A Novel Approach for Hiding Text Using ImageSteganography
Department of Computer Science and EngineeringBaba Farid College of Engineering and TechnologyBathinda-151001, Punjab, India
Corresponding Author’s Email:firstname.lastname@example.org
Department of Computer EngineeringYadavindra College of Engineering Punjabi UniversityGuru Kashi CampusTalwandi Sabo, Punjab, India
— With the increasing use of internet forcommunication, the major concern of these days is, the securityof data being communicated over it. Steganography is the art andscience of invisible communication. It hides secret information inother information, thus hiding the existence of the communicatedinformation. In this paper we have discussed a technique of hiding text messages in the images using image steganography.The technique uses matching of secret data with pixel values of cover image as base concept. The LSBs of matched pixels arechanged to mark presence of data inside that pixel. For makingselection of channels for marking presence of data, a pseudorandom number generator is used, which adds another layer of security to the technique and makes the extraction of secret datavery difficult for the intruders. The results show that techniqueprovides more security against visual and statistical attacks andattempts to provide more data hiding capacity by using more bitsper pixel.Keywords-
Steganography; image steganography; attacks; PSNR; security
Steganography can be defined as the technique used toembed data or other secret information inside some otherobject commonly referred to as cover, by changing itsproperties. The purpose of steganography is to set up a secretcommunication path between two parties such that any personin the middle cannot detect its existence; the attacker shouldnot gain any information about the embedded data by simplylooking at cover file or stego file. Steganography is the art of hiding information in ways that prevent the detection of hidden messages. Steganography, derived from Greek,literally means “covered writing.” It includes a vast array of secret communications methods that conceal the message’svery existence. These methods include invisible inks,microdots, character arrangement, digital signatures, covertchannels, and spread spectrum .
Steganography iscommonly misinterpreted to be cryptography orwatermarking. While they are related in many ways, there is afundamental difference in the way they are defined and theproblems to which they are applied. Cryptography protects thesecret data by making it difficult to understand by the intruderbut still the intruder knows that the secret data exists, so hewill try his best to decode the data. Steganography &encryption are both used to ensure data confidentialityhowever the main difference between them is that withencryption anybody can see that both parties arecommunicating in secret.
Steganography hides the existenceof a secret message and in the best case nobody can see thatboth parties are communicating in secret
Watermarking isused primarily for identification and entails embedding aunique piece of information within a medium withoutnoticeably altering the medium. Steganography uses a basicmodel to hide data inside the cover objects as shown in Fig. 1.
Figure 1. Basic steganography model
The basic model of steganography uses a cover object i.e.any object that can be used to hold secret information inside,the secret message i.e. the secret information that is to be sentto some remote place secretly, a stego key that is used toencode the secret message to make its detection difficult and a
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 7, October 2010195http://sites.google.com/site/ijcsis/ISSN 1947-5500