Secure Data Hiding System by Using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by Using AES Algorithm and Indicator Based LSB Method
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD26500 | Volume – 3 | Issue – 5 | July - August 2019 Page 970
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Combination of bits used is LSB (1, 2) bits and (2, 3) bits. Steganography is a message hiding technique so that a user
Results are compared qualitatively using parameters PSNR, can send or communicate to the other user about their secret
MSE, BER, Entropy, Standard deviation. message securely. LSB is one of the most popular techniques
in image steganography which are used for hiding the secret
Paruchuri [10] proposed a system in which steganography is message. So LSB technique for hiding the encrypted file is
combined with cryptography to enhance security. First the easy to detect the secret message as it is directly replaced
message to be sent is embedded into a cover image using into the least significant bit of the pixels of the cover image.
steganography and the stego image is encrypted to produce Therefore there may be one possibility to remove this
the cipher image. The cipher image is then sending to the problem and will make the secret message more secure and
recipient. This approach is secure, but the existence of the enhance the quality of the image is proposed.
message is not hidden since the encryption is done after
steganography and the cipher image is sent to the recipient. 3. METHODOLOGY
The cipher image does not resemble the cover image and will AES algorithm is firstly to transform secret messages into
be distorted. unintelligible forms, thus whoever does not have the secret
key cannot obtain the original message. Secondly, the
In [11], Ajit Singh and Swati Malik proposed a combination indicator-based LSB method is randomly dispersing the bits
of steganography and cryptography has been used for of the encrypted message in the cover image and thus
improving the security. The blowfish encryption algorithm is making it harder for unauthorized people to extract the
encrypting the message to be hidden inside the image for original message. This indicator-based method is the
making it non readable and secure. After encryption, this randomness used to confuse intruders as it does not use
paper will be applied LSB technique of steganography for fixed sequential bytes and it does not always embed one bit
further enhancing the security. For cryptography, Blowfish at a time. The block diagram of the AES algorithm and
algorithm is used which is much better than AES and DES but indicator-based LSB method are described as Fig.1.
LSB technique for hiding the encrypted file is easy to detect
the secret message as it is directly replaced into the least
significant bit of the pixels of the image.
@ IJTSRD | Unique Paper ID – IJTSRD26500 | Volume – 3 | Issue – 5 | July - August 2019 Page 971
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
the second row is circularly left-shifted by one-byte position, The indicator-based LSB method consists of previous bytes,
the third row is circularly left-shifted by two-byte position, indicator byte and next bytes. This indicator byte is included
and the last row circularly left-shifted by three-bit positions. two-bit positions of RGB bytes array of cover image pixels.
3. MixColumns: A round is equivalent to a matrix The first-bit position of indicator byte determines the
multiplication of each column of the states. A fix matrix is previous or next bytes for hiding the secret bits. The second-
multiplied to each column vector. In this operation, the bytes bit position of indicator byte determines for hiding one or
are taken as polynomials rather than numbers. two bits of secret data bits. Embedded secret bits depend on
the bit positions of indicator byte of cover image as shown in
4. AddRoundKey: Round key is combined with each byte
Table 1.
of the state using bitwise XOR operation. The 4X4 matrix is
used to represent the original key consisting of 128 bits. This Table1. Embedded Secret Bits Depend on Indicator
4-word key is converted to a 43 words key. Bytes
Indicator Byte
1st Bit 2nd Bit Embedded Secret Bits
Position Position
1 bit of secret bits are hidden
0 0 into the previous byte of RGB
bytes array of the cover image
2 bits of secret bits are hidden
0 1 into the previous byte of RGB
bytes array of the cover image
1 bit of secret bits are hidden
1 0 into the next byte of RGB bytes
array of the cover image
2 bits of secret bits are hidden
1 1 into the next byte of RGB bytes
array of the cover image
Figure 4 shows the flow chart of the hiding process. All of
these factors increase the randomness and confusion of the
hiding process, which makes it hard to retrieve the secret
data by unauthorized parties. The hiding process is not done
sequentially like simple LSB. The secret bits are hidden into
Figure2. Block diagram of AES 128-bit algorithm cover bytes randomly depending on the values of the two
bits position of indicator byte of the cover image.
Decryption algorithm uses the expanded key in reverse
order. All functions are easily reversible and their inverse
form is used in decryption. Decryption algorithm is not
identical to the encryption algorithm. In the beginning, there
is a pre-round operation using the ciphertext as the state
matrix and the last round key as the key matrix (i.e. W40 to
W43). The final round consists of only three stages. Mix-
column operation is omitted here.
@ IJTSRD | Unique Paper ID – IJTSRD26500 | Volume – 3 | Issue – 5 | July - August 2019 Page 972
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
3.3. Peak Signal to Noise Ratio 3.6. Performance
The evaluation of the quality of the stego image is evaluated The most popular measurements of steganography
by using the peak signal-to-noise ratio (PSNR), the most performance are MSE and PSNR. As a consequence there are
popular measurements of steganography performance. PSNR 256 possibilities of varying intensities of each primary color,
is expressed in terms of a logarithmic decibel scale. The altering the most significant bit of pixel results in only a
PSNR value is defined as follows: small change in the intensity of the color. These small
ΜΑΧ 2 changes cannot be perceived by the human eye and thus the
PSNR=10log10
(1) message is successfully hidden. Our method is applied on
ΜSΕ only image size for 125x125 of the 24-bit color image; Lena.
Capacity can save as maximum between 5.72 bytes and
Where MAX is the maximum possible pixel value of the 11.44 kbytes. The MSE should be as less as possible. If the
images. For example, if the pixels are represented using 8 original image and the stego image are the same then MSE is
bits per sample, then the MAX value is 255. zero. Higher PSNR value means lesser distortion. The results
of MSE and PSNR are given in below Table 2.
3.4. Mean Square Error
MSE is the mean square error between the cover and stego Table2. MSE and PSNR Values
images which is described as the following equation 2: Image Size Hidden Message PSNR
2 MSE
1 m n
∑ ∑ (f (i, j) − g(i, j))
(pixels) Size (KB) (dB)
MSE = (2)
mn i=1 j=1 125x125 0.05 0.008 69.1
125x125 0.19 0.03 63.36
Where f represents the matrix data of the original image, g 125x125 1 0.172 55.776
represents the matrix data of stego image, m represents the
125x125 2 0.346 52.74
numbers of rows of pixels of the images and i represents the
index of that row, n represents the number of columns of 125x125 3 0.517 50.996
pixels of the image and j represents the index of that column. 125x125 4 0.692 49.73
125x125 5 0.873 48.721
3.5. Experiment and Result
This approach was implemented and tested on photos 125x125 5.38 0.939 48.404
without any noticeable. This is because the approach uses 125x125 5.59 0.975 48.241
the LSB technique for hiding data, and this technique does 125x125 5.72 1.007 48.101
not make any noticeable modification in the carrier medium. 125x125 8.58 1.497 46.379
A carrier image before and after the hiding process is shown
in Figure 5 and 6.
A PSNR value is more than 40 decibels (dB) is very good. If it
is between 30 dB and 40 dB, can be acceptable, but a PSNR
less than 30 dB is not acceptable because the distortion is
very high. The experimental results show that the proposed
scheme can embed 8.58 kbytes of information while keeping
an acceptable visual quality in Figure 7.
@ IJTSRD | Unique Paper ID – IJTSRD26500 | Volume – 3 | Issue – 5 | July - August 2019 Page 973
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
[4] Amitava Nag, Saswati Ghosh, “An Image Steganography
Technique using X-Box Mapping”, IEEE-International
Conference On Advances In Engineering, Science And
Management (ICAESM -2012) March 30, 31, 2012.
[5] Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra
Chaudhuri, “A Session-based Multiple Image Hiding
Technique using DWT and DCT”, International Journal
of Computer Applications (0975 – 8887), Volume 38–
No.5, January 2012.
[6] V. Nagaraj, Dr. V. Vijayalakshmi, Dr. G. Zayaraz,
“Modulo based Image Steganography Technique
against Statistical and Histogram Analysis”, IJCA
Special Issue on “Network Security and Cryptography”
NSC, 2011.
Figure8. PSNR Values versus Message Size for 125x125 [7] Er. Mahender Singh, Er. Rohini Sharma, Er. Dinesh
Pixels of Cover Image Garg, “A New Purposed Issue for Secure Image
Steganography Technique Based On 2-D Block DCT and
4. CONCLUSIONS DCT”, ijarcsse, Volume 2, Issue 7, July 2012.
This paper has combined both cryptographies which is used
for encryption and decryption algorithms and steganography [8] Dhawal Seth, L. Ramanathan, “Security Enhancement:
which is used for embedding and extraction algorithms Combining Cryptography and Steganography”,
together to achieve the desired results. The security of the International Journal of Computer Applications (0975 –
secret text message is one of the most important in today's 8887) Volume 9– No.11, November 2010.
technological world. Encryption technique plays an [9] Ramanpreet Kaur, “A Comparative Study of
important role in the information security system. AES Combination of Different Bit Positions in Image
algorithm is used a block size of 128-bit with 128-bit key size Steganography”, International Journal of Modern
to encrypt and decrypt text data for 10 rounds. The Engineering Research (IJMER), www.ijmer.com, Vol.2,
randomness of the indicator-based method is based on the Issue.5, pp-3835-3840, Sep-Oct, 2012.
LSB method which makes it harder for unauthorized parties
to detect and retrieve the hidden data. This indicator-based [10] Dr. R. Sridevi, Vijaya, Paruchuri, K. S. SadaShiva Rao,
LSB method is provided the position and determined the “Image Steganography combined with Cryptography”,
number of embedded bits. The AES and indicator-based LSB Council for Innovative Research Peer Review Research
method are embedded 8.58 kilo-bytes of data with an Publishing System Journal: IJCT Vol 9, No.1, ISSN
acceptable visual quality which has greater than 40dB of 22773061 976/ Page July 15, 2013.
PSNR. This method has increased the security of the system [email protected]
and will also be increased the capacity compared with [11] Ajit Singh, Swati Malik, “Securing Data by Using
simple LSB as it sometimes hides two bits at once. Cryptography with Steganography”, International
Journal of Advanced Research in Computer Science and
5. ACKNOWLEDGMENTS Software Engineering, Volume 3, Issue 5, May 2013.
My thanks go to all of my teachers and I would like to
express my deep appreciation to my dearest parents who [12] A Aswathy Nair, Deepu Job, “A Secure Dual Encryption
have always given great help, encouragement, sacrifice and Scheme Combined With Steganography”, International
support throughout my life. Journal of Engineering Trends and Technology (IJETT)
– Volume 13 Number 5 – Jul 2014.
6. REFERENCES [13] Alamsyah, Much Aziz Muslim, Budi Prasetiyo, “Data
[1] Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for Hiding Security Using Bit Matching-Based
Data Hiding”, IBM Systems Journal, Vol. 35, Issue 3-4, Steganography and Cryptography without Change the
1996, pp. 313-336. Stego Image Quality”, Journal of Theoretical and
[2] N. Provos and P. Honeyman, “Hide and Seek: An Applied Information Technology Vol.82. No.1, 10th
Introduction to Steganography”, IEEE Conference on December 2015.
Security and Privacy, pp. 32-44, 2003. [14] Nadia Mohammed, “Increasing Security in
[3] Miss. Vaishali V. Jadhav, Mrs. P.P. Belagali, “An Effective Steganography by Combining LSB and PRGN”,
Image Steganography using LSB Matching Revisited”, International Journal of Computer Science and Mobile
International Journal of Advanced Research in Computing, Vol.5 Issue.2, February- 2016, pg. 34-38.
Computer and Communication Engineering, Vol. 5,
Issue 3, March 2016.
@ IJTSRD | Unique Paper ID – IJTSRD26500 | Volume – 3 | Issue – 5 | July - August 2019 Page 974