SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. II (May-Jun. 2016), PP 38-43
www.iosrjournals.org
DOI: 10.9790/0661-1803023843 www.iosrjournals.org 38 | Page
A Technique To Hide Information Within Image File For Secure
Transmission
Anita Khanal1
, Anup Pradhan2
, Mingur Namgyal Gurung3
, Rinchen Doma
Bhutia4
Rajeev Sharma5
1,2,3,4,5
Department Of Computer Science And Technology
Centre For Computers And Communication
Chisopani, South Sikkim, India
Abstract:- In today’s world lots of data are being corrupted so, for a secure message transfer we need
Steganography .It is the method of hiding information in other information. Other file formats such as of audio
or video format can also be used, but because of their frequency on the internet, digital images are more
popular. There are variety of steganography technique that are used for hiding secret information and are more
complex than others while all of them have respective strong and weak points. Different applications may
require absolute invisibility of the secret information, while others require a large secret message to be hidden.
This project report intends to give an overview of image steganography, its use and techniques. It also helps to
choose which stegnographic technique are suitable for which application and also attempts to identify the
requirements of a good steganography algorithm.
Keywords: - Steganography, Cryptography, plain text, encryption, decryption, transposition cipher.
I. Introduction
The use of steganography is the solution to the problem of information being leaked by the intruders.
One solution to this problem is, through the use of steganography. ]It is a technique of hiding information in
digital media. In contrast to cryptography, rather than keeping others from knowing the hidden information, it is
to keep others from thinking that the information even exists.
Steganography becomes more valuable as more people join the cyberspace revolution. Steganography
is the way of concealing information in manner that prevents the detection of hidden messages. It include an
array of secret communication methods that hide the message from being seen or discovered.
Due to advances in ICT, most of information is kept electronically. Consequently, the security for the
information and data has become an important issue. Besides cryptography, steganography can also be
employed to keep information more secure. In cryptography, before passing message through the network, the
encrypted message is embedded in a digital host, keeping the existence of the message unknown. Besides hiding
data for confidentiality, this approach of information hiding can be extended to copyright protection for digital
media: audio, video and images.
The need of special means of security especially on a computer network is growing due to the growth
in modern communication. As the number of data /information exchange on the internet increases, the
importance of network security is increasing. Therefore, for the protection against unauthorized access and use
of data, the confidentiality and data integrity are require. Thus it has resulted in an explosive growth of the field
of information hiding.
Information hiding is an emerging research area, which encompasses applications such as copyright
protection for digital media, watermarking, fingerprinting, and steganography.
Steganography hide the secrete message within the host data set and presence imperceptible and is to
be reliably communicated to a receiver. The host data set is purposely corrupted, but in a covert way, designed
to be invisible to an information analysis.
II. Literature Survey
Privacy must be kept secure at all cost. Information security is the factor that keeps information safe
and protects the systems and hardware that use, store, and transmit that information. Information security can be
defined as measures adopted to prevent the unauthorized use or modification of applied data or capabilities.
A. Steganography vs. Watermarking
Steganography focus on the degree of invisibility while watermarking pay most of its parameters to the
robustness of the message and its ability to withstand attacks of removal, such as image operations, audio
operations in the case of images and audio files being watermarked respectively.
A Technique to Hide Information within Image File for Secure Transmission
DOI: 10.9790/0661-1803023843 www.iosrjournals.org 39 | Page
It is a non-questionable fact that delectability of a vessel with an stenographic message or a watermark is a
function of the changeability function of the algorithm over the vessel.
Fig 1: A typical triangle of conflict.
That is the way the algorithm changes the vessel, and the seriousness of such an operation shows with
no doubt the delectability of the message, since delectability is a method of file characteristics deviation from
the norm, embedding operation attitude and change the severity of such change decides vessel file delectability.
Invisibility, Robustness, and Security are a typical triangle of conflict. Invisibility can be define as the
amount of the notability of the contents of the message within the vessel. Security is similar to the cryptographic
idea for message security, which means inability of reconstruction of the message without the proper secret key
material shared.
Robustness refers to the durability of the message to survive disturbance or to remove attacks intact. It
is usually used in the watermarking field since watermarking seems to have the persistence of the watermark
over attacks; steganographic messages on the other hand tend to be of high sensitivity to such attacks. The more
invisible the message is the less secure and the less robust it is. Whereas, if the more robust the message is
embedded then, the more size it requires and also the more visible it is.
Fig 2: The graphical representation the system.
B. Detecting Steganography
Steganalysis is the art of detecting Steganography . It involves identifying the use of Steganography
inside of a file. It does not deal decrypt the hidden information inside of a file, rather it just discover it.
There are many methods that can be used to detect Steganography such as:
“Selecting and comparing the image file with the other image file. Multiple copies of images are on the internet,
so one can try and compare the image file that look suspicious. For example, if you download a PNG image and
your suspect file is also a PNG image, both the files may look almost similar apart from the fact that one is
larger and blur than the other one, thus it is most obvious that your suspect file has hidden information/data
inside of it.
A Technique to Hide Information within Image File for Secure Transmission
DOI: 10.9790/0661-1803023843 www.iosrjournals.org 40 | Page
III. Proposed System
Fig.3: The model for steganography
The proposed system for steganography is friendly user interface where the user needs to specify or
select the inputs which may be text, audio or any other file. After the operation(extracting or embedding) is done,
the user can open or just save the output of that particular operation according to their own wish. As for security
to avoid an intruder to extract the embedded data, a security key is used while extracting and embedding
message (data).
Least significant bit(LSB)is the simplest process to embed message in a digital file. LSB coding also
allows a huge amount of data to be encoded, by substituting the LSB of a each single point with a binary
message. The normal data transmission rate in LSB coding is 1kbps per 1 kHz.
However, in some cases of LSB coding, one or more than one least significant bit are replaced with two
message bits. This may result in the increase of amount of data that can be encoded whereas, it also increases
the amount of disturbance in file as well.
IV. Methodology Used
The method used to hide the information in the cover file is LSB Bit Substitution Technique.
Using this approach, the least significant bits of information that determine the meaningful content of the
original file can be replaced with new data in a way such that causes the least amount of distortion.
The advantage of using this method is that the cover file size does not change after the execution of the
algorithms.
Fig 4: Process of encryption
A Technique to Hide Information within Image File for Secure Transmission
DOI: 10.9790/0661-1803023843 www.iosrjournals.org 41 | Page
Fig 5: Process of decryption
V. procedure
The fig 6 given below which has two tab options – one is for encryption and another is for decryption.
In the right side, top panel shows the information about the size, height, and width of the image.
Fig6: Tab option for encryption and decryption
A. Encryption
1. Select encrypt image from tab option for the encryption process.
2. For selecting the image, click on browse. The dialog box will appear. Then, select the Image file, which you
want to use hide information and click on Open button.
3. The image file will open and will be displayed as given below. Next, click on “Browse”
.
Fig7: Encryption
A Technique to Hide Information within Image File for Secure Transmission
DOI: 10.9790/0661-1803023843 www.iosrjournals.org 42 | Page
4. Again the same dialog box will appear, now select the type of file you want to hide within the image and
then, click on ok button.
5. Click on “Encrypt” button, to encrypt the file. The save dialog box will appear, then select the path to save
the New image file and the Image file name.
B. Decryption
1. Select the Image tab option for decryption process.
2. Click on the “Browse” button, to open the dialog box, now select the image which is Encrypted. Select the
image file and click on Open button.
3. The image displayed as follows:
Fig8: Decryption
4. Now click on “Browse” button. It will open a dialog box i.e. for browsing a folder. Then, select the path or
folder, where you want to extract the hidden file. Select the folder and click on Ok button.
5. Now click on Decrypt button, to decrypt the image. Then the hidden file and image file will be saved into a
selected folder. The alert or message for successful decryption will be displayed on the status bar.
VI. Analysis
A. Image size
The size of an image file, is, directly related to the number of pixels it contains and the granularity of
the color definition. A image of 640*480 pix, using a palate of 256 colours would require a file about 307 KB in
size (640*480 bytes) whereas a image having high-resolution of 1024*768 pix and 24-bit color would result in
a 2.36MB file(1024*768*3 bytes).
B. Cover Image
The cover image should be in Graphic Interchange Format (GIF), Bitmap (BMP) and Joint
Photographic Experts Group (JPEG). GIF and 8-bit BMP file allows the software to reconstruct the original
image, know as lossless compression.
Table1. PSNR comparison for the proposed System
A Technique to Hide Information within Image File for Secure Transmission
DOI: 10.9790/0661-1803023843 www.iosrjournals.org 43 | Page
PSNR or Peak-Signal-To-Noise –Ratio is an term used by the engineers for the ration between the
power of corrupting noise that influence its representation and the maximum possible power of a signal. The
signal in case is the real data and the corrupted noise is an error introduced by algorithms.
When comparing image PSNR is an approximation to human perception. A higher usually indicates
that the reconstruction is of better quality. It is valid only when it is used for the corruption of a result from the
same content and data. MSE or Mean Squared Error
can be used for defining PSNR. In a given method K, MSE is defined as:
VII. Conclusion
The Steganography is an interesting subject and outside of the mainstream cryptography and system
administration that most of us deal in day to day life. Steganography can be used for hiding information. We
used the LSB technique to provide a means of secure communication. A stage-key has been applied to the
system during embedment of the message into the cover image. This steganography application software is
provided for the purpose to hide any type of files in the host file. The application supports any file format of an
image, without converting it to any other format. Since ancient times, man has found a desire in the ability to
communicate covertly. The recent research in watermarking is evidence that, beside military use or espionage
application, steganography can be used in other areas where hiding of data or information security is required.
Steganography, like cryptography, will play an major role in the future of secure communication in the “digital
world” because of its unique properties of encrypting and decrypting of information.
Reference
[1]. N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.)
(2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
[2]. N. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. Workshop on Information Hiding,
1998.
[3]. N. Johnson and S. Jajodia. Exploring Steganography: Seeing the Unseen. Computer, vol. 31, no. 2, pp. 2634, 1998.
[4]. K. Lee, A. Westfeld, and S. Lee. Generalised category attack: improving histogram-based attack on jpeg lsb embedding.In
Proceedings of the 9th international conference on Information hiding, IH’07, pages 378–391, Berlin, Heidelberg, 2007.Springer-
Verlag.
[5]. E. T. Lin and E. J. Delp. A review of data hiding in digital images. Proceedings of the Image Processing, Image Quality,
Image.Fridrich ,J, M. Goljan, and R. Du, ―Detecting LSB steganography in color and grayscale images,‖ IEEE Multimedia Special
Issue on Security, pp. 22–28, October- November 2001.
[6]. S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information &
Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23, 2004, pp. 417-418.
[7]. T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture
(ICSA) Research Group, Department of Computer Science, University of Pretoria, SA.
[8]. C. C. Lin andW. H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Sys- tems and Software, vol.
73, pp. 405–414, Nov. 2004.

More Related Content

What's hot

Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

What's hot (19)

Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Scalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image CompressionScalable Image Encryption Based Lossless Image Compression
Scalable Image Encryption Based Lossless Image Compression
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Stegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in ImageStegnography Systems for Securing DataFile in Image
Stegnography Systems for Securing DataFile in Image
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Steganography document
Steganography documentSteganography document
Steganography document
 
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
L1803037377
L1803037377L1803037377
L1803037377
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked (20)

F010112934
F010112934F010112934
F010112934
 
H010215561
H010215561H010215561
H010215561
 
H012516671
H012516671H012516671
H012516671
 
H1303014650
H1303014650H1303014650
H1303014650
 
B012550812
B012550812B012550812
B012550812
 
I012625461
I012625461I012625461
I012625461
 
I017654651
I017654651I017654651
I017654651
 
E012324044
E012324044E012324044
E012324044
 
A010330109
A010330109A010330109
A010330109
 
P01222104109
P01222104109P01222104109
P01222104109
 
J010224750
J010224750J010224750
J010224750
 
D012622129
D012622129D012622129
D012622129
 
M010417478
M010417478M010417478
M010417478
 
I1804015458
I1804015458I1804015458
I1804015458
 
M010618997
M010618997M010618997
M010618997
 
C010231319
C010231319C010231319
C010231319
 
B010221018
B010221018B010221018
B010221018
 
E012442937
E012442937E012442937
E012442937
 
B010320815
B010320815B010320815
B010320815
 
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
Dynamic Programming approach in Two Echelon Inventory System with Repairable ...
 

Similar to F1803023843

A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkStephen Hasford
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 

Similar to F1803023843 (20)

Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Encryption of Text in Image Over a Network
Encryption of Text in Image Over a NetworkEncryption of Text in Image Over a Network
Encryption of Text in Image Over a Network
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
F017253244
F017253244F017253244
F017253244
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
B018131117
B018131117B018131117
B018131117
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Steganography
SteganographySteganography
Steganography
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

F1803023843

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. II (May-Jun. 2016), PP 38-43 www.iosrjournals.org DOI: 10.9790/0661-1803023843 www.iosrjournals.org 38 | Page A Technique To Hide Information Within Image File For Secure Transmission Anita Khanal1 , Anup Pradhan2 , Mingur Namgyal Gurung3 , Rinchen Doma Bhutia4 Rajeev Sharma5 1,2,3,4,5 Department Of Computer Science And Technology Centre For Computers And Communication Chisopani, South Sikkim, India Abstract:- In today’s world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its use and techniques. It also helps to choose which stegnographic technique are suitable for which application and also attempts to identify the requirements of a good steganography algorithm. Keywords: - Steganography, Cryptography, plain text, encryption, decryption, transposition cipher. I. Introduction The use of steganography is the solution to the problem of information being leaked by the intruders. One solution to this problem is, through the use of steganography. ]It is a technique of hiding information in digital media. In contrast to cryptography, rather than keeping others from knowing the hidden information, it is to keep others from thinking that the information even exists. Steganography becomes more valuable as more people join the cyberspace revolution. Steganography is the way of concealing information in manner that prevents the detection of hidden messages. It include an array of secret communication methods that hide the message from being seen or discovered. Due to advances in ICT, most of information is kept electronically. Consequently, the security for the information and data has become an important issue. Besides cryptography, steganography can also be employed to keep information more secure. In cryptography, before passing message through the network, the encrypted message is embedded in a digital host, keeping the existence of the message unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images. The need of special means of security especially on a computer network is growing due to the growth in modern communication. As the number of data /information exchange on the internet increases, the importance of network security is increasing. Therefore, for the protection against unauthorized access and use of data, the confidentiality and data integrity are require. Thus it has resulted in an explosive growth of the field of information hiding. Information hiding is an emerging research area, which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, and steganography. Steganography hide the secrete message within the host data set and presence imperceptible and is to be reliably communicated to a receiver. The host data set is purposely corrupted, but in a covert way, designed to be invisible to an information analysis. II. Literature Survey Privacy must be kept secure at all cost. Information security is the factor that keeps information safe and protects the systems and hardware that use, store, and transmit that information. Information security can be defined as measures adopted to prevent the unauthorized use or modification of applied data or capabilities. A. Steganography vs. Watermarking Steganography focus on the degree of invisibility while watermarking pay most of its parameters to the robustness of the message and its ability to withstand attacks of removal, such as image operations, audio operations in the case of images and audio files being watermarked respectively.
  • 2. A Technique to Hide Information within Image File for Secure Transmission DOI: 10.9790/0661-1803023843 www.iosrjournals.org 39 | Page It is a non-questionable fact that delectability of a vessel with an stenographic message or a watermark is a function of the changeability function of the algorithm over the vessel. Fig 1: A typical triangle of conflict. That is the way the algorithm changes the vessel, and the seriousness of such an operation shows with no doubt the delectability of the message, since delectability is a method of file characteristics deviation from the norm, embedding operation attitude and change the severity of such change decides vessel file delectability. Invisibility, Robustness, and Security are a typical triangle of conflict. Invisibility can be define as the amount of the notability of the contents of the message within the vessel. Security is similar to the cryptographic idea for message security, which means inability of reconstruction of the message without the proper secret key material shared. Robustness refers to the durability of the message to survive disturbance or to remove attacks intact. It is usually used in the watermarking field since watermarking seems to have the persistence of the watermark over attacks; steganographic messages on the other hand tend to be of high sensitivity to such attacks. The more invisible the message is the less secure and the less robust it is. Whereas, if the more robust the message is embedded then, the more size it requires and also the more visible it is. Fig 2: The graphical representation the system. B. Detecting Steganography Steganalysis is the art of detecting Steganography . It involves identifying the use of Steganography inside of a file. It does not deal decrypt the hidden information inside of a file, rather it just discover it. There are many methods that can be used to detect Steganography such as: “Selecting and comparing the image file with the other image file. Multiple copies of images are on the internet, so one can try and compare the image file that look suspicious. For example, if you download a PNG image and your suspect file is also a PNG image, both the files may look almost similar apart from the fact that one is larger and blur than the other one, thus it is most obvious that your suspect file has hidden information/data inside of it.
  • 3. A Technique to Hide Information within Image File for Secure Transmission DOI: 10.9790/0661-1803023843 www.iosrjournals.org 40 | Page III. Proposed System Fig.3: The model for steganography The proposed system for steganography is friendly user interface where the user needs to specify or select the inputs which may be text, audio or any other file. After the operation(extracting or embedding) is done, the user can open or just save the output of that particular operation according to their own wish. As for security to avoid an intruder to extract the embedded data, a security key is used while extracting and embedding message (data). Least significant bit(LSB)is the simplest process to embed message in a digital file. LSB coding also allows a huge amount of data to be encoded, by substituting the LSB of a each single point with a binary message. The normal data transmission rate in LSB coding is 1kbps per 1 kHz. However, in some cases of LSB coding, one or more than one least significant bit are replaced with two message bits. This may result in the increase of amount of data that can be encoded whereas, it also increases the amount of disturbance in file as well. IV. Methodology Used The method used to hide the information in the cover file is LSB Bit Substitution Technique. Using this approach, the least significant bits of information that determine the meaningful content of the original file can be replaced with new data in a way such that causes the least amount of distortion. The advantage of using this method is that the cover file size does not change after the execution of the algorithms. Fig 4: Process of encryption
  • 4. A Technique to Hide Information within Image File for Secure Transmission DOI: 10.9790/0661-1803023843 www.iosrjournals.org 41 | Page Fig 5: Process of decryption V. procedure The fig 6 given below which has two tab options – one is for encryption and another is for decryption. In the right side, top panel shows the information about the size, height, and width of the image. Fig6: Tab option for encryption and decryption A. Encryption 1. Select encrypt image from tab option for the encryption process. 2. For selecting the image, click on browse. The dialog box will appear. Then, select the Image file, which you want to use hide information and click on Open button. 3. The image file will open and will be displayed as given below. Next, click on “Browse” . Fig7: Encryption
  • 5. A Technique to Hide Information within Image File for Secure Transmission DOI: 10.9790/0661-1803023843 www.iosrjournals.org 42 | Page 4. Again the same dialog box will appear, now select the type of file you want to hide within the image and then, click on ok button. 5. Click on “Encrypt” button, to encrypt the file. The save dialog box will appear, then select the path to save the New image file and the Image file name. B. Decryption 1. Select the Image tab option for decryption process. 2. Click on the “Browse” button, to open the dialog box, now select the image which is Encrypted. Select the image file and click on Open button. 3. The image displayed as follows: Fig8: Decryption 4. Now click on “Browse” button. It will open a dialog box i.e. for browsing a folder. Then, select the path or folder, where you want to extract the hidden file. Select the folder and click on Ok button. 5. Now click on Decrypt button, to decrypt the image. Then the hidden file and image file will be saved into a selected folder. The alert or message for successful decryption will be displayed on the status bar. VI. Analysis A. Image size The size of an image file, is, directly related to the number of pixels it contains and the granularity of the color definition. A image of 640*480 pix, using a palate of 256 colours would require a file about 307 KB in size (640*480 bytes) whereas a image having high-resolution of 1024*768 pix and 24-bit color would result in a 2.36MB file(1024*768*3 bytes). B. Cover Image The cover image should be in Graphic Interchange Format (GIF), Bitmap (BMP) and Joint Photographic Experts Group (JPEG). GIF and 8-bit BMP file allows the software to reconstruct the original image, know as lossless compression. Table1. PSNR comparison for the proposed System
  • 6. A Technique to Hide Information within Image File for Secure Transmission DOI: 10.9790/0661-1803023843 www.iosrjournals.org 43 | Page PSNR or Peak-Signal-To-Noise –Ratio is an term used by the engineers for the ration between the power of corrupting noise that influence its representation and the maximum possible power of a signal. The signal in case is the real data and the corrupted noise is an error introduced by algorithms. When comparing image PSNR is an approximation to human perception. A higher usually indicates that the reconstruction is of better quality. It is valid only when it is used for the corruption of a result from the same content and data. MSE or Mean Squared Error can be used for defining PSNR. In a given method K, MSE is defined as: VII. Conclusion The Steganography is an interesting subject and outside of the mainstream cryptography and system administration that most of us deal in day to day life. Steganography can be used for hiding information. We used the LSB technique to provide a means of secure communication. A stage-key has been applied to the system during embedment of the message into the cover image. This steganography application software is provided for the purpose to hide any type of files in the host file. The application supports any file format of an image, without converting it to any other format. Since ancient times, man has found a desire in the ability to communicate covertly. The recent research in watermarking is evidence that, beside military use or espionage application, steganography can be used in other areas where hiding of data or information security is required. Steganography, like cryptography, will play an major role in the future of secure communication in the “digital world” because of its unique properties of encrypting and decrypting of information. Reference [1]. N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC. [2]. N. Johnson and S. Jajodia. Steganalysis of images created using current steganography software. Workshop on Information Hiding, 1998. [3]. N. Johnson and S. Jajodia. Exploring Steganography: Seeing the Unseen. Computer, vol. 31, no. 2, pp. 2634, 1998. [4]. K. Lee, A. Westfeld, and S. Lee. Generalised category attack: improving histogram-based attack on jpeg lsb embedding.In Proceedings of the 9th international conference on Information hiding, IH’07, pages 378–391, Berlin, Heidelberg, 2007.Springer- Verlag. [5]. E. T. Lin and E. J. Delp. A review of data hiding in digital images. Proceedings of the Image Processing, Image Quality, Image.Fridrich ,J, M. Goljan, and R. Du, ―Detecting LSB steganography in color and grayscale images,‖ IEEE Multimedia Special Issue on Security, pp. 22–28, October- November 2001. [6]. S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23, 2004, pp. 417-418. [7]. T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA. [8]. C. C. Lin andW. H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Sys- tems and Software, vol. 73, pp. 405–414, Nov. 2004.