- Open Access
- Total Downloads : 109
- Authors : Payal Gupta, Ravi Mohan
- Paper ID : IJERTV3IS051804
- Volume & Issue : Volume 03, Issue 05 (May 2014)
- Published (First Online): 07-06-2014
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
A Unique Approach for Data Hiding for Secure Information Interchange
Payal Gupta Ravi Mohan
Shri ram institute of technology Shri ram institute of technology Jabalpur (M.P) Jabalpur (M.P)
Abstract:Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient. Steganography has been used to hide secret messages in various types of files, including digital images, audio and video. The three most important parameters for audio steganography are imperceptibility, payload, and robustness. Different applications have different requirements of the steganography technique used. This paper intends to give an overview of image steganography, its uses and techniques. Paper work is an implementation of Audio and Image Steganography for the same plaintext, paper work uses three defendant key triple layer of data protection, The avalanche in plaintext is very high in present paper work.
Keywords- digital image; information hiding; multimedia security; watermarking; steganography
-
INTRODUCTION
Information security is essential for confidential data transfer. Steganography is one of the ways used for secure transmission of confidential information. Hiding information in a photograph is less suspicious than communicating an encrypted file. The main purpose of steganography is to convey the information secretly by concealing the very existence of information in some other medium such as image, audio or video.
Following counted features and restrictions are the criteria which a data embedding algorithm must meet
-
Quality of host signal should not be degraded objectionably and the perceptibility of embedded data must be kept minimal.
-
The data must be embedded into whole body of the target media rather than wrapper or header. Therefore it would be kept intact in different formats.
-
The data must be secure against intentional and intelligent removal attempts such as filtering, encoding, cropping, channel noise, lossy compressing, resampling, scanning and printing, digital to analog (D/A) conversion, analog to digital (A/D) conversion, and etc.
-
Since data hiding goal is to keep the embedded data into host signal, embedded data asymmetrical encoding is desirable feature but not essential.
-
To guaranty data integrity error correction coding is necessary. Degradation of embedded data at signal modification time is unavoidable.
-
Arbitrary re-entrant and self clocking are mandatory properties of the embedded data. These properties are to guaranty that embedded data will be retrievable even if only some fragments of the host be available.
Today there are various applications of information hiding. Knowledge of data hiding might be used either in ethical or unethical ways. However, data hiding algorithms cannot easily be categorized either in steganography or watermarking categories as there is no transparent boundary between these two terms and mostly the classification relies on application of the algorithm. Therefore regardless classifying data hiding the most common data hiding applications are fingerprinting, secret communication, secure storage, covert communication, and copyright protection.
Cryptography: Cryptography scrambles messages so it cant be understood. Advantage of cryptography is secure data, variable bit key for data hiding, fast and flexible easy to implement. Disadvantage of cryptography is that it is limited for mobile devices only, complex hardware, easy to detect cipher patterns.
Steganography: It is an ancient art of hiding information. It hides information in digital images. Advantage of Steganography methods reduces the chance of a message being detected. Disadvantage of Steganography Transmitting same images again and again may arouse suspicious-ness to the intruder, easy to decipher ones detected.
-
-
DESIGN TECHNIQUES
-
Encryption
As figure 1 shows plain-text can be of any size but it must be at-least ten times less than depend on the size of its massager audio or image.
Cipher Generator: it performs initial cipher generation and use division and modulation with specific key let A is plaintext K1 is the key then
Plain -text
B = abs (A / K1) C = A % K1
D = [B C];
Now D will be the data which will be transmitted Breaking the data:
Let D = [ x1 x2 x3 x4 x5xn] it will break in data1 and data2 as
Cipher Generation
Breaking the
Key-
D1=[x1 x2 x5 x6 ] And D2 =[x3 x4 x7 x8.. ]
Scaling: data amplitude will get scaled by fix parameter 200
D3=D1 / 200;
Data-1
Scaling
Data-2
Substitution Audio Steganography:It is proposed method for data hiding in audio file let D3 is the data
D3 = [y1 y2 y3 y4 y5 yn] And audio file samples are
A1 = [W1 W2 W3 W4 W5 ..Wm]
And key-2 can be any value in between 100 to 255 is key2
Then with the spacing of K2 = Key2*10 the data will get substituted in audio file as
D4= [w1 w2 .WK2 y1 WK2+1 WK2+2..WK2+K2
y2 .W2*K2+1]
D4 will be the ciphered audio.
ASCII conversion of data:- It is required because in image steganography pixels are there is in binary
Substitution
Proposed Audio Steganography
Key-
RGB
Imag
Key- Audio-
ASCII conversion of Data
Proposed new key based LSB Substitution
Image Steganography
Audio Cipher
Image Cipher
Figure 1: Proposed Encryption technique
form. And data can be any characters or number first it is required to convert each in ASCII binary form. let data is D2 of length L1 characters then each of character will get converted in ASCII binary form with length of L3=L2x8 D5 (L3length) = (ASCII of D2 (L1 length))
Proposed substitution image steganography: – If D5 is the binary form of data and as known any color image has three different components RGB. With proposed method of steganography let image is I and IR IG & IB are its three components then
D5=[b1b2b3b4b5b6b7b8..]
Plain -text
De-Cipher
And image I is
I
IG IR
Data-1
B
Merge the data
Data-2
IR =
IG=
IB =
11
12
13
1
21
22
23
2
31
32
33
3
41
42
43
4
1
2
3
.
11
12
13
1
21
22
23
2
31
32
33
3
41
42
43
4
1
2
3
.
1
12
13
1
21
22
23
2
31
32
33
3
41
42
43
4
1
2
3
.
Figure 2: Image segments
Descaling
Extracting scaled data from Audio cipher
De-Steganography Conversion from
Extracting binary ASCII data from Image cipher
De-Steganography
Each pixels is are size of 8 binary bits, and with proposed method the first binary bit of D5 (i.e. b1) with replace the LSB of first pixel of IR than second binary bit of D5 (i.e. b2) with replace the second LSB of first pixel of IG than third binary bit of D5 (i.e. b2) with replace the LSB of first pixel of IB and so on..next pixel will pick as per the Key- 3, K3.
B . Decryption
The process of decryption requires the approach in reverse manner but it can be easily observe the intended party requires having both files (i. e. cipher image and cipher audio) and it also not enough for to have both files the end used also should have knowledge of all three keys that are Key-1, Key-2 and Key-3. Without lack any single information the intended party cannot decipher the encrypted massage.
Audio Cipher Image Cipher
Figure3: The Decryption process
-
-
RESULTS
Figure 4: The audio steganography
Figure 5: The Image
Figure 6: The Received Signal
Table 1: Audio Stenograph results
Audio File |
Audio File Size (In KB) |
Thesis Results (SNR in db) |
Wave_1 |
390 |
84.60 |
Wave_2 |
490 |
85.87 |
Wave_3 |
590 |
83.69 |
Wave_4 |
680 |
84.36 |
Wave_5 |
830 |
82.60 |
Wave_6 |
940 |
82.63 |
Wave_7 |
1660 |
84.58 |
Wave_8 |
2050 |
82.86 |
Table 2: Image Stenograph results
No. of characters inserted |
MSE |
PSNR |
2 |
0.5787×10-5 |
100.5402 |
5 |
0.7716×10-5 |
99.2908 |
7 |
0.7716×10-5 |
99.2908 |
10 |
0.8681×10-5 |
98.7793 |
12 |
0.9645×10-5 |
98.3217 |
CONCLUSIONS
Both the cryptography and steganography have their own respective pros and cons, but the combination of both the model provides better protection of the data from the intruders. As can observed from the results the proposed method have less MSE and very good SNR value for both Audio and Image steganography.
REFERENCES
-
Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim, Text Steganography: A Novel Approach, Research paper , International Journal of Advanced Science and Technology, Vol. 3, February, 2009
-
Arvind Kumar, Km. Pooja, Steganography- A Data Hiding Technique, Research paper , International Journal of Computer Applications (0975 8887) Volume 9 No.7, November 2010
-
Zaidoon Kh. AL-Ani , A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi, Overview: Main Fundamentals for Steganography, JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010
-
Ross J. Anderson, Fabien A.P. Petitcolas, On The Limits of Steganography, IEEE Journal, May 1998
-
Miroslav Dobs´cek, Modern Steganography, Czech Technical University in Prague