001-006

IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
Email: editoriijcs@ipasj.org
ISSN 2321-5992
A Publisher for Research Motivation ........
Volume 3, Issue 4, April 2015
A REVIEW ON: SECURITY ENHANCEMENT
OF PAYLOAD OBJECT
1
Anushka Nagpal, 2 Deepak Bagga
Haryana Engg. College (Jagadhri)
ABSTRACT
With the rise of internet most of the communication & information sharing is done over the web. The increasing unauthorized
access of confidential data, information security is most important. Thus a big issue is to reduce the chances of information
detection during transmission. Steganography is a process that involves hiding message in an appropriate carrier for example an
image. The carrier can be sent to receiver without anyone else knowing that it contain a hidden message. The initial aim of
steganography is how it is implemented. The objective of this review paper is to study various steganography techniques for
embedding the message and to communicate secretly using open channel.
Keywords: least significant bit , discrete cosine transform, stego-object, payload, PSNR.
1. INTRODUCTION
Digital data communication is an essential part of everyone’s life. Data communication has some problems such as internet
security so to avoid these problems, cryptography is among one of the methods. However, encryption results in a disordered
and confusing message and can attract eavesdroppers easily. The technique used to keep the contents of a message secret is
called steganography. Steganography methods overcome this problem by hiding the secret information behind a cover
media (video, audio or image) because the presence of information cannot be noticed by any attacker. The goal of
steganography is to keep the existence of a message secret [15].
Steganography is concealed writing. The word steganos means “covered” and graphial means “writing”[1] and is the
technique of hiding secret data within a cover media such that it does not draw the attention of an unauthorized person [5].
In ancient times, the data was protected by hiding it on the stomach of rabbits, on the scalp of the slaves. But today’s most
of the people transmit the data in the form of text, image, video and audio over the medium . So, in order to transmit
confidential data safely, the multimedia object like audio, video, images are used as cover medium to hide data.
Using steganography, it embed a secret message inside a piece of unsuspicious information i.e cover object, this cover object
with object secretly embedded message is called stego-object [16] and send it without anyone knowing of the existence of
the secret message. Cryptography and steganography techniques are closely related where Cryptography scrambles the
message so that they cannot be understood. Steganography will hide the message so there is no knowledge of the existence
of the message in the very first place. So, both sciences can be combined to produce better protection of the message. Even,
when the steganography fails and the message is detected, it is still of no use as it is encrypted using cryptography
techniques[20]
Cover File
(Image, Video,
Audio)
Data to hide
(Text, Image,
Video, Audio)
Steganography
Stego File
Fig a: The Process of hiding Data
THE BASICS FOR EMBEDDING
The first step in embedding for hiding information is to pass both the secret message and the cover medium into the
encoder. Inside the encoder, several protocols will be implemented to embed the secret information into the cover medium.
The type of protocol will depend on what kind of information you are trying to embed. For example, an image protocol to
embed information inside images is being used.
Volume 3 Issue 4 April 2015
Page 1
IPASJ International Journal of Computer Science (IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
Email: editoriijcs@ipasj.org
ISSN 2321-5992
A Publisher for Research Motivation ........
Volume 3, Issue 4, April 2015
In embedding process, a key is often needed This can be in the form of public or private key so you can encode the secret
message with your private key and the recipient can decode it using your public key. In this way, it reduces the chance of a
third party attacker getting hold of the stego object and decoding it to find out the secret information.
Fig b: Generic form of image steganography
After passing through the encoder, a stego object will be produced. A stego object is the original cover object with the secret
information embedded inside it. This object should look almost identical to the cover object otherwise a third party attacker
can see embedded information. Having produced the stego-object, it will then be sent off via some communication channel,
such as email, to the intended recipient for decoding it. The recipient must decode the stego object in order to view the
secret information. At last, the decoding process is reverse of the encoding process. It is simply the extraction of secret data
from a stego object.
Reasons for rapid growth of interest in steganography:
1.) Restrictions imposed on the availability of encryption service by various governments have encouraged people to take
a move towards the methods through which messages can be embedded in cover sources.
2.) Publishing and broadcasting industries have become interested in techniques for hiding encrypted copyright marks
and serial numbers in digital films, audio recordings, books and multimedia product.
IMAGE STEGANOGRAPHY TECHNIQUES
Steganography in images are classified into two categories: Spatial-domain based Steganography and the Transform domain
based Steganography.
IMAGE STEGANOGRAPHY
SPATIAL
DOMAIN
TRANSFORM
DOMAIN
1. SPATIAL DOMAIN METHOD
In spatial domain scheme, the secret messages are embedded directly i.e processing is applied directly on the pixel values of the
image. In this, the simplest Steganography method used is the least significant bits (LSB) insertion technique. In LSB technique,
least significant bits of the pixels are replaced by the message bits.[7].
2. TRANSFORM DOMAIN METHOD
The transform domain Steganography technique is used for hiding a large amount of data and also provides a good
invisibility of data and no loss of the secret message. In this technique firstly, pixel values are transformed and then
processing is applied on the transformed coefficients. DCT & DWT techniques which are implemented in transform
domain. They transform digital image data from spatial to the transform domain. In DCT, after transforming the image in
transform domain, then the data is embedded in the least significant bits of the medium frequency components, it is a lossy
Volume 3 Issue 4 April 2015
Page 2
IPASJ International Journal of Computer Science (IIJCS)
A Publisher for Research Motivation ........
Volume 3, Issue 4, April 2015
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
Email: editoriijcs@ipasj.org
ISSN 2321-5992
compression [8]. In DWT, secret messages are embedded in high frequency coefficients and it provides maximum
robustness.
FACTORS THAT AFFECTS A STEGANOGRAPHIC METHOD:
Here are some factors that determines how efficient and powerful a technique is are as follows[19]:
a)Invisibility or statistical undecteability (imperceptibility) of data : Human eyes cannot distinguish the difference
between original and stego image.
b) Capacity: maximum information that can safely be embedded.
c) Robustness:The amount of modification the stego medium can withstand before an adversary can destroy hidden
information
d) PSNR (Peak Signal to Noise Ratio): It is defined as the ratio between the maximum possible power ofa signal and the
power of corrupting noise that affects the fidelity of its representation [10,11]. This ratio is often used for image quality
measurement between the original image and a compressed image. The higher the PSNR,the better is the quality of the
compressed image. PSNR is measured in decibels.
e) MSE (Mean Square Error): It is the average squared difference between a reference image and a distorted image. An
Image steganography technique is efficient if it gives a low MSE. It is calculated or computed pixel-by-pixel by adding
up the squared differences of all the pixels and dividing by the total pixel count [12].
2. RELATED WORK
Stuti Goel et.al This paper deals with hiding text in an image file using Least Significant Bit (LSB) based Steganography,
Discrete Cosine Transform (DCT) based Steganography and Discrete Wavelet Transform (DWT) based steganography.The
LSB substitution algorithm is implemented in spatial domain, in this the payload bits are embedded into the least significant
bits of cover image to produce the stego-image whereas in DCT & DWT algorithm are implemented in frequency domain in
which the stego-image is transformed from spatial domain to the frequency domain and in this the payload bits are
embedded into the frequency components of the cover image. Then the performance and comparison of these three
techniques is evaluated on the basis of these parameters PSNR, MSE, Capacity & Robustness.[9]
G.Arun Karthick et.al this paper represents a new scheme which is hybrid in nature, it combines two distinct domains
1)Steganography(Combination of Image + cryptography) .
2) Image Fusion – Fusing two images.
Steganography embeds the digital data message along with the media file where digital data may be text, image or hybrid.
Although both Cryptography and steganography techniques are combined to provide security in some criteria yet advanced
system of security is needed to share information without any interference. To overcome the real world problem, they
proposed a novel algorithm called StegFuse where cryptography and steganography is applied on two various types of
images, and then after applying steganographic technique both of these images are subjected to image fusion so as to get the
fused image. Wavelet transform technique is applied on both the image during fusion.
Prof.S.V.Kamble et.al This paper reviews stegnography based on digital image.Various Concepts and priniciple of
steganography is illustrated. Different embedding techniques such as LSB ,DCT, Huffman encoding [6], DWT embedding
method are generalized in this paper . Then the performance and specification of image steganography is discussed at last .
In An image based steganography that combines LSB, DCT, and compression techniques on the image to enhance the
security of the payload object.
Sneha Arora et.al (May2013) This paper proposed a new technique for the image steganography using edge detection
method for RGB images. There are many algorithms to hide data with precision level but they are also decreasing the
quality of the image. In this proposed study, the edges of an RGB image will be detected by scanning method using a 3x3
window, and then text will be embedded in to the edges of the color image. So by doing this not only high embedding
capacity will be achieved,but it also enhances the quality of the stego image from the HVS (human vision system).
Gowtham Dhanarasi et.al A block complexity analysis for transform domain image stegonagraphy is done in this paper.
The algorithm proposed here works on the wavelet transform coefficients which embed the secret data into the original
image. The technique implemented here is capable of producing a secret-embedded image that is indistinguishable from the
original image and to human eye. So this can be achieved by retaining the integrity of the wavelet coefficients at high
capacity embedding technique. This improvement to capacity-quality trading–off interrelation is analyzed in done in
detailed.
H.B.Kekre et.al(June2014) In this paper the author has proposed a Hybrid Approach so as to secure digital images. The
proposed framework introduced is a combination of Information Hiding and Image Encryption. For Information Hiding,
four different methods of Multiple LSB’s Algorithm are used in this paper and then they are evaluated. A number of
parameters are also used to evaluate the performance of the proposed framework. At last Experimental results show a good
performance.
Volume 3 Issue 4 April 2015
Page 3
IPASJ International Journal of Computer Science (IIJCS)
A Publisher for Research Motivation ........
Volume 3, Issue 4, April 2015
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
Email: editoriijcs@ipasj.org
ISSN 2321-5992
Inderjeet Kaur et .al The technique proposed is a combination of steganography and watermarking (TDSSW)which
provides copyright protection to the information being transmitted secretly over communication channel. The proposed
technique is a transform domain based technique. At end it was observed that the proposed technique comes up with good
PSNR (Peak Signal to Noise Ratio) value and enhanced Security.
S.Shanmugasundaram(March2014)
This proposed method here uses both Cryptography and Steganography to enhance the security of the message or payload.
Firstly, the secret message is encrypted using a RSA algorithm and then it is randomized using OAEP. After that this
encoded message is embedded in the bitmap cover image using frequency domain approach. So for embedding the
encrypted message, they initially used skin tone regions of the cover image are taken and then they are detected by using
HSV (Hue, Saturation, Value) model. Thereafter, a region from skin detected area is selected, which is called as cropped
region. In this the cropped region of secret message is embedded using DD-DWT (Double Density Discrete Wavelet
Transform). DD-DWT overcomes the shortcomings of DWT (like poor directional selectivity, Shift invariance, oscillations
and aliasing). Hence the image obtained after embedding secret message(i.e. Stego-image) is far more secure and it has an
acceptable range of PSNR. The terms of PSNR and robustness against various noises like (Poisson, Gaussian, salt and
pepper, translation, rotation etc.).
Johri and Asthana[13] They proposed a steganography technique in which the data is embedded using alteration
component technique. After that the, key and secret message will replace each pixel. Then for the security of stego-image
palette based image technique is applied by stretching process. At the receiver end, the receiver having the same secret key
applies destretching palette process on stego-image using alteration component extraction process to extract the data. This
technique used has higher capacity and better imperceptibility.
Swati and Mahajan [14] This paper proposed a secure image steganographic model by using RSA algorithm and LSB
substitution. In this method, firstly the secret data is encrypted using recipient’s RSA public key. After that each bit of the
encrypted message is inserted to the LSBs of image in different images so as to get the best cover image. The Best cover
image is the one that requires minimum number of LSB changes. When the receiver receives the stego-image it will extract
the message in the encrypted form and then it will decrypt it using its private key.
Subba Rao et al. [17] This paper presented an image steganography technique which randomizes the sequence of cipher
bits. Then they computed the suitability measure of various random sequences of the cipher bits against a given image and
select the random sequence closest to the image. After that they generated those random sequences by using L.F.S.R. They
then embed these random sequences of cipher bits into the image.
Velagalapalli et al. [18] This paper proposed a technique which is known as SteganPEG to hide data in jpeg images.
Performs JPEG compression on the data to be hidden. The method also uses a
new cryptography technique which is
known as ‘Rotatocrypt’ to encrypt or decrypts data using rotations. A list called ‘PassStore’ is created from the password
used. Later, encryption is done by right rotating the bits as guided by the value in PassStore.
Volume 3 Issue 4 April 2015
Page 4
IPASJ International Journal of Computer Science (IIJCS)
A Publisher for Research Motivation ........
Volume 3, Issue 4, April 2015
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
Email: editoriijcs@ipasj.org
ISSN 2321-5992
3.CONCLUSION
Ensuring data security is a big challenge for computer users. Businessmen, professionals, and home users all have some
important data that they want to secure from others. The ultimate aim of steganography is to hide the existence of message
in the cover medium. This paper, provides an overview on Steganography. Various embedding techniques on an image
steganography such as LSB in spatial domain, DCT & DWT in transform domain are discussed. The strength of the
steganographic technique depends mainly on three factors - robustness, imperceptibility level in the stego image, and
embedding capacity. This paper also provides a comparative table drawn from the literature.
References
[1]. Morkel T et al, “An overview of image steganography”, Proceedings of the fifth annual information security South
Africa conference (ISSA2005).
[2]. Hassan Mathkour, Batool Al-Sadoon, Ameur Touir, “A New Image Steganography Technique”, IEEE- 978-1-42442108-4/08/$25.00 © 2008.
[3]. Ge Huayong ,Huang ,”Steganography and Steganalysis Based on Digital Image”, International conference & signal
Processing-2011 IEEE
[4]. Arvind Kumar, Km. Pooja, “Steganography- A Data Hiding Technique”, International Journal of Computer
Applications (0975 –8887), Volume 9, No.7, November 2010.
[5]. K B Raja, R.K.Chhotary, K.B.Shiva Kumar,” Coherent Steganography using Segmentation and DCT”, IEEE 2010.
[6]. Mamta Sharma, Compression Using Huffman Coding , IJCSNS International Journal of Computer Science and
Network Security, VOL.10 No.5, May 2010,pp 133-141
[7]. Johnson, N.F and Jajodia, S., “Exploring Steganography:Seeing the Unseen”, Computer Journal, February 2008.
[8]. Blossom kaur1, Amandeep kaur2 and Jasdeep singh,”Steganographic approach for hiding image in dct domain”
International Journal of Advances in Engineering & Technology, July 2011.
[9]. J.R. Krenn, “Steganography and Steganalysis”,January 2004.Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs,
“Implementation of LSB Steganography and its Evaluation for Various Bits”, 2004.
[10]. http://en.wikipedia.org/wiki/Peak_signal-tonoise_ratio “Peak Signal to Noise Ratio”
[11]. http://wiki.answers.com/Q/What_is_psnr_in_steganography “PSNR in Steganography”
[12]. http://tdistler.com/iqa/algorithms.html“Mean Square Error”
[13]. S. Johri., “An Adaptive Steganography Technique for Gray and Colored Images,” Journal of Global Research in
Computer Science, vol. 3, pp. 41-45, 2012.
[14]. S. Tiwari, R. P. Mahajan, and N. Shrivastava, “Steganography-an Approach for Data Hiding Based on Encryption and
Lsb Insertion,” IJECCE, vol. 3, pp. 76-83, 2012
[15]. Arvind Kumar, Km. Pooja “Steganography–A Data Hiding Technique”,International Journal of Computer
Applications (0975 –8887),Volume 9,No.7, November 2010.
Volume 3 Issue 4 April 2015
Page 5
IPASJ International Journal of Computer Science (IIJCS)
A Publisher for Research Motivation ........
Volume 3, Issue 4, April 2015
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
Email: editoriijcs@ipasj.org
ISSN 2321-5992
[16]. Jagvinder Kaur and Sanjeev Kumar, ” Study and Analysis of Various Image Steganography Techniques” IJCST Vol.2,
Issue 3, September 2011
[17]. Y. V. Rao, S. S. Rao, and N. R. Rekha, “Secure Image Steganography Based on Randomized Sequence of Cipher
Bits,” in Proc. IEEE Eighth International Conference on Information Technology: New Generations, 2011, pp. 332335.
[18]. V. L. Reddy, A. Subramanyam, and P. C. Reddy, “SteganPEG Steganography+ JPEG,” in Proc. IEEE International
Conference on Ubiquitous Computing and Multimedia Applications, 2011, pp. 42-48.
[19]. P. Goel., “Data Hiding in Digital Images: A Steganographic Paradigm,” PhD Thesis, Indian Institute of Technology,
Kharagpur, 2008.
[20]. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad and Osamah M. Al-Qershi “Image Steganography Techniques: An
Overview” International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3) : 2012
Volume 3 Issue 4 April 2015
Page 6