A new Approach for Applying (LSB) Method for Information Hiding

Similar documents
Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Colored Digital Image Watermarking using the Wavelet Technique

Information Hiding: Steganography & Steganalysis

An Implementation of LSB Steganography Using DWT Technique

Vernam Encypted Text in End of File Hiding Steganography Technique

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Steganography using LSB bit Substitution for data hiding

Analysis of Secure Text Embedding using Steganography

A New Steganographic Method for Palette-Based Images

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

CSE 3482 Introduction to Computer Security.

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Image Steganography with Cryptography using Multiple Key Patterns

An Improvement for Hiding Data in Audio Using Echo Modulation

An Enhanced Least Significant Bit Steganography Technique

Dynamic Collage Steganography on Images

Detection of Steganography using Metadata in Jpeg Files

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Sterilization of Stego-images through Histogram Normalization

A Study on Steganography to Hide Secret Message inside an Image

A Proposed Technique For Hiding Data Into Video Files

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

RGB Intensity Based Variable-Bits Image Steganography

Bitmap Steganography:

Comparative Analysis of Hybrid Algorithms in Information Hiding

A New Image Steganography Depending On Reference & LSB

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Concealing Data for Secure Transmission and Storage

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

A Novel Approach for Hiding Huge Data in Image

PROPOSED METHOD OF INFORMATION HIDING IN IMAGE

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

LSB Encoding. Technical Paper by Mark David Gan

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

Performance Improving LSB Audio Steganography Technique

Sound file hiding in fingerprint image

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

FPGA implementation of LSB Steganography method

An Improved LSB based Steganography Technique for RGB Color Images

Data Hiding Using LSB with QR Code Data Pattern Image

Enhancing the Least Significant Bit (LSB) Algorithm for Steganography

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

A Comprehensive Review on Secure Image Steganography

Improved Quality of Image Steganography Using POLPA

IMPLEMENTATION OF A DIGITAL PID CONTROLLER USING THE 8751 MICROCONTROLLER CHIP

A Study on Image Steganography Approaches in Digital Images

Hiding And Encrypting Binary Images Using A Different Approach

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

STEGANOGRAPHY. Sergey Grabkovsky

Study of 3D Barcode with Steganography for Data Hiding

Different Steganography Methods and Performance Analysis

International Journal of Advanced Research in Computer Science and Software Engineering

Transform Domain Technique in Image Steganography for Hiding Secret Information

Improved Detection of LSB Steganography in Grayscale Images

HSI Color Space Conversion Steganography using Elliptic Curve

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Design and Implementation of RF and Microwave Filters Using Transmission Lines Wasan Hashim Jacob Abstract I. Introduction

Hiding Image in Image by Five Modulus Method for Image Steganography

SSB-4 System of Steganography Using Bit 4

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

New High Capacity Secure Steganography Technique

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

Application of Histogram Examination for Image Steganography

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

Steganography is the idea of hiding private or sensitive data or information within

Digital Image Sharing using Encryption Processes

Implementation Of Steganography For Business Documents Security Using Discrete Wavelet Transform Method

An Integrated Image Steganography System. with Improved Image Quality

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

Steganography is the art of secret communication.

A Block Compression Method for Fingerprint Image Storing

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

A Recursive Threshold Visual Cryptography Scheme

Secret Communication on Facebook Using Image Steganography: Experimental Study

Pixel Image Steganography Using EOF Method and Modular Multiplication Block Cipher Algorithm

Keywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking.

ELTYEB E. ABED ELGABAR

Image Steganography Algorithm with Minimizing Distortion In Cover Image

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Watermarking patient data in encrypted medical images

An Alternative Approach of Steganography using Reference Image

Implementation of Improved Steganographic Technique for 24-bit Bitmap Images in Communication

Data Hiding In Audio Signals

Resampling and the Detection of LSB Matching in Colour Bitmaps

Transcription:

A new Approach for Applying (LSB) Method for Information Hiding MAJID J JAWAD Babylon University E-mail: majid_al_sirafi@yahoocom Abstract When using LSB technique on 8-bit images, more care needs to be taken, as 8-bit formats are not as forgiving to data changes as 24-bit formats are Care needs to take in the selection of the cover image, so the change to the data will not be invisible in the stego-image When modifying the LSB bits in 8-bit images, the pointers to entries in the palette are changed It is important to remember that a change of even one bit could mean the difference between a shade of red and a shade of blue Such a change would be immediately noticeable on the displayed image, and is thus unacceptable The suggested approach is modifying (LSB) to be used in 8-bits colored images which uses just less than 129 colors Keywords: Information Hiding; Digital Image; Least Significant Bit (LSB) الخلاصة عند استخدام طريقة (LSB) في الصورة الملونة ذات 8 -بت فا ن هنالك عدة ا مور يجب ا خذها بنظر الا عتبار وهذه الا عتبارات غير ما خوذة عند تنفيذ الطريقة ا علاه في الصورة ذات 24 -بت وذلك بسبب طبيعة الهيكلية المستخدمة لخزن بيانات الصورة الملونة ذات 8 -بت ومن ا هم تلك الا عتبارات هي اختيار الغطاء الا مثل لتطبيق الطريقة ا علاه وا لا فا ن ا ي تغيير في بيانات الصورة الا صلية سوف يمكن ملاحظته لا ن ا ي تغيير في بيانات الصورة ولو في بت واحدة يعني ا ن المو شرات الى الا لوان في الخلطة (palette) سوف يتغير ا يضا الا سلوب المقترح هو تطوير طريقة (LSB) لتستخدم في الصورة الملونة ذات 8 -بت على ا ن يكون عدد الا لوان المستخدم في الصورة ا قل من 129 لون الكلمات المفتاحیة :الاخفاء المعلوماتي الصورة الرقمیة البت الادنى 1 INTRODUCTION Steganography is the art of hiding information in ways that prevent its detection Steganography is usually given as a synonym for cryptography but it is not normally used in that way It is not intended to replace cryptography but supplement it [DrKDuraiswamy26] The purpose of steganography is to communicate information in a stealth manner so that anyone who inspects the messages being exchanged cannot collect enough evidence that the messages hide additional secret data As opposed to cryptography that makes the communication unintelligible to those who do not know the proper cipher keys, steganography should make the communication inconspicuous or invisible [Jessica Fridrich27] 2 WHY WE CAN NOT EMBED A SECRET MESSAGE IN 8- BIT COLOR IMAGE? According to the structure of 8-bit image as shown in Fig (1), each pixel in it is represented by a single byte This byte is not the color but rather is the location (index) of the color in the palette When an image is stored, the 8 bit color index for each pixel is saved along with the palette [wwwjb11couk/28/2/1/bitmap-andindexed-images/] So any change in data of image will be perceptible, for example if we change pixel (4,4) of value (blue color) to value 2 the color of it will be red since the pointer will point to the location 2 of the palette So we can't change any value of any pixel (ie the embedding in 8-bit image is impossible) 2283

Palette Fig (1), Structure of 8-bit color 3 CONCEALING IN (LSB) of 24-BIT IMAGE When applying LSB techniques to each byte of a 24-bit image, three bits can be encoded into each pixel, as each pixel is represented by three bytes Any changes in the pixel bits will be indiscernible to human eye For example, the letter A can be hidden in three pixels Assume the original three pixels are represented by three 24-bit words below: (1111 11111 111) (1111 111 11111) (111 1111 11111) The binary value for letter A is (11), inserting the binary value of A into the three pixels, starting from the top left byte, would result in: (1111 1111 111) (111 111 11111) (1111 111 11111) The emphasized bits are the only bits that actually changed The main advantage of LSB insertion is that data can be hidden in the least and second least bits and still the human eye would be unable to notice it [Raed Mahdi Salih21] 4 CONCEALING IN (LSB) OF AUDIO When hiding information inside Audio files the technique usually used is low bit encoding which is some what similar to LSB that is generally used in Images The problem with low bit encoding is that it is usually noticeable to the human ear, so it is a rather risky method for someone to use if they are trying to mask information inside of an audio file [Aelphaeis Mangarae26] 5 THE SUGGESTED MEHOD The suggested method can be as the following:- - THE SUGGESTED EMBEDDIGN MEHOD The suggested embedding method is shown in algorithm 1 and algorithm 2 Step 1: Choose any image Step 2: Find the histogram of this image Step 3: Count the number of used color Step 4: If the number > go to step 1 Step 5: Re index the sequence of used colors within palette of image to be an even numbers 2284

Step 6: Change the data of image according to the sequence in the palette Step 7: Make duplicating to all used colors in palette (the sequences of all duplicated colors will be odd sequences and each odd sequence must be after even sequence respectively) Algorithm 1, Re index and duplicate palette of image Step 1: Choose the prepared image Step 2: Choose the secret message Step 3: Convert the secret message to binary numbers Step 4: Count the number of bits Step 5: for x=1 to the number of bits Step 6: Embed bit(x) in the desired pixel Step 7: next x Step 8: Store the stego image Algorithm 2, embedding the secret message - THE SUGGESTED EXTRACTING MEHOD The suggested extracting method is shown in algorithm 3 Step 1: Open Stego image Step 2: for x=1 to number of bits Step 3: retrieve the embedded bit from stego image Step 4: next x Step 5:convert retrieved bits into character Step 6: Store the secret message Algorithm 3, extracting the secret message - ILLUSTRATIVE EXAMPLE To implement the method, let us take 8-bit color image uses 74 colors (that is, there are 182 unused colors) The image is shown in Fig(2) Fig(2), the original image 2285

The value of used palette is shown in Table (1) Palette # Red Green Blue Palette # Red Green Blue 129 36 1 37 133 213 16 192 251 255 192 255 214 16 192 254 255 255 218 192 192 255 255 255 255 Table (1), values of used palettes of an image in Fig (2) Now, we can re index the sequences of all used color within palette of image to be an even numbers Table (2), shows the results of re index The used colors Re index it into 2 36 4 37 6 161 1 66 165 68 169 7 17 72 173 74 Table (2), results of Re index palette Then we can make duplicating to all values of used colors in palette (the index of duplicated values will be odd number, and each odd number must be after even no respectively)( For example, if color no 1 has values R=, G=, B=, then the values of no 11 will be R=, G=, B=) After that procedure, we will change the values of image according to the index of palette Fig(3)a shows part of actual data of image, Fig(3)b the image after changing it s palette and actual data, and Table (3) shows the values of palettes after implementing the duplicating procedure 2286

94 2 14 18 2 86 82 12 16 8 2 16 94 82 Fig (3 )a, part of actual Fig (3 )b, an image after data of image after changing it's palette and actual data changing (Look!, an image visually is unimpressed) Palette # 1 2 3 4 5 6 7 8 9 1 52 53 54 55 Red Green Blue Table (3), the values of palettes after implementing the duplicating procedure Now, after changing actual data and palette, a hiding of the data can be done For example, suppose that we want to hide the letter S (The binary value for it is (1111))Character (S) can be hidden in 8 pixels, so if we have the following eight pixels :- () 2 (1) 4 (1) 6 (11) 8 (1) 1(11) 12(11) 14(111) After embedding procedure (by using LSB method), the values of pixels will be :- 1 (1) 3 (11) 4 (1) 6 (11) 9 (11) 1(11) 13(111) 14(111) 2287

That means the value of index palette will be changed into 1, 2 into 3, etc This changing will be imperceptible, since the pointing will be into palette no 1 instead, or 3 instead 2, and obviously no and no1 in the palette have the same values of color (R=, G=, B=), no 2 and no3 in the palette have the same values of color(r=, G=, B=), and so on 6 CONCLUSIONS AND DISCUSSION 1- Until recently, information hiding techniques received very much less attention from the research community and from industry than cryptography Steganography has its place in security It is not intended to replace cryptography but supplement it Hiding a message with steganography methods reduces the chance of a message being detected However, if that message is also encrypted, if discovered, it must also be cracked (yet another layer of protection) There are an infinite number of steganography applications This paper explores a tiny fraction of the art of steganography It goes well beyond simply embedding text in an image Steganography does not only pertain to digital images but also to other media (files such as voice, other text and binaries; other media such as communication channels, the list can go on and on) 2-We can hide secret message in any pixel of an image, without any perceptible changing in it 3- We can apply (LSB) in the palette of image 4- The extraction of secret message is blind, ie, no original image is needed for secret message extraction 7 References Aelphaeis Mangarae" Steganography FAQ", March 18th 26 wwwinfosewriters/text-resources/pdf/steganography-amangaraepdf DrKDuraiswamy, BE,MSc,(Engg),PhD" SECURITY THROUGH, OBSCURITY ", College Of Technology, Tiruchengode, 26 wwwrootsecurnet/content/dowload/pdf/ security through obsecuritypdf Jessica Fridrich, Miroslav Goljana, David Soukalb"Higher-order statistical steganalysis of palette images " Department of Electrical and Computer Engineering, Department of Computer Science,SUNY Binghamton, Binghamton, NY 1392-6,27 wwwwsbinghamtonedu/fridrich/research/pairs1pdf Raed Mahdi Salih, information Hiding in Wave Media File by Using Low Bit, M Sc thesis, University of Technology, 21 wwwjb11couk/28/2/1/bitmap-and-indexed-images/ 2288