Study on Image Steganography Techniques



Similar documents
International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

Safer data transmission using Steganography

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Triple Security of Information Using Stegnography and Cryptography

Steganography- A Data Hiding Technique

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

A Secure Data Transmission By Integrating Cryptography And Video Steganography

Secret Communication through Web Pages Using Special Space Codes in HTML Files

AN OVERVIEW OF IMAGE STEGANOGRAPHY

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Steganography Detection for Digital Forensics

CHAPTER 1 INTRODUCTION

Multi-factor Authentication in Banking Sector

Online Voting System Powered by Biometric Security using Cryptography and Stegnography

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES

WATERMARKING FOR IMAGE AUTHENTICATION

Image Authentication Scheme using Digital Signature and Digital Watermarking

Online Voting System Using Three Factor Authentication

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Multimedia Document Authentication using On-line Signatures as Watermarks

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

Security and protection of digital images by using watermarking methods

Image Information Hiding: An Survey

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

International ejournals

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Security Based Data Transfer and Privacy Storage through Watermark Detection

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

A Concept of Digital Picture Envelope for Internet Communication

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

A Novel Security Scheme for Secret Data using Cryptography and Steganography

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

encoding compression encryption

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

A Model-based Methodology for Developing Secure VoIP Systems

Image Compression through DCT and Huffman Coding Technique

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Secret message in a ping: creation and prevention

Friendly Medical Image Sharing Scheme

Narrow Bandwidth Streaming Video Codec

A comprehensive survey on various ETC techniques for secure Data transmission

Practical Internet Steganography: Data Hiding in IP

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP

Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

Institute of Southern Punjab, Multan

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Secure Data Transmission by using Steganography

Hamid.A.Jalab, A.A Zaidan and B.B Zaidan

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Simple Encryption/Decryption Application

Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography

Reversible Data Hiding for Security Applications

A Review on Network Intrusion Detection System Using Open Source Snort

Reliable Detection of LSB Steganography in Color and Grayscale Images

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

An Application of Visual Cryptography To Financial Documents

What is Software Watermarking? Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks

David Morgan. Covered writing

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

Experimental DRM Architecture Using Watermarking and PKI

On Covert Data Communication Channels Employing DNA Steganography with Application in Massive Data Storage

Steganography is the art of hiding information

Audio synthesis: MIDI Digital Audio Coding/Compression. Today: Intellectual property management for digital media. What is Digital Watermarking?

A Robust Multimedia Contents Distribution over IP based Mobile Networks

Modern Steganography

Detection of covert voice-over Internet protocol communications using sliding window-based steganalysis

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Course Title: Computer Forensic Specialist: Data and Image Files

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

New security and control protocol for VoIP based on steganography and digital watermarking

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

Data Masking: A New Approach for Steganography?

GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec

Transcription:

Study on Image Steganography Techniques C.Gayathri #1, V.Kalpana #2 Computer Science & Engineering, School of Computing, SASTRAUNIVERSITY, Tirumalaisamudram, Thanjavur - 613401.Tamilnadu, India 1 infotechgayathri@gmail.com 2 kalpana@cse.sastra.edu Abstract- Steganography is a secret Communication to hide the secret Data. It is an invisible communication that hides data like text, image, and audio, video etc.the secret message is inserted into the image files. The image files can use stego-key to hide the data and the resultant image is called as stego-image. This is most important for the internet users to share their secret data in an efficient manner. Steganography plays an important role in defence. Various steganographic techniques are analyzed and its pros and cons are highlighted in this paper. Key Words: Data hiding, Security, Pay load capacity, Image Distortion. I.INTRODUCTION In this heterogeneous distributed computing world most of the applications Internet based. So, there is a need for secret communication. Two techniques are used for secret communication. First method is cryptography. Cryptography is the process of encoding messages. Hackers cannot read it but authorized person can read. An authorized person is able to decode the messages. The second method is steganography. Steganography is the process of hiding the data.[1] Cryptography is visible communication and steganography is invisible communication in terms of message. The message is embedded in text files, audio, picture and video. The name Stego is from the Greek language. Cover is the meaning of stego so the image is called as cover image. Steganography is used in our day today life such as watermarking, ecommerce applications, and for data transfer. Watermarking is embedded in the images or files to show the ownership. It can be used for protecting copyright information of an authorized person. Currently, application transactions, mostly user s transactions are protected by a secret data. In biometric finger print person ID is integrated into the fingerprint images using steganography, to allow for the transaction verification for applications. II.KINDS OF STEGANOGRAPHY Steganography can be used for main categories of file formats like Text, images, audio/video and protocol. Figure 1: Classification of steganographic Techniques A.Text Steganography: Text as a cover medium is the oldest techniques used in early days. Secret message is detected by taking the 1 st letter of every word present in the file. The process is continued by considering the various positions of the letters. The amount of message that is hidden in this type is very less and easily recoverable by frequency of letters. The following are the some of the methods used frequently by steganographers. Text hiding in mark-up languages (HTML) Text steganography in specific characters in words Line shifting method ISSN : 0975-4024 Vol 5 No 2 Apr-May 2013 572

Word shifting Open spaces Semantic methods Character encoding B.Image Steganography Pictures are attractive to human rather than text Internet pages are very popular for its pleasant pictures. Human eye can not notice the changes in the LSB changes of the image. With this concept images are used to hide the secret information. Now a day s people are using various calculations. Randomly selecting the pixels in the image and replacing the ASCII values of the text are highly unbreakable algorithm cryptography and steganography shakes its hands together to make the image steganography robust. C.Audio Steganography Digital wave files are used to hide message. People are hearing the music in their day today life. Free music downloads from internet through PDA, mobile phones and pc makes the music files popular. Steganographers pay their attention in these audio files their secret message. To embed data secretly onto digital audio there are few techniques introduced; LSB coding Phase coding Parity coding Spread spectrum D. Protocol Steganography A set of rules used to govern the communication is known as protocol. TCP, IP, UDP are the some of the protocols used for communication. Steganographers use this protocol for hiding their secret data. Some unused parts of the protocol like packet header are efficiently used for message hiding.[2] III. TECHNIQUES OF IMAGE STEGANOGRAPHY Image steganography focuses on many methods to apply on the images. Black and white, gray and color images are used to hide the message. According to the number of bits in a pixel the images are categorized. One bit per pixel images are monochrome images. Two bits per pixel can display gray scale images. Eight bits per pixel displays 256 colours of pictures. Twenty four bits per pixel is known as full colour or true colour system which displays millions of colours. The following are the some of the techniques used in image steganography, i) Spatial Domain In spatial domain image steganography method pixel values are changed. Least Significant Bits are changed to hide the secret data. If the LSB bits are changed the image distortion won t be noticed by eye. Using the eye imperceptions LSB technique is widely used to hide the message. Pixels are selected either sequentially or randomly. Encryption of the data and hiding in the LSB makes Steganography stronger. MSB are also used to hide the data based on the intensity value. Key also embedded in the image itself so the intruder finds difficult to recover the text from the image ii) Masking and Filtering In this method MSB bits are used. Lossy compression images are used efficiently. Only gray scale images are used early. iii) Transform Domain Technique Transform domain uses the MSB to hide the data. This technique is widely used because of its independency over the image formats.[3] Transform domain is robust than LSB because it is focused on the image parts that are not altered by some image editing like cropping, resizing. Transform domain works well in both lossy and lossless compression images. Steganography techniques with its pros and cons have been listed in the TABLE I with the brief description as follows. ISSN : 0975-4024 Vol 5 No 2 Apr-May 2013 573

S. NO 1 Spatial domain technique TABLE I Steganography Techniques Techniques Advantages Disadvantages i) Image quality is not changed for any algorithm that uses spatial method. ii) The large capacity of data can be stored. i) Editing the image leads the image to lose its secret data. Less robust. ii) Secret data can be modified by the intruder during the communication. 2 Masking and Filtering i) Stronger than the LSB method. Even though the image is compressed data is not affected. ii) The information hiding done in visible parts of the image. These techniques can be applied only to gray Scale images and restricted to 24 bits. 3 Transform Domain Technique i) To hide data in most significant areas of the cover-image, it makes them more robust from attack than LSB. ii) It can be applied changes for the whole image. These method types are computationally complex. IV.DATA HIDING MEDTHODS Several methods are available in literature for hiding data, they are Least Significant bit(lsb),pixel value differencing(pvd),gray level Modification (GLM), Parity checker method(pcm),diamond encoding method(dem),optimal pixel Adjustment process(opap),exploiting modification direction(emd),adaptive pixel pair matching(appm). Figure 2: Various Steganography methods A.Least Significant Bit Method (LSB) This method replaces least bit significant bits with the message to be encoded. It is a frequent technique used so far when dealing with images [8]. It is simple, susceptible to lossy compression and image manipulation. ISSN : 0975-4024 Vol 5 No 2 Apr-May 2013 574

B. Pixel value differencing Method (PVD) This method can successfully use both embedding and outstanding gradual of the stego-object [9]. The differencing method may be divided in to original image into acceptable blocks having two joining pixels and changes the pixel difference in every one block for data can be embedded. C. Gray level modification Method (GLM) This method is used to map data by changing grey level of the image pixel. GLM steganography is a technique of diagrammatic representation of the data by changing the gray level values of the image pixel. Gray level steganography uses the sum of 0 s and 1 s the value to map within an image. This is directly mapped between the binary values and the suitable pixels in an image. The set of image pixels are based on a mathematical function [10]. Grey level values of that pixel are determined based on the similarity with the bits stream that is to be mapped into the image. Starting with the suitable pixels, the bit 1 is made to 0 by modifying the gray level by one unit. At one time all the suitable pixels will have a 0, the gray level value similarity with the bits stream, it have been mapped. The first position of the bit in the stream is compared with first pixel. The 1 st bit 0 means first pixel is not modified all the pixel will have 0.other than the bit is 1then the gray value of pixels is reduction by one unit to made its value 1,should represent an 1 bit map. D. Parity Checker Method (PCM) This method uses 0 and 1 parity mechanism. In a simplified manner this method even value can be inserted at a pixel position to identify pixel has 1(odd) parity bits. It can be identical odd value insert at a pixel; if the pixel should be 0 (even) parity [11]. If the close similarity parity do not exist at a pixel position for odd or even, then the pixel location can be added and subtracted such that the change in the image quality will not be Visible (to the human visual system). E. Exploiting modification direction method (EMD) This method uses only one pixel pair which is modified to one gray scale unit message digits in a fiveary system for embedding. [12]. this is not efficient for high payload applications. F. Diamond encoding Method (DE) This method is contest position in pixel pair. It is improved by much more payload capacity, meanwhile able to accept stego image with excellence quality [12]. Still two problems need to be overcome such that the payload should be in a most suitable notational system. The arbiter value is not selected in a system. G. Optimal pixel adjustment process method (OPAP) This easily understood and effort pixel adjustment process makes minor distortion by the least significant bit replacement [12]. However distortion will be there by LSB replacement of adjusting pixel values. H. Adaptive pixel pair matching method (APPM) This method uses for pixel pair which competes each other. It is used to refer different elements and find element in the area surrounding a particular pixel pair position in corresponding message digit. This method has low distortion for different payload. The steganography methods pros and cons have been listed in the TABLE II with the brief descriptions as follows: ISSN : 0975-4024 Vol 5 No 2 Apr-May 2013 575

TABLE II Steganography Methods S.No Methods Advantages Disadvantages 1 LSB Method[8] It is used for insertion of data. Easily recovered by unauthorized person. Implementation is very simple. 2 PVD Method[9] High capacity embedding and outstanding imperceptibility of the stego-image. 3 GLM Method[10] It has low computational complexity and high information hiding capacity 4 Parity Checker Method [11] Odd and even parity for insertion and retrieval of messages. Each part of the cover image is divided into non overlapped blocks that has two connecting pixels and changes to different pixel in every one block (pair) for data Embedded. A larger difference in the original pixel values allows an extent modification. Contain Binary data. Allows one to one mapping Data loss occurs from image modification. Low embedding capacity. Payload capacity is low. 5 Diamond encoding Method[12] Retrieval of message bits from all the locations are allowed. The diamond encoding technique Minimizes the distortion and helps in having better visual quality. Large notational system can be embedded in the digits that extent notational system. It is a selected notational system. This system cannot be arbitrarily selected. 6 OPAP method[12] Reduce the Distortion Distortion is present. 7 EMD method[12] Pixel pair is the only pixel to be modified.grey scale unit data The maximum payload capacity of EMD is 1.161bpp digits in 5th-array elements can be embedded to provide better stego image quality. 8 APPM Method[12] It is used for any notational system. Security is not applied. Embedding is appreciated to achieve better image quality. V. STEGANALYSIS Steganalysis is a process of recovering the data that is hidden in the images. Steganalyzer will use various attacks to find the secret data. Chi square method is widely used to detect the data using the statistical properties of the images. Passive attack is very hard to detect because the intruder capture the secret data without modifying the image. So it should be prevented. Active attacks can be traced because the intruder changes the data that is embedded in the image. Active attack should be detected to keep the secret data as confidential. ISSN : 0975-4024 Vol 5 No 2 Apr-May 2013 576

VI. CONCLUSION Steganography is one of the oldest and robust techniques used in various applications involving the secret data sharing. Steganography becomes powerful when it is used along with cryptography. Different kinds of image steganography methods are discussed by highlighting its strong and weak points. Predicting a best method is not possible. The recent spatial domain techniques shows that message hiding can be done efficiently using only the LSB itself. Combining the MSB and LSB for hiding the secret data makes the algorithm very stronger. Steganography is an ongoing research area and the study in this paper the initial step to reach the milestone of the steganography. REFERENCES [1] Ramanpreet Kaur, Prof.Baljit Singh Survey and Analysis Of Various Steganographic Techniques international Journal Of Engineering Science & Advanced Technology Volume-2, Issue-3, May-June 2012. [2] Vijay kumar sharma, Vishal shrivastava A steganography Algorithm for hiding image in image by improved lsb substitution by minimize detection journal of theoretical and applied information technology 15th february 2012. vol. 36 no.1 [3] Dr. Ekta Walia a, Payal Jainb An Analysis of LSB & DCT based Steganography,Global Journal of Computer Science and Technology, 4 Vol. 10 Issue 1 (Ver 1.0), April 2010, [4] Nitin Jain, Sachin Meshram, Shikha Dubey Image Steganography Using LSB and Edge Detection Technique,International Journal of Soft Computing and Engineering (IJSCE) ISSN: 221-2307, Volume-2, Issue-3, July 2012 [5] Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Osamah M. Al-Qershi Image Steganography Techniques: An Overview, International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3) : 2012 [6] Saurabh Singh, Gaurav Agarwal Use of Imageto secure text message with the help of LSB replacement, International ournal of Applied Engineering Research, Dindigul, Volume 1, No1, 2010, ISSN 09764259 [7] Pradeep Kumar Saraswat,and Dr. R. K. Gupta A Review of Digital Image Steganography in Journal of Pure and Applied Science & Technology Copyright 2011 NLSS, Vol. 2(1), Jan 2012 [8] Neil F Johnson, Sushil Jajodia, Exploring Stenography: Seeing the Unseen, IEEE Computer, Feb 1998, [9] D.C. Wu and W.H. Tsai. A steganographic method for images by pixel value differencing. Pattern Recognition Letters, 24: 1613-1626, 2003 [10] Vidyasagar M. Potdar, Elizabeth Chang, Grey Level Modification Stegnography for Secret Communication, 2 nd IEEE International Conference on Industrial Informatics INDIN 2004 June 24th, 26th June, Berlin, Germany, Submitted Tuesday, May 25, 2004. [11] Yadav, Rajkumar, Rishi, Rahul, Batra, Sudhir, A new Steganography Method for Gray Level Images using Parity Checker, International Journal of Computer Applications(0975-8887) Volume 11-No. 11, December 2010. [12] Wien Hong and Tung-Shou Chen A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IEEE transactions on information forensics and security, vol. 7, no. 1, february 2012. ISSN : 0975-4024 Vol 5 No 2 Apr-May 2013 577