Image Steganography With Blowfish Algorithm
Image Steganography With Blowfish Algorithm
Abstract:- Steganography is a long-standing method of text, image, audio, video, and network or protocol
information concealment. It may be applied in a variety steganography. This research focuses on image-based
of ways. For example, it can be used to create a message steganography, where a message is hidden inside an image.
that conceals the existence of a secret message that
everyone can read and understand if they find it. To Image-Based Steganography
remedy this issue, the message was written in a different While there are many other picture formats available
coded language that was only understood by the sender for transmission, one of the most often used image formats
and the receiver. The method of sending a message using is the Joint Picture Expert Group (JPEG) standard
a coded language is known as cryptography; the process (Provos and Honeyman, 2003).
of encoding the message is known as encryption; and
the message itself is known as cipher text. One of the Picture steganography makes it possible to conceal both
numerous unique algorithms used in cryptography is text and picture within an image. Discrete Cosine
the Blowfish algorithm. The purpose of this study is to Transform, Transform Domain, Spread Spectrum, Filtering,
present an overview of image steganography, covering its Masking, MSB, and LSB are among the methods applied
techniques and applications. It also tries to figure out here (Kamble et al., 2013). Because it gives the
what constitutes a good steganographic algorithm. We steganographic picture a suspicious appearance to humans,
are employing the Blowfish method in conjunction with the MSB approach is not a suitable fit for a steganography
image-based steganography, which conceals system. Spatial and frequency domain steganographic
information inside images such that, even in the methods are often separated into two categories [8]. In the
unlikely event that the message is discovered, only the first group, the message is contained in the Least Significant
intended receiver can decipher it, in order to strengthen Bit (LSB) [10] of the picture pixels [9]. This method is
the security of the original message being delivered. simple to use and has a large capacity, but it is susceptible
to assaults like compression and low-pass filtering. Raja
I. INTRODUCTION [10], for instance, showed how to use the Optimal Pixel
Adjustment Process (OPAP) to exhibit different LSB and
Information security has been a critical component of enhance stego-image quality while minimizing computing
information technology and communication since the advent cost. Furthermore, this concealment technique can also help
of the Internet. The goal of cryptography was to safeguard with imperceptibility and sensitivity problems in the spatial
communication secrecy, and a wide range of techniques for domain. The second group's picture frequency coefficients
encrypting and decrypting data have been devised to include the encoded message. With this concealing
maintain message confidentiality. Regretfully, there are strategy, the imperceptibility and robustness problems
situations in which maintaining the confidentiality of a observed in the spatial domain may be resolved. One
message's contents is not enough—it could also be required common method for compressing photos is JPEG. Many
to maintain the message's existence under wraps. steganography methods, including Outguess, JP Hide Seek,
Steganography is the method utilized to carry this out. The and JSteg, employ JPEG to conceal data.
science and art of invisible communication is called
steganography. This is achieved by disguising the existence Recent research have also utilized the Discrete
of the conveyed information by burying it within other Wavelet Transform (DWT) because of its extensive
information. applicability in the imperceptibility or capacity. A GA
evolutionary technique was proposed by Akbarzadeh, Fard,
II. STEGANOGRAPHY and Varasteh to produce safe steganography encoding on
JPEG pictures. A parameter optimisation using GA was
Steganography, derived from the Greek words reported by R. Elshafie, N. Kharma, and R. Ward [14] in
"steganos" (hidden) and "graphy" (writing), involves order to maximize the quality of the watermarked image.
concealing information to ensure its existence remains This work proposes a technique to embed data in 4x4 blocks
undetected during transmission. It allows data to reach its on the cover picture of Discrete Wavelet Transform [15]
intended destination securely without detection, alteration, coefficients running a mapping function based on the
or loss. Steganography encompasses various forms, such as Genetic Algorithm [14]. In the suggested solution, OPAP is
also done after embedding the message to maximize the The suggested approach ensures safe transmission of
PSNR. sensitive data across networks by fusing the Blowfish
algorithm's strong encryption powers with the LSB and DLSB
The Blowfish Algorithm algorithms' covert embedding strategies.
It is one of the cryptographic methods to code the
message using some key by the sender and can not be In 2023 Nagamunthala, M. and Manjula, R. Proposed
understood by anyone which can be later extracted by the a system consists of three main components: the data
target receiver using the same key to understand it. It is said to owner, the cloud data center, and authorized users. The data
be the upgraded version of the DES algorithm[2]. In the owner generates a secret key for the Blowfish algorithm
Blowfish algorithm, we take 64 bits of text and divide it using TDES, and each image in their database is encrypted
into two equal parts of 32 bits each and then perform a few using this secret key. Encrypted Images are securely stored
XOR operations with the S – box and P – subarrays. We can in a cloud server, accessible to authorized users via a secure
use a keysize of range 32 bits to 448 bits in the algorithm, communication protocol. Authorized users receive secret
once we select the appropriate size of the key, we must keys from the data owner to decrypt the images. The system
keep in mind that every 8th bit of the key becomes ensures that encrypted images remain impervious to
redundant. The main advantage of the blowfish algorithm is unauthorized access, even if Intercepted.
its flexibility in the choice of the size of its key which
makes it more secure and efficient than any other The three primary parts of the system that
cryptography method. The Blowfish algorithm is broadly Nagamunthala, M. and Manjula, R. proposed in 2023 are
used in the fields of software applications, protocols, and the authorised users, the cloud data centre, and the data
systems that require secure communication and data owner. Using TDES, the data owner creates a secret key for
storage[5] the Blowfish algorithm, which is then used to encrypt every
picture in their database. Securely kept on a cloud server,
III. LITERATURE SURVEY encrypted images can only be accessed by authorised users
over a secure communication protocol. The data owner
Hussaini S.[1] presented the blowfish method in 2020 for provides secret keys to authorised users so they may decode
message encryption in cloud cyber security. The blowfish is the pictures. Even in the event that they are intercepted, the
primarily composed of two components: data encryption technology makes sure that encrypted photos are unreadable
and key expansion. The input key is split up into many by other parties.
subkey arrays during the key expansion stage. Eighteen 32-
bit boxes make up the P array, while four 32-bit arrays with Design Specification
256 elements each make up the S boxes. In the P array, The created system's architectural viewpoint will be
every one of the eighteen boxes is XORed with every other shown in this part. A comprehensive block diagram has
box. During the data encryption stage, the message is been designed to ensure a correct understanding of the
utilised using 64-bit plain text and encoded to 64-bit established system. The architecture of the suggested
cypher text. The 64-bit message is split into two 32-bit system is depicted in the image below. The Blowfish
halves. Each 31-bit half is then XORed with the P cluster, algorithm and the Pixel Indicator Technique, which enable
and the left and right halves' results are then XORed once us to maintain the confidentiality of the secret data, are the
again. This process is repeated 16 times. two main parts of the suggested system. This mechanism has
two sides to it, both the sender's and the recipient's sides.
In 2023, a system consisting of an encryption layer and a Initially, the secret message (plain text) will be combined
decryption layer was proposed by Sarah Kareem Salim, with the secret key, which will first be encrypted. The
Mohammed Majid Msallam Huda, and Ismail Olewi. After upgraded Blowfish encryption is then used to encrypt the
receiving input from the user, the system encrypts the text combined data. 16-round networks are used for data
using the Blowfish algorithm and uses LSB or DLSB methods encryption. A key and data replacement as well as a key-
to incorporate it into an image. The stego picture with the dependent permutation comprise each round. All of the
greatest Peak signal- to-noise ratio (PSNR) is chosen for operations are additions on 32-bit words and XORs.
transmission by the encryption layer. The embedded text is Following the Blowfish algorithm's encryption, the message
extracted and decrypted from the picture at the receiving end is divided into four portions and inserted into each of the four
by the decryption layer. pictures to produce the four distinct stego images. The secret
text will be integrated into the picture using the Pixel
Indicator Technique, ready for transmission to the recipient.
The sender side performs each of these actions.
Fig 1. Securing Secret Data Using Enhanced Blowfish Encryption with Image Steganography
The receiver's primary goal is to decipher the secret Step1: Generate Sub Keys
message included in the Stego-image. In order to
accomplish this goal, all actions must be carried out by the 1. Initialize first the P-array and then the four S-boxes, in
receiver in reverse order from the sender side. Using a secret order, with a fixed string.This string consists of the
key, the recipient must first remove the encrypted text from hexadecimal digits of pi (less the initial 3).
the stego-image. The plain text can be published once the 2. 18 subkeys{P[1]…P[18]} are needed in both encryption
encrypted text has been decrypted and retrieved using the as well as decryptionprocess and the same subkeys are
reverse Blowfish method. used for both the processes.
3. These 18 subkeys are stored in a P-array with each array
IV. METHODOLOGY element being a 32-bitentry.
4. It is initialized with the digits of pi(?)
A. Key Generation 5. The hexadecimal representation of each of the subkeys is
• A lot of sub-keys are used by blowfish. The generation given by:P[1] = "243f6a88"
of these keys comes before any encryption or decryption P[2] = "85a308d3
of data. .
• There are 18 32-bit subkeys in the p-array: P1, P2,..., P18. .
• Each of the four 32-bit S-Boxes has 256 entries S1,0, .
S1,1, S1,255 P[18] = "8979fb1b"
6. XOR P1 with the first 32 bits of the key.
S2,0, S2,1, ..................... S2,255
7. XOR P2 with the second 32 bits of the key, and so on
S3,0, S3,1, ..................... S3,255
for all bits of the key 8. Repeatedlycycle through the
S4,0, S4,1, ...................... S4,255
key bits until the entire P-array has been XORed with
key bits. (For every short key, there is at least one
equivalent longer key; For example, ifA is a 64- bit key,
then AA, AAA, etc., are equivalent keys.)
9. The resultant P-array holds 18 subkeys that are used 3. The result of the combination and form of the 64-bit
during the entire encryption process Cipher Text.
Step3:Encryption:
1. The encryption function consists of two parts:
a. Rounds:
a1.The encryption consists of 16 rounds with each
round(Ri) taking inputs from the plaintext(P.T.) from
the previous round and the corresponding subkey(Pi).
a2. the first 64-bit data is divided into 32 bits of data.
a3. 1st 32-bit data is XOR with 32 bit of Pi(subkey) a4. The
result passes from the Function and result of function
XOR with the 2nd 32-bit data.
a5.The output Becomes the 1st 32 bits of data for 2nd round
and the previous 1st 32 bits of data become the 2nd 32 bits
of data for the 2nd round. This process is performed 16
times.
B. Function
D. Embedding Processes :
Step 1:
Select the primary values of key parameters (S, T, t, 𝖺,
𝜃0, 𝜃1, 𝜃2, p0, q0, r0, a, v0, x0, 𝜇, c1, c2) that are required
for acting QW, 3-D chaotic system(6), and the customized
PSO algorithm (8). The key parameters for acting QW are
selected as S is a bit string of any length, T is an odd number
Fig 2. Flow Diagram of Function (F) and represents the number of the vertices in the circle, t is an
integer and represents the number of steps of acting QW,
In this figure, the function divides a 32-bit input into four and α, 𝜃0, 𝜃1, 𝜃2∈[0,𝜋/2] are utilized for constructing the
bytes and uses those as indices in anS-array. The lookup coin particle Hc=cos α|0⟩+sin α|1⟩ and the evolution operators
results are then added and XORed together to produce the 𝐸^0,𝐸^1, 𝐸^2, respectively.
32-bit output. b.
The key parameters for iterating a 3-D chaotic system are
C. Postprocessing selected as 𝑝0∈[−1.8,1.8], q0∈[−1,0.8], r0∈[−2,2], and
1. In this the output of the 16 rounds is processed. a∈[−0.0105,0].
2. The output of the 16 round is again divided into 32 bits
of data one is XOR with the P17 andone is XOR with
P18.
Step 8: REFERENCES
Reshape the extracted vector XVec to a matrix. XIm =
reshape (XVec, ℎ, w, c) [1]. Hussaini S. (2020). Blowfish Algorithm for Secure
Message Encryption in Cyber Security.Cloud
Step 9: Computing Journal, 5(2), 21-34.
De-expanding XIm of 2-bit and size ℎ×w to image EIm [2]. M. M. Msallam,(2020) "An approach to hide an audio
of 8-bit and size ℎ /2 × 𝑤/ 2 . file in an image using LSB technique, " Al- Furat
Journal of Innovations in Electronics and Computer
Step 10: Engineering (FJIECE), vol. 1, no. 3, pp. 1–7.
V (1: ℎ𝑤𝑑 4) After converting the sequence to integers, [3]. A. A. Arab, M. J. B. Rostami, and B. Ghavami(2022),
the output has to be resized to match the dimensions of the "An image encryption algorithm using the combination
encrypted image that was recovered, EIm (℗ 2 𝑥 𝑤 2 𝑥𝑐). The of chaotic maps, " Optik, vol. 261, 2022, pp. 1–8.
private medical image Sim should then be obtained using [4]. Nagamunthala, M. and Manjula, R. (2023)
bitwise xor. Implementation of a Hybrid Triple-Data Encryption
Standard and Blowfish Algorithms for Enhancing
Key = floor (V Image Security in Cloud Environment. Journal of
(1 : ℎ𝑤𝑐 4 ) × 1012) mod 256 Key = reshape (Key, ℎ 2 , 𝜔 2 Computer and Communications, 11, 135-149
, 𝐶) [5]. Christina L. and Joe Irudayaraj V. S. (2014).
SIm = EIm ⊕ Key Enhancing Data Security Using the Blowfish
2. These people took the cipher text and put it back together Algorithm. International Journal of Information
into a single cipher text. Security, 18(3), 47-62.
3. finally decrypted using Blowfish decryption at the [6]. Ibrahim R., & Kuan T. S. (2011). Image-Based
receiver side. Steganography: Hiding Information withinImages.
4. Blowfish decryption is similar to that of encryption Journal of Information Security, 8(2), 112-126.
5. we apply all the steps of encryption such as Generation [7]. Provos, N. (2015). A Future-Adaptable Image
of Sub Keys, Initialize SubstitutionBoxes Decryption, Steganography Method. InternationalJournal of
Round, and Post-Processing. Information Security, 21(4), 245-260