Protecting and Enhancing the Process of Data Steganography (original) (raw)
Related papers
A Survey Paper on Different Steganography Technique
Kalpa Publications in Engineering
With the rapid advance in digital network, information technology, digital libraries, and particularly World Wide Web services, many kinds of information could be retrieved any time. So in this digital scenario invisible communication between two parties is the prime concern. Steganography is the technique of hidden communication. It not only hides the message contents, instead it hides the existence of the message. In this paper, a new image steganography method based on spatial domain is proposed secret data hided in image segments using least significant bit (LSB) steganography is proposed. The color image is divided into four equal parts and the secret data is also divided into four equal parts and those divided data is hided in the image segments using least significant bit steganography. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications.
IMAGE STEGANOGRAPHY USING IMPROVED LSB ALGORITHM.
The goal of Steganography is to hide communication. So, a fundamental requirement of this Steganography system is that the hidden message should not be visible to human beings. The other goal of this method is to avoid suspicion to the presence of hidden message. This technique has recently became important in a number of application areas. The project has various objectives such as: ? To produce security tool based on Steganography techniques ? To enhance techniques of hiding data using encryption. ? To extract hidden data using decryption methods. Steganography is sometimes used when encryption is not allowed. An encrypted file may still hide information using Steganography, so even if encrypted file is deciphered, the hidden message is not seen. The objective of ?Steganography? is to increase the efficiency of a system to reduce the manual labour.
A Novel Technique for Data Steganography
Engineering, Technology & Applied Science Research, 2019
In this paper, a novel stego-method will be introduced, which can be used to hide any secret message in any holding color image. The proposed method will be implemented and tested and the calculated parameters will be compared with the LSB method parameters. It will be shown that the proposed method provides a high-security level by using two keys to extract the secret message from the holding image, making it very difficult to hack.
Encryption based LSB Steganography Technique for Digital Images and Text Data
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper's suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of noncommunicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 nonoverlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
On the Information Hiding Technique Using Least Significant Bits Steganography
Steganography is the art and science of hiding data or the practice of concealing a message, image, or file within another message, image, or file. Steganography is often combined with cryptography so that even if the message is discovered it cannot be read. It is mainly used to maintain private data and/or secure confidential data from misused through unauthorized person. In contemporary terms, Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a simple Steganography method for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. The paper uses the (LSB) to embed a message into an image with 24-bit (i.e. 3 bytes) color pixels. The paper uses the (LSB) of every pixel’s bytes. The paper show that using three bits from every pixel is robust and the amount of change in the image will be minimal and indiscernible to the human eye. For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. A software tool that employ steganography to hide data inside of other files (encoding) as well as software to detect such hidden files (decoding) has been developed and presented. https://sites.google.com/site/ijcsis/
An Overview of Image Steganography using LSB Technique
International Journal
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. This paper intends to give an overview of image steganography, its uses and techniques. For a more secure approach, this paper encrypts the message using secret key and then sends it to the receiver. The receiver then decrypts the message to get the original one. The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. This paper deals with the algorithm based on hiding a large amount of data (image, audio, text) file into color BMP image. This project gives a brief idea about the image steganographic approach that make use of Least Significant Bit(LSB) algorithm for embedding the data into the bitmap image(.bmp) which is implemented through the JDK 1.5.0_07 environment. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file.
A Review Study on Unique Way of Information Hiding: Steganography
International Journal on Data Science and Technology, 2017
Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.
A New Method for Image Steganography Using LSB and MSB
Image steganography is the art of hiding information. In this technique data is embedded into an image. Bits of information are placed in pixel values of image so that attacker cannot find out where data is hidden. In this paper a new information hiding method is proposed. In this method we have used the concept of spatial domain for hiding and retrieval of the information i.e. the use of pixel values. In this paper we have used the LSB and MSB pixels for hiding and retrieval of the message. Also the advantages and disadvantages of the proposed method have been discussed.
Proposed LSB4 of Data Steganography
International Journal of Computer Science and Mobile Computing (IJCSMC), 2024
The process of hiding confidential data is one of the important processes used to protect this data from intruders or protect it from the penetration process. The most popular methods used in data steganography are LSB and LSB2 methods. These methods are efficient methods of data hiding, they provide a good stego media quality and good speed parameters. They are capable of hiding short and long secret messages. To increase the capacity and to decrease both the hiding and extraction times LSB4 method will be introduced and used. The proposed method will be implemented using various covering images and various in length secret messages, the obtained results will be analyzed to prove the quality and the speed of the proposed method. The obtained results of the proposed LSB4 method will be compared with the results of LSB method to show the enhancements provided by the proposed method. The proposed LSB4 method will be supplied by a security issues to protect the hidden message, the secret message will be protected by using a special private key to apply bits’ substitution on the contents of characters’ binary matrix.
Model for Data Hiding Using Steganography
Steganography is a technique to secure a data communication. Data form Message, secured by inserting message bits into carrier bit files. One of Method for inserting messages in carrier files is the Least Significant Bit method. Inserting the message bits in the carrier bit file bit. Generally, this report discussed designing of steganography applications that modified 2 bits of carrier file using LSB Method. There was some testing to be performed on this application, such as embedding and retrieving process testing to know functionality application, capacity testing to know cooperation carrier sizes before and after message embedded, and quality testing by using PSNR formula to know stegano file quality. Testing conducted includes testing the sending and receiving messages that have been inserted message. From the test, it can be concluded that the data PIN (Personal Identifier Number) inserted cannot be opened by unauthorized parties and accepted banking customers when receiving an ATM card or credit card.