Random Pixel Selection Based Improved LSB Image Steganography Method Using 1 D Logistic Map and AES Encryption Algorithm
Random Pixel Selection Based Improved LSB Image Steganography Method Using 1 D Logistic Map and AES Encryption Algorithm
ISSN No:-2456-2165
Suraiya Yasmin
Assistant Professor, Department of CSIT
BSMRAU, Gazipur, Bangladesh
IJISRT20FEB123 www.ijisrt.com 40
Volume 5, Issue 2, February – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
II. RELATED LITERATURES password 3 bits block is obtained and used in a circular
manner. The concept is shown below:
LSB steganography is the most broadly utilized
steganographic strategies because of its effortlessness and Secret password: SeCrEtWoRk
clear methodology. The secret message is put away at all ASCII value of password: 83 101 67 114 69 116
noteworthy piece plane of the spread document. This 87 111 82 107
strategy gets hard to recognize as in limited quantity of
changes is being made in the spread picture. Various Binary of password:
creators have utilized the straightforward LSB methods 010100110110010101000011011100100100010101110100
where LSB of pixels are supplanted by the secret bits [3]. 01010111011011110101001001101011
This idea may once in a while represent some genuine
security issues. Variations to the basic LSB based R=10100011 MSB of RGB= 110
steganography can be seen in [4] [5]. E-XOR encrypting G=10101101 3 bit block = 010
algorithm is used [6] to raise the security feature of LSB B=01001101 X-OR value= 100
method. In this, one RGB channels of shield image is R=00110101 MSB of RGB=011
designated and two LSBs of secret data are implanted in it. G=11010001 next 3bit block= 100
In [7], data are embedded by analyzing the block B=10101101 X-OR value= 111
complexity. Al-Bayati, M. have used stowing away of
interactive media secret records in double RGB spread Our proposed technique embeds the size of the
pictures utilizing LSB steganography systems. Mehdi and message first then it embeds the secret message (binary
Mureed improved the Kekre's algorithm on LSB strategy representation of ASCII value of each character) in the rest
and expanded the implanting limit while holding the nature of the pixels.
of stego picture [8]. Disorderly Map Based Random Image
Steganography Using LSB Technique is utilized by Sujarani A. Embedding Algorithm
Rajendran [9]. Singh S. & Kaur J. proposed a method of
Steganography in Exact Color Imageries by Even Odd Bit Get the secret message
Carving [10]. Encrypt the message with AES algorithm
Convert the AES cipher into binary
III. RESEARCH METHODS Get the cover image
Generate a chaotic sequence for selecting ‘x’ co-ordinate
Data security is a biggest concern of any organization. by using 1 D logistic map where x0=0.12, r =3.95 and
We propose “Dual Layer Security of data using LSB image n=length of the message, then multiply the sequence
steganography method through random selection of Pixels with the number of row and round the result
and AES encryption algorithm”. The main idea of our work Generate a chaotic sequence for selecting ‘y’ co-ordinate
is to provide dual layer of security to sensitive data or by using 1 D logistic map where x0=0.15, r =3.97 and
messages by hiding it behind the digital images using n=length of the message, then multiply the sequence
proposed Improved LSB image steganography algorithm with the number of column and round the result
and the second layer security is given by encryption of Select pixels randomly according to the value of (x , y)
secret message using AES-128 bits encryption algorithm. Get the 10 character password
Convert the password to binary
128 bits AES cryptographic algorithm takes a key and Get consecutive 3 bits of the password in circular order
encrypt the plaintext into ciphertext. This ciphertext will be Collect the MSB bits of a pixel(Red ,Green, blue color
embedded into a cover image using our steganographic component)
technique based on randomness. We select pixels randomly Perform X-OR operation between the collected MSB
through filtering and the filtering is done by using the MSB bits and 3 bits block of the password
and a password. This method uses a 10 characters or 80 bits Convert the result of X-OR operation in decimal, Dn
password for both filtering and embedding technique .The X-OR the message bit with the blue component Dn th bit
characters are first converted to their ASCII value and these Embed the result into LSB of blue component
ASCII values are converted to binary. From this binary
IJISRT20FEB123 www.ijisrt.com 41
Volume 5, Issue 2, February – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
B. Embedding Flowchart
IV. RESULTS AND CONCLUSION applies a circular password and X-OR operation for
embedding the secret message. The message bits are not
24 bit image Oiky.png was used for experiment. The directly embedded in the LSBs of the pixel which makes
output of the program run is remarkably similar to the more difficult to retrieve the cipher by Stegoanalyst. In
original image. The experimental results by applying our addition, the histogram is also showing very negligible
proposed method on different standard images are compared changes.
with other methods we have reviewed.
As the project merges the AES Cryptography with
The proposed algorithm uses random sequence to Steganography, if someone would crack the cipher from
embed message bits and changes very small number of bits cover image (all though, it’s not possible), the attacker will
when embedding a large cipher. The proposed technique have to provide the encryption password to decrypt the
IJISRT20FEB123 www.ijisrt.com 42
Volume 5, Issue 2, February – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
cipher. And an assumption says that, the attacker will need [8]. AL-Shatnawi, A. M., &alfawwaz, B. M., ‘An
about 1022 years to try all possible keys/password for the Integrated Image Steganography System with
weakest version AES 128 [11]. Improved Image Quality. Applied Mathematical
Sciences”, 2013, Vol. 7, no. 71, pp. 3545-3553.
The aim of our work is to improve the efficiency of [9]. Sujarani Rajendran, ManivannanDoraipandian,
LSB steganography by proposing an improved technique in “Chaotic Map Based Random Image
which pixels are selected randomly by using 1 D logistic Steganography Using LSB Technique”, 2017.
map for embedding message bit. The goal of our technique [10]. Singh S., & Kaur J., “Steganography in True Color
is to make difficult to determine the presence of the secret Images Using Even Odd Bit Slicing”, International
message and to excess the message. We have used a secret Journal of Engineering and Computer Science, 2015.
password and the most significant bits of the pixels for [11]. Satwinder Singh, “Dual Layer Security of data using
performing X-OR operation. Here we do not focus on the LSB Image Steganography Method and AES
capacity of embedding the message in the image rather we Encryption Algorithm”, 2015.
focus on enhancing the security. In our proposed technique
we didn’t embed the message bit directly into the LSB.
Rather we have done X-OR operation of the message bit
before embedding and embed the result into the LSB. Our
method also use AES cryptography algorithm to covert the
secret message into cipher text to add another layer of
security. Our method provides better PSNR value and lower
distortion. So our proposed technique fulfills the
requirements of steganography technique.
ACKNOWLEDGMENT
REFERENCES
[1]. Thakur, J., & Kumar, N., “DES, AES and Blowfish:
Symmetric key cryptography algorithms simulation
based performance analysis”, International journal of
emerging technology and advanced engineering, 2011.
[2]. Singh, S., & Siddiqui, T. J., “A security enhanced
robust steganography algorithm for data hiding”,
International Journal of Computer Science Issues
(IJCSI), 2012, vol. 9, no. 1. pp. 131-139.
[3]. Shahin Shabnam , Prof K Hemachandran, “ 1 LSB
based Steganography using Bit masking method on
RGB planes”, 2016.
[4]. Ziad Alqadi, Bilal Zahran, Qazem Jaber,
BelalAyyoub, Jamil Al-Azzeh, “Enhancing the
Capacity of LSB Method by Introducing LSB2Z
Method”, 2019.
[5]. Rohit Chaudhary, Rishabh Kaushik and TuariqBeg,
“Imagesteganography using improved lsb algorithm”,
2018.
[6]. Sandeep Kumar, “Image steganography using
improved lsb and exor encryption algorithm improved
lsb and exor encryption algorithm”, 2014.
[7]. Gowtham dhanarasi, dr. A. Mallikarjunaprasad,
“Image steganography using block complexity
analysis”, 2012.
IJISRT20FEB123 www.ijisrt.com 43