Effective and Secure Method of Color Image Steganography

Similar documents
Efficient Methods used to Extract Color Image Features

Window Averaging Method to Create a Feature Victor for RGB Color Image

A Novel Method for Color Image Recognition

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Implementation Of Steganography For Business Documents Security Using Discrete Wavelet Transform Method

HSI Color Space Conversion Steganography using Elliptic Curve

Comparative Analysis of Methods Used to Remove Salt and Pepper Noise

A Methodology to Analyze Objects in Digital Image using Matlab

An Enhanced Least Significant Bit Steganography Technique

A Methodology to Create a Fingerprint for RGB Color Image

A Reversible Data Hiding Scheme Based on Prediction Difference

Analysis of Secure Text Embedding using Steganography

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

A New Image Steganography Depending On Reference & LSB

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Colored Digital Image Watermarking using the Wavelet Technique

Steganography using LSB bit Substitution for data hiding

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

Block Wise Data Hiding with Auxilliary Matrix

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Meta-data based secret image sharing application for different sized biomedical

A Proposed Technique For Hiding Data Into Video Files

Dynamic Collage Steganography on Images

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACING METHOD

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Steganography with Cryptography using Multiple Key Patterns

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Keywords Secret data, Host data, DWT, LSB substitution.

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Study of 3D Barcode with Steganography for Data Hiding

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Hiding Image in Image by Five Modulus Method for Image Steganography

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

An Integrated Image Steganography System. with Improved Image Quality

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

International Journal of Computer Techniques - Volume 3 Issue 5, Sep - Oct 2016

Sterilization of Stego-images through Histogram Normalization

Proposed ZAH_BAU filter for RGB color image enhancement

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Pixel Image Steganography Using EOF Method and Modular Multiplication Block Cipher Algorithm

RGB Intensity Based Variable-Bits Image Steganography

Dual Transform Color Image Steganography Method

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

New High Capacity Secure Steganography Technique

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Design and Implementation of Game Based Security Model to Secure the Information Contents

An Implementation of LSB Steganography Using DWT Technique

Image Steganography using Password Based Encryption Technique to secure e-banking Data

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Vernam Encypted Text in End of File Hiding Steganography Technique

Comparative Histogram Analysis of LSB-based Image Steganography

A Novel Approach for Hiding Huge Data in Image

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Different Steganography Methods and Performance Analysis

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Comparative Analysis of Hybrid Algorithms in Information Hiding

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Watermarking patient data in encrypted medical images

REVERSIBLE data hiding, or lossless data hiding, hides

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

A Secure Image Encryption Algorithm Based on Hill Cipher System

IMPROVEMENT USING WEIGHTED METHOD FOR HISTOGRAM EQUALIZATION IN PRESERVING THE COLOR QUALITIES OF RGB IMAGE

Performance Improving LSB Audio Steganography Technique

LSB Encoding. Technical Paper by Mark David Gan

International Journal of Advance Research in Computer Science and Management Studies

Data Hiding Using LSB with QR Code Data Pattern Image

Block Truncation Coding (BTC) Technique for Regions Image Encryption

Enhancement of Information Hiding in Audio Signals with Efficient LSB based Methods

Concealing Data for Secure Transmission and Storage

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Compendium of Reversible Data Hiding

Evaluation of Visual Cryptography Halftoning Algorithms

i-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly Generated Bitmap Image

Image Compression Supported By Encryption Using Unitary Transform

A Novel Technique in Visual Cryptography

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

Resampling and the Detection of LSB Matching in Colour Bitmaps

Digital Image Sharing using Encryption Processes

A PROPOSED ALGORITHM FOR DIGITAL WATERMARKING

Contrast Enhancement Based Reversible Image Data Hiding

Threshold-based Steganography: A Novel Technique for Improved Payload and SNR

An Overview of Visual Cryptography Schemes for Encryption of Images

EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Transcription:

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 232 88X IMPACT FACTOR: 6.17 IJCSMC, Vol. 6, Issue. 4, April 217, pg.142 15 Effective and Secure Method of Color Image Steganography Omar M. Albarbarawi Albalqa Applied University, Faculty of Engineering Technology, Jordan-Amman Abstract: An efficient and secure method of hiding secret message-extracting embedded message into/from a color image will be proposed. The proposed method will be tested, implemented and analyzed. Different secrete messages with different length will be selected and embedded into color images with different sizes. Efficient, quality, and security issues will be done to prove the advantages of the proposed method. Keywords: Efficiency, quality, security, MSE, PSNR. 1- Introduction RGB color image is a three dimensional matrix [1], [2]; the first dimension is for the red components, the second for the green components, while the third is for the blue component. RGB color image usually has a huge size, so it is convenient to use this image to hold a secrete message, and this process is called image steganography [3], [4], [5]. The data to be hided is called the secret message and the medium in which the data is hided is called the covering media. The covering media (which is in our paper is a color image) containing hidden message is called stego-image (holding image). The algorithms employed for hiding the message in the cover medium at the sender end and extracting the hidden message from the stego-image at the receiver end is called stego system. 217, IJCSMC All Rights Reserved 142

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 The process of image steganography as shown in figure 1 can be implemented in 2 phases [6], [7], [8]: Phase 1: Embedding the secret message based on the private key used to insert the message in the covering image. Phase 2: Extracting secret message from the holding image based on the private key. For comparative analysis of steganography techniques some parameters are used such as MSE, PSNR, embedding time needed to hide a massage in color image, and extracting time needed to extract the message from the covering color image. PSNR- Peak signal to noise ratio is calculated usually in logarithmic (db) (equation 1)scale is a metric use to measure the quality of any image reconstructed, restored or corrupted image with respect to its reference or ground truth image. It is a full reference image quality measure defined as the maximum value of maximum signal power with respect to MSE (Mean square error) assumed as noise power. Similarly MSE can be calculated (equation 2) as the square difference between reference image and reconstructed image. Thus a higher value of PSNR indicates that the image is of higher quality and vice-versa. A 2 db or higher PSNR indicates that the image is of good quality [3], [9]. Figure 1: Steganography process 217, IJCSMC All Rights Reserved 143

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 The PSNR value approaches infinity as the MSE approaches zero; this shows that a higher PSNR value provides a higher image quality. At the other end of the scale, a small value of the PSNR implies high numerical differences between images. All LSB methods of hiding message in color image are simple but they are not highly secure and they need an extra work to add an encryption tool to increase the security of hidden information, thus the proposed method can be used to hide short messages within a color image taking in consideration achieving best performance by providing a high secure of message hiding and extracting within a minimum time of processing. 2- The Proposed Method Many methods [9],[1],[11] were proposed for secrete message hiding, mostly they are based on least significant bit (LSB) method, all these methods of hiding message in color image are simple but they are not highly secure and they need an extra work to add an encryption tool to increase the security of hidden information, thus the proposed method can be used to hide short messages within a color image taking in consideration achieving best performance by providing a high secure of message hiding and extracting within a minimum time of processing. The proposed method here came to increase the security level, minimize the embedding and extracting time keeping the level of holding image quality closed to that one obtained by any other method. The proposed method can be implemented applying the following steps: Phase 1: Embedding secrete message: This phase can be implemented by executing the following sequence of operations: 1. Get the covering color image. 2. Get the size of each of the three color components (n1: number of rows; n2: number of columns). 3. Get the secrete message. 4. Get the length of the secrete message (n4). 5. Divide the message into three sub-messages. 6. Generate 3 random private keys: Red, green and blue keys, each key will contain the position in color component where to hide a character from the sub-message. These keys can be implemented applying the following formulas: Kxred=floor (rand (1, ceil (n4/3))*n1); Kyred=floor (rand (1, ceil (n4/3))*n2); Kxgreen=floor (rand (1, ceil (n4/3))*n1); Kygreen=floor (rand (1, ceil (n4/3))*n2); Kxblue=floor (rand (1, ceil (n4/3))*n1); Kyblue=floor (rand (1, ceil (n4/3))*n2); 7. Save the keys. 8. Use the positions in the keys to insert (hide) each sub-message in the corresponding color component. 217, IJCSMC All Rights Reserved 144

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 Phase 2: Extracting secrete message This phase can be implemented applying the following sequence of operations: 1. Get the holding color image. 2. Separate the image into three components. 3. Get the private key. 4. Use the private keys to extract the sub-messages from each component. 5. Construct the secret messages from the three sub-messages. 3- Experimental Results and Analysis 3-1 Quality Analysis The proposed method was implemented several times using various length messages and various size color images and the experimental results showed that it is very difficult to distinguish the difference between them using the human eye this is show in figures 2 to 5: Covering image before embedding message Red histogram 3 2 1 1 2 Green histogram Blue histogram 3 2 1 1 2 3 2 1 1 2 Figure 2: Original image (png with size 384x512x3) Covering image after embedding message Red histogram 3 2 1 1 2 Green histogram Blue histogram 3 2 1 1 2 3 2 1 1 2 Figure 3: Holding image (message length=42) 217, IJCSMC All Rights Reserved 145

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 Original image 4 Original red component histogram 3 2 1 1 2 Original green component histogram 4 3 2 1 1 2 Original blue component histogram 6 4 2 1 2 Figure 4: Original image (jpg with size 516x6x3) Holding image 4 Holding red component histogram 3 2 1 1 2 Holding green component histogram 4 3 2 1 1 2 Holding blue component histogram 6 4 2 1 2 Figure 5: Holding image (message length=42) The experimental results shown in tables 1 and 2 showed that the proposed method provides a high quality by giving a high value of PSNR and a low value of MSE. 217, IJCSMC All Rights Reserved 146

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 Table 1: Calculated parameters using Png image with size=384x512x3 Message length Embedding time(second) Extraction time(second) MSE PSNR 1.1.1.445 141.9392 2.1.1.1968 127.797 3.1.1.243 126.778 4.1.1.2817 123.4927 5.1.1.4798 118.1682 6.1.1.5273 117.2244 7.1.1.5633 116.5651 8.1.1.6338 115.3851 9.1.1.6842 114.629 1.1.1.8576 112.361 Table 2: Calculated parameters using jpg image with size=516x6x3 Message length Embedding time(second) Extraction time(second) MSE PSNR 1.23.23.435 142.1677 2.23.23.1131 132.6192 3.23.23.1488 129.8755 4.23.23.214 126.414 5.23.23.232 125.4345 6.23.23.2452 124.886 7.23.23.35 121.3237 8.23.23.3535 121.2253 9.23.23.3848 12.3757 1.23.23.4858 118.441 From tables 1 and 2 we can see that the proposed method gives a high quality by achieving a high value of PSNR and a low value of MSE. Here we have to notice that PSNR will grow with the holding image size, and will be decreased when increasing the secrete message length(but still acceptable because of the high value of PSNR) this is shown in figure 6 and 7. 217, IJCSMC All Rights Reserved 147

MSE PSNR Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 145 PSNR 14 135 13 125 12 115 11 1 2 3 4 5 6 7 8 9 1 Message length Figure 6: Relationship between PSNR and message length.9 MSE.8.7.6.5.4.3.2.1 1 2 3 4 5 6 7 8 9 1 Message length Figure 7: Relationship between MSE and message length 3-2 Security Analysis The proposed method uses a private key to hide a secrete message and uses the same key to extract the secrete message from the holding image. This key is to be generated randomly and it will contain a set of pairs, each of them points to a coordinate in color image component where the character from the secrete message to be embedded, thus making the process of hacking (guessing) the key impossible, thus increasing the level of security. Table 3 shows the key used to hide a message of 12 character length in an image of 516x6x3 size. 217, IJCSMC All Rights Reserved 148

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 Table 3: Private Key of message hiding Color image component First character Second character Third character Fourth character Red positions (151, 259) (115, 379) (282, 357) (445, 21) Green positions (367, 264) (17, 161) (214, 34) (98, 74) Blue positions (448, 59) (318, 589) (59, 372) (313, 332) 3-3 Performance Analysis Table 1 and 2 show the times needed to hide and to extract secrete message these times are very small comparing with LSB method of data hiding, table 4 shows a comparisons between the proposed method results and LSB method results: Table 4: Results comparisons Parameter LSB method Proposed method PSNR 17.8569 118.441 MSE.25.4858 Hiding time(second).72.23 Extracting Time.42.23 Speed up(lsb time/proposed time) embedding Speed up(lsb time/proposed time) extracting 313.4 1826.1 Conclusions A method of color image steganography was proposed, tested and implemented. The experimental results showed that the proposed method is very secure, provides a high quality and high performance. It was shown from the obtained results that the covering image always has a good quality And has a high value of PSNR, thus it is difficult to guess whether the covering image is differ from the original one. 217, IJCSMC All Rights Reserved 149

Omar M. Albarbarawi, International Journal of Computer Science and Mobile Computing, Vol.6 Issue.4, April- 217, pg. 142-15 References [1]. Jihad Nadir, Ziad Alqadi and Ashraf Abu Ein, Classification of Matrix Multiplication Methods Used to Encrypt-decrypt Color Image, International Journal of Computer and Information Technology (ISSN: 2279 764) Volume 5 Issue 5, September 216. [2]. Majed O. Al-Dwairi, Ziad A. Alqadi, Amjad A. AbuJazar and Rushdi Abu Zneit, Optimized True- Color Image Processing, World Applied Sciences Journal 8 (1): 1175-1182, 21 ISSN 1818-4952. [3]. Prof. Ziad A.A. Alqadi, Prof. Mohammed K. Abu Zalata, Ghazi M. Qaryouti, Comparative Analysis of Color Image Steganography, IJCSMC, Vol. 5, Issue. 11, November 216, pg.37 43. [4]. Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 27. [5]. Yuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin, A new steganographic method for color and grayscale image hiding Computer Vision and Image Understanding 17 (27) 183 194 [6]. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems, vol. 35, Issues 3&4 1996 Journal, pp. 313-336. [7]. Souvik Bhattacharyya and Gautam Sanyal. An image based Steganography model for promoting global cyber security. In, 29 Proceedings of International Conference on Systemic, Cybernetics and Informatics, Hyderabad, India. [8]. Shikha and Vidhu Kiran Dutt, Steganography: The Art of Hiding Text in Image using Matlab, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 9, September 214 [9]. Mekha Jose, Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality, International Journal of Science and Research (IJSR) ISSN (Online): 2319-764. [1]. Reena M Patel,D J Shah, Concealogram : Digital image in image using LSB insertion method, International journal of electronics and communication engineering & technology(ijecet), 213. [11]. Nadeem Akhtar, Pragati Johri, Shahbaaz Khan, Enhancing the security and quality of LSB based image steganography, 213 5th International Conference on Computational Intelligence and Communication Networks. 217, IJCSMC All Rights Reserved 15