Image Steganography Embedded With Advance Encryption Standard (AES) Securing With SHA-256
Image Steganography Embedded With Advance Encryption Standard (AES) Securing With SHA-256
Abstract- The proposed paper, works upon the idea of securing The cryptography converts the plain text into an
the classified information. This is achieved by using incomprehensible cipher text whereas steganography
steganography which is an approach to hide classified conceals the traces of the data that could be ever existed.
information into some other file while maintaining its visual aids
and secondly is cryptography which works upon textual data and
Steganography can be performed on any type of file text,
transform it in a way that no one can comprehend it. The video, audio, image, etc. any multimedia file can fall under
proposed method secures the weaker section which is the key in this category [1]. When hackers want to access a system,
Advance Encryption Standard using hashing technique. The they will aim for the weakest point, which is not the
proposed work enhances the level of concealment of information encryption, but the key. AES-256 is most secure encryption
from unauthorized access and for covert information exchange technique and till now there is no report of its cracking. But
by encrypting the data and hiding it into a multimedia file known
as image. The Secure Hash Algorithm 256 generates a hash key
the key is the weakest point it order to secure that SHA-256
of 256 bits which is an unbreakable hashing technique after that (Secure Hash Algorithm) will be used that will give a hash
the key is used in the process of encrypting the text with Advance value. Hash is not ‘encryption’ because it can never be
Encryption Standard 256 which is an unbreakable encryption decrypted back to the initial text, it a one way street. This
technique till this time and a cipher text is obtained. The cipher makes the system robust and patches the weakest link.
text is embedded into a target image using Least Significant Bit In this paper, our findings define that the system first the
method which make changes in image that cannot be understand
key will be entered and it will be hashed using Secure Hash
by naked eyes. The change in byte is 0.000002%. It ensures the
visual quality of an image remains intact. The distortion or Algorithm (SHA256) into a hash data or key which will be
change in the image remains intermittent to human eyes. The used in AES encryption where data get encrypted by the
major issue concerned for the government and security agencies help of the key, by encryption a non-understandable cipher
such as were to exchange highly classified information in a text is generated. And then this cipher text is embedded into
secure and undetectable manner and abide the notion of hacker the image using the LSB technique, and the change was into
to comprehend any such information. byte is 0.000002% which is an almost negligible and
steganographic image or target image is generated
keywords- AES, Cryptography, Image steganography, LSB, SHA- containing secret data. And invisible to naked human eyes.
256.
Hence, a secured system is created where hashing, encoding
as well as data hiding all are performed respectively. This
I. INTRODUCTION enhances the level of security in the concealment of covert
Data plays a vital role in merely each vertical or domains. data exchange and information hiding.
Data provides the next level of insight into different
verticals. The data has a versatile nature from personal to II. LITERATURE REVIEW
economic, governmental, national security, technology and The evolution in technology changes the life of mankind. As
so on. As we all know the data is the new oil so when the technology eases mankind life, it also brings a need for
storing, exchanging, and using data is done then arrives a additional security. Steganography is a mechanism of hiding
high responsibility to maintain its confidentiality, integrity, confidential and sensitive information in images to have
availability of the data. The higher the confidential secure and untraceable communication between multiple
information, higher the security is needed. From several individuals. Steganography ensures the exchange of data
years data hiding has captured the minds of security covertly using any digital communication medium, even the
agencies and researchers. Digital watermarking, filtering & toughest condition of constant monitoring. There is a
masking and other steganographic techniques are used to possibility of doing covert communication and exchange of
hide confidential data into digital images. data without being get noticed and no one can imagine the
existence of a secret message inside an image. The
Revised Manuscript Received on June 30, 2020. embedding is done by weakening some of the traits of other
* Correspondence Author media such as image, audio, video files which are also
Mr. Vikas Singhal*, Head of the Department, Department of Computer known as cover. The Final resultant has the same properties
Applications, JSS Academy of Technical Education, Noida, India.
Mr. Yash Kumar Shukla, Department of Computer Applications, JSS of cover media. The cover contains the crucial secret data in
Academy of Technical Education, Noida, India. it. When a secret data is concealed inside a cover image,
Dr. Navin Prakash, Department of Computer Applications, JSS then it results in a stego image.
Academy of Technical Education, Noida, India.
This paper depicts the concept of steganography and III. PROPOSED METHOD
proposed methodologies of steganographic images. SHA-
The Proposed methodology is to create a system which
256 was developed by United States National Security could be used for covert communication without any hint
Agency and then got recognized as well as published in the that some classified data is being exchanged via using image
year 2001. SHA-256 is a cryptographic hash also known as steganography and securing that data with cryptographic
the digest. It generates a unique 256-bit (32 bytes) code of a technique and even securing its vulnerable area that is key
text. A hash is not an encryption technique so, it cannot be by using hashing.
decrypted back to original data. It creates a fixed size of
code from the source text. It is a single way cryptographic A. Least Significant Bit (LSB)
function. The hash version of the text is always gets The steganography technique embeds the data into the cover
compared only, which enhances security. image or target image. This can be achieved by using
It avoids transmitting password in original view format, various steganographic techniques. From a pool of
even if the message gets intercepted between the medium or steganographic techniques I will be accomplishing this task
channel then also interceptor can never reach to the original with the usage of LSB. This technique is implemented by
password. The NIST (National institute of standard and making changes in the least significant bit (LSB) of a byte.
technology) approves that it has never been compromised LSB is a most promising steganographic technique which
[2]. The Advance Encryption Standard (AES) is a conceals the data in the image and no one can get a whisper
that the image accommodates some crucial data within it.
cryptographic algorithm which is used to encrypt the textual
LSB provides the least change in the image which is far
data in an incomprehensible manner. And it is a most
from persistent of a human naked eye. The change in a byte
secured encryption standard till now where no signs of its
is 0.000002% which is almost negligible.
breakage been reported till yet. It is a symmetric key The least significant bit of the cover image bytes is changed
algorithm, which means the same key is used for both by a bit of the classified data. LSB functions finest with 24-
encryption and decryption both. It uses a block cipher of bit map (BMP) and PNG images in which each pixel is
sizes 128, 168, 192, 224 and 256 bits. It uses several ways in constituted of 3 bytes (red, green, blue) color
AES like XOR operation, substitution, permutation respectively. LSB provides a method to store 3 bits of
operation, rows and column shifting [3]. information in a single pixel, by making a change in one
The text length upto 264 bit i.e (2.3 exabyte) will also be
transformed into a digest size of 256 bits (32 bytes). 16.80
cycles per byte on 64-bit processor x86 architecture.
It has 64 iterations in one cycle. Which makes it more safe
and secure.
// Stego-image can be shared now using any //Steganalysis is a process to recover data hidden
communication channel. data from the image.
Step 8 End Step 4 Enter the key (K) thete undergoes SHA-256
B. Algorithm For Extracting Data From Stego-Image hashing techniques and a hash value (H) is
obtained.
//A secure key is obtained by which data can be
Step 1 Start only retrieved.
Step 2 Enter the Stego image (ST) with extension and Step 5 Hash value (H) is used as a key in AES-256
path. decryption and cipher text (CT) is converted into
//Enter the path of image file with its name which plain text (T) by using AES-256 decryption
is having classified information in it. algorithm.
Step 3 Steganalysis on the Stego image (ST) is performed //Original classified information is obtained.
and cipher text (CT) is obtained. Step 6 End
V. EXPERIMENTAL RESULT
The proposed method has been implemented in order invent the crucial data remains stagnant. Now, if we move forward
a secure and impermeable system. And to do an analysis of to table 6 it depicts that no change in the dimension of the
the result in order to find out whether the proposed system is image is seen no matter how much amount of data been
working accordingly as per design in consideration of input into the image. Apparently, the data should always be
requirements or not. less than the capacity of the image to hold it. The major
Table 5: Original and Stegno images difference is that if the data i.e. embedded in the original
image comprises less than 1 KB then we cannot see the
difference in the size of the image. Otherwise, the size of the
image gets slightly increase as per the size of the data.
The above table 5 depicts that no change can be seen or The screenshot of the Proposed working system
persistent to human naked eyes and we cannot find out the
difference between both the images i.e. original and stego
image. So, by this confidentiality and covertness of
2. Decoding
3. Wrong Password
The above screenshot depicts that the working of the VII. RESULT ANALYSIS
proposed system is efficient and accomplish the task and By the combination of all three methods we created a robust
functionally robust. If the key is wrong the data cannot be system. The data gets encrypted by most secure
extracted from it, even if the 1st layer of protection is been cryptographic technique and then this data gets hided inside
breached by any technique and the hacker identifies the an image which leaves no mark of any classified
image contains data. Then also the data is armored with information communication taking place. As the visual aids
other layer of protection and it cannot extract data from it as remains intact. Its results can be seen in table 5 & table 6.
it is still being protected from cryptographic technique. The And the weak point that a hacker targets is also been
proposed system is robust and if a hacker tries to extract the procured which is a key by hashing technique and the
data from the image, it is shielded with hashing, encryption, utilization of that key is done in encrypting and decrypting
and image steganography. In which each technique is the data. Which adds on the layer of protection to the
impermeable and combination of all the three make it classified data. So, our goal gets achieved firstly no sign of
extremely secure. Hence, the proposed method manifest to secret communication and for safety adding more security
provide robustly and secure image steganography as well as layers on it. The data as encrypted and embedded in the
a secure and inoculative system against data hacking. image at the time of retrieval it gives the same data while
using authentic secure key.
VI. CODE
1) KeyCreation and Hide Method V. CONCLUSION
The proposed system accomplishes the task of securing the
classified information. Primarily no one gets a hint that
some crucial data is being exchanged, and secondly it also
gets shielded by using cryptography. The proposed system
successfully hides the data using image steganography via
LSB and surplus the protection of data using cryptographic
technique AES-256 as well as the weak point which a
hacker could target that is key, it has also been armored via
the use of hashing technique SHA 256. And an impenetrable
system is created. The experimentation performed assures
the concreteness of the proposed system. The results acquire
a camouflaged image, a non-noticeable distortion making it
almost non-viable to attract the consciousness of attackers
and even after getting it tranced without an authentic key no
one was able to access that information. Hence, proposed
system proves to be a highly secure system in the terms of
securing classified information and exchanging it and it also
seals up with no vulnerability in it.
REFRENCES
1. Provos, Niels, and Peter Honeyman. "Hide and seek: An introduction
to steganography." IEEE security & privacy 99.3 (2003): 32-44.
2. Henri Gilbert and Helena Handschuh, “Security Analysis of SHA-256
and Sisters*”, 2003.
3. Selent, Douglas. "Advanced encryption standard." Rivier Academic
Journal 6.2, ISSN (Online): 2319-7064 Index Copernicus
Value (2015): 78.96 ,(2010): 1-14.
4. United States National Security Agency (NSA), U.S. Department of
Commerce, National Institute of Standards and Technology (NIST),
Information Technology Laboratory (ITL), “Secure Hash Signature
Standard (SHS) (FIPS PUB 180-2)”, National Institute of Standards
and Technology (NIST), 2001 : 9-22.
5. Charles G. Boncelet, Jr., Newark, DE (US); Lisa M. Marvel,
Churchville, MD (US); Charles T. Retter, Belcamp, MD (US).
“Spread spectrum and image steganography”, 2003.
6. Po-Yueh Chen* and Hung-Ju Lin, “A DWT based approach for image
steganography”, DOI:10.6703/IJASE.2006. 4(3).275, 2006.
7. Domenico Bloisi and Luca Iocchi, “Image based steganography and
cryptography”, 2007.
8. Ali Al-Ataby and Fawzi Al-Naima, “A modified high capacity image
steganography technique based on wavelet transform”, Vol. 7, No. 4,
October 2010.
9. Shailender Gupta, Ankur Goyal, Bharat Bhushan, “Information hiding
using least significant bit steganography and cryptography”,
DOI: 10.5815/ijmecs.2012.06.04, 2012.
10. Saiful Islam*, Mangat R Modi and Phalguni Gupta “Edge-based
image steganography”, DOI: 10.1186/1687-417X-2014-8, 2014.
11. *Khan Muhammad, Jamil Ahmad, Haleem Farman, Muhammad
Zubair, “A novel image steganographic approach for hiding text in
color images using HSI color model”,
DOI: 10.5829/idosi.mejsr.2014.22.05.21946,2015.
12. Khan Muhammad, Jamil Ahmad, Muhammad Sajjad, Muhammad
Zubair, “Secure image steganography using cryptography and image
transposition”, October2015.
13. Mwaffaq Abu-Alhaija “Crypto-Steganographic LSB-based System
for AES-Encrypted Data”, (IJACSA) International Journal of
Advanced Computer Science and Applications, Vol. 10, No. 10, 2019.
14. M. Rahul, M. Malathi, N. Satish Kumar, R. Thamaraiselvan,
“Enhanced Image Steganography Using AES & SPIHT
Compression”, International Conference on Innovations in
Information Embedded and Communication Systems (ICIIECS),
March 2017, DOI: 10.1109/ICIIECS.2017.8276029.
AUTHORS PROFILE
Mr. Vikas Singhal, Head of the Department of
Computer Applications, JSS Academy of Technical
Education, Noida. He received his Master of Computer
Applications from M.S. Ramaiah Institute of Technology
Bangalore. He completed his M.Tech in Information
Technology from USIT, GGSIPU, New Delhi. He is pursuing Ph.D from
IFTM University, Moradabad. His research interests are Image processing
and Machine Learning.