International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014 Enhanced Steganography Algorithm to Improve Security by using Vigenere Encryption and First Component Alteration Technique Deeksha Bharti #1, Dr.Archana Kumar*2 # 1 M.tech Student , #2 Associate Prof. , Dept. of CSE ,Delhi Institute of Technology and Management, DCRUST ,Murthal ,Haryana Abstract –Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. In recent years many steganography methods have been challenge by steganalysis . Steganalysis algorithm which detects the stego -message by the static analysis of pixel values [1]. In the proposed method, the secret message is encoded by using vigenere encryption method which guarantees the protection of hidden message. Then hiding the secret text in an image by using first component alteration technique .In this technique, 8 bits of blue components are replaced with secret data bits , then that image can be hidden in cover image in non sequential pixel by using variable hope value power of 2 [2,4,8,16].The Proposed method aim not only to provide improved security problems of simple LSB method but also the increased visual quality of stegoimage. Keywords- steganography , vigenere encryption , LSB embedding , extraction , first component alteration technique. I.INTRODUCTION Data protection and security of the personal information have become a critical issue in the digital world. Therefore, the demand of having a protected method to transfer the confidential data is dramatically increasing. Steganography is the art of passing information through original files in a manner that the existence of the message is unknown. The term steganography is arrived from Greek word means, “Covered Writing” [1]. In contrast to cryptography which make data unreadable for a third party by implying some encryption methods, steganography emphasize on hiding the existence of message inside another data in such a way that nobody can detect it. In image steganography the image used to camouflage the secret data is called the cover-image while the cover-image with the secret data embedded in it is called the stego-image[3]. ISSN: 2231-5381 II. THE CONVENTIONAL STEGANOGRAPHY AND CRYPTOGRAPHY The Least Significant Bit (LSB) insertion is the most common spatial domain technique, which consecutively replaces the least significant bit of cover image with the message bits. This method exploits the natural weakness of Human Visual System (HVS) in recognizing the slight difference of colours . The LSB method changes some or all the 8th bit of image’s data so that the image’s alteration is not perceptible for any human eyes. In like manner, when using a colour image the LSB of each of the red, green and blue components can be used. Therefore, the potential capacity for hiding secret data in a colour image is triple of the same image size in the grayscale mode.[4]An immediate concern is to find out best possible attacks to carry out steganalysis, and simultaneously, finding out techniques to strengthen existing steganography techniques against popular attacks like steganalysis. A.Cryptography Cryptography encodes information in such a way that nobody can read it, except the person who holds the key. More advanced crypto techniques ensure that the information being transmitted has not been modified in transit. There is some difference in cryptography and steganography, in cryptography the hidden message is always visible, because information is in plain text form but in steganography hidden message is invisible. B. Steganalysis Steganalysis is "the process of detecting steganography by looking at variances between bit patterns and unusually large file sizes". [1]The goal of steganalysis is to identify suspected information streams, determine whether or not they have hidden messages encoded into them, and, if http://www.ijettjournal.org Page 242 International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014 possible, recover the hidden information. The challenge of steganalysis is that: 1. The suspect information stream, such as a signal or a file, may or may not have hidden data encoded into them. 2. The hidden data, if any, may have been encrypted before being inserted into the signal or file. 3. Some of the suspect signal or file may have noise or irrelevant data encoded into them (which can make analysis very time consuming). III. MATERIALS AND METHOD USED A. Vigenere Encryption In a Caesar cipher, each letter of the alphabet is shifted along some number of places; for example, in a Caesar cipher of shift 3, A would become D, B would become E, Y would become B and so on. The Vigenère cipher consists of several Caesar ciphers in sequence with different shift values. To encrypt, a table of alphabets can be used, termed a tabula recta, Vigenère square, or Vigenère table. It consists of the alphabet written out 26 times in different rows, each alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each point depends on a repeating keyword. For example, suppose that the plaintext to be encrypted is: ATTACKATDAWN The person sending the message chooses a keyword and repeats it until it matches the length of the plaintext, for example, the keyword "LEMON": LEMONLEMONLE Each row starts with a key letter. The remainder of the row holds the letters A to Z (in shifted order). Although there are 26 key rows shown, you will only use as many keys (different alphabets) as there are unique letters in the key string, here just 5 keys, {L, E, M, O, N}. For successive letters of the message, we are going to take successive letters of the key string, and encipher each message letter using its corresponding key row. Choose the next letter of the key, go along that row to find the column heading that matches the message character; the letter at the intersection of [key-row, msg-col] is the enciphered letter For example, the first letter of the plaintext, A, is paired with L, the first letter of the key. So use row L and column A of the Vigenère square, namely L. Similarly, for the second letter of the plaintext, the second letter of the key is used; the letter at row E and column T is X. The rest of the plaintext is enciphered in a similar fashion: Plaintext: ATTACKATDAWN Key: LEMONLEMONLE Ciphertext: LXFOPVEFRNHR Decryption is performed by going to the row in the table corresponding to the key, finding the position of the ciphertext letter in this row, and then using the column's label as the plaintext. For example, in row L (from LEMON), the ciphertext L appears in column A, which is the first plaintext letter. Next we go to row E (from LEMON), locate the ciphertext X which is found in column T, thus T is the second plaintext letter B. First Component Alteration technique A new image steganography scheme based on first component Alteration technique. In a computer, images are represented as arrays of values. These values represent the intensities of the three colors R (Red), G (Green) and B (Blue), where a value for each of three colors describes a pixel. Each pixel is combination of three components(R,G and B). In this scheme, the bits of first component (blue component) of pixels of image have been replaced with data bits. Blue channel is selected because a research was conducted by Hecht, which reveals that the visual perception of intensely blue objects is less distinct that the perception of objects of red and green. For example, suppose one can hide a message in three pixels of an image (24-bit colors). Suppose the original 3 pixels are: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A steganographic program could hide the letter "A" which has a position 65 into ASCII character set and have a binary representation"01000001", by altering the blue channel bits of pixels. (01000001 11101001 11001000 ) (00100111 11001000 11101000 ) (11001000 00100111 11101001) IV. PROPOSED STEGANOGRAPHY METHOD In this section , the proposed scheme in which at initial step vigenere encryption is used to encrypt ISSN: 2231-5381 http://www.ijettjournal.org Page 243 International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014 the text message ,then first component alteration technique is used to hide the encrypted message inside an image . In this technique, 8 bits of blue components in a pixel are replaced with secret data bits ,in second step ,then that image can be hidden in cover image in non sequential pixel by using variable hope value power of 2 [2,4,8,16] .[5] A. Proposed Embedding Process This phase includes all the activities that must be carried out to hide and protect the secret data inside the cover image. The sender uses some algorithms to encode and then embeds the bit stream into the image. Select secret data Encrypt secret data by vigenere table changed and also in what order they will be altered with the secret data .In this by using first component alteration technique the data is embedded into an image results into stego image1 . 2nd phase Embedding (image into cover image) - In this phase the stego image is embedded into a cover image non sequentially by variable hope value power of 2 [2,4,8,16,32 ] results into stego image 2. B. Proposed Extraction Process At the receiver site, extraction is done. In 1st phase extracting algorithm the secret image will be recovered from cover image . In 2nd phase of extraction , the bits of secret message are obtained by extracting data bits from blue component , finally then decrypt the secret data by using vigenere table , the plain message will be revealed. 3.3. MULTI-LAYERED EMBEDDING AND DECODING 1st phase Embedding secret data in image by first component alteration technique 2nd phase Embedding stego image non sequentially in cover image by variable hope value power of 2 [2,4,8,16,32 ] To attain higher security, a sender embed secret data into multiple layers of cover-image. This multi layering of cover images creates the stealth camouflage. In the encoding process of multilayered encoding first component alteration technique is used in first layer in which secret data is embedded into an image results stego-image1 . Then in 2nd layer of embedding stego-image1 is embedded into stego-image2 non sequentially by variable hope value power of 2 (2, 4, 8, 16, 32 ). The number of layers embedded is only known by the sender preventing others from retrieving the secret data. Figure 2 shows the process: Stego image Fig.1 Proposed Embedding Technique Encryption - In the first step of the embedding phase, the plain text will be encrypted using the Vigenere table (table in [8]) . There are several encryption methods that can be applied to encrypt the data, but in this situation, we need a method that does not produce a cipher text longer than the plain text. Furthermore, among the desired encryption methods, Vigenere table, which is a symmetric encryption technique and maps each input character into exactly one character for output, is more secure than similar methods[4]. The biggest advantage of Vigenere table over the other symmetric encryption methods is that based on the specified secret key, it produces different outputs for a certain input character. 1st phase Embedding (text into image) The embedding algorithm is the most prominent part of the steganographic methods. In fact, it defines which pixels of the image should be ISSN: 2231-5381 Fig. 2 Multi-layered encoding When the sender conveys the secret message to a receiver, the sender needs to notify the receiver of the actual layers of cover-images that have been embedded. Only then can the receiver decode the cover-images layer by layer, obtain the original secret data and saving what is produced. Figure 3 shows the secret data decoded from multiple layers of cover-images. Fig.3 Multi- layered decoding http://www.ijettjournal.org Page 244 International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014 V. RESULTS AND DISCUSSIONS The proposed method is implemented by using MATLAB and images of lena and baboon , which are illustrated in figure 4 . PSNR 100 50 0 LSB Baboon Improved LSB Lena Fig.5 shows the difference between the PSNR of previous work and improved algorithm Fig.4 Standard photos of lena and baboon A. FCAT STEGO IMAGE DISTORTION ANALYSIS Peak Signal-to-Noise Ratio (PSNR) is used to measure the quality of the stego-image that produced by applying the algorithm . PSNR is the most popular metric to measure the distortion in an original image and a reconstructed image. A greater value for PSNR quality metric indicates a lower degree of distortion for generated image . Comparative result in table 1 shown that PSNR will increase in proposed work so there is no big difference in the visibile quality of original image and stego image . This shows that visual differences will appear indistinguishable for human visual senses . As results are shown below ; In order to identify the PSNR of a stego- image the Mean Square Error ( MSE ) has to be measured : Where m and n are the number of rows and number of columns of cover image respectively , ƒ(i, j ) is the pixel value from cover image , g( i,j ) is the pixel from stego image and L is peak signal value of the cover image . Fig 6 Output of 1st phase embedding PSNR =10 × log10( L2 /MSE) dB If PSNR falls below 30 dB indicates a fairly low quality image which is most likely caused by distortion during embedding process . A high quality stego-image should measure 40 dB or higher .However , by increasing amount of data in image a significant fall will appear in the PSNR value . Comparative study of previous method and improved LSB substitution method is shown below: Lena Image PSNR ( dB) LSB 26.08 First Component alteration Technique 46.11 Improve d LSB 68.10 Fig 7. Output of 2nd phase embedding VI. Table 1 comparative study of previous work with proposed work . Experimental result had shown the strength of this technique . The PSNR of stego- image is calculated and compared with previous work . ISSN: 2231-5381 SECURITY OF PROPOSED SYSTEM The goal of Steganography is to avoid drawing suspicion to the transmission of hidden information, if suspicion is raised, then Steganography security is defected. On other hand http://www.ijettjournal.org Page 245 International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014 the aim of cryptography is to convert intelligible information to unintelligible form, difficult for the third parties which do not have the key. The proposed system achieves the union goal of security for the below reasons: large capacity of the hidden secret data and to maintain a good visual quality of stego-image . 1) The results of proposed system stego-object is an image, this image is transmitted alone without the original image, this point enhance the security of system because there is little ability of matching between the original cover image and the stegoobject. [1] Amanpreet Kaur1, Renu Dhir2, and Geeta Sikka3 .A New Image Steganography Based On First Component Alteration Technique((IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No.3, 2009) [2] 1Vijay Kumar Sharma ,2Vishal Shrivastava. A Steganography Algorithm For Hiding Image in Image by Improved LSB Substitution by Minimize Detection , Journal of Theoretical and Applied Information Technology (JATIT), 15th February 2012. Vol. 36 No.1 [3] Vipul Sharma ,Sunny Kumar . A New Approach to Hide Text in Images Using Steganography, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 3, Issue 4, April 2013 [4] Morteza Bashardoost 1, Ghazali Bin Sulong 2 and Parisa Gerami, Enhanced LSB Image Steganography Method By Using Knight Tour Algorithm, Vigenere Encryption and LZW Compression, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 2, No 1, March 2013. [5] Mamta.Juneja and Parvinder S. Sandhu, An improved LSB based Steganography with enhanced Security and Embedding/Extraction,3rd International Conference on Intelligent Computational Systems (ICICS'2013) January 26 27, 2013 Hong Kong (China) [6] Himanshu Gupta1, Prof. Ritesh Kumar2, Dr. Soni Changlani, Enhanced Data Hiding Capacity Using LSB-Based Image Steganography Method, International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 6, June 2013 [7] Lip Yee Por1, Delina Beh2, Tan Fong Ang1, and Sim Ying Ong1, An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm, The International Arab Journal of Information Technology, Vol. 10, No. 1, January 2013 [8] The Cryptoclub: Using Mathematics to Make and Break Secret Codes, Vigenere cipher, 2006 A K Peters, Ltd., Wellesley, MA [9] Anil Kumar , Rohini Sharma, A Secure Image Steganography Based On Rsa Algorithm And Hash-Lsb Technique, International Journal Of Advanced Research In Computer Science And Software Engineering, Volume 3, Issue 7, July 2013 [10] Mamta juneja , Parvinder singh sandhu, data Hiding With Enhanced Lsb Steganography And Cryptography For Rgb Color Images, Indian Journal Of Applied Research, Volume : 3 ,Issue : 5 , May 2013 [11] T. Morkel , J.H.P. Eloff , M.S. Olivier, AN OVERVIEW OF IMAGE STEGANOGRAPHY, Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa [12] Namita Tiwari , Dr.Madhu Shandilya, Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , International Journal of Computer Applications (0975 – 8887) Volume 6– No.2, September 2010 [13] Mohsen Jahanshahi1, Mojtaba Hosseini2, Improvement of Steganography Parameters in Image against Steganalysis , Journal of Basic and Applied Scientific Research , J. Basic. Appl. Sci. Res., 3(1)543-549, 2013 [14] Miss. Vaishali V. Jadhav 1, Mrs. P.P.Belagali,2 Ms.Sapana Kishor Soudagar 3 , Ms.Pooja Adgonda Patil , Edge Adaptive Image Steganography using LSB Matching Revisited, IOSR Journal of Electronics and Communication Engineering (IOSRJECE) [15] Arvind Kumar Km. Pooja , Steganography- A Data Hiding Technique , International Journal of Computer Applications ,Volume 9– No.7, November 2010 2) The proposed system is build of muti-layer security, consequently even if the original copy of the stego-object is available, the intruder attacked by the second layer of security which is the encryption of the text embedded then he should analyze the cipher text which is difficult to be analyzed. VII. CONCLUSION In this paper , enhanced LSB substitution process for data hiding is proposed . Vigenere encryption used for encoding the confidential information , First component alteration technique used in 1st phase embedding ie. Text into an image .In 2nd phase embedding ie. Image into an image , data is embedded non sequentially by using variable hope value power of 2 [ 2,4,8,16 ]. As it was expected theoretically, the satisfactory results were achieved when method was implemented. Experimental result show the effectiveness of proposed method .The results obtained also show significant improvement in the PSNR than the previous works , the possibility of extracting the content of hidden data reduces significantly , when private message becomes encrypted. Finally a good balance between the security and image quality is achieved . VIII. FUTURE WORK In this study , we tried out to increase the security level of the previous works like in simple lsb and first component alteration technique. However , many suggestions can be given to enhance the work of the proposed system they are:1) By using compression with the proposed system , capacity of payload can be increased . 2) Enhance the method in terms of integrity .That means whenever the secret data being modified within the transmission channel the receiver must realize that is a fake message . REFERENCES 3) This proposed method can be improved by using with neural network based method to provide ISSN: 2231-5381 http://www.ijettjournal.org Page 246