IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution. . In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution. . In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document discusses steganography techniques for hiding secret information in digital images. It begins with an introduction to steganography and its differences from cryptography. It then discusses various steganography techniques including least significant bit insertion, masking and filtering, and transform domain techniques. It also discusses using bitmap images for steganography and the popularity of formats like JPEG. The goal of the document is to provide an overview of digital image steganography techniques.
The document provides an introduction to stenography, which is the ancient art of hiding messages so they are not detectable. It discusses how stenography aims to hide the existence of a message, while cryptography scrambles it so it cannot be understood. It then reviews traditional stenography methods used before digital means, and outlines some key terms like cover image and stego image. The document proposes an edge adaptive scheme for digital image stenography and discusses advantages like messages not attracting attention. It also reviews some applications of stenography like digital watermarking and discusses the technique's future scope.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
This document summarizes a research paper on using cryptography and steganography for data security. It discusses how both cryptography and steganography can be used to securely transmit confidential information, but combining them provides additional security. The document then provides background on cryptography and steganography techniques. It explains symmetric and asymmetric encryption, and algorithms like AES, DES, and Diffie-Hellman. It also discusses how the paper aims to develop a new system that embeds encrypted data using steganography for enhanced security. In under 3 sentences.
A new online payment system is proposed that uses steganography and visual cryptography to protect customer information and prevent identity theft during online shopping. The system embeds a customer's authentication password into an image using text-based steganography. The image is then split into two shares using visual secret sharing so that only combining the shares reveals the full image. One share is kept by the customer and one by a certified authority. During a transaction, the shares are combined by the authority to recover the password and authenticate the customer, allowing funds to be transferred without revealing sensitive details to merchants.
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
This document provides a survey of different data hiding techniques, with a focus on reversible data hiding in encrypted images. It begins with an introduction to data hiding and its importance for data security. Then it reviews various data hiding techniques, including those that hide data in audio signals, video sequences, and DNA sequences. It also discusses reversible data hiding techniques for encrypted images. The document concludes with a table that compares different data hiding techniques and highlights their advantages, such as increased hiding capacity and difficulty for attackers to detect hidden data. The survey finds that reversible data hiding techniques for encrypted images can achieve high-quality decrypted images with independent extraction and decryption.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
This document discusses data hiding in digital images using steganography. It describes using the least significant bit (LSB) technique to hide encrypted data in digital images. The LSB technique replaces the least significant bits of the cover image with bits of the hidden message, making it difficult to detect changes to the cover image. The document outlines the steganographic framework, including the embedding and extraction processes using an encryption key. It also presents the LSB algorithm for encoding and decoding hidden data in images. The results indicate LSB insertion after encryption provides better security by preventing unauthorized extraction of encrypted data without affecting image quality significantly.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document discusses steganography techniques for hiding secret information in digital images. It begins with an introduction to steganography and its differences from cryptography. It then discusses various steganography techniques including least significant bit insertion, masking and filtering, and transform domain techniques. It also discusses using bitmap images for steganography and the popularity of formats like JPEG. The goal of the document is to provide an overview of digital image steganography techniques.
The document provides an introduction to stenography, which is the ancient art of hiding messages so they are not detectable. It discusses how stenography aims to hide the existence of a message, while cryptography scrambles it so it cannot be understood. It then reviews traditional stenography methods used before digital means, and outlines some key terms like cover image and stego image. The document proposes an edge adaptive scheme for digital image stenography and discusses advantages like messages not attracting attention. It also reviews some applications of stenography like digital watermarking and discusses the technique's future scope.
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
Problem faced by today’s communicators is not only security but also the speed of communication and size of content.In the present paper, a scheme has been proposed which uses the concept of compression and data encryption. In first phase the focus has been made on data compression and cryptography. In the next phase we have emphasized on compression cryptosystem. Finally, proposed technique has been discussed which used the concept of data compression and encryption. In this first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter compress data is encrypted to provide security. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
This document summarizes a research paper on using cryptography and steganography for data security. It discusses how both cryptography and steganography can be used to securely transmit confidential information, but combining them provides additional security. The document then provides background on cryptography and steganography techniques. It explains symmetric and asymmetric encryption, and algorithms like AES, DES, and Diffie-Hellman. It also discusses how the paper aims to develop a new system that embeds encrypted data using steganography for enhanced security. In under 3 sentences.
A new online payment system is proposed that uses steganography and visual cryptography to protect customer information and prevent identity theft during online shopping. The system embeds a customer's authentication password into an image using text-based steganography. The image is then split into two shares using visual secret sharing so that only combining the shares reveals the full image. One share is kept by the customer and one by a certified authority. During a transaction, the shares are combined by the authority to recover the password and authenticate the customer, allowing funds to be transferred without revealing sensitive details to merchants.
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
This document provides a survey of different data hiding techniques, with a focus on reversible data hiding in encrypted images. It begins with an introduction to data hiding and its importance for data security. Then it reviews various data hiding techniques, including those that hide data in audio signals, video sequences, and DNA sequences. It also discusses reversible data hiding techniques for encrypted images. The document concludes with a table that compares different data hiding techniques and highlights their advantages, such as increased hiding capacity and difficulty for attackers to detect hidden data. The survey finds that reversible data hiding techniques for encrypted images can achieve high-quality decrypted images with independent extraction and decryption.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
This document discusses data hiding in digital images using steganography. It describes using the least significant bit (LSB) technique to hide encrypted data in digital images. The LSB technique replaces the least significant bits of the cover image with bits of the hidden message, making it difficult to detect changes to the cover image. The document outlines the steganographic framework, including the embedding and extraction processes using an encryption key. It also presents the LSB algorithm for encoding and decoding hidden data in images. The results indicate LSB insertion after encryption provides better security by preventing unauthorized extraction of encrypted data without affecting image quality significantly.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
El documento describe un programa informático que permite a los niños crear historias de dibujos animados. El programa permite diversas actividades creativas como animaciones, narraciones y diálogos. También describe un nuevo sistema de comunicación para niños autistas desarrollado por investigadores de la Universidad de Granada que les permite interactuar con su entorno a través de dispositivos móviles y sensores.
O documento discute as habilidades necessárias para desenvolvedores de software modernos, chamados de "Desenvolvedor 2.0", incluindo inteligência emocional, trabalho em equipe e responsabilidade. Também aborda a formação de times ágeis e como integrar equipes de maneira efetiva.
Los tumores de ovario incluyen tumores benignos, borderline y malignos. Los tumores malignos son más comunes entre las edades de 45 y 65 años y representan el 3% de todos los cánceres y la quinta causa más común de muerte por cáncer en mujeres en los Estados Unidos. Los principales tipos de tumores de ovario son los tumores serosos, que representan aproximadamente el 40% de todos los cánceres de ovario, los tumores mucinosos que representan alrededor del 30% de los tumores de ovario, y los tumores de cé
El documento describe las partes y funciones del sistema respiratorio. Explica que los bronquios conducen el aire a los bronquiolos y alvéolos pulmonares, donde ocurre el intercambio gaseoso. El diafragma es el principal músculo respiratorio y se contrae durante la inspiración para llenar los pulmones de aire, y se relaja durante la espiración para expulsar el aire.
1) O documento apresenta o projeto de lei do Plano Nacional de Educação para o período de 2011 a 2020, elaborado pela Comissão de Educação e Cultura da Câmara dos Deputados.
2) O PNE estabelece metas e estratégias para a universalização e melhoria da educação básica e da educação superior nos próximos 10 anos.
3) A proposta foi construída a partir de debates regionais realizados em 2009 e da I Conferência Nacional de Educação, visando fortalecer a participação social no processo de formulação
Este documento presenta una guía sobre radiología de tórax normal y su interpretación. Explica los diferentes exámenes de radiología torácica como radiografía simple, ecografía, TAC y RMN. Luego describe las indicaciones más comunes para estos estudios, incluyendo síntomas cardiopulmonares, estadificación de tumores y control de neumonías. Finalmente, detalla los aspectos a considerar para una adecuada adquisición y evaluación de las imágenes torácicas.
Este documento describe los aspectos clave de la gestión de proyectos para obtener los resultados esperados, incluyendo la importancia de la gerencia de proyectos, el requerimiento de personal idóneo para liderar y trabajar en equipo, y el ciclo de vida de un proyecto que comienza cuando se detectan las necesidades y termina cuando se solucionan aplicando constantemente las etapas de planificar, hacer, revisar y actuar.
Este documento presenta una descripción de varios modelos pedagógicos, incluyendo el modelo pedagógico tradicional, romántico, conductista, constructivista y social. Cada modelo se define por sus metas, métodos, desarrollo, contenidos y la relación entre maestro y alumno.
Tema 1 concepto y alcance de la psicología del desarrolloMaría Pernía
La Unión Europea ha propuesto un nuevo paquete de sanciones contra Rusia que incluye un embargo al petróleo. El embargo prohibiría las importaciones de petróleo ruso por mar y por oleoducto, aunque se concederían exenciones temporales a Hungría y Eslovaquia. El objetivo es aumentar la presión económica sobre Rusia para que ponga fin a su invasión de Ucrania.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
La Unión Europea ha propuesto un nuevo paquete de sanciones contra Rusia que incluye un embargo al petróleo ruso. El embargo se aplicaría gradualmente durante seis meses para el petróleo crudo y ocho meses para los productos refinados. El objetivo es aumentar la presión económica sobre Rusia para que ponga fin a su invasión de Ucrania.
O documento discute a metodologia para a elaboração de trabalhos escritos, incluindo tópicos como leitura, análise de textos e construção lógica. Apresenta a estrutura básica de um trabalho escrito, com seções de introdução, desenvolvimento e conclusão, e destaca a importância da introdução em estabelecer o contexto e objetivos do trabalho.
Este documento presenta una metodología para la elaboración de estrategias de desarrollo local a través de siete pasos: 1) diagnóstico del territorio, 2) identificación de la vocación territorial, 3) análisis de problemas y objetivos, 4) formulación de estrategias, 5) plan de acción, 6) indicadores de seguimiento, 7) revisión y actualización. Inicia con una introducción al enfoque de desarrollo local y continúa detallando cada paso, incluyendo técnicas como el árbol de problemas y la
MFC 50 Aniversario de la Diócesis de Zacatecasmfcmexico
El documento resume las celebraciones del 50 aniversario del Movimiento Familiar Cristiano (MFC) en la Diócesis de Zacatecas. El obispo Carlos Cabrero presidió la misa de celebración y felicitó al MFC por su trabajo de construir el reino de Dios en las familias. Hubo reconocimientos a expresidentes del MFC, testimonios sobre los 50 años de historia de la organización en la diócesis, y momentos de convivencia como el baile y la partida de un pastel para celebrar las bodas de oro del
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
This document reviews steganography techniques for hiding data in digital images. It discusses how the least significant bit insertion method can be used to embed secret messages in the pixel values of an image file without noticeably changing the image. The document also compares steganography to cryptography, noting that while cryptography encrypts messages, steganography aims to conceal even the existence of hidden communications. It proposes a novel approach that first encrypts data using cryptography before embedding it in images using least significant bit insertion and interpolation to increase capacity.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
1) The document describes a Security System for Data using Steganography and Cryptography (SSDSC) that encrypts documents using AES encryption, hides the encrypted data in an image using LEAST SIGNIFICANT BIT steganography, and transmits the image over the internet while keeping the document contents secure.
2) It detects objects in the cover image that are suitable for hiding data, hides the encrypted data in the least significant bits of pixels in the selected regions, and extracts and decrypts the data on the receiving end.
3) Testing showed the hidden and cover images were nearly identical with only small pixel differences, and over 97% similarity, demonstrating the effectiveness of the system in concealing
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) cscpconf
1) The document describes a Security System for Data using Steganography and Cryptography (SSDSC) that encrypts documents using AES encryption, hides the encrypted data in an image using LEAST SIGNIFICANT BIT steganography, and transmits the image over the internet while keeping the document contents secure.
2) It detects non-important image regions using object detection and hides the encrypted data in the least significant bits of pixels in those regions.
3) The system was tested and results showed the hidden and original images were nearly identical with only small pixel differences, demonstrating the effectiveness of the hiding technique.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Steganography using visual cryptography: ReportAparna Nk
This document is a seminar report submitted by Aparna N K to the University of Kerala in partial fulfillment of the requirements for a Master of Computer Applications degree. The report discusses steganography using a genetic algorithm along with visual cryptography for wireless network applications. It provides background on steganography, cryptography, genetic algorithms, the LSB steganography algorithm, and describes a proposed system that uses LSB embedding combined with genetic algorithm pixel modification and visual cryptography to hide secret messages in images for secure transmission. The performance of the proposed system is analyzed based on metrics like mean squared error and peak signal-to-noise ratio.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
This document summarizes a technical seminar presentation on steganography. It introduces steganography as covert communication techniques that hide messages within other harmless media. It discusses the history of steganography dating back to ancient Greece. It then outlines the presentation sections on the problem statement, objectives, techniques like LSB algorithm, design phase with screenshots, results and discussion, and conclusion. The overall goal is securing data transmission by hiding messages in digital images.
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
This document summarizes research on using machine learning techniques for data security, specifically steganography (hiding secret messages within images). It discusses how machine learning algorithms like support vector machines (SVM) can help smooth distorted images and retrieve lost data after a secret message is hidden within an image. The document reviews several related works applying techniques like least significant bit substitution, artificial immune systems, deep learning models for steganalysis, and hash-based approaches. It concludes that the goal is to develop an application for information security using machine learning algorithms to better handle any data loss during transmission from source to destination.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
The document is a student project report on image steganography. It discusses using the least significant bit (LSB) method to hide information in digital images. The summary is:
1. It introduces steganography and LSB methods for hiding data in digital images by replacing the least significant bits of pixels.
2. Code is presented to embed a hidden message in an image by modifying pixels' LSBs and decoding the message from the stego image.
3. The report evaluates LSB steganography's advantages for covert communication but notes room for improving embedding capacity while maintaining secrecy.
This document describes a proposed technique for information security that uses a hybrid of DES and RSA encryption along with LSB steganography. The message is first encrypted with DES, then the DES keys are encrypted with RSA. The hybrid encrypted result is then embedded into an image file using LSB steganography. This combines the strengths of cryptography and steganography for improved security of transmitted data. The encryption time is faster than previous techniques and brute force attacks on this technique would be very difficult.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
Be32364369
1. B.B.Gite, Divya Choksey, Mahesh Jambhulkar,Rahul Ramath,Yashovardhan Jhamvar /
International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.364-369
Data Hiding Using Steganography And Authentication Using
Digital Signatures And Facial Recognition
B.B.Gite1, Divya Choksey2, Mahesh Jambhulkar3,Rahul Ramath4,
Yashovardhan Jhamvar5
1
(Assistant Professor, Department of Computer Engineering, STES's Sinhgad Academy of Engineering,
University of Pune, Pune-48,Maharashtra,India)
2
(Department of Computer Engineering, STES'sSinhgad Academy of Engineering, University of Pune, Pune-
48,Maharashtra,India)
3
(Department of Computer Engineering,STES's Sinhgad Academy of Engineering, University of Pune, Pune-
48,Maharashtra,India)
4
(Department of Computer Engineering,STES's Sinhgad Academy of Engineering, University of Pune, Pune-
48,Maharashtra,India)
5
(Department of Computer Engineering,STES's Sinhgad Academy of Engineering, University of Pune, Pune-
48,Maharashtra,India)
ABSTRACT
Steganographyis the art or technique of Recognition, LSB Algorithm, PCA Algorithm, RSA
hiding messages in such a way that no one except Algorithm, Steganography.
the sender and the intended recipient suspects the
existence of the message, a form of security I. INTRODUCTION
through obscurity. In the current trends of the world, the
We use this concept wherein text is hidden behind technologies have advanced so much that most of the
the image and the intended recipient is able to individuals prefer using the internet as the primary
view it. The purpose of the system is covert medium to transfer data from one end to another
communication to hide a message from a third across the world. There are many possible ways to
party. transmit data using the internet: via e-mails, chats,
In this paper, a technique called digital signature etc. The data transition is made very simple, fast and
is also included which is added to all the accurate using the internet. However, one of the main
documents sent by the sender to increase the problems with sending data over the internet is the
reliability and authenticity of the document. Thus, security threat it poses i.e. the personal or
the proposed system would help to hide the confidential data can be stolen or hacked in many
existence of confidential data and would increase ways. Therefore it becomes very important to take
the difficulty of detecting the hidden (embedded) data security into consideration.
data. Data security basically means protection of data from
We are also including facial recognition which unauthorised users or hackers and providing high
automatically identifies the person by comparing security to prevent data modification. In order to
selected facial features from the image and a facial improve the security features in data transfers over
database. Hence when an image is sent with data the internet, many techniques have been developed,
encrypted in it, the recipient’s facial features will like: Cryptography, Steganography and Digital
be compared with the one in the central database. Signatures.
In this way the receiver is authenticated using In this paper we propose a system in which we
facial recognition tool. integrate more than one of the above
Thus this paper gives a brief idea about image mentionedtechniques to provide a higher level of data
steganography that makes use of Least Significant security, whereas the existing systems implement
Bit (LSB) algorithm for hiding the data into an these techniques individually.This proposed system
image which is implemented through the will prove to be helpful in areas where security of
Microsoft .NET framework. data is of utmost importance ranging from college
This system will prove to be helpful in areas where offices to military purposes.
security of data is of utmost importance. It will
also be very easy to share and send data to a II. CRYPTOGRAPHY
recipient via a single image file. The word cryptography is derived from two
Greek words which mean “secret writing”.
Keywords :Cryptography, Data Security, Cryptography is the process of scrambling the
Decryption, Digital Signatures, Encryption, Facial original text by rearranging and substituting the
364 | P a g e
2. B.B.Gite, Divya Choksey, Mahesh Jambhulkar,Rahul Ramath,Yashovardhan Jhamvar /
International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.364-369
original text making it unreadable for others.
Cryptography is an effective way to protect the
information that is transmitted through the network
communication paths [1].
In general, cryptography is transferring data
from source to destination by altering it through a
secret code. The cryptosystems uses a plaintext as an
input and generate a cipher text using encryption
algorithm [2].
III. STEGANOGRAPHY
Steganography is the art of hiding and
transmitting data through apparently innocuous
carriers to conceal the existence of data [3].This
technique is performed by different steganographic
algorithms like F5, LSB (Least Significant Bit), JSteg
etc. and the act of detecting the information hidden Fig No.1: Implementation of LSB Algorithm
through these algorithms is called “Steganalysis”.
In the above Figure No. 1, a glimpse of how the LSB
When steganography is applied to an image, the new Algorithm works is shown; the message to be hidden
image is called the “steganographic image”. This behind an image is first considered. The next step is
steganographic image goes unnoticed as there is to get the ASCII (American Standard Code for
almost no difference between the original image and Information Interchange) of every character of the
the steganographic image which is visible to the message. Since the ASCII will be an 8 bit binary
human eye. number, we will require 8 Least Significant Bits to
store the ASCII of one character.
Thus steganography is considered as a powerful tool
to provide data security. As every pixel in a standard Bitmap image is made
up of 3 colors - Red, Green and Blue, we will get 3
3.1 LSB algorithm Least Significant Bits of the 3 component colors of
each pixel. Therefore roughly 3 pixels are required to
LSB (Least Significant Bit) is an algorithm to store the 8 bits of ASCII of every character.
implement steganography. It is the process of
adjusting the least significant bitsof thepixels of the In the above Figure No.1,the message considered is
carrier image behind which the confidential data is “Aha!”. The ASCII of the first character A is 65
hidden. It is a simple approach for embedding i.e.01000001 in binary. Hence the first 8 Least
message into the image [4]. Significant Bits of the RGB components of the first 3
pixels are changed according to the binary
The Least Significant Bit insertion varies according representation of the ASCII of „A‟.Similarly the same
to number of bits in an image. For an 8 bit image, the procedure is incorporated for the rest of the message,
least significant bit i.e., the 8th bit of each byte of the using the binary representation of each character‟s
image is changed to the bit of secret message. For 24 ASCII value.
bit image, the colors of each component like RGB
(red, green and blue) are changed. It has high speed, IV. Difference Between Steganography
provides good quality in hiding data, high security And Cryptography
and low complexity. In cryptography the message is not hidden,
any unintended receiver can intercept and decrypt the
message, if the decryption keys are possessed by
him/her.
However in steganography message is hidden and the
enemy must discover the medium as the message is
hidden behind an image and the image goes
unnoticed as a usual, harmless image.
Therefore, whereas cryptography protects the
contents of a message, steganography can be said to
protect both messages and communicating parties.
365 | P a g e
3. B.B.Gite, Divya Choksey, Mahesh Jambhulkar,Rahul Ramath,Yashovardhan Jhamvar /
International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.364-369
V. DIGITAL SIGNATURE
A digital signature is a scientific pattern
which verifies the authenticity of a digital message or
document [5]. A valid digital signature makes sure
that the message was created by a known sender and
the person cannot deny sending it. Hence it
guarantees data integrity and non-repudiation of
documents and transactions. Digital Signature also
assures that the document is not tampered during
transmission and no alterations are made to the data
once the document has been digitally signed.
Digital signatures use asymmetric cryptography and
it mainly consists of three algorithms:
Fig No.2: Facial Recognition Process
1. Key Generation: Generates the private key
and a corresponding public key.
Acquisition- Image acquisition module
2. Signing: Generates the signature using the
seeks and thenextracts a region which
message and the private key.
contains only the face from the image
3. Signature Verification: Claims the
picked up from the webcam.The image will
authenticity of the sender using the message,
then be resized and corrected geometrically
public key and the signature [6].
and will eliminate the background and
scenes which are unrelated to the face sothat
5.1RSA Algorithm
it is suitable for recognition.
RSA is an algorithm for public-key Preprocessing- The purpose of the
cryptography/digital signatures that is based on the preprocessing module is to reduce or
presumed difficulty of factoring large integers, the eliminate some of thevariations in face due
factoring problem. to illumination. It performs normalization
The algorithm involves the above 3 steps - key and filtering, improves image clarity, adjusts
generation, signing/encryption, signature brightness and sets the default image size
verifying/decryption. [9].
Feature extraction (Principal Component
A user of RSA creates and then publishes the product analysis)-The purpose of the feature
of two large prime numbers, along with an auxiliary extraction is to extract the feature vectors
value, as their public key. The prime factors must be (Eigen vectors) which represent the
kept secret. Anyone can use the public key to encrypt face.This feature vector denotes the
a message, but with currently published methods, if signature of the image. Signature matrix for
the public key is large enough, only someone with the whole database is then
vast knowledge of the prime factors can feasibly computed.Euclidian distance of the image is
decode the message [7]. then computed with all the signatures in the
database. Image is identified as the one
VI. FACIAL RECOGNITION which gives least distance with the signature
of the image torecognize [10].
Facial recognition is a process of verifying a
person‟s identity by comparing the facial features of Classifier- The purpose of the classification
the person with those already stored in a database. It sub-module is to map the feature space of a
is most widely used in security systems. test data to adiscrete set of label data that
Every face has numerous, distinguishable landmarks serves as template. It compares the Eigen
called as nodal points. Each human face has many vectors with those already stored in the
nodal points [8]. Few of the nodal points are as database library.
follows: Training sets- It adjusts the feature
1. Width of the nose. extraction parameters to ensure optimization
2. Distance between eyes. and accuracy.
3. Length of jaw line.
4. Shape of chin. VII. PREVIOUS WORKS
The literature survey done for the proposed
system has immensely helped us to understand the
purpose and functionality of the systems presently
existing to perform Image Steganography.
366 | P a g e
4. B.B.Gite, Divya Choksey, Mahesh Jambhulkar,Rahul Ramath,Yashovardhan Jhamvar /
International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.364-369
Some of the systems presently existing to cater image 7.2.1 Advantages
Steganography are as- 1. A simple Graphical User Interface, which
1. QuickStego. makes it easier for users to understand what
2. FortKnox. are his/her options to execute the task.
2. The data is encrypted before the
7.1 QuickStego Steganography is done.
QuickStego lets you hide text in pictures so that only
other users of QuickStego can retrieve and read the 7.2.2 Disadvantages
hidden secret messages. Once text is hidden in an 1. Due to the change of color values of the two
image the saved picture is still a 'picture', it will load Least Significant Bits, the steganographic
just like any other image and appear as it did before. image looks considerably different from the
The image can be saved, emailed, uploaded to the original image in many cases.
web etc. 2. The source of the image is not verified in
QuickStego alters the pixels of the image, encoding any way to pin point that the image has
the secret text by adding small variations in color to come from a particular trusted source.
the image. In practice, to the human eye, these small 3. Only 24-bit Bitmap images can be used to
differences do not appear to change the image. hide the data.
QuickStego does not ENCRYPT the secret text
message though it is well hidden in the image.If you VIII. PROPOSED SYSTEM
require the message to also be encrypted then The proposed system aims to provide a high
QuickCrypto, which is a paid product, needs to be degree of security for the confidential message. It
purchased. This software is priced at £34.99. uses MySQLdatabase which is located on a server
machine.
The user needs to go to http://quickcrypto.comand The proposed system can be divided into 2 phases,
then download the free version of the software. After Hiding phase and Extraction phase.
installing the software, it requires the user to select an The new users need to register with the system and
image to work on. The user is now supposed to the existing users can login into the system in order
choose whether he/she wants to hide text or get text. to access the system features.
The text can also be opened from a text file and the The new user needs to specify basic personal
text retrieved from the image can also be saved into a information like name, email id and a profile picture.
text document. The system also captures additional pictures of the
7.1.1 Advantages users face, required for facial recognition in the
1. QuickStegois comparatively faster than decryption phase.
other web based steganographic software
providers as it is an offline software based Once all the input is accepted from the user, the
on windows. system generates 2 sets of keys for the user using the
RSA algorithm.
7.1.2 Disadvantages The first set is called the Data Keys which are used
1. The Graphical User Interface of QuickStego for the encryption and decryption of the message
makes it difficult for users to understand data.Data Keys consists of a Data Public Key and a
whether the user is in the hide text mode or Data Private Key.
the get text mode. The second set is called the Signature Keys which are
2. It does not require the user to be registered used to create the Digital Signature and verify the
with the software; hence misuse of the Digital Signature of the Sender. This set consists of
software is possible. the Signature Public Key and the Signature Private
3. There is no encryption of the message that is Key.
hidden behind a steganographic image. All these 4 keys are unique for every user.
4. Only Bitmap images can be used to hide
data. After successfully logging in the user can view his
profile which contains his personal information as
7.2 FortKnox well as all his keys which will be used for data
It is also a Windows based application which has encryption, decryption and for creating a digital
been developed to provide image Steganography. signature for that particular user. He may also change
This software uses the LSB algorithm for the his password if required.
steganography, the only difference being that instead
of changing the values the Least Significant Bit, it
changes the values of the two Least Significant Bits.
367 | P a g e
5. B.B.Gite, Divya Choksey, Mahesh Jambhulkar,Rahul Ramath,Yashovardhan Jhamvar /
International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.364-369
8.1 Hiding Phase
This process can be explained with the help of
thediagram given below.
Fig No.4: Extraction Process
Fig No.3: Hiding Process Once the receiver receives the steganographic image
he needs to login to the system. To extract the
In the Hiding process the user has to select an image message from the image the receiver needs to
from the storage. This image can be of any of the successfully pass the facial recognition wherein the
following file types (.bmp,.jpg,.png) Eigen vectors of the users face are compared with the
The secret message can be typed or can be loaded pre calculated Eigen vectors stored in the database. If
from a text file. The size of the secret message which the user successfully passes the facial recognition
can be hidden depends on the size of the image test, the encrypted Digital Signature is extracted from
selected. The user selects the receiver to whom he the Steganographic Image.The receiver then chooses
wants to send the secret message. Then the the Sender‟s Signature Public Key to decrypt and
encryption process starts. It uses the Data Public Key verify the digital signature of the sender. Once the
of the receiver for encryption. Once encryption of the digital signature is verified the next step is to extract
message is done, the message text is scrambled and it the cryptographic message from the Steganographic
will be unscrambled only in the decryption Image. The receiver now uses his/her Data Private
phase.This scrambled data is called the Key to decrypt the encrypted, cryptographic message.
“cryptographic message”.
Table No 1: Tasks To Be Performed
Every user will have a signature code which will be Steps Tasks to be Performed
his unique code. The sender‟s Signature Private Key
1 Acceptance of input from the new user.
is now used, and when applied on the signature code
of the sender, it will generate a scrambled signature. Generation of public and private keys
2
of the user.
This scrambled signature is appended to the 3 Logging in of an existing user.
cryptographic message and once this is done, the Selecting an image and the message to
LSB Algorithm is applied to hide the entire 4
hide behind the image.
cryptographic message along with the Digital
Start of the encryption process and
Signature behind the carrier image.
5 sending the steganographic image to
The new image created is called the “Steganographic
the receiver.
image”; this image can then be sent to the receiver
using any transmission method. Logging in of the receiver.
6
8.2 Extraction Phase Uploading the received steganographic
7 image.
This process can be explained with the help of the
block diagram given below. Facial recognition of the receiver.
8
Selection of the public key of
9
thesender.
Verification of the sender‟s digital
10
signature.
368 | P a g e
6. B.B.Gite, Divya Choksey, Mahesh Jambhulkar,Rahul Ramath,Yashovardhan Jhamvar /
International Journal of Engineering Research and Applications (IJERA)
ISSN: 2248-9622 www.ijera.comVol. 3, Issue 2, March -April 2013, pp.364-369
Decryption of the steganographic placed on a server machine with a Static IP
11 image and display of the original Address. This will enable the users to use
message. the proposed system on their client machines
connected to a central database.
3. Improve the compression ratio of text to
image. That is to accommodate more text
data in a given image.
REFERENCES
[1] “Introduction to computer security” -Bishop,
M., Pearson publications.
[2] “Cryptography and Data Security”, Dorothy
Elizabeth Rob, Ling Denning, Purdue
University.
[3] Neil F. Johnson, ZoranDuric, and Sushil
Jajodia, Information Hiding: Steganography
and Watermarking - Attacks and
Countermeasures, MA, Kluwer Academic
Publishers, 2001.
[4] Thesis On Information Security Through Image
Steganography Using Least Significant Bit
Fig No.5: Data Flow Diagram Level 2 Algorithm by NaniKoduri
[5] S.R. Subramanya and Byung K. Yi: Digital
IX. CONCLUSION Signatures- 0278-6648/06 2006 IEEE.
All the systems that exist as of today that [6] .Chaitanya1 and Y.Raja Sree: Design of new
provide Image Steganography have some flaws and security using symmetric and asymmetric
inconsistencies. The systems provide less security in cryptography algorithms- World Journal of
terms of encryption of the message data, the sender Science and Technology 2012.
of the image is not verified, and the receiver is not [7] A Method for Obtaining Digital Signatures and
authenticated to view the secret data hidden behind Public-Key Cryptosystems R.L. Rivest, A.
the image. Shamir, and L. Adleman.
[8] “How Facial Recognition Systems Work”:
The proposed system aims to overcome the Kevin Bonsor.
shortcomings of the existing systems which aim at [9] T. Chen, W.Yin, X.S. Zhou, D. Comaniciu, T.
developing a more secure environment to carry out S.Huang,"Total Variation Models for
Image Steganography. This system will provide the VariableLighting Face Recognition and
users a digital signature that they can embed in the UnevenBackground Correction", IEEE
steganographic image to validate the source of the Transactions onPattern Analysis and Machine
image, facial recognition at the receiver‟s end will Intelligence, vol.28(9), 2006.
authenticate the receiver of the image and only he/she [10] Zhujie, Y.L.Y., 1994. Face recognition
will be authorized to view the data behind the image. withEigen faces. Proc.IEEE Intl. Conf.
Encryption of the message data will ensure that even IndustrialTechnology.
if the image is decrypted using some other tools, the [11] "MySQL Enterprise Edition". MySQL 5.5
message will not be decrypted and all that will be Reference Manual, Oracle. 5 February 2013.
seen is data that does not make sense.
Our tool uses MySQL as database which will ensure
a more robust approach towards security,
performance and disaster recovery as compared to
other databases such as MS-Access 2007 [11].
X. FUTURE SCOPE
The scope of proposed system can be
expanded in the following ways:
1. An image can be hidden behind the carrier
image
2. The application can be installed on a number
of client machines and the database can be
369 | P a g e