An Alternative Approach of Steganography using Reference Image

Similar documents
Dynamic Collage Steganography on Images

An Integrated Image Steganography System. with Improved Image Quality

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Steganography using LSB bit Substitution for data hiding

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Analysis of Secure Text Embedding using Steganography

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

A New Steganographic Method for Palette-Based Images

RGB Intensity Based Variable-Bits Image Steganography

An Implementation of LSB Steganography Using DWT Technique

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Hiding Image in Image by Five Modulus Method for Image Steganography

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Image Steganography with Cryptography using Multiple Key Patterns

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Sterilization of Stego-images through Histogram Normalization

LSB Encoding. Technical Paper by Mark David Gan

Comparative Analysis of Hybrid Algorithms in Information Hiding

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Implementation of Improved Steganographic Technique for 24-bit Bitmap Images in Communication

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

An Enhanced Least Significant Bit Steganography Technique

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

A Study on Image Steganography Approaches in Digital Images

HSI Color Space Conversion Steganography using Elliptic Curve

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Bitmap Steganography:

Digital Watermarking Using Homogeneity in Image

Study of 3D Barcode with Steganography for Data Hiding

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Information Hiding: Steganography & Steganalysis

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Simple Additive LSB Steganography in Losslessly Encoded Images

CSE 3482 Introduction to Computer Security.

A Proposed Technique For Hiding Data Into Video Files

Colored Digital Image Watermarking using the Wavelet Technique

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Transform Domain Technique in Image Steganography for Hiding Secret Information

Digital Investigation

A Study on Steganography to Hide Secret Message inside an Image

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

Improved Quality of Image Steganography Using POLPA

Keywords Secret data, Host data, DWT, LSB substitution.

Steganography using Concept of Skin Tone Detection

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

ELTYEB E. ABED ELGABAR

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

A Simple Scheme for Visual Cryptography

Digital Image Sharing using Encryption Processes

Secret Communication Using Image Steganography

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Performance Improving LSB Audio Steganography Technique

A New Representation of Image Through Numbering Pixel Combinations

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

PROPOSED METHOD OF INFORMATION HIDING IN IMAGE

Block Wise Data Hiding with Auxilliary Matrix

Enhance Image using Dynamic Histogram and Data Hiding Technique

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Digital Image Processing Lec.(3) 4 th class

Steganography is the art of secret communication.

International Journal of Advance Research in Computer Science and Management Studies

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Medical Image Encryption and Compression Using Masking Algorithm Technique

Lossless Image Watermarking for HDR Images Using Tone Mapping

A New Image Steganography Depending On Reference & LSB

An Integrated Approach of Data Security on Server via Stegnography using 4 bit LSB

Steganalytic methods for the detection of histogram shifting data-hiding schemes

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Pixel Indicator Technique for RGB Image Steganography

A Comprehensive Review on Secure Image Steganography

A New Compression Method for Encrypted Images

Uncompressed Image Steganography using BPCS: Survey and Analysis

FPGA implementation of LSB Steganography method

Secret Communication on Facebook Using Image Steganography: Experimental Study

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

The BIOS in many personal computers stores the date and time in BCD. M-Mushtaq Hussain

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Improved Detection of LSB Steganography in Grayscale Images

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Effective and Secure Method of Color Image Steganography

A Novel Approach for Hiding Huge Data in Image

Detection of Steganography using Metadata in Jpeg Files

Investigation of Various Image Steganography Techniques in Spatial Domain

Meta-data based secret image sharing application for different sized biomedical

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Chapter 8. Representing Multimedia Digitally

Transcription:

An Alternative Approach of Steganography using Reference Image Samir Kumar Bandyopadhyay Senior Member IEEE Dept. of Computer Science & Engineering, University of Calcutta, India Email: skb1@vsnl.com Indra Kanta Maitra B.P. Poddar Institute of Engineering and Management, Kolkata, India Email: ikm.1975@vsnl.net Abstract This paper is to create a practical steganographic implementation for 4-bit images. The proposed technique converts 4 bit image into 4 shaded Gray Scale image. This image will be act as reference image to hide the text. Using this grey scale reference image any text can be hidden. Single character of a text can be represented by 8-bit. The 8-bit character can be split into 4X2 bit information. If the reference image and the data file are transmitted through network separately, we can achieve the effect of Steganography. Here the image is not at all distorted because said image is only used for referencing. Any huge amount of text material can be hidden using a very small image. Decipher the text is not possible intercepting the image or data file separately. So, it is more secure. Keywords: Steganography, Bitmap Image, Reference Image, Bit Depth 1. Introduction The growth of high-speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages but this type advancement in the field of data communication in other sense has hiked the fear of getting the data intercepted at the time of sending it from the sender to the receiver. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement is called steganography. It is the art and science of invisible communication. This is Vol 1, No 1 (June 2010) IJoAT 95

accomplished through hiding information in other information, thus hiding the existence of the communicated information. The aim of this paper is to create a practical steganographic implementation for 4-bit images. The proposed method converts 4 bit image into 4 shaded Gray Scale image. This image will be act as reference image to hide the text. 2. Steganography The word steganography is originally derived from Greek words, which mean Covered Writing. It has been used in various forms for thousands of years. In the 5th century BC Histaiacus shaved a slave s head, tattooed a message on his skull and the slave was dispatched with the message after his hair grew back [1, 2, 3, 4]. In Saudi Arabia at the King Abdulaziz City of science and technology, a project was initiated to translate into English some ancient Arabic manuscripts on secret writing which are believed to have been written 1200 years ago. Some of these manuscripts were found in Turkey and Germany [5]. Five hundred years ago, the Italian mathematician Jérôme Cardan reinvented a Chinese ancient method of secret writing. The scenario goes as follows: a paper mask with holes is shared among two parties, this mask is placed over a blank paper and the sender writes his secret message through the holes then takes the mask off and fills the blanks so that the message appears as an innocuous text. This method is credited to Cardan and is called Cardan Grille [4]. 2.1 Digital Steganography With the boost in computer power, the internet and with the development of digital signal processing (DSP), information theory and coding theory, steganography has gone digital. In the realm of this digital world steganography has created an atmosphere of corporate vigilance that has spawned various interesting applications, thus its continuing evolution is guaranteed. Contemporary information hiding is due to [6]. One of the earliest methods to discuss digital steganography is credited to Kurak and McHugh [7], who proposed a method, which resembles embedding into the 4 LSBs (least significant bits). They examined image downgrading and contamination, which is known now as image-based steganography. Information can be hidden inside a multimedia object using many suitable techniques. As a cover object, we can select image, audio or video file. Depending on the type of the cover object, definite and appropriate technique is followed in order to obtain security. In this paper, we will discuss techniques or methods by which we can hide text information in data file using a reference image instead of cover image. 2.2 Bitmap Image A bitmap image consists of a two-dimensional array of numbers. The color shade displayed for a given picture element (pixel) depends on the number stored in the array for that pixel. The simplest type of image data is black and white. It is a binary image since each pixel is Vol 1, No 1 (June 2010) IJoAT 96

either 0 or 1. The next, more complex type of image data is grey scale, where each pixel takes on a value between zero and the number of gray scales or grey. These images appear like common black and white image they are black, white, and shades of grey. Most grey scale images today have 256 shades of grey. The most complex type of image is color. Color images are similar to grey scale except that there are three bands or channels, corresponding to the colors red, green, and blue, commonly called RGB image. Thus, each pixel has three values associated with it. The range of color is depend on color depth or bit depth, is a term describing the number of bits used to represent the color of a single pixel in a bitmapped image. This concept is also known as bits per pixel (bpp). Color depth is only one aspect of color representation expressing how finely levels of color can be expressed; the other aspect is how broad a range of colors can be expressed. The RGB color model, cannot express many colors, notably saturated colors [8, 9,10]. 2.3 Indexed Color In uncompressed BMP files and many other bitmap file formats, image pixels are stored with a color depth of 1, 4, 8, 16, 24, or 32 bits per pixel. Images of 8 bits and fewer can be either greyscale or indexed color. Depending on the color depth, a pixel in the picture will occupy at least n/8 bytes where n is the bit depth, since 1 byte equals 8 bits. Indexed colors image that enables 8 bits per pixel or less to look almost as good as 24 bits per pixel[11, 12,13,14]. The technique determines the 256 most frequently used colors in the image and creates a color lookup table, also called a "color map" or "color palette," that is stored with the image [15,16]. Rather than each pixel in the image having all three RGB colors (one 8-bit red, one 8-bit green and one 8-bit blue), each pixel contains one 8-bit number that indexes into the 256-color lookup table, which contains the RGB values. This is reducing images to their smallest size and these images are most commonly used on Web pages, as they are small and quick to load. The 256-color palette is mapped for best results on the Internet [17]. 3. Proposed Technique After reviewing the current papers on the market for steganography, it was determined that there was not a practical implementation for 4-bit images. Although network speed is increasing, and bandwidth problems are decreasing, file size is still of utmost importance and smaller file sizes are optimal in network communication. Thus, the current steganographic use of 24-bit / 8-bit images leads to slower communication and development of a 4-bit image format would be beneficial. 3.1 Selection and Grey Conversion The aim of this research is to create a practical steganographic implementation for 4-bit images. So, 4-bit is necessary to preserve the information of a single pixel in color bitmap image. Vol 1, No 1 (June 2010) IJoAT 97

Despite varying bit depths in CGA's graphics mode, CGA processes colors in its palette in four bits, yielding 2 4 = 16 different colors. The four color bits are arranged according to the RGBI (Red, Green, Blue and Intensity) color model i.e. the lower three bits represent red, green and blue color components; a fourth "intensifier" bit increases the brightness of all three red, green and blue components. In 4-bit color scheme, color number and color return code is not same. Conversion method of color number and its return code is displayed in Table 1. The color number can be converted to return code by exchanging 1 st bit with the 3 rd bit of binary code. The algorithm for aforesaid conversion is given in figure 1. Table 1: Color Table for Bitmap Image Colors Number Return Code (Binary) (Binary) Black 0 (0000) 0 (0000) Red 1 (0001) 4 (0100) Green 2 (0010) 2 (0010) Brown 3 (0011) 6 (0110) Blue 4 (0100) 1 (0001) Magenta 5 (0101) 5 (0101) Cyan 6 (0110) 3 (0011) Light Gray 7 (0111) 7 (0111) Dark Gray 8 (1000) 8 (1000) Light Red 9 (1001) 12 (1100) Light Green 10 (1010) 10 (1010) Yellow 11 (1011) 14 (1110) Light Blue 12 (1100) 9 (1001) Light Magenta 13 (1101) 13 (1101) Light Cyan 14 (1110) 11 (1011) White 15 (1111) 15 (1111) Algorithm 1 Conversion Input: Color Number X=Color Number Y=Return Code Z=Temp Output: Return Code Begin Step1. Y = X AND 0x0A Step2. Z = (X AND 0x01) SHR 2 Step3. Y = Y OR Z Step4. Z = (X AND 0x04) SHL 2 Step5. Y = Y OR Z End Figure 1: Conversion Algorithm 4-bit color bitmap can be converted to 4-shade grey scale image without using the conventional color to grey image conversion formula i.e. Grey = 0.3 * R + 0.11 * B +0.59 * G... (1) The result of the same is shown in Table 2. Return Code 0, 7, 8, 15 remains unchanged. Rest codes will be changed as per the following algorithm (see figure 2). Vol 1, No 1 (June 2010) IJoAT 98

Table 2: Return Code to Grey Scale Code Colors RC Binary After 3rd SHR GC RC I R G B X 4 X 3 X 2 X 1 Black 0 0 0 0 0 0 0 0 0 0 Red 4 0 1 0 0 0 0 0 0 0 Green 2 0 0 1 0 0 0 0 0 0 Brown 6 0 1 1 0 0 0 0 0 0 Blue 1 0 0 0 1 1 0 0 0 8 Magenta 5 0 1 0 1 1 0 0 0 8 Cyan 3 0 0 1 1 1 0 0 0 8 Light Gray 7 0 1 1 1 0 1 1 1 7 Dark Gray 8 1 0 0 0 1 0 0 0 8 Light Red 12 1 1 0 0 0 1 1 1 7 Light Green 10 1 0 1 0 0 1 1 1 7 Yellow 14 1 1 1 0 0 1 1 1 7 Light Blue 9 1 0 0 1 1 1 1 1 15 Light Magenta 13 1 1 0 1 1 1 1 1 15 Light Cyan 11 1 0 1 1 1 1 1 1 15 White 15 1 1 1 1 1 1 1 1 15 *RC = Return Code, GC = Grey Code, I=Intensity, R=Red, G=Green, B=Blue Algorithm 2 Color_Grey Input: Return Code Output: 4-shade Grey code Begin Step1. Temp = RC Step2. A = (Temp AND 0x04) SHL 3 // Copy the Intensity bit (0 or 1) to variable A Step3: Loop i = 1 to 3 RC = RC SHL 1 // RC left shift RC = RC OR A // Intensity bit is copied to LSB End Loop End Figure 2: Color Change Algorithm After execution of the aforesaid algorithm, a 4-bit binary code will be generated, out of which the 3 rd and 4 th bit will be considered (see Table 3) and 1 st and 2 nd bit will be discarded to generate the 2-bit binary code (grey code) i.e. 00, 01, 10, 11 or 4-shade grey scale i.e. 0000, 0111, 1000, 1111. Table 3: 3 rd and 4 th Bit of Gray Scale Code Colors 4-bit GC Binary 4 th & 3 rd Bit Black 0 0000 00 Light Gray 7 0111 01 Dark Gray 8 1000 10 White 15 1111 11 Using the aforesaid logic any 4-bit color bitmap image can be converted to 4-shade greyscale image without conventional method. Figure 3 depicts the high level flow of above stated procedure. Reference Color Image Gray Conversion Logic Reference Gray Image Figure 3: Color to Gray Scale Image Vol 1, No 1 (June 2010) IJoAT 99

3.2 Hiding Information Using this grey scale reference image any text can be hidden. Single character of a text can be represented by 8-bit. The 8-bit character can be split into 4X2 bit information. Each 2-bit of information must be 00, 01, 10 or 11. These combinations are present in the grey scale reference image once or several occasions. If we use the image as reference, we have to store only the coordinate of the occurrences to a data file to cipher the text. We can use the random occurrence to make the system more robust. The field of the data file will be occurrence, x coordinate and y coordinate. The following figure 4(a) and algorithm in figure 4(b) describes the process in details: - - - - - - - - - - - - -- - - - - - - - - - - - - - - Reference Gray Image Search the combination using random occurrence 8-Bit Character 2-Bit of Information Data File Occurrence X Coordinate Y Coordinate Algorithm 3 Hiding Text Input: Text to Hide, Reference Image Output: Data File Begin Step1. Read Text Step2. Open the Reference Image File. Step3. Open Data File to write the information. Step4. Read one character at time from text and split the character into four parts of 2-bit information in each. Step5. Search occurrence of the combination in the Reference Image randomly and return the X and Y coordinate of occurrence. Step6. Write the X and Y coordinate to Data File. Step7. Go to Step4 until the end of text. Step8. Close Reference Image and Data File. End Figure 4(a): Ciphering Technique Figure 4(b): Algorithm for Hiding Text 3.3 Transmission and Unhiding If the reference image and the data file are transmitted through network separately, we can achieve the effect of Steganography. Here the image is not at all distorted because said image is only used for referencing. Any huge amount of text material can be hidden using a very small image. Decoding of information is also very easy. The coordinate of the image has to read from the data file and collect the bit information from the reference image to reconstruct the text information. The transition process and the algorithm are depicted in figure 5(a) and 5(b) respectively. Vol 1, No 1 (June 2010) IJoAT 100

Sender Receiver Reference Gray Image Open Channel Cipher Method Data File Decipher Method Algorithm 4 Unhiding Text Input: Reference Image, Data File. Output: Retrieve Text Begin Step1. Open Reference Image Step2. Open Data File Step3. Set the row pointer at the first row of data file. Step4. Read row and return X and Y coordinates of reference image. Step5. Read the information of X and Y coordinates from the reference image and return the value. Step6. Store consecutive 4 parts of information in a character variable to reconstruct each character Step7. Set the row pointer increased by one and repeats the step3 until row pointer encountered the end of row. Step8. Display reconstructed hidden text. Step9. Close Data file. Step10. Close Reference Image. End Figure 5(a): Transition Method Figure 5(b): Algorithm for Unhiding Text Since, deciphering the text is not possible by intercepting the image or data file separately. So, it is more secure 4. Conclusions In this paper we have explained the basic mechanism of our proposed model and it is an alternative approach of steganography. It is not pure steganographic technique but the effect is same with some additional advantage. First advantage is the data file and reference image is going through the open channel separately. The basic result is interception of any one cannot provide desired objective. Second advantage is that any amount of data can be transmitted using the method because it is not depending on the size of image. Final advantage, the said method is not affecting the image. There is no change of quality and color change of reference image. It is most vital achievement of method. The algorithm time complexity is simple and always proportional to O(n). The performance of hiding algorithm is totally depending on the length of text to hide and size of image. Similarly Unhiding algorithm is reverse process of previous one and complexity character is same. At end, this can be said that the aforesaid method may be improved, instead of text small image may be hiding, cryptography may be used or much improvement in this field may be incorporated in future. Lastly it is expected by the authors that any kind of future endeavours in this field will definitely route it a path to design a secure system using the proposed algorithm for both Internet and Mobile Communication Technology. Vol 1, No 1 (June 2010) IJoAT 101

References [1] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Computer, 31(2) (1998) 26-34. [2] J.C. Judge, Steganography: Past, present, future. SANS Institute publication, http://www.sans.org/ reading_room/whitepapers/stenganography/552.php, 2001. [3] N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3) (2003) 32-44. [4] P. Moulin and R. Koetter, Data-hiding codes, Proceedings of the IEEE, 93 (12) (2005) 2083-2126. [5] S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23, 2004, pp. 417-418. [6] G.J. Simmons, The prisoners problem and the subliminal channel, in: Proceedings of International conference on Advances in Cryptology, CRYPTO83, August 22-24, 1984, pp. 51-67. [7] C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IEEE 8th Annual Computer Security Applications Conference, 30 Nov-4 Dec 1992, pp. 153-159. [8] cf. section 1-133, "Color/Graphics Adapter", page 143 of ibm_techref_v202_1.pdf [9] R.J Andersen and F.A.P Petitcolas. On the limits of steganography. IEEE Journal of Selected Areas in Communications,Special Issue on Copyright and Privacy Protection, 16(4):474 481, 1998. [10] Jiri Fridrich. A new steganographic method for palettebased images. In Proceedings of the IS&T PICS conference, pages 285 289, Savannah, Georgia, April 1998. [11] Jiri Fridrich and Du Rui. Secure steganographic methods for palette images. In Inter l Workshop on Information Hiding, pages 47 60, 1999. [12] N.F. Johnson and S. Jajodia. Exploring steganography: seeing the unseen. In IEEE Comput., pages 26 34, February 1998. [13] N.F. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. In Proc. the Second Inform. Hiding Workshop LNCS, volume 1525, pages 273 289. Springer-Verlag, 1998. [14] D. Kahn. The history of steganography. In R. Anderson, editor, 1st Information Hiding Workshop, Lecture Notes in Computer Science, volume 1174, pages 1 5. Springer- Verlag, 1996. [15] Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon. Image steganography: Concepts and practice. 2004. [16] R. Machado. Ez stego. http://www. stego.com. [17] Gustavus J. Simmons. The prisoners problem and the subliminal channel. In Advances in Cryptology: Proceedings of Crypto 83 (David Chaum, ed.), pages 51 67. Plenum Press, 1984. Vol 1, No 1 (June 2010) IJoAT 102