International Journal of Application or Innovation in Engineering & Management... Web Site: www.ijaiem.org Email: , Volume 2, Issue 10, October 2013

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
PROTECTED IMAGE STEGANOGRAPHY
ANISHA SINGH1, SANJEEV GABA2 and PRAPTI SHARMA3
1
Shri.venketaeshwara University,Gajraula.
2,3
Graphic era university
Abstract:
In present duration steganography as well as steganalysis are two major region of enquiry that absorb an amount of
relevance .At hand there are numerous course of action meant for concealing messages in pictures in a way so as to
alteration ended to picture are perceptually imperceptible .The two region of study are vital primarily while responsible
plus confined information swap is required. Steganography is a skill of embedding information in an envelope picture
devoid of sources causing statistically major discrepancy to an envelop figure .Steganalysis is an attempt to overwhelm
steagnography via spotting the covered communication as well as pulling it out. In this paper we propose that image
steganography can confirm the trustworthiness of the information being conveyed to the addressee. That can authenticate
weather the assailant has tried to amend, erase or falsify the covert information in the stego image.
Keywords: Steganography, Steganalysis, Embedding, Cryptography.
1. Introduction:
The rising potential of present communications requires the elite possessions of security mainly on computer structure.
The set-up safety is tempting additional meaning since the quantity of information being exchanged on the Internet is
boosting. Consequently, the confidentiality and facts honesty are obligatory to defend in opposition to illegal admittance.
This has resulted in an explosive growth of the held of information hiding area which encompasses applications such as
copyright protection for digital media, Watermarking, fingerprinting, and Steganography. Other than just a science,
Steganography is the skill of covert message. Its function is to secrete the existence of communication, a very dissimilar
aim than Cryptography, that aims to make communication inarticulate for those that do not own the correct access rights.
Applications of Steganography can include attribute location (identification of subcomponents within a data set),
captioning, time-stamping, and tamper-proofing (demonstration that original contents have not been altered).
Unfortunately, not all applications are risk-free, and there are tough indications that Steganography has been used to
extend child pictures on the internet .
In this way, it is significant to learn and develop algorithms to detect the existence of hidden messages. Digital
Steganalysis is the body of techniques that attempts to differentiate between non-stego or coat objects, those that do not
enclose a concealed message, and stego objects, those that hold a hidden message.
Steganography and Steganalysis have inward a lot of consideration around the globe in the past few years. A few are
concerned in securing their communications through hiding the very own fact that they are exchanging information. On
the other hand, others are interested in detecting the existence of these communications – possibly because they might be
related to illegal activities. The inventor of the word steganography is Trithemius. . The technical term itself is derived
from the Greek words steganos, which means “covered,” and graphia, which means “writing” Steganography is the art of
concealed communication. The very existence of a message is secret. Besides invisible ink, an oft-cited example of
steganography is an ancient story from Herodotus , who tells of a slave sent by his master, Histius, to the Ionian city of
Miletus with a secret message tattooed on his scalp. After tattooing, the slave grew his hair back in order to conceal the
message. He then journeyed to Miletus and, upon arriving, shaved his head to reveal the message to the city’s regent,
Aristagoras. The message encouraged Aristagoras to start a revolt against the Persian king. In this scenario, the message
is of primary value to Histiaeus and the slave is simply the carrier of the message.
These statements highlight the difference between steganography and watermarking. Imagine that the message on the
slave’s head read,“This slave belongs to Histiaeus.” In that this message refers to the slave (cover Work), this would meet
our definition of a watermark. Maybe the only reason to conceal the message would be cosmetic. However, if someone
else claimed possession of the slave, Histiaeus could shave the slave’s head and prove ownership. In this scenario, the
slave (cover Work) is of primary value to Histiaeus, and the message provides useful information about the cover Work.
Systems for inserting messages in Works can thus be divided into watermarking systems, in which the message is related
to the cover Work, and non watermarking systems, in which the message is unrelated to the cover Work. They can also be
independently divided into steganographic systems, in which the very existence of the message is kept secret, and
nonsteganographic systems, in which the existence of the message need not be secret.
The following four categories help to clarify their definitions:1. In 1981, photographic reprints of confidential British cabinet documents were being printed in newspapers. Rumor has
it that to determine the source of the leak, Margaret Thatcher arranged to distribute uniquely identifiable copies of
Volume 2, Issue 10, October 2013
Page 162
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
documents to each of her ministers. Each copy had a different word spacing that was used to encode the identity of the
recipient. In this way, the source of the leaks could be identified. This is an example of covert watermarking. The
watermarks encoded information related to the recipient of each copy of the documents, and were covert in that the
ministers were kept unaware of their existence so that the source of the leak could be identified.
2. The possibility of steganographically embedded data unrelated to the cover Work (i.e., messages hidden in otherwise
innocuous transmissions) has always been a concern to the military. Simmons provides a fascinating description of covert
channels [10] , in which he discusses the technical issues surrounding verification of the SALT-II treaty between the
United States and the Soviet Union. The SALT-II treaty allowed both countries to have many missile silos but only a
limited number of missiles. To verify compliance with the treaty, each country would install sensors, provided by the
other country, in their silos. Each sensor would tell the other country whether or not its silo was occupied, but nothing
else. The concern was that the respective countries might design the sensor to communicate additional information, such
as the location of its silo, hidden inside the legitimate message.
3. An overt watermark (i.e., the presence of the watermark is known) can be seen at the web site of the Hermitage
Museum in St. Petersburg, Russia. The museum presents a large number of high-quality digital copies of its famous
collection on its web site. Each image has been watermarked to identify the Hermitage as its owner, and a message at the
bottom of each web page indicates this fact, along with the warning that the images may not be reproduced. Knowledge
that an invisible watermark is embedded in each image helps deter piracy.
4. Overt, embedded communication refers to the known transmission of auxiliary, hidden information that is unrelated to
the signal in which it is embedded. It was common practice in radio in the late 1940s to embed a time code in the
broadcast at a specified frequency (800 Hz, for example) [11]. This time code was embedded at periodic intervals, say
every 15 minutes. The code was inaudibly hidden in the broadcast, but it was not a watermark because the message (the
current time) was unrelated to the content of the broadcast. Further, it was not an example of steganography because the
presence of an embedded time code can only be useful if its existence is known.
Methodolgy: LSB Based steganography
For a steganographic algorithm having a stego-key, given any cover image the embedding process generates a stego
image. The extraction process takes the stego image and using the shared key applies the inverse algorithm to extract the
hidden message.
This system can be explained using the prisoners problem where Alice and Bob are two inmates who wish to
communicate in order to hatch an escape plan. However communication between them is examined by the warden,
Wendy. To send the secret message to Bob, Alice embeds the secret message’m’ into the cover object’c’, to obtain the
stego object’s’. The stego object is then sent through the public channel. In a pure steganographic framework, the
technique for embedding the message is unknown to Wendy and shared as a secret between Alice and Bob. In private key
steganography Alice and Bob share a secret key which is used to embed the message. The secret key, for example, can be
a password used to seed a pseudo random number generator to select pixel locations in an image cover-object for
embedding the secret message. Wendy has no knowledge about the secret key that Alice and Bob share, although she is
aware of the algorithm that they could be employing for embedding messages. In public key steganography, Alice and
Bob have private-public key pairs and know each other’s public key. In this thesis one confine ourselves to private key
steganography only.
For a steganographic algorithm having a stego-key, given any cover image the embedding process generates a stego
image. The extraction process takes the stego image and using the shared key applies the inverse algorithm to extract the
hidden message.
This system can be explained using the prisoners problem where Alice and Bob are two inmates who wish to
communicate in order to hatch an escape plan. However communication between them is examined by the warden,
Wendy. To send the secret message to Bob, Alice embeds the secret message’m’ into the cover object’c’, to obtain the
stego object ’s’. The stego object is then sent through the public channel. In a pure steganographic framework, the
technique for embedding the message is unknown to Wendy and shared as a secret between Alice and Bob. In private key
steganography Alice and Bob share a secret key which is used to embed the message. The secret key, for example, can be
a password used to seed a pseudo random number generator to select pixel locations in an image cover-object for
embedding the secret message. Wendy has no knowledge about the secret key that Alice and Bob share, although she is
aware of the algorithm that they could be employing for embedding messages. In public key steganography, Alice and
Bob have private-public key pairs and know each other’s public key. In this thesis one confine ourselves to private key
steganography only.
ALGORITHM:
Volume 2, Issue 10, October 2013
Page 163
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 10, October 2013
ISSN 2319 - 4847
Problem definition: Given a cover image c and image to be embedded(payload) h; the objective is to embed the payload
in the cover image by replacing LSB image of cover image by the image of payload. The combined image is known as
stego-images.
Input: Cover image (c) and hidden image(h).
Output: encode stego image(s)
Step 1: Read the first byte of c and h into temporary location cb and hb respectively.
Step 2: Run LSB()
Step 3: Perform Quantization( )
Step 4: Apply Runlength coding( ) on each block.
Step 5: Copy the output as a Stegoimage.
CONCLUSION: .
LSB is bring into being extra robust method that takes advantages of the strengths and keep away from some boundaries.
It is also examine that the wording is hidden behind an image without any buckle in the image i.e the stego image is
exactly similar to the original image.
It has also been exposed that this approach is able to resist first order information based targeted attacks while
maintaining a satisfactory quality of the stego image. It was found that below a particular restraint the technique is best in
terms of the noise added due to the restitution process. It was also observed that even though the renovation of the image
statistics can resist targeted attacks, it does not pull through the safety of an embedding algorithm alongside blind attacks.
This inspection was endorsed to the fact that the reinstallation process acts as an additional source of noise in the cover
signal. This factor limits the applicability of this approach to only targeted attacks.
REFERENCES:
[1] Dogan Kesdogan, Jan Egner, and Roland B¨uschks. Stop-and-Go-MIXes providing probabilistic anonymity in an
open system. In Proc. of the 2nd Int. Information Hiding Workshop, pages 83–98, 1998.
[2] R. Anderson, editor. Information Hiding, volume 1174 of Lecture Notes in Computer Science. Springer-Verlag,
1996.
[3] Gustavus J. Simmons. The history of subliminal channels. In Ross Anderson, editor, Information Hiding: First
International Workshop, volume 1174 of Lecture Notes in Computer Science, pages 237–256. Springer, 1996.
[4] H. A. Rahmel. System for determining the listen habits of wave signal receiver users. United States Patent,
2,513,360, 1950.
[5] J. Simpson and E. Weiner, editors. Oxford English Dictionary. Oxford University Press, 2000.
[6] David Kahn. The Codebreakers—The Story of Secret Writing. Scribner, New York, 1967.
[7] J. J. Hernandez, F. Perez-Gonzalez, J. M. Rodriguez, and G. Nieto. Performance analysisof a 2D multipulse
amplitude modulation scheme for data hiding and watermarking still images. IEEE Journal of Selected Areas in
Communication, 16(4):510–524, 1998.
[8] C. Walker. Personal communication, June 2000.
[9] W. Szepanski. A signal theoretic method for creating forgery-proof documents for automatic verification. In J. S.
Jackson, editor, 1979 Carnahan Conf. on Crime Countermeasures, pages 101–109, 1979.
[10] L. Holt, B. G. Maufe, and A. Wiener. Encoded marking of a recording signal. UK Patent, GB 2196167A, 1988.
[11] N. Komatsu and H. Tominaga. Authentication system using concealed image in telematics. Memoirs of the School of
Science and Engineering, Waseda University, 52:45–60, 1988.
[12] R. Anderson, editor. Information Hiding, volume 1174 of Lecture Notes in Computer Science. Springer-Verlag,
1996.
[13] Ping Wah Wong and Edward J. Delp, editors. Security and Watermarking of Multimedia Contents, volume 3657.
Society of Photo-optical Instrumentation Engineers, 1999.
[14] Alan E. Bell. The dynamic digital disk. IEEE Spectrum, 36(10):28–35, 1999.
[15] SDMI Portable Device Specification—Part 1, Version 1.0. Technical Report pdwg99070802, Secure Digital Music
Initiative, 1999.
Volume 2, Issue 10, October 2013
Page 164
Download