A Novel Steganographic Approach For Imag
A Novel Steganographic Approach For Imag
A Novel Steganographic Approach For Imag
ISSN 2320–088X
RESEARCH ARTICLE
A NOVEL STEGANOGRAPHIC
APPROACH FOR IMAGE ENHANCEMENT
USING LEAST SIGNIFICANT BIT
Dr. Deepti Sharma1, Ms. Anshu Sharma2
1
H.O.D, Department of Computer Science Engineering, AITM, PALWAL, INDIA
2
Lecturer, Department of Computer Science Engineering, Lingayas University, Faridabad, INDIA
1
[email protected], 2 [email protected]
Abstract
Steganography means the process of hiding information by embedding messages within other. To increase the security of
messages sent over the internet Steganography is used. This paper discussed a technique based on the LSB (least significant bit)
and a new encryption algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis
to recover data. Before hiding the data in an image the application first encrypts it.
1. INTRODUCTION
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption,
modification or destruction. The terms information security, computer security and information assurance are being used frequently
interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability
of information. However, there are some subtle differences between them.
The introduction of the various processes of the last decades have continuously pointed out towards the security requirement levels,
especially since the massive utilization of personal computers, networks and the internet with its availability. Many techniques have
been developed for avoiding theft of data, controlling quantities of possible copies.
These techniques used for data hiding are:
(i) Cryptography
(ii) Steganography
2. CRYPTOGRAPHY
Cryptography1 is the practice and study of hiding information. The word is derived from the Greek kryptos, meaning hidden. The
origin of cryptography is usually dated from about 2000 BC, with the Egyptian practice of hieroglyphics. In modern times,
cryptography is considered a branch of both mathematics and computer science and is affiliated closely with information theory,
computer security and engineering. Cryptography is used in applications present in technologically advanced societies. It„s
examples include the security of ATM cards, computer passwords and electronic commerce, which all depend on cryptography.
Symmetric-key cryptography refers to encryption methods in which both the sender and receiver share the same key (or, less
commonly, in which their keys are different, but related in an easily computable way).
Plaintext: This is the original intelligible message or data that is fed into the algorithm as input.
Encryption algorithm: The encryption algorithm performs various substitutions and transformations on the plaintext.
Secret key: The secret key is also input to the encryption algorithm. The key is a value independent of the plaintext and of
Cipher text: This is the scrambled message produced as output. It depends on the plaintext and the secret key. For a given
the algorithm. The algorithm will produce a different output depending on the specific key being used at the time.
Decryption Algorithm: This is essentially the encryption algorithm run in reverse. It takes the cipher text and the secret key
message, two different keys will produce two different cipher texts.
It is also called asymmetric-key cryptography. This kind of cryptography is mainly used for authentication and non-repudiation.
Symmetric-key cryptosystems use the same key for encryption and decryption of a message, though a message or group of
messages may have a different key than others.
2.3 Limitations
If one only uses cryptography to protect information, data are not readable, but existence of secret is evident. Therefore, one can
easily notice that some sort of data has been transferred and thus, he can alter data or can interrupt that data, so that data should not
reach right user.
3. STEGANOGRAPHY
Steganography2 is the art of hiding the fact that communication is taking place, by hiding information in other information. It is the
art of concealing a message in a cover without leaving a remarkable track on the original message.
“Steganos” = covered “Graphie” = writing
Its ancient origins can be traced back to 440 BC.1In Histories the Greek historian Herodotus writes of a nobleman, Histaeus, who
used steganography first time.5
The goal of Steganography3 is to mask the very presence of communication making the true message not discernible to the
observer. As Steganography has very close to cryptography and its applications, we can with advantage highlight the main
differences. Cryptography is about concealing the content of the message. At the same time encrypted data package is itself
evidence of the existence of valuable information. Steganography goes a step further and makes the cipher text invisible to
unauthorized users.
Two other technologies that are closely related to Steganography are watermarking and finger printing. These technologies are
mainly concerned with the protection of intellectual property. But Steganography is concern with the hiding of text in information
like image, text, audio, and video.
3.1 Type of Steganography:
iv. Video
v. Protocol
Text Steganography using digital files is not used very often since text files have a very small amount of redundant data.
Audio/Video Steganography is very complex in use.
Image Steganography is widely use for hiding process of data. Because it is quite simple and secure way to transfer the information
a. Transform domain
i. Jpeg
b. Spread spectrum
ii. Patch work
c. Image domain
i. LSB and MSB in BMP
ii. LSB and MSB in JPG
It is most efficient (in term of data hiding) method of image Steganography. Because the intensity of image is only change by 1 or
0 after hiding the information. Change in intensity is either 0 or 1 because the change at last bit.
CRYPTOGRAPHY ALGORITHM
for i=1 to m
while flagkey[i]!=0 b[i]=b[i]+256
flagkey[i]-- end while end for
for j=m-1 to 1
b[j]=b[j]-b[j+1]
end for
j=1
for i=1 to n
if(j>m)
j=1
a[i]=a[i]-b[j]
end if
end for
end for
ADVANTAGE OF ALGORITHM-
DISADVANTAGE OF ALGORITHM-
a. Key distribution.
COMPLEXITY OF ALGORITHM-
Complexity of algorithm is depend on size of key and text it is approximately equal to O(mn) where m and n is size of key and
text respectively.
PIXEL PROCESSING
After the converting our information in secret code or encrypted form we need to patch that data in the image. We use least
significant bit for the patching of data because of following reason.
a. Because the intensity of image is only change by 1or 0 after hiding the information.
b. Change in intensity is either 0 or 1 because the change at last bit .e.g.
11111000 11111001
The change is only one bit so that the intensity of image is not affected too much and we can easily transfer the data.
This process of selection of pixel is done as user‟s choice he may choose pixel continuous or alternate or at a fixed distance.
i. Insert the data values in pixels eg.
For example a grid for 3 pixels of a 24-bit image can be as follows:
00101101 00011100 11011100
10100110 11000100 00001100
11010010 10101101 01100011
When the number 200, which binary representation is 11001000, is embedded into the least significant bits of this part of the image,
the resulting grid is as follows:
00101101 00011101 11011100
10100110 11000101 00001101
11010010 10101100 01100011
In today‟s world, we often listen a popular term “Hacking”. Hacking is nothing but an unauthorized access of data which can be
collected at the time of data transmission. With respect to Steganography, Steganography along with Cryptography may be some of
the future solution for this above mentioned problem. In the near future, the most important use of Steganographic techniques will
probably be lying in the field of digital watermarking. Content providers are eager to protect their copyrighted works against illegal
distribution and digital watermarks provide a way of tracking the owners of these materials. Although it will not prevent the
distribution itself, it will enable the content provider to start legal actions against the violators of the copyrights, as they can now be
tracked down.
5. CONCLUSION
This paper is an introduction about various information security method and image Steganography. Here we are using symmetric
encryption algorithm to provide more security. Research in this field has already begun. Next to Steganography, one of the most
active fields of research is hiding text using image Steganograhy and using various other image quality parameters.
REFERENCES