A Review on Steganography Techniques and Farheen Fatima , Shashwat Shukla

advertisement

International Journal of Engineering Trends and Technology (IJETT) – Volume 33 Number 1- March 2016

A Review on Steganography Techniques and

Genetic Algorithm used in Information Hiding

Farheen Fatima

#1

, Shashwat Shukla

#2

, Brahma Hazela

#

Dept. of Computer Science & Engineering

#3

ASET, Amity University Lucknow

Lucknow, India

Abstract — in the present scenario of the internet the existence of steganography. In order to assure that world, with the extreme necessity of data no intruder come across the existence of the hidden transmission, there comes a huge need of data protection. The secret information required by any organization is hidden using cryptography and steganography techniques. The various techniques of information we use Genetic Algorithm. The secret message is converted into a binary string and the alterations are done in the LSB of the selected area.

This approach helps in producing better visual quality steganography that are used by far include three layers of protection which is done by segmenting the image through random selection of pixels. This brings in picture the main case and sub case of the selected byte. Another important aspect is steganalysis that has contradicted steganography to a great extent. But then comes the optimized algorithm, genetic algorithm. It helps in modifying the pixel values so that the hidden message doesn’t even come into existence for any intruder. This approach triggers on conversion of secret message into a binary string and then applying all the operations of genetic algorithm of the image and also ensures to decrease the chances of existence of steganography.

Both these approaches are explained in the upcoming sections.

A.

II.

STEGANOGRAPHY

Basic Steganography

TECHNIQUE namely reproduction, cross-over and mutation I order to find out the best pixel area to embed the hidden data. These approaches have proved worthy for exchanging secret messages.

Keywords

— steganography,random selection of pixels,genetic algorithm,segmentation

I.

I NTRODUCTION

With the rising need of ease of exchanging information, wireless network have come a long way in accomplishment of this need. Now when it is comes to transmitting any secret information, there arises instant need of security. Steganography is the

Till now a lot of work has been done using steganography technique. In general we can divide these techniques into two basic forms. The first one is the one in which the source image pixels are directly been embed with the secret message; this approach is coined as spatial domain steganography technique.

The other technique is the one in which we deal with altering the frequency coefficients; this approach is coined as frequency domain steganography technique.

As discussed by Nameer et al.

[2] for hiding the data a three layer high security approach is used. The new

LSB steganography technique is the one that differs from other traditional LSB techniques where taking a

24-bit color image could only embed 3 bits of data for each red, green and blue color components. Thus, this issue of inserting more secret information in more space came into existence.

B.

New Steganography Algorithm term that deals with the hiding of information. It hides the information using any cover medium i.e. digital images, audio or video files. This process of hiding data should be done in a way that no one can detect its existence. There are different approaches of hiding information. In one of the process of invisible communication we can use three layer securities by adaptive image filtering and segmentation. In order to

The new steganography algorithm came with the three layer security. The first layer worked on encrypted password using DES algorithm. The second layer worked on protecting the segmentation password and the third layer helped in securing steganography algorithm. A new concept for select the pixel area we adopt random selection method and embed the secret message there. Further this selection is done on the basis of main cases and subcases which are applied to the selected byte. We take good case of the size of the image and compress it to encrypt the secret file.

Another approach for this is hiding information using

Genetic Algorithm. This approach is basically derived from steganalysis, where one can determine segmentation of image which stated that the cover image should be segmented randomly in uniform or non-unifrom segments with respect to their passwords. This technique was implied on BMP image that gave lossless compression to the selected image. After segmentation comes pixel selection, where the random pixels are selected on the basis of color characteristic contained in that particular area.

These concepts are introduced in order to obtain reduction in the noise of stego-image. The

ISSN: 2231-5381 http://www.ijettjournal.org

Page 1

International Journal of Engineering Trends and Technology (IJETT) – Volume 33 Number 1- March 2016 steganography algorithm used here, ensures that it provides the following:

Robustness against the different inevitable attacks.

Enough space for embedding secret message.

No chance of detection of the existence of steganography.

Conformity of extracting password securely at receiver’s end by doing proper scanning of segmented pixel.

The use of main case and sub case helps in organizing the pixel architect in the best possible way so that more information can be hidden. refusing the RS-analysis on any hidden data by making the stego-image appear as a normal image i.e. leaving no chance of doubts for the intruder to get confirmation of existence of steganography.

B.

Working

Initially a block of pixel is selected. The values of the bits of the selected pixels are adjusted in such a manner that only the second and third lowest bit planes are modified. It is done so because changes in the higher bit plane could lead to the changes quite prominently noticeable. Now the selected blocks of stego-image are labeled and the whole process of bit selection gets started, using the three most important operations of genetic algorithm namely reproduction, cross-over and mutation. Now the individuals with higher fitness function are liable to be selected to the breed of the next generation. Now the secret message is converted into binary string and the selected LSB is replaced by this binary string. Thus, the secret message is embed in the selected block of image. This approach ensures to preserve the quality of the image as well as it leaves no clue of the existence of steganography, as it preserves the correlation between the adjacent pixels of the stego-image without making any change apparent.

This approach focuses on following: free.

To preserve the quality of image even after steganography.

To make sure that the image stays RS –attack

Fig. 1 Steganography with security layers

III.

GENETIC ALGORITHM BASED

STEGANOGRAPHY

A.

Basic idea of the approach

Genetic algorithm focuses on providing optimal solution to any problem by selecting data from a pool of information. The operations used in genetic algorithm i.e. mutation, cross-over, reproduction play a significant role in finding optimal solution for any problem. Previously genetic algorithm based steganography has been used on color images. This has been further extended by using frequency domain approach and embedding the secret message using

Discrete Fourier Transform (DFT), z-transform, wavelet transform. The work, done by Shen et al.

[4] has given good solution for obtaining better visual quality stego-image as well as masking a secret message which could be RS-attack free. It focuses on

Fig. 2 Procedure of given approach

ISSN: 2231-5381 http://www.ijettjournal.org

Page 2

International Journal of Engineering Trends and Technology (IJETT) – Volume 33 Number 1- March 2016

IV.

CONCLUSION

The discussed algorithms have proved effective in embedding the secret message by solving the process of selection of desired pixel in an optimized way.

Thus, maintaining the quality of the image and preserving its security, which is the most important issue while hiding any private or secret data, the above discussed approaches have helped us a in a very productive way.

R EFERENCES

[1] J.Fridrich, M.Golijan, and D.Hogea, “Detecting lsb steganography in color amd gray-scale images”, IEEE

Multimedia, pp. 22-28,2001.

[2] Nameer N and EL-Emam, “Hiding large amount of data with high security using steganography algorithm”, Journal of

Computer Science 3(4),ISSN 1549-3636,2007.

[3]

C.T.Hsu, J.Wu, and L.Hidden, “Digital Watermarking in images”, IEEE Trans. Image Processing, pp. 58-68,1999.

[4] Shen Wang, Bian Yang, and Xiamu Niu, “A secure steganography method based on genetoc algorithm”, Journal of Information Hiding and Multimedia Signal Processing,

Volume 1,Number 1, ISSN 2073-4212, January 2010.

[5] Ahn, L.V., and N.J. Hopper, “Public-key steganography”,

Springer-Verlag Heidelberg,In Lecture notes in Computer

Science, Vol. 3027/2004 of Advances in Cryptology-

EUROCRYPT 2004, pp: 323-341, 2004.

[6]

Moulin, P. and J.A. O’Sullivan, “Information-theoretic analysis of information hiding”, IEEE Trans. On Info.

Theory,49:563-593,2003.

[7] Pavan, S.,S. Gangadharpalli and V.Sridhar, “Multivariate entropy detector based hybrid image registration algorithm”,

IEEE Intl. Conf. on Acoustics, Speech and Signal Processing, pp:18-23,2005.

[8]

Amin, P., N. Liu and K. Subbalakshmi, “Statistically secure digital image data hiding”, IEEE Multimedia Signal

Processing MMSP05,China,2005.

[9]

Zhang, X. Wang, S., Qian, Z., and Feng, G., “Reversible fragile watermarking for locating tampered blocks in JPEG images”, Signal Processing,90(12), 3026-3036, doi;10,1016/j.sigpro,2010.

[10]

Rongsheng, X., Keshuo, W., and Shunzhi, Z.’ “An improved emi-fragile digital watermarking scheme for image authentication”, Paper presented at the Anticounterfeiting,Security,Identification, IEEE Internatinal workshop,2007.

[11] Dr.T.Saravanan"Noise removal in ultrasound images ",

International Journal of Engineering Trends and Technology

(IJETT), V3(2),28-31. ISSN:2231-5381,April 2012.

[12] P.Thamarai , Dr. T.V.U.Kirankumar"PERFORMANCE

ANALYSIS OF IMAGE COMPRESSION USING

DISCRETE WAVELET TRANSFORM FOR DIFFERENT

WAVELETS ", International Journal of Engineering Trends and Technology (IJETT), V2(3),20-26 ISSN:2231-

5381,December 2011.

ISSN: 2231-5381 http://www.ijettjournal.org

Page 3

Download