International Journal of Advanced Research in Computer Science and Emerging Engineering Technologies ISSN : 2454-9924 MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES D.Geethanjali 1 and. M.Margarat 2 1 Student, Dept of ECE, IFET College of Engineering, Villupuram 2 Associate Professor, Dept of ECE, IFET College of Engineering, Villupuram anjalclean@gmail.com ABSTRACT: Pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values In decryption process the image and key are used For further protection both message stored and the key will be encrypted which can have same or different keys One of the downside of the vast majority of the current steganography strategies is that it changes the bits utilized for putting away shading data. A portion of the cases incorporate LSB or MSB based steganography. There are additionally different existing techniques like Dynamic RGB Intensity Based Steganography Scheme, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm and so on that can be utilized to discover the steganography strategy utilized and break it. Another downside of the current techniques is that it adds clamor to the picture which makes the picture look dull or grainy making it suspicious for a man about presence of a concealed message inside the picture. To beat these deficiencies we have thought of a pixel design based steganography which included concealing the message inside in picture by utilizing the current RGB values at whatever point conceivable at pixel level or with least changes. Alongside the picture a key will likewise be utilized to unscramble the message put away at pixel levels. I. INTRODUCTION The correspondence advancements around us has developed at an awesome pace as of late. For trading of information/data nowadays everybody is depending of fast PC systems like web which is very unprotected and data can get uncovered. Endless measure of individual information is frequently gathered, utilized and exchanged to outsider associations for an
assortment of reasons. Consequently information security is turning into a major issues in information correspondence through Internet or some other media. We can utilize Steganography or Cryptography to secure touchy information. Steganography is frequently viewed as superior to cryptography in light of the fact that the planned mystery message does not draw in consideration regarding itself for investigation. Steganography is the demonstration of installing data in a given media called covering media without rolling out any noticeable improvements in it. The objective is to shroud an implanted document inside the cover media with the end goal that the inserted file s presence is disguised. Picture based steganography utilizes pictures as the covering media. A few strategies have been proposed for picture based steganography, LSB being the most straightforward one. Steganography assumes the focal part in mystery message correspondence. Distinctive message concealing systems have been produced and actualized in the past utilizing sound/video documents, advanced pictures, and different Medias. purity for concealing information. Every pixel is a mix of RGB i.e. is (Red, Green, and Blue). A 24-bit bitmap will have 8 bits speaking to each of the three shading values (red, green, and blue) at every pixel. It makes a wide assortment of hues. Since the information is enormous, any little change in the pixel force doesn t roll out any observable improvement. Likewise human visual framework can't recognize the little changes in the pixel. Keeping up picture quality is a vital for insurance of the message. Upgrading this we utilize diverse procedures. EXISTING SYSTEM: LSB-1 STEGANOGRAPHY LSB-2 STEGANOGRAPHY RGB STEGANOGRAPHY PROPOSED SYSTEM. A computerized picture is an accumulation of information/data about the pixels in it. It is a vast gathering of information. This is substantial contrasted with the message we need to stow away. Subsequently we generally incline toward a computerized picture for secret correspondence. We can make utilization of its Encryption process: Step1: Scan the image Step2: Add the RGB values and divide it Step3: Find the mod value Step4: Compare the mod value and character
value Step5:If matches the location in image is used to represent the character Step6:Hill chipper algorithm used for encryption Decryption process: The reverse modbit algorithm is used for decryption Another method trying to get the text get failure A modbit algorithm is very similar to the Luhn mod n algorithm. A Luhn mod algorithm is used for generating checksum formula for validating. The concept used in Luhn mod N algorithm but for finding the pixels which can represent a character. Each character from the input text will be mapped to a set of numbers and this mapping will be maintained internally in the Stegano program. For example letter a could be represented by digit 10, letter b could be represented by digit 12 and so forth. During the encryption process the Stegano program will scan the image and will add the RGB values, divide it and find the mod value. If mod matches the character, that location in the image could be used to represent the character. The image is virtually not changed The images size increases to store the additional metadata Noise is less Large amount of data stored without changing picture quality Secure TRIPLE HILL CIPHER ENCRYPTION The Hill cipher is a polygraphic substitution cipher based on linear algebra. it was practical to operate on more than three symbols at once. The following discussion assumes an elementary knowledge of matrices. Each letter is represented by a number modulo 26. To encrypt a message, each block of n letters is multiplied by an invertible n n matrix, against modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption. WORK MODULE: C=(KP)mod(26) P=(K -1 C)mod(26) ONE: Scan the image comparing the mod value with character value TWO: Encrypt the image
THREE: By using reverse modbit algorithm text get decrypted Fig:1 Flow chart II. CONCLUSION precisely the same as unique picture or at max it will be exceptionally hard to recognize the progressions for the human eye. Just the measure of the stego picture will increment somewhat however in our experiments this has been observed to be practically identical with other steganography techniques. This exploration was pointed towards the advancement of a better than ever information concealing strategy in view of RGB based steganography without changing the picture. A portion of the conceivable application ranges incorporate transmitting little mystery messages, utilizing a picture as a watchword token by encoding and concealing secret word utilizing this system, basically adding a shrouded mark to a picture and so forth. RESULT AND DISCUSSION: The paper proposed another procedure for picture based steganography. It shows an enhanced steganography technique for inserting mystery message bit in picture metadata fields in light of the RGB values and the position of the pixels. The picture pixels will be changed just for characters where the calculation can't discover a pixel which can speak to it. Since just the metadata is altered, the stego picture looks
Fig: 5 Data retrieving Fig: 2 input image Fig:4 Preprocessing data Fig: 3 loading data
Fig:6 Data extraction REFERENCE [1] Namita Tiwari and Madhu Shandilya, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth, International Journal of Security and Its Applications, Vol. 4, No. 4, pp. 53-62, 2010. [2] Koyi Lakshmi Prasad and T. Ch. Malleswara Rao, A Novel Secured RGB LSB Steganography with Enhanced Stego- Image Quality, International Journal of Engineering Research and Applications, Vol. 3, No. 6, pp. 1299-1303, 2013. [3] Mamta Juneja and Parvinder S. Sandhu, An Improved LSB based Steganography Technique for RGB Color Images, 2nd International Conference on Latest Computational Technologies, pp. 10-14, 2013. [4] Mohammad Tanvir Parvez and Adnan Abdul-Aziz Gutub, RGB Intensity Based Variable-Bits Image Steganography, IEEE Asia-Pacific Services Computing Conference, pp. 1322-1327, 2008. [5] Babita and Ayushi, Secure Image Steganography Algorithm using RGB Image Format and Encryption Technique, International Journal of Computer Science and Engineering Technology, Vol. 4, No. 6, pp. 758-762, 2013. [6] Adnan Abdul-Aziz Gutub, Pixel Indicator Technique for RGB Image Steganography, Available at http://faculty.kfupm.edu.sa/coe/gutub/publ ications/j_m_paper.pdf [7] Hassan Mathkourand, B. Al-Sadoon and Ameur Touir, A New Image Steganography Technique, IEEE 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2008. [8] Qingzhong Liu, Andrew H. Sung, Zhongxue Chen and Xudong Huang, A JPEG-Based Statistically Invisible Steganography, Proceedings of the Third
International Conference on Internet Multimedia Computing and Service, pp. 78-81, 2011. [9] R. Chandramouli and Nasir Memon, Analysis of LSB Based Image Steganography Techniques, Proceedings of the IEEE International Conference on Image Processing, Vol. 3, pp. 1019-1022, 2001. [10] Amir Farhad Nilizadeh and Ahmad Reza Naghsh Nilchi, Steganography on RGB Images Based on a Matrix Pattern using Random Blocks, I. J. Modern Education and Computer Science, Vol. 4, pp. 8-18, 2013.