Layers Based Image Steganography Using LSB: Xisting Ystem

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Layers Based Image Steganography using LSB

Sai Kiran Reddy Kadari Aravind Goud. S Dr. D. Krishna


Electronics and Communication Electronics and Communication Electronics and Communication
Engineering Engineering Engineering
Vardhaman College Of Engineering Vardhaman College Of Engineering Vardhaman College Of Engineering
Hyderabad, India. Hyderabad, India. Hyderabad, India.
kadariskr@gmail.com isatturkid@gmail.com dkrishna@vardhaman.com

Abstract—Steganography is that the method of hiding the key Intrusion unless and until sender is the culprit .And Further protection
data inside any sort of digital media. Idea behind stenography is to is given by use of random functions for storing secret data in random
cover the presence of knowledge in any digital medium like audio, locations of the cover image.
video, image, etc. If an individual views the thing during which the
knowledge is hidden inside, he is not going to have any indication II EXISTING SYSTEM
that there's any sort of hidden information. So the person won't try Currently many of Image Steganography models based on LSB are
to decrypt the knowledge. Image Steganography is one of the the most common and efficient algorithm. Least Significant Bit of
methods used for hiding the knowledge within the cover image. the Cover Image is replaced by data which needs to be transmitted
Types of Steganography include Image to image, Text to image. with secrecy. This overwriting algorithm is efficient as it doesn’t
Image to text, Video to voice and Voice to video. during this project reveal the existence of data to intruders. Even though it is the most
we are using Text to Image Steganography. We can use text to efficient algorithm, there are some tools which are used for
image Steganography for several confidential purposes like disclosing Steganography such as steganalysis tools. Addition of
defense information ,secure communication between police and layers gives extra sense of protection to both receiver and sender.
also various matters of national and international importance. In There is no possibility of an intrusion unless and until sender is the
Text to Image Steganography messages are hidden inside a picture culprit or involved in intrusion. Thus, this message gives an edge
by replacing each pixel's least significant bit with the bits of the over other conventional methods for protection purposes.
message to be hidden. Process is by inserting the confidential data
bits in LSB positions of original image i.e. we take binary
representation of the info which must be hidden and overwrite LSB III PROPOSED DESIGN
of every byte within the duvet image. This method is extremely
efficient because it leads to very minor distortions of the image
which is extremely much negligible to human eyes. Encryption Block Diagram
Implementation is completed using Matlab with the assistance of
Graphical User Interface(GUI). Additional to LSB Algorithm,
Length Layer, Message Layer, Password layer and Password are
added to give additional protection to the info which must be
transmitted with secrecy. Data bits hidden into cover image can be
manipulated by use of random functions for location of LSB
Substitution.

Keywords—GUI, LSB, Layers, Information Concealing.

I INTRODUCTION
Image steganography may be a security technique of hiding the In our proposed design we take cover image and secret message
info within the image during a such how that existence of knowledge which needs to be encoded in the image for transmitting with secrecy.
is understood only to sender and receiver i.e. data is hidden to Then we subject them to LSB algorithm for encryption as shown in
others.Here the approach of hiding data within a picture file is Least the above Figure. Before encryption we add layers of length
Significant Bit Substitution. During this method we take binary ,message, password and password key for giving extra sense of
representation of knowledge which must hidden and overwrite LSB protection to both receiver and sender. In normal Steganography
of the each byte within the duvet image.This method leads to very techniques there is chance of intrusion by use of steganalysis tools
minor distortion of the image which is extremely much negligible to .But in this case by addition of layers secret message cannot be
the human eyes.We Prefer LSB over MSB because if We use MSB subjected intrusion unless and until sender is the culprit. So this gives
intensity at pixel value changes which inturn results in change of more protection than conventional methods. Here we use only lsb
visibility.We can see the difference between LSB and MSB algorithm where we replace least significant bits of cover image with
Substitution in the below Figure 1.4.The Human sensory system data which needs to transmitted with secrecy because intensity of
(HVS) cannot detect changes within the colour or intensity of a pixel pixel value doesn’t change much. Thus in turn visibility of image
when the LSB bit is modified. This is often psycho-visual redundancy doesn't change much .Even though there is minor distortion in the
since this will be used as a plus to store information within the bits image but it is not visible to naked eye due to psycho visual
and yet notice no major difference in the image. Additon to the LSB redundancy. After entering layers of length, message, password and
Algorithm conept of layers is being introduced.Even if the intruder or password key and clicking on the OK button in the GUI designed for
hacker tries to get access to the data using steganalysis he will not be this purpose as shown in the below figure. Then an encoded image is
able to discover it .This is because of layers of protection which is generated in the file section .This encoded image is then transmitted
only known to sender and receiver.In this case there is no chance of to receiver where decryption takes place.
IV IMPLEMENTATION DETAILS
Encryption:
Step 1:Run the MATLAB code written for encryption .
Step 2:A Graphical User Interface will be opened as shown in
Encryption GUI Figure where we have to upload the image to be
encoded with secret data.
Step 3:Upload the image using Load Image Button provided on
the Graphical User Interface.
Step 4:After Uploading the image ,Enter the message to encoded
within the image in Text Field Provided in the Graphical User
Interface.
Step 5:Now enter the layer of message length in the provided text
field.
Step 6:Enter the layer of message.
Step 7:Enter the layer for password.
Step 8:Finally enter the password for encryption which is also
Decryption Block Diagram known as key for stego file.
Step 9:After filling all the Layers Click on OK button . (Then an
encode image is generated in the our file section
Decryption:
Step 1: Run the MATLAB code written for decryption.
Step 2: A Graphical User Interface will be opened as shown in
the Decryption GUI Figure Where we have to upload the encoded
image for decoding it.
Step 3: Upload the encoded image by using load button .
Step 4: Enter Layers of Message, length, Password and
Password(key).
In decryption part we subject encoded image to decryption Step 5:After filling all the text-fields click on OK button. (Secret
process where secret message is retrieved from the cover image. Then message will be displayed if all layers and password are correct
we to enter length layer, message layer ,password layer and password
key for retrieving secret data as shown in the below Figure .After
entering the correct layers and password we get the secret message. V RESULTS AND DISCUSSIONS
If password or anyone of the layers is entered wrong then secret
message will not be retrieved by the receiver .In addition upon
entering wrong details a dialog box appears displaying “you have Accuracy plays an important role in this project. The projects
entered wrong password or anyone of the layers”.This gives more with accurate results have more scope in real world for its
protection to secret transmission of the data for confidential purposes. applicability to use.To eliminate misunderstanding between
Thus secret data cannot be subjected to intrusion unless and until sender and receiver and for exact decryption of data we used
sender is involved in the process of intrusion. Decryption GUI is layers along with password(key). The right output is very
shown in the below figure where we have to load the encoded image much important in steganography when used for defense
which needs to be decoded. Then upon entering all the details in the applications or that of national importance. However, there
text field and clicking on OK button we get secret message in the last might be a slight variation in the decoded image but they are
Text Box . negligible. The accuracy of the system can be tested using
some theoretical calculations like peak signal to noise ratio.
Image that is encoded with a secret data is successfully
decoded on the receiver’s end upon entering the correct
layers and password.If any of the layers or password is
entered wrong then secret data is not received.Thus receiver
if genuine must be careful while entering layers and
password.The message encoded in the image is recovered
with full accuracy on receivers even though the size of image
increases.To improve this we can perform compression after
steganography so that there is no change in size of image.
REFERENCES

1 K. Thangadurai and G. Sudha Devi. “An analysis of LSB based image


steganography techniques”. In: International Conference on Computer
Communication and Informatics 4 (2014).
2 C. Nagaraju M. Pavani1 S. Naganjaneyulu. “A Survey on LSB Based
Steganography Methods”. In: International Journal Of Engineering
And Computer Science 2 (2013).
3 C.Cachin. “An Information Theoritical Model For Steganography”. In:
Proc. 2nd Information Hiding workshop 1525 (1998).
4 S.Jajodia N.F Johnson J.Duric. “Information Hiding:Steganography
and Watermarking-attacks and counter measures”. In: Kluwer
Academic Publishers 1 (2000).
5 Lavalee Singh Prateek Yadav Vivek Kumar Sandesh Kumar.
“Implementation of LSB Steganography and its Evaluation for Various
File Formats (LSB, JSTEG)”. In: International Journal of Engineering
Research Technology (IJERT) 2 (2013).
6 Bharat Bhushan Shailender Gupta Ankur Goyal. “Information Hiding
Using Least Significant Bit Steganography and Cryptography”. In:
I.J.Modern Education and Computer Science 6 (2012).
7 Manpreet Kaur Stuti Goel Arun Rana. “A Review of Comparison
Techniques of Image Steganography”. In: IOSR Journal of Electrical
and Electronics Engineering (IOSR-JEEE 6 (2013).
8 Jain.J A.Soni and R.Roshan. “Image steganography using discrete
fractional Fourier transform”. In: Intelligent Systems and Signal
Processing (ISSP), International Conference 2 (2013).
9 Khan.S Akbar.N Johri.P. “Enhancing the Security and Quality of LSB
Based Image Steganography”. In: Computational Intelligence and
Respectively the figures in the anticlockwise show output at Communication Networks (CICN) 1 (2013).
encryption part with GUI, GUI after entering correct details I.e when 10 Tithung.T Das.R. “A novel steganography method for image based on
secret data is retrieved by the receiver and GUI after wrong details. Huffman Encoding”. In: Emerging Trends and Applications in
In first case we have to load the image and enter the message to be Computer Science (NCETACS) 14 (2012).
encoded in the image. Then we have to enter message layer ,length 11 Renuka.A and Kamath.P.R Hemalatha.S Acharya.U.D. “A secure
layer and password layer and password key and then click on OK image steganography technique using Integer Wavelet Transform”. In:
,then an encoded image will be generated in the file section. In Information and Communication Technologies (WICT 2 (2012).
second secret message is retrieved upon entering all details correctly 12 and P.S.Rajeshwari Prabhakaran.G Bhavani.R. “Multi secure and
and then clicking on OK .In the third case upon entering anyone of robustness for medical image based steganography scheme”. In:
Circuits, Power and Computing Technologies (ICCPCT) 1 (2013).
the layers or password wrong then secret message is not retrieved
and a dialog box is displayed showing “you have entered password 13 Chandrashekaran.M Thenmozhi.S. “Novel approach for image
stenography based on integer wavelet transform”. In: Computational
or anyone of the layers as wrong. Intelligence Computing Research (ICCIC 1 (2012).
14 Kumari.A Raja.K.B H.S.Reddy Sathisha.N. “Secure steganography
using hybrid domain technique”. In: Computing Communication
Networking Technologies (ICCCNT 1 (2012).
15 Asad S.E Noura.H and Deforges.O Tattaru R.L Bhattik.D. “Enhanced
Adaptive Data Hiding in Spatial LSB Domain by using Chaotic
Sequences,” in: Intelligent Information Hiding and Multimedia Signal
Processing (IIH-MSP) 5 (2012).
16 Hossain M.L Masud Karim S.M.Rahman. “A new approach for LSB
based image steganography using secret key”. In: Computer and
Information Technology (ICCIT) 3 (2011).
17 Navdeep Dr. Ekta Walia Payal Jain. “Analysis of LSB DCT based
Steganography”. In: Global journal of Computer Science and
Technology 10 (2010).
18 Karen Bailey Kevin Curran. “Evaluation of Image Based
Steganography Methods”. In: International Journal of Digital Evidence
2 (2003). J. Clerk Maxwell, A Treatise on Electricity and Magnetism,
3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.

You might also like