You are on page 1of 8

International Journal of Pure and Applied Mathematics

Volume 118 No. 20 2018, 3613-3620


ISSN: 1314-3395 (on-line version)
url: http://www.ijpam.eu
Special Issue
ijpam.eu
MULTI-LEVEL REVERSIBLE DATA HIDING USING
LSB BASED STEGANOGRAPHY
G.Deva Preethi1 , C.Dharani2, K.Jaspin3
1,2
UG Student, Computer Science And Engineering Department,
St.Joseph’s Institute of Technology, OMR,Chennai-600 119 INDIA
1
(e-mail: g.devapreethi@gmail.com)
2
(e-mail: dharanichandrasekaran1997@gmail.com)
3
Assistant Professsor, Computer Science And Engineering Department,
St.Joseph’s Institute of Technology, OMR,Chennai-600 119 INDIA
(e-mail: jaspinsjit@gmail.com)

Abstract – Steganography means hiding the concept responsible for this is called
fact that communication is taking place, by steganography[4].Steganography is a very old
hiding an information in another art of embedding personal information into
information. Different applications have other data by using some rules and techniques.
different requirements of the steganography As a result, unauthorized users are not able to
technique used. Reversible Data Hiding see and recognize the embedded information.
scheme is a data hiding technique that Steganography is managing a secret path for
allows embedding data inside an image and sending information invisibly. If both the
later the hidden data can be retrieved and techniques: cryptography and steganography is
the exact copy of host image is recovered. used then the communication becomes double
Being lossless makes this technique suitable secured [7].The main difference between
for medical and military applications. In Steganography and cryptography is that,
this scheme,security is improved by hiding cryptography concentrates on keeping the
the stego-image inside other image, which contents of a message secret while
results in increased securtiy with low steganography concentrates on keeping the
distortion.LSB technique is used to hide the existence of a message secret [10]. Probably
data into the image,thus as the result the most common cover media are multimedia
quality of stego- image retains as original. objects which are images, audio, and video.
In this proposed framework,we have used Here, in this paper, we focus on images as
multi-level embedding,the secret text is first cover media. Two other technologies that are
embedded into an image.Then this stego- closely related to steganography are
image is again hidden inside another image. watermarking and fingerprinting [14].

Keywords – Cover image, Data hiding, LSB Steganographic technique finds its main
method, Steganography,Stego-image. application in the field of secret
communication. It can be used by intelligence
I.INTRODUCTION agencies across the world to barter highly
Security of information becomes one of the confidential data in a secret media, e.g. a
most important factors of communication secret agent can hide a map of a terrorist camp
because of the huge rise of the World Wide in a photograph using image steganographic
Web. Cryptography was originated as a software and post it on a forum. An officer
technique for securing the confidentiality of from the head office could download the
information. Unfortunately, it is sometimes not photograph from the forum and easily retrieve
enough to keep the contents of a message the hidden map [19].
secret, it may also be necessary to keep the The outline of the paper is as follows. Section
existence of the message secret and the

3613
International Journal of Pure and Applied Mathematics Special Issue

II discusses some aspects of reversible data interpretation scheme proposed by


embedding and techniques used so far for Vleeschouwer. Although this type of data
embedding data into media file. Section III hiding schemes provides a higher quality of the
describes about the LSB technique which is embedded image, the embedding capacity is
used for embedding and its strategies used in lower. A different category of data hiding
this technique to store data in it. Section IV schemes involves methods that losslessly
briefly reviews the existing reversible data- compress a set of selected features from an
embedding technique as described by image and embed the payload in the space
Huang[20]. Section V, we present a method saved due to the compression. This type results
that greatly improves the performance. We in higher embedding capacity than the
performed some experiments with
previously mentioned types. Another scheme
implementations of our techniques and of of this type is the generalized Least Significant
various existing-embedding techniques to Bit (LSB) embedding algorithm proposed by
compare their capacity-distortion behavior and Celik, which is based on grouping the pixels
their ability to control the capacity. The results
and embedding data bits into the state of each
of these experiments can be found in Section group. A very different scheme was proposed
VI. Section VII concludes with a discussion of by Tian based on modifying the difference
the presented techniques and some ideas on between a pair of pixel values while keeping
future research. the average of them unchanged. His method
divides the image into pairs of pixels, then
II. REVERSIBLE DATA HIDING embeds one bit of information into each pair.
Of course, not all pairs can be used for data
Reversible data hiding scheme is the
hiding. The pairs that are only expandable and
technique that allows embedding data inside an
do not cause overflow or underflow errors are
image and later the hidden data can be
expanded.
retrieved as required and the exact copy of the
original host image is recovered. Some of the
traditional reversible data hiding schemes are III. LSB TECHNIQUE
based on modulo-arithmetic additive and This concept uses only the least
spread-spectrum techniques . An example of significant bit of the alpha part of a pixel.
these schemes is the one proposed by This example does not modify any colour
Honsinger which is based on addition of value. Before embedding the message, the
modulo 256 as an invertible operation . length of the message should be written into
Although some of these schemes are robust, the image. It extracts bit number 0 from the
the modulo-arithmetic-based reversible data- first 32 pixels, the bits should be neatly
hiding algorithms have the disadvantage of arranged inside an integer variable to know the
salt-and-pepper visual artifacts and hinder length of message embedded into the image.
watermark retrieval. In order to enhance the Pixels following the 32nd pixel store the bits
robustness of the reversible watermarking and needed for reconstructing the byte value
reduce the salt-and- pepper visual artifact of needed to create the original string.Hence, an
the schemes, histogram shifting techniques image with 1 million pixels (or 1 Mega Pixel)
were proposed. In this scheme, the embedding might be able to store a message containing a
target is replaced by the histogram of a block maximum of 1,24,996 characters. ((1,000,000-
of the image. 32)/8 = 1,24,996). Although 1 Mega Pixel
A good example of the scheme is the circular

3614
International Journal of Pure and Applied Mathematics Special Issue

image is considered a low resolution image, it Algorithm to embed text message:-


could store a lot of characters in the form of a Step 1: Read the cover image and text message
text message. Maximum size of message that which is to be hidden in the cover image.
could be embedded in an image at the rate of 1 Step 2: Calculate the length of the text
bit from each pixel can be calculated using the message.
relation n=(P-32)/8. If we increase the storage Step 3: Convert the length in binary and
locations for message to the least significant embed it into the cover image.
bit of all the four components of ARGB Step 4: Convert text message in binary into 8-
system (pixel numbers 0, 8, 16 and 24), the bits.
storage capacity increases to n=(4P-8)/8. Here, Step 5: Following the length bits, start
n is the maximum length of message and P is embedding the message bits.
the number of pixels. Step 6: Replace LSB of cover image with each
bit of secret message one by one.
Initially at the sender side, the secret Step 7: Get stego image
data is embedded into the original image using
Algorithm to retrieve text message:-
LSB replacement technique. Thus it creates a Step 1: Read the stego image.
Stego-image. Now an another different cover Step 2: Retrieve the length of the message.
image is chosen to hide the Stego-image. Thus Step 3: Calculate LSB of each pixels of stego
multiple encryption is performed here inorder image.
to increase the security.At the receiver side,the Step 4: Retrieve bits and convert each 8 bit
image which is received from the sender is into character.
first decrypted to get the Stego-image.The Step 5: Get the secret message.
stego image is decrypted to get the original
secret message.System design of this proposed IV. PROCESS FLOW
framework is shown in Fig 1.
4.1 Embedding a message
It describes about embedding the
message with an image. Here we use LSB
technique for embedding the image.Type the
text which has to be embedded into the image.
In the 'Embedding message' dialog box, paste
a text already present on the clipboard or type
the text that has to be embedded.Finally, in
this module the text will be embedded into the
image and the Stego-image will be
generated.Hiding the secret text inside an
Fig. 1. System Design
image will generate a Stego-Image.This Stego
image is used as input to the next module.
For embedding the n-bit secret
message M into the rightmost LSBs of the 4.2 Embedding image into an image
cover-image C, the secret message M is It describes about embedding the
rearranged to form a conceptually k-bit virtual output of above module with an image.Inorder
image In the extraction process, given the to hide an image inside another image,user
stego-image S, the embedded messages can be needs to click Open source image button.To
directly extracted. embed, user needs to give password of length

3615
International Journal of Pure and Applied Mathematics Special Issue

8 characters which is also hided in that This result analysis reprensents the
image.The path of the particular file will be experimental results for different image
displayed in a text field.You have to give the formats.Different images are taken for
path for storing encoded image.For embedding and the performance of the
embedding, user should click on Make proposed system is analysed.
Stegano-Image.

4.3 Retrieving the image file


It is about decoding the Stego-Image
which contains the original message.To open
the image with secret data, click open button
and go to the same path where the encoded
image is stored.A text box will show the
complete path about the embedded
image.Receiver should enter the same
password given by the sender for decoding the Fig. 5.1. Cover image
stego-image.On clicking the decoding
button,decoding starts our stego –image and
cover image will be seperated.The retrieved
cover image will be saved in the user preferred SECRET DATA TO BE
directory. HIDDEN INTO THE
IMAGE
4.4 Retrieving the secret data
It describes about extracting the secret
Fig. 5.2. Text to hide
message from the image that is extracted from
the previous module.Here,we use LSB
replacement algorithm to extract the secret
message from the Stego-Image.This Stego-
Image contains the original secret
message.Click Open button and follow the
same path where decoded Stego-image is
stored. Complete path will displayed in text
box which is in front of Destination File
button.Click on Decode button. The message
Fig. 5.2. Image to hide the secret data.
will be retrieved and the retrieved message
will be displayed in the Text Area. Thus, as a
The result of embedding secret
result the secret message is successfully
message in cover image.This result is obtain
encrypted and decrypted using multilevel
by taking same cover image of different
encryption.Security is enhanced using this
format For this we have calculated PSNR,
multiple encryption techniques and data is
MSE .The PSNR and MSE is then calculated
hidden inside the image using LSB
as follows
replacement algorithm.
MAX 2
V. RESULT ANALYSIS PSNR = 10 log10
MSE
Where

3616
International Journal of Pure and Applied Mathematics Special Issue

1 𝑀−1 𝑁−1 proposed technique is very efficient than the


MSE = 𝑀𝑁 𝑖=0 𝑗 =0 (αij – βij )
DES technique.
Here, αij is the pixel of the cover image where
the coordinates (i, j), and βij is the pixel of the VI. CONCLUSION
stego-image where the coordinate is (i, j).The
From this project, we conclude that
size of the image is represented using M and
proposed system is flexible and has a
N. A larger PSNR value indicates that the
consistent flow for easy understanding. This is
difference between cover image and the stego-
to ensure that enhancements can easily
image is more invisible to the human eye.
accommodate, without having to make major
changes to the application. Additional modules
can be easily added when necessary. The
software is developed with modular approach.
All the modules were tested seperately and
these modules have been put together to form
the complete system.Then the system is tested
(a) (b) (c) with all types of image formats and it worked
successfully.In this proposed framework,we
have used multilevel encryption to increase
security and LSB technique to to embed data
into the image.Additional modules can be
added in the future to increase the embedding
(d) (e) capacity even more higher.

Fig 6.5 The test images. (a)Baboon REFERENCES


(b)Barbara(c)Sailboat (d)Lena (e)Peppers
[1] Chandramouli R. and MemonN., “Analysis
Table1.Comparison of different images. of LSB based Image Steganography
Techniques,” in Proceedings of International
Conference on Image Processing , pp 1019-
1022, 2001.
[2] M. M Amin, M. Salleh, S. Ibrahim, M.R.K
atmin, and M.Z.I. Shamsuddin “Information
Hiding using Steganography” National
Conference on Telecommunication
Different Test Images have been taken Technology Proceedings, Shah Alam,
to test the efficiency of our proposed system. Malaysia. 2003 IEEE. Petitcolas, Fabian A.P.;
If PSNR value of an output image is high then Katzenbeisser, Stefan (2000). Information
that image is having low distortion .MSE Hiding Techniques for Steganography and
value is a reciprocal of PSNR.If MSE value Digital Watermarking. Artech House
of an image is low then that image is having Publishers. ISBN 1-58053-035-4.
low distortion. By comparing the PSNR and [3] Johnson, Neil; Duric, Zoran; Jajodia,
MSE values of our Least Significant Bit and Sushil (2001). Information hiding:
Difference Histogram Shifing technique, steganography and watermarking: attacks and

3617
International Journal of Pure and Applied Mathematics Special Issue

countermeasures. Springer. ISBN 978-0-7923- Steganography using Least Significant Bit


7204-2. Substitution, ” International Journal of
[4] Chandramouli R., Kharrazi M., and Computer Applications, vol. 77, pp. 37-45,
Memon N., “Image Steganography and 2013.
Steganalysis: Concepts and Practice”, [14] Anderson, R. J. & Petitcolas, F. A. P.,
International Workshop on Digital “On the limits of steganography”, IEEE
Watermarking (IWDW), Seoul, pp. 35-49, Journal of selected Areas in Communications,
October 2003. vol. 16, no. 4, pp. 474–481, 1998.
[5] Kessler, GC (2004). “An Overview of [15] Luo W., Huang F., and Huang J., “Edge
Steganography for the Computer Forensics Adaptive Image Steganography based on LSB
Examiner”. Forensic Science Matching Revisited,” IEEE Transactions on
Communications. Information Forensics and Security, vol. 5,
[6] Wayner, Peter (2009). Disappearing 2010.
cryptography 3rd Edition: information hiding: [16] W. Lee, T. Chen and C. Chieh Lee,
steganography & watermarking. Amsterdam: "Improvement of an encryption scheme for
MK/Morgan Kaufmann Publishers. ISBN 978- binary images," Pakistan Journal of
0123744791. Information and Technology. Vol. 2, no. 2,
[7] Swain G. and Lanka S. K., “A Quick 2003, pp. 191-200.
review of Network Security and [17] A. Sinha, K. Singh, "Image enc rypt ion
Steganography”, International Journal of by using fractional Fourier transform and
Electronics and Computer Science Jigsaw transform in image bit planes,"Source:
Engineering, vol. 1, no. 2, pp.426-435, 2012. optical engineering, spie-int society optical
[8] T. Filler, J. Judas, and J. Fridrich, engineering, vol. 44, no. 5 , 2005, pp.15-18.
“Minimizing additive distortion [18] Narayanan S., “MATLAB Central: image
insteganography using syndrome-trellis quality measures,” last visited 2014.
codes,” IEEE Trans. Inf. Forensics Security, [19] Hayati P., Potdar V., and Chang E., “A
vol. 6, no. 3, pp. 920–935, Sep. 2011. Survey of Steganographic and Steganalytic
[9] Fangjun Huang, Jiwu Huang, Yun Qing Tools for the Digital Forensic Investigator”, in
Shi " New Framework for Reversible Data Workshop of Information Hiding and Digital
Hiding in Encrypted Domain"vldb 2016 vol- Watermarking to be held in conjunction with
059. IFIPTM, Moncton, New Brunswick, Canada,
[10] Wang H and Wang S, “Cyber warfare: 2007.
Steganography vs. Steganalysis”, [20] Fangjun Huang, Member, Jiwu Huang,
Communications of the ACM, vol. 47, no. 10, IEEE, Yun Qing Shi.,”New Framework For
2004. Reversible Data Hiding in Encrypted Domain”
[11] Xuan G., Zhu J., Chen J., Shi Y., Ni Z., in IEEE Transactions on Information
and Su W., “Distortionless Data Hiding based Forensics and Security , T-IFS-05917-2016
on Integer Wavelet Transform,” IEEE Letters, 2016.
vol. 38, pp. 646-1648, 2002.
[12] Reed T. R., Digital Image Sequence
Processing, Compression, and Analysis, CRC
Press LLC, 2005.
[13] Chadha A., Satam N., Sood R., Bade D.,
“An Efficient Method for Image and Audio

3618
International Journal of Pure and Applied Mathematics Special Issue

3619
3620

You might also like