SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Similar documents
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Digital Image Steganography Techniques: Case Study. Karnataka, India.

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

A New Approach to Compressed Image Steganography Using Wavelet Transform

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Jeff Hinson CS525, Spring 2010

Random Image Embedded in Videos using LSB Insertion Algorithm

A Novel Information Security Scheme using Cryptic Steganography

LSB Based Audio Steganography Using Pattern Matching

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Digital Image Steganography Using Bit Flipping

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Implementation of Random Byte Hiding algorithm in Video Steganography

Robust DWT Based Technique for Digital Watermarking

A Hybrid Method of Hiding The Text Information Using Stegnography

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

IMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Data Hiding on Text Using Big-5 Code

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

Overview Of Techniques Of Stegnography On Various Media

Secret Communication through Audio for Defense Application

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

A Survey on Digital Image Steganography and Steganalysis

DIGITAL IMAGE HIDING ALGORITHM FOR SECRET COMMUNICATION

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Adaptive Pixel Pair Matching Technique for Data Embedding

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

Steganography Process- A Review

Optimizing Image Steganography using Genetic Algorithm

Efficient & Secure Data Hiding Using Secret Reference Matrix

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Robust Image Watermarking based on DCT-DWT- SVD Method

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

International Journal of Computer Engineering and Applications,

Metamorphosis of High Capacity Steganography Schemes

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

Image Steganography Method Using Integer Wavelet Transform

STEGANOGRAPHY IN IMAGE SEGMENTS BY LSB SUBSTITUTION USING GENETIC ALGORITHM

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

Attack Detection in Watermarked Images with PSNR and RGB Intensity

Improved Qualitative Color Image Steganography Based on DWT

Information and Communications Security: Encryption and Information Hiding

Steganography. Brent McClain Rob Carey

Application of Data Hiding in Audio-Video Using Advance Algorithm

International Journal of Advance Research in Engineering, Science & Technology

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

AN AUTHENTICATED BSS METHODOLOGY FOR DATA SECURITY USING STEGANOGRAPHY JPEG- BMP

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Invisible Watermarking Audio Digital with Discrete Cosine Transform

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

A Review of Approaches for Steganography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Enhancing the Image Compression Rate Using Steganography

A NOVEL METHOD FOR HIDING INFORMATION

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Secured Way of Ciphering Text Using Audio Steganography

Appendix A. Definition of Terms

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Steganography using MATLAB

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

Topics. Number Theory Review. Public Key Cryptography

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Efficient Image Steganography Using Integer Wavelet Transform

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

LITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network Jasmeet Kaur 1, Nitika Kapoor 2, Harish Kundra 3

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

Enhanced LSB Based Audio Steganography

Steganography Methods on Text, Audio, Image and Video: A Survey

Feature Based Watermarking Algorithm by Adopting Arnold Transform

KEYWORDS: Least Significant Bits(LSB),Discrete Cosine Tranform(DCT),H.264 AVC/SVC. INTRODUCTION Steganography is the science of hiding secret RESULT:

Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image

Introducing Image Steganography in Bangla Language Communication

Concealing Information in Images using Progressive Recovery

An Analysis of Various Techniques in Audio Steganography

A Proposed Method for Cryptography using Random Key and Rotation of Text

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

A New hybrid method in watermarking using DCT and AES

Implementation of ContourLet Transform For Copyright Protection of Color Images

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Transcription:

International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING NARESH SHARMA 1, ABHISHEK TRIPATHI 2, SWATI TIWARI 3 1 Assistant Professor, 2,3 B.Tech Students Department of Computer Science and Engineering SRM University NCR Campus, Modinagar ABSTRACT: Steganography is the process of hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there is a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project focuses on Patterned LSB technique with modifications made to enhance security. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganography techniques are more suitable for which applications. With image steganography we can take advantage over the limited power of the HVS so as to transmit data over public channels that too being undetected. The message that we are going to transmit is going to be hidden in the bits of the image. Steganalysis on the other hand is a way of detecting possible secret communication that has been steganographed. The main aim of steganography is to transmit a message through some innocuous carrier i.e. text, image, audio and video over a communication channel where the existence of the message is concealed. Information hiding is an emerging research area, which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, and steganography Keywords: Steganography, Secret Information, Patterned LSB, Communication, Steganalysis 1.INTRODUCTION One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography became even more important as more people joined the cyberspace revolution. Steganography is the art of concealing information in ways that prevents the detection of hidden messages. It includes an array of secret communication methods that hide the message from being seen or discovered. Due to advances in ICT, most of the information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. In steganography, the message is embedded in a digital host before passing it through the network, Copyright@ijermt.org Page 1

thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images. The growing possibilities of modern communications need the special means of security especially on a computer network. The network security becomes more important as the amount of data being exchanged on the internet increases. Therefore, the confidentiality and data integrity is to be protected against unauthorized access and use. This has resulted in an explosive growth of the field of information hiding. Information hiding is an emerging research area, which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, and steganography. 2. LITERATURE SURVEY There are two ways to encode information in a palette-based image; either the palette or the image data can be manipulated. The LSB of the color vectors could be used for information transfer, just like the substitution methods presented. Alternatively, since the palette does not need to be sorted in any way, information can be encoded in the way the colors are stored in the palette. For N colors since there are N! Different ways to sort the palette, there is enough capacity to encode a small message. However, all methods which use the order of a palette to store information are not robust, since an attacker can simply sort the entries in a different way and destroy the secret message. The tools and resources available to help us realize the scope of steganography in an open systems environment were analyzed. The medium and the message to be transmitted can be an image, audio or video file. [1] An overview of Steganographic techniques in biometric systems was taken. Different compression methods and techniques based on spatial domain and transform domain were overviewed. Techniques observed: DCT, DWT, and HAAR. [2] Overview of DCT (Discrete Cosine Transform), DWT (Discrete Wavelet Transform), LSB (Least Significant Bits), Hash LSB, Spread Spectrum in Image Steganography. The importance of Security, Capacity and Robustness in Steganography. [3] The means of concealing an encoded message within text. The merits in such a system is its potential for hiding the fact that encoding is taking place. Techniques used: Word replacement. [4] For encryption we have reviewed the patterned LSB where we use four digit channel code ranging from 0001 to 9999 which is used to encrypt the data the encrypted data is sent to the receiver, the receiver uses the same channel code to decode the data and retrieve information. 3. EXISTING METHODOLOGY The problem that we face with the current trend of general Steganography algorithm implementation such as LSB, F5, DCT and DWT is that they are susceptible to: 1. Unwanted detection. 2. Modification of data. 3. Loss of data during retrieval. 4. Drastic increase in size. Plus there is also the code complexity that increases with the increase in complexity of the above specified algorithms. Example: If an image is steganographed, the differences in the histograms of the normal and steganographed image are easily visible. This becomes a breach point for detection by hackers and thus a major vulnerability. Copyright@ijermt.org Page 2

Block diagram: Existing method 4. PROPOSED METHODOLOGY The prevalent algorithms that we have researched had some or the other shortcomings regarding security, algorithmic complexity and size. The major point of focus of our study was the LSB algorithm. After research we found out that LSB technique was vulnerable to detection by the intruders because of the visible differences in the color histograms of the sample images. It has also become a very common technique in today s world, thus being much more susceptible to tampering. The LSB technique when implemented also increases noise, image distortion and gives off noise, redundant data when encoding and decoding respectively. Because of the above stated factors we did not inculcate the above technique. Thus we derived a way of encoding data into certain specific pixels of the image, which is not easily susceptible to discovery. The pattern of pixels chosen for encoding is derived from the channel code predefined between the two parties communicating. This channel code is the key to encoding, hence an intruder without the key cannot obtain the hidden message. We call this technique Patterned LSB Encoding. Block Diagram: Proposed System 5.RESULT Comparison of previously used LSB technique with our Patterned LSB technique: LSB Technique: (a) Cover Image (b) StegoObject Copyright@ijermt.org Page 3

(a) Histogram of Cover Image Patterned LSB Technique: (b)histogram of StegoObject (a) Cover Image (b)stegoobject (a) Histogram of Cover Image (b) Histogram of StegoObject Copyright@ijermt.org Page 4

Thus, the above defined methodology is not susceptible to unwanted discovery by hackers or intruders. Plus there is an additional layer of security due to the channel code. This application provides the user with the feature of securely hiding a text message in an image file. The plain text message is steganographed by the Patterned LSB Algorithm using a 4-digit channel code. The Steganographed image, whose size does not vary more than the size of the original image, can then be transmitted over a network as per the user requirements. The receiver can then stegana lyze the StegoObject with the correct channel code on his/her own end and retrieve the original plain text. In this way, a covert communication is implemented. 6. CONCLUSION Although there are many applications that implement steganography but this concept helps us overcome many shortcomings of the existing popular methods such as security and robustness. User should be aware of the following measures: 1. Both users should have the same key for encryption and decryption [optional]. 2. The carrier image should not smaller than 100*100pixels. 3. The text to be embedded should be smaller than the number of pixels in the image. This project has been a rewarding experience in more than one way. The entire project work has enlightened us in various areas of coding, algorithm design and software modeling. This project seeks to better understand the concept and need for covert communication. 7. REFERENCES 1. Bret Dunbar, A detailed look at steganographic techniques and their use in an open systems environment, 2012. 2. H.R. Patel, K. Kishore, K. Sawant. Fingerprint based image steganography in transform domain, 2015. 3. P.R. Patel, Yask Patel. Survey on Different Methods of Image Steganography, 2014. 4. Michael Morran, George R.S. Weir. An Approach to Textual Steganography, 2010. 5. Phillip I Wilson, Mario Garcia. A Modified Version of the Vigenère Algorithm, IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3B, March 2006. 6. D.C. Wu and W.H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, 24 (9-10)(2003)1613-1626. 7. L.M. Marvel and C.T. Retter, A methodology for data hiding using images, in: Proceedings of IEEE Military Communications Conference, MILCOM 98, Boston, MA, USA, 18-21 Oct. 1998, pp.1044-1047. 8. P. Civicioglu, M. Alci and E. Besdok, Impulsive noise suppression from images with the noise exclusive filter, EURASIP Journal on Applied Signal Processing, 2004(16)(2004)2434-2440. 9. Anil Kumar, Rohini Sharma. A secure image steganography based on RSA algorithm and hash LSB technique, 2013. 10. A. Nikolaidis and I. Pitas, Region-based image watermarking, IEEE Transactions on Image Processing, 10(11)(2001)1726-1740. 11. A. Rodriguez and L. Rowe, Multimedia systems and applications, IEEE Computer, 28 (5)(1995)20-22. 12. Bishop, M. Computer Security Art and Security. Person Education Inc. New York, New York, 2003. 13. Dachselt, F., Kelber, K., Schwarz, W., Vandewalle, J. Chaotic versus classical stream ciphers -a comparative study, Circuits and Systems, 1998. ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Volume 4, 31 May-3 June 1998 Page(s):518-521 vol.4 14. Du, W., Atallah, M. "Privacy-Preserving Cooperative Statistical Analysis," ACSAC, p. 102, 17th AnnualComputer Security Applications Conference (ACSAC'01), 2001. 15. Impagliazzo, R. No Better Ways to Generate Hard NP Instances than Picking Uniformly at Random, Foundations of Computer Science, 1990. Proceedings., 31st Annual Symposium on 22-24 Oct. 1990 Page(s):812-821 vol.2 Copyright@ijermt.org Page 5