A Secret-Key Image Steganography Technique using Random Chain Codes (original) (raw)
Related papers
IJERT-A Steganography Algorithm for Hiding Secret Message inside Image using Random Key
International Journal of Engineering Research and Technology (IJERT), 2014
https://www.ijert.org/a-steganography-algorithm-for-hiding-secret-message-inside-image-using-random-key https://www.ijert.org/research/a-steganography-algorithm-for-hiding-secret-message-inside-image-using-random-key-IJERTV3IS120844.pdf "Steganography" is a Greek origin word which means "hiding writing". The steganography word is classified into two parts: Steganos means "secret or covered"(where you want to hide the secret messages) and graphic means "writing"(Text). This paper introduces a new approach for least significant Bit (LSB) based on image steganography that enhances the existing LSB substitution techniques to improve the security of hidden information. This paper presents an algorithm to hide the secret data inside images using an efficient steganography technique. We use 8-bit random key for encrypting our secret message and also the same key will be used for choosing the pixel in cover image where we will hide our encrypted data. First we are applying XOR operation between our secret text message and 8-bit random key for encrypting our plain secret message. Now this encrypted message will be hide in cover image. We are hiding our secret encrypted message in the LSB of selected pixel. 8-bit random key and 2 nd LSB of each pixel choosing the pixel where we have to store our encrypted message by applying some operation. This method also hiding large number of character of secret message into cover image as compare to other existing techniques and also much secure.
Information Security through an Improved Image Steganography Algorithm
Journal of Information Technology, 2017
Steganography is the data hiding technique which allows hiding secret message or image within a larger image or message such that the hidden message or an image is undetectable. It is a very useful method for secret information transmission. This research proposed security of information through an image hiding steganographic method, of hiding an image within a cover image. This steganographic method aims to minimize the visually obvious and numerical differences between the cover image and a stego image with increase in the size of the payload. The proposed improved algorithm uses the binary codes which is the binary representation of pixels inside the image. This algorithm make use of improved least significant bit (LSB) technique, which is a popular technique in steganography ,in which least significant bits of cover are altered by secret data bits. The proposed method integrates randomization algorithm which improve the security of LSB scheme. The bits of the secret image ar...
Information Security Through Image Processing by Utilizing Steganography
International journal of engineering research and technology, 2019
Steganography is the advanced methodology for concealing secret data than the other strategies used to date. There are often cases when it is not possible to send messages openly or in encrypted form. This is where steganography play its role. While cryptography provides privacy which is intended to provide secrecy. Steganography aims to hide the secret messages and also for communication and transferring of data. So nobody aside from the licensed sender and receiver are tuned in to the existence of the key information. This paper intends to give an overview of image steganography and its uses and hiding the files (text file, audio file, video file, image file, etc.,) by using LSB and AES algorithm where AES is used for password protecting system so that if anyone can find the Stego-image they will not read the message because data is still in the encrypted form and LSB is used for hiding the data.
Novel Steganography Method for Secure Data Transmission
International journal of engineering research and technology, 2017
Steganography is the art of hiding information to prevent the detection of hidden messages. Cryptography can be defined as the conversion of plain text into a scrambled code. Both are two general ways of sending vital information in a secret way. A message in scrambled code aka cipher text, might arouse suspicion on the part of the recipient while an invisible message created with steganographic methods will not. But many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for a steganographic message. In this paper, we present a new steganographic technique to hide data inside an image. The newly planned technique withstands visual and statistical attacks, yet it still offers a large steganographic capacity. This method does not modify the image. Message to be hidden will be converted into a bit stream and divided into several blocks. The bit pattern of each block is identified inside the im...
Encryption based LSB Steganography Technique for Digital Images and Text Data
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper's suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of noncommunicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 nonoverlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
Secure Image Hiding Algorithm using Cryptography and Steganography
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non -Repudiation.
Using Secret Image Block to Secure LSB Data Steganography
International journal of computer science and mobile computing, 2022
Data steganography is one of the most popular methods of data protection, but most introduced methods are not secure. In this paper research a simplified LSB method of data steganography will produced, this method will easily used to hide any message in any covering image, changing the image or/and changing the message will not require any changes in the algorithm. The proposed method will use a complicated key to select a secret block from the covering image to be used to hide the message. The PK will contain 5 components of double data type, thus the PK will provide a huge key space which is capable to resist any hacking attempt, the algorithm of the proposed method will be very sensitive to the PK values, any changes in these values will be considered as a hacking attempt by producing unexpected outputs. The proposed method will be implemented and tested using various messages, various covering images, and various PK; the obtained results will be analyzed applying sensitivity analysis, quality analysis and security analysis to prove the improvements added to LSB method of data steganography.
Image based steganography using cryptography
2021
Received April 19, 2021 Revised April 27, 2021 Accepted April 27, 2021 In the world of increasing usage of the internet, data security plays an important role in achieving confidentiality, authentication, and integrity for secure communication. Cryptography and Steganography is the method to achieve data security through which information is protected and only the intended person can read the information. In this paper, a technique is proposed where Steganography and Cryptography are used in a combined manner for securing the data. In which the LSB method is used for embedding and extracting the data from the image. A symmetric cryptographic algorithm used to encrypt the data is done by using Armstrong numbers before embedding the data into the image. A key is generated using Armstrong numbers and any specified string and the same key generated is used for encrypting and decrypting the data.
A Survey of Image Steganography
Journal of emerging technologies and innovative research, 2015
Image Steganography is the art of hiding information within an image which is implied to act as a carrier image[14]. The secret message to be transmitted is then encrypted within this carrier image with a secret shared key. This process is achieved by changing the LSB of the pixels within the image to the bits of the data. Multiple algorithms have been suggested which offer different techniques to carry out the steganographic process. Some techniques that we have researched are the Enhanced LSB, F5, JSteg/JPHide and YASS. This paper outlines the proposed benefits and limitations of these techniques and suggests a suitable technique to carry out the steganographic process.
Review of vital techniques for hiding confidential data using image steganography
Journal of emerging technologies and innovative research, 2018
The quick advancement in the exchange of information through internet made it easier to exchange information exact and faster to the receiver. Security of data is one of the huge components of information technology and communication. Steganography is a term used for information hiding and it is an art of hidden writing. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. So, that observer cannot find the hidden information which we want to send to the receiver. Steganography main objective is to provide robustness, detectability, capacity of hidden data due to which it differs from other techniques such as watermarking and cryptography. This paper proposes a various technique used to hide information on image by an image steganography. In image steganography we hide our secret data in image so that the observer cannot feel its existence. Image steganography strategies are as of late been useful to send any secret message in the ...