,6 ,7 8 j ,1 2 the same input image by specifying a different . The effect of the selection of is demonstra- This key is known only to the sender and ted in Figure 1, where it is evident that the KLD receiver. When the first party wants to send a image utilizes different glyphs in its ASCII message M to the second party, he/she representation than SED, while continuing to determines the key 2 LK and every character minimize black space. Using the proposed from the message is replaced by a binary method, we present a number of ASCII art value. An eight-bit octet is generated randomly examples of various images. and set in a temporary vector V.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us