Professional Documents
Culture Documents
Steganography - An Overview of Image Steganography Using LSB Methodology
Steganography - An Overview of Image Steganography Using LSB Methodology
LSB Methodology
S. Kaviseshan1, M. Thushitharan
1
Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe; 2 Faculty of Computing, Sri Lanka Institute of Information
Technology, Malabe
ABSTRACT
Steganography is a new growing technology in cyber security to protect secret or sensitive information from malicious
users. Early days we used encryptions and decryptions to protect sensitive information. Now a days steganography is the
latest technology to hide information. We can hide the secret information in the non-secret or ordinary files. And this
secret message will be got in the destination. By using steganography without any idea, we can send the secret message to
the receiver. We can send the secret messages in normal files like word or excel files or we can attach our secret message
in picture, and we can send it to the destination, and he also can get the secret message from that image. We have
developed a steganography tool for Information Security Project module. By using this tool, we can hide the secret
message within the “.png” type digital images and we can send that image with secret message, and we can use this tool
and we can separately find the secret message by using that tool. To hide secret message inside the image we use a function
call Encode and we have used a function call Decode to get the secret message from the image in that tool. When we
decode the secret message from the image it will show the base 64 encoded form and we can use online decode tools and
we can get the original form and this tool will run on both Linux and Windows environments.
INDEX TERMS:
Steganography, encryption, decryption, encode, decode, base64, security, LSB, Pixel, value, binary.
1. INTRODUCTION and protection for sending secret message than using only
Now a days cyber security is the most talking topic in the steganography and using Cryptography alone.
world. And Information is the most valuable asset in To develop this Steganography tool, we have use python
everywhere. To protect information from cyber threats, language and Linux operating System Environment and later
cyber security specialists are working on it. The basic of on it we have applied it in Windows environments, and it
information protection is came from the encryptions and succussed in Windows environment also. Now this tool will
decryptions. Here we changed our clear text to cipher text work on both Linux and Windows environment. By using
(encrypted text) by using encryption key then send it to the this tool, we can hide the secret message in the particular
receiver and then they will decrypt the cipher text by using image or picture, and we can get the secr3et message in the
the key. This methodology developed and now it is in its new base 64 format by decode the picture. After getting the secret
evolution that is Steganography. message in the base 64 format we can decode the message by
Steganography is a new technology to transfer or hide using the online tools. After hide the message in the picture
secret message inside the non-secret files or ordinary files. By in this tool and we can send the image through Email,
hiding secret or sensitive information in non-secret or WhatsApp and Receiver can decode the secret message by
ordinary file attackers or others do not get doubt, or they do using this tool. When it comes to WhatsApp, we have to send
not get any idea of it. We can send our secret message by the image as document file only it will work. If we send as
using this steganography technology. For the ordinary file we image WhatsApp will remove the meta data from it because
can use a simple picture or images or video file or audio file. of its security architecture. So, if we send in WhatsApp as
We hide the secret message, and we can send the picture to image, we can get the secret message. We can develop this
the particular person and that person can get the secret tool more secure in feature with cryptographical functions.
message from that image. By using steganography tools and It will provide more security to the secret message
we can hide the secret message in the ordinary files and send transactions.
to the receiver and receiver can get the secret message from
that steganography tools. Cryptography and steganography A. Cryptography
are different functions and when we combined both Cryptography is the technology that is used to protect
Cryptography and steganography it will give more security information from the cyber-attacks. Basically, it changes the
information or data to another format, and it is help to
2 M. THUSHITHARAN, S. KAVISESHAN: STEGANOGRAPHY – AN OVERVIEW OF IMAGE STEGANOGRAPHY USING LSB METHODOLOGY.
protect the Confidentiality, Integrity and the Reputation of C. Disadvantages of LSB Steganography
the information. Cryptography use many methods to protect Less Robust, there are high chance to loss the hidden data
information like Symmetric encryption, Asymmetric with a minor image manipulation. Hidden message can be
encryptions, Hashing and it using Steganography is the latest easily destroyed by simple attacks.
methodology to protect secret information that used to hide
secret message in non-secret files or in the ordinary files. D. How LSB Steganography works
We can describe a digital image as a finite set of digital
B. Steganography values, called pixels. Pixels are the smallest individual
Steganography is the lattes trend in Cryptography which element of an image, holding values that represent the
needs to be hide secret information in the non-secret files or brightness of a given color at any specific point. So we can
ordinary files. And get the message back to the users. Here think of an image as a matrix (or a two-dimensional array)
we can embed secret message in the non-secret file, or it can of pixels which contains a fixed number of rows and
hide scripts and it can make harm to the receiver also. columns. Least Significant Bit (LSB) is a technique in which
The importance of steganography is to hide the secret the last bit of each pixel is modified and replaced with the
message in the normal or ordinary files or non-secret files. secret message’s data bit.
This is a type of covert communication, and this can involve
with the use of medium of hiding secret message in files. And
this is not using a function of cryptography because it does
not change the form of the secret message which is hided
inside the files. And this is not using any keys or functions
for encryptions. This a data hiding, and it can be executed in
cleaver ways.
function called and the RGB values of the pixel assigned to encoded text value. For a security purpose we didn’t want to
the r,g,b variables as binary format. Then the function print the secret message directly in a plain text. So, we added
removes the LSBs of every pixel value of the color until the an extra protection base64 encoding facility. It will give the
secret message’s binary value’s count. base64 encoded output of the secret message. And it will
create an extra .txt file with the name of the encoded image.
This listPngFiles() function has written for list the .png files
from the same folder. This doesn’t concern about the security
This encodeText() function get the image, secret message, part of the product. This function has written for find the OS
encoded image name from the user and it will create a new platform and execute the listing command of the operating
image file. system. First it will check whether the system is windows or
not. If it is windows, it will execute the “dir *.png” command
which is used to list the png files in windows platform. Or
else if it is linux platform, it will execute the “ls -a *.png”
command which is used to list the png files in linux
platforms.
as 4, the program will be quit. Further more this function India., 22 February 2019.
contains some validations. If we give any number than
1,2,3,4 , it will throw a warning that tells us to enter the 3. CIOReview, “How SDN and IoT are impacting the
Healthcare Sector” [Online]. Available:
correct value. If we give alphabet or non-number value, it will
https://www.cioreview.com/news/how-sdn-and-iot-are-
throe a warning to enter the correct option value. impacting-the-healthcare-sector-nid-33576-cid-147.html.
[Accessed: 03- April- 2022].
G. Best Security Practices for IoT in Healthcare
Maybe the most difficult aspect of modernizing historical
technologies is ensuring that the infrastructure is secure and
impermeable 8. AUTHOR
4. FUTURE RESEARCH
The Internet of Medical Things (IoMT) is predicted to grow
rapidly in the coming years due to its ability to enhance
patient.
5. CONCLUSION
Usage of IoT devices is very important for current digital era.
Nowadays, many systems have become smarter with the use
of IoT devices.
6. ACKNOWLEDGEMENT
A researcher can get a lot of understandings about the usage
of IoT in healthcare with the emphasis of SDN and the cyber
security threats on healthcare in IoT by making a review
article. I would like to express my gratitude to my Applied
Information Assurance module lecturers and instructors,
senior students, and friends for guiding and encouraging me
in finishing this review paper within the given time. In
addition, I would like to thank for the tech youtubers and
tech bloggers and external security researchers for the help
they offered through their videos, articles, and blogs.
7. REFERENCE
1. “Internet of Things” [Online]. Available:
https://en.wikipedia.org/wiki/Internet_of_things.
[Accessed: 03- April- 2022].