Hiding in encrypted images: a three tier security data hiding technique (original) (raw)
Related papers
Data hiding in scrambled images: A new double layer security data hiding technique
Computers & Electrical Engineering, 2014
The contemporary multimedia and communication technology has made it possible to replicate and distribute digital media easier and faster. This ease of availability causes the problem of exposing transmitted digital data on the network with the risk of being copied or intercepted illegally. Many cryptographic techniques are in vogue to encrypt the data before transmission to avert any security problems. However, disguised appearance of the encrypted data makes the adversary suspicious and increases the chances of malicious attack. In such a scenario data hiding has received significant attention as an alternate way to ensure data security. This paper presents a data hiding technique based on the concepts of scrambling and pseudorandom data hiding; to provide a data hiding system with two layer security to the embedded data, and good perceptual transparency of the stego images. The proposed system uses the novel concept of embedding the secret data in scrambled (encrypted) cover images. The data embedding is carried out in the Intermediate Significant and least significant bit planes of encrypted image at the predetermined locations pointed to by Pseudorandom Address Space (PAS) and Address Space Direction Pointer (ASDP). Experimental results prove the efficacy of scheme viz-a-viz various parameters of interest.
Data Security Through Data Hiding in Images: A Review
Objective: This paper proposes a new data hiding method to improve the security for data hiding. Method: This method first maps the cover image into a 1D pixel sequence and then divides it into non-overlapping blocks containing two successive pixels for embedding. It then calculates the difference between the two pixel values for the blocks. It then compares the difference with a reference table. The reference table is referred in every iteration for the comparison of pixel value differences and the range it falls in. This leads to the calculation of the number of bits which can be embedded in that particular block. Findings: The embedded pixels are then modified and their difference is calculated and compared with the range table. If the difference falls in same range, the embedded pixels are used as modified pixels, and if the difference does not fall in the same range, the pixels are modified such that the difference falls in the appropriate range. Extraction of the data is done in the same way to get the covert data. Application/Improvements: Experimental results show that this method enhances embedding rate while preserving the stego image quality.
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
http://www.ijesi.org/, 2015
The rapid development of data transfer through the Internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with a new technique steganography to hide encrypted confidential data within images. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This paper intends to give a brief idea about the new image steganographic approach that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image.
Multiple Meliorated Security Using Steganography Embedded with Watermarking and Cryptography
2016
One of the most important factors of information technology and communication is the security of information. Steganography is the method through which the very existence of the message can be kept secret. Various security mechanisms have been developed by integrating steganography with cryptography. This involves encrypting any file (piece of information data) through cryptography and encapsulating the same in another such file (carrier or container image) and then securing it with a secret key. Among the various algorithms available for steganography, LSB algorithm is the simplest and comparably more reliable. It involves modifying the LSB of the pixels of an image with the encrypted message bits such that the basic characteristics and underlying properties of the carrier remain unchanged. However the techniques should be robust enough to prevent detection and removal of embedded data. Hence we propose to embed steganography with watermarking. Watermarking is establishing the iden...
Enhancing Data Security by using Crypto-Steganography in Image
2011
In this paper, actually we will present a technique of secure data transmission through hiding of data in image file by replacing it’s one of the LSB bit. The watermarked bit embedded into image sample to increases the robustness against noise hence by combining cryptography and steganography we will increases the security of data.
High Embedding Capacity Data Hiding Technique Based on EMSD and LSB Substitution Algorithms
IEEE Access
Data hiding called steganography is a security technique to protect secret data throughout the transmission from malicious attackers. The purposes of steganography are to obtain good stego-image quality, high embedding-capacity, low computational complexity, visual imperceptibility, undetectability, and more security. In this paper, we offer a new hybrid image steganography technique based on least significant bit (LSB) substitution and enhanced modified signed digit (EMSD) algorithms. The proposed algorithm utilizes n adjacent cover image pixels to hide the secret data with EMSD algorithm, and least significant k-bit for LSB substitution algorithm. Hence, it has more embedding capacity than the EMSD algorithm and exploiting modification direction (EMD) based algorithms. We obtain that the stego-image quality is better than 43 dB when the payload is 2.404 bpp. The results of experiment represent that this algorithm ensures high embedding-capacity while preserving acceptable visual stego image quality that can be undetectable by human eyes. Also, the hybrid of the EMSD and LSB substitution algorithms is to difficult for malicious people to consolidate data by scrambling secret data bits. INDEX TERMS Data hiding, data security, exploiting modification direction (EMD), enhanced modified signed digit (EMSD), generalized exploiting modification direction (GEMD), least significant bit (LSB), sparse modified signed digit (SMSD).
A Robust Method For Encrypted Data Hiding Technique Based On Neighborhood Pixels Information
2007
This paper presents a novel method for data hiding based on neighborhood pixels information to calculate the number of bits that can be used for substitution and modified Least Significant Bits technique for data embedding. The modified solution is independent of the nature of the data to be hidden and gives correct results along with un-noticeable image degradation. The technique, to find the number of bits that can be used for data hiding, uses the green component of the image as it is less sensitive to human eye and thus it is totally impossible for human eye to predict whether the image is encrypted or not. The application further encrypts the data using a custom designed algorithm before embedding bits into image for further security. The overall process consists of three main modules namely embedding, encryption and extraction cm.
On the Information Hiding Technique Using Least Significant Bits Steganography
Steganography is the art and science of hiding data or the practice of concealing a message, image, or file within another message, image, or file. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. It is mainly used to maintain private data and/or secure confidential data from misused through unauthorized person. In contemporary terms, Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a simple Steganography method for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. The paper uses the (LSB) to embed a message into an image with 24-bit (i.e. 3 bytes) color pixels. The paper uses the (LSB) of every pixel’s bytes. The paper show that using three bits from every pixel is robust and the amount of change in the image will be minimal and indiscernible to the human eye. For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. A software tool that employ steganography to hide data inside of other files (encoding) as well as software to detect such hidden files (decoding) has been developed and presented. https://sites.google.com/site/ijcsis/
Hiding multiple secret information using dynamic image bit manipulation
Journal of Physics: Conference Series
In the New Paradigm of Industry 4.0, the main concern of high flow information transmission is security disruption. The transmission process should secure the information transmitted. Especially for secret information found out by nobody. One of the methods used to improved information security is the information hiding process. The hiding technique often applied is Steganography. In this technique, a multimedia data format such as the digital image embeds information. The problem occurs when the secret information is a digital image. Stored an image into another image will cause data distortion and the information will be damaged. These problems can be solved by improving the steganography method for digital images. Improvement of the steganography method in this study uses a bit manipulation technique on the Least Significant Bit (LSB) method. The secret information represented by the digital image will be hidden in a container image. The hiding technique method worked by manipulating the intensity value of the image in the sequence of binary bit format, so the container image intensity value can be used to hide many digital images. The result of this research is a steganography technique allowed to store three images in one image container at one time. The results of the improvement method can protect the intensity values of the container image from some failure. The results of this study also show that data integrity is maintained even though the value of image intensity changed by the bits of hidden images.
A Study on Various Secret Data Embedding Techniques in Digital Images for Secure Communication
— Covert communication using images is relatively very young and fast growing field combining image and signal processing with cryptography, communication theory, coding theory, signal compression, and the theory of visual perception. Image steganography aims at hiding the very presence of communication, to make the communication undetectable. This is done by adding secret data in a suitable multimedia cover, e.g., image, audio, and video files. There exists various techniques to embed secret data in images. Different image file formats have different embedding schemes, with their own advantages and disadvantages. In this paper a study on available secret data embedding techniques in an image file in various spatial domain and frequency domain techniques are done along with masking and filtering techniques. Techniques for the recovered image quality assessment is also discussed in this paper since performance of each embedding techniques is assessed by the quality of recovered image and the distortion less extraction of secret data. Keywords— Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Least Significant Bit (LSB),and filtering Masking, Steganography.