Lossless Compression and information hiding in images using Stegnography Abstract: In this paper a novel method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and fast transmission rate because of image compression technique is applied. Steganography plays an important role in information security. It is the art of hiding the fact that communication is takes place, by hiding information in other information. Many different file formats can be used. For hiding secret information in images, there exist a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points. Many applications have different requirements of the steganography technique used. Some applications may use absolute invisibility of the secret information, but others require a larger secret message to be hidden. This method has been implemented and tested on varies images and data. It provides better security for encrypted data and no distortion in the image quality. Existing System There are a large number of steganographic methods that most of us are familiar with, ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding information, such as: Covert channels (e.g., Loki and some distributed denial-of-service tools use the Internet Control Message Protocol, or ICMP, as the communications channel between the "bad guy" and a compromised system) Hidden text within Web pages Hiding files in "plain sight" (e.g., what better place to "hide" a file than with an important sounding name in the c:\winnt\system32 directory?) For Further details Contact A.Vinay,9030333433,08772261612 Null ciphers (e.g., using the first letter of each word to form a hidden message in an otherwise innocuous text) Steganography today, however, is significantly more sophisticated than the examples above suggest, allowing a user to hide large amounts of information within image and audio files. These forms of steganography often are used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the information (an often difficult task in and of itself) and then decrypt it. Disadvantages Normally must use the original program to hide and reveal data If the picture with the hidden information is converted to another format, then the hidden data may be lost. Proposed System To a computer, an image is a collection of numbers that constitute different light intensities in different areas of the image. The numeric value representation forms a grid and the individual points are referred to as pixels. Image is the most popular cover objects used for steganography. In the domain of digital images many different image file formats exist, most of them for specific applications. For these different image file formats, different stenographic algorithms exist. Image steganography techniques can be divided into two groups: those in the Image Domain and those in the Transform Domain. Image also known as spatial – domain techniques embed messages in the intensity of the pixels directly, while for Transform – also known as frequency – domain, images are first transformed and then the message is embedded in the image. Image domain techniques encompass bit-wise methods that apply bit insertion and noise manipulation and are sometimes characterized as “simple systems”. The image formats that are most suitable for image domain steganography are lossless and the techniques are typically dependent on the image format. Steganography in the transform domain involves the manipulation of algorithms and image transforms. These methods are used to hide messages in more significant areas of the image, making it more For Further details Contact A.Vinay,9030333433,08772261612 robust. Many transform domain methods are independent of the image format and the embedded message may survive conversion between loss and lossless compression. Advantages Main purpose of steganography is to provide secret communication Steganography has the advantage that even a talented code-cracker cannot decipher a message without knowing it is there. Steganography is beneficial for securely storing sensitive data, such as hiding system passwords or keys within other files. Software Requirements: Operating System : Windows XP Front End : Java Swing Programming tool : net beans Hardware Requirements: Processor : Intel Pentium IV Cache Memory : 1MB HDD : 40 GB RAM : 512 MB Processor Speed : 600 MHz Display Type : VGA For Further details Contact A.Vinay,9030333433,08772261612 Mouse : Logitech Monitor : 15” Samsung Color Monitor Data Flow Diagram: Embedded file: Master file output file Using Public keys Compressed Compressed file Data file Retrieve File: Compressed file Using Public keys Retrieve Data file View Data File Project Description: The simplest approach to hiding data within an image file is called Least Significant bit (LSB) insertion. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image. If we are using 24-bit color, For Further details Contact A.Vinay,9030333433,08772261612 the amount of change will be minimal and indiscernible to the human eye. As an example, suppose that we have three adjacent pixels (nine bytes) with the following RGB encoding: 10010101 00001101 11001001 10010110 00001111 11001010 10011111 00010000 11001011 Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually compressed prior to being hidden): 101101101. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed): 10010101 00001100 11001001 10010111 00001110 11001011 10011111 00010000 11001011 Note that we have successfully hidden 9 bits but at a cost of only changing 4, or roughly 50%, of the LSBs. The following formula provides a very generic description of the pieces of the steganographic process: Cover medium + hidden data + stego_key = stego_medium In this context, the cover medium is the file in which we will hide the hidden data, which may also be encrypted using the stego key. The resultant file is the stego medium (which will, of course. be the same type of file as the cover medium). The cover mediums (and, thus, the stego_medium) are typically image or audio files. In this article, I will focus on image files and will, therefore, refer to the cover image and stego image. For Further details Contact A.Vinay,9030333433,08772261612 For Further details Contact A.Vinay,9030333433,08772261612