Data Hiding Using Least Significant Bit Approch

advertisement
Recent Researches in System Science
Data Hiding Using Least Significant Bit Approch
Dr.Yasir Khalil Ibrahim
Human Development University
Iraq
dr.yasir.khalil@gmail.com
Dr. Mazen M Al Hadidi
Al Balqa' Applied University,
Jordan
trueamman@yahoo.com
Dr. Haitham Karim Ali
Sulaimania Technical college, Iraq
haitham_elect@yahoo.com
lengths. Maxemchuk et al. [5] changed line spacing
Abstract— Exchanging data over the internet is a critical issue
due to security problems. Transmitting data from source to a
destination is not any easy task in the sense of security, and
hiding data such as text documents into JPEG image is well
known problem in the area of data security to prevent these
documents from attacks. In this paper, we implemented the
Least Significant Bit technique to hide data such as doc file into
image of JPEG format and send the image from a source to a
destination through a wireless network (or the Internet), then
extract the hidden file by using a special application. The results
show robustness of the used technique.
and character spacing to include information in
textual images for bulk electronic publications. These
approaches cannot be easily extended to other binary
images and the amount of data that can be hidden is
limited. Another approach of marking a binary
document is proposed in [1] by treating a binary
Keywords- Security, Hiding, internet, Least significant Bit
I.
image as a grayscale one and manipulating the
luminance of dark pixels slightly so that the change is
INTRODUCTION
Hiding a massage using different hosts (i.e. messengers) is
a classical task of steganography.
Recently, hiding
information in a message received an extensive attention, and
several techniques have been used to achieve this goal. The
goal here is to hide information in a message that send from
imperceptible to human eyes yet detectable by
In this
source to a destination from unwanted parties [3].
paper, we implemented a well known technique, which is least
significant bits insertion technique to hide a text file in a JPEG
image to improve its performance in terms of deductibility and
security. The structure of this paper can be summarized as
follows. In next Section, we present the related work. In
Section 3, we present the LSB insertion technique. In section
4, we present the extracting algorithm. Experimentation and
results are presented in section 5.
beyond the scope of this paper. Finally, statistical
II.
scanners. This approach, targeted at intelligent copier
systems, is not applicable to bi-level images hence is
approaches have been in data hiding, which are based
on a random process. The LSB algorithm is a well known
algorithm and it has been extended to make data hiding less
detectable and more secure. For example, minimizing color
changes in the cover image using LSB was proposed by
Roque and Minguet [6].On the other hand Cvejic and
Seppanen [2] try to reduce embedding distortion of the host
audio using LSB.
THE RELATED WORK
In this section we just presented the related work, and in the
next section we present the implemented technique.
In the last two decades, modern steganography entered the
world and a number of classical steganography problems arise
in this is text. Several methods for hiding data in binary
III.
TECHNIQUE
images have been proposed in literature. Matsui et al.
An extremely simple steganographic method is to take the
individual pixels in an image. Each of these pixels in an image
is made up of a string of bits. We can commandeer the 4-least
significant bit of 24-bit true color image to hold 4-bit of our
[4] set in information in dithered images by using the
dithering patterns and in fax images by using the run-
ISBN: 978-1-61804-023-7
LEAST SIGNIFICANT BITS (4-LSB) INSERTION
238
Recent Researches in System Science
(b) We take the 4 upper significant bits alone; we can do that
by perform shift operation by 4:
(72)10 Shift to right be 4 = (0000 0100)2 = (4)10
4. Now we can add the secret message to the cover image
by applying OR operation.
As shown in the block diagram Figure (3-2) to hide each
character of secret message we need two pixels. Thus, the
number of character that we can hide in (n x n) image is given
by the following
Number of characters <=(n · n) ÷ 2 - n
(1)
In equation (1), we subtract n pixels because we don’t set
secret text in the first row of cover image; we start setting data
from the second row of cover image. The first row of covered
image used to store specific data, like position of last pixel in
the covered image that contains secret data. The following two
equations show how to calculate the pixel that determines of
secret text data:
Figure (1): The stego system
secret message (text) by simply overwriting the data that was
already there. By experimental, we note that: The impact of
changing the 4-least significant bits will be minimal and
indiscernible to the human eye.
Y pos = length(1 st rowofimage) modlength(secretmessage)
×2
(2)
X pos = (length (secretmessage) - Y pos) ÷ length(1 st
rowofim
(3)
We just presented the used algorithm to hide a text file in a
JPEG image. In the next section, we present the extracting
algorithm.
V.
(4-LSB) EXTRACTING ALGORITHM
Extracting the secret text message is performed by
reversing the process used to insert the secret message in the
cover image. The following steps describe the details of
Figure (3): Extracting diagram
Figure (2): Embedding diagram
Extracting the hidden text file as follows:
IV.
(4-LSB) EMBEDDING ALGORITHM
1- Take two adjacent pixels from the stego image.
In this section, we present the used algorithm to hide a text file
in a JPEG image. The algorithm consists of the steps:
2- Shift the first pixel by 4 to right 1110 0100 shift to right by 4
1. Convert cover image to streams of binary bits.
2. Use two adjacent bits to hide one character.
3. Convert each character of the secret message to decimal
number.
Example: H = (72)10 = (0100 1000)2
(a) We take the 4 least significant bits alone; we can do that by
perform AND operation:
(72)10 AND (15)10 = (0100 1000)2 AND (0000 1111)2 = (0000
1000) = (8)10.
ISBN: 978-1-61804-023-7
= (0100 0000)2
239
Recent Researches in System Science
3- Perform AND operation with 15 to the second pixel (0101
1000) AND (00001111)2 = (00001000)2
4- ADD the result of step 2 and 3 together and we get (0100
0000)2 + (0000 1000)2 = (0100 1000) = (72)10 = H.
Figure (6): Resultant image of size 147.456 bytes
In the next section, we present the experimentation results.
VI.
EXPERMINTATION AND RESULTS
In this section, we implemented the proposed algorithms to
hide a sample text in side a colored JPEG image.
The colored JPEG image is shown in Figure (3) (143.360
bytes
). Figure (4) illustrates the sample text of size 4.096 bytes that
to be hidden in the colored image. The resultant image is
given in Figure (5), which is of size 147.456 bytes.
VII. CONCLUSION:
In this work we focus our concern in image because of
it’s widely used in Internet and also in mobile system. Based
on our study, 4-LSB substitutions is a robust method for
embedding an acceptable amount of data, that’s because size of
embedded message to carrier’s size.4 LSB embedded data, can
easily be implemented and do not visually degrade the image to
the point of being noticeable. It would appear that 4 LSB is
good method of Steganography due to its tremendous
information capacity. Using 4-LSB method we can exchange
secret messages over public channel in a safe way.
Figure (4): A colored JPEG image of size 143.360 bytes
[1]
A. K. Bhattacharjya and H. Ancin, “Data embedding in text for a copier
system,” in Proc. IEEE ICIP’99, vol. 2,Kobe, Japan, 1999 , pp.
245–
249.
[2] N. Cvejic and T. Seppanen. Increasing robustness of LSB audio
steganography by reduced distortion LSB coding. Proceedings ITCC
2004 International Conference on Information Technology: Coding and
Computing (pp. 533 – 537). Vol.2.
[3] S. M Thampi, “Information Hiding Techniques: A Tutorial Review,”
ISTE-STTP on Network Security & Cryptography, LBSCE 2004.
[4] K. Matsui and K. Tanaka, “Video-steganography: how to secretly embed
This is a sample text to be
hidden inside a JPEG image
a signature in a picture,” Proc. IMA Intellectual Property Project,
vol. 1,
Figure (5): A sample of size text 4.096 bytes
[5]
[6]
ISBN: 978-1-61804-023-7
240
no. 1, 1994.
N. F. Maxemchuk and S. Low, “Marking text documents,” in Proc.
IEEE ICIP’97, 1997.
J. J. Roque and J. M Minguet. SLSB: Improving the steganographic
algorithm LSB. Proceedings The Ibero-American Congress on
Information Security (CIBSI). (pp. 398-408).
Download