Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Similar documents
Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

An Enhanced Least Significant Bit Steganography Technique

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Analysis of Secure Text Embedding using Steganography

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Steganography using LSB bit Substitution for data hiding

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Dynamic Collage Steganography on Images

A Proposed Technique For Hiding Data Into Video Files

Information Hiding: Steganography & Steganalysis

LSB Encoding. Technical Paper by Mark David Gan

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

An Implementation of LSB Steganography Using DWT Technique

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

A Study on Steganography to Hide Secret Message inside an Image

Comparative Analysis of Hybrid Algorithms in Information Hiding

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A New Image Steganography Depending On Reference & LSB

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Detection of Steganography using Metadata in Jpeg Files

Block Wise Data Hiding with Auxilliary Matrix

Hiding Image in Image by Five Modulus Method for Image Steganography

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

A Comprehensive Review on Secure Image Steganography

A New Steganographic Method for Palette-Based Images

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

ELTYEB E. ABED ELGABAR

Enhance Image using Dynamic Histogram and Data Hiding Technique

Concealing Data for Secure Transmission and Storage

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

Image Compression Supported By Encryption Using Unitary Transform

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Different Steganography Methods and Performance Analysis

Effective and Secure Method of Color Image Steganography

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Colored Digital Image Watermarking using the Wavelet Technique

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

An Integrated Image Steganography System. with Improved Image Quality

Watermarking patient data in encrypted medical images

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Meta-data based secret image sharing application for different sized biomedical

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

An Improved LSB based Steganography Technique for RGB Color Images

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

An Improvement for Hiding Data in Audio Using Echo Modulation

New High Capacity Secure Steganography Technique

RGB Intensity Based Variable-Bits Image Steganography

Performance Improving LSB Audio Steganography Technique

Digital Image Processing Introduction

A Novel Approach for Hiding Huge Data in Image

A Brief Introduction to Information Theory and Lossless Coding

Secret Communication on Facebook Using Image Steganography: Experimental Study

Image Steganography with Cryptography using Multiple Key Patterns

Compendium of Reversible Data Hiding

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

A Study on Image Steganography Approaches in Digital Images

REVERSIBLE data hiding, or lossless data hiding, hides

Hiding And Encrypting Binary Images Using A Different Approach

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Assistant Lecturer Sama S. Samaan

Vernam Encypted Text in End of File Hiding Steganography Technique

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

HSI Color Space Conversion Steganography using Elliptic Curve

An Alternative Approach of Steganography using Reference Image

Sterilization of Stego-images through Histogram Normalization

Improved Quality of Image Steganography Using POLPA

A New Compression Method for Encrypted Images

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

A Hybrid Technique for Image Compression

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

CSE 3482 Introduction to Computer Security.

Data Hiding In Audio Signals

Keywords Secret data, Host data, DWT, LSB substitution.

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACING METHOD

Secret Communication Using Image Steganography

SSB-4 System of Steganography Using Bit 4

FPGA implementation of LSB Steganography method

CHAPTER 6: REGION OF INTEREST (ROI) BASED IMAGE COMPRESSION FOR RADIOGRAPHIC WELD IMAGES. Every image has a background and foreground detail.

Pixel Image Steganography Using EOF Method and Modular Multiplication Block Cipher Algorithm

Transform Domain Technique in Image Steganography for Hiding Secret Information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

Transcription:

44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS S. No. Name of the Sub-Title Page No. 3.1 Image Steganography 47 3.2 Charcterizing Data Hiding Techniques 47 3.3 Binary Representation of an RGB Color Image 49 3.4 Algorithms Used in Proposed Method 49 3.4.1 LSB 49 3.4.2 Lempel and ZIV Compression Algorithm (LZ) 50 3.4.3 RSA Algorithm 52 3.5 Implementation 53 3.5.1 LSB Encoding Algorithm 53 3.5.2 LSB Decoding Algorithm 54 3.6 Experimental Work and Results 55 3.6.1 MSE 56 3.6.2 PSNR 56 3.6.3 Correlation 56 3.6.4 Histogram 57 3.7 Conclusions 60

46 3. LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS This chapter applies LSB Steganography technique for various lossless file formats such as BMP, GIF and PNG. The science which deals with the hidden communication is called Steganography. There are different kinds of steganographic techniques which are complex and which have strong and weak points in hiding the invisible information in various file formats. The innocent carriers are the possible cover carriers which will hold the hidden communication. A Steganography method is admirably secure only when the statistics of the cover information and the stego information are similar with each other. In other words it conveys the meaning that the relative entropy between the cover information and the stego information is zero. The LSB embedding technique suggests that data can be hidden in such a way that even the naked eye is unable to identify the hidden information in the LSBs of the cover file. In this chapter, a Steganography system is designed for hiding and unhiding a secret file into an image file using LSB insertion technique. An encryption and decryption technique on the data to be hidden into the image file is performed to provide additional security to the data.

47 Steganography is an alternative method for privacy and security. Instead of encrypting, we can hide the messages in other innocuous looking medium (carrier) so that their existence is not revealed. Among the several advantages for employing the Steganography, secretly transmitting the secret information from source to destination is one. In this chapter, different approaches towards implementation of image Steganography have been thoroughly and clearly discussed. Among several techniques, Masking and Filtering, Algorithms and Transformations and LSB insertion [8] are some of the methods to achieve Steganography. Among these techniques, LSB insertion is a very simple and commonly applied technique for embedding data in a cover file. 3.1 IMAGE STEGANOGRAPHY Image compression is a technique which is widely used in Steganography. It is of two types- lossy compression and lossless compression. Lossy compression may not preserve the integrity of original image where as Lossless compression preserves the original image data correctly. Hence lossless compression is chosen. Examples of Lossless compression formats are GIF [84], BMP and PNG formats. JPEG format is the example for Lossy compression format. 3.2 CHARCTERIZING DATA HIDING TECHNIQUES Steganography is a kind of technique which can embed a message inside a cover object. There are a number of features that characterizes the merits and demerits of the embedding techniques.

48 The way they are applied decides the importance of each and every feature. A set of criteria are proposed to define the invisibility of an algorithm. The criterias are as follows: Invisibility The imperceptibility of a Steganography technique is the most important necessity, since the quality of Steganography lies in its capacity to be unseen by the naked eyes. Payload Capacity Steganography techniques used aim at hiding the embedded secret data and also maximize the amount of information embedded. The amount of information that is hidden is called payload capacity. Hiding Capacity Concealing capacity is nothing but the size of data that could be concealed with respect to the size of the cover object. A vast concealing capacity permits the use of smaller cover images and thus decreases the data transmission needed to broadcast the stego image. Perceptual Transparency The inability of an eavesdropper to detect hidden data is referred by Perceptual transparency.

49 3.3 BINARY REPRESENTATION OF AN RGB COLOR IMAGE For a 24-bit RGB image, every RGB component requires 8 bits of memory. The range of every RGB component value is in between 0 to 255 where 255 represent brightest shade of the color and 0 represents darkest shade of the color. All different colors could be produced with the combination of these ranges. Subsequently, the test image is represented by integer matrix. Every pixel is a mix of RGB values. 3.4 ALGORITHMS USED IN PROPOSED METHOD In the proposed method, Steganography is combined with Cryptography. It changes the meaning of the information as well as it hides the presence of information from the hacker. The LZ algorithm for compression and RSA algorithm for encryption and decryption are used in this chapter. 3.4.1 LSB The easiest way to embed secret information within the cover file is called LSB insertion. In this technique, the binary representations of the secret data have been taken and the LSB of each byte is overwritten within the image. If 24-bit color images are used, then the quantity of modification will be small. As an example, supposing that we have three neighbouring pixels (nine bytes) with the following RGB encoding:

50 01101010 11110010 00110110 01101001 11110000 00110101 01100000 11101111 00110100 Now if we wish to embed the following 9 bits of compressed secret information: 010010011. If we insert these 9 bits over the LSB of the 9 bytes above, we get the following sequence of bits (where bits in red color have been modified): 01101010 11110011 00110110 01101000 11110001 00110100 01100000 11101111 00110101 Note that we have successfully hidden 9 bits but at a cost of only modifying 5, or roughly 50% of the LSB bits. 3.4.2 LZ Compression Algorithm [85]: Step-1: Read the original file. Step-2: Count the total number of words, alphabets, special characters and digits in the file. Step-3: Find out the repeated words in the file. Step-4: Prepare the word dictionary for the original file context. Step-5: Create compressed file. In the compressed file place the word s number instead of actual words.

51 Step-6: Add dictionary to compressed file. Step-7: Save the compressed file along with the dictionary. Example: Ask not what your country can do for you ask what you can do for your country Number of characters 61 Number of words 17 Number of spaces 16 Number special characters 00 Total bytes in original text 79 The dictionary of the above example is as follows Dictionary Word Equivalent Number for word Ask 1 What 2 Yours 3 Country 4 Can 5 Do 6 For 7 You 8

52 The compressed context of the above example is as follows: Compressed context 1not2345678 12856734 Bytes required for compression file 59 Total Saving 25% Compression Lossless Compression After applying lossless LZ compression, the size of the original context is reduced from 79 bytes to 59 bytes. 3.4.3 RSA Algorithm In Cryptography, RSA [86] is an algorithm for public-key Cryptography. The RSA algorithm involves three steps: Key generation, encryption and decryption. Key Generation: The keys for the RSA algorithm are generated in the following way: Step-1: Choose two different random prime numbers p and q. Step-2: Compute n = p*q. n is used as the modulus for both the private and public keys. Step-3: Compute φ (n) = (p-1) (q-1). (φ is Euler s totient function). Step-4: Choose an integer e such that 1 < e < φ (pq), and gcd (e, φ(n))=1 Step-5: Compute d =e -1 mod [φ (n)] Step-6: Publish the public encryption key: (e; n) Step-7: Keep secret private decryption key: (d; n)

53 Encryption: The steps required to encrypt information at sender are as follows: Step-1: Obtain public key of recipient (e; n) Step-2: Represent the information as an integer m in [0, n-1] Step-3: Compute c = m e mod n Decryption: The steps required to decrypt information at receiver side are as follows: Step-1: use private key (d; n) Step-2: compute m = c d mod n 3.5 IMPLEMENTATION LSB insertion is the easiest way to embed secret data in an image. By replacing the LSB of each sampling bit with a binary information, LSB insertion permits for a huge amount of secret information to be embedded. During hiding and unhiding procedure, the content of the secret information should not be modified. 3.5.1 LSB Encoding Algorithm First the original image, as shown in the Fig. 3.1 and the compressed encrypted secret message are taken. Then the encrypted secret data has to be converted into binary format. Binary conversion is done by taking the American Standard Code of Information Interchange (ASCII) values of the character and converting them into

54 binary format and generating stream of bits. Similarly, in cover image, bytes representing the pixels are taken in single array and byte stream is generated. Message bits are taken sequentially and then are placed in LSB bit of image byte. Same procedure is followed till all the message bits are placed in image bytes. Image generated is called Stego-Image as shown in the Fig. 3.2. It is ready for transmission through the Internet. Algorithm for hiding secret data in Cover image: Step-1: Read the cover image and secret text information which is to be embedded in to the cover image. Step-2: Compress the secret information. Step-3: Convert the compressed secret information into cipher text by using secret key shared by receiver and sender. Step-4: Convert compressed encrypted text message into binary form. Step-5: Find LSBs of each RGB pixels of the cover image. Step-6: Embed the bits of the secret information into bits of LSB of RGB pixels of the cover image. Step-7: Continue the procedure until the secret information is fully hidden into cover file. 3.5.2 LSB Decoding Algorithm First, Stego-Image is taken and single array of bytes are generated as it was done at the time of encoding. The total number of bits of encrypted secret information and the bytes representing the

55 pixels of stego-image are taken. Counter is initially set to 1, which in turn gives the index number of the pixel byte where secret message bit is available in LSB. The process is continued till final count of secret message bit is reached. After this, the bit stream of the message shall be generated. Available bits are grouped to form bytes such that each byte represents single ASCII character. Characters are stored in text file which represents the encrypted embedded message. After that the decryption and decompression are to be performed. Algorithm for unhiding secret data from Stego image: Step-1: Read the stego image. Step-2: Find LSBs of each RGB pixel of the stego image. Step-3: Find and retrieve the LSBs of each RGB pixel of the stego image. Step-4: Continue the process until the message is fully extracted from stego image. Step-5: Decompress the extracted secret data. Step-6: Using shared key, decrypt secret information to get original information. Step-7: Reconstruct the secret information. 3.6 EXPERIMENTAL WORK AND RESULTS Comparing cover image with stego image needs an image quality measure. Commonly used measures are MSE, PSNR, Correlation and Histogram [87].

56 3.6.1 MSE In statistics, MSE is quantifying the difference between values implied by an estimator and the true values of the quantity being estimated. MSE measures the average of the squares of the "errors." The MSE between cover file and stego file is calculated as per Eq. (1.2). 3.6.2 PSNR PSNR scales the MSE according to the image range. The PSNR between cover image and stego image is given by Eq. (1.3). A higher PSNR indicates that the quality of the stego image is similar to the cover image. 3.6.3 Correlation Correlation, a best known method, not only evaluates the degree of closeness between two functions but also determines the extent to which the cover image and the stego image are close to each other even after embedding data. The MSE, PSNR and Correlation values for various image file formats are shown in the Table 3.1.

57 Table 3.1: Quality Metrics for various Image File Formats Cover Image Name Stego Image Name MSE PSNR (db) Correla tion Cover_Leena.bmp Stego_Leena.bmp 3.6791 46.19 0.9984 Cover_Barbara.bmp Stego_Barbara.bmp 4.0184 49.42 0.9986 Cover_Baboon.gif Stego_Baboon.gif 2.1883 44.72 0.9993 Cover_House.gif Stego_House.gif 3.8426 47.49 0.9985 Cover_Peppers.png Stego_Peppers.png 3.0425 44.35 0.9973 Cover_Aeroplane.png Stego_Aeroplane.png 2.6573 42.15 0.9981 The results show that MSE, PSNR and correlation are in comparison with already existing results. The MSE obtained for different file formats varies from 2.6 to 4.0 and PSNR varies from 42.15 to 49.42 db and 99.98% of correlation is obtained with the proposed technique. 3.6.4 Histogram An image histogram is a bar chart that shows the distribution of intensities in an image. Fig. 3.1 is original image where as Fig. 3.2 is stego image. Fig. 3.3 and 3.4 show the color histograms of cover image and stego image respectively.

58 Fig. 3.1: Cover_Baboon.bmp Fig. 3.2: Stego_Baboon.bmp

59 Fig. 3.3: RGB Color Histogram of Cover Image Fig. 3.4: RGB Color Histogram of Stego Image

60 According to Steganography, the secret message which is hidden may result in a distortionless image. At the same time this distortion will be perceptible to the naked eye. The quantity of information invisibly hidden in the image resulting in a distortionless image plays a pivotal role and this is decided by algorithm. The required characteristics are assesed while chosing a specific file format for Steganography as shown in Table 3.2. Table 3.2: Comparison of LSB Method for Various Image File Formats Characteristic LSB in GIF LSB in PNG LSB in BMP Quantity of hidden data Medium Medium High Independent of file format Low High Low Steganalysis detection Low Low Low Image manipulation Low Low Low Percentage Distortion less resultant image Medium High High Embedding capacity Medium Medium High Invisibility Medium Medium High 3.7 CONCLUSIONS The proposed method is very useful technique for secure communication over the Internet. In the process of Steganography, the message which is hidden is invisible. An attempt has been made to implement encryption and decryption techniques on the data to be hidden into the carrier files, so that this will provide additional security to the data. The sender and receiver only know how to hide and

61 unhide the data into the carrier files. No other intermediate person will even know that there is a second message inside the carrier file. The sender and receiver only know the commands to hide and unhide. Since BMP utilizes lossless compression, LSB makes utilization of BMP image. To have the capacity to conceal secret information within a BMP image, one requires a substantial cover medium. The advantage of LSB hiding is its simplicity. LSB embedding technique also allows high perceptual transparency. The data hiding capacity of LSB technique is high and more secure. Embedding secret information with Steganography technique decreases the probability of secret information being detected. LSB insertion method to image Steganography works effectively for 24 BMP, GIF and PNG image file formats. Using this embedding and extracting algorithms, one can extract the secret message exactly as original message without changing the cover image.