International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Similar documents
A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

An Implementation of LSB Steganography Using DWT Technique

Dynamic Collage Steganography on Images

Hiding And Encrypting Binary Images Using A Different Approach

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

An Integrated Image Steganography System. with Improved Image Quality

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

A New Image Steganography Depending On Reference & LSB

Steganography using LSB bit Substitution for data hiding

An Enhanced Least Significant Bit Steganography Technique

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

LSB Encoding. Technical Paper by Mark David Gan

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

A Proposed Technique For Hiding Data Into Video Files

Keywords Secret data, Host data, DWT, LSB substitution.

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

FPGA implementation of LSB Steganography method

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Analysis of Secure Text Embedding using Steganography

A Study on Steganography to Hide Secret Message inside an Image

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Sterilization of Stego-images through Histogram Normalization

Concealing Data for Secure Transmission and Storage

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Investigation of Various Image Steganography Techniques in Spatial Domain

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Information Hiding: Steganography & Steganalysis

Compendium of Reversible Data Hiding

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Transform Domain Technique in Image Steganography for Hiding Secret Information

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

An Overview of Image Steganography Techniques

Colored Digital Image Watermarking using the Wavelet Technique

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

An Improvement for Hiding Data in Audio Using Echo Modulation

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Steganography with Cryptography using Multiple Key Patterns

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

FPGA implementation of DWT for Audio Watermarking Application

Comparative Analysis of Hybrid Algorithms in Information Hiding

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Image Steganography using Password Based Encryption Technique to secure e-banking Data

A Comprehensive Review on Secure Image Steganography

Digital Image Sharing using Encryption Processes

A New Steganographic Method for Palette-Based Images

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Data Hiding In Audio Signals

A Copyright Information Embedding System

Enhance Image using Dynamic Histogram and Data Hiding Technique

HSI Color Space Conversion Steganography using Elliptic Curve

RGB Intensity Based Variable-Bits Image Steganography

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

Application of Histogram Examination for Image Steganography

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Data Hiding Using LSB with QR Code Data Pattern Image

Resampling and the Detection of LSB Matching in Colour Bitmaps

Keywords Audio Steganography, Compressive Algorithms, SNR, Capacity, Robustness. (Figure 1: The Steganographic operation) [10]

Hiding Image in Image by Five Modulus Method for Image Steganography

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Different Steganography Methods and Performance Analysis

IJESRT: 7(10), October, 2018 ISSN:

Study of 3D Barcode with Steganography for Data Hiding

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Block Wise Data Hiding with Auxilliary Matrix

A Study on Image Steganography Approaches in Digital Images

Performance Improving LSB Audio Steganography Technique

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Image Compression Supported By Encryption Using Unitary Transform

Vernam Encypted Text in End of File Hiding Steganography Technique

New High Capacity Secure Steganography Technique

Meta-data based secret image sharing application for different sized biomedical

A Novel Approach for Hiding Huge Data in Image

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

Watermarking patient data in encrypted medical images

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

A New Compression Method for Encrypted Images

CSE 3482 Introduction to Computer Security.

Convolutional Neural Network-based Steganalysis on Spatial Domain

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

Covert communication of grayscale images within color images Comunicación encubierta de imágenes a escala de grises en imágenes a color

International Journal of Advanced Research in Computer Science and Software Engineering

arxiv: v1 [cs.mm] 31 Mar 2014

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Transcription:

Scientific Journal of Impact Factor (SJIF) : 3.134 ISSN (Print) : 2348-6406 ISSN (Online): 2348-4470 ed International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES Vikshit Rabara 1,Vatsal Shah 2 1 Information Technology, BVM engineering College,vikshit_rabara@yahoo.in 2 Information TechnologyBVM engineering College, vatsal.shah@bvmengineering.ac.in Abstract - Steganography means study of invisible communication that usually deals with the ways of finding the existence of communicated message. It has many applications in computer science and other related fields. Different steganography techniques are used to protect the information accessed by unauthorized person. Some methods of steganography are image, video, text and audio respectively. Image based steganography techniques are most useful techniques nowadays. In this paper I reviewed how the images can be used as the covering medium for text messages. Keywords: Steganography, stego, LSB, Steganalysis. I. INTRODUCTION Security has become a critical feature for thriving networks and in military alike. In the present world of communication, one of the necessary requirements to prevent data theft is securing the information. There are many techniques to prevent data theft, STEGANOGRAPHY is one of them. Text steganography, image steganography, video stegano graphy are some steganographic techniques. The majority of today s steganographic systems uses images as cover media because people often transmit digital pictures over email and other Internet communication. This paper s focus is on a field of information technology known as image steganography. This paper will take a review of this technology by introducing the various concepts of image based steganography. II. IMAGE BAS ED STEGANOGRAPHY In image based steganography, we use image as the cover of secret message. Following fig. 1 shows the sender side and receiver side flow chart for image steganography. At sender side first we take an image and hide our secret message using embedding steganographic algorithm, now we get stego image. This stego image is then sent to thereceiver and receiverget the secret message by using extracting stenographic algorithm, called steganalysis [8]. III. IMAGE BAS ED S TEGANOGRAPHIC TECHNIQUES a) Spatial domain method: @IJAERD-2014, All rights Reserved 44

There are many versions of spatial steganography, all directly change some bits in the image pixel values in hiding data [1]. Some of the spatial domain techniques are as follow: 1. Least significant bit (LSB) 2. Pixel value differencing (PVD) 3. Edges based data embedding method (EBE) 4. Random pixel embedding method (RPE) 5. Mapping pixel to hidden data method 6. Labelling or connectivity method 7. Pixel intensity based method 8. Texture based method 9. Histogram shifting methods b) Transform Domain Technique: This is a more complex way of hiding information in an image. Various algorithms and transformations are used on the image to hide information in it [2]. Some transform domain techniques are: 1. Discrete Fourier transformation technique (DFT). 2. Discrete cosine transformation technique (DCT). 3. Discrete Wavelet transformation technique (DWT). 4. Lossless or reversible method (DCT) 5. Embedding in coefficient bits c) Distortion Techniques: Distortion techniques need knowledge of the original cover image during the decoding process where the decoder functions to check for differences between the original cover image and the distorted cover image in order to restore the secret message. The encoder adds a sequence of changes to the cover image. So, information is described as being stored by signal distortion [2]. d) Masking and Filtering: These techniques hide information by marking an image, in the same way as to paper watermarks. These techniques embed the information in the more significant areas than just hiding it into the noise level. The hidden message is more integral to the cover image. Least Significant Bit Embedding Least significant bit embedding is define as the mapping secret message to pixel s steganography is the most classic steganographic techniques, which embeds secret message in a subset of the LSB plane of the image [4]. A large number of popular steganographic tools, such as S-Tools 4, Steganos and StegoDos, are based on LSB replacement in the spatial domain. LSB steganography can be describe as follows: if the LSB of the pixel value I(i, j) is equal to the message bit m to be embedded, I(I, j) remain unchanged; if not, set the LSB of I(i, j) to m. the message embedding procedure can be described using an Equation as follow; In general, a p-by-q image is simply a p-by-q matrix, where each entry in the matrix is a positive integer called the pixel value, which determine the color of the pixel. For an n-bit image, these pixel values range from 0 to 2n 1. In other words, the possible color values for each pixel in an n-bit image are the colors corresponding to the bit string of length n. unless there is a specific need to use the bit strings representations of pixel values, we will typically use the decimal representations.8 bit grayscale images are thus p-by-q matrices of integers ranging from 0 to 255, where 0 corresponds to black, 255 to white, and the values in between from a spectrum of varying sh ades of gray. The LSB is the bi correspondingto 20, that is, the bit that makes a value even or odd. Since these grayscale values varies little from the values on either side of it [4]. @IJAERD-2014, All rights Reserved 45

Select the pixels of image using the key. Increment the grey level value of the pixel by 1 if the pixel value is odd and if the value is 255 subtract it by 1. Convert the data into bit stream and compare this bit stream with the pixel values. Increment pixel values by one if bit is 0 and pixel values is odd, and increase by one if bit is 1 and pixel value is even. Decrement pixel value by 1 if bit is 0 and pixel value is 255[3]. Least Significant Bit Extracting Extracting is defined as the mapping pixels to image. In the image steganography the extracting process can be done on message which is the stego image. The recipient inputs the stego image, and when applicable, the steganographic key, into an extraction algorithm, which outputs the secret message [5]. This extraction algorithm is considered the inverse of the embedding algorithm, although the embedding and extraction algorithms may be created such th at the extraction algorithm is not actually the mathematical inverse of the embedding algorithm. For steganalysis of LSB steganography some steps are as follow [5]: Problem with Conventional LSB In traditional LSB technique we use gray scale images which is less useful in compare to RGB scale images, because gray scale images provides only 0-255 shades while RGB images provide a huge range(16 million) of colors to hide the information. To overcome these problem Hash-LSB technique is developed. Hash-LSB (Least Significant Bit) Process The Hash based Least Significant Bit (H-LSB) technique for steganography in which position of LSB for hiding the secret data is determined using hash function. Hash function finds the positions of least significant bit of each RGB pixel s and then message bits are embedded into these RGB pixel s independently. Then hash function returns hash values according to the least significant bits present in RGB pixel values. The cover image will be broken down or fragmented into RGB format. Then the Hash LSB technique will uses the values given by hash function to embed or @IJAERD-2014, All rights Reserved 46

conceal the data. In this technique the secret message is converted into binary form as binary bits; each 8 bits at a time are embedded in least significant bits of RGB pixel values of cover image in the order of 3, 3, and 2 respectively [6]. According to this method 3 bits are embedded in red pixel LSB, 3 bits are embedded in green pixel LSB and 2 bits are embedded in blue pixel LSB as illustrated in Fig. 2. These 8 bits are inserted in this order because the chromaticinfluence of blue color to the human eye is more than red and green colors [6]. Therefore the distribution pattern chooses the2 bits to be hidden in blue pixel. Thus the quality of the image will be not sacrificed. Following formula is used to detect positions to hide data in LSB of each RGB pixels of the cover image [6]. k = p % n... (1) Where, k is the LSB bit position within the pixel; p represents the position of each hidden image pixel and n is the number of bits of LSB which is 4 for the present case. After embedding the data in cover image, a stego image will be produced. The recipient of this image has to use the hash function again to extract the positions where the data has b een stored. The extracted information will be in cipher text. After decryption of it, combining of bits into information will produce the secret message as required by the receiver. This approach of image steganography is using RSA encryption technique to encrypt the secret data. Encryption includes a message or a file encryption for converting it into the cipher text. Encryption process will use recipient public key to encrypt secret data. It provides security by converting secret data into a cipher text, which will be difficult for any intruder to decrypt it without the recipient private key [7]. Embedding Algorithm at Sender Side: Step 1: Choose the cover image & secret message. Step 2: Encrypt the message using RSA algorithm. Step 3: Find 4 least significant bits of each RGB pixels from cover image. Step 4: Apply a hash function on LSB of cover image to get the position. Step 5: Embed eight bits of the encrypted message into 4 bits of LSB of RGB pixels of cover image in the order of 3, 3 and 2 respectively using the position obtained from hash function given in equation 1 Step 6: Send stego image to receiver. Hash-LSB Decoding and RSA Decryption In the decoding process we have again used the hash function to detect the positions of the LSB s where the data bits had been embedded. When the position of the bits had been specified, the bits are then extracted from the position in the same order as they were embedded. At the end of this process we will get the message in binary form which again convert ed into decimal form, and with same process we got the cipher text message. After retrieving the positions of LSB s that contain secret data, the receiver will decrypt secret data using RSA algorithm. To apply RSA algorithm receiver will use @IJAERD-2014, All rights Reserved 47

his/her private key because the secret data have been encrypted by recipient public key. Using receiver private key cipher text will be converted into original message which is in readable form [7]. Step 1: Receive a stego image. Step 2: Find 4 LSB bits of each RGB pixe ls from stego image. Step 3: Apply hash function to get the position of LSB s with hidden data. Step 4: Retrieve the bits using these positions in order of 3, 3, and 2 respectively. Step 5: Apply RSA algorithm to decrypt the retrieved data. Step 6: Finally read the secret message. IV. CONCLUS ION It is seen that from this paper work there are two techniques named LSB and Hash -LSB technique, I reviewed about, their advantages and disadvantages. The LSB insertion was used to embed the message in to the cover image. The selection of pixel to embed was crucial, since the LSB insertion modifies the pixels. Modified pixels in areas of the image where there are pixels that are most like their neighbors were much more noticeable to the normal eye. To solve this problem Hash-LSB technique is used, because it uses RGB color scheme. RGB color scheme has 16 million different shades, so Hash-LSB technique is more preferable than LSB. REFERENCES [1] N. F. Johnson and S. Katzenbeisser, A Survey of steganographic techniques. In Information Hiding Techniques for Steganography and Digital Watermarking, S.Katzenbeisser and F.Petitcolas, Ed. London: Artech House, (2000), pp. 43-78. [2] H. S. Majunatha Reddy and K. B. Raja, (2009) High capacity and security steganography us ing discrete wavelet transform. International Journal of Computer Science and Security. pp. 462-472. [3] R. Alwan, F. Kadhim, A. Al-Taani, Data Embedding based on better use of bits in image pixels International Journal of Signal processing, 2005. [4] MamtaJuneja, Parvinder Singh Sadhu Performance evalution of edge detection technique for image and spatial domain, International journal of computer theory and Engineering, 2009. [5] Ching-Nung Yang, Tse-Shih Chan, Kun Hsuan, Improvements of image sharing with steganography and authentication, the Journal of system and software 2004. [6] KousikDasgupta, J. K. Mandal, Paramartha Dutta, Hash Based Least Significant Bit Technique for Video Steganography (HLSB), International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 1, Issue No. 2, April, 2012. [7] Mohammad A. Ahmad, Dr. ImadAlshaikhli, Sondos O. Alhussainan, Achieving Security for Images by LSB and MD5, Journal of Advanced Computer Science and Technology Research, Vol. 2, Issue No.3, Pages No. 127-139, Sept., 2012. [8] Westfeld, A., F5-a steganographic algorithm: High capacity despite better steganalysis. in Proc. 4th Int l Workshop Information Hiding, pages 289 302, (2001). @IJAERD-2014, All rights Reserved 48