2. Figure 1.Frequency of sequences of 0 and 1 in the tour
B. LSB Steganography Combined with
Digital Image
The LSB (Least Significant Bit) which hides the
secret information to the least significant bit of carrier
information, is the most classic and simplest
steganography algorithm, which also features of a large
capacity and concealment. It is still widely considered
most practical and applied up to today.
The LSB steganography uses the secret information
instead of the last bit of the image pixels value, which is
equivalent to superimposing a weak signal upon the
original carrier signal, and therefore it’s difficult to
realize visually. But during the embedding process, if the
lowest bit of secret information is different from that of
pixel value, we need to change the lowest bit of pixel
value, namely change the pixel value 2i to 2i+1 or 2i+1
to 2i. The parity value transform in the LSB
steganography produces parity asymmetry. Fridirich et al.
proposed the method of using this asymmetrical parity
value transform of LSB to go on RS attack[7]
, and
Westfield et al. proposed Chi-square test[8]
to attack LSB
steganography algorithm. If steganographic method can
minimize the distortion of the histogram, it can
fundamentally resist the attack of analysis methods
aforementioned. So in this paper, we propose the
steganography combined with encryption, encrypting the
information intended to hide before the steganalysis with
encryption pre-processing, and the imperceptibility of the
steganography algorithm can be improved by reducing
the distortion of the histogram.
C. Image Steganography Combined with
Encryption
In order to improve the imperceptibility of
steganography algorithm, this paper studied the
steganography combined with encryption algorithm,
which reach the goal by changing the matching
relationship between carrier image and secret
information. At the transmitting terminal, we firstly
choose the appropriate image as the carrier, and then
encrypt text information or documents designed to hide
by DES encryption followed by using the LSB
steganography algorithm to hide the encrypted
information in the image; at the receiving terminal,
firstly extract the encrypted information from the carrier
image by the algorithm which is contrary to
steganography algorithm, and then recover the hidden
information by DES decryption algorithm.
the secret
information
carrier
image
secret key secret image
the secret
information
DES
Encryption
decryption
algorithm
LSB
imbedding
Extraction
algorithm
Figure 2.the flow chart of Image Steganography Combined with Encryption
D. The Evaluation Method of
Steganography Algorithm
1) Histogram Difference and the Sum of Histogram
absolute Difference
We denote )(nh as the image gray histogram’s
function. For the gray level image of 8 bits,
]255,0[n . And )(nh is a sequence which
represents the number of each pixel values in the image,
namely
¦¦
1
0
1
0
)),(,()(
W
i
H
j
jipnnh G (1)
Where
vu
vu
if
if
vu
z¯
®
,
0
,1
),(G
And )( jip indicates the image’s pixel value
at ),( ji , W is the image’s width, H is the image’s
height.
317324324324324
3. We denote )(nh as the histogram of the original
image and )('
nh as the encryption image, ]255,0[n .
Then, ][nhm denote Histogram difference, namely
][][][ nhnhnHm c (2)
¦
255
0
|)(')(|
i
ihihHae (3)
The absolute difference of histogram expresses how the
image changes before and after the steganography. The
smaller Hae is, the better imperceptibility of the
steganography is.
2) Relative Entropy of the Image before and after
Steganography (K–L divergence)
Relative entropy of the image before and after
steganography or the K–L divergence is used to measure
the security of the steganographic system put forward by
Cachin[6]
.The decrease of the K–L divergence shows the
improvement of the steganographic system’s safety
performance. If the K_L divergence is zero, the
steganographic system is absolutely safe, namely
0,)||( d HHPsPcD is absolutely safe
¦
2 5 5
0 ][
][
lo g][)||(
n s
c
c
np
np
npPsPcD (4)
Where
][npc is gray level’s probability distribution of
carrier image, ][nps is that of steganasis image.
III. EXPERIMENTAL RESULTS AND ANALYSIS
Simulation experiments embed information that
needs to hide and the information after DES encryption
respectively to 512 x 512 pixel image 1-3 by LSB
steganography algorithm. It is showed in Figure 3.
Figure3. the experimental picture
From the experimental results in Figure 3, we can see
the figure on the left, if the information is unencrypted
before the LSB algorithm , the difference between carrier
image and the steganasis image is large, if not, we can
see it from the figure on the right, the difference is small.
The smaller the histogram difference is, the better the
performance of steganographic system is.
From table 1 and its experimental results, we can also
see that after the encryption, the histogram modification
and K–L divergence decrease, suggesting that after the
encryption, the anti-interference performance of the
steganography gets better. Thus, steganography system
combined with encryption is superior to direct
steganalysis.
Figure 4. the histogram difference before and after steganography in two
ways
Table 2. steganasis image effects without encryption
Table 3. steganasis image effects with encryption
IV. CONCLUSIONS
This paper mainly probes the steganography carried by
image, which combines DES encryption with LSB
algorithm, and implements dual protect of hidden
information, making the hidden information
318325325325325
4. incomprehensible and invisible. Besides, the DES
encryption algorithm changes the statistical
characteristics of the secret information, and improves
the lowest matching degree of its bitstream and carrier
image, leading to a better imperceptibility of
steganographic algorithm.
REFERENCES
[1] Roszizti Ibrahim Teoh Suk Kuan.Steganography Aglorithm
toHide Secret Message inside an Image[J]. Technology and
Application of Compute:English,2011,2(2),102-108
[2] Der-Chyuna Lou, Chen-Hao Hu,LSB steganogrpahic method
based on reversible histogram transformation function for resisting
statistical steganalysis[J], Information Sciences,2012, 188:346-358.
[3] Yifeng Sun,Fenlin Liu, Selecting cover for image steganography by
correlation coefficient [C] ,2010 Second International Workshop on
Educaton Technology and Computer Science, 159-162.
[4]Marwaha, P.,Visual cryptographic steganogrpahy in
images[C], Computer Communication and Networking
Technologies(ICCCNT),2010 International Conference 2010:1-6.
[5] Huanguo Zhang Xiutao Feng Zhongpin Tan Yuzhen Liu
Evolutionary cryptosystems and
evolutionary design for DES [J], JOURNAL OF CHINA
INSTITUTE OF COMMUNICATIONS 2002 23(5) 57-64.
[6] C.Cachin, “an information-theoretic model steganography,” in
IH98, LNCS 1525, Heidelberg: Springer- Verlag, 1998 306-318.
[7] Fridrich J, Goljan M, Du R, Detecting lsb steganography in color
and gray-images[C],IEEE Multimedia Special Issue on Security,
2001:22-23.
[8] A.Westfeld, A, Pfitzmann, Attacks on steganographyic system,
Proceedings of the 3rd
International Workshop on Information
Hiding, Dresden, Germany, 1999:61-76
319326326326326