The document proposes two techniques for hiding messages in digital images using steganography. The first technique encodes a secret message using punctuation marks before embedding it in an image. The second uses a modified scytale cipher to arrange the message bits in a grid that is then linearly embedded. Both techniques add an extra layer of protection on top of embedding in the image. Examples are provided demonstrating applying each technique using S-Tools software and analyzing the original versus stego-images.
This document is a self-study seminar report on steganography presented by Abhishek Singh. It includes an introduction to steganography, its importance, and a literature review on different steganographic techniques. The introduction defines steganography as hidden writing and discusses why it is important for secret communications. The literature review covers steganography methods in text, audio, images, and networks. It also discusses steganalysis, applications of steganography, and how it compares to cryptography.
This document discusses a steganography project developed using C# that allows hiding information within image files. It provides an introduction to steganography and its importance. It then describes the software tools used, including C# and various namespaces. It outlines the project scope, requirements, and flowchart. It also includes code analysis and explanations of the encryption and decryption processes used to hide a file within an image without detection. Finally, it discusses future applications and concludes with thanking those who helped with the project.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
This document discusses steganography, which is hiding messages within seemingly harmless carriers or covers so that no one apart from the intended recipient knows a message has been sent. It provides examples of steganography in text, images, and audio, as well as methods used for each. These include techniques like least significant bit insertion and temporal sampling rates. The document also covers steganalysis, which aims to detect hidden communications by analyzing changes in the statistical properties of covers.
The document describes a technical seminar report on an adaptive LSB-OPAP based secret data hiding technique. It was submitted by Tejas.S, an undergraduate student of electronics and communication engineering at Amruta Institute of Engineering and Management Sciences, in partial fulfillment of the requirements for their bachelor's degree. The report discusses a new technique for embedding secret data into color or grayscale images using LSB substitution in an adaptive manner based on pixel intensity ranges. It aims to enhance embedding capacity and imperceptibility compared to traditional LSB techniques.
This document is a self-study seminar report on steganography presented by Abhishek Singh. It includes an introduction to steganography, its importance, and a literature review on different steganographic techniques. The introduction defines steganography as hidden writing and discusses why it is important for secret communications. The literature review covers steganography methods in text, audio, images, and networks. It also discusses steganalysis, applications of steganography, and how it compares to cryptography.
This document discusses a steganography project developed using C# that allows hiding information within image files. It provides an introduction to steganography and its importance. It then describes the software tools used, including C# and various namespaces. It outlines the project scope, requirements, and flowchart. It also includes code analysis and explanations of the encryption and decryption processes used to hide a file within an image without detection. Finally, it discusses future applications and concludes with thanking those who helped with the project.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
This document discusses steganography, which is hiding messages within seemingly harmless carriers or covers so that no one apart from the intended recipient knows a message has been sent. It provides examples of steganography in text, images, and audio, as well as methods used for each. These include techniques like least significant bit insertion and temporal sampling rates. The document also covers steganalysis, which aims to detect hidden communications by analyzing changes in the statistical properties of covers.
The document describes a technical seminar report on an adaptive LSB-OPAP based secret data hiding technique. It was submitted by Tejas.S, an undergraduate student of electronics and communication engineering at Amruta Institute of Engineering and Management Sciences, in partial fulfillment of the requirements for their bachelor's degree. The report discusses a new technique for embedding secret data into color or grayscale images using LSB substitution in an adaptive manner based on pixel intensity ranges. It aims to enhance embedding capacity and imperceptibility compared to traditional LSB techniques.
This document provides an overview of steganography. It defines steganography as hiding secret messages within other harmless messages to avoid detection by unauthorized parties. Various steganographic techniques are described, including hiding messages in digital files like images, audio, text and network protocols. Detection of steganography (steganalysis) and applications like digital watermarking and tamper proofing are also discussed. The document concludes by noting the importance of steganography and expectations for further advancement in the field.
This document is a synopsis submitted for a degree in bachelor of technology. It describes a project on audio steganography, where a secret message is hidden in a digital audio file. The synopsis includes an introduction describing the objective, benefits and scope of the project. It also includes sections on the encoding and decoding algorithms, flow charts, use case and data flow diagrams, and references.
Steganography is a technique for hiding secret messages within other non-secret files like images, audio or video. It works by making very small changes to parts of the file that are imperceptible to the human eye or ear. This allows secret messages to be transmitted in plain sight without detection. Some common steganography tools are SNOW, S-TOOLS and Camouflage which allow users to hide files within image, audio or document files and encrypt the data for security. Steganalysis is the analysis of files to detect the presence of hidden messages embedded using steganography.
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
This document describes an implementation of image steganography that uses two techniques - Five Modulus Method (FMM) and Least Significant Bit (LSB) substitution - to hide a secret image within a cover image. The secret image is divided into two halves, with the upper half embedded using FMM and the lower half using LSB substitution. A private stego-key is also used during embedding to make detection of the secret image more difficult. The quality of the embedded and extracted images is evaluated using PSNR and MSE metrics, with the results showing good visual quality.
This document discusses digital steganography, which is the process of hiding secret information within other non-secret files like images, text, audio, or video. It describes the history of steganography and some common techniques used, such as least significant bit modification in images and altering text features. The document also compares steganography to cryptography and digital watermarking, outlines some types and uses of steganography, and discusses steganalysis and the future of the field.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
The document summarizes a seminar presentation on steganography. It discusses the history of steganography from ancient Greece to modern digital techniques. It describes how steganography differs from cryptography in hiding information rather than encrypting it. The document outlines common steganography techniques like least significant bit insertion and the injection method. It provides examples of steganography applications for both legitimate uses like digital watermarking as well as illegitimate uses like corporate espionage. The presentation concludes that steganography can effectively hide sensitive information while cryptography provides additional security through encryption.
This document discusses steganography, which is the practice of hiding secret information within other information. It provides an introduction and history of steganography, describing how it has been used for centuries to hide messages. The document then discusses different types of steganography, including fragile steganography which embeds information that is destroyed if the file is modified, and robust steganography which aims to embed information that cannot easily be destroyed. It also describes the least significant bit (LSB) technique for hiding information in digital images by changing the LSB of pixels without affecting the appearance of the image. Examples are provided to illustrate how the LSB technique works.
Steganography is the art of hiding secret messages within other non-secret text, images, or other files. It works by embedding messages into the redundant or insignificant parts of cover files, like images or audio files. Modern steganography techniques hide data by making subtle alterations to things like the least significant bits of pixels in an image or by modifying phases in an audio file. Steganography provides a way to communicate covertly and anonymously, but detection is possible through statistical analysis or if the steganography algorithm is known. Steganography has various applications but is also used by criminals and terrorists seeking anonymity.
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document provides an overview of steganography, the art and science of hidden writing. It defines steganography as communicating in a way that hides the existence of a message. The document then discusses various digital and analog steganography techniques, including embedding messages in images, audio, video and other file types. It also covers the use of machine identification codes in printers, text encoding, and security schemes used to improve steganographic robustness.
The document provides an overview of steganography, including its definition, history, techniques, applications, and future scope. It discusses different types of steganography such as text, image, and audio steganography. For image steganography, it describes techniques such as LSB insertion and compares image and transform domain methods. It also provides examples of steganography tools and their usage for confidential communication and data protection.
Image steganography is the art of hiding information within digital images. The document discusses various techniques for image steganography including LSB (least significant bit) and DCT (discrete cosine transform). LSB is a simple spatial domain technique that replaces the least significant bits of image pixels with bits of a secret message. DCT operates in the frequency domain by transforming image blocks and hiding data in the mid-frequency DCT coefficients. The document compares the advantages and disadvantages of these techniques, and discusses their applications for hiding private information or digital watermarking. Metrics for analyzing steganography systems like bit error rate, mean square error, and peak signal to noise ratio are also introduced.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
Multimedia Steganography with Cipher Text and Compression
This document discusses steganography techniques for hiding secret messages in various media formats. It describes how to embed messages in text, audio, images, and video files. For text, it explains using data compression like Huffman coding. Audio steganography slightly alters the binary sequence of sound files. Image steganography uses lossless compression to maintain image integrity while embedding data. Video steganography conceals any file within a carrier video. Statistical analysis can detect hidden messages by analyzing frequency distributions in covered files for abnormal patterns introduced during encoding.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document discusses steganography, which is a method of hiding secret information within other information. It begins by providing background on the rise of the internet and the need for information security. It then explains steganography and how it differs from cryptography by not only encrypting messages but hiding their very existence. The document outlines various types of steganography, including techniques for hiding messages in text, audio, images, and video files. It notes some advantages and disadvantages of steganography and discusses the latest research on improving steganography detection.
This document provides an overview of steganography, including:
1) Steganography is the art of hiding information in plain sight so that the very existence of a hidden message is concealed. It works by embedding messages within images, audio, or other files.
2) Modern uses include digital watermarking to identify ownership, hiding sensitive files, and illegitimate uses like corporate espionage, terrorism, and child pornography.
3) Techniques include least significant bit insertion to replace bits in files, injection to directly embed messages, and generating new files from scratch. Detection methods like steganalysis aim to discover hidden information.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
This document provides an overview and implementation details of a Bit-Plane Complexity Segmentation Steganography (BPCS) technique. The technique allows for high capacity information hiding by replacing "noise-like
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
The document discusses how trade unions in Malaysia need to be stronger to better advocate for workers' rights and improve wages. It notes that currently, fewer than 4% of private sector workers are union members and only 2% are covered by collective bargaining agreements. Restrictive laws and oversight from the Department of Trade Unions have weakened the ability of unions to organize and negotiate effectively. The document argues that empowering independent and representative unions is key to achieving higher wages, greater productivity, and more inclusive economic policies to support Malaysia's goal of becoming a high-income nation.
This document proposes a new pixel indicator technique (PIT) for RGB image steganography. PIT hides secret data in two pixel channels based on an indicator in the third channel. It analyzes PIT using security and capacity measures and compares to other steganography methods. The technique uses the least two significant bits of one channel to indicate if data is hidden in the other two channels. It evaluates PIT by hiding data at different bit levels and analyzing the image histograms and visual differences. PIT shows promising results for security and capacity compared to other techniques like least significant bit and stego color cycle methods.
This document provides an overview of steganography. It defines steganography as hiding secret messages within other harmless messages to avoid detection by unauthorized parties. Various steganographic techniques are described, including hiding messages in digital files like images, audio, text and network protocols. Detection of steganography (steganalysis) and applications like digital watermarking and tamper proofing are also discussed. The document concludes by noting the importance of steganography and expectations for further advancement in the field.
This document is a synopsis submitted for a degree in bachelor of technology. It describes a project on audio steganography, where a secret message is hidden in a digital audio file. The synopsis includes an introduction describing the objective, benefits and scope of the project. It also includes sections on the encoding and decoding algorithms, flow charts, use case and data flow diagrams, and references.
Steganography is a technique for hiding secret messages within other non-secret files like images, audio or video. It works by making very small changes to parts of the file that are imperceptible to the human eye or ear. This allows secret messages to be transmitted in plain sight without detection. Some common steganography tools are SNOW, S-TOOLS and Camouflage which allow users to hide files within image, audio or document files and encrypt the data for security. Steganalysis is the analysis of files to detect the presence of hidden messages embedded using steganography.
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
This document describes an implementation of image steganography that uses two techniques - Five Modulus Method (FMM) and Least Significant Bit (LSB) substitution - to hide a secret image within a cover image. The secret image is divided into two halves, with the upper half embedded using FMM and the lower half using LSB substitution. A private stego-key is also used during embedding to make detection of the secret image more difficult. The quality of the embedded and extracted images is evaluated using PSNR and MSE metrics, with the results showing good visual quality.
This document discusses digital steganography, which is the process of hiding secret information within other non-secret files like images, text, audio, or video. It describes the history of steganography and some common techniques used, such as least significant bit modification in images and altering text features. The document also compares steganography to cryptography and digital watermarking, outlines some types and uses of steganography, and discusses steganalysis and the future of the field.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
The document summarizes a seminar presentation on steganography. It discusses the history of steganography from ancient Greece to modern digital techniques. It describes how steganography differs from cryptography in hiding information rather than encrypting it. The document outlines common steganography techniques like least significant bit insertion and the injection method. It provides examples of steganography applications for both legitimate uses like digital watermarking as well as illegitimate uses like corporate espionage. The presentation concludes that steganography can effectively hide sensitive information while cryptography provides additional security through encryption.
This document discusses steganography, which is the practice of hiding secret information within other information. It provides an introduction and history of steganography, describing how it has been used for centuries to hide messages. The document then discusses different types of steganography, including fragile steganography which embeds information that is destroyed if the file is modified, and robust steganography which aims to embed information that cannot easily be destroyed. It also describes the least significant bit (LSB) technique for hiding information in digital images by changing the LSB of pixels without affecting the appearance of the image. Examples are provided to illustrate how the LSB technique works.
Steganography is the art of hiding secret messages within other non-secret text, images, or other files. It works by embedding messages into the redundant or insignificant parts of cover files, like images or audio files. Modern steganography techniques hide data by making subtle alterations to things like the least significant bits of pixels in an image or by modifying phases in an audio file. Steganography provides a way to communicate covertly and anonymously, but detection is possible through statistical analysis or if the steganography algorithm is known. Steganography has various applications but is also used by criminals and terrorists seeking anonymity.
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document provides an overview of steganography, the art and science of hidden writing. It defines steganography as communicating in a way that hides the existence of a message. The document then discusses various digital and analog steganography techniques, including embedding messages in images, audio, video and other file types. It also covers the use of machine identification codes in printers, text encoding, and security schemes used to improve steganographic robustness.
The document provides an overview of steganography, including its definition, history, techniques, applications, and future scope. It discusses different types of steganography such as text, image, and audio steganography. For image steganography, it describes techniques such as LSB insertion and compares image and transform domain methods. It also provides examples of steganography tools and their usage for confidential communication and data protection.
Image steganography is the art of hiding information within digital images. The document discusses various techniques for image steganography including LSB (least significant bit) and DCT (discrete cosine transform). LSB is a simple spatial domain technique that replaces the least significant bits of image pixels with bits of a secret message. DCT operates in the frequency domain by transforming image blocks and hiding data in the mid-frequency DCT coefficients. The document compares the advantages and disadvantages of these techniques, and discusses their applications for hiding private information or digital watermarking. Metrics for analyzing steganography systems like bit error rate, mean square error, and peak signal to noise ratio are also introduced.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
Multimedia Steganography with Cipher Text and Compression
This document discusses steganography techniques for hiding secret messages in various media formats. It describes how to embed messages in text, audio, images, and video files. For text, it explains using data compression like Huffman coding. Audio steganography slightly alters the binary sequence of sound files. Image steganography uses lossless compression to maintain image integrity while embedding data. Video steganography conceals any file within a carrier video. Statistical analysis can detect hidden messages by analyzing frequency distributions in covered files for abnormal patterns introduced during encoding.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document discusses steganography, which is a method of hiding secret information within other information. It begins by providing background on the rise of the internet and the need for information security. It then explains steganography and how it differs from cryptography by not only encrypting messages but hiding their very existence. The document outlines various types of steganography, including techniques for hiding messages in text, audio, images, and video files. It notes some advantages and disadvantages of steganography and discusses the latest research on improving steganography detection.
This document provides an overview of steganography, including:
1) Steganography is the art of hiding information in plain sight so that the very existence of a hidden message is concealed. It works by embedding messages within images, audio, or other files.
2) Modern uses include digital watermarking to identify ownership, hiding sensitive files, and illegitimate uses like corporate espionage, terrorism, and child pornography.
3) Techniques include least significant bit insertion to replace bits in files, injection to directly embed messages, and generating new files from scratch. Detection methods like steganalysis aim to discover hidden information.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
This document provides an overview and implementation details of a Bit-Plane Complexity Segmentation Steganography (BPCS) technique. The technique allows for high capacity information hiding by replacing "noise-like
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
The document discusses how trade unions in Malaysia need to be stronger to better advocate for workers' rights and improve wages. It notes that currently, fewer than 4% of private sector workers are union members and only 2% are covered by collective bargaining agreements. Restrictive laws and oversight from the Department of Trade Unions have weakened the ability of unions to organize and negotiate effectively. The document argues that empowering independent and representative unions is key to achieving higher wages, greater productivity, and more inclusive economic policies to support Malaysia's goal of becoming a high-income nation.
This document proposes a new pixel indicator technique (PIT) for RGB image steganography. PIT hides secret data in two pixel channels based on an indicator in the third channel. It analyzes PIT using security and capacity measures and compares to other steganography methods. The technique uses the least two significant bits of one channel to indicate if data is hidden in the other two channels. It evaluates PIT by hiding data at different bit levels and analyzing the image histograms and visual differences. PIT shows promising results for security and capacity compared to other techniques like least significant bit and stego color cycle methods.
The document proposes a novel cryptic steganography scheme that integrates cryptography and steganography for improved information security. It uses MD5 encryption to encrypt a message, then separates the cipher text into three secret keys. One key has the original position of alphabetic and numeric characters. A second key embeds part of the cipher text into the image using LSB steganography. A third key is the reversal of the second. This scheme aims to minimize unauthorized data access by requiring knowledge of all three keys to retrieve the original message from the encrypted text and stego image.
The document summarizes an evaluation of different image-based steganography methods. It discusses how steganography works by hiding messages in digital carriers like images and audio files. Seven steganography methods were implemented that manipulate the least significant bits of pixel values or rearrange colors to encode hidden messages. The document also provides background on digital images, describing how they are composed of pixels indexed by x and y coordinates, and how spatial resolution and sampling affect image quality.
This document provides an overview and comparison of cryptography and steganography. Cryptography scrambles a message to make it unreadable, while steganography hides the message to make its very presence undetectable. Both techniques can be combined to enhance security. Cryptography has a long history dating back thousands of years, while steganography originated in ancient Greece. Modern techniques include public/private key cryptography, digital signatures, hash functions, and hiding messages in digital files like images, audio and video. The key difference is that cryptography fails if an enemy detects an encrypted message, while steganography fails if they detect the hidden message. Combining the two provides multiple layers of security.
Dokumen menjelaskan periode sastra Indonesia yang terbagi menjadi beberapa angkatan, yaitu pujangga lama, sastra Melayu lama, Balai Pustaka, pujangga baru, angkatan 1945, 1950-1960-an, 1966-1970-an, 1980-1990-an, reformasi dan 2000-an. Masing-masing angkatan memiliki ciri khas berdasarkan jenis karya sastra, aliran, dan kondisi sosial politik masa itu.
This document describes a method for integrating cryptography and steganography using image processing. It presents a system that can perform both steganography and cryptography simultaneously by embedding encrypted messages into digital images. The system uses the cover image and a key image to hide secret messages in a way that makes detection difficult. It is shown to be an effective steganographic technique that also provides theoretically unbreakable cryptography, equivalent to the Vernam cipher.
This document discusses digital steganography, which is a method of hiding secret messages within other digital data, such as images. It proposes using a new technique of image steganography that embeds encrypted data into the least significant bit of image pixel values using a hash function and RSA encryption for added security. The objectives are to develop a security tool to hide messages in digital media in a way that is not detectable by humans. It analyzes existing steganography methods and their disadvantages, then proposes a system using LSB substitution to replace pixel bit values with encrypted message bits to create a stego-image. The document outlines the modules, algorithms, advantages and future enhancements of the proposed digital steganography system.
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
1. The document presents a method for secure data transfer using delta steganography.
2. Delta steganography embeds secret data by replacing the differences between pixel values in the cover image, rather than the pixel values themselves.
3. This provides improved security over traditional LSB steganography as the secret data is scattered throughout the cover image in a non-sequential manner.
Image steganography in python with an eaSandeshGajmal
This document discusses image steganography techniques for hiding sensitive information. It describes three main methods for hiding information: cryptography, steganography, and watermarking. It focuses on steganography, which hides information by embedding it in another file, such as an image. Common image steganography techniques discussed are LSB substitution, blocking, and palette modification. LSB substitution replaces least significant bits in image pixels, blocking embeds data in discrete cosine transform coefficients, and palette modification replaces unused color palette entries. The document outlines applications, advantages, and limitations of steganography.
The document is a student project report on image steganography. It discusses using the least significant bit (LSB) method to hide information in digital images. The summary is:
1. It introduces steganography and LSB methods for hiding data in digital images by replacing the least significant bits of pixels.
2. Code is presented to embed a hidden message in an image by modifying pixels' LSBs and decoding the message from the stego image.
3. The report evaluates LSB steganography's advantages for covert communication but notes room for improving embedding capacity while maintaining secrecy.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
This document summarizes a technical seminar presentation on steganography. It introduces steganography as covert communication techniques that hide messages within other harmless media. It discusses the history of steganography dating back to ancient Greece. It then outlines the presentation sections on the problem statement, objectives, techniques like LSB algorithm, design phase with screenshots, results and discussion, and conclusion. The overall goal is securing data transmission by hiding messages in digital images.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
Image to Image Encoder using Least Significant BitYogeshIJTSRD
The purpose of “Image to Image Encoder†is to hide an image inside another image. Using the LSB method, which facilitates data hiding in an image. It works with JPEG and PNG formats for the cover image and always creates tiff encoded image due to its compression. Least Significant Bit Embeddings LSB are the general steganographic procedure that might be utilized to install information into a variety of digital media, the most studied applications are utilizing LSB embedding to hide one picture inside another. The security to keep up secrecy of message is accomplished by making it infeasible for a third individual to distinguish and recover the secret message. This method can be used in various fields for data security like for secret communication and data transfer via networks, for storing and transferring sensitive data and information in the defense sector. As the normal viewers can not identify the slight difference in the encoded image without the reference of the original cover image, this method ensures more security than cryptographic methods. Samthomas Raphael | Dr. Ganesh D "Image to Image Encoder using Least Significant Bit" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41253.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41253/image-to-image-encoder-using-least-significant-bit/samthomas-raphael
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Project presentation on Image Steganography using MATLAB. Project under Digital Design, Signals and Systems and Communication System.
Tool Used - MATLAB
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
Report
1. MESSAGE CONCEALMENT TECHNIQUES USING IMAGE BASED
STEGANOGRAPHY
by
Farhan Khan (G260214)
ABSTRACT
Image based Steganography is the most popular method for message
concealment. In this paper, two techniques are proposed for enhancing the message
secrecy using image based steganography. The first technique is based on the use of
punctuation marks to encode a secret message before embedding it into the image file.
The second technique is based on the use of modified scytale cipher to hide a secret
message in an image file. Both of these techniques have been implemented and tested
using the S-Tools software package. The original and stego-images both are shown for
the purpose of comparison.
Keywords: image based steganography, message concealment, LSB insertion
1. INTRODUCTION
Steganography as defined in [1] is the art of hiding information in ways that
prevent the detection of hidden messages. Steganography is a process that involves
hiding a message in an appropriate carrier e.g., an image, an audio or video file. The
carrier can then be sent to a receiver without anyone else knowing that it contains a
hidden message. [2] Literally meaning “covered writing”, it includes a wide range of
secret communication methods like invisible inks, microdots, character arrangement,
digital signatures, covert channels, spread spectrum etc. that conceal the very existence of
2. message. [1]. Cryptography and steganography are related to each other. The main
difference between cryptography and steganography is that cryptography scrambles the
message so that it becomes difficult to understand whereas steganography hides the very
existence of a message. Steganography plays the central role in secret message
communication. Several message hiding techniques have been developed and
implemented in the past using digital images, audio/video files and other media. [1] [2].
These include least significant bit insertion, masking, filtering and algorithmic
transformations to name a few.
In this paper, two new techniques are presented for hiding messages in image files
using punctuation marks and modified scytale cipher.[3] These techniques are based on
the simple idea of adding an extra layer of confusion before steganography by changing
the representation of message and hiding it in the embedded message in different ways.
These two methods are implemented using a popular steganography software S-Tools
which is based on LSB insertion.[4]
In the following sections, first a brief description of concepts and available
methods is presented followed by a detailed description of proposed techniques and their
implementation results.
2. IMAGE BASED STEGANOGRAPHY
Embedding a message into an image requires two files. The first is the innocent-
looking image that will hold the hidden information, called the cover image. The second
file is the message—the information to be hidden. A message may be plain-text, cipher-
text, other images, or anything that can be embedded in a bit stream. When combined, the
3. cover image and the embedded message make a stegoimage. A stego-key (a type of
password) may also be used to hide then later decode the message. Most steganography
software recommends the use of lossless 24-bit images such as BMP. The next-best
alternative to 24-bit images is 256-coloror gray-scale images. The most common of these
are GIF files. [1]
3. PREVIOUS WORK
[1] discusses three popular methods for message concealment in digital images
namely LSB insertion, masking and filtering and algorithmic transformations. LSB
insertion is a simple approach to embedding information in a cover file. It is vulnerable to
even a slight image manipulation. Image conversion from a format like GIF or BMP
which reconstructs the original message exactly (lossless compression) to a JPEG which
does not (lossy compression) and then back could destroy the information hidden in the
LSBs. LSB insertion can be performed in 24-bit, 8-bit or gray-scale images. Masking and
Filtering usually restricted to 24-bit and gray-scale images, hide information by marking
an image, in a manner similar to paper watermarks. Watermarking techniques may be
applied without fear of image destruction due to lossy compression because they are
more integrated into the image. Traditional steganography conceals information;
watermarks extend information and become an attribute of the cover image. Digital
watermarks may include such information as copyright, ownership, or license.
Algorithmic Transformation techniques like redundant pattern encoding, encrypt and
scatter etc. exist which use different approaches for concealing messages. In redundant
pattern encoding, a small message may be painted many times over an image so that if
the stegoimage is cropped, there is a high probability that the watermark can still be read.
4. In encrypt and scatter the data are hidden throughout an image. Scattering the message
makes it appear more like noise. Proponents of this approach assume that even if the
message bits are extracted, they will be useless without the algorithm and stego-key to
decode them.
[2] analyzes and evaluates seven different image based steganography methods
namely Steo1bit, Stego2bits, Stego3bits, Stego4bits, StegoColourCycle, StegoPRNG,
StegoFridrich. Stego1Bit method involves utilizing a single least significant bit of one of
the RGB bytes of a 24-bit image for message concealment. As the color value is not
changed much, it will not considerably alter the visual appearance of color and image.
Stego2Bits method involves utilizing two least significant bits of one of the RGB bytes of
a 24-bit image for message concealment. Although the capacity of data storage is 2 times
improved than Stego1Bit, the resulting image is degraded than Stego1Bit. Stego3Bits
method involves utilizing three least significant bits of one of the RGB bytes of a 24-bit
image for message concealment. Although the capacity of data storage is 3 times
improved than Stego1Bit, the resulting image is much degraded than Stego1Bit.
Stego4Bits method involves utilizing four least significant bits of one of the RGB bytes of
a 24-bit image for message concealment. Although the capacity of data storage is 4 times
improved, the resulting image is much degraded than Stego1Bit and color palette is
restricted to only 16 variations. StegoColourCycle method involves cycling through the
color values in each of the pixels in which to store the data. This means that the same
color is not constantly changed e.g., the first data bit could be stored in the LSB of the
blue value of the pixel, the second data bit in the red value and the third data bit in the
green value. Stego1BitPRNG method involves using a pseudo random number generator
5. to choose random pixels in which to embed the message. This will make the message bits
more difficult to find and reduce the existence of patterns in the image. StegoFridrich
method involves searching for the closest color to the color of the pixel which has the
correct parity for the bit to be hidden. The message is hidden in the parity bit of the RGB
values of close colors. For the color of each pixel into which a message bit is to be
embedded the closest colors in the palette are searched until a palette entry is found with
the desired parity bit. This technique does not change the palette in any way either by
ordering it or by increasing the colors in it.
[5] & [6] also present several methods for image based and multimedia based
steganography.
4. MESSAGE CONCEALMENT TECHNIQUES
The message concealment techniques proposed in this paper are described below:
4.1 Use of Punctuation marks
Although punctuation marks are used in normal written English, they are seldom
used in secretly embedded messages. The idea behind this technique is to utilize the
presence of punctuation marks like , ; : “ etc. in the text for encoding a secret message.
The message is encoded using any convenient character code like ASCII, Unicode. In all
the examples in this paper, ASCII code has been used. The secret message to be
communicated is hidden in any piece of text through binary encoding of punctuation
marks. Two punctuation marks can be used to represent binary data or several
punctuation marks can be used to represent binary combinations. The encoded message is
embedded in an image file (BMP, GIF or grayscale) using any of the popular methods
6. like LSB insertion etc. [1] An additional layer of secrecy can be added by first encrypting
the message and then encoding it through the use of punctuation marks before embedding
it in the cover image file. Only the recipient who knows how to interpret the punctuations
marks can retrieve the secret message.
Following are the steps for applying the above technique:
• Encode the given secret message using punctuation marks into the embedded
message
• Embed the message in a cover image to create a stego-image using some
transformation
• Extract the embedded message using the reverse transformation
• Decode the secret message from the embedded message
As an example of the above technique, consider the secret message “Pershing
sails from NY June 1”. The embedded message whose punctuation marks represent our
secret message is the following:
OFT, I had heard of Lucy Gray;
And, when I crossed the wild;
I chanced, to see, at break of day,
The solitary child,
No mate, no comrade; Lucy knew,
She dwelt, on a wide moor,
The sweetest thing; that ever grew,
Beside a human door;
You, yet may spy the fawn; at play,
The hare; upon the green,
But, the sweet face of Lucy Gray;
Will never more be seen,
"To-night, will be a stormy night--;
You, to the town must go;
And, take a lantern, Child to light;
Your mother through the snow";
"That, Father; will I gladly do,
'Tis scarcely afternoon--,
The minster-clock; has just struck two,
And, yonder is the moon!",
7. At this, the Father raised his hook;
And, snapped a faggot-band,
He plied his work;--and Lucy took,
The lantern, in her hand;
Not blither, is the mountain roe;
With, many a wanton stroke,
Her feet; disperse the powdery snow;
That rises up; like smoke,
The storm, came on before its time;
She wandered, up and down,
And, many a hill did Lucy climb;
But; never reached the town;
The wretched parents, all that night;
Went shouting, far and wide;
But, there was neither sound, nor sight;
To serve them for a guide;
At day-break, on a hill they stood;
That, overlooked the moor,
And, thence they saw, the bridge of wood,
A furlong from their door;
They wept,--and; turning homeward, cried,
"In heaven we all shall meet;"
--When in the snow, the mother spied,
The print of Lucy's feet;
Then, downwards from the steep hill's edge;
They tracked, the footmarks small,
And; through the broken hawthorn hedge;
And, by the long stone-wall,
And, then an open field they crossed;
The marks, were still the same;
They tracked them on, nor ever lost,
And; to the bridge they came;
They followed, from the snowy bank;
Those footmarks, one by one,
Into the middle, of the plank;
And; further there were none,
--Yet, some maintain; that to this day,
She is a living child;
That, you may see sweet Lucy Gray,
Upon; the lonesome wild,
O'er, rough and smooth she trips along;
And, never looks behind,
And; sings a solitary song;
That; whistles in the wind;
I WANDER'D, lonely; as a cloud,
That, floats on high o'er vales and hills;
When, all at once I saw a crowd;
A host, of golden daffodils;
Beside, the lake, beneath the trees;
Fluttering; and dancing; in the breeze,
Continuous, as the stars; that shine,
And; twinkle on the Milky Way;
They, stretch'd, in never-ending line;
Along, the margin; of a bay,
Ten thousand, saw I; at a glance,
Tossing their heads; in sprightly dance,
8. The waves, beside them danced; but they,
Out-did; the sparkling waves, in glee;
A poet, could not but be gay; 15
In, such a jocund company;
I gazed,—and gazed, —but little thought;
What wealth; the show to me; had brought,
For oft, when on my couch; I lie,
In, vacant, or in pensive mood; 20
They, flash upon that inward eye;
Which is, the bliss of solitude,
And; then my heart; with pleasure fills,
And, dances, with the daffodils;
In the above message, a comma(,) represents zero(0) and a semicolon represents
one(1). Scanning the message and substituting a comma by 0 and semicolon by 1 gives
the ASCII representation of the secret message. This prepared message is now embedded
in an image file to create the stego-image using S-Tools software package. The original
cover image is shown in Fig.1 and the stego image is shown in Fig. 2.
Figure 1. Original Cover Image (in BMP format)
Figure 2. Stego-Image containing secretly embedded message
The secret message is revealed by extracting the embedded message and applying
the decoding as explained above. The decoding of the embedded message reveals the
secret message “Pershing sails from NY June 1”.
9. 4.2 Modified Scytale Cipher
In cryptography, a scytale (rhymes with Italy, and also transliterated as skytale, in
Greek, a baton) is a tool used to perform a transposition cipher, consisting of a cylinder
with a strip of leather wound around it on which is written a message. The ancient Greeks
and the Spartans in particular, are said to have used this cipher to communicate during
military campaigns. The recipient uses a rod of the same diameter on which he wraps the
paper to read the message. It has the advantage of being fast and not prone to mistakes, a
necessary property when on the battlefield. [3]. Although Scytale cipher is easily broken,
it can be used in combination with image based steganography to perform message
concealment.
Following are the steps to carry out this technique of message concealment.
• Arrange a message on a rectangular array of some size e.g., 4x16 as shown in
Figure 3.
• Fill the remaining cells of the grid with arbitrary letters or numbers and note down
the row number and column number of the secret message.
• Embed this data array linearly in a cover image file.
A E I M Q U Y S A 1 5 9 D h l p
B F J N R V Z e r 2 6 a E i m q
C G K O S W 0 n m 3 7 b F j n r
D H L P T X 1 d y 4 8 c G k O s
Figure 3. A rectangular grid containing a secret message “Send Army” at (row,col)=(1,8)
10. Only the recipient who knows the grid size, row and column number can retrieve
the hidden message. In order to increase the level of confidentiality the message can be
encrypted using some encryption algorithm like AES and the cipher text as well as the
key can be arranged in different manner using two different grids. As an example of this
technique, consider the linear representation of above grid data using ASCII Code.
4145494D515559534131353964686C7042464A4E52565A657232366165696D714347B
4F5357306E6D333762666A6E7244484C505458316479343863676B6F73
Figure 4. Cover image (GIF format)
Figure 5. Stego-image containing embedded message
11. The secret message is revealed from the above message by extracting the hidden message
and applying the transformation as mentioned above.
5. S-TOOLS SOFTWARE PACKAGE
The software tool used in all the above experiments is S-Tools for Windows
Version 4.[4] It allows processing of GIF and BMP images and audio WAV files. S-
Tools applies the LSB method for image and audio files and also includes encryption
routines. The message to be embedded is first compressed. The compressed output is
then encrypted using IDEA using a stego-key and inserted into the low-order bits of each
color value. As observed in the above stego-images, the existence of the message is
almost invisible.
6. CONCLUSION
In this paper two techniques are described for message concealment using image
based steganography. Both of these techniques add an additional layer of confusion
before actually hiding the message into the cover image in order to make the message
revealment difficult against steganalysis. They have smaller capacity of storing bits of
message as compared to other image based steganography methods. The capacity of the
above mentioned techniques can be increased by efficient encoding of data or using
encryption. The advantage of these techniques is that they can be easily implemented
using any available steganography software package without any modification. Also both
of these techniques incorporate very simple ideas along with the use of available
software.
12. REFERENCES
[1] Neil F. Johnson, Sushil Jajodia, “Exploring Steganography, Seeing the Unseen,”
IEEE Computer Magazine, 1998.
[2] Kevin Curran, Karen Bailey, “An Evaluation of Image Based Steganography
Methods,” International Journal of Digital Evidence, Fall 2003 Voulme 2 Issue 2.
[3] Wikipedia, the Free Encyclopedia
http://en.wikipedia.org/wiki/Main_Page
[4] Andy Brown, S-Tools for Windows, Shareware, 1994
ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools3.zip
[5] Johnson Neil F., Zoran Duric, Sushil Jajodia, “Information Hiding, and Watermarking
- Attacks & Countermeasures,” Kluwer 2001.
[6] “Multimedia Security – Steganography and Digital Watermarking Techniques for
Protection of Intellectual Property, ” Idea Group 2005.