Steganography using LSB Technique Ms. Arati Appaso Pujari Mrs. Sunita Sunil Shinde PG Student Electronics and Telecommunication Engineering department, ADCET, Ashta, India Assistant Professor Electronics and Telecommunication Engineering department, ADCET, Ashta, India Assistant Professor Electronics and Telecommunication Engineering department, ADCET, Ashta, India shindesunita@yahoo.co.in pradnya.mirajkar@yahoo.in aratipujari218@gmail.com Ms. Pradnya P. Mirajkar ABSTRACT In the world of Computer and Internet; most of the data travel over computer network and it becomes challenging task to secure this data. So there is need of an efficient and simple way of securing the electronic documents from being read or used by people other than authorized one. Steganography is one of the categories of information security. This paper discussed a technique based on the LSB (least significant bit). The secret image will be hidden in another image so attacker will not recognize the secret image. There are 4 different types of steganography: Keywords Image steganography is widely use for hiding process of the data. Because it is quite simple and secure way to transfer the information over the internet. Image steganography has following types: Steganography, LSB, Carrier Image, Stego Image. 1. INTRODUCTION Steganography is the science of hiding secret information in other information. It implies that the message to be transmitted is not visible to the informal eye. Steganography has been used for thousands of years to transmit data without being intercepted by unwanted viewers. Images are ideal for information hiding because of the large amount of redundant space is created in the storing of images. Steganography is very close to cryptography. Cryptography is about encrypting the content of the message. At the same time encrypted data package is itself evidence of the existence of valuable information. Steganography goes a step further and makes the ciphertext invisible to unauthorized users. Two other technologies that are closely related to steganography are watermarking and fingerprinting. These technologies are mainly concerned with the protection of intellectual property. But steganography is concern with the hiding of text in another information like image, text, audio, video. The paper is organized as follows: The section 2 presents brief description of Steganography, section 3 includes LSB technique along with its algorithm, section 4 presents results obtained by LSB method of Image Steganography and finally, conclusion is presented in section 5. 2. STEGANOGRAPHY Steganography is a technique that facilitates hiding of a message that is to be kept secret inside other message. Secret messages are transferred through unknown cover carriers so that the existence of the embedded messages is undetectable. Carriers may be images, audio, video, text or any other digitally represented code. Images are ideal for information hiding because of the large amount of redundant space is created in the storing of images. The hidden message may be plaintext, cipher text or anything that can be represented as a bit stream. a. Image b. Audio c. Video d. Protocol Text steganography using digital files is not used very often since text files have a very small amount of redundant data. Audio/Video steganography is very complex in use. a. Transform domain b. Spread spectrum c. Image domain i. LSB and MSB in BMP ii. LSB and MSB in JPG LSB is most efficient (in term of data hiding) method of image steganography. Because the intensity of image is only changed by 1 or 0 because the change at last bit after hiding the information. Carrier image Message image Steganography Stego-Image Fig.1: Steganography process at sender side After hiding Message image in Carrier image by steganography method results in Stego Image while encrypting. This is shown in figure 1. At the decryption side, again by using steganography, carrier image and message image is separated from Stego image. This is shown in figure 2 4. RESULT Stego-Image Steganography Carrier image Applying steganography algorithm, encryption is achieved and is displayed on next page in fig. 4 to fig. 6. In fig. 4 selection of message image and original image is shown. LSB steganography is applied on it to obtain stego image which is shown in fig. 5. In fig. 6 decryption process of recovering message image and original image is shown. 5. CONCLUSION Message image Fig.2: Steganography process at sender side 3. LSB TECHNIQUE In LSB technique intensities of message image and cover image are obtained. After that LSB bit of cover image is replaced by LSB bit of message image. Least significant bit for the patching of data is used because the intensity of image is only changed by 1 or 0 after hiding the information. The change is only one bit so that the intensity of image is not affected too much and we can easily transfer the data. Steganography Algorithm Encryption: 1. Read the original image (Cover image) and the image (Message image) which is to be hidden in the original image. 2. Convert both Cover image and Message image in binary image. 3. Replace the LSB bit of each pixel of Cover image with LSB bit of respective pixel of Message image. 4. Obtain Stego image. Example In this paper steganography is used which makes it difficult to detect the presence of hidden message from prying eyes. By doing so eavesdropper will not be able to detect that secret image is present in the image which is visible to eyes. This paper discussed LSB (least significant bit) technique of steganography. To improve information security Steganography along with Cryptography may be some of the future solution. REFERENCES [1] Ajit Singh, Swati Malik, “ Securing Data by Using Cryptography with Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013 [2] Mr. Vikas Tyagi, Mr. Atul kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar, “ Image Steganography Using Least Significant Bit With Cryptography”, Journal of Global Research in Computer Science, Volume 3, No. 3, March 2012. [3] V. Lokeswara Reddy, Dr. A. Subramanyam, Dr.P. Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats” Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) Consider a mask of 3X3 for Message image is as shown below: [4] David Kahn, “The History of Steganography”, Proc. of First Int. Workshop on Information Hiding 00010111 10100101 00110011 01111000 10100000 00000111 [5] Artz, D, “Digital Steganography: Hiding data within Data”, IEEE Internet Computing, May/June 2001. 01010111 00111110 00010000 and a mask of 3X3 for Message image is as shown below: 00011100 10110111 10100000 10000001 10000011 11111011 00110010 11001100 00111101 Then by applying LSB steganography the mask for Stego image will be 00010110 10100101 00110010 01111001 10100001 00000111 01010110 00111110 00010001 Decryption: This is the reverse process of Encryption [6] Li Zhi,Sui Ai Fen., “Detection of Random LSB Image Steganography” The IEEE 2003 International Symposium on Persona1,lndoor and Mobile Radio Communication Proceedings, 2004. [7] Vijay Kumar Sharma, Vishal Shrivastav, “A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection”, Journal of Theoretical and Applied Information Technology, 15th February 2012. Fig.3: Selection of message image and cover image (Original image) Fig.4: Encryption (Process of hiding message image into original image) Fig.5: Decryption (Process of extracting message image and cover image from stego image)