This document describes a method for integrating cryptography and steganography using image processing. It presents a system that can perform both steganography and cryptography simultaneously by embedding encrypted messages into digital images. The system uses the cover image and a key image to hide secret messages in a way that makes detection difficult. It is shown to be an effective steganographic technique that also provides theoretically unbreakable cryptography, equivalent to the Vernam cipher.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
This document provides an overview of concepts in image steganography. It defines key terms like cover object, stego object, and discusses the prisoner's problem framework for steganography. It also discusses different approaches to defining steganographic security, including defining it based on the distinguishability of cover and stego object probability distributions or the error rates of a warden's detection test. The document reviews how security is quantified using relative entropy between distributions.
Customized and Secure Image Steganography Through Random Numbers Logic.CSCJournals
Steganography is the science of hiding information in media based data. We present random numbers logic based steganographic methods and layout management schemes for hiding data/image into image(s). These methods and schemes can be customized according to the requirements of the users and the characteristics of data/images. These methods are secure enough to meet the requirements of the users and user can play significant role in selection and development of these methods. Methods can be chosen randomly and implemented dynamically based on inputs, user choices as well as outputs. Experimental results are given to demonstrate the performance of the proposed methods.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
This document provides an overview of concepts in image steganography. It defines key terms like cover object, stego object, and discusses the prisoner's problem framework for steganography. It also discusses different approaches to defining steganographic security, including defining it based on the distinguishability of cover and stego object probability distributions or the error rates of a warden's detection test. The document reviews how security is quantified using relative entropy between distributions.
Customized and Secure Image Steganography Through Random Numbers Logic.CSCJournals
Steganography is the science of hiding information in media based data. We present random numbers logic based steganographic methods and layout management schemes for hiding data/image into image(s). These methods and schemes can be customized according to the requirements of the users and the characteristics of data/images. These methods are secure enough to meet the requirements of the users and user can play significant role in selection and development of these methods. Methods can be chosen randomly and implemented dynamically based on inputs, user choices as well as outputs. Experimental results are given to demonstrate the performance of the proposed methods.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
Steganography is the science that involves
communicating secret information in an appropriate
carrier so no one apart from the sender and the recipient
even can recognize that there is hidden
information. Steganography is the art of hiding
messages inside unsuspicious medium such as images,
videos, various types of files…etc. It's a method to
establish a secure communication channel between two
parties. The purpose of steganography is to hide the
existence of a message from an eavesdropper or third
parties. Steganalysis is the branch of data processing
that seeks the identification of carrier vessels and
retrieval of message hidden. In this paper we present
enhanced implementation for Steganography algorithm,
an algorithm that we claim to be safe, built over DCT
(Discrete Cosine Transformation) frequency
domain mutation[12], the algorithm uses error reductive
measurements such as pattern matching to obtain
a reasonable a better image quality by reducing number
of changes that steganography algorithm made during
the embedding process.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganographyn involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-à-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. It is noteworthy that each of these cover media has different special attributes that are altered by a steganography algorithm in such a way that the changes are not perceivable for the unintended recipients; but, the changes are identifiable using appropriate steganlysis algorithms. We anticipate that this paper can also give a clear picture of the current trends in
steganography so that we can develop and improvise appropriate steganlysis algorithms.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
This document presents a proposed algorithm for public key cryptography using matrices. The algorithm has three stages: 1) shuffling the original data using a linear congruential method and arranging it in a matrix, 2) traversing the data matrix in different patterns, and 3) generating a system of non-homogeneous linear equations from the matrix to derive private keys. The algorithm aims to provide data confidentiality, integrity and authentication for cloud computing applications using public key cryptography with matrices in a way that has constant complexity regardless of key size.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Analysis of image steganalysis techniques to defend against statistical attac...eSAT Publishing House
This document summarizes various techniques for image steganalysis to defend against statistical attacks. It discusses how statistical properties of images can be used to detect hidden messages and describes common steganography algorithms like LSB substitution and techniques for JPEG images. It also outlines approaches for statistical embedding and detection to introduce randomness and maintain statistical distributions when hiding information in digital images.
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
This document evaluates the performance of chaotic encryption algorithms. It aims to analyze the confidentiality, integrity, and efficiency of encrypting video data. The document introduces cryptography and chaos concepts. It describes chaotic encryption and decryption processes. It evaluates existing algorithms like CVES, SEA, NCA, and EES based on encryption speed, CPU utilization, and power consumption. The results show that CVES and NCA have better encryption speeds while EES requires more time. The algorithms provide varying levels of security from high to middle.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality
to keep up with varied environments and provide the various choices, such as multi-mode IPSec support.
To begin with we will provide a brief background on the modes of operation for symmetric-key block
ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher
block chaining (CBC) mode is suitable for operating environments that require self-synchronizing
capabilities, and the output feedback (OFB) mode requires encryption modules only. When using
symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users
performing information encryption often encounter difficulties selecting a suitable mode of operation.
This paper describes a structure for analyzing the block operation mode combination. This unified
operation structure (UOS) combines existing common and popular block modes of operation. UOS does
multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist
of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher
feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message
authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in
cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand.
This research provides an overview and information useful for approaching low-resource hardware
implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag.
The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This
study indicates a more effectively organized structure for symmetric-key block ciphers to improve their
application scenarios. We can get that it is flexible in modern communication applications.
The document describes a new algorithm called MCHF (Meiosis based Ciphering and Hash Function generation) for encryption, cryptographic hashing, and random number generation for multilevel cloud security. The algorithm emulates meiotic cell division processes using concepts from molecular biology like DNA crossover during metaphase. It uses a 1024-bit key for encryption and the Navier-Stokes equation to model DNA movement for crossover-based encryption and hashing. The algorithm aims to securely handle login, database transactions, and data storage in the cloud by generating secure cryptographic hashes. Java code is implemented to test the algorithm's encryption, hashing, random number generation and 3D login system capabilities.
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
This document reviews steganography techniques for hiding data in digital images. It discusses how the least significant bit insertion method can be used to embed secret messages in the pixel values of an image file without noticeably changing the image. The document also compares steganography to cryptography, noting that while cryptography encrypts messages, steganography aims to conceal even the existence of hidden communications. It proposes a novel approach that first encrypts data using cryptography before embedding it in images using least significant bit insertion and interpolation to increase capacity.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
Steganography is the science that involves
communicating secret information in an appropriate
carrier so no one apart from the sender and the recipient
even can recognize that there is hidden
information. Steganography is the art of hiding
messages inside unsuspicious medium such as images,
videos, various types of files…etc. It's a method to
establish a secure communication channel between two
parties. The purpose of steganography is to hide the
existence of a message from an eavesdropper or third
parties. Steganalysis is the branch of data processing
that seeks the identification of carrier vessels and
retrieval of message hidden. In this paper we present
enhanced implementation for Steganography algorithm,
an algorithm that we claim to be safe, built over DCT
(Discrete Cosine Transformation) frequency
domain mutation[12], the algorithm uses error reductive
measurements such as pattern matching to obtain
a reasonable a better image quality by reducing number
of changes that steganography algorithm made during
the embedding process.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganographyn involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-à-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. It is noteworthy that each of these cover media has different special attributes that are altered by a steganography algorithm in such a way that the changes are not perceivable for the unintended recipients; but, the changes are identifiable using appropriate steganlysis algorithms. We anticipate that this paper can also give a clear picture of the current trends in
steganography so that we can develop and improvise appropriate steganlysis algorithms.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
This document presents a proposed algorithm for public key cryptography using matrices. The algorithm has three stages: 1) shuffling the original data using a linear congruential method and arranging it in a matrix, 2) traversing the data matrix in different patterns, and 3) generating a system of non-homogeneous linear equations from the matrix to derive private keys. The algorithm aims to provide data confidentiality, integrity and authentication for cloud computing applications using public key cryptography with matrices in a way that has constant complexity regardless of key size.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Analysis of image steganalysis techniques to defend against statistical attac...eSAT Publishing House
This document summarizes various techniques for image steganalysis to defend against statistical attacks. It discusses how statistical properties of images can be used to detect hidden messages and describes common steganography algorithms like LSB substitution and techniques for JPEG images. It also outlines approaches for statistical embedding and detection to introduce randomness and maintain statistical distributions when hiding information in digital images.
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
This document evaluates the performance of chaotic encryption algorithms. It aims to analyze the confidentiality, integrity, and efficiency of encrypting video data. The document introduces cryptography and chaos concepts. It describes chaotic encryption and decryption processes. It evaluates existing algorithms like CVES, SEA, NCA, and EES based on encryption speed, CPU utilization, and power consumption. The results show that CVES and NCA have better encryption speeds while EES requires more time. The algorithms provide varying levels of security from high to middle.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality
to keep up with varied environments and provide the various choices, such as multi-mode IPSec support.
To begin with we will provide a brief background on the modes of operation for symmetric-key block
ciphers. Different block cipher modes of operation have distinct characteristics. For example, the cipher
block chaining (CBC) mode is suitable for operating environments that require self-synchronizing
capabilities, and the output feedback (OFB) mode requires encryption modules only. When using
symmetric-key block cipher algorithms such as the Advanced Encryption Standard (AES), users
performing information encryption often encounter difficulties selecting a suitable mode of operation.
This paper describes a structure for analyzing the block operation mode combination. This unified
operation structure (UOS) combines existing common and popular block modes of operation. UOS does
multi-mode of operation with most existing popular symmetric-key block ciphers and do not only consist
of encryption mode such as electronic codebook (ECB) mode, cipher block chaining (CBC) mode, cipher
feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message
authentication mode such as the cipher block chaining message authentication code (CBC-MAC) in
cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand.
This research provides an overview and information useful for approaching low-resource hardware
implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag.
The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This
study indicates a more effectively organized structure for symmetric-key block ciphers to improve their
application scenarios. We can get that it is flexible in modern communication applications.
The document describes a new algorithm called MCHF (Meiosis based Ciphering and Hash Function generation) for encryption, cryptographic hashing, and random number generation for multilevel cloud security. The algorithm emulates meiotic cell division processes using concepts from molecular biology like DNA crossover during metaphase. It uses a 1024-bit key for encryption and the Navier-Stokes equation to model DNA movement for crossover-based encryption and hashing. The algorithm aims to securely handle login, database transactions, and data storage in the cloud by generating secure cryptographic hashes. Java code is implemented to test the algorithm's encryption, hashing, random number generation and 3D login system capabilities.
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
This document reviews steganography techniques for hiding data in digital images. It discusses how the least significant bit insertion method can be used to embed secret messages in the pixel values of an image file without noticeably changing the image. The document also compares steganography to cryptography, noting that while cryptography encrypts messages, steganography aims to conceal even the existence of hidden communications. It proposes a novel approach that first encrypts data using cryptography before embedding it in images using least significant bit insertion and interpolation to increase capacity.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
Data security using stegnography and quantum cryptographyAlexander Decker
The document proposes using a combination of steganography and quantum cryptography to securely transmit encrypted data. It begins by providing background on steganography, describing how it hides confidential information within cover files like images, and how it differs from encryption and digital watermarking. It then discusses related work improving steganography techniques. The proposed approach uses an advanced steganography algorithm (F5) to hide encrypted data within an image, making the secret information nearly impossible to detect. It also describes using quantum cryptography to securely generate and distribute the encryption key, providing virtually unbreakable security based on principles of quantum mechanics. The combination of steganography and quantum key distribution is argued to provide perfect security for transmitted data.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
This document provides a survey of metamorphic cryptography techniques. It begins with an introduction to cryptography and steganography individually, explaining how cryptography encrypts messages and steganography hides messages. It then discusses the benefits of combining these approaches in metamorphic cryptography, including providing multiple layers of security. Two examples of metamorphic cryptography techniques are described: one using static parsing steganography to hide bits of a secret message in cover image pixels, and another combining AES encryption with discrete cosine transform to hide encrypted text in an image. The document concludes that non-metamorphic approaches are less secure because they rely on single methodologies and simpler encoding algorithms.
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
This document proposes a new technique for image steganography that combines hash-LSB and RSA encryption algorithms to provide more secure data hiding. The technique first encrypts a message using RSA encryption before hiding it in the least significant bit of pixel values in a cover image, selected using a hash function. This ensures that even if the stego-image is analyzed, an interceptor would only obtain the encrypted ciphertext and not be able to access the original message without the decryption key. The document provides background on steganography, cryptography techniques like RSA and LSB, reviews related work, and describes the proposed hash-LSB with RSA encryption approach.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
The document discusses the history and techniques of information hiding, specifically steganography. It describes how steganography has evolved from ancient Greece using wax tablets and tattoos to modern digital methods of hiding information in images, audio and other media. It outlines some key terminology and concepts in steganography, such as cover objects, stego objects and stegosystems. The document also discusses the tradeoff between security and payload capacity and examines linguistic steganography and its relationship to digital watermarking.
1. IMAGE BASED STEGANOGRAPHY AND CRYPTOGRAPHY
Domenico Bloisi and Luca Iocchi
Dipartimento di Informatica e Sistemistica
Sapienza University of Rome, Italy
E-mail: <lastname>@dis.uniroma1.it
Keywords: Steganography, cryptography.
Abstract: In this paper we describe a method for integrating together cryptography and steganography through image
processing. In particular, we present a system able to perform steganography and cryptography at the same
time using images as cover objects for steganography and as keys for cryptography. We will show such system
is an effective steganographic one (making a comparison with the well known F5 algorithm) and is also a
theoretically unbreakable cryptographic one (demonstrating its equivalence to the Vernam Cipher).
1 INTRODUCTION confidential transmission over a public network. The
original text, or plaintext, is converted into a coded
Cryptography and steganography are well known and equivalent called ciphertext via an encryption algo-
widely used techniques that manipulate information rithm. Only those who possess a secret key can deci-
(messages) in order to cipher or hide their existence. pher (decrypt) the ciphertext into plaintext.
These techniques have many applications in computer Cryptography systems can be broadly classified
science and other related fields: they are used to pro- into symmetric-key systems (see Fig. 1) that use a
tect e-mail messages, credit card information, corpo- single key (i.e., a password) that both the sender and
rate data, etc. the receiver have, and public-key systems that use two
More specifically, steganography1 is the art and keys, a public key known to everyone and a private
science of communicating in a way which hides the key that only the recipient of messages uses. In the
existence of the communication (Johnson and Jajodia, rest of this paper, we will discuss only symmetric-key
1998). A steganographic system thus embeds hid- systems.
den content in unremarkable cover media so as not to
arouse an eavesdropper’s suspicion (Provos and Hon-
eyman, 2003). As an example, it is possible to embed
a text inside an image or an audio file.
On the other hand, cryptography is the study of
mathematical techniques related to aspects of infor-
mation security such as confidentiality, data integrity,
entity authentication, and data origin authentication
(Menezes et al., 1996). In this paper we will focus
only on confidentiality, i.e., the service used to keep
the content of information from all but those autho-
rized to have it. Figure 1: Symmetric-key Cryptographic Model.
Cryptography protects information by transform-
ing it into an unreadable format. It is useful to achieve Cryptography and steganography are cousins in
the spy craft family: the former scrambles a mes-
1 from Greek, it literally means ”covered writing” sage so it cannot be understood, the latter hides the
2. message so it cannot be seen. A cipher message, to send a secret message M to Bob (the receiver): in
for instance, might arouse suspicion on the part of order to do this, Alice chooses a cover image C.
the recipient while an invisible message created with The steganographic algorithm identifies C’s re-
steganographic methods will not. dundant bits (i.e., those that can be modified with-
In fact, steganography can be useful when the out arising Wendy’s suspicion), then the embedding
use of cryptography is forbidden: where cryptogra- process creates a stego image S by replacing these re-
phy and strong encryption are outlawed, steganog- dundant bits with data from M.
raphy can circumvent such policies to pass message
covertly. However, steganography and cryptography
differ in the way they are evaluated: steganography
fails when the ”enemy” is able to access the content
of the cipher message, while cryptography fails when
the ”enemy” detects that there is a secret message
present in the steganographic medium (Johnson and
Jajodia, 1998).
The disciplines that study techniques for decipher-
ing cipher messages and detecting hide messages are
called cryptanalysis and steganalysis. The former de-
notes the set of methods for obtaining the meaning Figure 2: Steganographic Model.
of encrypted information, while the latter is the art of
discovering covert messages.
S is transmitted over a public channel (monitored
The aim of this paper is to describe a method for
by Wendy) and is received by Bob only if Wendy has
integrating together cryptography and steganography
no suspicion on it. Once Bob recovers S, he can get
through image processing. In particular, we present a
M through the extracting process.
system able to perform steganography and cryptogra-
The embedding process represents the critical task
phy at the same time. We will show such system is an
for a steganographic system since S must be as simi-
effective steganographic one (making a comparison
lar as possible to C for avoiding Wendy’s intervention
with the well known F5 algorithm (Westfeld, 2001))
(Wendy acts for the eavesdropper).
and is also a theoretically unbreakable cryptographic
one (we will demonstrate our system is equivalent to Least significant bit (LSB) insertion is a common
the Vernam cipher (Menezes et al., 1996)). and simple approach to embed information in a cover
file: it overwrites the LSB of a pixel with an M’s bit. If
we choose a 24-bit image as cover, we can store 3 bits
in each pixel. To the human eye, the resulting stego
2 IMAGE BASED image will look identical to the cover image (Johnson
STEGANOGRAPHIC SYSTEMS and Jajodia, 1998).
Unfortunately, modifying the cover image
The majority of today’s steganographic systems uses changes its statistical properties, so eavesdroppers
images as cover media because people often transmit can detect the distortions in the resulting stego im-
digital pictures over email and other Internet commu- age’s statistical properties. In fact, the embedding of
nication (e.g., eBay). Moreover, after digitalization, high-entropy data (often due to encryption) changes
images contain the so-called quantization noise which the histogram of colour frequencies in a predictable
provides space to embed data (Westfeld and Pfitz- way (Provos and Honeyman, 2003; Westfeld and
mann, 1999). In this article, we will concentrate only Pfitzmann, 1999).
on images as carrier media. Westfeld (Westfeld, 2001) proposed F5, an algo-
The modern formulation of steganography is of- rithm that does not overwrite LSB and preserves the
ten given in terms of the prisoners’ problem (Sim- stego image’s statistical properties (see Sect. 5.2).
mons, 1984; Kharrazi et al., 2004) where Alice and Since standard steganographic systems do not pro-
Bob are two inmates who wish to communicate in or- vide strong message encryption, they recommend to
der to hatch an escape plan. However, all commu- encrypt M before embedding. Because of this, we
nication between them is examined by the warden, have always to deal with a two-steps protocol: first
Wendy, who will put them in solitary confinement at we must cipher M (obtaining M’) and then we can
the slightest suspicion of covert communication. embed M’ in C.
Specifically, in the general model for steganogra- In the next sections we will present a new all-in-
phy (see Fig. 2), we have Alice (the sender) wishing one method able to perform steganography providing
3. strong encryption at the same time. recover M through S and K (see Sect. 4.2). In addi-
Our method has been planned either to work with tion, Wendy will neither detect that M is embedded in
bit streams scattered over multiple images (in an on- S nor be able to access the content of the secret mes-
line way of functioning) or to work with still images; sage (see Fig. 4).
it yields random outputs, in order to make steganaly-
sis more difficult and it can cipher M in a theoretically
secure manner preserving the stego image’s statistical
properties.
The simplicity of our method gives the possibility
of using it in real-time applications such as mobile
video communication.
3 A STEGO-CRYPTOGRAPHIC
MODEL
Figure 4: The unifying model.
Figures 1 and 2 depict the cryptographic and stegano-
graphic system components. Here we discuss how we
could unify those two models, in order to devise a
new model holding the features that are peculiar both 4 IMAGE BASED
to the steganographic and to the cryptographic model STEGANOGRAPHY AND
(see Fig. 3).
CRYPTOGRAPHY
The function denoted by F in Fig. 4 represents
the embedding function we are going to explain in
this section. The symbol F −1 indicates the ex-
traction function, since it is conceptually the in-
verse of embedding. We will call ISC (Image-
based Steganography and Cryptography) the algo-
rithm which carries on such functions.
4.1 ISC Embedding Process
Figure 5 shows the embedding process. The choice
Figure 3: Mapping between model components. of the stego image format makes a very big impact on
the design of a secure steganographic system.
The mapping between P and M, E and S, and k and Raw, uncompressed formats, such as BMP, pro-
K is possible because we can consider all the compo- vide the biggest space for secure steganography, but
nents in Fig. 3 as bit sequences and then realize a their obvious redundancy would arise Wendy’s suspi-
relation between the co-respective bit sets. cion (in fact, why someone would have to transmit big
The unifying model results as a steganographic uncompressed files when he can strongly reduce their
one with the addition of a new element: the key image size through compression? (Fridrich et al., 2002)).
K. It gives the unifying model the cryptographic func- Thus, ISC embedding algorithm must yield a com-
tionality we are searching for, preserving its stegano- pressed stego image, in particular we choose to pro-
graphic nature. duce a JPEG file, because it is the most widespread
The unifying model embedding process yields S image format.
exploiting not only C’s bits but also K’s ones (see While the output of the embedding process is a
Sect. 4.1): this way of proceeding gives Alice the JPEG image (as we noted above), the inputs are: the
chance to embed the secret message M (that is, the secret message bit sequence, an image C, and an im-
plaintext) into the cover image C (as every common age K. C and K can be either uncompressed images
steganographic system) encrypting M by the key im- (e.g., BMP) or compressed ones (e.g., JPEG), in ad-
age K (as a classical cryptographic system) at the dition they can be either distinct images or the same
same time. At the receiver side, Bob will be able to image.
4. Where random() returns a real in [0, 1). Re-
turned values are chosen pseudorandomly with (ap-
proximately) uniform distribution from that range.
Notice that we must avoid to produce zero coeffi-
cients otherwise we would be unable to extract them
at the receiver side (see Sect. 4.2).
Once the embedding algorithm terminates, we can
proceed with stegoAC[] Huffman coding and even-
tually we obtain a JPEG image S as similar as possible
to C. We can embed into S a number of bits equal to
min(length(coverAC[]), length(keyAC[])).
Figure 5: ISC embedding process. We have experimentally determined that we can
hide in a JPEG image a message of size about 14%
of the JPEG file dimension. Clearly the more amount
The embedding process will be a modification of of information we embed into S the more S will result
the JPEG encoding scheme. First of all, we subdivide different from C.
C in a set of 8 x 8 pixel blocks and compute the Dis-
crete Cosine Transform (DCT) on each block obtain- 4.2 ISC Extracting Process
ing a set of DCT coefficients; then they are quantized.
After quantization, DC coefficients and AC zero The ISC extracting process is very simple and con-
coefficients are discarded. The remaining AC nonzero sists in a comparison between S nonzero AC coeffi-
coefficients are stored in a vector called coverAC[], cients (stegoAC[]) and K nonzero AC coefficients
that is a signed integer array. We have to repeat the (keyAC[]). In order to obtain these two sets of coeffi-
previous list of operations for the key image K obtain- cients we perform a Huffman decoding step followed
ing keyAC[], a signed integer array as coverAC[]. by the quantized AC coefficients extraction (see Fig.
Now, in order to yield the stego image S, we are 6).
able to modify coverAC[] according to the following
Em1 embedding algorithm. We will call stegoAC[]
the modified coverAC[] array.
Embedding Algorithm Em1.
Input: coverAC[], keyAC[], message bit array M
Output: stegoAC[]
for every bit M[i] of the message array M
if (M[i] == 1) // we want to codify a 1
if (coverAC[i] and keyAC[i] are both even or
both odd numbers)
if(coverAC[i] == 1) stegoAC[i] = 2
else if(coverAC[i] == -1) stegoAC[i] = -2
else Figure 6: ISC extracting process.
if(random() < 0.5)
stegoaAC[i] = coverAC[i] - 1; Once the extraction is finished we compute the
else following Ex1 extracting algorithm:
stegoaAC[i] = coverAC[i] + 1; Extracting Algorithm Ex1.
end if Input: stegoAC[], keyAC[]
else // M[i] = 0, we want to codify a 0 Output: message bit array M
if (coverAC[i] and keyAC[i] are one equal
and one uneven) for every coefficient stegoAC[i]
if(coverAC[i] == 1) stegoAC[i] = 2 if (stegoAC[i] and keyAC[i] are both even or both
else if(coverAC[i] == -1) stegoAC[i] = -2 odd)
else M[i] = 0;
if(random() < 0.5) else
stegoaAC[i] = coverAC[i] - 1; M[i] = 1;
else end if
stegoaAC[i] = coverAC[i] + 1; end for
end if
end if Images C and K depicted in Fig. 5 are two well
end for known stereo images (the University of Tsukuba’s
5. Stereo Image Pair). In fact, the key image idea de- following one-way relations RK, RS, and RM:
rives from stereo vision: if you imagine the extracting RK
process is a correlation algorithm, the secret message keyAC[] − k1 , k2 , ..., kt
−→
M could be seen as a disparity map between S and K, RS
stegoAC[] − c1 , c2 , ..., ct
→
the embedding process as a sort of inverse correlation.
RM
M[] −→ m1 , m2 , ..., mt
−
The last relation RM is simply the relation of
5 ISC PERFORMANCE equivalence since both M[] and m1 , m2 , ..., mt are bit
sequences.
For finding RK we have to transform keyAC[] in
In this section we will present ISC performance with
a bit sequence through two further relations RK1 and
respect to both steganography and cryptography. We
RK2:
first demonstrate that ISC has optimum cryptographic
RK1 RK2
performance, by proving that it is equivalent to Ver- keyAC[] − → keyEO[] − → k1 , k2 , ..., kt
− −
nam cipher (Menezes et al., 1996), and then compare
ISC steganographic performance with respect to the RK1 maps each AC coefficient keyAC[i] over a bi-
well known F5 algorithm (Westfeld, 2001). nary alphabet and store the corresponding bit value in
keyEO[i] trough the rule:
if keyAC[i] is even
5.1 ISC Cryptographic Performance keyEO[i] = 0
else
The Vernam Cipher. The Vernam cipher is a keyEO[i] = 1.
symmetric-key cipher defined on the alphabet A = end if
{0, 1}. A binary message m1 , m2 , ..., mt is operated on RK2 is the relation of equivalence between
by a binary key string k1 , k2 , ..., kt of the same length KeyEO[] and k1 , k2 , ..., kt . RK results as the combi-
to produce a ciphertext string c1 , c2 , ..., ct where ci = nation of RK1 and RK2.
mi ⊕ ki , for 1 ≤ i ≤ t and ⊕ is the XOR operator. We can repeat the above procedure for finding RS
The ciphertext is turned back into plaintext simply in- as a combination of RS1 and RS2, i.e.,
verting the previous procedure, i.e., mi = ci ⊕ ki , for RS1 RS2
1 ≤ i ≤ t. stegoAC[] −→ stegoEO[] −→ c1 , c2 , ..., ct
− −
If the key string is randomly chosen and never Let us use RS1 on coverAC[] in order to obtain
used again, the Vernam cipher is called a one-time coverEO[] identical to stegoEO[] (note that initially
pad. stegoAC[] is equal to coverAC[]).
One-time pad is theoretically unbreakable: if a
RS1
cryptanalyst has a ciphertext string c1 , c2 , ..., ct en- coverAC[] −→ coverEO[]
−
crypted using a random key string which as been
Now we transform Em1 in order to work with bit
used only once, the cryptanalyst can do no better then
sequences, obtaining the algorithm Em2:
guess at the plaintext being any binary string of length
t. To realize an unbreakable system requires a ran- Embedding Algorithm Em2.
dom key of the same length as the message (Shannon, Input: coverEO[], keyEO[], M[]
1949). Output: stegoEO[]
for every bit M[i] of the binary array M[]
Equivalence between Vernam Cipher and ISC. if (M[i] == 1)
Let keyAC[] and coverAC[] be two arrays contain- if (coverEO[i] ⊕ keyEO[i] == 0) (1)
ing the AC nonzero coefficients extracted from the stegoEO[i] = coverEO[i] ⊕ 1 (2)
key image K and the cover image C respectively. end if
Let stegoAC[] be an array initialized identical to end if
coverAC[] (stegoAC[] will be modified during the else //M[i] = 0
embedding process because it will store the change if (coverEO[i] ⊕ keyEO[i] == 1) (3)
needed by coverAC[]). stegoEO[i] = coverEO[i] ⊕ 1 (4)
Let M[] be a binary array containing all the end if
bits from the secret message M and let us suppose, end else
for the sake of simplicity, that length(keyAC[]) = end for
length(coverAC[]) = length(M[]). We want to find the
6. Lines 1,2,3, and 4 perform (in the binary domain) bit planes of an image because they overwrite visual
the same operations made by algorithm Em1. Table 1 structures; statistical attacks consist in measure dis-
shows the truth table for every input feasible by algo- tortions in the DCT coefficients’ frequency histogram
rithm Em2. produced by embedding.
Table 1: Truth table for algorithm Em2.
F5 Algorithm. The F5 steganographic algorithm
M[i] keyEO[i] coverEO[i] stegoEO[i] was introduced by Andreas Westfeld in 2001 (West-
0 0 0 0 feld, 2001). The goal of his research was to de-
0 0 1 0 velop concepts and a practical embedding method for
0 1 0 1 JPEG images that would provide high steganographic
0 1 1 1 capacity without sacrificing security (Fridrich et al.,
1 0 0 1 2002).
1 0 1 1 Instead of replacing the least-significant bit of a
1 1 0 0 DCT coefficient with message data, F5 decrements
1 1 1 0 its absolute value in a process called matrix encod-
ing. As a result, there is no coupling of any fixed
You can notice that bold values correspond to the pair of DCT coefficients, meaning the χ2 -test (Provos
truth table for ci = mi ⊕ ki . Since M[] corresponds to and Honeyman, 2003; Westfeld and Pfitzmann, 1999)
the Vernam plaintext m1 , m2 , ..., mt (by virtue of RM), cannot detect F5 (χ2 -test measure the probability a
keyAC[] corresponds to the Vernam key k1 , k2 , ..., kt DCT coefficients’ frequency histogram is the product
(by virtue of RK1 and RK2), and stegoAC[] corre- of a steganographic process).
sponds to the Vernam ciphertext c1 , c2 , ..., ct (by virtue F5 uses a permutative straddling mechanism to
of RS1 and RS2) we can conclude asserting: scatter the message over the whole cover medium.
ISC embedding process and Vernam cipher en- The permutation depends on a key derived from a
crypting step are equal. password.
The proof of equivalence between ISC extracting Moreover, F5 (as ISC) embeds data in JPEG im-
process and Vernam cipher decrypting step is trivial. ages thus resulting immune against visual attacks be-
Let us transform algorithm Ex1 in order to work cause it operates in a transform space (i.e., the fre-
with M[], keyEO[], and stegoEO[]. quency domain) and not in a spatial domain.
Algorithm Ex2. Comparison between F5 and ISC. In order to re-
Input: stegoEO[], keyEO[] alize a meaningful comparison between ISC and F52 ,
Output: keyEO[] we must embed the same message m into the same
cover image c using both ISC and F5. After embed-
for every bit stegoEO[i] of stegoEO[] ding, we have two stego images: SF5 produced by F5
M[i] = stegoEO[i] ⊕ keyEO[i] and SISC generated by ISC. Both SF5 and SISC present
end for a DCT coefficients histogram different from the c’s
original one. What we are interested in is to com-
Since Ex2 is identical to the Vernam cipher de- pare the amount of modifications introduced by F5
crypting step (mi = ci ⊕ ki , for 1 ≤ i ≤ t), we have that and ISC.
ISC extracting process and Vernam cipher decrypting Figure 7 shows the result of such comparison ob-
step are equal. tained using a JPEG cover set Cset of 20 images (1024
Eventually, ISC and Vernam cipher are equivalent. x 768, average size 330 KB). In every image of Cset
we have embedded a canto from Dante’s Divina Com-
5.2 ISC Steganographic Performance media (about 5 KB for each canto) with a JPEG qual-
ity factor set to 80. Only for ISC, we also used the
The ISC steganographic performance will be mea- images of Cset as key images.
sured by comparing it with the well known F5 algo- The mean difference (in percentage) for every AC
rithm (Westfeld, 2001). In order to do this, we will coefficient in the interval [−8, 8] is shown on the y-
compare the statistical behaviour of these two algo- axis in Fig. 7, in particular the black columns rep-
rithms on the same input set. This will demonstrate resent the differences introduced by F5 embedding
that ISC withstands both visual and statistical attacks step while the white ones correspond to the number
(Westfeld and Pfitzmann, 1999): visual attacks mean
that one can see steganographic messages on the low 2 release 11+
7. Thus, if the statistical tests used to examine an im-
age for steganographic content are known, ISC is ro-
bust to them because ISC uses the remaining redun-
dant bits to correct statistical deviations created by the
embedding step, as suggested in (Provos and Honey-
man, 2003).
6 ISC FOR IMAGE SEQUENCES
The image based steganographic system illustrated in
Figure 7: F5 and ISC comparison.
Fig. 4 requires the receiver (Bob) must posses K (i.e.,
the key image) in order to get M (i.e., the secret mes-
of modifications yielded by ISC embedding process. sage). If Alice sends Bob the key image K together
As one can notice, the respective difference values are with the stego image S, Wendy could uncover the
comparable. steganographic communication simply applying ISC
Em1 is a simplified version of ISC, because actu- extracting process.
ally ISC spreads M over the entire stego image, yield- A na¨ve solution consists in creating a reserved
ı
ing the same embedding density everywhere. In doing image database shared by Alice and Bob. If Alice and
this, ISC neither uses permutative straddling nor ma- Bob use a new key image for every new message they
trix encoding, but simply divides the nonzero coeffi- send each other, ISC is a theoretically secure crypto-
cients array in blocks of the same length. If necessary, graphic algorithm (a sort of ”photographic” one-time
only one of the coefficients in each block is modified. pad). Unluckily, sooner or later, Alice and Bob will
be forced to reuse a key image already sent (the image
Furthermore, ISC presents an on-line mechanism
database is not infinite).
for correcting the statistical deviations created by the
embedding step. If the message length is sufficiently A reasonable (and more practical) solution is
short (i.e., it is less than the number of AC nonzero co- shown in Fig. 8 and 9. Instead of sending a single
efficients), ISC transforms useless coefficients in or- image, Alice can send Bob a sequence of JPEG im-
der to restore the original statistical properties charac- ages (called stego sequence in Fig. 8). In this way,
terizing the cover medium. Alice and Bob can communicate each other sharing
only a secret password p (that is, a sort of crypto-
As an example, if ISC transforms an AC coeffi-
graphic symmetric key). In a similar way it is possible
cient from -1 into -2, when it encounters the first un-
to implement the extracting process, as represented in
used -2, it transforms this value in -1 in order to re-
Fig. 9.
equilibrate the histogram. Naturally, the more infor-
The above introduced password p must be shorter
mation we embed in the cover image, the less ISC can
than the length of M because p must be as simple
correct the introduced modifications.
as possible (as required by the Kerckhoffs’ desider-
ata (Kerckhoffs, 1883)). Thus the password p will be
Breaking F5 Fridrich and her group presented a used as input for a pseudorandom number generator
steganalytic method that does detect images with (PRNG) function, in order to produce a message M(p)
F5 content (Fridrich et al., 2002). They estimated as long as the message we want to embed (as required
the cover image histogram from the stego image by the Vernam cipher).
and compared statistics from the estimated histogram M(p) together with the images of the stego se-
against the actual histogram. quence will be used for generating every key image
As a result, they found it possible to get a mod- Ki (see Fig. 8). ISC yields the stego sequence (i.e.,
ification rate that indicates if F5 modified an image. a set of stego images Si ), through an iterative process
F5 can be defeated because it can only decrement shown in Fig. 8.
DCT absolute value, giving the chance of predicting Only the first image I1 of the sequence is sent
the histogram value for the stego image. On the con- without any steganographic content.
trary, ISC can increase or decrease DCT absolute val- Bob is able to recover the set of messages sent by
ues indifferently (see algorithm Em1). The decision Alice without sharing with her any image but only
between these two possibilities are random for default knowing the secret password p (see Fig. 9).
but can also be taken depending on image properties Since p is used as a seed for the PRNG and since
and statistics. p is reused for every new message, the ISC algorithm
8. quence is ”unbreakable in practice” (Menezes et al.,
1996).
7 Conclusion
In this paper we have presented a novel method for
integrating in an uniform model cryptography and
steganography. We have proven that the presented
ISC algorithm is both an effective steganographic
method (we made a comparison with F5) as well as
a theoretically unbreakable cryptographic one (ISC is
an image based one-time pad).
The strength of our system resides in the new con-
cept of key image. Involving two images (the cover
and the key) in place of only one (the cover) we
are able to change the cover coefficients randomly.
This opportunity does not give a steganalytic tool the
chance of searching for a predictable set of modifica-
tions.
The proposed approach has many applications in
hiding and coding messages within standard medias,
Figure 8: ISC for JPEG sequences (embedding step). such as images or videos. As future work, we intend
to study steganalytic techniques for ISC and to extend
ISC to mobile video communication.
REFERENCES
Fridrich, J., Goljan, M., and Hogea, D. (2002). Steganalysis
of jpeg images: Breaking the f5 algorithm. In Proc.of
In 5th International Workshop on Information Hiding.
Johnson, N. F. and Jajodia, S. (1998). Exploring steganog-
raphy: Seeing the unseen. Computer, 31(2):26–34.
Kerckhoffs, A. (1883). La cryptographie militaire. Journal
des Sciences Militaries, 9th series(IX):5–38.
Kharrazi, M., Sencar, H. T., and Memon, N. (2004). Im-
age steganography: Concepts and practice. In WSPC
Lecture Notes Series.
Menezes, A., van Oorschot, P., and Vanstone, S. (1996).
Handbook of Applied Cryptography. CRC Press.
Provos, N. and Honeyman, P. (2003). Hide and seek: An
introduction to steganography. IEEE SECURITY &
PRIVACY.
Shannon, C. E. (1949). Communication theory of secrecy
system. Bell Syst. Tech. J., 28:656–715.
Simmons, G. J. (1984). The prisoners’ problem and the
Figure 9: ISC for JPEG sequences (extracting step). subliminal channel. In Advances in Cryptology: Pro-
ceedings of Crypto 83, pages 51–67. Plenum Press.
Westfeld, A. (2001). F5-a steganographic algorithm: High
for image sequence is not theoretically secure, but it capacity despite better steganalysis. In Proc. 4th Int’l
is equivalent to the Vernam cipher that uses a pseudo- Workshop Information Hiding, pages 289–302.
random key. Westfeld, A. and Pfitzmann, A. (1999). Attacks on stegano-
Likely, since we can assume Wendy has a limited graphic systems. In Proc. Information Hiding 3rd Int’l
Workshop, pages 61–76.
computational power we can assert ISC for image se-