Robust security approach using hybrid steganography (original) (raw)

Information Security Through Image Processing by Utilizing Steganography

International journal of engineering research and technology, 2019

Steganography is the advanced methodology for concealing secret data than the other strategies used to date. There are often cases when it is not possible to send messages openly or in encrypted form. This is where steganography play its role. While cryptography provides privacy which is intended to provide secrecy. Steganography aims to hide the secret messages and also for communication and transferring of data. So nobody aside from the licensed sender and receiver are tuned in to the existence of the key information. This paper intends to give an overview of image steganography and its uses and hiding the files (text file, audio file, video file, image file, etc.,) by using LSB and AES algorithm where AES is used for password protecting system so that if anyone can find the Stego-image they will not read the message because data is still in the encrypted form and LSB is used for hiding the data.

Improved Steganography Method for Secured Data Sharing

International Journal of Computer Applications

Steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In image Steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. Everyday the development of internet communication is increasing in which the security of information is very important. Various techniques are used to hide data in different formats in steganography .Due to the simplicity of the least significant bit (LSB) substitution method, it is used to protected the data by converting data in digital image. This paper proposes a new data hiding technique for data to be secured which moves from sender to receiver. It gives more security in hiding data and more data can be secured via this technique. A stego image is used in it due to which a secure transmission of information is taken place without the distortion of the image. It is a secure way to keep the data confident. In this paper, we achieved a higher security than the previous work by using the multi key rather than the single key for decrypting the data in the Steganography image. We also compare the result in terms of PSNR, RMSE, MSE between the proposed work and previous work and got a better result analysis.

Improved information security using robust Steganography system

Computing Research Repository, 2010

Steganography is an emerging area which is used for secured data transmission over any public media.Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver knowing the existence of this information. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key and password security features for authentication at both ends in order to achieve high level of security. As a further improvement of security level, the information has been permuted, encoded and then finally embedded on an image to form the stego image. In addition segmented objects extraction and reassembly of the stego image through normalized cut method has been carried out at the sender side and receiver side respectively in order to prevent distortion of the Stego image during transmission.

Encryption based LSB Steganography Technique for Digital Images and Text Data

Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper's suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of noncommunicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 nonoverlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.

LSB Based Image Steganography for Information Security System

International Journal of Trend in Scientific Research and Development, 2018

Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap (*.bmp) image is used as a cover image file to implement the proposed system. The detail Least Significant Bit (LSB) based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media.

Information Security through an Improved Image Steganography Algorithm

Journal of Information Technology, 2017

Steganography is the data hiding technique which allows hiding secret message or image within a larger image or message such that the hidden message or an image is undetectable. It is a very useful method for secret information transmission. This research proposed security of information through an image hiding steganographic method, of hiding an image within a cover image. This steganographic method aims to minimize the visually obvious and numerical differences between the cover image and a stego image with increase in the size of the payload. The proposed improved algorithm uses the binary codes which is the binary representation of pixels inside the image. This algorithm make use of improved least significant bit (LSB) technique, which is a popular technique in steganography ,in which least significant bits of cover are altered by secret data bits. The proposed method integrates randomization algorithm which improve the security of LSB scheme. The bits of the secret image ar...

A New Approach for Information Security using an Improved Steganography Technique

Journal of Information Processing Systems, 2013

This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embedding data based on the data available in MSB's (Most Significant Bits) of red, green, and blue components of randomly selected pixels across smooth areas. A hybrid feature detection filter is also proposed that performs better to predict edge areas even in noisy conditions. AES (Advanced Encryption Standard) and random pixel embedding is incorporated to provide two-tier security. The experimental results of the proposed approach are better in terms of PSNR and capacity. The comparison analysis of output results with other existing techniques is giving the proposed approach an edge over others. It has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

A Review Study on Unique Way of Information Hiding: Steganography

International Journal on Data Science and Technology, 2017

Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.

Enhancing Data Security by using Crypto-Steganography in Image

2011

In this paper, actually we will present a technique of secure data transmission through hiding of data in image file by replacing it’s one of the LSB bit. The watermarked bit embedded into image sample to increases the robustness against noise hence by combining cryptography and steganography we will increases the security of data.