scholarly journals Image Steganography combined with Cryptography

2013 ◽  
Vol 9 (1) ◽  
pp. 976-984 ◽  
Author(s):  
Vijaya Lakshmi Paruchuri ◽  
Dr.R. Sridevi ◽  
K.S. SadaSiva Rao

Steganography is the science of invisible communication. Apart from the sender and intended recipient no one suspects the existence of the message. Using Steganography, information can be hidden in various mediums known as carriers. The carriers can be images, audio files, video files and text files. Image Steganography is a technique of using an image file as a carrier. Cryptography protects the information by applying the encryption and decryption techniques, so that the secret message can be understood only by the right person.This paper proposes a method, which combines the techniques of Steganography and cryptography, to hide the secret data in an image. In the first phase, the sender will embed the secret data in an image by using the Least Significant Bit (LSB) technique. The embedded image will be encrypted by using an encryption algorithm. At final, the encrypted image will be decrypted and the hidden data will be retrieved by supplying the valid secret key by the receiver. The process includes the phases of Data embedding, Image Encryption and recovery of both original image and secret data from the encrypted image.

A technique to hide undisclosed information from third party as well, the method of investigation to conceal secret data into the cover frame like text, audio, image and video without any change in substantial results to the carrier image is nothing but Steganography. The contemporary safe and taut steganography of image represents an exigent form of transformation of the inserted secrecy for the receiver with getting undetected [1-5]. In Image steganography, image is the carrier and any secret message (audio or text or image) can be transmitted. This algorithm of LSB can be executed in embedding territory where the secret audio data is inserted into the LSB of envelope image for creating the stego image. This paper gives the hiding of audio data as secret data in an image file using LSB with secret key and an improved inverted LSB image Steganography with improved mean square error and peak signal to noise ratio.


Author(s):  
Huda Kadhim Tayyeh ◽  
Ahmed Sabah Ahmed AL-Jumaili

Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical mechanism where communicating parties can only interpret the secret message. The literature has shown a great interest in the least significant bit (LSB) technique which aims at embedding the secret message bits into the most insignificant bits of the image pixels. Although LSB showed a stable performance of image steganography yet, many works should be done on the message part. This paper aims to propose a combination of LSB and Deflate compression algorithm for image steganography. The proposed Deflate algorithm utilized both LZ77 and Huffman coding. After compressing the message text, LSB has been applied to embed the text within the cover image. Using benchmark images, the proposed method demonstrated an outperformance over the state of the art. This can proof the efficacy of using Deflate as a data compression prior to the LSB embedding.


Author(s):  
Sakshi Meshram ◽  
Pragati Nimje ◽  
Apeksha Dhengre ◽  
Tanvi Bingewar ◽  
Gauri Shende ◽  
...  

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project intends to give an overview of image steganography, its uses and techniques. It also supports steganography in Audio files. For a more secure approach, the project encrypts the message using secret key and then sends it to the receiver. The receiver then decrypts the message to get the original one.


2013 ◽  
Vol 2 (2) ◽  
pp. 134 ◽  
Author(s):  
Agilandeeswari Loganathan ◽  
Brindha Krishnamoorthy ◽  
Stiffy Sunny ◽  
Muralibabu Kumaravel

Communication in digital form has become the part of day todays lifestyle, in certain moment communication is made secret to avoid others from knowing the information. By providing security to the sensitive data it is ensured that the users data is protected from viewing and accessing by others. In the current discussion about data security, Steganographic algorithm using two mediums has been discussed that involves image based encryption and converting to word file. The stage involving image based encryption uses HMAC-MD5 algorithm along with LSB steganography. LSB technique scatters the secret data which have to be protected over the entire image. Convert the embedded image in word file, so that the secret message is made unavailable to others who try to obtain the file. This method provides greater payload capacity along with higher image fidelity and thus make the proposed system is more robust against attacks.


2020 ◽  
Author(s):  
Reshma V K ◽  
Vinod Kumar R S

Abstract Securing the privacy of the medical information through the image steganography process has gained more research interest nowadays to protect the privacy of the patient. In the existing works, least significant bit (LSB) replacement strategy was most popularly used to hide the sensitive contents. Here, every pixel was replaced for achieving higher privacy, but it increased the complexity. This work introduces a novel pixel prediction scheme-based image steganography to overcome the complexity issues prevailing in the existing works. In the proposed pixel prediction scheme, the support vector neural network (SVNN) classifier is utilized for the construction of a prediction map, which identifies the suitable pixels for the embedding process. Then, in the embedding phase, wavelet coefficients are extracted from the medical image based on discrete wavelet transform (DWT) and embedding strength, and the secret message is embedded into the HL wavelet band. Finally, the secret message is extracted from the medical image on applying the DWT. The experimentation of the proposed pixel prediction scheme is done by utilizing the medical images from the BRATS database. The proposed pixel prediction scheme has achieved high performance with the values of 48.558 dB, 0.50009 and 0.9879 for the peak signal to noise ratio (PSNR), Structural Similarity Index (SSIM) and correlation factor, respectively.


Author(s):  
Youssef Taouil ◽  
El Bachir Ameur

Steganography is one of the techniques that enter into the field of information   security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the Faber-Schauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another pair based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.


2017 ◽  
Vol 26 (2) ◽  
pp. 66-77
Author(s):  
Atheer Hussein Zyara

Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image) by LCG algorithm (which generates a series of random numbers) to generate the encrypted cover (irregular image) , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Roseline Oluwaseun Ogundokun ◽  
Oluwakemi Christiana Abikoye

Safe conveyance of medical data across unsecured networks nowadays is an essential issue in telemedicine. With the exponential growth of multimedia technologies and connected networks, modern healthcare is a huge step ahead. Authentication of a diagnostic image obtained from a specialist at a remote location which is from the sender is one of the most challenging tasks in an automated healthcare setup. Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. Therefore, this study proposed a modified least significant bit (LSB) technique capable of protecting and hiding medical data to solve the crucial authentication issue. The application was executed and established by utilizing MATLAB 2018a, and it used a logical bit shift operation for execution. The investigational outcomes established that the proposed technique can entrench medical information without leaving a perceptible falsification in the stego image. The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. The number of shifts was added as a new performance metric for the proposed system. The study concluded that the proposed secured medical information system was evidenced to be proficient in secreting medical information and creating undetectable stego images with slight entrenching falsifications when likened to other prevailing approaches.


Author(s):  
Francis Xavier Kofi Akotoye

<p class="0abstract">The widespread adoption of electronic distribution of material is accompanied by illicit copying and distribution. This is why individuals, businesses and governments have come to think of how to protect their work, prevent such illicit activities and trace the distribution of a document. It is in this context that a lot of attention is being focused on steganography. Implementing steganography in text document is not an easy undertaking considering the fact that text document has very few places in which to embed hidden data. Any minute change introduced to text objects can easily be noticed thus attracting attention from possible hackers. This study investigates the possibility of embedding data in text document by employing the entropy rate of the constituent characters of words not less than four characters long. The scheme was used to embed bits in text according to the alphabetic structure of the words, the respective characters were compared with their neighbouring characters and if the first character was alphabetically lower than the succeeding character according to their ASCII codes, a zero bit was embedded otherwise 1 was embedded after the characters had been transposed. Before embedding, the secret message was encrypted with a secret key to add a layer of security to the secret message to be embedded, and then a pseudorandom number was generated from the word counts of the text which was used to paint the starting point of the embedding process. The embedding capacity of the scheme was relatively high compared with the space encoding and semantic method.</p>


Author(s):  
Meera Tamboli

Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.


Sign in / Sign up

Export Citation Format

Share Document