Secure Data Transfer Using Image Steganography-IJRASET
Secure Data Transfer Using Image Steganography-IJRASET
https://doi.org/10.22214/ijraset.2021.37322
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 9 Issue VIII Aug 2021- Available at www.ijraset.com
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other
information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency
on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are
more complex than others and all of them have respective strong and weak points. Different applications have different
requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret
information, while others require a larger secret message to be hidden. This paper intends to give an overview of image
steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and
briefly reflects on which steganographic techniques are more suitable for which applications.
I. INTRODUCTION
Since the rise of the Internet one of the most important factors of information technology and communication has been the security
of information. Cryptography was created as a technique for securing the secrecy of communication and many different methods
have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to
keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to
implement this, is called steganography. Steganography is the art and science of invisible communication. This is accomplished
through hiding information in other information, thus hiding the existence of the communicated information. Information,
especially photographs, was reduced in size until it was the size of a typed period. Extremely difficult to detect, a normal cover
message was sent over an insecure channel with one of the periods on the paper containing hidden information . Today
steganography is mostly used on computers with digital data being the carriers and networks being the high speed delivery channels.
Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret,
steganography focuses on keeping the existence of a message secret . Steganography and cryptography are both ways to protect
information from unwanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden
information is revealed or even suspected, the purpose of steganography is partly defeated . The strength of steganography can thus
be amplified by combining it with cryptography.
A. Text
B. Image
C. Audio
D. Protocol
E.
III. METHODOLOGY
A. Least Significant Bit
Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image. The least significant
bit (in other words, the 8th bit) of some or all of the bytes inside an image is changed to a bit of the secret message. When using a
24-bit image, a bit of each of the red, green and blue colour components can be used, since they are each represented by a byte. In
other words, one can store 3 bits in each pixel. An 800 × 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000
bytes of embedded data.For example a grid for 3 pixels of a 24-bit image can be as follows:
When the number 200, which binary representation is 11001000, is embedded into the least significant bits of this part of the image,
the resulting grid is as follows:
Although the number was embedded into the first 8 bytes of the grid, only the 3 underlined bits needed to be changed according to
the embedded message. On average, only half of the bits in an image will need to be modified to hide a secret message using the
maximum cover size . Since there are 256 possible intensities of each primary colour, changing the LSB of a pixel results in small
changes in the intensity of the colours. These changes cannot be perceived by the human eye - thus the message is successfully
hidden. With a well-chosen image, one can even hide the message in the least as well as second to least significant bit and still not
see the difference.
In the above example, consecutive bytes of the image data – from the first byte to the end of the message – are used to embed the
information. This approach is very easy to detect . A slightly more secure system is for the sender and receiver to share a secret key
that specifies only certain pixels to be changed.
Should an adversary suspect that LSB steganography has been used, he has no way of knowing which pixels to target without the
secret key.
In its simplest form, LSB makes use of BMP images, since they use lossless compression. Unfortunately to be able to hide a secret
message inside a BMP file, one would require a very large cover image. Nowadays, BMP images of 800 × 600 pixels are not often
used on the Internet and might arouse suspicion . For this reason, LSB steganography has also been developed for use with other
image file formats.
A. Encryption Algorithm
Step 1: Select the text file where the original message has been written.
Step 2: Encrypt the content of the text file using the RSA algorithm with the public key of the receiver.
Step 3: Select an appropriate cover image (.jpeg format).
Step 4: Read the header and footer of the selected image in an array buffer.
Step 5: Add the encrypted data at the end of image footer.
Step 6: Sender and receiver are connected to the network.
Step 7: Sender provides the receiver’s IP address and then send the Stego-image if the IP address is valid.
B. Decryption Algorithm
Step 1: Receive the Stego-image.
Step 2: Extract the encrypted message from the end of the stego image by reading the image footer.
Step 3: Generate the private key and decrypt the extracted message and then create a text file.
Step 4: Save the text file at the desired location.
V. EXPERIMENTAL RESULTS
1) Steps 1: How our app UI look
2) Steps 2: Our Home consist of an button which redirect us on encode & decode page.
4) Steps 4
a) Click on the steganography button again and this time click on the decode button.
b) Enter your secret key which you use for encoding the text.
c) Select the encoded image from the image view button.
VI. CONCLUSION
Interest in the use of steganography in our current digital age can be attributed to both the desire of individuals to hide
communication through a medium rife with potential listeners, or in the case of digital watermarking, the absolute necessity of
maintaining control over one’s ownership and the integrity of data as it passes through this medium. This increased interest is
evidenced in the sheer number of available tools to provide easy steganographic techniques to the end user, as well as the
proliferation of research and press on the topic.
The intent of this presentation was to cover some of the more common methods of data hiding using widespread file formats and
easily available tools as an introduction to the primary concepts of steganography. These discussions should serve as a starting point
to the exploration of more complex steganographic techniques involving, for example, the use of network packets and unused hard
disk space as cover medium, or the more complex methodologies used on our standard image and audio files.
REFERENCES
[1] https://projectideas.co.in/image-steganography-with-3-way-encryption-dotnet/
[2] Introduction to image Steganography youtube videos.
[3] Implementation of LSB Steganography and its Evaluation for Various File Formats.Int.J.Advanced Networking and Application 868.
[4] Cryptography and network security by William Stallings 3rd edition.
[5] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and Decrypting Data" International Journal of Computer Networks
& Communications (IJCNC) Vol.5, No.2.
[6] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston,
London.
[7] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational System and Human Vision Sensitivity", IEEE signal processing
letters, Vol. 12, No. 1.
[8] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13, No. 5.