Sunday, September 15, 2019
Implementation of Lsb Steganography and Its Evaluation for Various File Formats
Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) 868 Implementation of LSB Steganography and its Evaluation for Various File Formats V. Lokeswara Reddy Department of CSE, K. S. R. M. College of Engg. , Kadapa, A. P. India Email: [emailà protected] com Dr. A. Subramanyam Dept. of CSE, AITS, Rajampet, Y. S. R. (Kadapa) Dist.. A. P. Dr. P. Chenna Reddy Dept. of CSE, JNTUCE, Pulivendula, Y. S. R. (Kadapa) Dist.. A. P. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âABSTRACTââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â-Steganography is derived from the Greek word steganos which literally means ââ¬Å"Coveredâ⬠and graphy means ââ¬Å"Writingâ⬠, i. e. covered writing. Steganography refers to the science of ââ¬Å"invisibleâ⬠communication. For hiding secret information in various file formats, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale format. This paper explains the LSB Embedding technique and Presents the evaluation for various file formats. Keywords: Steganography, Least Significant Bit (LSB), GIF, PNG, BMP. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â-Date of Submission: 24, August 2010 Date of Acceptance: 08 November 2010 are transferred through unknown cover carriers in such a manner that the very existence of the embedded messages is undetectable. Carriers include images ; audio, video, text or any other digitally represented code or transmission. The hidden message may be plaintext, cipher text or anything that can be represented as a bit stream. II. IMAGE STEGANOGRAPHY Image compression techniques are extensively used in steganography. Among the two types of image compressions, lossy compression and loss less compression; lossless compression formats offer more promises. Lossy compression compression may not maintain the original imageââ¬â¢s integrity. Lossless compression maintains the original image data exactly, hence it is prefered. Example of Lossy compression format is JPEG format files. Examples of Lossless compression formats are GIF[3] and BMP formats. We have used an 8-bit image size for implementation of our steganography. Improvement in stegnographic techniques is make it possible to apply the Detecting LSB Steganography in Colour and Gray- Scale Images which were confined to gray scale images in the initial stages The difficulty in colour images control is solved later on in many techniques such as the analysis of the variation of the gradient energy. The secret message embedded in the target image is detected in both gray and colour images, and the length of the embedded message is estimated [5, 6]. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â-I. INTRODUCTION Digital content is now posing formidable challenges to content developers, aggregators, distributors and users. Th e destruction, extraction or modification of the embedded message is required to develop more robust systems so that the digital content processing and organization becomes easy. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. The shift from cryptography to stegnography is due to that concealing the image existence as stegno-images enable to embeded the secret message to cover images. Steganography conceptually implies that the message to be transmitted is not visible to the informal eye. Steganography has been used for thousands of years to transmit data without being intercepted by unwanted viewers. It is an art of hiding information inside information. The main objective of Steganography is mainly concerned with the protection of contents of the hidden information. Images are ideal for information hiding[1,2] because of the large amount of redundant space is created in the storing of images. Secret messages Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) III. HIDING METHODS IN IMAGE STEGANOGRAPHY In Image Steganography, There are a variety of methods using which information can be hidden in images. Least Significant Bit Replacement Technique: In image steganography almost all data hiding techniques try to alter insignificant information in the cover image. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image. For instance, a simple scheme proposed, is to place the embedding data at the least significant bit (LSB) of each pixel in the cover image[7,8,9] . The altered image is called stego-image. Altering LSB doesnââ¬â¢t change the quality of image to human perception but this scheme is sensitive a variety of image processing attacks like compression, cropping etc. We will be emphasizing more on this technique for the various image formats. Moderate Significant Bit Replacement Technique: The moderate significant bits of each pixel in the cover image can be used to embed the secret message. This method improves sensitivity to modification, but it degrades the quality of stego-image. Experiments have shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision. IV. THE LSB TECHNIQUE The least significant bit i. e. the eighth bit inside an image is changed to a bit of the secret message. When using a 24bit image, one can store 3 bits in each pixel by changing a bit of each of the red, green and blue colour components, since they are each represented by a byte. An 800? 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000 bytes of embedded data. As an example, suppose that we have three adjacent pixels (9 bytes) with the RGB encoding. 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 11001011 When the number 300, can be which binary representation is 100101100 embedded into the least significant bits of this part of the image. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed) 10010101 00001100 11001000 10010111 00001110 11001011 10011111 00010000 11001010 Here the number 300 was embedded into the grid, only the 5 bits needed to be changed according to the embedded message. On average, only half of the bits in an image will need to be modified to hide a secret message using the maximum cover size. Since there are 869 256 possible intensities of each primary colour, changing the LSB of a pixel results in small changes in the intensity of the colours. The human eye cannot perceive these changes ââ¬â thus the message is successfully hidden. With a well-chosen image, one can even hide the message in the LSB without noticing the difference[10]. Fig. 1 Block Diagram for implemented Logic of LSB embedding V. DESIGN DETAILS This section focuses on algorithms Steganography and Steganalysis[10] A. Algorithm for Hiding (Steganography) 1. 2. 3. Read the original image and the image which is to be hidden in the original image Shift the image to hide in the cover image by X bits. And the original image or cover image with 240 which is 11110000 So four MSBââ¬â¢s set to 0. Because of this only four LSBââ¬â¢s considered further. The shifted hidden image and the result of step 3 are bitored. This makes changes only in the X LSB bits so that the image is hidden in the original image. of LSB 4. In MATLAB we convert it to unit8 format. This image can be called as the stego image B. Algorithm for Steganalysis 1. The stego image is bit shifted by 4 bits since it was shifted by 4 bits to insert it into the original image. 2. The image is the ANDED with 255 i. e. , 11111111, which gives the original image. It is ANDED with 255 because initially all the LSBââ¬â¢s were made 0. Now it is recovered back. 3. To get it to Unit8 format we, convert it back to unit8 which is the extracted image. Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) that a message is being passed is being achieved. C. LSB in GIF 870 Fig. 2: Block Diagram for Steganalysis VI. IMAGE ANALYSIS A. LSB in BMP The BMP file format also called bitmap or DIB file format (for device-independent bitmap), is an image file format used to store bitmap digital images. Since BMP is not widely used the suspicion might arise, if it is transmitted with an LSB stego. When image are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message can be stored in the LSB of one colour of the RGB value or in the parity bit of the entire RGB value. A BMP is capable of hiding quite a large message. LSB in BMP is most suitable for applications, where the focus is on the amount of information to be transmitted and not on the secrecy of that information. If more number of bits is altered, it may result in a larger possibility that the altered bits can be seen with the human eye. But with the LSB the main objective of Steganography is to pass a message to a receiver without an intruder even knowing that a message is being passed is being achieved. B. LSB in PNG Portable Network Graphics (PNG) is a bitmapped image format that employs lossless data compression. PNG was created to improve upon and replace GIF. Since PNG is widely used the suspicion might not arise if it is transmitted with an LSB stego. When images are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message can be stored in the LSB of one colour of the RGB value or in the parity bit of the entire RGB value . A PNG is capable of hiding quite a large message. LSB in PNG is most suitable for applications where the focus is on the amount of information to be transmitted and not on the secrecy of that information. If more number of bits is altered it may result in a larger possibility that the altered bits can be seen with the human eye. But with the LSB the main objective of steganography i s to pass a message to a receiver without an intruder even knowing Graphics interchange format also known as GIF is one of the machine independent compressed formats for storing images. Since GIF images only have a bit depth of 8, amount of information that can be hidden is less than with BMP. Embedding information in GIF images using LSB results in almost the same results as those of using LSB with BMP. LSB in GIF is a very efficient algorithm to use when embedding a reasonable amount of data in a grayscale image. GIF images are indexed images where the colours used in the image are stored in a palette. It is sometimes referred to as a colour lookup table. Each pixel is represented as a single byte and the pixel data is an index to the colour palette. The colours of the palette are typically ordered from the most used colour to the least used colours to reduce lookup time. Some extra care is to be taken if the GIF images are to be used for Steganography. This is because of the problem with the palette approach. If the LSB of a GIF image is changed using the palette approach, it may result in a completely different colour. This is because the index to the colour palette is changed. The change in the resulting image is noticeable if the adjacent palette entries are not similar. But the change is not noticeable if the adjacent palette entries are similar. Most applications that use LSB methods on GIF images have low security because it is possible to detect even moderate change in the image. Solutions to these problems could be 1. Sort the palette so that the colour difference between consecutive colours is minimized 2. Add new colours, which are visually similar to the existing colours in the palette. 3. Use Gray scale images. In a 8 bit Gray scale GIF image, there are 256 shades of gray. This results in gradual changes in the colours and it is hard to detect. VII. EXPERIMENTED RESULTS Following experimental results highlights on 8 bit LSB Steganography. A. Results for . png image 8 bit stego image Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) 871 B. Results for . bmp file 8 bit stego image PSNR is measured in decibels (dB). PSNR is a good measure for comparing restoration results for the same image, but between-image comparisons of PSNR are meaningless. MSE and PSNR values for each file format is shown in table 1. Table 1: Image quality metrics for bmp file Cover image 224. 948 24. 6100 Stego image 244. 162 24. 2540 Cover- Stego image 69. 826 29. 690 MSE PSNR Stego Recovered IX. EVALUATION OF DIFFERENT TECHNIQUES There are many steganographic algorithms available. One should select the best available algorithm for the given application. Following characteristics are to be evaluated while selecting a particular file format for Steganography. Steganography says that the secret message is to be hidden and it should result in an distortion less image. The distortion must not be visible to the human eye. The amount of data embedded in the image also plays an important role. The algorithm decides how much amount of data could be embedded in the image resulting in a distortion less image. Steganalysis is the technique of detecting the hidden information in the image. The algorithm for Steganography must be such that the steganalysis algorithms should fail. i. e the Steganography algorithms must not be prune to attacks on steganalysis. During communication the intruder could check the original image to remove the hidden information.. He/she may manipulate the image. This manipulation may include cropping or rotation etc of the images. The manipulations done may cause the image distortion. Steganographic algorithms chosen must be such that it overcomes such manipulation and the steganographic data reaches the destination in the required format. VIII. EVALUATION OF IMAGE QUALITY For comparing stego image with cover results requires a measure of image quality, commonly used measures are Mean-Squared Error, Peak Signal-to-Noise Ratio[3] and histogram. A. Mean-Squared Error The mean-squared error (MSE) between two images I1(m,n) and I2(m,n) is: M and N are the number of rows and columns in the input images, respectively. Mean-squared error depends strongly on the image intensity scaling. A mean-squared error of 100. 0 for an 8-bit image (with pixel values in the range 0-255) looks dreadful; but a MSE of 100. 0 for a 10- bit image (pixel values in [0,1023]) is barely noticeable B. Peak Signal-to-Noise Ratio Peak Signal-to-Noise Ratio (PSNR) avoids this problem by scaling the MSE according to the image range Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) Table 2: Comparison of LSB technique for various file formats LSB LSB LSB In BMP in GIF In PNG Percentage Distortion less High Medium High resultant image Invisibility Steganalysis detection Image manipulation Amount of embedded data Payload capacity Independent of file format X. CONCLUSION Since BMP uses lossless compression, LSB makes use of BMP image. To be able to hide a secret message inside a BMP file, one would require a very large cover image. BMP images of 800? 600 pixels found to have less web applications. Moreover such uses are not accepted as valid. For this reason, LSB Steganography has also been developed for use with other image file formats. Although only some of the main image steganographic techniques were discussed in this paper, one can see that there exists a large selection of approaches to hiding information in images. All the major image file formats have different methods of hiding messages, with different strong and weak points respectively. LSB in GIF images has the potential of hiding a large message, but only when the most suitable cover image has been chosen. High Low Low High High Low Medium Low Low Medi um Medi um Low Medium Low Low Medium Medium High Authors Biography 872 Steganography: Seeing the Unseenâ⬠, Computer Journal, February 1998. [5] Li Zhi,Sui Ai Fen. , ââ¬Å"Detection of Random LSB Image Steganographyâ⬠The IEEE 2003 International Symposium on Persona1,lndoor and Mobile Radio Communication Proceedings, 2004. [6] Jessica Fridrich, Miroslav Goljan, and Rui Du. , ââ¬Å"Detecting LSB Steganography in Color and GrayScale Imagesâ⬠, ââ¬â IEEE Multimedia. [7] F. Collin,Encryptpic,â⬠http://www. winsite. com/bin/ Info? 500000033023. [8] G. Pulcini, Stegotif,â⬠http://www. geocities. om /SiliconValley/9210/gfree. html. [9] T. Sharp, Hide 2. 1, 2001,â⬠www. sharpthoughts. org. [ 10] Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs ââ¬Å"Implementation of LSB Steganography and Its Evaluation for Various Bitsâ⬠Digital Information Management, 2006 1st International conference. pp 173-178,2007. V. Lokeswara Reddy did his M. Tech (CSE) from SRM University, Chennai in the year 2005. He did his M. C. A from S. V. University, Tirupati in the year 2000. He is pursuing his Ph. D from JNTUA, Anantapur. He has a total of 09 years of experience in teaching. Currently he is working as Associate Professor at K. S. R. M College of Engineering, Kadapa. He has presented 2 papers in International and National Conferences. Dr. A. Subramanyam received his Ph. D. degree in Computer Science and Engineering from JNTU College of Engineering, Anantapur. He has obtained his B. E. (ECE) from University of Madras and M. Tech. (CSE) from Visweswaraiah Technological University. He is having 17 years experience in teaching. He is currently working as Professor & HOD in the Department of Computer Science and Engineering of Annamacharya Institute of Technology & Sciences, Rajampet, Y. S. R. (Kadapa) Dist. A. P. He has presented and published number of papers in International and National Conferences, International and National Journals. He is guiding few Ph. D. s. His research areas of interest are parallel processing, network security and data warehousing. Dr. P. Chenna Reddy did his B. Tech (CSE) from S. V. University College of Engineering, Tirupati in the year 1996. He did his M. Tech from JNTU, Anantapur. He completed his Ph. D from JNTU, Hyderabad. He has a total of 13 years of experience in teaching. Currently he is working as Associate Professor at JNTUA College of Engineering, Pulivendula, Y. S. R. (Kadapa) Dist. , A. P. He has number of publications to his credit. References [1] Pfitzmann Birgit. Information Hiding Terminology, First International Workshop, Cambridge, UK, Proceedings, Computer Science, 1174. pp. 347-350, Mayââ¬âJune. [2] Westfield Andreas and Andreas Pfitzmann, Attacks on Steganographic Systems, Third International Workshop, IH'99 Dresden Germany, October Proceedings, Computer Science 1768. pp. 61- 76, 1999. [3] Moerland, T. , ââ¬Å"Steganography and Steganalysisâ⬠, Leiden Institute of Advanced Computing
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.