An Enhanced RGB Image Steganography Technique Using Dynamic Secret Key. Art of secret communication.
To place hidden information in a carrier.
Most efficient way to ensure the privacy.
A secured-rgb-image-steganography-using-secret-key
1. Sk. Arman Ali (110241)
Palash Kumar Sarker(110243)
An Enhanced RGB Image
Steganography Tenique
Using Dynamic Secret Key
2. Outline
• Steganography
• Steganography and cryptography
• Objectives
• Literature Review
• Related Works
• Proposed System
• Experimental Result Analysis
• Conclusion
• References
3. Message
Steganography
• Art of secret communication.
• To place hidden information in a carrier.
• Most efficient way to ensure the privacy.
Steganography
Cover file(image,
audio, video)
Stego file(image,
audio, video)
5. Steganography and cryptography
• Same Purpose – To hide or protect important information.
• But different approach
Steganography – conceals information, making it unseen.
Cryptography – encrypts information, making it unreadable.
6. Objectives
• To pass a text through an image file in a
robust and advanced secured way.
• To embed secret information into only blue
channel of cover image.
• Better stego image quality.
• Dynamically embed to increase the security
using dynamic secret key.
7. Literature Review
DIGITAL APPROACHES
– Today, it often exists within digital
formats.
– It makes use of seemingly innocent cover files
such as text, audio, and image files.
– The embedded message may be anything that
can be encoded in binary
10. Literature Review(continued…)
REASONS FOR USING DIGITAL IMAGES
– It is the most widely used medium being used
today.
– Takes advantage of our limited visual perception
of colors.
– This field is expected to continually grow as
computer graphics power also grows.
– Many programs are available to apply
steganography.
11. IMAGE STEGANOGRAPHY
– Image steganography is a method of information
hiding into cover-image and generates a stego-image.
– This stego-image then sent the other party by known
medium, where the third party does not know that
this stego-image has hidden message.
– After receiving stego-image hidden message can
simply be extracted with or without stego-key
(depending on embedding algorithm) by the receiving
end
Literature Review(continued…)
12. Literature Review(continued…)
Types of image steganography
• Image domain
Also known as spatial domain techniques embed
messages in the intensity of the pixels directly.
• Transform domain
Also known as frequency domain, images are first
transformed and then the message is embedded in
the image.
14. Related work
Improved LSB Based Steganography Technique [1]
-Capacity is high.
-LSB(1-3-4 ) is used for data embedding .
Limitations
-Human eye is very sensitive in red and green color.
-For edge area, change all bits of blue channel and it
decreases image quality.
-Very much easy to attack the stego image.
-PSNR is low.
[1] Mamta Juneja and Parvinder S. Sandhu, “An Improved LSB Based Steganography Technique for RGB Color
Images”, International Journal of Computer and Communication Engineering, Vol.2, No.4, July 2013.
15. Related work(continued…)
New Approach for LSB Based Image Steganography using
Secret Key [2]
-Secret key encrypts the hidden information.
-Hidden information is stored into variable position of LSB of
image.
Limitations
-Green channel is used to store data.
-Low payload. capacity
-Easy to detect.
[2] S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography
using Secret Key”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011) ,22-24
December, 2011, Dhaka, Bangladesh.
16. Related work(continued…)
Novel Approach to RGB Channel Based Image Steganography
Technique [3]
– High payload capacity.
– Pixel chosen dynamically.
Limitations
- Red, green and blue channel are used to store data.
- Low PSNR.
- Easy to detect the stego image.
[3]Gandharba Swain and Saroj Kumar Lenka, “A Novel Approach to RGB Channel Based Image Steganography
Technique”, International Arab Journal of e-Technology, Vol. 2, No. 4, June 2012.
17. Proposed System
Our proposed system is divided into two parts
Encoding Decoding
Message
Stegosystem
Encoder
Stego Image
Cover
Image
Stego Image
Stegosystem
Encoder
Message
Secret key
26. Conclusion
• Hiding data in best secured way.
• Bits are embedded into variable position of deeper
layer where variable position protects data against
intentional attacks.
• High robustness against intentional and unintentional
attack as well.
• The use of secret key gives a way to secure the
information from malicious user.
• Proposed system is implemented efficiently and most
robust, error free way.
• Dynamic secret key increases the security level.
27. References
[1] G. R. Manjula, A. Danti, “ Hash based least significant bit (2-3-3) image steganography in spatial domain”,
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol. 4, No. 1, February 2015.
[2] S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image
Steganography using Secret Key”, Proceedings of 14th International Conference on Computer and Information
Technology (ICCIT 2011) 22-24 December, 2011, Dhaka, Bangladesh.
[3] G. Chugh, R.K. Yadav and R. Saini, “A New Image Steganographic Based on Mod Factor for RGB Images”
International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol.7, No. 3,pp.27-44,
2014.
[4] A. K. Bairagi, “ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in
Data Security”, ISSN 2218-5224 (Online, Vol. 01, Issue 02, Manuscript Code: 110112).
[5] A. K. Bairagi, S. Mondal, R. Debnath, ” A Robust RGB Channel Based Image Steganography Technique using
a Secret Key”, 16th Int'l Conf. Computer and Information Technology, 8-10 March 2014, Khulna, Bangladesh.
[6] Juneja, Sandhu, “an Improved LSB Based Steganography Technique for RGB Color Images”, International
Journal of Computer and Communication Engineering, Vol. 2, No. 4, July 2013.
[7] R. Bahirat, A. Kolhe, “Overview of Secure Data Transmission Using Steganography”, International Journal of
Emerging Technology and Advanced Engineering, Vol. 4, Issue 3, March 2014.