This document analyzes and compares different steganography algorithms and their security issues. It discusses steganography techniques such as LSB (least significant bit) and DWT (discrete wavelet transform). LSB replaces least significant bits of cover media (such as images) with hidden data bits. DWT decomposes signals into different frequency bands with different resolutions. The document also addresses steganalysis, the process of detecting hidden messages within carrier files. It evaluates the capacity, detectability, and robustness of different steganography algorithms, noting strengths and limitations.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
A Review on Stegnography Data Hiding using Color Imagesijtsrd
Nowadays, network has necessary roles for transferring knowledge accurately and quick from supply to a destination. The info isnt secure enough to transfer extremely confidential. The protection of data has become one in every of the principle challenges of resource sharing with electronic communication over network. Cryptography and Steganography square measure to strategies for shielding knowledge from intruders whereas transferring over an open channel network. Cryptography could be a technique to cipher knowledge and steganography is that the art and science of concealing secret message in an exceedingly cowl image. The digitally shared knowledge between the users ought to be born again to some unclear format which cannot be tampered by the intruders. To fulfill these necessities the technique Steganography will be used. During this technique we tend to use completely different mediums to cover the info that square measure text, images, audio, video etc. this paper is that specialize in encrypting of knowledge by exploitation image steganography. Gagandeep Singla | Chamkour Singh ""A Review on Stegnography Data Hiding using Color Images"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23556.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23556/a-review-on-stegnography-data-hiding-using-color-images/gagandeep-singla
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
A Review on Stegnography Data Hiding using Color Imagesijtsrd
Nowadays, network has necessary roles for transferring knowledge accurately and quick from supply to a destination. The info isnt secure enough to transfer extremely confidential. The protection of data has become one in every of the principle challenges of resource sharing with electronic communication over network. Cryptography and Steganography square measure to strategies for shielding knowledge from intruders whereas transferring over an open channel network. Cryptography could be a technique to cipher knowledge and steganography is that the art and science of concealing secret message in an exceedingly cowl image. The digitally shared knowledge between the users ought to be born again to some unclear format which cannot be tampered by the intruders. To fulfill these necessities the technique Steganography will be used. During this technique we tend to use completely different mediums to cover the info that square measure text, images, audio, video etc. this paper is that specialize in encrypting of knowledge by exploitation image steganography. Gagandeep Singla | Chamkour Singh ""A Review on Stegnography Data Hiding using Color Images"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23556.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23556/a-review-on-stegnography-data-hiding-using-color-images/gagandeep-singla
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
Data Security Through Crypto-Stegano Systemsrinzindorjej
Unauthorized access and hacking are major issues for internet users, and numerous articles have been published on various approaches to solving this issue. This study proposes a novel method for encoding a hidden message within the text by combining text steganography and substitution cryptography. While steganography and cryptography can be used to protect data, neither is sufficient to provide better security as they can be broken by steganalysis and cryptoanalysis. Therefore, the terms "cryptography-stegano" should be combined for improved security. In this method, data is first encrypted using a substitution cryptography technique to produce the cypher text, which is then encrypted using text steganography to produce a more secure cypher text sent to the recipient. Contrary to popular belief, using image steganography and cryptographic methods is unnecessary for effective data encryption. The study shows that combining text steganography with cryptographic techniques is an excellent data security method. Additionally, other combinations, such as audio and video steganography, should also be considered for better security
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Review paper on Steganography TechniquesEditor IJMTER
In today’s world the art of sending & displaying the hidden information especially in
public places, has received more attention. And so it has to face many challenges. Therefore,
different methods have been developed so far for hiding information in different cover media.
Steganography is the art and science of invisible communication which takes place between two
different entities. This is done by hiding the information in other information. It is the way of hiding
the existence of the communicated information. Steganography is often confused with cryptography
because the two are similar in the way that they both are used to protect confidential information.
Steganography is different from cryptography. Cryptography focuses on keeping the contents of a
message secret, while steganography focuses on keeping the existence of a message secret [4]. This
paper intends to give an overview of security systems with a main concentration on steganography,
its uses and techniques.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Analysis of Different Steganography Algorithms and Security Issues
1. International Research Journal of Advanced Engineering and Science
ISSN: 2455-9024
11
Harneet Kour khajuria, Loveneesh Talwar, and Akhil Vaid, “Analysis of different steganography algorithms and security issues,”
International Research Journal of Advanced Engineering and Science, Volume 1, Issue 1, pp. 11-16, 2016.
Analysis of Different Steganography Algorithms and
Security Issues
Harneet Kour khajuria1
, Loveneesh Talwar2
, Akhil Vaid3
1, 2
Department of Electrical Engineering, YCET, Jammu, J&K, India-180004
3
Department of Electronics Engineering, SSCET, Pathankot, Punjab, India-145001
Email address: 1
harneet.destiny@gmail.com, 2
loveneeshtalwar@gmail.com, 3
akhilvaid20@gmail.com
Abstract— The data transfer through internet aims to provide faster
data transfer rate and accuracy of data being transferred. In addition
to it when security of the data is prime concern while communicating
without any alterations, the data transfer technique aims to provide
sufficient security while transferring data which is achieved by
employing certain approaches and one such approach is
steganography which is discussed in this paper. Steganography is an
encryption technique used to hide only the messages (that requires to
be kept secretive) in innocent looking public communication such as
in image so that their presence remain undetected and protect them
from prevailing security attacks. In this paper we tend to present the
comparative analysis of different steganography algorithms such as
DCT transform, Wavelet transform etc. and also discuss various
security issues involved and hence evaluate the existing techniques
limelight and drawbacks.
Keywords— DCT Transform Image, Cryptography Steganography,
and Security attacks.
I. INTRODUCTION
In present scenario, internet is integral part of each and
everyone‟s life irrespective of their profession or in person
even to store their works or personal information for
references in the internet database which further requires to be
protected owing to the need of maintaining the confidentiality
and integrity of an individual‟s work or information to avoid
copyright violation. Integrity and confidentiality of data is
prime concern to avoid above copy right violations and others
accreditations. This is achieved by Digital steganography
technique that tend to provide the protection of the digital
information uploaded on the internet by the user and is defined
as an art of hiding desired data into another data by embedding
into each other [1]. Digital steganography is used mainly by
the corporations to protect their copyright further avoiding any
illegal use of them by others thereby making a good reputation
as well [1], [2]. In this paper a comparative analysis of various
steganography algorithms are discussed. In addition to it, in
this paper a brief discussion about various security issues or
challenges to be considered with emerging trend of
steganography techniques is also included. The steganography
technique is applicable worldwide in almost every field both
in corporate world as well as in the internet world for personal
applications such as social networking sites as facebook etc. It
has global application in Govt. data base such as in Scientific
Research or Defense field etc. where integrity of data is must
and requires to be confidential as well as secretive [1-3].
A. Cryptography versus Steganography
Both Cryptography and Steganography are data encryption
techniques that tends to provide protection and enhance the
security of data to maintain its integrity and confidentiality but
differ in their applications since cryptography encodes the data
or information in a way that no one else than the authorized
person with authentic key can read the contents and ensures
that the information transmitted is not modified while its
transit. Another main difference between two is that in
cryptography the hidden message is visible as information
being encoded is in plain text unlike steganography [2], [4]
where the hidden message does not appear visible as clear
from given table I.
TABLE I. Steganography versus cryptography.
S.No Context Steganography Cryptography
1 Host files Images, Audio, Text etc. Mostly text files
2 Hidden files Images, Audio, Text etc. Mostly text files
3 Result Stego files Cipher text
4 Types of attack Steganalysis Cryptanalysis
II. BACKGROUND
Steganography has been used widely even in the past for
communicating secret messages. It includes examples like
writing with invisible ink which appears blank to the average
person and when heated contents become visible and peel wax
off tablet to view the secretive content. With more
advancements and growth of digital revolution such as DSP
techniques etc, the steganographic techniques applied also
become digital and is called digital steganography more
precisely [1], [2]. This digital steganography technique aid in
creating an environment of corporate vigilance and spawning
interesting applications for further evolution and also
benefitting the cyber criminals indirectly. Getting rid of
emerging cybercrimes has essentially become the need of the
hour. So in order to strengthen the existing steganography
techniques, frequent attacks are carried out and it is called as
stegnalysis. Steganalysis is done to ensure optimal results for
steganography technique applied [3], [4]. This paper gives an
account of different steganography algorithms and stegnalysis
as well.
III. STEGNALYSIS AND STEGANOGRAPHY
Stegnalysis is the art to discover and render useless covert
messages that help to identify the hidden messages encoded in
2. International Research Journal of Advanced Engineering and Science
ISSN: 2455-9024
12
Harneet Kour khajuria, Loveneesh Talwar, and Akhil Vaid, “Analysis of different steganography algorithms and security issues,”
International Research Journal of Advanced Engineering and Science, Volume 1, Issue 1, pp. 11-16, 2016.
the suspected information stream and recover it as well. To be
more precise it is the process to detect the steganography by
looking at variances the bit patterns and files of unusually
large sizes [2], [3]. Stegnalysis combats the steganography in
many ways except for detection of messages but the problem
to uncover messages still needed to be resolved by stegnalysis.
Figure 1. shows stegnalysis and steganography relation.
Fig. 1. Stegnalysis and steganography.
Five classes of stegnalysis are summarized as in table
below assuming that attacker has the stego object in all classes
and stego object is only present in stego-only class where as in
known –cover and known-message class, in addition to stego
object there is also present an original cover either without the
hidden message or along with hidden message respectively.
Further in chosen stego and chosen message class, the human
or computer knows the algorithm used to hide the message
and tries to find them or uses some program to embed his own
message to discover similar stegno objects to find the presence
of a hidden message.
TABLE II. Classes of stegnalysis.
No extra
information
One extra piece of
information
Algorithm testing
methods
Stego-only Known-cover Chosen-Stego
Known-message Chosen-message
A. Limitations of Stegnalysis
In stegnalysis there exist no certainty that the suspected
information stream contain any hidden message or used to
transmit any secret message until it is recovered completely
and decrypted since the hidden data may not be embedded or
it may be noise or irrelevant data encoded into it which makes
stegnalysis often a tedious and time consuming analysis which
is the only drawback of stegnalysis [3], [4].
IV. STEGANOGRAPHY
Steganography is stronger than stegnalysis due to its
inherent properties. The steganography is an encryption
technique which tends to hide only the secretive messages that
are required to be kept secretive to protect them from
prevailing security attacks. It includes hiding information in
innocent looking public communication such as in image so
that their presence remains undetected and protected from any
security threat. The strength of steganography can be
determined by its capacity to hide the data, invisibility extent
that is human‟s inability to detect stegno object. Other
parameters that judge steganographic strength are
undetectability that is computers inability to differ between
cover object and the stegno object, robustness, tamper
resistance and signal to noise ratio as shown in figure 2. The
capacity undetectability and robustness are opposites since
increasing one leads to reduction of other and so no
steganographic technique can be completely robust or
undetectable as well as have maximum capacity thus
achieving one goal need a compromise of other two [1], [5],
[6]. In most of the applications capacity is less important and
robustness along with undetectability is considered as prime
goals and robustness achieved by watermarking is preffered.
Figure 3 depicts the properties of a good steganography
technique that are opposites still required for good
steganography.
Fig. 2. Key properties of good steganography technique.
Fig. 3. Opposed properties of good steganography.
A. Image Steganography
It is more secure steganographic technique that uses image
as the cover image object so that the embedded data leaves no
traces of steganography applied and size of the secret
message, its format and carrier image content affects directly
the visibility of cover image. Figure 4 shows image
steganography. The complexity in its detectibility determines
its (image steganography) success that ranges from high to
low level. And also its robustness that enables the embedded
data to preserve its fidelity by surviving when subjected to
reprocessing operations for the cover image. There is need to
obtain a tradeoff between the capacity and robustness feature
for efficient image steganography [5], [6].
B. Digital Steganography
Different algorithms are designed to meet with certain
requirements before exchanging any digital data over public
network securely to the intended recipient without any attack
incurred on it thereby fooling the attacker by embedding the
3. International Research Journal of Advanced Engineering and Science
ISSN: 2455-9024
13
Harneet Kour khajuria, Loveneesh Talwar, and Akhil Vaid, “Analysis of different steganography algorithms and security issues,”
International Research Journal of Advanced Engineering and Science, Volume 1, Issue 1, pp. 11-16, 2016.
secret information into the data in such a way that it remains
undetectable and difficult to recover so called in stego object.
Figure 5 shows digital steganography stego object is
embedded into image or audio file in such a way that the
secret message remains unchanged as well as invisible to
naked eyes in order to exchange information covertly without
being noticed by attackers thereby assuming him to be aware
of the hidden data present [1], [5-7]. Modifying the stego
object should not affect the watermark embedded by the user
on the document.
Fig. 4. Image steganography.
Fig. 5. Digital steganography.
V. DIFFERENT STEGANOGRAPHY ALGORITHIMS
A. LSB Steganography
In this algorithm, the message is concealed using the least
significant bits of the cover media‟s digital data. It includes
LSB replacement technique which simply flips the last bit in
each of the data values in order to interpret the hidden
message. For example: Let first eight pixels of the original 8-
bit grayscale image (bit map) has the gray scale values as
below:
11010010 01001010 10010111
10001100 00010101 01010111
00100110 01000011
Now let c be the letter needed to be hidden. Consider its
binary value as 10000011. To hide it the LSBs of each gray
scale value above is replaced with the binary bits of c to have
new grayscale values as:
11010011 01001010 10010110
10001100 00010100 01010110
00100111 01000011
It is also observed that only half the LSBs are needed to
change on an average here and hence there will be hardly
visible difference between the cover image and the stego
image [6-8] as shown in figure 6. LSB steganography also
includes LSB matching technique in which the LSB
replacement can alter equally the data value by a small amount
thereby ensuring to preserve the legal data values range and
the difference is that choice can be made at random whether to
add or subtract one from the cover image pixel which makes it
impercievable the existence of hidden message [7], [8].
Both LSB replacement and matching leaves the lowest
significant bit changed if the message bit matches with the
LSB but if it does not match LSB then LSB Replacement
replaces the LSB with the message bit whereas on the other
side LSB matching lead to increment or decrement the data
value by +1 or -1 respectively so called as +-1 embedding as
well. There are 256 different grayscale shades between black
and white. These shades are used for grayscale bit mapping
and since in LSB steganography the LSB of cover image is
needed to be substituted by message bit i.e. either 0 or 1, so
the 50 PERCENT pixel of LSBs can be changed without any
loss [3].
Fig. 6. LSB steganography.
Algorithm
1. Read the image to be embedded and also the image inside
which message is embedded i.e. cover image.
2. Set Num Significant Bits equation, n=1, 2
3. Let Size 1= secret message size and Size 2= cover image
size.
4. Set the „Num Significant Bits‟ equation significant bits of
each byte of cover image to zero by using bit by bit AND
operation on cover and size1 matrix.
5. Embed the „Num Significant Bits‟ most significant bits
(MSB) of secret message to create the stego image by
using stego equation (cover zero+ secret)/28-n.
6. Recover the embedded image by using bit by shift
operation.
7. Display figure of cover image, to be hidden image, stego
image and the recovered image.
8. End.
Figure 7 shows LSB steganography algorithm.This method
is applicable for both 24- bit color and 8- bit gray scale image
but here the quality of stego and recovered image will degrade
with increase in „n‟which is its limitation [7], [8].
4. International Research Journal of Advanced Engineering and Science
ISSN: 2455-9024
14
Harneet Kour khajuria, Loveneesh Talwar, and Akhil Vaid, “Analysis of different steganography algorithms and security issues,”
International Research Journal of Advanced Engineering and Science, Volume 1, Issue 1, pp. 11-16, 2016.
Fig. 7. LSB steganography algorithm.
B. Enhanced LSB Steganography Technique
It is more efficient and less prone as shown in figure 8.to
distortions compared to simple LSB steganography technique
since it is functioning in spatial domain and tends to hide the
message in only blue color of RGB carrier image unlike LSB
algo which hides the information in LSB of each color of RGB
carrier image that in turn causes major distortion due to
change in all three colors and hence to overcome this
distortion enhanced LSB came into existence [8], [9]. It
produces a great balance between the security and good
quality of an image improving the computational efficiency
and complexity of stego image by improved or modified LSB
replacement for data hiding [9].
Enhanced LSB algorithim
1. Select a cover image as an input.
2. The hidden message is embedded in Blue component only
of a cover image.
3. Pixel selection filter is used to obtain the best areas to
hide information in the cover image to obtain a better rate.
The filter is applied to Enhanced Least Significant Bit
(ELSB) of every pixel to hide information, leaving most
significant bits (MSB).
4. Use bit replacement method to hide the message [9].
Fig. 8. ELSB steganography algorithm.
C. DWT Discrete Wavelet Transform
It is used to represent the signal in time as well as
frequency in a compact way that can be efficiently computed
and deals with both the approximations that are considered as
high scale low frequency components as well as the details
that depicts the low scale high frequency components and can
be analyzed using a fast pyramidal algorithm related to
multirate filter banks [4]. It includes analysis of signal at
different frequency bands with different resolutions thereby
resulting in decomposition of signal into coarse approximation
and detail information.
Mathematically, the DWT is defined as:
-j/2 -j/2
j k
w(j,k)= x(k)2 φ(2 n-k)
Where φ (t) is a finite energy time function that decays faster
called wavelet equation.
Coarse approximation is further decomposed using wavelet
decomposition step as a result of successive high-pass [n] and
low-pass h[n] filtering of time domain signal defined as:
Output of high pass filter:
nk
yhigh[k]= x(n)g(2k-n)
Output of low pass filter:
nk
ylow[k]= x(n)g(2k-n)
DWT ALGO
a) At transmitter end: DWT is applied for decomposition of
the embedded payload as well cover signal thereby resulting
into transformation of spatial domain signal to frequency
domain and separation of approximation coefficient
C[]=c1[]+c2[] and detail coefficient L[]=l1[]+l2[] where
l1[]&l2[] are low frequency coefficients and c1[] &c2[] are
high frequency coefficients obtained at second stage of fusion
of approximation & detail coefficients of both signals.
Steganographic signal ss[] is then constructed by applying the
inverse wavelet transform. This steganographic signal is
decomposed at third stage to A[] and D[] inorder to perform
the encryption on it. The detail coefficient vector d[] of the
signal combines with the vector R[] =d[]+code used as
wavelet to decompose the steganographic signal value which
is essential for reconstruction of signal at receiving end [6],
[9].
b) At receiver end: Detect the key code {=R[]-d[]} from detail
coefficient vector and then steganographic signal is
reconstructed using this code and approximation. Now detail
coefficient at second stage IDWT is applied on reconstructed
steganographic signal in order to reconstruct the payload
signal from it with the help of approximate and detail
coefficients [6], [9].
D. DCT (Discrete Cosine Transform) Steganography
a) DCT: It‟s a common JPEG compression technique that
leads to transformation of spatial domain image or signal into
the frequency domain. i.e. high, middle and low frequency
components of an image as shown in figure 9.
Fig. 9. DCT of an image.
5. International Research Journal of Advanced Engineering and Science
ISSN: 2455-9024
15
Harneet Kour khajuria, Loveneesh Talwar, and Akhil Vaid, “Analysis of different steganography algorithms and security issues,”
International Research Journal of Advanced Engineering and Science, Volume 1, Issue 1, pp. 11-16, 2016.
Here, C(u,v) is the DCT coefficient of DCT matrix of row u
and column v
C(i,j) is pixel intensity in row i and columns j
Signal energy is represented by lower frequency
components in image lying at upper left corner of DCT and
lower right half represents higher frequency component that
are small enough to be neglected there by achieving required
compression.
DCT for 1 D image is obtained as:
1
0
(2 1)
( )= ( ) ( )cos
2
N
x
x u
C u u f x
N
where u = 0, 1, 2,…, N-1 for n data items
DCT for 2 D (N*M) image c(i.j) is obtained as:
1 1
0 0
(2 1) (2 1)
C( , )= ( ) ( ) ( , )cos cos
2 2
N N
x y
x u y v
u v u v f x y
N N
where u,v= 0,1,2…N-1
b) DCT and steganography: In steganography, DCT
technique is used to obtain the DCT coefficients in which the
secret messages are embedded. First the image is broken into
8*8 pixel blocks to which is applied DCT on block basis from
left to right and top to bottom. Quantization table is used to
compress each block and scale the DCT coefficients. These
DCT coefficients are embedded with the message that is to be
kept hidden and this is called as DCT steganography since
here steganography requires DCT coefficients which are
obtained by DCT algo and message is embedded in DCT
coefficients using given algorithm:
Algorithm to create stego image
1. Cover image and secret message is read and then
converted to its binary.
2. Cover image is converted to 8*8 block of pixels.
3. From each pixel block, 128 is subtracted starting from left
to right and top to bottom.
4. DCT is applied to each block to obtain compression using
the quantization table i.e. DCT coefficients.
5. LSB of each DC coefficient is first calculated and then
replaced with each bit of secret message.
6. Stego image is then created.
Algorithm for text message retrieval
1. Stego image is read and then divided into 8*8 pixel
blocks.
2. Starting from left to right and top to bottom, 128 is
subtracted from each pixel block.
3. DCT is applied to each block and compressed through
quantization table.
4. LSB of each DC coefficient is calculated.
5. Retrieval of each 8 bit and then conversion of each 8 bit
into character [6], [7], [9].
VI. SECURITY ISSUES
Hidden information analysis by attackers includes
Detection of secret information, extraction and destruction or
modification of hidden information. Depending upon the type
of information available to the stegnalyst for stegnalysis [1-4].
Security attacks are classified as:
A. Types of Security Attacks
a) Basic attacks: Loop holes while designing techniques are
root cause of basic attacks. For example change in audio
length without alteration of the pitch of audio quality is
effective against the attacks for audio files that need
synchronization since such audio files may lose data just by
adjusting parameters that are required to achieve
synchronization.
b) Robustness attacks: Water marking techniques are prime
targets of robustness attacks that tend to destroy the watermark
without changing the image since watermark lose its content if
a series of minor distortions are applied. Robustness attacks
can be handled by creating multiple copies of the mark using
inverse transformations which increase its resistance against
robust attacks.
c) Presentation attacks: It prevent the detection of water mark
on digital images and requires that the original image file that
splits into a matrix have minimum value of cells and the size
of cell can‟t be further reduced by attacks if the cell size is
minimum which prevents the diminishing of watermark
thereby making its detection possible since the watermark
could be lost if the size of cells I a image matrix are very
small.
d) Interpretation attacks: The attacks where it becomes
difficult for attacker to interpret the owner of document. Let a
digital image is created by the user who embeds the image
with a watermark then that watermark belongs to the only
user. Assume that the attacker or any second user adds a
watermark to the same digital image there by showing that the
watermarked image is owned by him. So the actual owner of
document is difficult to decide. Such types of attacks are
prevented by using a strong watermarking technique so that no
fake watermark can be added by attacker.
e) Implementation attacks: The attacks targeted at the marks
existing in the data due to loopholes or faults present in the
mark detection software that make it feasible for attackers to
generate the secret information [2-4].
VII. COMPARISON OF SECRET COMMUNICATION
TECHNIQUES
Encryption and Steganography are mistaken mostly as
ambiguous concepts though both are different techniques
developed with a common goal. “Encryption” refers to
encoding data in a way that only the intended recipient can
determine its intended meaning which remains undetermined
for others. In contrary to this in steganography, an attempt is
made to prevent the unintended recipients from suspecting the
existence of data [1-3] Steganography rather tends to prevent
the visibility of data from the attacker without altering the data
unlike encryption where data encoding is done to maintain the
privacy and security of the data [2], [11].
TABLE III. Difference between secret communication techniques.
Technique Confidentiality Integrity Un removabiltity
Encryption Yes No Yes
Digital Signatures No Yes No
Steganography Yes/No Yes/No Yes
6. International Research Journal of Advanced Engineering and Science
ISSN: 2455-9024
16
Harneet Kour khajuria, Loveneesh Talwar, and Akhil Vaid, “Analysis of different steganography algorithms and security issues,”
International Research Journal of Advanced Engineering and Science, Volume 1, Issue 1, pp. 11-16, 2016.
The core difference between encryption digital signature
and steganography techniques is tabulated as shown in table
III.
VIII. CONCLUSION
Secure communication is desired in almost every field
whether military or in personnel communication which is
obtained using secure communication techniques rather than
the traditional communication techniques. Steganography is
one of my secret communication technique that are developed
with a common goal of protecting data from unintended users
or attackers, when data is required to be maintained secure and
for providing secure communication. The detection of secure
data can be made complicated by integrating the different
secure communication techniques such as cryptography along
with steganography since many such techniques are not
independently robust enough to prevent detection and removal
of embedded data alone. This paper tend to present the secure
communication by employing different steganographic algos
which make secure communication more simple and easy and
can be applied for defense and military applications in
addition to the personal as well as professional point to point
or multipoint secure communication. Different security attacks
to be considered while designing the algo are discussed such
as basic attacks, robustness attacks presentation attacks etc.and
a comparative analysis of steganography algo with other
secure communication techniques concludes that there are
some advantages as well as limitation of each secure
communication technique such as if high payload is to be
embedded then image steganography is preferred where as
low capacity requirement for embedding data is met using
spread spectrum steganography. Similarly DCT, wavelet and
LSB, ELSB steganographic techniques uses a stego object for
embedding secret messages covertly into it. The
steganographic technique with lowest delectability is a new
image steganographic technique based used commonly for
secure internet communication based on chaotic sequences
and most efficient results are obtained with simple LSB
steganographic technique.
REFERENCES
[1] R. Poornima and R. J Iswarya, “An overview of digital image
steganography,” International Journal of Computer Science &
Engineering Survey (IJCSES), vol. 4, no. 1, pp. 23-31, 2013.
[2] T. Morkel, J. H. P Eloff, and M. S. Olivier, “An overview of image
steganography,” in Proceedings of the Fifth Annual Information Security
South Africa Conference (ISSA2005), Sandton, South Africa, 2005.
[3] J. Fridrich, Multimedia Security Technologies for Digital Rights
Management, in Academic Press, ch. Steganalysis, pp. 349-381, 2006.
[4] J. Fridrich, R. Du, and M. Long, “Steganalysis of LSB encoding in color
images,” in Proceedings of the IEEE International Conference on
Multimedia and Expo. Newyork, USA, IEEE Society Press, 2000.
[5] V. K. Sharma and V. Shrivastava, “A steganography algorithm for
hiding image in image by improved LSB substitution by minimize
detection,” Journal of Theoretical and Applied Information Technology
(JATIT), vol. 36, no. 1, pp. 001-008, 2012.
[6] N. Tiwari and Dr. M. Shandilya, “Evaluation of various LSB based
methods of image steganography on GIF file format,” International
Journal of Computer Applications (IJCA), vol. 6, no. 2, pp. 1-4, 2010.
[7] V. L. Reddy, Dr. A. Subramanyam, and Dr. P. C. Reddy,
“Implementation of LSB Steganography and its evaluation for various
file formats,” International Journal of Advanced Networking and
Applications (IJANA), vol. 2, no. 5, pp. 868-872, 2011.
[8] T. Kumar and K. Verma, “A theory based on conversion of RGB image
to gray image,” International Journal of Computer Applications (IJCA),
vol. 7, no. 2, pp. 7-10, 2010.
[9] S. Gupta, G. Gujral, and N. Agawam, “Enhanced least significant bit
algorithm for image steganography,” International Journal of
Computational Engineering and Management (IJCEM), vol. 15, no. 4,
pp. 40-42, 2012.
[10] A. Kumar, S. Chokhandre, and Dr. A. Mishra, “Discrete wavelet
transform based signal steganography and encryption,” International
Journal of Engineering Science and Technology (IJEST), vol. 4, no. 5,
pp. 2417-2420, 2012.
[11] K. B. Raja, C. R Chowdary, K. R. Venugopal, and L. M. Patnaik, “A
secure steganography using LSB, DCT and compression techniques on
raw images,” in IEEE International Conference on Intelligence Sensing
and Information Processing, pp. 171-176, 2005.