International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015 A Robust Intensity Based approach for Images Steganography 1 Renu Singla, 2Mitali 1 Asst. Prof (CSE) ,Shri Ram College of Engg.,Palwal, India 2 M.Tech(CSE),Shri Ram College of Engg.,Palwal, India Abstract: In this paper, A new technique is proposed based on pixel intensity. The idea is based on the fact that even little distortion induced in an image may be noticeable if the color of pixel lies in the range to which human eye is highly sensitive. The new technique will target only those pixels to which human eye is less sensitive. This may however decrease the data hiding capacity but it will result in increased robustness. Keywords: image, intensity, robust, color, substitution. I. INTRODUCTION The increasing rate of usage of internet and the revolution that occurred in digitization of information; the overall structure of modern communication is changed. The revolution in software industry and semiconductor industry made it feasible that hardware as well as software are more user-friendly and flexible and enables consumers to communicate multimedia data. Peoples are now able to transmit large multimedia files through broadband connection. Moreover, the transmission thus done is almost errorless [2]. Security of data to transmit is of high concern in today’s communication system. Data hiding is a technique of providing data security. Steganography is the art and science of hiding information such that its presence cannot be detected[1]. The secret information is hidden in some carrier file and then transmitted. The carrier file can be an image, Audio file, text file, video file, etc. On the basis of cover file used for embedding, the steganography techniques are divided into different ISSN: 2231-5381 categories. The focus will be on using image as cover file in this paper. II. SUBSTITUTION TECHNIQUE OF STEGANOGRAPHY Initially steganographic systems were developed for digital images and video The substitution technique is based on the idea that if a single bit or a few bits in each image pixel are replaced with the message bits then the change thus occurred will not be noticeable to the human eye (type of file matters). The capacity of this method is very high (41,000 bps). The robustness of this method is very low. This method is however easy to implement but susceptible to various attacks. The prime reason for choosing this technique lies in the advantage of using substitution technique which is a very high capacity for hiding a message. When only single LSB replacement is done per host audio sample a capacity of 44.1 kbps can be achieved. However there are certain other techniques like spread spectrum (4 bps) having lesser capacity but they are more robust. [10]. III. MOTIVATION STATEMENT AND PROBLEM Steganography is a technique of sending secret messages by hiding in a carrier such that the existence of the message is concealed. Only the intended recipient is aware of the existence of the message. If any other is aware of the existence of the message in carrier then the purpose of Steganography is revealed. http://www.ijettjournal.org Page 346 International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015 LSB method of Steganography is very simple and easy to implement. But at the same side it is easy to detect also. A person can get the LSB’s of each pixel an analyze them whether it gives some meaningful message or not. Moreover the replacement of LSB of the pixel with the message bits will produce a little change in image. This change may be observable with the human eyes if the pixel is of greenish-yellow color as human eye is most sensitive to this color. Among the eyes of Nature, the human eye is designed to distinguish colors. Cats eyes, for example are much better at detecting movement, the condor can see "death", and the dog can "read" our faces better than human can. But for colors, human seem to have the leading specimen eye. And among the colors, which ones do our eyes seem most keen to observe? The 400 to 700 nm range of wavelengths is called "visible" because those are the wavelengths to which our eyes are sensitive. That range reflects the wavelengths of sunlight which reach the Earth's surface with sufficient intensity to excite the cells on our retina. The physical process of seeing begins with the absorption of a photon by a pigment called "retinal" [5]. Our motive is to find out the pixels whose color lies in other regions of the figure except region 1 and 2. In order to locate such pixels, following table was referred. From figure, it is clear that human eye is most sensitive to green color and more than 70% sensitive to greenish yellow color. Thus a slight change in the pixel of intensity lying between 520nm-600nm may be observable to the human eye. IV. Proposed Work This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file and image files and the path where the user wants to save Image and extruded file. The Selection of pixels on the basis of their intensity is done using following algorithm: ISSN: 2231-5381 http://www.ijettjournal.org Page 347 International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015 human eye is most sensitive to this color. Using only select_pixel(Red,Green,Blue) those pixels to hide information to which our eye is Input Parameters: less sensitive can be a better approach so that the Red // Red component of pixel Green // Green component of pixel Blue // Blue component of pixel change occurred after LSB insertion should not be observable by human eye. The histograms of cover image and stego image was obtained for comparison. Return Value: integer otherwise 1 // 0, if pixel is less sensitive to eye integer select_pixel(Red,Green,Blue) { integer flag=1 // 0-less sensitive if((R=0)AND(B=0) AND(G>0)) then Figure: Histogram of Cover Image flag=0 //high sensitive to eye else if ((B=0) AND (R>192) AND (G>162)) then flag=0 //high sensitive to eye else flag=1 //less sensitive to eye return(flag); } V. RESULT & CONCLUSION However the replacement of LSB of the pixel with the message bits will produce a little change in Figure: Histogram of Stego Image image. This change may be observable with the human eyes if the pixel is of greenish-yellow color as ISSN: 2231-5381 http://www.ijettjournal.org Page 348 International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015 [10]. Fridrich, Jessica., Goljan, Miroslav., and Du, Rui. REFERENCES [1]. Rohit Tanwar, Sunil Kumar, Narender Gautam, Ravinder Gautam,” A Spatial Domain Steganography Technique Based on Optimal Solution Using Genetic Algorithm”, January 2013,Page(s):228-232.ISBN:97893-81583-82-1 [2]. Gunjan Nehru, Puja Dhar,”A detailed look of audio steganographic techniques using LSB and Genetic Algrithm approach”, IJCSI Vol.9, Issue1, No.2, January [3]. Westfeld, Andrew. F5-a steganographic algorithm: high steganalysis. In Proceedings of the 4th Information Hiding Workshop, volume 2137 [4]. Fridrich, J., Feature-based steganalysis for jpeg images and its implications for future design of steganographic schemes. In Proceedings of the 6th Information Hiding Workshop, volume 3200 of LNCS, pages 67{81. [5]. Yu, Lifang., Zhao, Yao., Ni, Rongrong., and Shi, Yun Q. A high-performance yass-like scheme using randomized big-blocks. In Proceedings of the IEEE International Conference on Multimidea & Expo [11]. Dumitrescu, S., Wu, X. L., and Wang, Z. Detection of lsb steganography via sample pair analysis. IEEE Transactions on Signal Processing, 51(7):1995{2007, [12]. Fridrich, J., Goljan, M. On estimation of secret message length in lsb steganography in spatial domain. In IS&T/SPIE Electronic Imaging: Security, Contents VI, volume 5306, pages 23{34. SPIE, 2004. [13]. Ker, A.D. Fourth-order structural steganalysis and analysis of cover assumptions. In IS&T/SPIE Electronic Imaging: Security, Steganography, and [6]. Huang, Fangjun., Huang, Jiwu., and Shi, Yun Qing. An experimental study on the security performance of yass. IEEE Transactions on Information Forensics and [14]. Harmsen, J., Pearlman, W. Steganalysis of additive noise modelable information hiding. In IS&T/SPIE Electronic Imaging: Security, Steganography, and 5020, pages 131{142. SPIE, 2003. [15]. Huang, Jinggang., Mumford, David. Statistics of natural images and models. In Proceedings of IEEE Computer Society Conference on Computer Vision Security, 5(3):374 { 380, 2010 [7]. Sallee, P.. Model-based steganography . In Proceedings Internation 6072, pages 1{14. SPIE, 2006. Watermarking of Multimedia Contents V, volume (ICME 2010), 2010. 2nd pages 27{30. ACM Press, 2001. Watermarking of Multimedia Contents VIII, volume Springer, 2004. the workshop on Multimedia and security: new challenges, Steganography, and Watermarking of Multimedia of LNCS, pages 289{302. Springer, 2001. of grayscale images. In Proceedings of 2001 ACM 2003. 2012 ISSN(online): 1694-0814. capacity despite better Reliable detection of lsb steganography in color and Workshop on Digital and Pattern Recognition, volume 1, pages 541{547, 1999 Watermarking, volume 2939 of LNCS, pages 154{167. Springer, 2003. [8]. Al-Ataby, Ali., Al-Naima, Fawzi. A modified high capacity image steganography technique based on wavelet transform. The International Arab Journal of Information Technology, 7:358–364, 2010. [9]. Westfeld, A., Ptzmann, A. Attacks on steganographic systems - breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools-and some lessons learned. In Proceedings of the 3rd Information Hiding Workshop, volume 1768 of LNCS, pages 61{76. Springer, 1999. ISSN: 2231-5381 http://www.ijettjournal.org Page 349