10.chapter 1 Jain

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Jain University

CHAPTER 1
Introduction
Modern development in technologies have created threats to secure data
transmission in digital communication and networking. Cryptography and Steganography
are the two techniques which supports in attaining security goals. Cryptography involves
scrambling of data by using different transformations whereas Steganography mainly
deals with concealing the secret data in a cover media in such a way that presence cannot
be identified.
1.1 Steganography
Steganography is the art of hiding information in a cover media for secret and
secure communication. The obtained image which carries the secret data or information
is termed as stego image. The existence of secret information in the stego image cannot
be detectable to any un intended person. The important qualities of any steganographic
system are (i)high capacity payload embedding (ii) better PSNR (iii) robustness to some
distortion caused by un authorized persons or noises in the communication systems. The
requirements of Steganographic systems are embedding module and retrieval module.
The embedding module at the sender’s end functions in embedding the secret data or
payload to the cover image to obtain stego image using any one of Steganographic
techniques. The retrieval module at the receiver’s end applies inverse Steganographic
algorithm to extract the hidden secret information from the stego image. The application
of steganography can be utilized to protect intellectual property rights i.e., to enforce copy
right and also to convey information to only those entities who are authorized.
Some of the other application of steganography are (i) secret and secure
communications in military (ii) secure Ecommerce (iii) protecting intellectual property (iv)
Authentication or verification (v) Safeguarding bank accounts/electronic transfers (vi) to
hide details of patients.
Providing security is the crucial problem in system and network technology
related application. The available security methods which could be easily implemented
lack to satisfy the critical requirement of emerging networks. There is a huge gap
between developers of security and developers of networks. The other related problems

2015Page 1
Jain University

are platform oriented. Open System interface (OSI ) architecture offers modularity,
flexibility ,ease-of-use and standardization of protocols. Whenever network security is
concerned it is not only with respect to end to end communication but also providing
security of data on the communication channel which is vulnerable to attacks. Intruders
activity on the communication channel will be normally to extract the decrypted message
from the cipher and reinsert it onto the channel.
Due to growth in the internet and new networking technology the world is more
interconnected than before. This has resulted in the availability of large amount of data
regarding personal, commercial, military and government related information on the
network infrastructure. The analysis of network security is done based on the following
1. History of security in networks
2. Internet architecture and vulnerable security aspects of the Internet
3. Types of internet attacks and security methods
4. Security for networks with internet access
5. Current development in network security hardware and software
Based on this research, the future of network security is forecasted
1.1.1 Types of Steganography
The different types of steganography based on cover medium is as shown in fig.1.1

STEGANOGRAPHY

IMAGE AUDIO/VIDEO PROTOCOL


TEXT STEGANOGRAPHY STEGANOGRAPHY STEGANOGRAPHY
STEGANOGRAPHY

Figure 1.1 Types of Steganography


 Text steganography: The historical method of steganography is Text
steganography. Secret data was hidden by selecting the particular nth letter in
every word of a text message. Advancement in internet and digital file formats
decreased this method of steganography.

2015Page 2
Jain University

 Image steganography: Using image as a cover media in steganography is one


of the popular method of steganography. Secret message which could be taken
as raw or in encrypted form is hidden in the cover image by using any embedding
algorithm. If encryption is used then use of secret key is involved. Thus obtained
stego image is transmitted to the receiver from the transmitter. At the receiver
using the same secret key extraction of secret data is done using reverse
embedding algorithm. On the channel care should be taken that the transmitted
stego image should not reveal that it is carrying hidden information or the other
hand no unauthorized person should be able to extract or corrupt the hidden
information.
 Audio steganography: Audio file is used as the cover media. This makes
exploits the audible property of human ear, wherein hidden data becomes
inaudible in the presence of the carrier audible sound. Compared to Image
Steganography, Audio Steganography is less popular due to the fact that large
audio files are required to carry information in undetectable form.
 Protocol steganography: Embedding secret data in network oriented protocols
such as TCP/IP is termed as Protocol Steganography. Usually header is used to
attain this type of steganography. Certain fields of the TCP/IP packet could be
made to carry secret information.
1.2 Image Steganography:

One of the most popular method of stganography is Image Steganography. When


cover medium is used as an image there is a large possibility of accessing any pixel in
random. Most of internet concerned activity deals with images. There are basically two
domains of image steganography ;Spatial domain image steganography and Frequency
domain image steganography.
1.2.1 Spatial domain Techniques

Time domain technique or spatial domain technique makes use of substitution


methods. Redundant parts of the cover image or the selective position is used to embed
the information. LSB insertion technique makes use of least significant bit position of
every pixel to carry the secret information. This approach is the simplest and relatively
2015Page 3
Jain University

commonly used steganographic technique. Substitution technique gives high payload


capacity. Using permutations secret message bits can be made to get distributed
randomly on the cove image. This will make the work of the attacker complex. The
random key should be known at the receiver to extract the information in the same order.
1.2.2 LSB Substitution Method
Replacing the LSB of the cover image pixel is the simplest form of the
substitution technique. To increase the payload capacity one can embed bits in 1,2,3 or 4-
LSBs of the cover image. This could be implemented on gray scale and color images also.
Than regular substitution technique random substitution technique provides more security.
Without the key retrieval or reverse algorithm is highly impossible.
1.2.3 Transform Domain Techniques
Even though LSB substitution is simple with respect to embedding it is highly
vulnerable to minute changes in cover modification. Any signal processing technique can
easily destroy the secret information completely. In order to overcome the disadvantage
of robustness encountered in time domain, frequency domain technique is used. Any
image processing techniques like compression, cropping applied will not destroy the
secret information. There are many transforms available like Discrete Cosine Transform,
Wavelet transform etc. Application of transformation can be done on entire cover image
or on blocks of the cover image. This technique is independent of image file format and
can sustain lossy or lossless compression.
1.2.4 Discrete Cosine Transform
Most popular signal transformation method is DCT. It is known for its strong
energy compaction. It is used in JPEG compression because of its property of enclosing
most of the signal in few coefficients. The image is separated into spectral bands with
respect to its visual quality i.e., image is broken down to its low, middle and high
frequency components.
The low frequency sub-band contains most important visual parts of the image.
The high frequency components of the image are usually removed through compression
and noise attacks. Hence the secret message is embedded by modifying the coefficients of
the middle frequency sub-band, so that the visibility of the image will not be affected.

2015Page 4
Jain University

Application of DCT divides the image into blocks 8x8 pixels. 2 D application of
the divided blocks results in 64 DCT coefficients. Depending of the size of the input
image these coefficients are formed into matrix. Thus even when there is a modification
on a single DCT coefficient will have a direct impact on the entire block of 64 pixels.
Pseudorandom block is embedded with i-th message bit and then embedding process is
started. Location of two DCT coefficients should be known to both sender and the
receiver before the communication starts. These chosen coefficients should correspond to
the middle frequencies to avoid losses while compression in JPEG. After the data being
embedded inverse DCT if applied which results in stego image. While retrieval every
clock is compared with respect to coefficients in every block and information is restored.
1.2.5 Discrete Wavelet Transform
To convert spatial domain to frequency domain Discrete Wavelet Transform can
be used.
On pixel by pixel basis DWT separates high frequency and low frequency components. It
can analyze different frequencies by different resolutions and hence is known as a multi-
resolution technique. In this, an image is divided into four sub-bands and the sub-band
with the lowest frequency undergoes another level of decomposition. The four sub-bands
obtained are:
LL (Horizontally and vertically low pass)
LH (Horizontally low pass and vertically high pass)
HL (Horizontally high pass and vertically low pass)
HH (Horizontally and vertically low pass)
These are also called as Approximation, Horizontal, Vertical and Diagonal Coefficients
respectively. Image steganography technique using DWT one can use any one of high
frequency sub-bands to embed secret data. Very existence of secret data is invisible and
hence goal of steganography is attained.
1.3 Comparison between DCT and DWT

In image steganography both the transformation techniques like DCT and DWT
can be used. DCT operates on blocks of independent pixels. DCT, when used at high
compression rates might result in annoying blocking artifact. This drawback of DCT is

2015Page 5
Jain University

eliminated using DWT. DWT applies on entire image. Larger amount of secret data can
be hidden in DWT than in DCT. Each block carries single secret data bit whereas three
high frequency sub-bands can be used to embed the data in DWT technique.

1.4 Evaluation of Image Quality


For comparing stego image with cover results requires a measure of image quality,
commonly used measures are Mean-Squared Error, Peak Signal-to-Noise Ratio and
capacity.

1.5 Comparison of Image Steganographic Techniques


On the basis of parameters like PSNR, MSE, NC (Normalized coefficient),
comparative analysis of different Steganographic techniques like LSB, DCT & DWT is
done. Processing time, Robustness & Capacity on different images and the results are
evaluated. If PSNR ratio is high then images are of best quality.
The three main criteria for steganography are: security, capacity, and
imperceptibility. These are used to rate the performance of Steganographic techniques.

 Capacity: To be useful in conveying secret message, the hiding capacity provided


by steganography should be as high as possible, which may be given in absolute
measurement (such as the size of secret message), or in relative value (called data
embedding rate, such as bits per pixel, bits per non-zero discrete cosine transform
coefficient, or the ratio of the secret message to the cover medium, etc.).
 Security: Security attacks like active or passive attacks should be taken into
consideration in steganography. It should provide immunity against all types of
attacks.
 Imperceptibility: Stego images should not have severe visual artefacts. Under the
same level of security and capacity, the higher the fidelity of the stego image, the
better. If the resultant stego image appears innocuous enough, one can believe this
requirement to be satisfied well for the warden not having the original cover
image to compare.

2015Page 6
Jain University

Table 1.1: Parameters Analysis of Steganography Methods

Features LSB DCT DWT


Invisibility Low High High
Payload Capacity High Medium Low
Robustness against image
Low Medium High
manipulation
PSNR High Medium Low

MSE Low Medium High


1.6 Cryptography
Three goals of network security are confidentiality, integrity and availability.
Integrity of data is important is, the information should be prevented from modification,
by a person who is not authorized to do so.

Security
Goals

Confidentially Integrity Availability

Fig 1.2: Three goals of Network Security


Cryptographic mechanisms will definitely have an overhead; so it is always like
you are doing something over, what you are supposed to do for the normal transaction,
but the overhead should be as small as possible. So, therefore, cryptography should not be
a nuisance so much, that it is kind of bypassed for practical user. So, therefore, there is a
need for fast algorithm, faster modification techniques, something which has got a lesser
footprint over time and other important parameters.

2015Page 7
Jain University

1.7 Steganalysis

The method or attack used to extract the information from stego images is called
as Steganalysis. There are three types of Steganalysis, namely Visual attacks, statistical
attacks and structural attacks.

(a) Visual attacks: using naked eye or with the help of the computer if one can identify
the presence of hidden data then this type of attack is termed as visual attack.. Further
analysis is done to separate the image into bit planes.
(b) Statistical attacks: In Statistical attack mathematical tools are used to identify the
smallest changes that are resulted while applying Steganographic algorithm. These types
of attacks are highly powerful and successful. There are two types of attacks one is called
passive attack and the other is called active attack. In passive attack only presence of the
secret data is identified whereas in active attacks the length, location and existence of
secret key is also been revealed
(c) Structural attacks: Usually after the application of Steganographic technique the
format of the data file gets altered. Analysis done on this type of structural based concept
is termed as structural attacks.

1.8 Motivation
In the past, there have been many developments in the secure communication
problem. Modifying existing methods to efficient and effective communication is done
using steganography where the messages such as images, videos, sound files, text and
other computer files can be hidden inside or other digital objects which remains invisible
to an ordinary observer. A detailed study and analysis and improvement over the existing
technology are the central concept of research.

1.9 Objective
The objective of this thesis is to design and develop an efficient Steganographic
algorithm against Steganalysis for Secure Communication.
 Study different image processing algorithm for secure communication.

2015Page 8
Jain University

 Compare different algorithms.


 Study different steganography methods for secure communication.
 Developing an efficient algorithm.
 Improving the efficient algorithm for secure communication using
steganography.
 Experimentation and testing of the algorithm for live secure communication.
 The algorithms are developed using Mat lab software and C programming.

1.10 Methodology

The methodologies to be followed to carry out the research will be as follows.


 Study of existing techniques.
 Implement them in order to get the idea of the field.
 Improving the efficient algorithm for secure communication using
steganography.
 Experimentation and testing of the algorithm for live secure communication.
 The algorithms are developed using Mat lab software and C programming.

1.11 Overview of Thesis


Chapter 1 gives an introduction of Steganography and Steganalysis techniques used in
network security.
Chapter 2 describes the contributions of different people in the field of Steganography.
It gives an overview of different techniques by which data could be hidden in an image.
Chapter 3 has explained an algorithm which uses variable embedding method. It also
explains the way in which payload could be increased with good PSNR using multiple
edge detection. In Spatial Domain techniques simple LSB substitution methods are less
secure and payload capacity is less. To increase security Randomization techniques are
used. These methods spread the message randomly into the cover image but payload
capacity is still less. Edge detection method increases the payload capacity and it
improves randomness and hence security.

2015Page 9
Jain University

This chapter gives an algorithm which uses error replacement method like
minimum error replacement method and Advanced Error Replacement Method to attain
good PSNR. To add randomness to the embedding procedure which increases security,
Variable Embedding can be employed in which a suitable embedding ratio is chosen and
according to that the message bits are embedded into the image pixels. The increase in the
payload decrease PSNR value, which indicates image degradation amount. To improve
PSNR Minimum Error Replacement [MER] method is used. In this method the next
higher bit than the last embedded bit is toggle to decrease the pixel error.
Chapter 4 describes Stego and crypto way of embedding the data, especially in
Multiresolution analysis. This chapter has explained the use of Multiresolution analysis
on wavelets and Curvelets. The experimental analysis explained in this chapter has
proved that Curvelets is the best Multiresolution transformation available. Even if the
image carrying embedded data i.e., Stego image undergoes a reverse operation, data
cannot be extracted if the receiver is unaware of the exact coordinates of the geometric
shape. Hence retrieving secret image for an attacker becomes a hard task. Experimental
results are verified for both the properties of Cryptography and Steganography.
Chapter 5 explains frequency domain technique used to develop an algorithm for
Stganography. Skin tone algorithm is developed and explained for four different
embedding procedures. Another feature used in data hiding i.e. cropping of image. The
cropped image is used in different steps of data hiding. This cropping feature increases
the security than the use of whole image. So, this cropped region used as the key at
decoding side. This shows that the mechanism of hiding the information in skin tone
region of images gives higher security.
Chapter 6 gives overall conclusion with respect to algorithm developed. It also explains
the way in which security related parameters could be improved by employing few other
Steganographic techniques.

1.12 Major Contributions


Image Steganographic method [8] by multiple edge detection using Canny
operator and Variable Embedding method is proposed. By using this method the data

2015Page 10
Jain University

hiding capacity is improved and secrecy of the embedded data bits can be provided. It is
also seen that the stego image formed is of good quality.

A new way of hiding the data in image through geometrical figures [9] which
takes the advantages of both cryptography and Steganography is proposed. Here origin
and radius of the circle acts as a key in selecting the pixels. Radius and origin depends
upon the amount of data that are being hidden, selecting pixels can’t be identified since
they look as other common pixels even after they are modified with data.

Multiple Edge Detection and Variable Embedding increases the maximum data
hiding capacity and the minimum error Replacement [4] method compensates for the
PSNR reduction caused by them.

Robust Image Steganography method using advanced method of Error


replacement and Multiple Embedding [2], which improves the PSNR and the data hiding
capacity without comprising the visual quality of the image is developed. Further the
security of the proposed method is very high as the majority of the Stego analysis method
fails in retrieving the hidden message as variable embedding is made use, since the
application of AER changes the higher order MSB bits the position of data that is hidden
cannot be known which further increases the robustness of the method along with
reduction in error.

The image is compressed by 3 levels by using discrete wavelet transform and the
compressed image [7] is recovered by using inverse discrete wavelet transform. The
original image is recovered. The peak signal-to-noise ratio is 55.62 and mean square error
is 0.178. Number of coefficients recovered is 99.94 %. Standard deviation is 2.537.
Median absolute deviation is 0.943. Mean absolute deviation is 1.642.
An algorithm [3] for embedding the data by considering the decimal value of the

data is developed. The data to be embedded is first converted into decimal values, and

then these decimal values are used to embed the data. Here instead of directly replacing

the LSB with the data bits, the magnitude of the input data to just compliment certain

2015Page 11
Jain University

LSB bits are being used. With this method the security increases significantly with little

distortion of the visual quality, also the PSNR.

Instead of embedding secret image in the whole cover image, it is been embedded
only in skin pixels of cover image. The proposed method [8] uses HSV (Hue, Saturation
and Value) color space for skin detection & Haar DWT (Discrete Wavelet Transform) as
frequency transform method. The proposed method uses skin tone detection for finding
skin portion of image and within this skin portion secret data embedding is done using
DWT domain. Four cases of embedding are considered. It is observed that hiding of
secret data in only the cropped skin portion enhances the security.

2015Page 12

You might also like