Академический Документы
Профессиональный Документы
Культура Документы
Shabnam Samima
Department of Computer Applications
National Institute of Technology
Durgapur, India
shabnam.samima@gmail.com
Ratnakirti Roy
Department of Computer Applications
National Institute of Technology
Durgapur, India
rroy.nitdgp@gmail.com
Suvamoy Changder
Department of Computer Applications
National Institute of Technology
Durgapur, India
suvamoy.nitdgp@gmail.com
AbstractSteganography is the science of hiding crucial
information in someinnocuous objects such that the mere existence
of the hidden information is unidentifiable in human sight. Various
unique methodologies have been implemented over time to hide
information using steganography. In most of the methodologies the
exact secret information is hidden inside the cover image in a way
that it is completely unrecognizable. Thus, if the embedding
mechanism is compromised, there is no way that the hidden
message can remain unexposed. Security of the secret information
can be enhanced if the actual secret message is not embedded in the
cover image at all. In this paper a novel approach to image
steganography through image realization has been proposed in
which, rather than sending the actual secret information some
mapping information of the secret information is embedded in the
stego image. The actual realization of the secret information is
secured using a multi layered secure pass key.
KeywordsImage Steganography; Pseudo random number
generator; Pairing Function; Matrix Encoding; Extraction Key
I. INTRODUCTION
Today the most convenient medium of communication is the
internet; it provides a common data sharing platform for
millions of people all over the world. Despite of the various
advantages provided by the web services, such as, easy data
transmission and sharing, the confidentiality of crucial data is
also under threat of being compromised. Data over internet
may be stolen, intercepted, illegally modified, tampered or
even destroyed by an adversary resulting in data loss, data
damage, data leakage, intellectual property rights
infringement. Hence it is extremely important to maintain the
privacy and confidentiality of the data while it is being
transmitted over the internet. To ensure secure transmission
the data over the internet it must be wrapped in an envelope
such that the content is only revealed to the intended recipient.
Data hiding techniques such as steganography [1] aim at
fulfilling such requirements in particular.
Steganography camouflages a message to hide its
existence and make it seem "invisible" thus concealing the fact
that a message is being sent altogether [2].
Carriers such as images, audio files, text files, videos can
be used as cover objects for information hiding. When the
message is hidden in the carrier a stego-carrier is formed and
the hidden message is called the payload. Images are a popular
choice as a cover due to their availability and pervasiveness in
daily applications. The primary goals of any steganography
method are: (i) high fidelity of the stego image (ii) payload
security.
In nearly all the image steganography techniques proposed
till date, the exact secret information is hidden in the cover
object. This makes the security of the payload entirely
dependent on the efficiency of the hiding technique. Once the
hiding technique is compromised almost nothing can be done
to prevent the payload from getting revealed to the adversary.
The security of the payload can be enhanced if the actual secret
message is not embedded in the cover at all. Instead of
embedding the secret message, a mapping information is
embedded which is apparently useless in the absence of a
decoding key. The key can be made strong enough to have a
very large key space making key decoding a tough job and thus
adds to the security of the system. Such a system of image
steganography can be termed as Image Realization
Steganography.
This paper proposes a steganography technique based on
Image Realization from a stego-image containing a cover to
secret mapping hidden using an efficient embedding technique
and secured using a strong decoding key. The proposed method
thus focuses on covert communication without transmitting the
actual secret message and also emphasizes on how a strong key
based security can be imposed on the payload, making it secure
against accidental exposure to an adversary.
II. RELATED RESEARCHES
Very few works can be found in literature which
emphasize on the security of the payload in case of accidental
exposure to an adversary and far less is the work done in
Image Realization Steganography where a stego image does
not contain the actual hidden data but contains only a mapping
of the cover image and the secret message. The mapping itself
is of no use to an adversary as the actual decoding (secret
message realization) is based on a secret key which is agreed
upon by the sender and the receiver beforehand. However,
some of the works which might be considered relevant to the
current context is presented next.
The simplest method of hiding the data is pure LSB based
steganography. In this mechanism the bits of image are
embedded at the least significant bit position of pixel values.
BMP as well as GIF based steganography applies LSB
techniques [3], while their resistance to statistical attacks and
compression are reported to be weak [4]. The algorithm is
simple to implement. It has a drawback that if the attacker
removes the least significant bits of image then our message
will be lost.
Wang et al. [5] proposed a data hiding scheme. Instead of
embedding the data in the least-significant-bit (LSB) of the
host image, they proposed embedding the data in the
moderately-significant-bit (MSB) (the fifth bit) of the host
image. Here, the MSB is called the first bit while the LSB is
called the eighth bit. With the use of the optimal substitution
process and local pixel adjustment process, the image quality
of the resulting stego-image is much better than that of the
simple replacement method. Similarly, C.C Changet al., [6]
have proposed an image steganography technique which offer
highembedding capacity and bring less distortion to the stego
image. The embedding process embedbits of secret bit stream
on the stego image pixels. Instead of replacing the LSB of
every pixel,this method replaces the pixel intensity with
similar value.
In the method proposed by Po-Yueh Chen et al., [7]
proposed an image steganography scheme which fixes the
limitation ofsteganography technique proposed in [6]. The
limitation of [6] is falling of boundary problemwhich means
the pixel which is located for embedding will become unused;
since it exceeds themaximum intensity level which is greater
than 255 (maximum gray scale intensity). Fewer bits areadded
even on such pixels which improve the embedding capacity
without compromising PSNRin this technique.
Secure Skin Tone based Steganography [8] embeds data
within skin region of image using a DWT based embedding
scheme. The authors claim the method to be secure with
respect to detection through steganalyzers but there is no
scope for the preserving the confidentiality of the payload
once the embedding scheme is compromised.
JSteg [9] was the first publicly available steganographic
system for JPEG images. Its embedding algorithm
sequentially replaces the least-significant bit of DCT
coefficients with the messages data. The algorithm does not
require a shared secret; as a result, anyone who knows the
steganographic system can retrieve the message hidden by
JSteg.
The F5 algorithm [10] embeds message bits into randomly-
chosen DCT coefficientsand employs matrix embedding that
minimizes the necessary number of changes toembed a
message of certain length.
III. PROPOSED METHOD
The proposed mechanism can be divided into two phases
namely, Phase I and Phase II. The first phase deals with cover
to secret message mapping, key generation and the actual
embedding while the latter phase implements the extraction
procedure.
A. Phase I
1) Map Generation
Mechanisms such as chaotic mapping, shuffling of the secret
information can be a very useful technique to ensure the
security of the secret information.
Another possibility of mapping is possible by using simple
mathematical operations such as addition, subtraction, division,
etc to generate the mapping matrix. Here in this proposed
algorithm the operation used is subtraction. The mapping
procedure is as follows:
Let C
i
denote any plane of an RGB image. Then C
i
must be
any one of C
r
(red plane), C
g
(green plane) and C
b
(blue plane).
Let S be the secret information. For mapping image plane C
i
, is
converted into equal blocks of multiple of the secret
information size. Let C
min
denote the block with minimum
difference with S. The mapping operation is mathematically
expressed as follows:
C
mn
S = H (1)
where C
min
L C
i
and C
i
e {C
r
, C
g
, C
b
}, M is the mapping
matrix and @ is the mapping operator used. The overall map
generation technique is shown below.
Figure 1: Map Generation Technique
2) Key Generation
The proposed algorithm also emphasizes on the generation
of the extraction key. The key is generated in 4 stages using
the Cantor pairing function mechanism [11] which is also
reversible. The large key space used by the generated key
ensures that the probability of discovering the right key is
negligible which enhances its security factor.
Let aandbare two integers. The pairing of these two values
can be evaluated as follows:
b = P(o, b) (2)
P(o, b) = (o + b -2) -
o + b - 1
2
+ o (S)
where h is the generated paired value and P (a,b) is the pairing
function.
The actual key generation mechanism works as follows:
Let (x, y) and (i, ]) denotes the location of the mapping
matrix and the size of the secret information. Let P
prng
be the
key for the pseudo random number generation.
P(x, y) = k
1
P(i, ]) = k
2
P(k
1
, k
2
) = k
3
P(k
3
, P
png
) = K (4)
where K is the final extraction key.
During the extraction of the secret information the final
extraction key K can be reversed using the following
technique:
c = _2b -
1
2
_ (S)
Now we define c as,
c =
1
2
c(c + 1) (6)
Using (2), (5) and (6) the original values of a and b are
retrieved as follows:
o = b -c (7)
b = c - o +2 (8)
3) Actual Embedding
The embedding mechanism works on the spatial domain.
In the embedding algorithm the actual secret image is not
being embedded instead, an optimized mapping matrix is used
for embedding in other two planes of the cover image. The
actual embedding is done using a high efficiency embedding
scheme such as Matrix Encoding [12].
The key is being generated using pairing function. After
the completion of the embedding procedure the resultant stego
image is sent to the receiver along with the secret key details
for extraction purpose. The details of the embedding algorithm
are as follows:
Input: Any suitable cover image, an image or a text file to be
hidden into the cover image.
Output: A stego image with the secret information hidden
inside it.
Algorithm:
Step 1: Extract one plane of the cover image (here considering
the red plane), say C
r
.
Step 2: Convert the extracted plane C
r
into multiple of the
secret image.
Step 3: Break the C
r
into blocks. Let the number of blocks be
N.
Step 4: For i=1 to N
H: = C
S
where C