Академический Документы
Профессиональный Документы
Культура Документы
Abstract— S teganography is a major research area for cycle methods [4] etc. Gutub et al. [5] describes the pixel
hiding secret messages. In this paper we propose a novel indicator technique where one channel is used to locate the
steganography technique by manipulating varying number of channel to store data. In RGB image steganography, the
bits of the cover image. The algorithm stores varying number of
colour intensity (values of R-G-B) is used to decide the
bits in each channel depending on the intensity value of the
cover image. This provides maximum capacity for every cover
number o f b its to store in each pixel. Channel contains lower
image with minimal visible distortion from the original cover value is used to store higher bit values around 5 bits. The
image. We also propose a new encryption technique using PNG channel that contains higher value is used to store minimu m
lossless decompression. 3 bit of data [5].
Pixel indicator technique is proposed in [5] and RGB
Keywords—Steganograph; PNG decompression; RSA intensity based variable-b its image steganography is
algorithm; PSNR value. addressed in [6]. The pixel indicator technique uses the least
two significant bits of one of the channels fro m Red, Green
I. INT RODUCT ION AND RELAT ED W ORK
or Blue as an indicator for existence of data in the other two
Cryptography is the field of technology for hiding channels. The indicator channels are chosen in sequence,
informat ion. It hides and encrypt the informat ion in such a with R being the first.
way that a third party who has access to the hidden and The disadvantage of the algorith m in [5] is that the
encrypted data cannot reconstruct. Unfortunately it is not capacity depends on the indicator bits and based on the cover
enough in today’s world. It is now also become necessary to image, the capacity can be very low. A lso, the algorithm in
keep the existence of the message secret from outside world. [5] uses fixed number of bits per channel (2 b its) to store
Basically it deals with embedding info rmation to be hidden data and the image may get distorted if more bits are used
in a given media (cover media) without making any visible per channel. The RGB intensity based variable-bits image
changes to that cover med ia. The message-embedded image steganography [6] technique uses one of the three channels
is known as stego image [2]. A secret key Steganography as the indicator. The indicator sequence can be made
system (Fig.1) is similar to a symmetric cipher, where the random, based on a shared key between sender and receiver.
sender chooses a cover and embeds the secret message into Instead of storing a fixed nu mber of data-bits per channel,
the cover using a secret key. If the secret key used in the number of b its to be stored will depend on the color value of
embedding process is known to the receiver, using the the channel. The lower the value, the higher the data-bits to
reverse process the secret message can be extracted [3]. be stored. Therefore a partit ion of the color values is needed.
The optimal partition may depend on the actual cover image
Key Key used.
The disadvantage of the algorith m in [6] is that the
capacity depends of the indicator channels and based on the
value of the channel, the capacity is higher than previous
Message algorith m but as one channel is used as an indicator the full
Cover (C)
Message Embedding Stego-Object Extracting (M) utilization of cover image is not possible.
(M) (E) (D) The algorithm we p ropose in this paper, does not suffer
fro m these problems. Our algorithm guarantees a maximu m
capacity for every cover image and the nu mber of bits stored
in each channel varies depending on the intensity. This can
Fig.1 Secret key steganography
give very high capacity for some of the cover images. In
section III, we present experimental results supporting our
Image based secret key steganography uses images as
claim. In Sect ion II we show that 5 b it man ipulation of low
the cover media. Several methods have been proposed for
RGB values (less that 32) are also possible and it has a
image based steganography, LSB being the simplest one.
minimu m effect on human eye. Also the encryption
Techniques involving bit map images (RGB images) as cover
procedure we propose is novel and it uses PNG losses
med ia use single or mult i-channel hid ing, RNG or co lour
decompression, which reduces actual file size.
Encryption Decryption
Sender Receiver
Stego image
Create a hash map of
maximum occurrence
of bit values
STEGO IM AGE
Embed hash map
RSA PUBLIC KEY
inside the chosen cover
image Extract bits of encrypted files
and create the encrypted file
of .png format
-13-
ICETACS 2013
imageCapacity(image)
A. Message encryption technique
In this step, we convert the secret message file to a .png lengthImage length(image)
image. PNG uses lossless decompression algorith m wh ich widthImage width(image)
reduces its size and encrypt it. We use a map which will
contain maximu m occurrence of byte values of the secret for j 0 to lengthImage
message. Then the map is encrypted using public encryption
for i 0 to widthImage
algorithm (i.e., RSA).
pixel getPixelValue(i, j)
Encryption Algorithm:
1. Read each byte of the specific file (value range is -128
to 127). red (pixel >> 16) & 0xff
8. Encrypt the map using RSA algorithm. else if(32<= green && green <=63)
-14-
ICETACS 2013
files.rar 12,27,646 bytes(1.17 MB- Disk size) 12,28,446 bytes(1.17 MB– Disk size)
-15-
ICETACS 2013
-16-
ICETACS 2013
IV. CONCLUSION
In this paper, we introduce a new idea of image based
steganography, where variab le nu mber b its are stored in each
channel. Our algorith m uses RGB values of each pixel of
cover image to decide number of data bits to store. User has
the option to choose the image and check whether it is
possible to insert secret message inside the selected cover
image. Th is approach leads to very high capacity with low
Fig.7 Histogram of stego image
visual distortions. Also we propose another way of secret
message encryption which includes both symmetric and
asymmetric encryptions. Future works may be done to
improve our variable b its algorithm such as other encryption
technique can be used or giving better structure of our
algorithm be useful in the industry level.
REFERENCES
[1] N. Provos, P. Honeyman “An introduction to steganography,”
IEEE Security & Privacy M agazine, Vol. 1, Issue 3, pp. 32-
44, 2003.
a) b) [2] H. A. Jalab, A. A. Zaidan, B. B. Zaidan, “New Design for
Information Hiding with in Steganography Using Distortion
Fig.8 a) Original cover image (800877 bytes) b) Stego image with PSNR Techniques,” International Journal of Engineering and
values 44.1071 Technology (IJET)), ISSN: 1793-8236, Vol 2, No. 1, pp. 72-
77, 2010.
So based on our experimental results we have observed [3] K. Bailey, K. Curran, “An evaluation of image based
that the changes in cover images after inserting the secret steganography methods using visual inspection and automated
message is minimal but there is a little change in h istograms. detection techniques,” M ultimedia Tools and Applications,
Vol. 30 , Issue 1, pp. 55-88, 2006.
The PSNR values of the images are very satisfactory. The
[4] A. Gutub, M . Ankeer, M . Abu-Ghalioun, A. Shaheen, and A.
images in Fig.5 (a) (cover image) and Fig.5 (b) (Stego Alvi, “Pixel indicator high capacity technique for RGB image
image) are quite similar, but the histograms of both images based Steganography,” in the proceedings of 5th IEEE
(Fig.6 and Fig.7) are different. Also if we consider Fig.8 (a) International Workshop on Signal Processing and its
(cover image) and Fig.8 (b ) (Stego image), the images are Applications(WoSPA 2008), University of Sharjah, Sharjah,
U.A.E., 2008.
similar, whereas the histograms (Fig.9, Fig.10) are little [5] M . T. Parvez and A. A. A. Gutub, “RGB Intensity Based
different. Variable-Bits Image Steganography ,” in the proceedings of
Asia-Pacific Services Computing Conference, pp. 1322 –
1327, 2008.
[6] N. Jain, S. M eshram, S. Dubey, “ Image Steganography Using
LSB and Edge Detection Technique,” International Journal of
Soft Computing and Engineering (IJ SCE), ISSN: 2231-2307,
Volume-2, Issue-3, 2012.
[7] X. Luo, Q. Cheng, J. Tan, "A Lossless Data Embedding
Scheme For M edical in Application of e- Diagnosis," in the
proceedings of the 25th Annual International Conference of the
Fig.9 Histogram of original image IEEE Engineering in M edicine and Biological Society, pp.852-
855, 2003.
-17-