Академический Документы
Профессиональный Документы
Культура Документы
ABSTRACT
With the rise of internet most of the communication & information sharing is done over the web. The increasing unauthorized
access of confidential data, information security is most important. Thus a big issue is to reduce the chances of information
detection during transmission. Steganography is a process that involves hiding message in an appropriate carrier for example an
image. The carrier can be sent to receiver without anyone else knowing that it contain a hidden message. The initial aim of
steganography is how it is implemented. The objective of this review paper is to study various steganography techniques for
embedding the message and to communicate secretly using open channel.
Keywords: least significant bit , discrete cosine transform, stego-object, payload, PSNR.
1. INTRODUCTION
Digital data communication is an essential part of everyones life. Data communication has some problems such as internet
security so to avoid these problems, cryptography is among one of the methods. However, encryption results in a disordered
and confusing message and can attract eavesdroppers easily. The technique used to keep the contents of a message secret is
called steganography. Steganography methods overcome this problem by hiding the secret information behind a cover
media (video, audio or image) because the presence of information cannot be noticed by any attacker. The goal of
steganography is to keep the existence of a message secret [15].
Steganography is concealed writing. The word steganos means covered and graphial means writing[1] and is the
technique of hiding secret data within a cover media such that it does not draw the attention of an unauthorized person [5].
In ancient times, the data was protected by hiding it on the stomach of rabbits, on the scalp of the slaves. But todays most
of the people transmit the data in the form of text, image, video and audio over the medium . So, in order to transmit
confidential data safely, the multimedia object like audio, video, images are used as cover medium to hide data.
Using steganography, it embed a secret message inside a piece of unsuspicious information i.e cover object, this cover object
with object secretly embedded message is called stego-object [16] and send it without anyone knowing of the existence of
the secret message. Cryptography and steganography techniques are closely related where Cryptography scrambles the
message so that they cannot be understood. Steganography will hide the message so there is no knowledge of the existence
of the message in the very first place. So, both sciences can be combined to produce better protection of the message. Even,
when the steganography fails and the message is detected, it is still of no use as it is encrypted using cryptography
techniques[20]
Cover File
(Image, Video,
Audio)
Data to hide
(Text, Image,
Video, Audio)
Steganography
Stego File
Page 1
In embedding process, a key is often needed This can be in the form of public or private key so you can encode the secret
message with your private key and the recipient can decode it using your public key. In this way, it reduces the chance of a
third party attacker getting hold of the stego object and decoding it to find out the secret information.
IMAGE STEGANOGRAPHY
SPATIAL
DOMAIN
TRANSFORM
DOMAIN
Page 2
compression [8]. In DWT, secret messages are embedded in high frequency coefficients and it provides maximum
robustness.
FACTORS THAT AFFECTS A STEGANOGRAPHIC METHOD:
Here are some factors that determines how efficient and powerful a technique is are as follows[19]:
a)Invisibility or statistical undecteability (imperceptibility) of data : Human eyes cannot distinguish the difference
between original and stego image.
b) Capacity: maximum information that can safely be embedded.
c) Robustness:The amount of modification the stego medium can withstand before an adversary can destroy hidden
information
d) PSNR (Peak Signal to Noise Ratio): It is defined as the ratio between the maximum possible power ofa signal and the
power of corrupting noise that affects the fidelity of its representation [10,11]. This ratio is often used for image quality
measurement between the original image and a compressed image. The higher the PSNR,the better is the quality of the
compressed image. PSNR is measured in decibels.
e) MSE (Mean Square Error): It is the average squared difference between a reference image and a distorted image. An
Image steganography technique is efficient if it gives a low MSE. It is calculated or computed pixel-by-pixel by adding
up the squared differences of all the pixels and dividing by the total pixel count [12].
2. RELATED WORK
Stuti Goel et.al This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography,
Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography.The
LSB substitution algorithm is implemented in spatial domain, in this the payload bits are embedded into the least significant
bits of cover image to produce the stego-image whereas in DCT & DWT algorithm are implemented in frequency domain in
which the stego-image is transformed from spatial domain to the frequency domain and in this the payload bits are
embedded into the frequency components of the cover image. Then the performance and comparison of these three
techniques is evaluated on the basis of these parameters PSNR, MSE, Capacity & Robustness.[9]
G.Arun Karthick et.al this paper represents a new scheme which is hybrid in nature, it combines two distinct domains
1)Steganography(Combination of Image + cryptography) .
2) Image Fusion Fusing two images.
Steganography embeds the digital data message along with the media file where digital data may be text, image or hybrid.
Although both Cryptography and steganography techniques are combined to provide security in some criteria yet advanced
system of security is needed to share information without any interference. To overcome the real world problem, they
proposed a novel algorithm called StegFuse where cryptography and steganography is applied on two various types of
images, and then after applying steganographic technique both of these images are subjected to image fusion so as to get the
fused image. Wavelet transform technique is applied on both the image during fusion.
Prof.S.V.Kamble et.al This paper reviews stegnography based on digital image.Various Concepts and priniciple of
steganography is illustrated. Different embedding techniques such as LSB ,DCT, Huffman encoding [6], DWT embedding
method are generalized in this paper . Then the performance and specification of image steganography is discussed at last .
In An image based steganography that combines LSB, DCT, and compression techniques on the image to enhance the
security of the payload object.
Sneha Arora et.al (May2013) This paper proposed a new technique for the image steganography using edge detection
method for RGB images. There are many algorithms to hide data with precision level but they are also decreasing the
quality of the image. In this proposed study, the edges of an RGB image will be detected by scanning method using a 3x3
window, and then text will be embedded in to the edges of the color image. So by doing this not only high embedding
capacity will be achieved,but it also enhances the quality of the stego image from the HVS (human vision system).
Gowtham Dhanarasi et.al A block complexity analysis for transform domain image stegonagraphy is done in this paper.
The algorithm proposed here works on the wavelet transform coefficients which embed the secret data into the original
image. The technique implemented here is capable of producing a secret-embedded image that is indistinguishable from the
original image and to human eye. So this can be achieved by retaining the integrity of the wavelet coefficients at high
capacity embedding technique. This improvement to capacity-quality tradingoff interrelation is analyzed in done in
detailed.
H.B.Kekre et.al(June2014) In this paper the author has proposed a Hybrid Approach so as to secure digital images. The
proposed framework introduced is a combination of Information Hiding and Image Encryption. For Information Hiding,
four different methods of Multiple LSBs Algorithm are used in this paper and then they are evaluated. A number of
parameters are also used to evaluate the performance of the proposed framework. At last Experimental results show a good
performance.
Page 3
Inderjeet Kaur et .al The technique proposed is a combination of steganography and watermarking (TDSSW)which
provides copyright protection to the information being transmitted secretly over communication channel. The proposed
technique is a transform domain based technique. At end it was observed that the proposed technique comes up with good
PSNR (Peak Signal to Noise Ratio) value and enhanced Security.
S.Shanmugasundaram(March2014)
This proposed method here uses both Cryptography and Steganography to enhance the security of the message or payload.
Firstly, the secret message is encrypted using a RSA algorithm and then it is randomized using OAEP. After that this
encoded message is embedded in the bitmap cover image using frequency domain approach. So for embedding the
encrypted message, they initially used skin tone regions of the cover image are taken and then they are detected by using
HSV (Hue, Saturation, Value) model. Thereafter, a region from skin detected area is selected, which is called as cropped
region. In this the cropped region of secret message is embedded using DD-DWT (Double Density Discrete Wavelet
Transform). DD-DWT overcomes the shortcomings of DWT (like poor directional selectivity, Shift invariance, oscillations
and aliasing). Hence the image obtained after embedding secret message(i.e. Stego-image) is far more secure and it has an
acceptable range of PSNR. The terms of PSNR and robustness against various noises like (Poisson, Gaussian, salt and
pepper, translation, rotation etc.).
Johri and Asthana[13] They proposed a steganography technique in which the data is embedded using alteration
component technique. After that the, key and secret message will replace each pixel. Then for the security of stego-image
palette based image technique is applied by stretching process. At the receiver end, the receiver having the same secret key
applies destretching palette process on stego-image using alteration component extraction process to extract the data. This
technique used has higher capacity and better imperceptibility.
Swati and Mahajan [14] This paper proposed a secure image steganographic model by using RSA algorithm and LSB
substitution. In this method, firstly the secret data is encrypted using recipients RSA public key. After that each bit of the
encrypted message is inserted to the LSBs of image in different images so as to get the best cover image. The Best cover
image is the one that requires minimum number of LSB changes. When the receiver receives the stego-image it will extract
the message in the encrypted form and then it will decrypt it using its private key.
Subba Rao et al. [17] This paper presented an image steganography technique which randomizes the sequence of cipher
bits. Then they computed the suitability measure of various random sequences of the cipher bits against a given image and
select the random sequence closest to the image. After that they generated those random sequences by using L.F.S.R. They
then embed these random sequences of cipher bits into the image.
Velagalapalli et al. [18] This paper proposed a technique which is known as SteganPEG to hide data in jpeg images.
Performs JPEG compression on the data to be hidden. The method also uses a
new cryptography technique which is
known as Rotatocrypt to encrypt or decrypts data using rotations. A list called PassStore is created from the password
used. Later, encryption is done by right rotating the bits as guided by the value in PassStore.
Page 4
3.CONCLUSION
Ensuring data security is a big challenge for computer users. Businessmen, professionals, and home users all have some
important data that they want to secure from others. The ultimate aim of steganography is to hide the existence of message
in the cover medium. This paper, provides an overview on Steganography. Various embedding techniques on an image
steganography such as LSB in spatial domain, DCT & DWT in transform domain are discussed. The strength of the
steganographic technique depends mainly on three factors - robustness, imperceptibility level in the stego image, and
embedding capacity. This paper also provides a comparative table drawn from the literature.
References
[1]. Morkel T et al, An overview of image steganography, Proceedings of the fifth annual information security South
Africa conference (ISSA2005).
[2]. Hassan Mathkour, Batool Al-Sadoon, Ameur Touir, A New Image Steganography Technique, IEEE- 978-1-42442108-4/08/$25.00 2008.
[3]. Ge Huayong ,Huang ,Steganography and Steganalysis Based on Digital Image, International conference & signal
Processing-2011 IEEE
[4]. Arvind Kumar, Km. Pooja, Steganography- A Data Hiding Technique, International Journal of Computer
Applications (0975 8887), Volume 9, No.7, November 2010.
[5]. K B Raja, R.K.Chhotary, K.B.Shiva Kumar, Coherent Steganography using Segmentation and DCT, IEEE 2010.
[6]. Mamta Sharma, Compression Using Huffman Coding , IJCSNS International Journal of Computer Science and
Network Security, VOL.10 No.5, May 2010,pp 133-141
[7]. Johnson, N.F and Jajodia, S., Exploring Steganography:Seeing the Unseen, Computer Journal, February 2008.
[8]. Blossom kaur1, Amandeep kaur2 and Jasdeep singh,Steganographic approach for hiding image in dct domain
International Journal of Advances in Engineering & Technology, July 2011.
[9]. J.R. Krenn, Steganography and Steganalysis,January 2004.Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs,
Implementation of LSB Steganography and its Evaluation for Various Bits, 2004.
[10]. http://en.wikipedia.org/wiki/Peak_signal-tonoise_ratio Peak Signal to Noise Ratio
[11]. http://wiki.answers.com/Q/What_is_psnr_in_steganography PSNR in Steganography
[12]. http://tdistler.com/iqa/algorithms.htmlMean Square Error
[13]. S. Johri., An Adaptive Steganography Technique for Gray and Colored Images, Journal of Global Research in
Computer Science, vol. 3, pp. 41-45, 2012.
[14]. S. Tiwari, R. P. Mahajan, and N. Shrivastava, Steganography-an Approach for Data Hiding Based on Encryption and
Lsb Insertion, IJECCE, vol. 3, pp. 76-83, 2012
[15]. Arvind Kumar, Km. Pooja SteganographyA Data Hiding Technique,International Journal of Computer
Applications (0975 8887),Volume 9,No.7, November 2010.
Page 5
[16]. Jagvinder Kaur and Sanjeev Kumar, Study and Analysis of Various Image Steganography Techniques IJCST Vol.2,
Issue 3, September 2011
[17]. Y. V. Rao, S. S. Rao, and N. R. Rekha, Secure Image Steganography Based on Randomized Sequence of Cipher
Bits, in Proc. IEEE Eighth International Conference on Information Technology: New Generations, 2011, pp. 332335.
[18]. V. L. Reddy, A. Subramanyam, and P. C. Reddy, SteganPEG Steganography+ JPEG, in Proc. IEEE International
Conference on Ubiquitous Computing and Multimedia Applications, 2011, pp. 42-48.
[19]. P. Goel., Data Hiding in Digital Images: A Steganographic Paradigm, PhD Thesis, Indian Institute of Technology,
Kharagpur, 2008.
[20]. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad and Osamah M. Al-Qershi Image Steganography Techniques: An
Overview International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3) : 2012
Page 6