Skip to content

An enhanced method for information hiding using cryptography and steganography

License

Notifications You must be signed in to change notification settings

aroyofficial/incognitobit

Repository files navigation

Project IncognitoBit

This project comes with a GUI using which users can hide any message within an image and also they can retrieve the message from a stego image (which contains a message). This project implements a secure steganographic algorithm which is described in this document.

Click Here to see the documentation

How to install and run

Step 1

Click here to install the exe.

or

Click here to install the zip.

Also can clone this repository in the local machine by copying and pasting the anyone of the link given below in git bash

git clone https://github.com/aroyofficial/incognitobit.git
[email protected]:aroyofficial/incognitobit.git
gh repo clone aroyofficial/incognitobit

Step 2

After performing Step 1, run main.py file with the latest Python compiler (Python 3 or above)

How to use

  • How to hide a message inside a cover image

  • 1. Run main.py file.
    2. Go to Encryption tab.
    3. Click on the Upload Image button and upload an image (must have .png extension).
    4. Write some message in the input box or can upload a text file by clicking Upload Text button.
    5. Now click on Generate Stego Image button.
    6. Wait some time and then can see the stego image (which contains your message) in the right sub-window.
    7. Now can save the stego image by clicking on Save Stego Image button.

    (Guide) How to hide a message inside an image using IncognitoBit

  • How to retrieve message from an image

  • 1. Run main.py file.
    2. Go to Decryption tab.
    3. Click on the Upload Image button and upload an image (must have .png extension) from which you want to retrieve the message.
    4. Now click on Retrieve Message button.
    5. Wait some time and then result appears on the screen. If that image contains any message then it will be shown in the right sub-window; otherwise it will show No hidden message found.
    6. If message retrieved successfully; then it can be saved into a text file by clicking on Save Message button.

    (Guide) How to retrieve message from an image using IncognitoBit

  • Other functionalities

  • Reset - To reset the application.
    Exit - To close the application.

Acknowledgement

It gives us immense pleasure to announce the completion of our project on “An Enchanced Method for Information Hiding using Cryptography And Stenganography” and we are pleased to acknowledge our indebtedness to all the persons who directly or indirectly contributed in the development of this work and who influenced our thinking, behavior and acts during the course of study. We are thankful to our departmental Coordinator professor Mr. Dibyendu Samanta (Assistant Professor and Coordinator, Hooghly Engineering and Technology College) who granted all the facilities of the college to us for the fulfilment of the project. We are thankful and express our sincere gratitude to our project guide Mr. Dibyendu Samanta who gave his/her valuable time to us for the sake of our project. He helped us each and every aspect of our project both academically and mentally. Finally, the team expressed their gratitude to our respected Principal-In-Charge Dr. Smitadhi Ganguly. Without his support our project would not have seen the light of success.

Arijit Roy, CSE Dept., 8th Semester
University Roll No. – 17600118067
Academic Year 2021-‘22

Arkadeep Roy, CSE Dept., 8th Semester
University Roll No. – 17600118065
Academic Year 2021-‘22

Arkadip Basu Mallick, CSE Dept., 8th Semester
University Roll No. – 17600118064
Academic Year 2021-‘22

Shayani Das, CSE Dept., 8th Semester
University Roll No. – 17600118029
Academic Year 2021-‘22

Abstract

Digital images are being exchanged over various types of networks. With the huge growth of computer networks and the latest advances in digital technologies, a huge amount of digital data is being exchanged over various types of networks. It is often true that a large part of this information is confidential, private or both, which increase the demand for stronger encryption techniques. Steganography is a preferred technique for protecting the transmitted data. It is used to hide information to perform encryption. Steganography techniques are getting significantly more sophisticated and have been widely used. These techniques are the perfect supplement for encryption that allows a user to hide large amounts of information within an image. It seeks to provide a covert communication channel between two parties. The objective of this project is to provide a secret and secured communication between people. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. This project simply hides a text message in an image file. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project intends to give an overview of cryptography, image steganography, their uses and techniques. In this proposed system Cryptography and Steganography are merged together. The contents of secret message are first kept secret by cryptography; whereas in image steganography the encrypted messages as payload are embedded into the cover image using a novel 3-3-2 LSB. The image steganography takes the advantage of human eye limitation. It uses colour image as cover media for embedding secret message. The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this project a method is proposed to embed a colour secret image into a colour cover image. A 3-3-2 LSB insertion method has been used for image steganography.

Table of contents

  1. Introduction
  2. Literature Review
  3. System Requirements
  4. Theoretical Background
  5. Overview of Cryptography
  6. Types of Cryptography
  7. Overview of Steganography
  8. Types of Steganography
  9. Proposed Method
  10. Conclusion
  11. Future Scopes
  12. References

Introduction

Steganography is defined as the art and science of writing hidden messages in such a way that no one else, apart from the intended recipient knows the existence of the message. The word “steganography” is basically of Greek origin which means “hidden writing”. The word is classified into two parts: “steganos” which means “secret” and “graphic” which means “writing”. However, in hiding information, the meaning of steganography is hiding text or secret messages into another media file such as image, text, sound, or video. The word “steganography” is often considered similar to “cryptography” and “watermarking”. Whilst watermarking ensures message integrity and cryptography scrambles the message, steganography hides it. The primary objective of steganography is to avoid drawing attention to the transmission of hidden information. If suspicion is raised, then this objective has been planned to achieve the security of the secret message because if the hackers noted any change in the sent message, then this observer will try to know the hidden information inside the message.
The basic terminologies used in the steganography systems are the cover message, secret message, secret key, and embedding algorithm. The particular medium such as text, image, audio, video within which the message is to be hidden is known as cover medium.
To provide an extra layer of security, the original message is also changed into some secret message and then it is hidden inside the cover medium. Finally, with the help of embedding algorithm secret message is hidden inside the cover medium. In steganography, before the hiding process, the sender must select an appropriate message carrier, an effective message to be hidden. A robust steganographic algorithm must be selected that should be able to embed the message more effectively. The sender then may send the hidden message to the receiver by using any of modern communication techniques. The receiver can extract the hidden message using the retrieval algorithm. This project proposes an algorithm to hide data inside an image using a secure steganographic technique.
This project comprehends the following objectives –

1. Original message is converted into a secret message using a strong symmetric key cryptography algorithm.
2. Secret message is hidden inside the color cover image using 3-3-2 LSB insertion technique.
3. To produce security tool based on steganographic techniques.

Literature Review

In [1] Shilpa Gupta, Geeta Gujral, and Neha Aggarwal proposed an enhanced approach of LSB steganography where distortion will be almost negligible. Authors are suggested to use 24 bitmap images to hide the secret message. The secret message is to be hidden only in the blue channel. Firstly, all the pixels within the cover image are filtered with a pixel selection filter and then the pixel with less distortion is selected and the LSB of the blue channel of that pixel is replaced by message bits. The proposed method results in a high PSNR value compared to conventional LSB method.
In [2] a new approach for LSB based image steganography using secret key is introduced by S. M. Masud Karim, Md. Saifur Rahman, and Md. Ismail Hossain. In this technique message bits are hidden in LSB of green and blue channel. One by one pixels are selected and XOR operation is performed between LSB of red channel and the first bit of secret message. If result is 0 then LSB of green channel is replaced by the message bit. Otherwise, LSB of blue channel is replaced by the message bit. Then again next bit of secret message and the LSB of red channel of the next pixel is selected and this process continues until the whole message is going to be hidden inside cover image. This method has also a high PSNR value.
In [3] Mamta Juneja, and Parvinder S. Sandhu proposed a new method of hiding message into an image using LSB steganography. Firstly, message is converted into cipher using S-DES algorithm. Now, smooth edges of the cover image are detected by a custom filter composed of Canny filter and Hough transform. Then using a Pseudo Random Number Generator, pixels are selected randomly from the detected smooth edges. Finally, 1 LSB of red channel, 3 LSB of green channel, and 4 LSB of blue channel of the randomly selected pixel is replaced by the bits of the cipher message. This method has a high PSNR value because only smooth edges are slightly changed
In [4] Marwa M. Emam, Abdelmgeid A. Aly, and Fatma A. Omara introduced a new approach on LSB steganography with random pixel selection. In this approach pixels are selected randomly using a Pseudo Random Number Generator. Channels are selected in a repeated manner of blue-3 green and blue channel. In blue channel 2 LSBs, and in green channel only 1 LSB is replaced by the message bit.
In [5] Hamid M. Farhan, and Zena Ahmed Alwan proposed a method of doing LSB steganography by using 2 Exclusive-OR operation. First XOR is performed between LSB of red channel and the first message bit. Then second XOR is performed between result of the first XOR and LSB of green channel. Finally, the LSB of the blue channel is replaced by the result of second XOR. This process continue until the entire message is going to be hidden. This method has a high PSNR as of only ± 1 change in the blue channel of every pixel.
In [6] Lip Yee Por, Delina Beh, Tang Fong Ang., and Sim Ying Ong proposed a method of steganography by combining stego one, two, three, four-bit LSBs and stego color cycle algorithm. By using color cycle algorithm, pixels are selected sequentially and 1-, 2-, 3-, and 4-bit LSB steganography is applied on each and every channel. The proposed method uses LSB substitution very effectively so that the relative change between RGB channel of stego image is minimal and it uses more secured multi-layered embedding effectively.
In [7] a new method in image steganography with improved image quality is proposed by Atallah M. Al-Shatnawi, where secret messages are hidden within the randomly selected pixels. At first red channel is selected and then two message bits are taken. Then two least significant bits of red channel is taken and it is checked whether they are identical with the message bits or not. If identical then there is no need to hide that two message bits. If not identical then we take next two least significant bits of red channel and again they are checked with the message bits. If the message bits are not identical with any of the two contiguous bits of red channel, then the message bits are replaced with two least significant bits of red channel. Then again next two message bits are selected and this same process is applied on green and blue channel. Also, the hiding locations are saved in a binary table. This whole process is continued until the whole message is going to be hidden inside the cover image. This method has high PSNR value.
In [8] a new encrypted method of image steganography by Sabyasachi Pramanik, Dr. R. P. Singh, Ramkrishna Ghosh where secret messages can be hidden by using the CAPTCHA codes within 4 a cover image using image steganography. Here the CAPTCHA image is embedded into a 24-bit color image using the LSB of Red, Green and Blue pixels of the 24-bit color image. For each and every character in the captcha a flag bit is set (flag bit is either 0 or 1 depending upon 0 to 1 which have lesser number of occurrences in 7-bit binary ASCII). Now this flag bit is concatenated with the 2-bit binary representation of number of occurrences of flag bit within the ASCII. Finally, this 3-bit binary is converted into decimal and it is concatenated with the positions of flag bit (calculated from left to right started with 1). Now, this final decimal string becomes particular code for that character. Similarly, code is calculated for other characters in the CAPTCHA. Now these codes are converted into binary and they are hidden according to conventional LSB.
In [9], This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message. The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.

System Requirements

Minimum Hardware Requirements

Processor: Intel Dual Core CPU @ 1.60 GHz
RAM: 512 MB of RAM @ 1.60 GHz
Hard Disk: 80 GB

Software Requirements

Operating System: Windows 7 / 8 / 10
Tool Used: Python 3

Theoretical Background

The term Steganography refers to the art of covert communications. By implementing steganography, it is possible for Alice to send a secret message to Bob in such a way that no-one else will know that the message exists. Typically, the message is embedded within another object known as a cover Work, by tweaking its properties. The resulting output, known as a stegogramme is engineered such that it is a near identical perceptual model of the cover Work, but it will also contain the hidden message.
It is this stegogramme that is sent between Alice and Bob. If anybody intercepts the communication, they will obtain the stegogramme, but as it is so similar to the cover, it is a difficult task for them to tell that the stegogramme is anything but innocent. It is therefore the duty of steganography to ensure that the adversary regards the stegogramme - and thus, the communication - as innocuous.
One of the oldest examples of steganography dates back to around 440 BC in Greek History. Herodotus, a Greek historian from the 5th Century BC, revealed some examples of its use in his work entitled "The Histories of Herodotus". One elaborate example suggests that Histaeus, ruler of Miletus, tattooed a secret message on the shaven head of one of his most trusted slaves. After the hair had grown back, the slave was sent to Aristagorus where his hair was shaved and the message that commanded a revolt against the Persians was revealed In this example, the slave was used as the carrier for the secret message, and anyone who saw the slave as they were sent to Aristagorus would have been completely unaware that they were carrying a message. As a result of this, the message reached the recipient with no suspicion of covert communication ever being raised.
In modern terms, steganography is usually implemented computationally, where cover Works such as text files, images, audio files, and video files are tweaked in such a way that a secret message can be embedded within them. The techniques are very similar to that of digital watermarking; however, one big distinction must be highlighted between the two. In digital 7 watermarking, the focus is on ensuring that nobody can remove or alter the content of the watermarked data, even though it might be plainly obvious that it exists.
Steganography on the other hand, focuses on making it extremely difficult to tell that a secret message exists at all. If an unauthorized third party is able to say with high confidence that a file contains a secret message, then steganography has failed.
Steganography also differs from cryptography because the latter does not attempt to hide the fact that a message exists. Instead, cryptography merely obscures the integrity of the information so hat it does not make sense to anyone but the creator and the recipient. The adversary will be able to see that a message exists, and the inverse process of cryptanalysis involves trying to turn the meaningless information into its original form. With this said, it is still highly likely that a complete steganographic system might employ cryptographic measures as a safety-net to protect the content of the message in the event that the steganography is broken.

Overview of Cryptography

‘Cryptography’ this word is originated from the Greek words ‘kryptos’ meaning hidden and ‘graphein’ meaning writing. So, Cryptography is the practice of hiding messages into secret form and how to retrieve the original one from the secret one. Cryptography and the use of secret codes began thousands of years ago to communicate secretly and securely.
The history of cryptography begins where many old tales do…. in ancient Egypt with hieroglyphics. These were not meant to hide messages so much as to give a formal and ceremonial touch to stories of everyday events. During the industrial age, cryptography was moved from a manual exercise to one done by machines. The invention of cipher disks and rotors for this use allowed for the creation of much more complex algorithms.
Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same.
Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (called plaintext) into unintelligible text (called cipher text). Decryption is the reverse, in other words, moving from the unintelligible cipher text back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in eachinstance by a "key". This is a secret (ideally known only to the communicants), usually a short string of characters, which is needed to decrypt the cipher text. A "cryptosystem" is the ordered list of elements of finite possible plaintexts, finite possible cipher texts, finite possible keys, and the encryption and decryption algorithms which correspond to each key. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes.

Types of Cryptography

Modern Cryptography is of 3 types.

Figure I. Types of Cryptography

a) Symmetric / Public key cryptography is a group of cryptographic algorithms where using the same key a message is encrypted on the sender side and decrypted on the receiver side. The encryption and decryption key are same; that is why this is known as public key cryptography. Again, this type of cryptography is divided into two different types. One is block cipher (plain text is divided into fixed or variable length of blocks and encryption is applied on each and every block) and another is stream cipher (a stream of keys is generated and then using them encryption is applied). This was the only kind of encryption publicly known until June 1976.Only agents with the secret key can encrypt or decrypt the data. Some popular symmetric key cryptographic algorithms are AES, DES, etc. An example is given in Figure II.

Figure II. Symmetric/Public key cryptography

b) Asymmetric / Private key cryptography is a group of cryptographic algorithms where different keys are used for encryption and decryption process. This is also known as private key cryptography because encryption and decryption keys are not same; rather we can say they are private. A significant disadvantage of symmetric ciphers is the key management necessary to use them securely. Each distinct pair of communicating parties must, ideally, share a different key, and perhaps each cipher text exchanged as well. In a groundbreaking 1976 paper, Whitfield Diffie and Martin Hellman proposed the notion of public-key (also, more generally, called asymmetric key) cryptography in which two different but mathematically related keys are used—a public key and a private key. A public key system is so constructed that calculation of one key (the 'private key') is computationally infeasible from the other (the 'public key'), even though they are necessarily related. Instead, both keys are generated secretly, as an interrelated pair. Some popular asymmetric key cryptographic algorithms are RSA, Diffie-Hellman, etc. An example is given in Figure III.

Figure III. Asymmetric/Private key cryptography

c) Hashing is a technique where a mathematical function is taken, generally known as hash function. By applying the hash function plain text is converted into cipher text. A cryptographic hash function is an algorithm that takes an arbitrary amount of data input—a credential—and produces a fixed-size output of enciphered text called a hash value, or just “hash.” That enciphered text can then be stored instead of the password itself, and later used to verify the user.
Certain properties of cryptographic hash functions impact the security of password storage.
Non-reversibility, or one-way function. A good hash should make it very hard to reconstruct the original password from the output or hash.
Diffusion, or avalanche effect. A change in just one bit of the original password should result in change to half the bits of its hash. In other words, when a password is changed slightly, the output of enciphered text should change significantly and unpredictably.
Determinism. A given password must always generate the same hash value or enciphered text.
Collision resistance. It should be hard to find two different passwords that hash to the same enciphered text.
Non-predictable. The hash value should not be predictable from the password. Some popular hashing algorithms are SHA-256, MD5, etc.
A particular cryptographic algorithm from any of the above categories must assure some parameters in order to consider it as a strong algorithm. The parameters are key-length, confusion and diffusion, external factors for system design, etc.
Cryptanalysis: Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.
In addition to mathematical analysis of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.
Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced computerized schemes of the present. Methods for breaking modern cryptosystems often involve solving carefully constructed problems in pure mathematics, the best-known being integer factorization.

Overview of Steganography

The word ‘steganography’ originated from the Greek word ‘steganographia’. This word was first ever founded in the year 1499 in the book of a Greek author named Johannes Trithemius. This word is basically a combination of two separate words. ‘steganos’ means hiding or hiding within something and ‘graphia’ means writing. So, steganography is the practice of hiding messages inside any medium, etc. The particular medium such as text, image, audio, video within which the message is to be hidden is known as cover medium. To provide an extra layer of security, the original message is also changed into some secret message and then it is hidden inside the cover medium. Steganography based communication over easily accessible platforms to prevent leakage of information. Here, embedding of information in a cover image is shown below:

Figure IV. Stego System

Information is added by the sender and if the receiver wants to get the original image, then he needs to extract the embedded image with the help of the secret information provided by the sender. When the receiver will receive the file will be in the embedded form and by extracting it he or she can use or read the original object file which is sent by the sender. This embedding of the binary code is different for the different types of the files.

Types of Steganography

Based on the cover medium there are different types of steganography which are given below in the Figure V.

Figure V. Types of Steganography

In modern steganography, especially digital steganography becomes popular and stand apart from others. In digital steganography, different multimedia files are used to hide the message. Due to the large media file size; it is also hard to find the message within the cover medium. There are several techniques of doing the digital steganography. They are given below in the Figure VI.

Figure VI. Steganography Techniques

Within these techniques, spatial and transform domain techniques are mostly used.

  • Image Steganography

  • a) LSB stands for Least Significant Bit steganography. In this technique, least significant bits are replaced with the message bits so that the minimum distortion will be resulted in the cover medium and which is imperceptible to the human eye. In Figure VII an example is given.

        


    Figure VII. LSB Steganography on Lena Image

    b) PVD stands for Pixel Value Differencing. Two pixels are chosen from the cover medium and it is checked that whether they are belonging to the smooth area or an edge. Then the distortion is calculated by the pixel value difference. Then the message bit is hidden on those pixels.
    c) BPC stands for Binary Complexity Pattern analysis. In this technique the message bits are changed into binary pattern and then the noisy area of the cover medium is replaced by this pattern. The Human visual system has such a special property that a too-complicated visual pattern cannot be perceived as "shape- informative." For example, on a very flat beach shore every single square-foot area looks the same - it is just a sandy area, no shape is observed. However, if you look carefully, two same-looking areas are entirely different in their sand particle shapes. BPCS-steganography makes use of this property. It replaces complex areas on the bit-planes of the vessel image with other complex data patterns (i.e., pieces of secret files). This replacing operation is called "embedding." No one can see any difference between the two vessel images of before and after the embedding operation.
    An issue arises where the data to be embedded appears visually as simple information, if this simple information replaces the complex information in the original image, it may create spurious 'real image information'. In this case the data is passed through a [binary image conjugation transformation], in order to create a reciprocal complex representation.
    d) DCT stands for Discrete Cosine Transform. In this technique, cover medium like image is transformed into frequency domain from spatial domain. Using this technique, an image is broken into basic images as sinusoidal function. During the process, the secret message is hidden in DCT coefficients. A discrete cosine transform (DCT) expresses a finite sequence of data points in terms of a sum of cosine functions oscillating at different frequencies. The DCT, first proposed by Nasir Ahmed in 1972, is a widely used transformation technique in signal processing and data compression. It is used in most digital media, including digital images (such as JPEG and HEIF, where small high-frequency components can be discarded), digital video (such as MPEG and H.26x), digital audio (such as Dolby Digital, MP3 and AAC), digital television (such as SDTV, HDTV and VOD), digital radio (such as AAC+ and DAB+), and speech coding (such as AACLD, Siren and Opus).
    e) DFT stands for Discrete Fourier Transform. This is also similar as the previous technique. The discrete Fourier transform (DFT) converts a finite sequence of equally-spaced samples of a function into a same-length sequence of equally-spaced samples of the discrete-time Fourier transform (DTFT), which is a complex- valued function of frequency. The interval at which the DTFT is sampled is the reciprocal of the duration of the input sequence.
    f) DWT stands for Discrete Wavelet Transform. It is any wavelet transform for which the wavelets are discretely sampled. In this technique the high and low frequency regions of an image is detected and based on it the message is hidden in a particular portion which results in a minimum distortion. As with other wavelet transforms, a key advantage it has over Fourier transforms been temporal resolution: it captures both frequency and location information (location in time). These all techniques are used to implement steganography but not directly. Some algorithm is used with these techniques to make it stronger and variant. These steganographic algorithms must assure some parameters like PSNR (Peak Signal to Noise Ration), MSE (Mean Squared Error), imperceptibility, bit error rate, robustness, etc. to make sure that it is a secure algorithm.

  • Audio Steganography

  • In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. There are several methods are available for audio steganography. Some of them are as follows -
    a) Phase coding is a scheme where the phase of carrier file is replaced with reference phase which represents hidden data. In parity coding signals are divided into regions, then parity bit of each region calculated and matched with secret message bit. Depending on parity matching result encoding is done.
    b) Spread spectrum technique spreads hidden data through the frequency spectrum. Spread spectrum (SS) is a concept developed in data communications to ensure a proper recovery of a signal sent over a noisy channel by producing redundant copies of the data signal. Basically, data are multiplied by an M-sequence code known to both sender and receiver, then hidden in the cover audio. Thus, if noise corrupts some values, there will still be copies of each value left to recover the hidden message. In conventional direct sequence spread spectrum (DSSS) technique was applied to hide confidential information in MP3 and WAV signals. Spread spectrum is combined to phase shifting in order to increase the robustness of transmitted data against additive noise and to allow easy detection of the hidden data. Appropriately chosen sub-band coefficients were selected to address robustness and resolve synchronization uncertainty at the decoder.
    c) Tone coding focuses on the frequency masking in audio by using tone insertion method. Inserting tones at known frequencies and at low power level (depends on the original audio power) then modulate the secret massage into this inserted tone. The hidden information is imperceptible so a listener is unable to distinguish between the cover- and the stego-audio signal. So, the cover is audio and the hidden data (secret massage) is the English language text document. The proposed method focuses on the payload of the host audio with no disruption of robustness and imperceptible. The payload has been increased using new algorithm relay on new stego- table and using frequent pattern detection into ANSI code. Also, there are other techniques like Wavelet coefficient, low bit encoding, echo coding, etc.

  • Text Steganography

  • Text steganography is a mechanism of hiding secret text message inside another text as a covering message or generating a cover message related with the original secret message. There are three main categories used to hide text-in-text messages, that is, format based, random, and statistical generations and linguistic method.

  • Video Steganography

  • Video steganography comprises two procedures which are the embedder and detector. The embedder has two data sources, which are payload implying the amount of secret message inserted inside a cover, and the cover video is utilized as a cover that contains the message inside it. Most methods of steganography implement the hiding operation on the cover without selecting better pixels. The correct selecting of pixels for hiding data achieves a high quality and robustness. Steganography has many techniques to hide the information. One of them is the least significant bit (LSB) method. The main disadvantages of this technique are the serial selection of pixels within the frame that is used for embedding the information inside it and the weakness against electronic attacks. For this reason, the knight tour algorithm was utilized for random selection of pixels and also a key function encryption method used to encrypt a secret message to increase the security and the robustness for the proposed method. After that, the stego video is made as an outcome of the embedding process and will be sent to the recipient. The detector represents the second procedure where the stego video represents the input to this procedure, and the detector can find the secret message by utilizing an extraction procedure.


    Figure VIII. Video Steganography Flowchart

  • IP Datagram Steganography

  • This is another approach of steganography, which employs hiding data in the network datagram level in a TCP/IP based network like Internet. Network Covert Channel is the synonym of network steganography. Overall goal of this approach to make the stego datagram is undetectable by Network watchers like sniffer, Intrusion Detection System (IDS) etc. In this approach information to be hide is placed in the IP header of a TCP/IP datagram. Some of the fields of IP header and TCP header in an IPv4 network are chosen for data hiding.


    Figure IX. IP Datagram Steganography

Proposed Method

In this proposed system Cryptography and Steganography are merged together. The system first encrypts the secret message by using a very simple Symmetric Key Cryptography Algorithm by using the private key K generated by a key generating algorithm. Then in the second step, the secure encrypted secret message (ciphertext) is hidden as a payload inside the cover image by using a novel technique using the 3-3-2 LSB insertion method. For retrieval of the hidden message, the same reverse technique will be applied. The proposed system first generates the private key K and then encrypts the secret message in the first step.

Figure X. Proposed method process diagram

  • Private Key generation algorithm

  • 1. Find the length n of the string.
    2. Generate a random number between 1 to n.
    3. Go to the rth character of the string.
    4. Get the ASCII value for the rth character and generate the 8-bit equivalent binary value.
    5. Select the 4-digit key (value must be greater than or equal to (1000)2 or 8) as K from the first 4 bit of the binary value. If the condition is not satisfied then move for the next 4 bits and do the same check again.
    6. If K not found from the previous steps, then repeat the same process from step 1 to step 5.


    Figure XI. Private Key generation flowchart

  • Symmetric Key Cryptography Algorithm

  • Encryption Algorithm
  • 1. Generate the ASCII value of all the letters.
    2. Divide all the values with K.
    3. Store the quotient as 4 MSB bits and remainder as 4 LSB bits. Represent both quotient and remainder in 4-bit binary representation.
    4. Reverse all the 8-bit binary number(s).
    5. Now the resultant binary set of numbers after the above operations is the secret encrypted cipher text, ready to use for second step.


    Figure XII. Encryption flowchart

  • Decryption Algorithm
  • 1. Reverse all the 8-bit numbers of H. 2. Multiply 4 MSB bits of all the cipher text by the Key K.
    3. Add 4 LSB bits of the cipher text with the result produced in the previous step.
    4. If the result produced in the previous step is not an 8-bit number we need to make it an 8-bit number by adding 0s (Zeros) in left hand side.
    5. All the numbers in 8 bits become the original text i.e. The Plain Text or Secret Data.

A hash based least significant bit technique is proposed in this paper. A color image is considered as a cover media and secret data is embedded in this cover media as payload. The proposed technique takes eight bits of secret data at a time and put them in LSB of RGB (Red, Green and Blue) pixel value of the cover image in 3-3-2 order respectively. Such that 3 pixels are embedded in red channel, 3 pixels are embedded in green channel, and 2 pixels are embedded in blue channel.
Suppose 240 is value of secret message and its equivalent 8 binary value is 11110101; then it is distributed in the order of 3-3-2 to be embedded in LSB of RGB pixels respectively. Suppose m represents the bit position within the pixel. Value of m=1,2,3 for red, m=4,1,2 for green, and m=3,4 for blue. So, after embedding the secret data in the particular pixel of cover image, The RGB pixel value of the stego image as below – Red (00100111), Green (11101010), Blue (11001000) The embedding positions of the eight bits out of the four (4) available bits of LSB is obtained in a cyclic order which increases the security of the technique compared to other LSB based techniques.


Figure XIII. 3-3-2 LSB Technique

After embedding secret image in the cover image, it will become a stego image. The intended user follows the reverse steps to retrieve the secret data. The proposed 3-3-2 algorithm, for encoding and decoding are given in this section. Encoding technique and the decoding technique is given below.

  • Algorithm of Encoding

  • 1. Input cover image file.
    2. Read required secret image file to be hidden.
    3. Read a stego key (generated randomnly between 1 and width of the cover image) and generate initial encoding pixel.
    4. Reserve last row of image for sending the stego key, private key, and the length of the message.
    5. Embed the message bit from the initial encoding pixel.
    6. Take 4 LSB bits of each red, green, blue pixels of the cover image.
    7. Compute the position for inserting the secret data into cover image in a cyclic order.
    8. Embed the eight bits of the secret image into 4 bits of LSB of RGB pixels of the cover image in the order of 3,3,2 respectively using the position obtained from step 7.
    9. Repeat steps 6 to 8 until all pixels of secret image are embedded in cover image.

  • Algorithm of Decoding

  • 1. Input stego image file.
    2. Extract the stego key, private key and length of the message from the image.
    3. Store the number of message bits in the variable remaining.
    4. Find the initial encoding pixel from the stego key.
    5. Retrieval will be started from the initial encoding pixel.
    6. Take 4 LSB bits of each red, green, blue pixels of the stego image.
    7. Obtain the position of embedded bits of the secret data in a cyclic order.
    8. Retrieve the bits using these positions in the order of 3,3,2 respectively, using the position btained from step 7.
    9. If authentication token matched then reconstruct the secret information from algorithm of decryption otherwise print that image does not contain any message.
    10. Repeat steps 3 to 5 until all pixels of secret image embedded are retrieved.

Conclusion

The proposed technique is a highly secure technique for embedding messages into images. Also, the symmetric key cryptographic algorithm used in this approach is very strong as it uses 8 bits key and a complex enciphering algorithm. It is almost computationally infeasible to retrieve the original message with a plain text attack. This technique also results in less distortion in an image after embedding. It has high PSNR (Peak Signal to Noise Ratio), less MSE (Minimum Squared Error), and it is imperceptible. This technique is also better than conventional LSB steganography. In this way, the system was strengthened using LSB approach to provide a means of secure communication.
The strength of Steganography lies in the sheer amount of information that changes hands every day. It is very simple using digital technology to conceal any given digital information within other information, so virtually anything could contain a hidden meaning. There is no practical way to check it all. However, none of steganography methods we examined could resist a concerted attack if someone knew that there was a message in a given document. For the greatest level of secrecy, a combination of both steganography and cryptography is necessary.

Future Scope

  1. A strong cryptosystem can be built from the proposed method.
  2. A stronger cryptographic technique can be applied with the proposed steganographic technique in order to increase the security.
  3. Instead of single or double level; multilevel encryption can be applied with this technique to make the proposed method more secure.

References

[1] Shilpa Gupta, Geeta Gujral, and Neha Aggarwal, “Enhanced least significant bit algorithm for image steganography,” International Journal of Computational Engineering & Management, vol. 15, issue 4, July 2012.
[2] S. M. Masud Karim, Md. Saifur Rahman, Md. Ismail Hossain, “A new approach for lsb based image steganography using secret key,” Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011), 22-24 December, 2011, Dhaka, Bangladesh.
[3] Mamta Juneja, and Parvinder S. Sandhu, “An improved lsb based steganography technique for rgb color Images,” International Journal of Computer and Communication Engineering, vol. 2, no. 4, July 2013.
[4] Marwa M. Emam, Abdelmgeid A. Aly, Fatma A. Omara, “An improved image steganography method based on lsb technique with random pixel selection,” International Journal of Advanced Computer Science and Applications, vol. 7, no. 3, 2016.
[5] Hamid Mohammed Farhan, and Zena Ahmed Alwan, “Improved method using a two exclusive-or to binary image in rgb color image steganography,” International Journal of Engineering and Technology, vol. 7, no. 4, pp. 4295–4299, 2018.
[6] Lip Yee Por, Delina Beh, Tan Fong Ang, and Sim Ying Ong, “An enhanced mechanism for image steganography using sequential colour cycle algorithm,” The International Arab Journal of Information Technology, vol. 10, no. 1, January 2013.
[7] Atallah M. Al-Shatnawi, “A new method in image steganography with improved image quality,” Applied Mathemetical Sciences, vol. 6, no. 79, pp. 3907–3915, 2012.
[8] Sabyasachi Pramanik, Dr. R. P. Singh, and Ramkrishna Ghosh, “A new encrypted method in image steganography,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, no. 3, pp. 1412– 1419, June 2019.
[9] G.R.Manjula and Ajit Danti; A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography in Spatial Domain. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015.

License

Click here to see the license.