Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Similar documents
Image Steganography using Sudoku Puzzle for Secured Data Transmission

Analysis of Secure Text Embedding using Steganography

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

HSI Color Space Conversion Steganography using Elliptic Curve

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

An Enhanced Least Significant Bit Steganography Technique

Dynamic Collage Steganography on Images

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Steganography using LSB bit Substitution for data hiding

An Implementation of LSB Steganography Using DWT Technique

A New Image Steganography Depending On Reference & LSB

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

An Integrated Image Steganography System. with Improved Image Quality

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

Comparative Analysis of Hybrid Algorithms in Information Hiding

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Image Steganography with Cryptography using Multiple Key Patterns

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Keywords Secret data, Host data, DWT, LSB substitution.

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Digital Image Sharing using Encryption Processes

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Investigation of Various Image Steganography Techniques in Spatial Domain

Enhance Image using Dynamic Histogram and Data Hiding Technique

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Meta-data based secret image sharing application for different sized biomedical

Different Steganography Methods and Performance Analysis

LSB Encoding. Technical Paper by Mark David Gan

Sterilization of Stego-images through Histogram Normalization

Colored Digital Image Watermarking using the Wavelet Technique

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

A Reversible Data Hiding Scheme Based on Prediction Difference

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

A Novel Approach for Hiding Huge Data in Image

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Effective and Secure Method of Color Image Steganography

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Cosine Transformation (DCT)

Watermarking patient data in encrypted medical images

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Hiding Image in Image by Five Modulus Method for Image Steganography

ABSTRACT. file. Also, Audio steganography can be used for secret watermarking or concealing

An Improved LSB based Steganography Technique for RGB Color Images

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

A Proposed Technique For Hiding Data Into Video Files

A Study on Steganography to Hide Secret Message inside an Image

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

FPGA implementation of LSB Steganography method

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Block Wise Data Hiding with Auxilliary Matrix

An Improvement for Hiding Data in Audio Using Echo Modulation

Image Compression Supported By Encryption Using Unitary Transform

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

A Comprehensive Review on Secure Image Steganography

An Efficient Data Steganography Using Adaptive Pixel Pair Matching With High Security

Enhancement of Information Hiding in Audio Signals with Efficient LSB based Methods

Study of 3D Barcode with Steganography for Data Hiding

CSE 3482 Introduction to Computer Security.

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

A Study on Image Steganography Approaches in Digital Images

RGB Intensity Based Variable-Bits Image Steganography

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACING METHOD

Concealing Data for Secure Transmission and Storage

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

Hiding And Encrypting Binary Images Using A Different Approach

Performance Improving LSB Audio Steganography Technique

Data Hiding Using LSB with QR Code Data Pattern Image

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

A New Steganographic Method for Palette-Based Images

Bitmap Steganography:

Compendium of Reversible Data Hiding

Survey on Modified BPCS Steganography based on sequence of cipher bits

Detection of Steganography using Metadata in Jpeg Files

International Journal of Advanced Research in Computer Science and Software Engineering

Steganography is the idea of hiding private or sensitive data or information within

Secret Communication on Facebook Using Image Steganography: Experimental Study

Vernam Encypted Text in End of File Hiding Steganography Technique

PROPOSED METHOD OF INFORMATION HIDING IN IMAGE

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

An Integrated Approach of Data Security on Server via Stegnography using 4 bit LSB

Transcription:

Secure Steganography using N-Queen Puzzle and its Comparison with LSB Technique Akashdeep Singh Sandeep Kaur Dhanda Rupinder Kaur Abstract- Steganography is the art of concealing the existence of information within seemingly harmless carriers. A message in cipher text may arouse suspicion while an invisible message will not. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. In this paper, we propose a method of image steganography using the N-Queen solution key. The experimental results are compared using, PSNR and SNR parameters. The proposed scheme is secure because the intruder cannot directly tell the existence of data hidden inside the image. Keywords Steganography, LSB,, PSNR, SNR. I. INTRODUCTION Steganography is the art and science of writing hidden messages [7] in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Stegnography is the process of hiding the one information into the other sources of information which can be a text, image or audio file[4] such that it is invisible in the natural view. Steganography supports different types of digital formats that are used for hiding the data. Depending upon the redundancy of the object the suitable format is used. Cover Stegano Hidden Message (Text) The basic structure of Steganography is made up of three components: the cover medium, the hidden message, and the key. The cover medium can be a painting, a digital image, an mp3, even a TCP/IP packet among other things. It is the object that will carry the hidden message. A key is used to decode/decipher/discover the hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. The following formula provides a very generic description of the pieces of the steganographic process: Cover medium + hidden data + stego key = stego medium In this context, the cover medium is the file in which we hide the hidden data, which may also be encrypted using the stego key. The resultant file is the stego medium same type of file as the cover medium. The cover mediums are typically image or audio files. LSB substitution is one of the classic image steganography approaches [6]. Vol. 3 Issue 4 April 2014 4 ISSN: 2319 1058

II. RELATED WORK Steganography is the method of hiding the presence of data in cover images. Sanmitra Ijeri et.al, [9] propose the revised version of Roshan Shetty B R et.al. in which only one type of digital media was embedded in single cover image. But in proposed system multiple digital media can be embedded in single cover image. In proposed system, before embedding, the secret data is compressed and encrypted so that more and variable digital media are shared with more security. Since RED, GREEN & BLUE components of cover image pixel are used, the embedding capacity per pixel is 4.5 bits. The reference matrix used is of order 9 X 9. By using reference matrix, candidate elements (CEH, CEV, CEB) are chosen in such way that less distortion is produced in cover image after embedding the data. System provides two layer security one by using a random Sudoku among 6.671x1021 possible solutions and other by using strong encryption algorithm. The DES technique is used for encryption and the LSB technique is used for embedding the data into Sudoku puzzle. Sudoku solution is retrieved by decrypting Sudoku. III. PROPOSED METHOD The proposed method hides the secret message with minimum use of the LSB and using the N-Queen matrix as the solution key. The method is proposed to provide better security, an extra layer of data compression is added on the top.we are compressing our data using Arithmetic coding(ac) which results into a decimal number of range [0,1). For now, length of our input message can be up to 15 characters used to hide the secret messages by the following steps shown in figure: Figure 1.2 proposed method Arithmetic Coding In arithmetic coding, a message is represented by an interval of real numbers between 0 and 1. As the message becomes longer, the interval needed to represent it becomes smaller, and the number of bits needed to specify that interval grows. Successive symbols of the message reduce the size of the interval in accordance with the symbol probabilities generated by the model. The more likely symbols reduce the range by less than the unlikely symbols and hence add fewer bits to the message [5-6]. Before anything is transmitted, the range for the message is the entire interval [0, l] denoting the half-open interval 0.5 x < 1. As each symbol is processed, the range is narrowed to that portion of it allocated to the symbol. Arithmetic code is converted to bit pattern The arithmetic code is converted to bit pattern form. Level of Security For N-Queen puzzle the numbers of solutions are increasing with increase in n. The level of security is directly proportional to N because the probability of selecting a solution is decreasing with increase in value of N. If we choose level of security as 4, the image is divided into 16 chunks and each chunk will accommodate 4 bits. If we choose level of security as 8, the image is divided into 8 chunks and each chunk will accommodate 8 bits. If we choose level of security as 16, the image is divided into 4 chunks and each chunk will accommodate 16 bits. Vol. 3 Issue 4 April 2014 5 ISSN: 2319 1058

Table no. 1 No. of N-Queen solutions n 1 2 3 4 5 6 7 8 11 12 14... 25 26 Unique 1 0 0 1 2 1 6 1 34 1,78 45,7... 275,986,683,74 2,789,712,466,5 Solution 2 1 7 52.. 3434 Distinct 1 0 0 2 1 4 4 9 2,6 14,2 365,5... 2,207,893,435 22,317,699,616, Solution 2 80 00 96.. 808,352 364,044 Encoding Algorithm Step 1. Set low to 0.0 Step 2.Set high to 1.0 Step 3.While there are still input symbols do get an input symbol Code range = high - low. Step 4. High = low + range*high range(symbol) Step 5. Low = low + range*low range(symbol) End of While Step 6. Output low. Data Extraction This is the final and the last step of the proposed method in which we have to decode the secret message from the image. Now we have stegano image and we want to retrieve the original message from the stegano image. We have the stegano image and the N-queen solution. From these two, we can find the bit pattern. After getting the bit pattern, we apply arithmetic decoding and we get the original message. The following figure depicts the data extraction process. Figure 1.3 Data extraction Decoding Algorithm Step 1. get encoded number Step 2. Do find symbol whose range straddles Step 3. the encoded number Vol. 3 Issue 4 April 2014 6 ISSN: 2319 1058

output the symbol range = symbol low value - symbol Step 4. high value subtract symbol low value from Step 5. encoded number divide encoded number by range Step 6.until no more symbols. IV. EXPERIMENTAL RESULTS The distortion in cover image depends upon the change in value of pixels and number of pixels of cover image used for embedding which in turn depends upon the number of components of the pixel used and amount of input data. We use PSNR, SNR and to evaluate the quality of an image. The PSNR is defined as follows 255² PSNR=10 log10 db. PSNR is the Peak signal to noise ratio. As the value of PSNR increases the quality of the image improves and as the PSNR range decreases therefore the quality of the image decreases Where is the mean square error between the original image and the stego image. The is defined as follows: = As the range of increases the quality of the image decreases and as the range of decreases the quality of the image improves. And SNR is Signal to Noise ratio of the image and is defined as follows P signal SNR=10 log10 P noise As the value of SNR increases the quality of the image decreases and as the value of SNR decreases the quality of the image improves. Table 3: comparison with LSB PSNR PSNR Using N-Queen Using N-Queen Using LSB Using LSB Flower 53.6927 0.2778 46.4978 1.4565 Car 57.5628 0.0773 46.2428 1.5445 Vol. 3 Issue 4 April 2014 7 ISSN: 2319 1058

Figure 1.4 before embedding Figure 1.5 after embedding V. CONCLUSION Steganography is the science of secret data delivery. The paper is to develop a method of steganography in which key is used to select embed position.system provides two layer security one by using a random N-Queen solutions and other by making minimum use of the LSB technique. The proposed system can be used in the fields where more priority is given to security instead of amount of data shared. So this can be used in wide range of applications like military, medical imaging, banking etc, since the quality of the image is not affected much, before and after embedding. From the table it is clear that with the decrease in value the PSNR value is increased and therefore the quality of the image is also improved to that of the original image. VI. FUTURE SCOPE There could be lot of scope for further enhancement to this project, some of which are listed here. 1. In this proposed method we have modified only the 64 bits of the image. More bits of the image can also be modified. In that way a higher embedding capacity can be obtained. 2. Two or more digital media files (input files) can be embedded in a single image file. REFERENCES [1] Chin-Chen Chang, Yung-Chen Chou and The Duc Kieu, High Capacity Data Hiding for Grayscale s, The First International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, 2007, pp 139-148. [2] Mamta Juneja, Parvinder Singh Sandhu, Designing of Robust Steganography Technique Based on LSB Insertion and Encryption, International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp 302-305. [3] Roshan Shetty B R, Rohith J, Mukund V, Rohan Honwade, Shanta Rangaswamy, Steganography using Sudoku Puzzle, International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp 623-626. [4] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia, Application of LSB Based Steganographic Technique for 8-Bit color image, World Academy of Science, Engineering and Technology, 2009, pp 423-425. [5] Piyush Marwaha, Paresh Marwaha, visual cryptographic steganography technique, second International conference on Computing, Communication and Networking Technologies, 2010, pp 1-6. [6] Tao Zhang, Wenxiang Li, Yan Zhang, Xijian Ping, Detection of LSB Matching Steganography Based on Distribution of Pixel Differences in Natural s, Zhengzhou Information Science and Technology Institute Zhengzhou, China,2010, pp 1-5. [7] Ge Huayong, Huang Mingsheng, Wang Qian, Steganography and Steganalysis Based on Digital, 4th International Congress on and Signal Processing, 2011, pp 252-255. [8] S. Changder, N. C. Debnath, D. Ghosh,, A greedy approach to text steganography using properties of sentences, Eighth International Conference on Information Technology: New Generations, 2011, pp 30-35. [9] Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Steganography using Sudoku Puzzle for Secured Data Transmission, International Journal of Computer Applications, 2012, pp 32-35. [10] Rupinder Kaur, Deepak Aggarwal, Analysis of Secure Text Embedding using Steganography, International Journal of Latest Trends in Engineering and Technology,2013,pp 120-126. Vol. 3 Issue 4 April 2014 8 ISSN: 2319 1058