IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, August, 2013, Pg. 64-69

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Enhanced Capacity and High Security Data Steganography: A Review Raghvendra Sharma1, Prof. Uday Pal Reddy2 1 ,2

Department of Computer Science Engineering, IES College of Technology(Bhopal), INDIA 1 [email protected]

Abstract Steganography is technique to secure sensitive information which is being stored somewhere or transferring over network. There are various techniques proposed for providing security to data. In this paper we are reviewing the techniques which were proposed to hide or to secure data with their capacity and level of security. In the near future this technique will be the preferred technique for data hiding and secure transmission over network or storing somewhere on the third party servers. After study we have found that the LSB technique is the most reliable in terms of capacity as well as security.

Keywords: Steganography, Capacity, Data Hiding, Secure Transmission.

1. Introduction Steganography is one of the ways of invisible communication. Its purpose is to secure (hiding) the very presence of communication by integrating messages into visible cover objects. Every Steganographic system has an integrating algorithm and an extraction algorithm. To hide a secret message behind a digital image, the original image is slightly modified by the integrating algorithm. The result is amended cover object that contains the secret message and it is called stegano object. The main requirement for a Steganographic system is its detectability by a hacker with probability not more than random trials, given the full knowledge of the integrating algorithm, including the statistical properties of the source of cover object Of course the stegano key is not revealed. The most commonly used Steganographic method is the Least Significant Bit (LSB) replacement. It works by integrating message bits as the LSBs of randomly selected pixels. A secret stegano key shared by the communicating parties usually finds pixel selection. Security of information being shared is essential for confidential data transfer. Steganography is a technique used for secure transmission of sensitive information. It can be categorize as digital watermarking and steganography. The first is mainly used for copyright protection of software products while, and second category is a way of transforming data into invisible communication. Securing information in a picture of anything is less suspicious than communicating an encrypted file [2].

Raghvendra Sharma, IJRIT

64

The main purpose of steganography is to communicate information secretly by concealing the very existence of information in some other form like image file, audio file, or video file. The form used to embed information is known as cover file. The cover object with the hidden information is called as stegano-object [1]. In this paper color image is taken as cover and two grey scale images are considered as secret information. Secret images and stegano keys are embedded in the cover image to get stegano image. There are various factors to be considered when designing a steganography system [14]: • Invisibility: Making data invisibility technique to be unobserved by the human eye. • Capacity: The amount of information data that can be hidden in cover object without weakening the quality of the cover object. • Robustness: It is the ability of the stegano to withstand manipulations such as filtering, cropping, rotation, compression etc. • Security: Even if a hacker realizes the existence of the information in the stegano object it should be impossible for the attacker to detect the information. The closer the stegano image to the original image, the higher the security. It is calculated in terms of PSNR.

  = 10 log  √ where L = maximum value, MSE = Mean Square Error. 

′    = ∑  | −  |  where X = original value, X’ = stegano value and N = number of samples.

(1)

(2)

High PSNR value indicates high security because it indicates minimum difference between the original and stegano values. So no one can suspect the hidden information. Techniques of a Steganographic system can be categorized into spatial domain methods and frequency domain methods [1]. In spatial domain methods, directly embed the secret data within the image pixel values. The main benefit of these methods is very simplicity. And These methods weakness is low ability to bear signal processing operations. To come under this category are Pallet based methods. In frequency domain methods, the first step is to transform frequency of the cover image into different domain. Then the transformed domain are embedded to hide the secret data. These changed domain or coefficients are transformed back into spatial domain to get steno image. The benefit of transform domain methods is the high capacity to face signal processing operations. However, methods of this type are highly computation more complex. Steganography frequency domain using methods DCT (Discrete Cosine Transforms), DWT (Discrete Wavelet Transforms), IWT, DFT (Discrete Fourier Transforms).

.

2. Types of Steganographic Methods The steganography technique used today can be broadly classified into three categories: first Pure Steganography, second Secret key Steganography and third Public key Steganography.

(a) Pure Steganography It is defined as a Steganographic system that does not require the exchange of a cipher such as a steganokey. This method of secret communication is treated as least secure means of communication. The sender and receiver rely upon the presumption that no other parties are aware of this secret message. But the amateur hackers who are working 24x7, can scan the cover (stegano) using various tools available today to guess the presence of a possible secret message and can either alter or destroy it on the way.

Raghvendra Sharma, IJRIT

65

(b) Secret Key Steganography It is a method that involves exchange of stegano-key pre or post communication of secret message steganographically. Secret Key Steganography takes a cover message and embeds the secret message inside of it by randomized technique. The random key that forms the secret key is also called stegano-key. Only the communicating partners know the stegano key and can reverse the process and read the secret message. Secret key steganography is more secure than pure steganography because only those parties who know the secret key can extract the secret message.

(c) Public Key Steganography It uses the concepts of public key cryptography [3]. Public key steganography is defined as a Steganographic method that uses a public key and a private key to secure the communication between the two parties. This technique gives a more robust way of implementing a Steganographic system because it can utilize a much more robust and researched technology in Public Key Cryptography. Before any unwanted parties could intercept the secret message they have to first suspect the use of steganography and then they have to find a way to crack the algorithm used by the public key system. In this way it provides multiple layers of security.

(d) Substitutional Steganography In this type some elements of the redundant covering medium are substituted by the elements of the stegano medium.

(e) Selecting Steganography In this type some elements of the covering medium are selected to carry the hidden messages. The useful information is hidden in a low frequency region of a wide band noise. The hiding (low frequency) band is vary time to time.

(f) Constructional Steganography In this type the stegano message is made similar to the structure of the covering medium. The stegano image and the covering medium both look similar. This is called constructional steganography [15].

3. System Model The generalized steganography system is a secret information sharing system which is shown below [4]

Fig. 3.1 Steganographic System

Raghvendra Sharma, IJRIT

66

Alice uses the a cover to hide the stegano object with the help of a key generated from a random source and the result is Alice sending a letter to Bob which he then decodes using the same shared-key and extracts the message from the cover.

3.1 Steganography Techniques • • • • • •

Secret messages within the lowest bits of noisy images or sound files. Concealing information within encrypted information. Chaffing the secret message with unrelated cover material and winnowing with use of message-authentication code. Embedded pictures in video material (played at slower or faster speed). Inject invisible delays to packets sent over the network from the keyboard and the delays in the packets can be used to be encode data. A microdot technology used in Genomic steganography where different combinations of amino bases or nucleotides signify the letters of their message. other sequences of amino – bases are added to this threads to serve as a “key” to finding the thread containing the embedded message.

Two techniques are available to those wishing to transmit secrets using unprotected communications media. First is cryptography in which the secret information is scrambled and can be recovered only by the authorized key. During the use of cryptography, the main idea behind is secret was transmitted is visible to everyone. Another method is steganography. Here the secret information is embedded with another message in a manner so that, secret information will be invisible. Thus, the idea is that the information is being transmitted is hidden. General use of digital data in automated systems has resulted in regeneration for steganography. Data which provides the best carrier for steganography is that which stored with accuracy greater than importance of usage information and display. Image, Scripts, and audio files are fulfilling the above criteria of such category, while executable code files, text & database not matched.

4. Literature Survey Image steganography is the research area among several researchers few of them are discussed here. Zheng and Liu[4] worked on how to identify the steganography application based on the characteristics of steganography algorithm and discussing the difficulty in the approach of identifying the steganography application. Based on the principles of LSB Steganography algorithm (include LSB Replacement and LSB Matching), an approach to identify steganography software by Feature Matching as shown in the Figure 3.1

(a)

(b) Fig. 4.1 (a) & (b) Least Significant Bit (LSB) Hiding Technique[7]

Raghvendra Sharma, IJRIT

67

The primary ideas to change operations to the pixels in the LSB steganography algorithm which are taken as the feature of the application, and analyzed the implementation based on LSB Steganography algorithm, and then build the corresponding feature for each of implementations.

Fig. 4.2 The adaptive embedding process[8].

And Hamdaqa, M; Tahvildari, L. [5] done research on VoIP steganography, which uses VoIP protocols and traffic as a covert channel to conceal sensitive information, a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic created, that is proved to be very useful to utilize. Present VoIP steganography methods are lack of mechanisms to provide reliability without weakening the system. Refer to the Fig. 4.2. The other way of steganography is cryptography based under which Marwaha, P. [6] Cryptography involves converting a message text into an unreadable cipher. Steganography integrates information into a cover image and invisible its presence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to hacking attacks. Though following methods are often integrate together to achieve maximum security but yet there is a need of a more secure system to transfer information over possible communication methods minimizing the chances of being theft.

5. Conclusion and Future Work This study is about the steganography which has some effective work done and lots of areas need to improve. From the study it was shown that none of the method is completely suitable for performance. But the best one is LSB based Steganographic method which has advantages over other methods. From the security point of view the cryptographic method is most suitable the process of steganography is quiet complex than other methods. So if someone will look forward for improvement in the process, cryptographic method will have the good results as we have seen from study.

6. References [1] Katzenbeisser, S. and Petitcolas, F.A.P., (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston, London.

[2] Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath. “A SECURE AND HIGH CAPACITY IMAGE STEGANOGRAPHY TECHNIQUE”, Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1, February 2013.

Raghvendra Sharma, IJRIT

68

[3] Stallings, W.: Cryptography & Network Security: Principles and Practice, Prentice Hall, (1999).

[4] Yongzhen Zheng; Fenlin Liu; Xiangyang Luo; Chunfang Yang "A Method Based on Feature Matching to Identify Steganography Software", 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), Page(s):989-994.

[5] Hamdaqa, M. ; Tahvildari, L. "ReLACK: A Reliable VoIP Steganography Approach", 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement (SSIRI), Page(s): 189-197.

[6] Marwaha, P. "Visual cryptographic steganography in images", 2010 International Conference on Computing Communication and Networking Technologies (ICCCNT), Page(s): 1-6.

[7] Atallah M. Al-Shatnawi, “A New Method in Image Steganography with Improved Image Quality”. Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 – 3915.

[8] Hui Tian, Ke Zhou, Hong Jiang, Yongfeng Huang, Jin Liu, Huazhong, “An Adaptive Steganography Scheme for Voice over IP”. IEEE International Symposium on Circuits and Systems, 2009. ISCAS 2009.

Raghvendra Sharma, IJRIT

69

Enhanced Capacity and High Security Data Steganography: A ... - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, ... of Computer Science Engineering, IES College of Technology(Bhopal), INDIA .... provides the best carrier for steganography is that which stored with ...

551KB Sizes 2 Downloads 256 Views

Recommend Documents

Enhanced Capacity and High Security Data Steganography: A ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, .... provides the best carrier for steganography is that which stored with ...

Enhanced Trust based security method for MANET - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.466 -470 ... Pundalik Ranjolekar, Associate Professor.

Enhanced Trust based security method for MANET - IJRIT
Computer Science & Engineering, VTU Belgaum. KLE Dr. M. S. Sheshgiri College of Engineering & Technology, Belgaum, Karnataka, India .... rectangles drawn on top of lifelines to represent that processes are being performed in response to ...

Implementation of Audio Steganography over Two Level LSB ... - IJRIT
The final type of audio steganography worth mentioning is Spectrum Coding. ... D. Gruhl, R. Hwang, F. J. Paiz, S. Pogreb, “Techniques for data hiding”, IBM.

High Capacity Data Hiding for Error-Diffused Block ...
plementary Hiding Error-Diffused Block Truncation Coding ..... Instead, the substitution, namely Human visual system PSNR ...... edu.tw/public file/ImageSet.rar ...

Steganography: Data Hiding in Images
cryptography. Cryptography concentrates more on the security or encryption of data whereas. Steganography aims to defeat the knowledge of encryption of the message. Watermarking is about protecting the content in images;. Steganography is all about c

CycleGAN, a Master of Steganography
Dec 16, 2017 - strate an intriguing property of the model: CycleGAN learns to “hide” information about a source image into the images it generates in a nearly imperceptible, high- frequency signal. This trick ensures that the generator can recove

Evolving Methods of Data Security in Cloud Computing - IJRIT
TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for

Video steganography
Jul 11, 2003 - ing, resampling, conversion from digital to analog and back again, etc. ...... 855-884. Pitas et al., “Applying Signatures on Digital Images,” IEEE.

Data Mining: Current and Future Applications - IJRIT
Language. (SQL). Oracle, Sybase,. Informix, IBM,. Microsoft. Retrospective, dynamic data delivery at record level. Data Warehousing. &. Decision Support. (1990s). "What were unit sales in. New England last. March? Drill down to. Boston. On-line analy

Data Mining: Current and Future Applications - IJRIT
(KDD), often called data mining, aims at the discovery of useful information from ..... Advanced analysis of data for extracting useful knowledge is the next natural ...

Data Mining: Current and Future Applications - IJRIT
Artificial neural networks: Non-linear predictive models that learn through training ..... Semi-supervised learning and social network analysis are other methods ...

Video steganography
Jul 11, 2003 - Design of Hidden Transmission,” Radioengineering, vol. 4,. No. 2, Jun. .... Communications—a Tutorial RevieW—Part I,” IEEE Com munications .... [ASSIGN EITHER A 0 OR A I TO EACH CROSS-CORRELATION RESULT.

Weavable high-capacity electrodes
bDepartment of Materials Science and Engineering, University of Maryland, College Park, MD 20742, USA ... materials. A particularly intriguing goal is to develop weavable CNT yarn electrodes that incorporate high energy density mate- rials such as si

Security and Interoperability in Cloud Computing and Their ... - IJRIT
online software applications, data storage and processing power. ... Interoperability is defined as Broadly speaking, interoperability can be defined ... Therefore, one of the solutions is to request required resources from a cloud IaaS provider.

Security and Interoperability in Cloud Computing and Their ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... which its role is a service management, data transmission, service brokerage ...

Review on Data Warehouse, Data Mining and OLAP Technology - IJRIT
An OLAP is market-oriented which is used for data analysis by knowledge ..... The data warehouse environment supports the entire decision. Database. Source.

Review on Data Warehouse, Data Mining and OLAP Technology - IJRIT
used for transactions and query processing by clerks, clients. An OLAP is market-oriented which is used for data analysis by knowledge employees, including ...

Techniques for DNA database security: A Review - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 133- ... From last few years DNA sequencing techniques are advancing. .... Genetic algorithm is having a high degree of autonomy used for.

Review on Data Security Issues and Data Security ...
Software as a Service consists of software running on the provider's cloud .... and security design, are all important factors for estimating your company's security.

A Security Enhanced AODV Routing Protocol Based On ...
Abstract—Ad Hoc networks are characterized by open medium, dynamic topology ... provide secure and reliable data forwarding services, nodes should priorly ...

Survey on Data Clustering - IJRIT
common technique for statistical data analysis used in many fields, including machine ... The clustering process may result in different partitioning of a data set, ...