references - Academic Science,International Journal of Computer

advertisement
Steganography using LSB Technique
Ms. Arati Appaso Pujari
Mrs. Sunita Sunil Shinde
PG Student
Electronics and
Telecommunication Engineering
department, ADCET, Ashta, India
Assistant Professor
Electronics and
Telecommunication Engineering
department, ADCET, Ashta, India
Assistant Professor
Electronics and
Telecommunication Engineering
department, ADCET, Ashta, India
shindesunita@yahoo.co.in
pradnya.mirajkar@yahoo.in
aratipujari218@gmail.com
Ms. Pradnya P. Mirajkar
ABSTRACT
In the world of Computer and Internet; most of the data travel
over computer network and it becomes challenging task to
secure this data. So there is need of an efficient and simple
way of securing the electronic documents from being read or
used by people other than authorized one. Steganography is
one of the categories of information security. This paper
discussed a technique based on the LSB (least significant bit).
The secret image will be hidden in another image so attacker
will not recognize the secret image.
There are 4 different types of steganography:
Keywords
Image steganography is widely use for hiding process of the
data. Because it is quite simple and secure way to transfer the
information over the internet. Image steganography has
following types:
Steganography, LSB, Carrier Image, Stego Image.
1. INTRODUCTION
Steganography is the science of hiding secret information in
other information. It implies that the message to be
transmitted is not visible to the informal eye. Steganography
has been used for thousands of years to transmit data without
being intercepted by unwanted viewers. Images are ideal for
information hiding because of the large amount of redundant
space is created in the storing of images. Steganography is
very close to cryptography. Cryptography is about encrypting
the content of the message. At the same time encrypted data
package is itself evidence of the existence of valuable
information. Steganography goes a step further and makes the
ciphertext invisible to unauthorized users. Two other
technologies that are closely related to steganography are
watermarking and fingerprinting. These technologies are
mainly concerned with the protection of intellectual property.
But steganography is concern with the hiding of text in
another information like image, text, audio, video. The paper
is organized as follows: The section 2 presents brief
description of Steganography, section 3 includes LSB
technique along with its algorithm, section 4 presents results
obtained by LSB method of Image Steganography and finally,
conclusion is presented in section 5.
2. STEGANOGRAPHY
Steganography is a technique that facilitates hiding of a
message that is to be kept secret inside other message. Secret
messages are transferred through unknown cover carriers so
that the existence of the embedded messages is undetectable.
Carriers may be images, audio, video, text or any other
digitally represented code. Images are ideal for information
hiding because of the large amount of redundant space is
created in the storing of images. The hidden message may be
plaintext, cipher text or anything that can be represented as a
bit stream.
a. Image
b. Audio
c. Video
d. Protocol
Text steganography using digital files is not used very often
since text files have a very small amount of redundant data.
Audio/Video steganography is very complex in use.
a. Transform domain
b. Spread spectrum
c. Image domain
i. LSB and MSB in BMP
ii. LSB and MSB in JPG
LSB is most efficient (in term of data hiding) method of
image steganography. Because the intensity of image is only
changed by 1 or 0 because the change at last bit after hiding
the information.
Carrier image
Message image
Steganography
Stego-Image
Fig.1: Steganography process at sender side
After hiding Message image in Carrier image by
steganography method results in Stego Image while
encrypting. This is shown in figure 1. At the decryption side,
again by using steganography, carrier image and message
image is separated from Stego image. This is shown in figure
2
4. RESULT
Stego-Image
Steganography
Carrier image
Applying steganography algorithm, encryption is achieved
and is displayed on next page in fig. 4 to fig. 6.
In fig. 4 selection of message image and original image is
shown. LSB steganography is applied on it to obtain stego
image which is shown in fig. 5. In fig. 6 decryption process of
recovering message image and original image is shown.
5. CONCLUSION
Message image
Fig.2: Steganography process at sender side
3. LSB TECHNIQUE
In LSB technique intensities of message image and cover
image are obtained. After that LSB bit of cover image is
replaced by LSB bit of message image. Least significant bit
for the patching of data is used because the intensity of image
is only changed by 1 or 0 after hiding the information. The
change is only one bit so that the intensity of image is not
affected too much and we can easily transfer the data.
Steganography Algorithm
Encryption:
1. Read the original image (Cover image) and the image
(Message image) which is to be hidden in the original image.
2. Convert both Cover image and Message image in binary
image.
3. Replace the LSB bit of each pixel of Cover image with
LSB bit of respective pixel of Message image.
4. Obtain Stego image.
Example
In this paper steganography is used which makes it difficult to
detect the presence of hidden message from prying eyes. By
doing so eavesdropper will not be able to detect that secret
image is present in the image which is visible to eyes. This
paper discussed LSB (least significant bit) technique of
steganography. To improve information security
Steganography along with Cryptography may be some of the
future solution.
REFERENCES
[1] Ajit Singh, Swati Malik, “ Securing Data by Using
Cryptography with Steganography”, International
Journal of Advanced Research in Computer Science and
Software Engineering, Volume 3, Issue 5, May 2013
[2]
Mr. Vikas Tyagi, Mr. Atul kumar, Roshan Patel, Sachin
Tyagi, Saurabh Singh Gangwar, “ Image Steganography
Using Least Significant Bit With Cryptography”, Journal
of Global Research in Computer Science, Volume 3, No.
3, March 2012.
[3] V. Lokeswara Reddy, Dr. A. Subramanyam, Dr.P.
Chenna Reddy, “Implementation of LSB Steganography
and its Evaluation for Various File Formats” Int. J.
Advanced Networking and Applications Volume: 02,
Issue: 05, Pages: 868-872 (2011)
Consider a mask of 3X3 for Message image is as shown
below:
[4] David Kahn, “The History of Steganography”, Proc. of
First Int. Workshop on Information Hiding
00010111
10100101
00110011
01111000
10100000
00000111
[5] Artz, D, “Digital Steganography: Hiding data within
Data”, IEEE Internet Computing, May/June 2001.
01010111
00111110
00010000
and a mask of 3X3 for Message image is as shown below:
00011100
10110111
10100000
10000001
10000011
11111011
00110010
11001100
00111101
Then by applying LSB steganography the mask for Stego
image will be
00010110
10100101
00110010
01111001
10100001
00000111
01010110
00111110
00010001
Decryption:
This is the reverse process of Encryption
[6] Li Zhi,Sui Ai Fen., “Detection of Random LSB Image
Steganography” The IEEE 2003 International
Symposium on Persona1,lndoor and Mobile Radio
Communication Proceedings, 2004.
[7] Vijay Kumar Sharma, Vishal Shrivastav, “A
steganography algorithm for hiding image in image by
improved LSB substitution by minimize detection”,
Journal of Theoretical and Applied Information
Technology, 15th February 2012.
Fig.3: Selection of message image and cover image (Original image)
Fig.4: Encryption (Process of hiding message image into original image)
Fig.5: Decryption (Process of extracting message image and cover image from stego image)
Download