This action might not be possible to undo. Are you sure you want to continue?
RESEARCH ARTICLE ISSN 09764259
Use of image to secure text message with the help of LSB replacement
Saurabh Singh, Gaurav Agarwal Invertis Institute of Engineering and Technology, Bareilly, India firstname.lastname@example.org
ABSTRACT As the communication increases day by day the value for security over network also increases. There are many ways to hide information or transmission of information secretly. In this sense steganography is the best part of sending information secretly. This is the art of writing message or information in such a way that no one apart suitable recipient knows the meaning of the message or information. As there are many techniques to perform steganography on electronic media, most notably audio and image files. The out come of this paper is to generate a crossplatform that can effectively hide a message inside a digital image file. An image is the combination of several pixels and each pixel has three color numbers and an image consist of millions of numbers. So the change in few color numbers resulting the picture which would probably look a lot likes the original image. In this paper we are presenting the technique which works by changing a few pixel color value; we will use selected pixel value to represent characters instead of a color value. Obviously the resulting image will still look mostly like the original except that a few points seem little out of place if we look very closely. Keywords: Encryption, Cryptography, Staganography, Text in Image, LSB
Steganography is the art of hiding the fact that communication is taking place, by hiding the information in or under information. There are different kinds of steganography used in communication channel but in digital file format the format that are more suitable are those with a high degree of redundancy. This can be defined as the bits of an object that provide accuracy far greater than necessary for the object’s use and display. The redundant bits of an object are those bits that can be altered without the alteration being detected easily. Hiding information in text is historically the most important method of steganography.an obvious method was to hide a secret message in every nth letter of every word of a text message text steganography using digital files is not used very often since text files have a very small amount of redundant data. Given the proliferation of digital images, especially on the network, and given the large amount of redundant bits present in the digital representation of an image, images are the most popular cover objects for steganography.This paper will focus on hiding information in images in the next sections. The term protocol steganography refers to the techniques of embedding information within message and network control protocol used in network transmission. In the layers of the OSI network model there exist covert channels where steganography can be used. An example of where information can be hidden is in the header of a TCP/IP packet in some fields that are either optional or are never used.
2. Concept of Image Files 200
adding up to more than 16million combinations. On depending this technique. refers to the number of bits used for each pixel. also known as true color. the cover is typically degraded or marked in such a way that it is easy to tell that it has been changed. There are many methods that can measure the likelihood of a watermark on a digital image and these processes can also be applied to a steganography images. in this scheme the algorithm blindly changes colors but ideally a scheme should first analyze the image and work on the areas identified as where changes should be. These pixels are displayed horizontally row by row.Digital color images are typically stored in 24bit files and use the RGB color model. Most of the images consist of a rectangular map of the image’ pixel known as the bits where each pixel is located and its color. The previous techniques are: · F 5 Algorithm · LSB Coding · Palettes Modification 201 . and the stegoimage output. so being able to evaluate characteristics of an image using watermark detection is a clear advantage. The smallest bit depth in current color schemes is 8. the security of stegoimages depend s entirely on their ability to go unnoticed. 3. Not surprisingly the larger amount of colors that can be displayed. green and blue.INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH. DINDIGUL Volume 1. Related Work in the Field Of Image Steganography There are lots of techniques available that implement steganography on a variety of different electronic mediums. it is not necessarily perceptible to a human eye that the image has been changed. The data can hide with in the image by changing the image content i. the larger the file size. 2010 © Copyright 2010 All rights reserved Integrated Publishing Association RESEARCH ARTICLE ISSN 09764259 In the system requirement . No1. there can be 256 different quantities of red.an image is a collection of numbers that constitute different light intensities in different areas of the image. Once implemented. This numeric representation forms a grid and the individual points are referred to as pixels. but to a computer simple statistical analysis can pinpoint a changed image from original one. by changing the color of the pixels. called the bit depth. resulting in more than 16 million colors. by this technique we can hide a large volume of data inside the image.e. it is possible to measure the stegoimage for any marking that may indicate it has been tampered with. all color variations for the pixels of 24 bit image are derived from three primary colors: red. This analysis scheme will also have the difficulty of any information that is used must also be available after the message is embedded. green and blue. It is so easy for a computer to notice these changes are because these techniques do not look for any features of the cover that can suggest areas that are less noticeable when changed. we are using the technique depend on the digital image as digital images often have a large amount of redundant data and this is what steganography uses to hide the message. and each primary color is represented by 8 bits. as a watermark is simply a highly robust steganography marking. meaning that there are 8 bits used to describe the color of each pixel. Monochrome and grayscale images use 8 bits for each pixel and are able to display 256 different colors or shades of gray.The number of bits in a color scheme. thus in one given pixel.
suppose our original pixel as bits: (r7 r6 r5 r4 r3 r2 r1 r0. Text to Byte Conversion This involves converting the message to be hidden into a cipher text. and blue intensities. This can be done by passing a secret key. in this paper we will discuss two operations in image steganography.data is converted into the bytes that are each character in message is converted into its ASCII equivalent. A secret key can be used for encryption of message to be hidden.1. Because ASCII value for “a” is 97 and binary equivalent is 01100001. 2010 © Copyright 2010 All rights reserved Integrated Publishing Association RESEARCH ARTICLE ISSN 09764259 4. For the same purpose we have four techniques i.1. patless modification. g7 g6 g5 g4 g3 g2 g1 g0.INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH.i. retrieve message and decryption.e. F 5 algorithm. then while retrieving message.2 Message Embedding In Digital Image Hiding image involves embedding the message in to the digital image. Current Work 4. The LSB of each 8bit byte has been co opted to hide a text message. DINDIGUL Volume 1. one each for red. · Loading and saving bitmap files · Bit manipulation operations This will make message more secure as well as lower distortion rate. It uses the first pixel (at spot 0) to hide the length of message (number of character). our character (bytes) has some bits: 202 .in order to hide the message. the retriever has to enter the correct password for viewing the message.1 At Sender Side 5. We can only alter the original pixel color value by 7. for an example if we are taking the character “a” in the message then “a”= 01100001 is stored in byte array.Suppose we only change the last three bits these are the bits that determine the “one place”. Algorithm Description 5. Moreover if message is password protected. green. 5.e. hide message. and data is first converted into byte format and stored in a byte array. b7 b6 b5 b4 b3 b2 b1 b0) In addition. DCT. Each pixel typically has three numbers associated with it. in image steganography it works by changing a few pixel color value; now we will use selected pixel value to represent characters instead of a color value. Our Approach As discussed earlier that an image is the combination of several pixels and each pixel has three color numbers so we can say that there are millions of numbers in an image. encryption.e. 5. which will be difficult for hackers to decrypt. Our approach is different from the previously used technique i. the “two place” and the “fours place”. No1. and these value often range from 0255. which then converted into bytes.1. It provides security by converting it into a cipher text. the message is then encrypted and then embeds each bit into the LSB position of each pixel position.1.
three more in the lowest green pixel. So the approach is secure. DINDIGUL Volume 1. After every pixel gives the message character’s ASCII value.100) with character “a”. 96. So there will not be noticeable color difference in the image. then we can obtain: Originl pixel = (11100001. Benefits to Approach: 6.2. b7 b6 b5 b4 b3 b2 c1 c0).01100100.e.101) Here we can notice that the new pixel of (227. 5.1. (r7 r6 r5 r4 r3 c7 c6 c5. The read data will be in bytes format. This can be done by extract the pixels of output image in one array. 96. 2010 © Copyright 2010 All rights reserved Integrated Publishing Association RESEARCH ARTICLE ISSN 09764259 (c7 c6 c5 c4 c3 c2 c1 c0). 203 . No1. first pixel value gives number of character in the message. 01100000. g7 g6 g5 g4 g3 c4 c3 c2. This process can be done by reading the embedded data from the file.01100100) “a” = 01100001(ASCII value 97) New pixel = (11100011.2. Retrieve Message In this section we will discuss the retrieving the message from the image independent of the file format.100. which then stored in byte array. If we take an example of pixel (225. in a BMP image for hiding the data there is the need of very large cover image. original hidden message. once a message has been retrieved it has to be converted in to the original message. since they use lossless compression.2 At Receiver Side 5.1 Message Security: As LSB techniques uses BMP images.e. But here the input message is converted in digital image into byte before embedding it in digital image.2 Byte to Text Conversion: In this section. 6. prevent from vulnerability. 5. byte array obtained by the process of retrieving message is now converted into text/message by reading oneone byte to get each character in the message i. and the last two in the lowest blue pixel as follows.100).101) is almost the same value as the old pixel of (225. 01100101) New pixel = (227. Decoding in same manner as the reversal of encoding process i.100. Then we can place three of these character bits in the lowest red pixel.INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH.
Image steganography allows for some morallyconscious people to safely whistle blow on internal actions. Binghamton.Du. RGB instead of only in green byte. Penang. As there are many application of image steganography like it allows for two parties to communicate secretly and covertly. School of Computer Sciences. One of the other main uses for image steganography is for the transportation of high level or topsecret documents between international governments also it allows for copyright protection on digital files using the message as a digital watermark. Silman. Image steganography has many legitimate uses as it can be used by hackers to send viruses and Trojans to compromise machines. A also describe the benefits from the approach like the security of message increases and distortion rate has reduced. 2007 2. SANS Institute. as more emphasis is placed on the areas of copyright protection. No1. Proposed approach involves change in LSB of each pixel byte i. References 1.. F 5 algorithm implementation: 2009. Guillermito.net/stegno/tools 3. So in conclusion. we believe that steganography will continue to grow in importance as a protection mechanism.pdf 4. “Steganography and steganalysis”. This paper has investigated whether taking the image as the cover into account increases the security of the message by creating cross platform self evaluating tool. M. privacy protection. Malaysia 204 .Steganography: A Few Tools to Discover Hidden Data. 2006 http://guillermito2. T. DINDIGUL Volume 1.R.As it involves the conversion of message into the digital image.. it is first converted into byte format and then stored in byte array. Long: Steganalysis In Color Images. Then the message is encrypted and then embeds each bit into the LSB position of each pixel position. 7. Hence reduces the distortion rate that is look of original image. University Sains Malaysia. J. Taking the cover into account is likely to increase the security of the message by hiding it in a less obvious location. Fridrich. 8.e. 2010 © Copyright 2010 All rights reserved Integrated Publishing Association RESEARCH ARTICLE ISSN 09764259 6. In order to hide the message.2 Reduce Distortion Rate Images are the most popular cover objects for steganography. 11800. Mohammad Ali Bani Younes 1and Aman Jantan 2. Moreland.INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH. Current electronic steganographic methods are not as necessarily secure due to the size of the data they hide and the lack of concern for the content of the message cover.J.www. Result and conclusion As the result we can find the out come of the paper is to create across platform that can effectively hide a message inside a digital image file.nl/home/tmoerl/privtech. “Steganography and steganalysis: An Overview”.2001 5. Leiden Institute Of Advanced Computing Science. and surveillance.liacs.
2008.INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH. Chandramouli. M. 205 . Younes. pp. “Image steganography and steganalysis: Concepts And Practice”. 7. Proceedings of the 2ndInternational Workshop on Digital Watermarking.1523. MAB. R.. N. Jantan. A. No1. Issue. & Memon. "Image encryption Using BlockBased Transformation Algorithm. DINDIGUL Volume 1. 1. Kharrazi. 35. 2010 © Copyright 2010 All rights reserved Integrated Publishing Association RESEARCH ARTICLE ISSN 09764259 6.. Vol."AENG International Journal of Computer Science. October 2003.
This action might not be possible to undo. Are you sure you want to continue?