A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key

Abstract: - Steganography is a system that hides information in an application cover carrier like image, text, audio, and video. Considerable amount of work has been carried out by different researchers on this subject. Least Significant Bit (LSB) insertion method was more suspicious and low robustness against attacks. The objectives of this study were to analyse various existing system and implement a dynamic substitution based Image Steganography (IS) with a secret key. Our proposed method is more difficult to attack because of message bits are not inserted in to the fixed position. In our method, the message bits are embedded into deeper layer depending on the environment of the host image and a secret key resulting increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message. Keywords: - I-security, Steganpgraphy, secret key, secure transmission I. INTRODUCTION It is the study of techniques for hiding the existence of a secondary message in the presence of a primary message. The primary message is referred to as the carrier signal or message; the secondary message is referred to as the payload signal or message. The word steganography is derived from the Greek words ‘stegos’ meaning ‘cover’ and ‘grafia’ meaning ‘writing’ [1] defining it as ‘covered writing'. IS means information hidden exclusively inside an image. The main difference between steganography and cryptography is cryptography hide the content of the message and steganography focuses on keeping the existence of a message secret [2]. If there are more similarities between the cover image and the stego-image, it will be harder for an attacker to find out that the stego-image has important secret data hidden inside it. In recent years, enormous research efforts have been invested in the development of digital IS techniques. In this paper, we have proposed a dynamic approach of substitution in IS where message will be embedded depending on the environment of the host image and a secret key not on the fixed position and also adjust a near bit to improve the quality of the image. It becomes more important as more people join the cyberspace revolution. Privacy and anonymity is a concern for most people on the internet. IS allows for two parties to communicate secretly and covertly. It allows for copyright protection on digital files using the message as a digital watermark. One of the other main uses for image steganography is for the transportation of high-level or top-secret documents between international governments. While it has many legitimate uses, it can also be quite nefarious. It can be used by hackers to send viruses and Trojans to compromise machines, and also by terrorists and other organizations that rely on covert operations to communicate secretly and safely. Military communications system make increasing use of traffic security technique which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. So we prepare and implement it for efficient and secured information transformation. The objectives of the study are to analyse various existing system and implement a dynamic substitution based image steganography with a secret key. This paper has been organized as literature review, proposed work, experiment result following by discussion and conclusion.

[1]  Mohammed Abbas Fadhil Al-Husainy Message Segmentation to Enhance the Security of LSB Image Steganography , 2012 .

[2]  N. Hamid,et al.  Image Steganography Techniques : An Overview , 2012 .

[3]  Dinesh Garg,et al.  A New Purposed Issue for Secure Image Steganography Technique Based On 2-D Block DCT and DCT , 2012 .

[4]  N. Santoshi,et al.  A Secure and Lossless Adaptive Image Steganography with Mod-4 LSB Replacement Methods Using Image Contrast , 2012 .

[5]  Min-Shiang Hwang,et al.  Steganography Based on Payload Transformation , 2011 .

[6]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[7]  Meenu Kumari,et al.  JPEG Compression Steganography & Crypography Using Image-Adaptation Technique , 2010 .

[8]  C. Stanley,et al.  Pairs of Values and the Chi-squared Attack , 2005 .

[9]  Niels Provos,et al.  Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.

[10]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[11]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[12]  Atallah M. Al-Shatnawi A New Method in Image Steganography with Improved Image Quality , 2012 .

[13]  Cheng-Hsing Yang,et al.  Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..

[14]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[15]  Suman goyat,et al.  A Novel Technique Used For Image Steganography Based On Frequency Domain , 2012 .

[16]  Aarti Kochhar,et al.  Transform Domain Analysis of Image Steganography , 2013 .

[17]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[18]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[19]  R. Akila,et al.  A Comparative Analysis of Image Steganography , 2010 .

[20]  Ramanpreet Kaur,et al.  A Comparative Study of Combination of Different Bit Positions , 2012 .

[21]  Saurabh Singh,et al.  Use of image to secure text message with the help of LSB replacement , 2010 .

[22]  Ki-Ryong Kwon,et al.  An Image Steganography Using Pixel Characteristics , 2005, CIS.

[23]  Sarbjeet Singh,et al.  A Proposed Method for Image Steganography Using Edge Detection , 2013 .

[24]  Jagvinder Kaur,et al.  Study and Analysis of Various Image Steganography Techniques , .

[25]  S. Ramakrishnan,et al.  An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image , 2014, Int. J. Netw. Secur..

[26]  C. Nagaraju,et al.  A NOVEL INFORMATION HIDING TECHNIQUE FOR SECURITY BY USING IMAGE STEGANOGRAPHY , 2009 .

[27]  Alisha Arora,et al.  IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .

[28]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[29]  Kevin Curran,et al.  Biometric Inspired Digital Image Steganography , 2008, 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008).

[30]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[31]  Nitin Jain,et al.  Image Steganography Using LSB and Edge - Detection Technique , 2012 .

[32]  Namita Tiwari,et al.  Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , 2010 .

[33]  G. Sravanthi,et al.  A S patial Domain Image Steganography Technique Based on Plane Bit Substitution Method , 2012 .

[34]  Nidhi Image steganography using least significant bit with cryptography , 2015 .

[35]  Yuji Iwahori,et al.  Application Of Fuzzy Theory To Writer Recognition Of Chinese Characters , 1998 .

[36]  J. Shanbehzadeh,et al.  High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm , 2011 .