Professional Documents
Culture Documents
Secure LSB Steganography Over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher
Secure LSB Steganography Over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher
Abstract—Steganography is the art of hiding the existence of a • Audio Steganography: Hiding an audio file
message between sender and intended recipient. Steganography has behind another file or vise-versa
been used to hide secret messages in various types of files, including • Video Steganography: Hiding a video file
digital images, audio and video. In Image Steganography, secret behind another file or vise-versa
communication is achieved through embedding a Message Image
into a Cover Image. But some general Steganography techniques This paper combines certain image steganography
like LSB, Pixel value Differencing are prone to Information theft. approaches with cryptography approaches to provide a 2
In this paper, the LSB based Image Steganography is combined
tier security to the data that needs to be transmitted. The
with two newly proposed Cryptography techniques. The two
Cryptography techniques proposed are: Vigenère-AES Cipher and Steganographic approach discussed is LSB lossless
Modified Interrupt Key. Vigenère-AES Cipher Steganography Steganography, whilst the Cryptographic approaches
performs a Vigenère Cipher on the Message Image followed by discussed are Vigenère-AES Cryptography and Modified
AES Cipher. This Cryptographed Image is then embedded inside Interrupt Key Cryptography.
the Cover Image using an LSB Lossless Steganographic technique.
The Modified Interrupt Key Steganography performs an Interrupt
Key based Cryptography on the Message Image. The II. LITERATURE SURVEY
Cryptographed image is then embedded inside the Cover Image
using an LSB Lossless Steganographic technique. The results of A. Least Significant Bit Steganography:
these techniques are more secured form of Information hiding as The article “Image Steganography” [1] states that
they use Stego-Keys. The Stego-Keys are transmitted securely using Least Significant Bit Steganography is a type of
a Diffie- Hellman Key Exchange technique. steganography that takes advantage of the amount of Data
stored in binary equivalent of a pixel intensity. The human
Keywords—LSB- Least Significant Bit, AES- Advanced
Encryption Standard, Vigenère Cipher
eye cannot perceive the difference between the shades of
color that are very close to each other. For example,
grayscale intensity 252 and grayscale value 256 cannot be
I. INTRODUCTION differentiated unless closely looked at. A change in values
With the rise of the Internet, it has become vital to safely in the least significant bit of pixel intensities causes a
transfer data between to users. The Internet as we know it is minor difference in the change of the shade. This minor
a connection of nodes over a hostile network. In certain change since not perceivable is used to store information.
cases, the very presence of data renders the data useless. As shown in “Fig.1”, the LSB lossless technique deals
Hence data in these cases must travel secretly. One of the with an RGB cover image and a Grayscale message image.
ways to ensure confidentiality, as well as the secrecy of In the Embedding process, Both the Cover and the
information is to hide sensitive data behind Cover Media. Message images are converted into 8-bit Binary
Cryptography is a technique which keeps the contents of the equivalent. This conversion gives us 8-bit representation of
message as a secret whereas Steganography is a technique Message Image as explained by Karim, Rahman, Hossain
which keeps the existence of the message to be transferred as [2]. Arora, Singh, Tharkal, Jarwal in “Image
a secret. Steganography using Enhanced LSB substitution method”
The article “Image Steganography” by Arnab and Savitha [3] studied that the cover image is an RGB image thus it
[1] explains that Steganography requires two pieces of data: consists of three 8-bit planes. Champakamala, Padmini,
the Cover, and the Data to be protected. The cover is the Radhika [4] state the idea that the Least Significant 3 bits
medium into which the data to be embedded is put. The data of the Red plane are replaced with the Most Significant 3
ideally should not be larger than the cover since it won't be bits of the Message image. The Least Significant 3 bits of
able to store the data the Green plane are replaced with the next unselected Most
The different types of steganography mentioned by Significant 3 bits of the Message image. The Least
Arnab and Savitha [1] are: Significant 2 bits of the Blue plane are replaced with the
Least Significant 2 bits of the Message image. Thus, the
• Text Steganography: Hiding a text file behind
Stego-Image is obtained as shown in “Fig.1”. Similarly,
another file.
the decryption process is done by reversing the embedding
• Image Steganography: Hiding an Image file
process.
behind another file
C. Advanced Encryption Standard
As mentioned by J. J. Amador, R. W.Green [6], the
AES algorithm is a symmetric key algorithm. A. Ray, A.
Potnis, P. Dwivedy, S. Soofi and U. Bhade in [7] studied
an algorithm which divides data into blocks of a fixed
length of 128 bits, while the length of key used in
encryption or decryption can be of 128, 192, or 256 bits
long. As stated in [8], AES is an iterative algorithm that
uses 4 operational blocks that are repeated for a total of N
times. [5] explains that the Value N is decided based on
the size of the key i.e. N is 10, 12 and 14 for key of length
128, 192 and 256 respectively.
A. Ray, A. Potnis, P. Dwivedy, S. Soofi and U. Bhade
in [7] studied the following:
• Encryption: Rijndael's key schedule is used derive the
cipher key from the Key expansion round keys. For
each round, AES requires a separate 128-bit round
key block. “Fig.3” illustrated the encryption
procedure
a) Initial Round: uses the Add Round Key function that
takes each byte of the state and combines it with the
block of the round key using bitwise XOR.
b) Iterative Round’s:
i. Sub Bytes, a substitution step that replaces
Fig. 1. Least Significant Bit Lossless
each byte non-linearly with another using a lookup
table.
B. Vigenère Cipher Cryptography
As studied in [11] and [14], Vigenère cipher is also ii. Shift Rows, here the last three rows of the
known as a polyalphabetic substitution cipher. It constitutes state are shifted circularly for a certain number of
of 26 by 26 Caesar cipher shift matrix. The encryption is steps.
performed by adding each of the index of the plaintext iii. Mix Columns, is a mixing operation that
character to the index of the password character, based on combines the four bytes of the state.
the Vigenère square which is represented in “Fig.2”.
iv. Add Round Key
Phillip I Wilson, Mario Garcia in [10] stated the encryption
and decryption process of Vigenère Cipher in mathematical c) Final Round: Sub Bytes, Shift Rows, Add Round Key
representation of as follows: • Decryption: The inverse of sub bytes, inverse shift
Ci = E (Pi+Ki) modulus 26 rows and inverse mix columns are used in the opposite
order of which sub bytes, shift rows, and mix columns
Pi = D (Ci-Ki) modulus 26 are used. Just like encryption processes the key
C is the Cipher text, P is Plain text, K is the Key, E is expansion remains the same in decryption.
encryption function and D is the Decryption function.
Sanjeev Kumar Mandal and A.R Deepti in [9] identify that
the repeating nature of the encryption key is the main
limitation of this Cipher. This limitation which makes the
technique vulnerable to frequency analysis by kasiski
examination (a very common attack on Vigenère Cipher).
Working:
• A shared secret is established that can be used for
exchanging data secretly over a public network.
• Initially, the sender and the receiver agree upon a
common Key that is publicly available.
• The sender performs an operation using the Public key
and its own Secret key and thus, computes a value and
sends it to the receiver over a hostile network.
• The receiver performs an operation using the Public key
and its own Secret key and thus, computes a value and
sends it to the sender over a hostile network.
• The sender uses the new value received from the receiver
and its own Secret Key to compute a new value again.
• The receiver uses the new value received from the sender
and its own Secret Key to compute a new value again.
• These computed values are compared and found
similar. Thus, it considered to be the final common
Secret Key between the Sender and the Receiver.
Advantages:
• Solving the discrete logarithm is extremely tough and
challenging.
• The shared key (i.e. the secret) is never itself transmitted
over the channel.
INFERENCES
The Steganography techniques proposed above provides a
2-tier security to the message image. The message image is
first secured by using Cryptography techniques and then the
Cryptographed image is secured again by performing Least
Significant Bit Steganography on it. The key exchange is
done using Deffie-Hellman technique which is one of the
most secured and trusted technique.
Fig. 15. Decrypted Image using Modified Interrupt Key-AES Cipher FUTURE WORK
decryption. In the future, we plan on improving our code to handle
color message images. The Cryptographic techniques will
EXPERIMENTAL RESULTS
also be combined with other more accurate and secure
TABLE II. IMPORTANT FEATURES OF THE PROPOSED TECHNIQUES Steganographic techniques to provide even tougher
resistance to attacks. We plan on using public key
Algorithms Encryption speed (in ms) Encryption speed (in ms)
cryptography to make key exchange easier.
with input for Modified Vigenère- for Modified Interrupt
image of AES Cipher Key-AES Cipher
size 524288 Steganography: Steganography:
bits REFERENCES
(256 X 256 Workbench 1: Workbench 2: Workbench 1: Workbench 2: [1] Arnab Shaw, Savitha Bhallamudi, “Image Steganography”, 2015
8-bit pixel [2] S. M. Masud Karim, M. S. Rahman and M. I. Hossain, "A new
image) approach for LSB based image steganography using secret key," 14th
1st Run 11678 11456 11876 11324 International Conference on Computer and Information Technology
2nd Run 12889 11851 11988 11591 (ICCIT 2011), Dhaka, 2011, pp. 286-291.
3rd Run 11972 11685 11278 12301
[3] A. Arora, M. P. Singh, P. Thakral and N. Jarwal, "Image
Average 12179.66 11664 11714 11738.667 steganography using enhanced LSB substitution technique," 2016
speed Fourth International Conference on Parallel, Distributed and Grid
Computing (PDGC), Waknaghat, 2016, pp. 386-389.
“Table. II.” Shows the execution times in terms of [4] Champakamala. B. S, Padmini. K, Radhika. D. K Asst Professors,
encryption and decryption of both the techniques. Both the "Least Significant Bit algorithm for image steganography",
techniques don’t have much of a difference in terms of time Department of TCE, IJACT, Vol.3, No. 4.
which concludes that both the algorithms execute within the [5] Federal Information Processing Standards Publications (FIPS 197),
same time frame. Both the workbench used to execute the "Advanced Encryption Standard (AES) ", 26 Nov. 2001.
algorithms in question uses an intel i5 processor. MATLAB [6] J.J. Amador, R. W.Green “Symmetric-Key Block Cipher for Image
coding software was used to display the results and code the and Text Cryptography”: International Journal of Imaging Systems
and Technology, No. 3, 2005, pp. 178-188.
program implementing the techniques in question. AES
algorithm on an average takes 10 seconds to encrypt the [7] A. Ray, A. Potnis, P. Dwivedy, S. Soofi and U. Bhade, "Comparative
study of AES, RSA, genetic, affine transform with XOR operation,
image. Therefore, the modifications such as applying and watermarking for image encryption," 2017 International
Vigenère/MIK ciphers and LSB steganography produces an Conference on Recent Innovations in Signal processing and
average of just a 72-millisecond delay in achieving the output Embedded Systems (RISE), Bhopal, 2017, pp. 274-278.
with much greater encryption performance. [8] H. Cheng, L. Xiaobo, “Partial encryption of compressed images and
videos”, IEEE Trans. Signal Process. 48 (8), 2439–2451, 2000.
[9] Sanjeev Kumar Mandal, A.R Deepti, "A Cryptosystem Based On
Vigenère Cipher By Using Mulitlevel Encryption Scheme", IJCSIT,
Vol. 7 (4), 2016.
[10] Phillip I Wilson, Mario Garcia, "A Modified Version of the Vigenère
Algorithm ", IJCSNS, Vol.6 No.3B, March 2006.
[11] Al-Amin Mohammed Aliyu, Abdulrahman Olaniyan, "Vigenère
Cipher: Trends, Review and Possible Modifications", International
Journal of Computer Applications, Vol. 135 No.11, February 2016.
[12] http://www.cse.unt.edu/~tarau/teaching/PP/NumberTheoretical/Diffi
e–Hellman%20key%20exchange.pdf
[13] S. Kallam, “Di e-Hellman:Key Exchange and Public Key
Cryptosystems”, 2015. [Online] Available:
http://cs.indstate.edu/~skallam/doc.pdf [Accessed: 09- April- 2018]
[14] O.E. Omolara, A.I. Oludare, S.E. Abdulahi, "Developing a
Modified Hybrid Caesar Cipher and Vigenère Cipher for Secure
Data Communication", Computer Engineering and Intelligent
Systems, Vol.5, No.5, 2014.
[15] K. Senthil, K. Prasanthi and R. Rajaram, "A modern avatar of
Julius Ceasar and Vigenère cipher," 2013 IEEE International
Conference on Computational Intelligence and Computing
Research, Enathi, 2013, pp. 1-3.
[16] Ranju S Kartha, Varghese Paul,"Survey: Recent Modifications in
Vigenère Cipher", IOSR Journal of Computer Engineering,
Volume 16, No. 2, PP 49-53