CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Size: px
Start display at page:

Download "CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction"

Transcription

1 CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation is a matter in steganographic systems. The frequency domain based steganography has drawback that the amount of secret data that can be embedded is limited. On the other hand, the spatial domain (LSB) based steganography has the benefit over the frequency method (DCT) in that the hiding capacity is much more and the working mechanism of LSB based method is simple. So in order to form a steganography system that provides high capacity, the LSB approach can be replaced with frequency domain based method. The basic concept of Least Significant Bit Substitution includes the embedding of the secret data at the bits having minimum weightage so that it will not affect the value of original pixel (Sharda and Budhiraja, 2013). The spatial domain based method enables simple form of data embedding by directly manipulating the LSBs of the cover-image and is also prone to detection as it embeds data sequentially in all pixels. The statistical attack may detect the presence of secret data in LSB embedding by simply verifying the bits of the cover-image pixel (Westfeld and Pfitzmann, 2000; Fridrich et al., 2001; Patil et al., 2012). In case the stego-image is known, the attacker can simply extract the LSBs of the cover-image to estimate the secret message (Chandramouli et al., 2004). Due to the possible attacks LSB embedding is relatively insecure, at least in its primitive form. However, due to the advantageous features of such method, it is useful for applications where security is desired. It also forms a good foundation for more secure steganographic techniques. Different variations of LSB based embedding can be performed and one of such variations is encrypting the secret message before embedding into the cover-image (Pavani et al., 2013). 102

2 As in chapter 5, transform domain based steganographic method is combined with cryptographic method to enhance the security of the secret message. Such technique is not suitable for high rate of data embedding. Thus in order to achieve higher embedding capacity and also security, LSB method can be combined with the encryption technique. Spatial domain method tries to substitute redundant parts of a digital image with secret message and is based on the fact that data manipulation results in the smallest change in the value of the byte. This technique does not need any transformation or decomposition on the original images and is fit for real-time processing. Although spatial domain based steganographic process ensures simple form of embedding than the frequency domain based technique, however it is not simple as certain variations (encrypting the secret message before embedding) can make such embedding process complex. Employing the LSB technique for data hiding achieves both invisibility and reasonably high storage payload (Johnson and Katzenbeisser, 2000). According to Chandramouli and Memon, (2001) LSB based techniques pose challenge to a steganalyst as it is difficult to differentiate cover-images from stego-images because of the small changes that it makes. They suggested that in order to maintain the random looking appearance of the LSB, the secret message can be encrypted before it is embedded. Cryptography and LSB steganography techniques can be combined for ensuring security, robustness and capacity. The role of cryptography is to assure privacy whereas steganography assures secrecy. Such combining technique can result in a better protection system by providing different layers of security. Even though both methods provide security, to add multiple layers of security it is always a good practice to use cryptography and steganography together (Raphael and Sundaram, 2011). Chan and Cheng, (2004) introduced a data hiding scheme by simple LSB substitution with an optimal pixel adjustment process (OPAP). They described that by applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stego-image can be greatly improved with low extra computational complexity. Song et al., (2011) stated that a secured communication protocol can be formed by that combines LSB steganography and cryptography techniques. Karim et al., (2011), introduced an approach of least 103

3 significant bit (LSB) based image steganography that enhances the existing LSB substitution techniques, to improve the security level of hidden information. The security concept hides secret information within the LSB of the pixel of the image, where a secret key encrypts the hidden information to protect it from unauthorized users. According to their simulation results the value of PSNR gives better result and it is difficult to extract the hidden information. According to Tyagi et al., (2012), LSB steganography along with cryptography may be some of the future solution for protection method against unauthorized access and data secrecy. They used symmetric encoding process for encrypting the secret message and then embedded the bits of the encrypted message into the LSBs of the cover-image. They further stated that detection process is one of the active fields where the problems are big. So with some variations in LSB method, the secrecy of the steganographic process can be further enhanced. Tomar et al., (2012) stated that combining LSB based steganography and cryptography forms an effective data hiding technique and provide better security of hidden data. They encrypted the secret data by RSA (Rivest-Shamir-Adleman) algorithm and then embedded the secret bits into each cover pixel by modifying the least significant bits (LSBs). The average PSNR value of their scheme is db. Phad et al., (2012), developed a security model for secret data that uses Advanced encryption standard (AES) based cryptography and LSB Steganography approach, where the encrypted secret message is embedded into image by using pixel value differencing (PVD) and K-bit least-significant-bit (LSB) substitution. According to them, such combining process provides two-tier security to secret data and enables more significant promotion in the terms of adaptability, capacity, and imperceptivity. They further stated that the experimental result shows the proposed approach obtains both larger capacity and higher image quality. In their case for embedding bits the average PSNR is 42 db for color image. The encryption process uses a key for changing the order or replacing the letters of the secret message and the use of a key in any processing itself provides a measure of security. As the size of the key is not fixed, thus it will be extremely difficult for the unauthorized person to predict the size of key and data. The LSB approach when 104

4 combined with the encryption process provides both capacity and security of the data to be protected. The objective of this chapter is to study the method that uses cryptography (Transposition and Substitution cipher with keys) together with LSB steganography. The joining of these three techniques can create a robust steganography-based communication system capable of withstanding attacks and detection process. The secret data and the key used for encryptions can pass multiple levels of security checks by assuring the integrity, authenticity and security which can make a reliable process for sensitive data. While both encryption methods assure that the message becomes secure with the usage of keys, the steganographic algorithm introduces an additional level of security. 6.2 Proposed Method To enhance the embedding capacity of image steganography, a framework is proposed by combining cryptography and LSB steganography that can attain minimal perceptual degradation and protect from unauthorized data access. Here the secret message undergoes double encryption before embedding it into the cover-image. The secret message is first encrypted by transposition cipher method using a key. Then the ciphertext is encrypted further using substitution cipher technique with another key. The double encrypted message is then embedded into the cover-image by using LSB substitution. Minimizing embedding impact and maximizing embedding capacity are the key factors of any steganography algorithm and LSB method comply with this requirement. The objective of such mechanism is to form a steganographic model that meets both security as well as capacity. For this reason, LSB steganography is enhanced using an extra level of security, which encrypts the secret message two times using two different methods before embedding it into the cover-image Transpose-Substitute Encryption The encryption process used in the proposed work is based on classical techniques i.e. substitution and transposition which are regarded as building blocks of cryptography 105

5 (Kahate, 2008). The proposed encryption technique is based on combining transposition and substitution cipher method in a way to create ciphertexts which are double encrypted. Transposition cipher encrypt secret message (plaintext) by changing the order of the letters of the message. In such cipher the plaintext remains the same, but the order of characters is shuffled around or the plaintext symbols are rearranged (i.e., transposed or permuted) to produce ciphertext. Transposition does not alter any of the bits in the plaintext, but instant moves the position around within it (Smith, 2001). In this encryption, the key defines the possible ordered arrangements or groupings of the letters of the plaintext. This ciphertext is the disguised form of the information and could be transmitted across a network or stored within a file system with the objective of providing confidentiality (Stallings, 2003). A transposition cipher, also sometimes called a permutation cipher, for which applying encoding to plaintext produces ciphertext with the same symbols as the plaintext with a fixed period, but rearranged in different positions (Mao, 2004). A permutation cipher is a transposition cipher in which the key is a permutation, where the plaintext is grouped randomly. The larger the size of the permutation the more secure the cipher-text will be. On the other hand, instead of changing the order of characters as in transposition cipher, the substitution cipher replaces the character of the message with other character so as to make the message unintelligible (Friedman, 1967). In such encryption method, the letters or characters of the plain text are substituted by another letter in a way to make it meaningless. A substitution cipher is an encryption scheme that uses only substitution transformations where the method is to replace the character and the key is the number of characters to replace it. The two other techniques related with transposition and substitution encryption method for obscuring the plaintext message are diffusion and confusion (Smith, 2001). Diffusion changes the plaintext by spreading it over the ciphertext and the simplest way to cause diffusion is through transposition. Confusion obscures the relationship between the plaintext and the ciphertext and is done through substitution. 106

6 Figure 6.1: Block diagram of Transpose-Substitute Encryption process Although the two techniques differ in their way of encrypting the message but they can work together. In the proposed method the secret message is initially encrypted using transposition cipher and then another round of encryption is performed using substitution cipher technique as shown in figure 6.1. In the first phase of the encryption, the transposition cipher is used which rearranges of the letters of the secret message based on the key (i.e. it permutes the secret message). Such arrangement is done with K columns and K rows and thus forming a block of size K K, where K is the key that forms the permutation of the plaintext within the block. The transposition method operates by arranging the letters of the plaintext (secret message) into the blocks row-wise and then the letters are read-off in column-wise to form the ciphertext. Thus the plaintext is broken into segments of size of the permutation and the letters within that segment are permuted according to this key. Both the length of the rows and the subsequent arrangement of the columns are defined by the key. Once the message exactly fits the first block, then the next block is used to fill the remaining plaintext and so on. The key determines the number of rows and columns, and the number of letters in the message (based on the key) determines the number of blocks. The arrangement of plaintext in the blocks is performed using the spaces between the texts, so in encryption process the spaces are placed in the sequence it comes. Such enables in decoding process to retrieve the 107

7 exact plaintext. Here is an example of the first encryption step i.e., the transposition encryption, in which the letters are written in the block row-wise, where the key is 7 that forms blocks of 7X7 and the number of blocks is formed by the number of characters as in table 6.1. Table 6.1: Plain Text entered into the two blocks in row-wise B Y C O M B I N I N G S T E G A N O G R A P H Y A N D C R Y P T O G R A P H Y W E C A N A C H I E V E B E T T E R S E C U R I T Y O F D A T A A N D I N F O R M A T I O N If the following text, written below is used as plaintext: BY COMBINING STEGANOGRAPHY AND CRYPTOGRAPHY WE CAN ACHIEVE BETTER SECURITY OF DATA AND INFORMATION Then it is placed row-wise into the block. To form the ciphertext, it is read off in columns to get the following: BITRNTYYNEAD IGP GWCNAHCREOGNYRA M O YPCBSGAPHANVER NR ERIDDMA TA ACBSYTITHEE ANIITCO FOETUFAON Thus it forms a different text (ciphertext) which is not understandable. In the second encryption phase, the ciphertext generated by transposition technique is further encrypted by using substitution cipher technique. In this process each letter is substituted by an arbitrary letter to form second state of ciphertext. In such replacement of letter another key is used that defines how much to shift. Thus the ciphertext formed as a result of substitution encryption produces different ciphertext depending on the specific key being used. If the substitution cipher s key is 17, then the ciphertext formed by encrypting the transposed cipher is given below: 108

8 SZKIEKPPEVRUF ZXG XNTERYTIVFXEPIR D F PGTSJXRGYREMVI EI VIZUUDR KR RTSJPKZKYVV REZZKTF WFVKLWRFE Such ciphertext is the substituted form of the transposed cipher which is the final ciphertext formed by combining transposition and substitution encryption technique. Decrypting the cipher-text: The decryption of the ciphertext for combined transposition and substitution technique is performed in the reverse order as shown in figure 6.1. Firstly the ciphertext is decrypted using substitution decryption process based on key that outputs the encrypted form of the transposition cipher. Then the ciphertext is arranged into the blocks in the order of columns and then it is read in row-wise. The order of the permutation of column and row is defined by same key as used in encryption process. For each of the blocks, all of the possible permutations of the columns are considered. The letters are arranged column-wise and are read off row-by-row to get the original plaintext. Thus the decryption process also requires two keys one each for transposition and substitution cipher to get back the original plaintext (secret message) Data embedding procedure In this data hiding process the bits of the double encrypted message is embedded in to the LSBs of the cover-image. As image comprises of pixel contribution from red, green and blue components and each pixel has numbers from the color components (for 24-bit bitmap image each of red, green and blue plane has 8 bit). At 8 bit of the color number, if least significant bits are changed, the visual system cannot detect changes in pixel and thus it is possible to replace message bits with image pixels bit. For example if the following pixel value is considered and the secret information is stored in the least significant bit, at the worst situation the pixel changes to and examinations shows that such alteration is not perceptible. If the LSB in a byte of an image is manipulated, either one is added or subtracted from the value it represents. So, the proposed method uses LSB based process to embed the encrypted data into the cover-image. 109

9 In order to hide the encrypted message, data is first converted into byte format and stored in a byte array. The secret message is embedded into the LSB position of each pixel. If the original pixel consist of bits as follows: (r7 r6 r5 r4 r3 r2 r1 r0, g7 g6 g5 g4 g3 g2 g1 g0, b7 b6 b5 b4 b3 b2 b1 b0) In addition, the encrypted character (bytes) consists of bits: (c7 c6 c5 c4 c3 c2 c1 c0). Then the first secret bit is replaced with the LSB of the selected pixel s blue plane, next secret bit with the green plane s LSB and then with the LSB of red plane (r7 r6 r5 r4 r3 r2 r1 c2, g7 g6 g5 g4 g3 g2 g1 c1, b7 b6 b5 b4 b3 b2 b1 c0). The pixels of the cover-image are selected sequentially and the embedding process operates in the pixels by first inserting the secret bit in the LSB of the blue plane, then green and finally the red plane. Such method of manipulating the secrets bits into LSBs also increases the security because the embedding is done in reverse order. Once the insertion in the first pixel is over, then data embedding takes place in the rest of the pixels in the similar way. In this way entire secret message is inserted into the pixels of the cover-image. If a pixel with value (225,107,100) is used to embed message character a, then the new pixel is formed as shown below: Original pixel = ( , , ) a = (ASCII value 97) New pixel = ( , , ) New pixel = (224, 106,101) Here it is noticed that at worst case, the pixel value of (225,107,100) is changed to a new pixel value of (224, 106,101) and such manipulation does not affect the overall quality and statistics of the cover-image. The embedding process operates over the image, and embeds the message character into cover-image pixel by pixel at a time. Once all the message characters are embedded into the cover-image, a target character is inserted into the pixels of the cover-image immediately after the last character of the secret message. The target character can be a special symbol and is also known as 110

10 terminator character which is the last character that is embedded and after its embedding, insertion process stops i.e., the target character signifies the termination of the embedding process. The binary representation of the target character is embedded into the pixels in the same way as the message bits are embedded. This helps the decoding process to stop extracting of data from stego-image after getting the target character, which signifies the end of the message. Algorithm to embed secret message: Step 1: Read the cover image and text message which is to be hidden in the cover image. Step 2: Encrypt the message using transposition cipher. Step 3: Perform the second round of encryption using substitution cipher. Step 4: Convert encrypted message into binary. Step 5: Calculate LSBs of each pixels of cover image. Step 6: Replace LSBs of cover image with each bit of secret message sequentially. Step 7: Repeat step 6 until the entire secret bits are embedded. Then place the binary representation of the target character at the end of the embedding. Step 8: Write stego image Message extraction process The embedding process stated above gives a picture to what extent it is possible to extract the secret message bits from the LSBs of the pixels. Using the same sequence as in the embedding process, the set of pixels storing the secret message bits are extracted sequentially from the stego-image. The LSBs of the selected pixels are extracted and lined up to reconstruct the secret message bits. As in the embedding process a target (terminator) character is inserted into the stego-image which is the last character to signify the end of embedding of data. When the binary representation of the target character is found the extraction process stops. The purpose of putting this character is that, in the process of retrieving the message the extraction algorithm may take extra bits and thus the target character will terminate the extraction process. The bits of the LSB are retrieved and placed in the array. Then content of the array 111

11 converts into decimal value that is actually ASCII value of encrypted message. Each 8 bit from the array is converted into character. Thus the message that is retrieved from the stego-image is actually encrypted form of the original message. The retrieved message is firstly decrypted using substitution decryption method based on the key to get back the encrypted message and then further decrypted using the transposition method. In decrypting the message using transposition cipher method, the ciphertext is written column-wise in blocks of same size as in encrypting method and is read out row-wise in a order depending on the key. If the decryption keys do not match with the keys used in the encryption methods, the original plaintext (secret message) will not retrieve. Algorithm to extract secret message: Step 1: Read the stego image. Step 2: Calculate LSBs of each pixel of stego image. Step 3: Retrieve bits & convert each 8 bit into character. Step 4: Repeat Step 2 and 3 until the binary representation of the target character is found. Step 5: Perform substitution decryption technique to the retrieved characters. Step 6: Again decrypt the message using transposition decryption method. Step 7: The retrieved characters are placed sequentially to get back the original secret message. 6.3 Results and Discussion In order to examine the performance of the proposed steganographic technique, an evaluation scheme for steganographic system is conducted. As steganographic systems have two fundamental characteristics - imperceptibility and the hiding capacity which are investigated in order to evaluate the system that determines the superiority of a steganography technique. The secret data are embedded in the LSBs of the cover-image as mentioned in the proposed algorithm. The issues relating to the experimental approach is considered, which is used to measure the impact of such 112

12 embedding. The experiments have been conducted using the MATLAB R2009b program on Windows 7 platform. Various performance parameters like PSNR, MSE, payload size, time computation etc. have been used to evaluate the performance using various images which include both well known standard and natural images. Initially, the experimental analysis presents a comparison of the proposed method with OPAP (Chan and Cheng, 2004) to demonstrate its performance. Fourteen well-known images each with size , namely Lena, Baboon, Peppers, Jet, Tank, Airplane, Truck, Elaine, Couple, Boat, Man, and Tiffany, Barbara, House, are used as cover-images in the experiments. The secret messages consist of the texts of this article that are encrypted before embedding into the cover-images. The experiments are based on embedding and bits of secret message into the cover images. Some of the cover-images and the resulting stego-images formed are shown in figure 6.2 and figure 6.3. (a)cover-image: Airplane (c) Stego-image: Steg-airplane (b) Cover-image: Boat (d) Stego-image: Steg-boat Figure 6.2: (a)-(b) Cover-images and (c)-(d) their resulting Stego-images 113

13 (a) Cover-image: Barbara (c) Stego-image: Steg-barbara (b) Cover-image: House (d) Stego-image: Steg-house Figure 6.3: (a)-(b) Cover-images and (c)-(d) their resulting Stego-images The difference between the resulting cover-images and stego-images are indistinguishable as seen in figure 6.2 and figure 6.3. Thus it can pass the perceptibility test as there is no visual distortion between stego-image and the original cover image. The more the outlet of algorithm is similar to the original image, the more perceptibility of algorithm is achieved therefore the recognition of hidden data will be more difficult. The generated stego-images show that they contain no artifacts that can be identified by human eyes. 114

14 Table 6.2: Comparison of PSNR values of OPAP (Chan and Cheng, 2004) and the proposed method obtained by embedding encrypted bits Cover-image OPAP (Chan and Cheng, 2004) Proposed Method PSNR MSE PSNR MSE Airplane Boat Baboon Barbara Couple Elaine House Jet Lena Man Peppers Tank Tiffany Truck Zelda The PSNR and MSE values of the proposed scheme and OPAP (Chan and Cheng, 2004) based on embedding bits secret data into the fourteen cover images is presented in table 6.2. Referring to the table, it is seen that the proposed method presents better PSNR values than OPAP. 115

15 Figure 6.4: Shows the results of PSNR values of the proposed method in comparison with OPAP (Chan and Cheng, 2004) for embedding encrypted bits A larger PSNR value indicates the fact that the discrepancy between the cover image and the stego-image is not visible to the human eye and also it can override some of the statistical measures of detecting the secret data. As seen in figure 6.4, the proposed method acquires an average PSNR value 55 db and OPAP has 50 db for the fourteen images each with size Thus in evaluating Objective Quality performance the proposed method performs better than OPAP. It is observed that the PSNR values of the proposed method increased by 5 db. This is because the distortion of the cover-image can be greatly improved by the proposed scheme. In order to evaluate further and to analyze image quality and perceptibility of the proposed method in comparison to OPAP with regard to increasing capacity, the next experiment is based on embedding bits of data in the same standard cover images. The results of the embedding are shown in table 6.3 where the secret data is increased by two times of the earlier experiment. 116

16 Table 6.3: Comparison of PSNR values of OPAP (Chan and Cheng, 2004) and the proposed method obtained by embedding encrypted bits Cover-image OPAP (Chan and Proposed Cheng, 2004) Method PSNR MSE PSNR MSE Airplane Boat Baboon Barbara Couple Elaine House Jet Lena Man Peppers Tank Tiffany Truck Zelda From the table 6.3, it is seen that by increasing the embedding capacity the proposed method still exhibits better PSNR values in comparison to OPAP. For a given attack, PSNR is used as quality metrics can be used in determining the desired visual quality for a given robustness. 117

17 Figure 6.5: Shows the results of PSNR values of the proposed method in comparison with OPAP (Chan and Cheng, 2004) for embedding encrypted bits For embedding encrypted bits, the proposed method shows an average PSNR value of 52.2 db which is 6 db more compared to OPAP as shown in figure 6.5. Thus, in deciding whether an image is stego or not, the quality measure plays a vital role. The results indicate that the quality of the stego-image is improved using such approach. From table 6.2, it is observed that for all images when encrypted bits is embedded, the proposed scheme exhibits PSNR value ranging from 55.2 to 55.4 db while OPAP shows value ranging from 50.0 to In table 6.3, it is observed that when the secret data is doubled i.e. when encrypted bits is embedded, the proposed method shows PSNR value ranging from 52.1 to 52.3 db and it is 45.2 to 45.7 in case of OPAP. It is also observed that incase of OPAP, PSNR values decreases from 50 db to 45 db and the proposed method decreases from 55 db to 52 db when the hiding capacity is increased from bits to bits. Thus the decrease in PSNR value is high in case of OPAP compared to the proposed method. It can also be stated that the proposed method can afford higher capacity without major changes and degradation of stego-images compared to OPAP. By comparing table 6.2 and table 6.3, it is observed that there is a tradeoff between capacity and PSNR, when the capacity is increased PSNR value decreases. However, steganographic capacity and imperceptibility are at odds with each other. Thus, it is not possible to simultaneously maximize the capacity and imperceptibility of a steganographic system for a given cover-image. Consequently, steganographic systems must achieve a balance among these requirements. 118

18 Furthermore, in order to compute the performance of the proposed method, some color images are taken as cover-medium to embed three set of random sized encrypted messages. In this evaluation several criteria such as the size of stego-image and cover-image, size of the embedded and extracted message, the quality of the images (PSNR and MSE) and the computational time (embedding and extracting time) are considered. In this case, the size of the secret message and images has been considered to investigate the impact of embedding data on the final stego-image. The results of the embedding process are listed in table 6.4. (a) Cover-image: Desert (b) Stego-image: Stegdesert1 (c) Stego image: Stegdesert2 (d) Stego-image: Stegdesert3 Figure 6.6: (a) Cover-image: Desert and (c)-(d) its resulting Stego-images 119

19 (a) Cover-image: Park (b) Stego-image: Stegpark1 (c) Stego image: Stegpark2 (d) Stego-image: Stegpark3 Figure 6.7: (a) Cover-image: Park and (c)-(d) its resulting Stego-images From the figure 6.6 and 6.7 it is observed that the cover-images and its resulting stego-images are indistinguishable to the naked eyes. Based on this distinction, there appears no visual distortion on the stego-images. This is because of the fact that the secret bits are embedded by replacing the LSB s of an image. In an image changing the LSBs does not result in image distortion and thus the resulting stego-image is identical to the cover-image. If a steganographic algorithm leave a trace during embedding than it can be detected through statistical analysis. For an algorithm to be statistically undetectable, it should not form any visible distortion to the resulting image. 120

20 Table 6.4: Results of embedding variable sized encrypted messages into some color images takes as cover-medium Cover Size of the Size of the Time Stego Size of Time Size of the MSE PSNR image Cover Secret required to image Stego required to Extracted (in %) (in db) Image Message embed the Image extract the Message (in KB) (in KB) message (in KB) message (in KB) (in Seconds) (in Seconds) Bud Stegbud Stegbud Stegbud Desert Stegdesert Stegdesert Stegdesert Scene Stegscene Stegscene Stegscene Park Stegpark Stegpark Stegpark

21 Different sets of message ranging from 1.05 K.B to 260 K.B that are encrypted firstly by transposition cipher and then using substitution cipher method are used to embed into the LSB of the cover-images namely bud, desert, scene and park which are of different dimensions. Table 6.4, presents the results of embedding, evaluated using different parameters. It is observed that the variation in PSNR values obtained with increasing values of embedded capacity. The PSNR value lowers slightly with the increase in message capacity. The PSNR values obtained are better in regard to the fact that the color images should show PSNR values larger than 40dB. In the proposed method the PSNR values ranges from 51 db to 59 db. The MSE is inversely proportional to PSNR, an increase in PSNR leads to decrease in MSE value and vice versa. A good steganographic method should have lower MSE value. Figure 6.8: Shows the PSNR values of four cover images with secret message of different sizes As expected, Table 6.4 shows that the increase of payload affects the value of PSNR. In the experimental work it is found that by increasing the payload, PSNR value drops down. Thus it is necessary to make a compromise between payload and PSNR. Table 6.4 shows the average results for each group of colored images and figure 6.8 shows the 122

22 results in graph to help study results more easily. If the set of images is changed, results will change accordingly. As it is clear when the value of correlation factor is increased, value of MSE increases and ultimately decreases the value of PSNR. From the table 6.4, it is also seen that the size of the stego-image is same as the size of the cover-image as the proposed embedding procedure follows lossless compression which maintains the original image data exactly. Lossless compression attains low reduction of bits compared to lossy and thus the image size remains the same. LSB method tries to substitute redundant parts of a digital image with secret message and does not need any transformation or decomposition on the original images. The basic concept of such scheme includes the embedding of the secret data at the bits which having minimum weighting so that it will not affect the value of original pixel. The proposed method also enables high embedding of secret data as seen in the table 6.4, where 260 K.B of encrypted data is hidden in the cover-image park which also shows a good PSNR value of 51 db. Spatial domain steganographic techniques offer lossless compression to embed secret data into the LSB of an image and thus they are preferred for high capacity data hiding. Such technique does not make any serious perceptual change in image as they involve in removing redundant parts of information of the coverimage for data hiding. The amount of secret data that is embedded is retrieved fully without any error and without any data loss as in table 6.4. It is also from the fact that the proposed method only changes the LSB of the cover-image which embeds secret messages in a subset of the LSB plane of the image by altering least significant bit in a certain layer of the image file. This is also from the fact that lossless compression attains very low compression and thus the original secret message remains intact and is extracted successfully. The processing time for embedding and extraction technique using different cover images is presented in Table 6.4. It shows that for embedding 1.05 K.B of secret data the time to embed is seconds while time required in extracting the message is seconds. On the other hand for embedding 260 K.B of secret data the time to embed is seconds and the extracting time is seconds. The execution time of 123

23 extracting process is longer compared to embedding and is in direct ratio with the size of embedded files. The reason for such increase in time processing is that more time required in extracting secret message of larger size and finding the binary representation of the target character. As in the embedding process a target character is inserted as the last character to facilitate in the extraction process. Figure 6.9: Shows the computation time for embedding the secret message into four cover-images The embedding time increases gradually with the increase in the size of the secret message as in figure 6.9. As for the execution time, it is based on the size of the message. With increasing payload the computation time increases. Basically, the processing time depends on the specifications of the computer that used to run the program. Even though, the processing times for embedding and extraction are acceptable. 6.4 Chapter Summary In this chapter LSB based steganography is combined with double-encryption technique to enhance the embedding capacity of image steganography and provide an imperceptible stego-image. As Steganography pay attention to the degree of invisibility and 124

24 cryptography ensures security of the message. Thus, the combining model will result a steganographic image by performing cryptographic functionality and, preserving its steganographic nature. Hiding data using LSB modification alone is not highly secure. The combination of these two methods will enhance the security of the data embedded. The secret message undergoes double encryption firstly using transposition cipher method and then with substitution method before embedding into the cover-image file. Then encrypted message is embedded in the cover-image by using least-significant-bit (LSB) technique that enables high capacity of data embedding. The embedding process is also different which operates in the pixels by first inserting the secret bit in the LSB of the blue plane, then green and finally the red plane. Once all the message characters are embedded into the cover-image, the target character is inserted in the pixel of the coverimage immediately next to the one containing the last input character of the message. The main security lies in the encryption method where the secret message which is embedded undergoes double encryption process and both the encryption process is controlled by two different keys. In examining the performance using various parameters, it is seen that the proposed steganographic technique shows good results. 125

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

Research Article A Novel Image Data Hiding Scheme with Diamond Encoding

Research Article A Novel Image Data Hiding Scheme with Diamond Encoding Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 9, Article ID 65847, 9 pages doi:.55/9/65847 Research Article A Novel Image Data Hiding Scheme with Diamond Encoding Ruey-Ming

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

CHAPTER 8. Conclusions and Future Work

CHAPTER 8. Conclusions and Future Work CHAPTER 8 Conclusions and Future Work The growth of modern communication needs a special means of security especially on computer network. As there appears a risk that the sensitive information transmitted

More information

P2_L6 Symmetric Encryption Page 1

P2_L6 Symmetric Encryption Page 1 P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,

More information

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique

More information

Reversible Data Hiding in Colour Images using AES Data Encryption System

Reversible Data Hiding in Colour Images using AES Data Encryption System Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function Najme Maleki, Mehrdad Jalali, Majid Vafaei Jahan Department of Computer Engineering, Mashhad Branch, Islamic

More information

Application of Data Hiding in Audio-Video Using Advance Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

PATTERN MATCHING WITH EXTERNAL HARDWARE FOR STEGANOGRAPHY ALGORITHM

PATTERN MATCHING WITH EXTERNAL HARDWARE FOR STEGANOGRAPHY ALGORITHM International Journal of Information Technology and Knowledge Management July-December 2009, Volume 2, No. 2, pp. 289-295 PATTERN MATCHING WITH EXTERNAL HARDWARE FOR STEGANOGRAPHY ALGORITHM Bawankar Chetan

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Appendix A. Definition of Terms

Appendix A. Definition of Terms Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi

More information

Quality based JPEG Steganography using balanced Embedding Technique

Quality based JPEG Steganography using balanced Embedding Technique Second International Conference on Emerging Trends in Engineering and Technology, ICETET-09 Quality based JPEG Steganography using balanced Embedding Technique Mohammed Ishaque Department of Computer Science

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Reversible Data Hiding in Encrypted Images with Private Key Cryptography Reversible Data Hiding in Encrypted Images with Private Key Cryptography Wajahath Hussain Razvi, Dr.Ch.Samson Abstract This project proposes a reversible scheme for cipher images which are encrypted using

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

A Grayscale Image Steganography Based upon Discrete Cosine Transformation A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By- Steganography Using Prime Technique Authors Vinam Tomar Guided By- Kamal Saluja Ganga Technical Campus, Soldha Email-vinamtomar@gmail.com Abstract Steganography is the art and science of communicating

More information

A DWT Based Steganography Approach

A DWT Based Steganography Approach A DWT Based Steganography Approach EE604 Term Paper Instructor: Prof. Sumana Gupta Group No. 1 Group Members Anirudh Kumar Agrawal, 11907098 Pratik Likhar, 11531 Radhika Ravi, 11553 Introduction Image

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

Image Steganography Method Using Integer Wavelet Transform

Image Steganography Method Using Integer Wavelet Transform ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017 Department of Computer Science and Engineering CSE 3482 Introduction to Computer Security Instructor: N. Vlajic Date: Mar 1, 2017 Midterm Examination Instructions: Examination time: 75 min. Print your

More information

CHAPTER-6 WATERMARKING OF JPEG IMAGES

CHAPTER-6 WATERMARKING OF JPEG IMAGES CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES)

SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES) Sindh Univ. Res. Jour. (Sci. Ser.) vol. 47 (4) 723-728 (2015) SINDH UNIVERSITY RESEARCH JOURNAL (SCIENCE SERIES) A New Image Steganographic Technique using Pattern based Bits Shuffling and Magic LSB for

More information

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) 5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Steganography by using Logistic Map Function and Cellular Automata

Steganography by using Logistic Map Function and Cellular Automata Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01

More information

MRT based Fixed Block size Transform Coding

MRT based Fixed Block size Transform Coding 3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using

More information

Part II Authentication Techniques

Part II Authentication Techniques Part II Authentication Techniques Authentication Codes Provides means for ensuring integrity of message Independent of secrecy - in fact sometimes secrecy may be undesirable! Techniques for Authentication

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 10: Information Hiding Contents Covert Encryption Principles

More information

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

A high quality steganographic method with pixel-value differencing and modulus function

A high quality steganographic method with pixel-value differencing and modulus function Available online at www.sciencedirect.com The Journal of Systems and Software 81 (2008) 150 158 www.elsevier.com/locate/jss A high quality steganographic method with pixel-value differencing and modulus

More information

Secret Key Cryptography

Secret Key Cryptography Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:

More information

Symmetric Encryption Algorithms

Symmetric Encryption Algorithms Symmetric Encryption Algorithms CS-480b Dick Steflik Text Network Security Essentials Wm. Stallings Lecture slides by Lawrie Brown Edited by Dick Steflik Symmetric Cipher Model Plaintext Encryption Algorithm

More information

CHAPTER-5 WATERMARKING OF COLOR IMAGES

CHAPTER-5 WATERMARKING OF COLOR IMAGES CHAPTER-5 WATERMARKING OF COLOR IMAGES 5.1 INTRODUCTION After satisfactorily developing the watermarking schemes for gray level images, we focused on developing the watermarking schemes for the color images.

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

Chapter 3 Block Ciphers and the Data Encryption Standard

Chapter 3 Block Ciphers and the Data Encryption Standard Chapter 3 Block Ciphers and the Data Encryption Standard Last Chapter have considered: terminology classical cipher techniques substitution ciphers cryptanalysis using letter frequencies transposition

More information

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic

More information

Cryptography MIS

Cryptography MIS Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message

More information

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME

A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME A CRYPTOGRAPHICALLY SECURE IMAGE WATERMARKING SCHEME Jian Ren Tongtong Li Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48824-1226 Email: {renjian,tongli}@egr.msu.edu

More information

A Data Hiding Scheme based on Voronoi Diagram

A Data Hiding Scheme based on Voronoi Diagram A Data Hiding Scheme based on Voronoi Diagram Shi-Yu Cui 1, *, Zhi-Hui Wang 1, Chin-Chen Chang 2,3, and Ming-Chu Li 1 1 Department of Software, Dalian University of Technology, DaLian 116024, China {cuishiyu0523,

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography

More information

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Mr. K. Nandha Kumar 1, Mr. R. Anandan 2 1PG Scholar, Department of Electronics and Communication Engineering, Gojan School of Business

More information

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P

SIGNAL COMPRESSION. 9. Lossy image compression: SPIHT and S+P SIGNAL COMPRESSION 9. Lossy image compression: SPIHT and S+P 9.1 SPIHT embedded coder 9.2 The reversible multiresolution transform S+P 9.3 Error resilience in embedded coding 178 9.1 Embedded Tree-Based

More information

Steganography: A Security Model for Open Communication

Steganography: A Security Model for Open Communication Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology

More information

CHAPTER 2. Literature Review

CHAPTER 2. Literature Review CHAPTER 2 Literature Review 2.1 Introduction Digital images are the most commonly used medium for steganography as they are most widely available over the Internet and on the Web. Steganography hides information

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A Digital Video Watermarking Algorithm Based on LSB and DCT

A Digital Video Watermarking Algorithm Based on LSB and DCT A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In

More information

Architectural Design of Multi Level Steganography System for Data Transmission

Architectural Design of Multi Level Steganography System for Data Transmission Architectural Design of Multi Level Steganography System for Data Transmission Adedayo Adeolu Adeniji, Micheal Esiefarienrhe, and Naison Gasale Abstract Recent advances in steganography systems have shown

More information

Vol. 1, Issue VIII, Sep ISSN

Vol. 1, Issue VIII, Sep ISSN Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,

More information

Steganography. Brent McClain Rob Carey

Steganography. Brent McClain Rob Carey Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

Module 13 Network Security. Version 1 ECE, IIT Kharagpur

Module 13 Network Security. Version 1 ECE, IIT Kharagpur Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

A Formula Diamond Encoding Data Hiding Scheme

A Formula Diamond Encoding Data Hiding Scheme Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo

More information

STEGANOGRAPHY IN IMAGE SEGMENTS BY LSB SUBSTITUTION USING GENETIC ALGORITHM

STEGANOGRAPHY IN IMAGE SEGMENTS BY LSB SUBSTITUTION USING GENETIC ALGORITHM e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 475 480 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com STEGANOGRAPHY IN IMAGE SEGMENTS BY LSB SUBSTITUTION USING GENETIC ALGORITHM Vinod

More information