Professional Documents
Culture Documents
10 - Chapter 3 PDF
10 - Chapter 3 PDF
10 - Chapter 3 PDF
Chapter 3
CHAPTER 3
Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY
TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED
DATA USING VARIOUS FILE FORMATS
techniques which are complex and which have strong and weak points
innocent carriers are the possible cover carriers which will hold the
only when the statistics of the cover information and the stego
information are similar with each other. In other words it conveys the
meaning that the relative entropy between the cover information and
that data can be hidden in such a way that even the naked eye is
unable to identify the hidden information in the LSBs of the cover file.
and unhiding a secret file into an image file using LSB insertion
to the data.
47
of Lossless compression formats are GIF [84], BMP and PNG formats.
The way they are applied decides the importance of each and every
Invisibility
Payload Capacity
payload capacity.
Hiding Capacity
stego image.
Perceptual Transparency
values.
hides the presence of information from the hacker. The LZ algorithm for
3.4.1 LSB
representations of the secret data have been taken and the LSB of
each byte is overwritten within the image. If 24-bit color images are
supposing that we have three neighbouring pixels (nine bytes) with the
secret information:
010010011.
get the following sequence of bits (where bits in red color have been
modified):
Step-4: Prepare the word dictionary for the original file context.
Example:
Ask not what your country can do for you – ask what
you can do for your country
Number of characters 61
Number of words 17
Number of spaces 16
Number special characters 00
Total bytes in original text 79
Dictionary
Word Equivalent Number for word
Ask 1
What 2
Yours 3
Country 4
Can 5
Do 6
For 7
You 8
52
Key Generation: The keys for the RSA algorithm are generated in the
following way:
keys.
Step-4: Choose an integer e such that 1 < e < φ (pq), and gcd (e,
φ(n))=1
Encryption:
follows:
Decryption:
as follows:
3.5 IMPLEMENTATION
First the original image, as shown in the Fig. 3.1 and the
bytes representing the pixels are taken in single array and byte stream
is generated. Message bits are taken sequentially and then are placed
in LSB bit of image byte. Same procedure is followed till all the
Step-1: Read the cover image and secret text information which is to
form.
Step-6: Embed the bits of the secret information into bits of LSB of
turn gives the index number of the pixel byte where secret message bit
message bit is reached. After this, the bit stream of the message shall
be generated. Available bits are grouped to form bytes such that each
file which represents the encrypted embedded message. After that the
Step-3: Find and retrieve the LSBs of each RGB pixel of the stego
image.
information.
Histogram [87].
56
3.6.1 MSE
The MSE between cover file and stego file is calculated as per
Eq. (1.2).
3.6.2 PSNR
PSNR scales the MSE according to the image range. The PSNR
between cover image and stego image is given by Eq. (1.3). A higher
PSNR indicates that the quality of the stego image is similar to the
cover image.
3.6.3 Correlation
which the cover image and the stego image are close to each other even
different file formats varies from 2.6 to 4.0 and PSNR varies from
proposed technique.
3.6.4 Histogram
stego image. Fig. 3.3 and 3.4 show the color histograms of cover image
3.7 CONCLUSIONS
hidden into the carrier files, so that this will provide additional security
to the data. The sender and receiver only know how to hide and
61
unhide the data into the carrier files. No other intermediate person
will even know that there is a second message inside the carrier file.
The sender and receiver only know the commands to hide and unhide.
Steganography works effectively for 24 BMP, GIF and PNG image file