Monday, February 25, 2019
Implementation of Lsb Steganography and Its Evaluation for Various File Formats
Int. J. Advanced Networking and Applications slew 02, Issue 05, Pages 868-872 (2011) 868 Implementation of LSB Steganography and its paygrade for Various File Formats V. Lokeswara Reddy Department of CSE, K. S. R. M. College of Engg. , Kadapa, A. P. India netmail emailprotected com Dr. A. Subramanyam Dept. of CSE, AITS, Rajampet, Y. S. R. (Kadapa) Dist.. A. P. Dr. P. Chenna Reddy Dept. of CSE, JNTUCE, Pulivendula, Y. S. R. (Kadapa) Dist.. A. P. ABSTRACT-Steganography is derived from the Greek word steganos which literally agent Covered and graphy means Writing, i. e. toped writing. Steganography refers to the science of in microscopical communication. For hiding secret training in assorted file initialises, at that place exists a super variety show of steganographic techniques some atomic reduce 18 much than complex than others and all of them hasten various(prenominal) strong and swooning points.The Least Signifi stopt turn (LSB) embedding technique suggests that entropy john be secret in the least(prenominal) signifi fagt checks of the comprehend flesh and the human eye would be unable to nonice the secluded number in the cover file. This technique atomic number 50 be utilise for hiding builds in 24-Bit, 8-Bit, Gray scale order. This paper explains the LSB Embedding technique and Presents the valuation for various file formats. Keywords Steganography, Least Significant Bit (LSB), GIF, PNG, BMP. -Date of Submission 24, deluxe 2010 Date of Acceptance 08 November 2010 are transferred through unknown cover mailmans in much(prenominal) a manner that the very humankind of the implant subjects is undetectable. Carriers acknowledge realises audio, video, schoolbook or any other digitally represented enter or transmission. The hidden put across may be plaintext, cipher text or anything that can be represented as a secondment stream.II. IMAGE STEGANOGRAPHY Image coalescence techniques are extensively utilise in steganogra phy. Among the two types of anatomy conglutinations, lossy compression and loss less compression lossless compression formats offer to a greater extent promises. lossy compression compression may non importanttain the authentic externalizes integrity. lossless compression maintains the overlord depiction selective learning exactly, hence it is prefered. Example of Lossy compression format is JPEG format files. Examples of Lossless compression formats are GIF3 and BMP formats.We have calld an 8-bit range of a function size for implementation of our steganography. Improvement in stegnographic techniques is practise it workable to apply the notice LSB Steganography in Colour and Gray- Scale Images which were trammel to decrepit scale images in the initial stages The difficulty in blazon images control is solved later on in many techniques such(prenominal) as the analysis of the variation of the gradient energy. The secret essence infix in the tar uprise image is dete cted in both gray and colour images, and the length of the embedded message is estimated 5, 6. -I. INTRODUCTION Digital gist is now posing formidable challenges to content developers, aggregators, distri exclusivelyors and users. The destruction, extraction or modification of the embedded message is required to develop more robust systems so that the digital content processing and organization becomes easy. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been certain to encrypt and decrypt selective information in order to keep the message secret.Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. The shift from cryptography to stegnography is delinquent to that concealing the image existence as stegno-images enable to embeded the secret message to cover images. Steganography conceptually implies that the message to be transmitted is not visible to the informal eye. Steganography has been used for thousands of years to transmit info without being intercepted by unwanted viewers.It is an art of hiding selective information inside information. The main object of Steganography is mainly concerned with the protection of contents of the hidden information. Images are nonpareil for information hiding1,2 be stool of the gravid fall of redundant space is created in the storing of images. dark messages Int. J. Advanced Networking and Applications Volume 02, Issue 05, Pages 868-872 (2011) III. HIDING METHODS IN IMAGE STEGANOGRAPHY In Image Steganography, There are a variety of methods victimization which information can be hidden in images.Least Significant Bit Replacement technical schoolnique In image steganography almost all data hiding techniques try to alter insignificant information in the cover image. Least significant bit (LSB ) insertion is a common, simple climax to embedding information in a cover image. For instance, a simple contrivance proposed, is to place the embedding data at the least significant bit (LSB) of for each one picture element in the cover image7,8,9 . The altered image is called stego-image. Altering LSB doesnt substitute the quality of image to human perception but this avoidance is sensitive a variety of image processing attacks like compression, cropping and so onWe will be emphasizing more on this technique for the various image formats. Moderate Significant Bit Replacement Technique The have significant bits of each pixel in the cover image can be used to embed the secret message. This method improves sensitivity to modification, but it degrades the quality of stego-image. Experiments have shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision. IV. THE LSB technique The least signi ficant bit i. e. the eighth bit inside an image is changed to a bit of the secret message.When using a 24bit image, one can store 3 bits in each pixel by changing a bit of each of the red, green and blue colour components, since they are each represented by a byte. An 800? 600 pixel image, can therefore store a total standard of 1,440,000 bits or 180,000 bytes of embedded data. As an example, suppose that we have three adjacent pixels (9 bytes) with the RGB encoding. 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 11001011 When the number 300, can be which binary representation is 100101100 embedded into the least significant bits of this part of the image.If we deal these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in see-through have been changed) 10010101 00001100 11001000 10010111 00001110 11001011 10011111 00010000 11001010 Here the number 300 was embedded into the grid, only if the 5 bits needed to be changed accordi ng to the embedded message. On average, only half(a) of the bits in an image will need to be modified to blur a secret message using the maximum cover size. Since there are 869 256 possible intensities of each primary colour, changing the LSB of a pixel results in small changes in the intensity of the influence.The human eye cannot distinguish these changes thus the message is successfully hidden. With a well-chosen image, one can in time hide the message in the LSB without noticing the difference10. Fig. 1 Block plot for implemented Logic of LSB embedding V. DESIGN DETAILS This section focuses on algorithms Steganography and Steganalysis10 A. algorithmic program for concealment (Steganography) 1. 2. 3. Read the original image and the image which is to be hidden in the original image Shift the image to hide in the cover image by X bits. And the original image or cover image with 240 which is 11110000 So four MSBs crop to 0.Because of this only four LSBs considered further. The shifted hidden image and the result of pervert 3 are bitored. This makes changes only in the X LSB bits so that the image is hidden in the original image. of LSB 4. In MATLAB we convert it to unit8 format. This image can be called as the stego image B. Algorithm for Steganalysis 1. The stego image is bit shifted by 4 bits since it was shifted by 4 bits to insert it into the original image. 2. The image is the ANDED with 255 i. e. , 11111111, which gives the original image. It is ANDED with 255 because initially all the LSBs were made 0.Now it is recovered back. 3. To get it to Unit8 format we, convert it back to unit8 which is the extracted image. Int. J. Advanced Networking and Applications Volume 02, Issue 05, Pages 868-872 (2011) that a message is being passed is being achieved. C. LSB in GIF 870 Fig. 2 Block draw for Steganalysis VI. IMAGE ANALYSIS A. LSB in BMP The BMP file format also called electronic image or DIB file format (for device-independent bitmap), is an imag e file format used to store bitmap digital images. Since BMP is not widely used the doubt might arise, if it is transmitted with an LSB stego.When image are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message can be stored in the LSB of one colour of the RGB value or in the similitude bit of the entire RGB value. A BMP is capable of hiding quite a large message. LSB in BMP is most suitable for applications, where the focus is on the occur of information to be transmitted and not on the secrecy of that information. If more number of bits is altered, it may result in a big opening move that the altered bits can be seen with the human eye.But with the LSB the main objective of Steganography is to pass a message to a receiver without an intruder even knowing that a message is being passed is being achieved. B. LSB in PNG man-portable Network Graphics (PNG) is a bitmapped image format that employs lossless data compression. PNG was created to improve upon and replace GIF. Since PNG is widely used the suspicion might not arise if it is transmitted with an LSB stego. When images are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image.The message can be stored in the LSB of one colour of the RGB value or in the parity bit of the entire RGB value . A PNG is capable of hiding quite a large message. LSB in PNG is most suitable for applications where the focus is on the mensuration of information to be transmitted and not on the secrecy of that information. If more number of bits is altered it may result in a larger possibility that the altered bits can be seen with the human eye. But with the LSB the main objective of steganography i s to pass a message to a receiver without an intruder even knowingGraphics interchange format also known as GIF is one of the machine independent level formats for storing images. Since GIF images only have a bit depth of 8, amount of information that can be hidden is less than with BMP. Embedding information in GIF images using LSB results in almost the same results as those of using LSB with BMP. LSB in GIF is a very efficient algorithm to use when embedding a reasonable amount of data in a grayscale image. GIF images are indexed images where the colours used in the image are stored in a pallette.It is sometimes referred to as a colour lookup table. Each pixel is represented as a single byte and the pixel data is an index to the colour palette. The colours of the palette are typically ordered from the most used colour to the least used colours to reduce lookup time. Some extra sustentation is to be taken if the GIF images are to be used for Steganography. This is because of the problem with the palette approach. If the LSB of a GIF image is changed using the palette approach, it m ay result in a completely different colour. This is because the index to the colour palette is changed.The change in the resulting image is noticeable if the adjacent palette entries are not similar. But the change is not noticeable if the adjacent palette entries are similar. Most applications that use LSB methods on GIF images have low security because it is possible to detect even moderate change in the image. Solutions to these problems could be 1. carve up the palette so that the colour difference betwixt consecutive colours is minimized 2. Add new colours, which are visually similar to the alive colours in the palette. 3. Use Gray scale images.In a 8 bit Gray scale GIF image, there are 256 shades of gray. This results in gradual changes in the colours and it is hard to detect. VII. EXPERIMENTED RESULTS Following experimental results highlights on 8 bit LSB Steganography. A. Results for . png image 8 bit stego image Int. J. Advanced Networking and Applications Volume 02, Is sue 05, Pages 868-872 (2011) 871 B. Results for . bmp file 8 bit stego image PSNR is measured in decibels (dB). PSNR is a good measure for comparing income tax return results for the same image, but between-image comparisons of PSNR are meaningless.MSE and PSNR value for each file format is shown in table 1. Table 1 Image quality rhythmic pattern for bmp file Cover image 224. 948 24. 6100 Stego image 244. 162 24. 2540 Cover- Stego image 69. 826 29. 690 MSE PSNR Stego Recovered IX. evaluation OF DIFFERENT TECHNIQUES There are many steganographic algorithms available. One should select the stovepipe available algorithm for the given application. Following characteristics are to be evaluated duration selecting a particular file format for Steganography. Steganography says that the secret message is to be hidden and it should result in an distortion less image.The distortion must not be visible to the human eye. The amount of data embedded in the image also plays an important role . The algorithm decides how much amount of data could be embedded in the image resulting in a distortion less image. Steganalysis is the technique of detecting the hidden information in the image. The algorithm for Steganography must be such that the steganalysis algorithms should fail. i. e the Steganography algorithms must not be prune to attacks on steganalysis. During communication the intruder could check the original image to remove the hidden information..He/she may manipulate the image. This utilization may include cropping or rotation etc of the images. The utilisations done may cause the image distortion. Steganographic algorithms chosen must be such that it overcomes such manipulation and the steganographic data reaches the destination in the required format. VIII. EVALUATION OF IMAGE tone of voice For comparing stego image with cover results requires a measure of image quality, normally used measures are Mean-Squared Error, invoice Signal-to-Noise Ratio3 and histogra m. A.Mean-Squared Error The mean-squared geological fault (MSE) between two images I1(m,n) and I2(m,n) is M and N are the number of rows and columns in the enter images, respectively. Mean-squared error depends strongly on the image intensity scaling. A mean-squared error of 100. 0 for an 8-bit image (with pixel values in the range 0-255) looks portentous but a MSE of 100. 0 for a 10- bit image (pixel values in 0,1023) is barely noticeable B. Peak Signal-to-Noise Ratio Peak Signal-to-Noise Ratio (PSNR) avoids this problem by scaling the MSE according to the image range Int. J.Advanced Networking and Applications Volume 02, Issue 05, Pages 868-872 (2011) Table 2 resemblance of LSB technique for various file formats LSB LSB LSB In BMP in GIF In PNG function Distortion less High Medium High resultant image Invisibility Steganalysis detection Image manipulation Amount of embedded data Payload capacity Independent of file format X. CONCLUSION Since BMP uses lossless compression, LSB makes use of BMP image. To be able to hide a secret message inside a BMP file, one would require a very large cover image. BMP images of 800? 600 pixels found to have less web applications.Moreover such uses are not accepted as valid. For this reason, LSB Steganography has also been developed for use with other image file formats. Although only some of the main image steganographic techniques were discussed in this paper, one can see that there exists a large selection of approaches to hiding information in images. All the major image file formats have different methods of hiding messages, with different strong and weak points respectively. LSB in GIF images has the potential of hiding a large message, but only when the most suitable cover image has been chosen.High number 1 kickoff High High Low Medium Low Low Medi um Medi um Low Medium Low Low Medium Medium High Authors lifetime 872 Steganography Seeing the Unseen, reckoner Journal, February 1998. 5 Li Zhi,Sui Ai Fen. , Detec tion of stochastic LSB Image Steganography The IEEE 2003 world-wide Symposium on Persona1,lndoor and Mobile Radio Communication Proceedings, 2004. 6 Jessica Fridrich, Miroslav Goljan, and Rui Du. , Detecting LSB Steganography in Color and GrayScale Images, IEEE Multimedia. 7 F. Collin,Encryptpic, http//www. winsite. com/bin/ Info? 500000033023. 8 G. Pulcini, Stegotif, http//www. geocities. om /SiliconValley/9210/gfree. html. 9 T. Sharp, Hide 2. 1, 2001,www. sharpthoughts. org. 10 Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs Implementation of LSB Steganography and Its Evaluation for Various Bits Digital Information Management, 2006 1st International conference. pp 173-178,2007. V. Lokeswara Reddy did his M. Tech (CSE) from SRM University, Chennai in the year 2005. He did his M. C. A from S. V. University, Tirupati in the year 2000. He is engage his Ph. D from JNTUA, Anantapur. He has a total of 09 years of experience in teaching. Currently he is working as Associate Professor at K.S. R. M College of Engineering, Kadapa. He has presented 2 papers in International and field Conferences. Dr. A. Subramanyam received his Ph. D. degree in Computer Science and Engineering from JNTU College of Engineering, Anantapur. He has obtained his B. E. (ECE) from University of Madras and M. Tech. (CSE) from Visweswaraiah Technological University. He is having 17 years experience in teaching. He is currently working as Professor & HOD in the Department of Computer Science and Engineering of Annamacharya Institute of Technology & Sciences, Rajampet, Y. S. R. (Kadapa) Dist. A. P.He has presented and published number of papers in International and National Conferences, International and National Journals. He is guiding few Ph. D. s. His research areas of interest are parallel processing, mesh topology security and data warehousing. Dr. P. Chenna Reddy did his B. Tech (CSE) from S. V. University College of Engineering, Tirupati in the year 1996. He did his M. Tech from JNTU , Anantapur. He completed his Ph. D from JNTU, Hyderabad. He has a total of 13 years of experience in teaching. Currently he is working as Associate Professor at JNTUA College of Engineering, Pulivendula, Y.S. R. (Kadapa) Dist. , A. P. He has number of publications to his credit. References 1 Pfitzmann Birgit. Information Hiding Terminology, First International Workshop, Cambridge, UK, Proceedings, Computer Science, 1174. pp. 347-350, MayJune. 2 Westfield Andreas and Andreas Pfitzmann, Attacks on Steganographic Systems, Third International Workshop, IH99 Dresden Germany, October Proceedings, Computer Science 1768. pp. 61- 76, 1999. 3 Moerland, T. , Steganography and Steganalysis, Leiden Institute of Advanced Computing
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment