Steganography using LSB bit Substitution for data hiding

Similar documents
A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

A Study on Image Steganography Approaches in Digital Images

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

A New Image Steganography Depending On Reference & LSB

An Enhanced Least Significant Bit Steganography Technique

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

An Implementation of LSB Steganography Using DWT Technique

Analysis of Secure Text Embedding using Steganography

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

A Proposed Technique For Hiding Data Into Video Files

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

A Study on Steganography to Hide Secret Message inside an Image

Investigation of Various Image Steganography Techniques in Spatial Domain

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

ELTYEB E. ABED ELGABAR

FPGA implementation of LSB Steganography method

An Integrated Image Steganography System. with Improved Image Quality

Block Wise Data Hiding with Auxilliary Matrix

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Colored Digital Image Watermarking using the Wavelet Technique

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Hiding Image in Image by Five Modulus Method for Image Steganography

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Data Hiding Using LSB with QR Code Data Pattern Image

Keywords Secret data, Host data, DWT, LSB substitution.

Digital Watermarking Using Homogeneity in Image

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Data Hiding in Gray-Scale Images by LSB Method using IWT with Lifting Scheme

HSI Color Space Conversion Steganography using Elliptic Curve

A Reversible Data Hiding Scheme Based on Prediction Difference

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

Sterilization of Stego-images through Histogram Normalization

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Image Steganography with Cryptography using Multiple Key Patterns

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Dynamic Collage Steganography on Images

A New Steganographic Method for Palette-Based Images

A Novel Approach for Hiding Huge Data in Image

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

An Alternative Approach of Steganography using Reference Image

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Enhance Image using Dynamic Histogram and Data Hiding Technique

Information Hiding: Steganography & Steganalysis

Compendium of Reversible Data Hiding

Improved Quality of Image Steganography Using POLPA

A Recursive Threshold Visual Cryptography Scheme

Performance Improving LSB Audio Steganography Technique

Comparative Histogram Analysis of LSB-based Image Steganography

Image Steganography using Sudoku Puzzle for Secured Data Transmission

EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM

Transform Domain Technique in Image Steganography for Hiding Secret Information

Image Quality Estimation of Tree Based DWT Digital Watermarks

Application of Histogram Examination for Image Steganography

Effective and Secure Method of Color Image Steganography

PROPOSED METHOD OF INFORMATION HIDING IN IMAGE

LSB Encoding. Technical Paper by Mark David Gan

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

RGB Intensity Based Variable-Bits Image Steganography

New High Capacity Secure Steganography Technique

Enhancing the Least Significant Bit (LSB) Algorithm for Steganography

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Different Steganography Methods and Performance Analysis

SSB-4 System of Steganography Using Bit 4

Image Compression Supported By Encryption Using Unitary Transform

An Overview of Image Steganography Techniques

A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key

An Improved LSB based Steganography Technique for RGB Color Images

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

A New Representation of Image Through Numbering Pixel Combinations

Detection of Steganography using Metadata in Jpeg Files

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

Watermarking patient data in encrypted medical images

Improved Detection of LSB Steganography in Grayscale Images

Threshold-based Steganography: A Novel Technique for Improved Payload and SNR

An Improvement for Hiding Data in Audio Using Echo Modulation

Dual Transform Color Image Steganography Method

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Comparative Analysis of Hybrid Algorithms in Information Hiding

REVERSIBLE data hiding, or lossless data hiding, hides

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Using Palette and Minimum Spanning Tree for True-Color Image Steganography

Undercover Communication Using Image and Text as Disguise and. Countermeasures 1

Transcription:

ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication Engineering Lakshmi Narain College of Technology & Science, Bhopal, Madhya Pradesh Abstract Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Different applications have different requirements of the steganography technique are used. In the domain of digital images many different image file formats exist, most of them for specific applications. For these different image file formats, different steganographic algorithms exist. But in these paper two methods is discussed image domain and transform domain. The use of LSB algorithm for image domain decreases the MSE value and increase the PSNR value when increase the bit substitution. This work is simulated on MATLAB and results shows the effect of different message bit for hide bit and analysis effect on the results. Keywords- Steganography, LSB, bit-substitution, Image domain, transform domain. 1. INTRODUCTION Steganography is the art of invisible communication by concealing information inside other information. A steganography system consists of three elements: cover-object (which hides the secret message), the secret message and the stego-object (which is the cover object with message embedded inside it.) Given the proliferation of digital images on the internet, and the large redundant bits present in the digital representation of an image, images are the most popular cover objects for steganography [1]. A digital image is described using a 2-D matrix of the color intestines at each grid point (i.e. pixel). Typically, gray images use 8 bits, whereas colored utilizes 24 bits to describe the color model, such as RGB model. The secret bits are written directly to the cover image pixel bytes. Consequently, the spatial domain techniques are simple and easy to implement. The Least Significant Bit (LSB) is one of the main techniques in spatial domain image steganography. On the other hand, frequencybased steganography has higher peak signal-to-noise ratio (PSNR) and is more secure [1]. Unfortunately, frequencybased techniques are more complex and require much more computations. 2. STEGANOGRAPHY In Steganography information data are hiding with a cover image file. The Steganography consist of main four parts Text, Images, Audio/video and Protocol, but in this paper we are only focus on the Image steganography which is subdivided in two part image domain and transform domain as shown in Fig. 1 The Text steganography using digital files is not used very often since text files have a very small amount of redundant data. Given the proliferation of digital images, especially on the Internet, and given the large amount of redundant bits present in the digital representation of an image, images are the most popular cover objects for steganography. To hide information in audio files similar techniques are used as for image files. One different technique unique to audio steganography is masking, which exploits the properties of the human ear to hide information unnoticeably. A faint, but audible, sound becomes inaudible in the presence of another louder audible sound. This property creates a channel in which to hide information. Although nearly equal to images in steganographic potential, the larger size of meaningful audio files makes them less popular to use than images. The term protocol steganography refers to the technique of embedding information within messages and network control protocols used in network transmission [2]. Figure 1: Categories of image steganography To a computer, an image is a collection of numbers that constitute different light intensities in different areas of the image [3]. This numeric representation forms a grid and the individual points are referred to as pixels. The number of bits in a color scheme, called the bit depth, refers to the number of bits used for each pixel [4].. The smallest bit depth in current color schemes is 8, meaning that there are 8 bits used to describe the cooler of each pixel [5]. Monochrome and greyscale images use 8 bits for each pixel and are able to display 256 different colors or shades of grey. Digital color images are typically stored in 24- All Rights Reserved 213 IJARCSEE 676

ISSN: 2277 943 Volume 2, Issue 1, October 213 bit files and use the RGB color model, also known as true cooler [6]. All color variations for the pixels of a 24-bit image are derived from three primary colors: red, green and blue, and each primary cooler are represented by 8 bits [7]. Thus in one given pixel, there can be 256 different quantities of red, green and blue, adding up to more than 16-million combinations, resulting in more than 16-million colors. 3. IMAGE DOMAIN AND TRANSFORM DOMAIN An Image is also known as spatial domain techniques embed messages in the intensity of the pixels directly, while for transform also known as frequency domain, images are first transformed and then the message is embedded in the image. Image domain techniques encompass bit-wise methods that apply bit insertion and noise manipulation. The image formats that are most suitable for image domain steganography are lossless and the techniques are typically dependent on the image format. Steganography in the transform domain involves the manipulation of algorithms and image transforms [8].These methods hide messages in more significant areas of the cover image, making it more robust [9]. Many transform domain methods are independent of the image format and the embedded message may survive conversion between lossy and lossless compression. (1111 11111 1111) When the number 2, which binary representation is 111, is embedded into the least significant bits of this part of the image, the resulting grid is as follows: (1111 1111 11111) (1111 1111 11) (1111 1111 1111) Although the number was embedded into the first 8 bytes of the grid, only the 3 underlined bits needed to be changed according to the embedded message. On average, only half of the bits in an image will need to be modified to hide a secret message using the maximum cover size. Since there are 256 possible intensities of each primary colour, changing the LSB of a pixel results in small changes in the intensity of the colours. These changes cannot be perceived by the human eye - thus the message is successfully hidden. With a well-chosen image, one can even hide the message in the least as well as second to least significant bit and still not see the difference. In the above example, consecutive bytes of the image data from the first byte to the end of the message are used to embed the information. A slightly more secure system is for the sender and receiver to share a secret key that specifies only certain pixels to be changed. Should an adversary suspect that LSB steganography has been used, he has no way of knowing which pixels to target without the secret key. The result stegoimages are shown in Fig.6 Inspecting the images reveal that the distortion is visible for the stego-image for n 4. The metrics for all images are similar. Figure 2: Block diagram of Steganography Fig.2 shows the fundamental block diagram of Steganography. The LSB is the lowest significant bit in the byte value of the image pixel. The LSB based image steganography embeds the secret in the least significant bits of pixel values of the cover image (CVR). 4. LEAST SIGNIFICANT BIT Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image [1].The least significant bit (in other words, the 8th bit) of some or all of the bytes inside an image is changed to a bit of the secret message. When using a 24-bit image, a bit of each of the red, green and blue color components can be used, since they are each represented by a byte. In other words, one can store 3 bits in each pixel. An 8 6 pixel image, can thus store a total amount of 1,44, bits or 18, bytes of embedded data. For example a grid for 3 pixels of a 24-bit image can be as follows: (1111 111 11111) (1111 111 11) Figure 3: Test Images Table1: Image matrix parameter on different bit substitution n-bit LSB PSNR (db) MSE 1-bit 17.4173 4751.2 2-bit 22.982 1341.9 3-bit 29.694 324.7878 4-bit 35.2618 78.48 5-bit 41.766 17.4559 6-bit 48.74 3.538 7-bit 57.188.517 8-bit 99 All Rights Reserved 213 IJARCSEE 677

ISSN: 2277 943 Volume 2, Issue 1, October 213 extracting decoded image. Finally compare the histogram response of cover image and on variation of bit substitution ( Fig.9 and Fig.1 ) and also calculate the PSNR and MSE with variation of bit substitution as Table1. 1-bit substitution 2-bit substitution 1-bit substitution 2-bit substitution 3-bit substitution 4-bit substitution 3-bit substitution 4-bit substitution 5-bit substitution 6-bit substitution 5-bit substitution 6-bit substitution 7-bit substitution 8-bit substitution Figure 4: Extracted Images on different bit substitution. 5. SIMULATION RESULTS Two simulations are compute on MATLAB for data hide first the LSB code for hide bit using bit shifting and takes the results, shown in figure4 for 4bit data shifting. Take the test lena and baboon, images for cover image and message image [11] and developed algorithm on MATLAB according to Fig.2. The two simulation are perform first for testing taking monochrome image and second one is color image and gets the result in form of extracted images Fig.4, steganographic images Fig.5, Fig.7, where Fig.8 represent the output of 7-bit substitution 8-bit substitution Figure 5: Steganographic Images on different bit substitution All Rights Reserved 213 IJARCSEE 678

ISSN: 2277 943 Volume 2, Issue 1, October 213 4 Bit Image to Hide Stego image 45 4 35 3 25 2 15 1 5 5 1 15 2 25 Figure 6: 4-bit Image hide by LSB method (Baboon.jpeg) (a) Histogram of Transformed stego image on 1-bit substitution LSB Stego Image 6 5 4 3 2 1 Figure 7: Results from LSB algorithm (Baboon.jpeg) 5 1 15 2 25 (b) Histogram of Transformed stego image on 2-bit substitution 9 8 7 6 5 4 3 2 Figure 8: Textstring Image after LSB Extraction using Acrobat Distiller (Baboon.jpeg) 1 5 1 15 2 25 3 25 2 15 (c) Histogram of Transformed stego image on 3-bit substitution 12 1 8 1 6 5 4 5 1 15 2 25 Figure 9: Histogram of cover image 2 5 1 15 2 25 (d) Histogram of Transformed stego image on 4-bit substitution All Rights Reserved 213 IJARCSEE 679

ISSN: 2277 943 Volume 2, Issue 1, October 213 9 8 7 6 5 4 3 2 1 5 1 15 2 25 (e) Histogram of Transformed stego image on 5-bit substitution 6 5 4 3 2 1 5 1 15 2 25 (f) Histogram of Transformed stego image on 6-bit substitution (g) Histogram of Transformed stego image on 7-bit substitution 3 45 4 35 3 25 2 15 1 5 5 1 15 2 25 6. CONCLUSION In this paper, we analyzed the performance of different cases of LSB steganography. Then proposed the LSB design for bit shifting method and LBS algorithm compare the result there is no any change in original figure and stego figure but whenever textstring is 2-D so extracting image is black and white and color. REFERENCES [1] T. Morkel, J. Eloff and M. Olivier, "An Overview of Image Steganography," The Fifth Annual Information Security South Africa Conference (ISSA25), Sandton, South Africa, July 25. [2] H. Wang, S. Wang, Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM, Vol. 47, No. 1, pp. 76-82, October 24. [3] E. Walia, P. Jain, Navdeep, An Analysis of LSB & DCT based Steganography, Global Journal of Computer Science and Technology, Vol. 1, pp. 4-8., April, 21. [4] Anderson, R.J. & Petitcolas, F.A.P., On the limits of steganography, IEEE Journal of selected Areas in Communications, May 1998. [5] Moerland, T., Steganography and Steganalysis, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf [6] Artz, D., Digital Steganography: Hiding Data within Data, IEEE Internet Computing Journal, June 21. [7] Johnson, N.F. & Jajodia, S., Exploring Steganography: Seeing the Unseen, Computer Journal, February 1998. [8] Venkatraman, S., Abraham, A. & Paprzycki, M., Significance of Steganography on Data Security, Proceedings of the International Conference on Information Technology: Coding and Computing, 24. [9] Lee, Y.K. & Chen, L.H., High capacity image steganographic model, Visual Image Signal Processing, 147:3, June 2. [1] Himanshu Gupta, Ritesh Kumar and Soni Changlani, Enhanced Data Hiding Capacity Using LSB-Based Image Steganography Method, International Journal of Emerging Technology and Advanced Engineering, ISSN 225-2459 Volume 3, Issue 6, pp. 212-214, June 213. [11] The image database of the signal [online]. Available: http://sipi.usc.edu/database/ 25 2 15 1 5 5 1 15 2 25 (h) Histogram of Transformed stego image on 8-bit substitution Figure1: Histogram of Transformed stego image on different bit substitution All Rights Reserved 213 IJARCSEE 68