Professional Documents
Culture Documents
Steganography is the art of hiding the fact that communication is taking place, by
hiding information in other information. Many different carrier file formats can be
used, but digital images are the most popular because of their frequency on the
internet. For hiding secret information in images, there exists a large variety of
steganography techniques some are more complex than others and all of them
have respective strong and weak points. Different applications may require
absolute invisibility of the secret information, while others require a large secret
message to be hidden. This project report intends to give an overview of image
steganography, its uses and techniques. It also attempts to identify the
requirements of a good steganography algorithm and briefly reflects on which
steganographic techniques are more suitable for which applications.
P a g e 1 | 19
1. INTRODUCTION
Steganography is an old art which has been in practice since time unknown.
Steganography, from the Greek, means covered or secret writing and is thus the
art of hiding messages inside innocuous cover carriers, e.g. images, audio, video,
text, or any other digitally represented code or transmission, in such a manner
that the existence of the embedded messages is undetectable.
As a famous author once said The art of disguise is knowing how to hide in
plain sight.
The network security is becoming more important as the number of data being
exchanged on the internet increases. Therefore, the confidentiality and data
integrity are required to protect against unauthorized access and use. This has
resulted in an explosive growth of the field of information hiding.
Information hiding is an emerging research area, which encompasses applications
such as copyright protection for digital media, watermarking, fingerprinting, and
steganography.
Steganography hides the secrete message within the host data set and makes its
presence imperceptible. The host data set is purposely corrupted, but in a covert
way, designed to be invisible to an information analysis.
P a g e 2 | 19
2. STEGANOGRAPHY
Steganography is the art and science of writing hidden messages in such a way
that no one, apart from the sender and intended recipient, suspects the existence
of the message, a form of security through obscurity.
P a g e 3 | 19
3. CRYPTOGRAPHY VS STEGANOGRAPHY
Steganography does not alter the structure of the secret message, but hides it
inside a cover-image so it cannot be seen. Steganography prevents an unintended
recipient from suspecting that the data exists. Also, the security of classical
steganography system relies on secrecy of the data encoding system. Once the
encoding system is known, the steganography system is defeated.
P a g e 4 | 19
Objective Secrete Copyright preserving Data protection
Communication
Result Stego-file Watermarked-file Cipher-text
Concern Delectability/ Robustness Robustness
Capacity
Type of attacks Steganalysis Image processing Cryptanalysis
Visibility Never Sometimes Always
Fails when It is detected It is removed/ De-ciphered
replaced
Relation to Not necessarily Usually becomes an N/A
cover Related to the attribute of the cover
cover. The image. The cover is
message is more important than
More important the message.
than the cover.
Flexibility Free to choose Cover choice is N/A
any suitable restricted
cover
History Ancient except Modern era Modern era
its digital
version
P a g e 5 | 19
4. IMAGE STEGANOGRAPHY
A digital image is defined for the purposes of this document as a raster based, 2-
dimensional, rectangular array of static data elements called pixels, intended for
display on a computer monitor or for transformation into another format, such as
a printed page. To a computer, an image is an array of numbers that represent
light intensities at various points, or pixels. These pixels make up the image's
raster data. Digital images are typically stored in 32-, 24- or 8-bit per pixel files. In
8-bit color images, (such as GIF files), each pixel is represented as a single byte. A
typical 32-bit picture of width=n pixels and height = m pixels can be represented
by an m x n matrix of pixels.
The three 8 bit parts - red-R, blue-B and green-G - constitute 24 bits which means
that a pixel should have 24 bits. 32 bit refers to the image having an "alpha
channel". An alpha channel is like an extra color, although instead of displaying it
as a color, it is rendered translucently with the background.
P a g e 6 | 19
4.1 IMAGE FORMATS
1. BMP- This is a system standard graphics file format for Microsoft Windows and
hence proprietary and platform dependent. It is capable of storing true color
bitmap images and used in MS Paint and Windows wallpapers etc. Being an
uncompressed file format, it requires high storage.
We have chosen PNG image file format as our default carrier media because of
the following advantages:
1. PNG is the most flexible image format for web because it can save images
in 8-bit, 24-bit and 32-bit colours which is not possible with GIF and JPEG
file formats. For example, GIF can only store only 8-bit or lower bit depths.
P a g e 7 | 19
Similarly, JPEGs must be stored in 24-bit and no lower while PNG.s can be
stored in 8-bit, 24-bit, or 32-bit.
2. PNG uses a lossless compression method, which means that an image can
be compressed and decompressed without any loss of the image quality.
PNG is compressed using any number of pre-compressed filters and is then
decompressed when viewed similar to JPEG format, except the PNG format
is lossless. PNG.s compression engine typically compresses images 5-25%
better than GIF.
4. Metadata for Searching and Indexing as keywords and other text strings
(compressed or otherwise) can be incorporated to enable search engines to
locate the image on web.
P a g e 8 | 19
4.2 STEGANOGRAPHY TECHNIQUE
Though there are numerous techniques available, the most popular Least
Significant Bit (LSB) insertion technique is used here.
LSB techniques embed the message bits directly into the least-significant bit plane
of the cover image in a deterministic sequence. This results in a change with too
low an amplitude to be human-perceptible. The problem is its vulnerability to
image manipulation.
In this method, the least significant bits of some or all of the bytes inside an image
are replaced with the bits of the secret message. The LSB embedding approach
has become the basis of many techniques that hide messages within multimedia
carrier data. LSB embedding may even be applied in particular data domains - for
example, embedding a hidden message into the color values of RGB bitmap data,
or into the frequency coefficients of a JPEG image. LSB embedding can also be
applied to a variety of data formats and types.
P a g e 9 | 19
5. EXISTING SYSTEM
The existing system uses the histogram of the image to embed the data. This
method also enhances the contrast of the image. The image enhancement is
achieved by histogram equalisation. The highest peaks in the histogram are taken.
The bins between the peaks are unchanged while the outer bins are shifted
outwards so that each of the two peaks can be split into two adjacent bins. To
increase embedding capacity, the highest two bins in the modified histogram can
be further chosen to be split, and so on until satisfactory construct enhancement
effect is achieved. For the recovery of the original image, the location map is
embedded into the host image, together with the message bits and other side
information. So, the blind data extraction and complete recovery of the original
image are both enabled. The generation of image histogram is a difficult and a
time- consuming process. But the contrast of the image is enhanced. The data is
only hidden in the image where the security level is simple. Since the data is
hidden and if the retrieving process is known the intruder will be able to retrieve
the image easily without any effort.
P a g e 10 | 19
6. PROPOSED SYSTEM
Proposed system is a dual security model for hiding sensitive information. It uses
AES encryption to first encrypt the secret data with the help of common shared
key and then uses the LSB (Lowest Significant Bit) replacement technique to
embed the secret encrypted data into the cover image.
P a g e 11 | 19
6.1 AES ENCRYPTION
Rijndael is a block cipher developed by Joan Daemen and Vincent Rijmen. The
algorithm is supporting any combination of data and key size of 128/192/256 bits.
The proposed method used its 128-bits version allow 128-bits block size and 128
bits key size. AES is divided into four basic operational blocks. These operates on
array of bytes and organised as a 44 matrix called state. For complete
encryption, the data is passed through 10 rounds. These rounds are
governs the following transformation.
AES Key Expansion: The AES key expansion algorithm takes as input a 4-
word (16-byte) key and gives a linear array of words, providing a 4-word
round key for the initial AddRoundKey stage and each of the 10 rounds of
the cipher. It involves copying the key first in to the group of 4 words, and
P a g e 12 | 19
then constructing subsequent groups of 4 based on the values of the
previous 4th words. The first word in each group of 4 gets special
treatment with rotate + S-box + XOR constant on the previous word before
XORing the one from 4 back.
P a g e 13 | 19
7. MODULES INCLUDED
P a g e 14 | 19
8. FLOW CHARTS AND DFD
P a g e 15 | 19
8.2 DATA FLOW DIAGRAM FOR EMBEDDING
P a g e 16 | 19
9. SCREENSHOTS
P a g e 17 | 19
9.2 Encryption and Decryption Using Image
P a g e 18 | 19
9.3 Encryption and Decryption Using Text
P a g e 19 | 19