SlideShare a Scribd company logo
1 of 4
Download to read offline
Image Steganography Combined with DES Encryption Pre-processing
Yang Ren-er, Zheng Zhiwei, Tao Shun, Ding Shilei
College of Information Science and Engineering Ningbo University, Ningbo 315211, China
Abstract—In order to improve the security of
steganography, this paper studied image steganography
combined with pre-processing of DES encryption. When
transmitting the secret information, firstly, encrypt the
information intended to hide by DES encryption is
encrypted, and then is written in the image through the
LSB steganography. Encryption algorithm improves the
lowest matching performance between the image and the
secret information by changing the statistical
characteristics of the secret information to enhance the
anti-detection of the image steganography. The
experimental results showed that the anti-detection
robustness of image steganography combined with
pre-processing of DES encryption is found much better
than the way using LSB steganography algorithms directly.
Keywords-Information hiding; Steganography; DES
encryption; High security
I. INTRODUCTION
Steganography is an information hiding technique
developed in recent years. It is a procedure that makes
use of human perceptive sense of visual or aural
redundancy to digital multimedia, and that embeds the
secret information in the public media to transfer digital
media carrying confidential information to achieve
covert communications[1]
. Imperceptibility is an
important feature of steganography, also called
transparency or anti-detection performance which
includes visual imperceptibility and statistical
imperceptibility. The imperceptibility of steganography
is enhanced by improving the method of steganography[2]
,
or selecting an appropriate steganographic carrier[3]
, or
improving the matching relationship between carrier
image and secret information.
Steganography is different from traditional encryption,
which is theoretically based on cryptography to hide
communication contents by encrypting plaintext, but it is
difficult to mask the fact that communication occurred,
and ciphertext transmission will easily arouse the
attacker’s suspicions, and then it could be intercepted,
attacked or cracked. Steganography complements the
deficiency of concealment of the encryption. Through
transmitting communication contents hidden secretly in
public media, it covers up the facts of real
communication purpose and that communication
occurred. It is not a competitive relation between
steganography and encryption, but they can reinforce
each other, to further ensure the safety of covert
communication[4]
. This paper studied image
steganography based on encryption, which combines the
traditional encryption and information steganography. It
not only makes the secret information transmission
"incomprehensible" and "invisible", but makes the
steganographic system have a higher anti-detection
performance.
II. IMAGE STEGANOGRAPHY COMBINED WITH
ENCRYPTION
A. DES Encryption
DES uses a 56-bit key and an additional 8-bit parity
bit, resulting in the largest 64-bit packet size. This is an
iterative block cipher, using the technology known as the
Feistel, which will encrypt the text block half. The use of
sub-key pair, half of which application circulatory
function, and then the output with the other half to "
exclusive or" operator followed by the exchange of the
two and a half, this process will continue, but in the end
a cycle of non-exchange. DES uses 16 cycles, using xor,
replacement, substitution, four basic arithmetic shift
operations[5]
. After the hidden information is encrypted,
not only the invisibility of information is increased, but
also the statistical characteristics of the information and
the correlation between information are changed in the
same time, which makes the information become 0-1
bitstream, which is in the probability distribution. In
order to verify the characteristics of encryption algorithm,
download three English document of 32768 characters
from the Internet, and inspect the 0 -1 distribution in the
document before and after encryption. From table 1,
before the encryption, the number of 0 and 1 is not
balanced because of correlation between characters in the
natural document, but after the encryption, binary stream
of 0 s and 1 s close to equal probability distribution in
the document.
Table 1 the 0 -1 Distribution in the Document before and after
Encryption
doc
ume
nt
before the
encryption
after the
encryption
the
number
of 0
the
number
of 1
the
number
of 0
the
number
of 1
1 143674 118470 130931 131213
2 143698 118446 131218 130926
3 141719 120425 131069 131075
4 142757 119387 131665 130479
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation
978-1-4799-3434-8/14 $31.00 © 2014 IEEE
DOI 10.1109/ICMTMA.2014.80
316
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation
978-1-4799-3434-8/14 $31.00 © 2014 IEEE
DOI 10.1109/ICMTMA.2014.80
323
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation
978-1-4799-3434-8/14 $31.00 © 2014 IEEE
DOI 10.1109/ICMTMA.2014.80
323
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation
978-1-4799-3434-8/14 $31.00 © 2014 IEEE
DOI 10.1109/ICMTMA.2014.80
323
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation
978-1-4799-3435-5/14 $31.00 © 2014 IEEE
DOI 10.1109/ICMTMA.2014.80
323
Figure 1.Frequency of sequences of 0 and 1 in the tour
B. LSB Steganography Combined with
Digital Image
The LSB (Least Significant Bit) which hides the
secret information to the least significant bit of carrier
information, is the most classic and simplest
steganography algorithm, which also features of a large
capacity and concealment. It is still widely considered
most practical and applied up to today.
The LSB steganography uses the secret information
instead of the last bit of the image pixels value, which is
equivalent to superimposing a weak signal upon the
original carrier signal, and therefore it’s difficult to
realize visually. But during the embedding process, if the
lowest bit of secret information is different from that of
pixel value, we need to change the lowest bit of pixel
value, namely change the pixel value 2i to 2i+1 or 2i+1
to 2i. The parity value transform in the LSB
steganography produces parity asymmetry. Fridirich et al.
proposed the method of using this asymmetrical parity
value transform of LSB to go on RS attack[7]
, and
Westfield et al. proposed Chi-square test[8]
to attack LSB
steganography algorithm. If steganographic method can
minimize the distortion of the histogram, it can
fundamentally resist the attack of analysis methods
aforementioned. So in this paper, we propose the
steganography combined with encryption, encrypting the
information intended to hide before the steganalysis with
encryption pre-processing, and the imperceptibility of the
steganography algorithm can be improved by reducing
the distortion of the histogram.
C. Image Steganography Combined with
Encryption
In order to improve the imperceptibility of
steganography algorithm, this paper studied the
steganography combined with encryption algorithm,
which reach the goal by changing the matching
relationship between carrier image and secret
information. At the transmitting terminal, we firstly
choose the appropriate image as the carrier, and then
encrypt text information or documents designed to hide
by DES encryption followed by using the LSB
steganography algorithm to hide the encrypted
information in the image; at the receiving terminal,
firstly extract the encrypted information from the carrier
image by the algorithm which is contrary to
steganography algorithm, and then recover the hidden
information by DES decryption algorithm.
the secret
information
carrier
image
secret key secret image
the secret
information
DES
Encryption
decryption
algorithm
LSB
imbedding
Extraction
algorithm
Figure 2.the flow chart of Image Steganography Combined with Encryption
D. The Evaluation Method of
Steganography Algorithm
1) Histogram Difference and the Sum of Histogram
absolute Difference
We denote )(nh as the image gray histogram’s
function. For the gray level image of 8 bits,
]255,0[n . And )(nh is a sequence which
represents the number of each pixel values in the image,
namely
¦¦
1
0
1
0
)),(,()(
W
i
H
j
jipnnh G (1)
Where
vu
vu
if
if
vu
z¯
®
­
,
0
,1
),(G
And )( jip indicates the image’s pixel value
at ),( ji , W is the image’s width, H is the image’s
height.
317324324324324
We denote )(nh as the histogram of the original
image and )('
nh as the encryption image, ]255,0[n .
Then, ][nhm denote Histogram difference, namely
][][][ nhnhnHm c (2)
¦
255
0
|)(')(|
i
ihihHae (3)
The absolute difference of histogram expresses how the
image changes before and after the steganography. The
smaller Hae is, the better imperceptibility of the
steganography is.
2) Relative Entropy of the Image before and after
Steganography (K–L divergence)
Relative entropy of the image before and after
steganography or the K–L divergence is used to measure
the security of the steganographic system put forward by
Cachin[6]
.The decrease of the K–L divergence shows the
improvement of the steganographic system’s safety
performance. If the K_L divergence is zero, the
steganographic system is absolutely safe, namely
0,)||( d HHPsPcD is absolutely safe
¦
2 5 5
0 ][
][
lo g][)||(
n s
c
c
np
np
npPsPcD (4)
Where
][npc is gray level’s probability distribution of
carrier image, ][nps is that of steganasis image.
III. EXPERIMENTAL RESULTS AND ANALYSIS
Simulation experiments embed information that
needs to hide and the information after DES encryption
respectively to 512 x 512 pixel image 1-3 by LSB
steganography algorithm. It is showed in Figure 3.
Figure3. the experimental picture
From the experimental results in Figure 3, we can see
the figure on the left, if the information is unencrypted
before the LSB algorithm , the difference between carrier
image and the steganasis image is large, if not, we can
see it from the figure on the right, the difference is small.
The smaller the histogram difference is, the better the
performance of steganographic system is.
From table 1 and its experimental results, we can also
see that after the encryption, the histogram modification
and K–L divergence decrease, suggesting that after the
encryption, the anti-interference performance of the
steganography gets better. Thus, steganography system
combined with encryption is superior to direct
steganalysis.
Figure 4. the histogram difference before and after steganography in two
ways
Table 2. steganasis image effects without encryption
Table 3. steganasis image effects with encryption
IV. CONCLUSIONS
This paper mainly probes the steganography carried by
image, which combines DES encryption with LSB
algorithm, and implements dual protect of hidden
information, making the hidden information
318325325325325
incomprehensible and invisible. Besides, the DES
encryption algorithm changes the statistical
characteristics of the secret information, and improves
the lowest matching degree of its bitstream and carrier
image, leading to a better imperceptibility of
steganographic algorithm.
REFERENCES
[1] Roszizti Ibrahim Teoh Suk Kuan.Steganography Aglorithm
toHide Secret Message inside an Image[J]. Technology and
Application of Compute:English,2011,2(2),102-108
[2] Der-Chyuna Lou, Chen-Hao Hu,LSB steganogrpahic method
based on reversible histogram transformation function for resisting
statistical steganalysis[J], Information Sciences,2012, 188:346-358.
[3] Yifeng Sun,Fenlin Liu, Selecting cover for image steganography by
correlation coefficient [C] ,2010 Second International Workshop on
Educaton Technology and Computer Science, 159-162.
[4]Marwaha, P.,Visual cryptographic steganogrpahy in
images[C], Computer Communication and Networking
Technologies(ICCCNT),2010 International Conference 2010:1-6.
[5] Huanguo Zhang Xiutao Feng Zhongpin Tan Yuzhen Liu
Evolutionary cryptosystems and
evolutionary design for DES [J], JOURNAL OF CHINA
INSTITUTE OF COMMUNICATIONS 2002 23(5) 57-64.
[6] C.Cachin, “an information-theoretic model steganography,” in
IH98, LNCS 1525, Heidelberg: Springer- Verlag, 1998 306-318.
[7] Fridrich J, Goljan M, Du R, Detecting lsb steganography in color
and gray-images[C],IEEE Multimedia Special Issue on Security,
2001:22-23.
[8] A.Westfeld, A, Pfitzmann, Attacks on steganographyic system,
Proceedings of the 3rd
International Workshop on Information
Hiding, Dresden, Germany, 1999:61-76
319326326326326

More Related Content

What's hot

Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
 

What's hot (17)

Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
G0210032039
G0210032039G0210032039
G0210032039
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
D0341829
D0341829D0341829
D0341829
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 

Viewers also liked

Star venus & indus symbols & facts about star venus .
Star venus & indus symbols & facts about star venus .Star venus & indus symbols & facts about star venus .
Star venus & indus symbols & facts about star venus .Deepak-Atim Somaji-Sawant
 
Dias creaboost kmo connected 20151117
Dias creaboost kmo connected 20151117Dias creaboost kmo connected 20151117
Dias creaboost kmo connected 20151117Dirk De Boe
 
Theirs emerging star nakshatra @ star sun segment & apollo sign segment.
Theirs emerging star nakshatra @ star sun  segment & apollo sign segment.Theirs emerging star nakshatra @ star sun  segment & apollo sign segment.
Theirs emerging star nakshatra @ star sun segment & apollo sign segment.Deepak-Atim Somaji-Sawant
 
Портфоліо Кір'якової Т.П.
Портфоліо  Кір'якової Т.П.Портфоліо  Кір'якової Т.П.
Портфоліо Кір'якової Т.П.Ugledar_UVK
 
Slideshare Edushock leerfestival 20160117
Slideshare Edushock leerfestival 20160117Slideshare Edushock leerfestival 20160117
Slideshare Edushock leerfestival 20160117Dirk De Boe
 
Intercultural communication & conflixt management
Intercultural communication & conflixt managementIntercultural communication & conflixt management
Intercultural communication & conflixt managementKévin CÉCILE
 
6 one third probability embedding a new
6 one third probability embedding a new6 one third probability embedding a new
6 one third probability embedding a newAlok Padole
 
ejercicios todas la estructuras
ejercicios todas la estructurasejercicios todas la estructuras
ejercicios todas la estructurasjeison lopez
 
FIRST QUESTIONNAIRE
FIRST QUESTIONNAIREFIRST QUESTIONNAIRE
FIRST QUESTIONNAIREMar Jurado
 
Teachers' Evaluation - Evaluation
Teachers' Evaluation - EvaluationTeachers' Evaluation - Evaluation
Teachers' Evaluation - EvaluationMonika MMBIEN
 
Position paper - Myanmar Investment Environment (0115)
Position paper -  Myanmar Investment Environment (0115)Position paper -  Myanmar Investment Environment (0115)
Position paper - Myanmar Investment Environment (0115)Dr. Oliver Massmann
 

Viewers also liked (15)

Star venus & indus symbols & facts about star venus .
Star venus & indus symbols & facts about star venus .Star venus & indus symbols & facts about star venus .
Star venus & indus symbols & facts about star venus .
 
Dias creaboost kmo connected 20151117
Dias creaboost kmo connected 20151117Dias creaboost kmo connected 20151117
Dias creaboost kmo connected 20151117
 
Theirs emerging star nakshatra @ star sun segment & apollo sign segment.
Theirs emerging star nakshatra @ star sun  segment & apollo sign segment.Theirs emerging star nakshatra @ star sun  segment & apollo sign segment.
Theirs emerging star nakshatra @ star sun segment & apollo sign segment.
 
Портфоліо Кір'якової Т.П.
Портфоліо  Кір'якової Т.П.Портфоліо  Кір'якової Т.П.
Портфоліо Кір'якової Т.П.
 
chris harper CV
chris harper CVchris harper CV
chris harper CV
 
Slideshare Edushock leerfestival 20160117
Slideshare Edushock leerfestival 20160117Slideshare Edushock leerfestival 20160117
Slideshare Edushock leerfestival 20160117
 
No-Bullsh*t Personas
No-Bullsh*t PersonasNo-Bullsh*t Personas
No-Bullsh*t Personas
 
Intercultural communication & conflixt management
Intercultural communication & conflixt managementIntercultural communication & conflixt management
Intercultural communication & conflixt management
 
Mención Honorífica Titulación UASLP
Mención Honorífica Titulación UASLPMención Honorífica Titulación UASLP
Mención Honorífica Titulación UASLP
 
6 one third probability embedding a new
6 one third probability embedding a new6 one third probability embedding a new
6 one third probability embedding a new
 
ejercicios todas la estructuras
ejercicios todas la estructurasejercicios todas la estructuras
ejercicios todas la estructuras
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
FIRST QUESTIONNAIRE
FIRST QUESTIONNAIREFIRST QUESTIONNAIRE
FIRST QUESTIONNAIRE
 
Teachers' Evaluation - Evaluation
Teachers' Evaluation - EvaluationTeachers' Evaluation - Evaluation
Teachers' Evaluation - Evaluation
 
Position paper - Myanmar Investment Environment (0115)
Position paper -  Myanmar Investment Environment (0115)Position paper -  Myanmar Investment Environment (0115)
Position paper - Myanmar Investment Environment (0115)
 

Similar to 4 image steganography combined with des encryption pre processing

A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...AIRCC Publishing Corporation
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAnkita Dubey
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
 

Similar to 4 image steganography combined with des encryption pre processing (20)

A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Ijmet 10 01_002
Ijmet 10 01_002Ijmet 10 01_002
Ijmet 10 01_002
 
K0815660
K0815660K0815660
K0815660
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
D010312230
D010312230D010312230
D010312230
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

4 image steganography combined with des encryption pre processing

  • 1. Image Steganography Combined with DES Encryption Pre-processing Yang Ren-er, Zheng Zhiwei, Tao Shun, Ding Shilei College of Information Science and Engineering Ningbo University, Ningbo 315211, China Abstract—In order to improve the security of steganography, this paper studied image steganography combined with pre-processing of DES encryption. When transmitting the secret information, firstly, encrypt the information intended to hide by DES encryption is encrypted, and then is written in the image through the LSB steganography. Encryption algorithm improves the lowest matching performance between the image and the secret information by changing the statistical characteristics of the secret information to enhance the anti-detection of the image steganography. The experimental results showed that the anti-detection robustness of image steganography combined with pre-processing of DES encryption is found much better than the way using LSB steganography algorithms directly. Keywords-Information hiding; Steganography; DES encryption; High security I. INTRODUCTION Steganography is an information hiding technique developed in recent years. It is a procedure that makes use of human perceptive sense of visual or aural redundancy to digital multimedia, and that embeds the secret information in the public media to transfer digital media carrying confidential information to achieve covert communications[1] . Imperceptibility is an important feature of steganography, also called transparency or anti-detection performance which includes visual imperceptibility and statistical imperceptibility. The imperceptibility of steganography is enhanced by improving the method of steganography[2] , or selecting an appropriate steganographic carrier[3] , or improving the matching relationship between carrier image and secret information. Steganography is different from traditional encryption, which is theoretically based on cryptography to hide communication contents by encrypting plaintext, but it is difficult to mask the fact that communication occurred, and ciphertext transmission will easily arouse the attacker’s suspicions, and then it could be intercepted, attacked or cracked. Steganography complements the deficiency of concealment of the encryption. Through transmitting communication contents hidden secretly in public media, it covers up the facts of real communication purpose and that communication occurred. It is not a competitive relation between steganography and encryption, but they can reinforce each other, to further ensure the safety of covert communication[4] . This paper studied image steganography based on encryption, which combines the traditional encryption and information steganography. It not only makes the secret information transmission "incomprehensible" and "invisible", but makes the steganographic system have a higher anti-detection performance. II. IMAGE STEGANOGRAPHY COMBINED WITH ENCRYPTION A. DES Encryption DES uses a 56-bit key and an additional 8-bit parity bit, resulting in the largest 64-bit packet size. This is an iterative block cipher, using the technology known as the Feistel, which will encrypt the text block half. The use of sub-key pair, half of which application circulatory function, and then the output with the other half to " exclusive or" operator followed by the exchange of the two and a half, this process will continue, but in the end a cycle of non-exchange. DES uses 16 cycles, using xor, replacement, substitution, four basic arithmetic shift operations[5] . After the hidden information is encrypted, not only the invisibility of information is increased, but also the statistical characteristics of the information and the correlation between information are changed in the same time, which makes the information become 0-1 bitstream, which is in the probability distribution. In order to verify the characteristics of encryption algorithm, download three English document of 32768 characters from the Internet, and inspect the 0 -1 distribution in the document before and after encryption. From table 1, before the encryption, the number of 0 and 1 is not balanced because of correlation between characters in the natural document, but after the encryption, binary stream of 0 s and 1 s close to equal probability distribution in the document. Table 1 the 0 -1 Distribution in the Document before and after Encryption doc ume nt before the encryption after the encryption the number of 0 the number of 1 the number of 0 the number of 1 1 143674 118470 130931 131213 2 143698 118446 131218 130926 3 141719 120425 131069 131075 4 142757 119387 131665 130479 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation 978-1-4799-3434-8/14 $31.00 © 2014 IEEE DOI 10.1109/ICMTMA.2014.80 316 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation 978-1-4799-3434-8/14 $31.00 © 2014 IEEE DOI 10.1109/ICMTMA.2014.80 323 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation 978-1-4799-3434-8/14 $31.00 © 2014 IEEE DOI 10.1109/ICMTMA.2014.80 323 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation 978-1-4799-3434-8/14 $31.00 © 2014 IEEE DOI 10.1109/ICMTMA.2014.80 323 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation 978-1-4799-3435-5/14 $31.00 © 2014 IEEE DOI 10.1109/ICMTMA.2014.80 323
  • 2. Figure 1.Frequency of sequences of 0 and 1 in the tour B. LSB Steganography Combined with Digital Image The LSB (Least Significant Bit) which hides the secret information to the least significant bit of carrier information, is the most classic and simplest steganography algorithm, which also features of a large capacity and concealment. It is still widely considered most practical and applied up to today. The LSB steganography uses the secret information instead of the last bit of the image pixels value, which is equivalent to superimposing a weak signal upon the original carrier signal, and therefore it’s difficult to realize visually. But during the embedding process, if the lowest bit of secret information is different from that of pixel value, we need to change the lowest bit of pixel value, namely change the pixel value 2i to 2i+1 or 2i+1 to 2i. The parity value transform in the LSB steganography produces parity asymmetry. Fridirich et al. proposed the method of using this asymmetrical parity value transform of LSB to go on RS attack[7] , and Westfield et al. proposed Chi-square test[8] to attack LSB steganography algorithm. If steganographic method can minimize the distortion of the histogram, it can fundamentally resist the attack of analysis methods aforementioned. So in this paper, we propose the steganography combined with encryption, encrypting the information intended to hide before the steganalysis with encryption pre-processing, and the imperceptibility of the steganography algorithm can be improved by reducing the distortion of the histogram. C. Image Steganography Combined with Encryption In order to improve the imperceptibility of steganography algorithm, this paper studied the steganography combined with encryption algorithm, which reach the goal by changing the matching relationship between carrier image and secret information. At the transmitting terminal, we firstly choose the appropriate image as the carrier, and then encrypt text information or documents designed to hide by DES encryption followed by using the LSB steganography algorithm to hide the encrypted information in the image; at the receiving terminal, firstly extract the encrypted information from the carrier image by the algorithm which is contrary to steganography algorithm, and then recover the hidden information by DES decryption algorithm. the secret information carrier image secret key secret image the secret information DES Encryption decryption algorithm LSB imbedding Extraction algorithm Figure 2.the flow chart of Image Steganography Combined with Encryption D. The Evaluation Method of Steganography Algorithm 1) Histogram Difference and the Sum of Histogram absolute Difference We denote )(nh as the image gray histogram’s function. For the gray level image of 8 bits, ]255,0[n . And )(nh is a sequence which represents the number of each pixel values in the image, namely ¦¦ 1 0 1 0 )),(,()( W i H j jipnnh G (1) Where vu vu if if vu z¯ ® ­ , 0 ,1 ),(G And )( jip indicates the image’s pixel value at ),( ji , W is the image’s width, H is the image’s height. 317324324324324
  • 3. We denote )(nh as the histogram of the original image and )(' nh as the encryption image, ]255,0[n . Then, ][nhm denote Histogram difference, namely ][][][ nhnhnHm c (2) ¦ 255 0 |)(')(| i ihihHae (3) The absolute difference of histogram expresses how the image changes before and after the steganography. The smaller Hae is, the better imperceptibility of the steganography is. 2) Relative Entropy of the Image before and after Steganography (K–L divergence) Relative entropy of the image before and after steganography or the K–L divergence is used to measure the security of the steganographic system put forward by Cachin[6] .The decrease of the K–L divergence shows the improvement of the steganographic system’s safety performance. If the K_L divergence is zero, the steganographic system is absolutely safe, namely 0,)||( d HHPsPcD is absolutely safe ¦ 2 5 5 0 ][ ][ lo g][)||( n s c c np np npPsPcD (4) Where ][npc is gray level’s probability distribution of carrier image, ][nps is that of steganasis image. III. EXPERIMENTAL RESULTS AND ANALYSIS Simulation experiments embed information that needs to hide and the information after DES encryption respectively to 512 x 512 pixel image 1-3 by LSB steganography algorithm. It is showed in Figure 3. Figure3. the experimental picture From the experimental results in Figure 3, we can see the figure on the left, if the information is unencrypted before the LSB algorithm , the difference between carrier image and the steganasis image is large, if not, we can see it from the figure on the right, the difference is small. The smaller the histogram difference is, the better the performance of steganographic system is. From table 1 and its experimental results, we can also see that after the encryption, the histogram modification and K–L divergence decrease, suggesting that after the encryption, the anti-interference performance of the steganography gets better. Thus, steganography system combined with encryption is superior to direct steganalysis. Figure 4. the histogram difference before and after steganography in two ways Table 2. steganasis image effects without encryption Table 3. steganasis image effects with encryption IV. CONCLUSIONS This paper mainly probes the steganography carried by image, which combines DES encryption with LSB algorithm, and implements dual protect of hidden information, making the hidden information 318325325325325
  • 4. incomprehensible and invisible. Besides, the DES encryption algorithm changes the statistical characteristics of the secret information, and improves the lowest matching degree of its bitstream and carrier image, leading to a better imperceptibility of steganographic algorithm. REFERENCES [1] Roszizti Ibrahim Teoh Suk Kuan.Steganography Aglorithm toHide Secret Message inside an Image[J]. Technology and Application of Compute:English,2011,2(2),102-108 [2] Der-Chyuna Lou, Chen-Hao Hu,LSB steganogrpahic method based on reversible histogram transformation function for resisting statistical steganalysis[J], Information Sciences,2012, 188:346-358. [3] Yifeng Sun,Fenlin Liu, Selecting cover for image steganography by correlation coefficient [C] ,2010 Second International Workshop on Educaton Technology and Computer Science, 159-162. [4]Marwaha, P.,Visual cryptographic steganogrpahy in images[C], Computer Communication and Networking Technologies(ICCCNT),2010 International Conference 2010:1-6. [5] Huanguo Zhang Xiutao Feng Zhongpin Tan Yuzhen Liu Evolutionary cryptosystems and evolutionary design for DES [J], JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS 2002 23(5) 57-64. [6] C.Cachin, “an information-theoretic model steganography,” in IH98, LNCS 1525, Heidelberg: Springer- Verlag, 1998 306-318. [7] Fridrich J, Goljan M, Du R, Detecting lsb steganography in color and gray-images[C],IEEE Multimedia Special Issue on Security, 2001:22-23. [8] A.Westfeld, A, Pfitzmann, Attacks on steganographyic system, Proceedings of the 3rd International Workshop on Information Hiding, Dresden, Germany, 1999:61-76 319326326326326