StegCure: a comprehensive steganographic tool using enhanced LSB scheme

Protected and encrypted data sent electronically is vulnerable to various attacks such as spyware and attempts in breaking and revealing the data. Thus, steganography was introduced to conceal a secret message into an unsuspicious cover medium so that it can be sent safely through a public communication channel. Suspicion becomes the significant key determinant in the field of steganography. In other words, an efficient stegnographic algorithm will not cause any suspicion after the hidden data is embedded. This paper presents an overview of steganography on GIF image format in order to explore the potential of GIF in information hiding research. A platform, namely StegCure is proposed by using an amalgamation of three different Least Significant Bit (LSB) insertion algorithms that is able to perform steganographic methods. This paper explains about the enhancement of the Least Significant Bits (LSB) insertion techniques from the most basic and conventional 1 bit to the LSB colour cycle method. Various kinds of existing steganographic methods are discussed and some inherent problems are highlighted along with some issues on existing solutions. In comparison with the other data hiding applications, StegCure is a more comprehensive security utility where it offers user-friendly functionality with interactive graphic user interface and integrated navigation capabilities. Furthermore, in order to sustain a higher level of security, StegCure has implemented a Public Key Infrastructure (PKI) mechanism at both sender and receiver sites. With this feature, StegCure manages to restrict any unauthorized user from retrieving the secret message through trial and error. Besides, we also highlight a few aspects in LSB methods on image steganography. At the end of the paper, the evaluation results of the hybrid method in StegCure are presented. The future work will be focused in assimilation of more diversified methods into a whole gamut of steganography systems and its robustness towards steganalysis.

[1]  Z.C. Ji,et al.  A New Algorithm of Steganography based on Palette Image , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.

[2]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[3]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[4]  Eugene Hecht,et al.  Optics, 2nd Edition , 1987 .

[5]  Cormac Herley,et al.  KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[6]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[7]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[8]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[9]  Peter Wayner,et al.  Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .

[10]  Julian E. Boggess,et al.  Compression of color information in digitized images using an artificial neural network , 1994, Proceedings of National Aerospace and Electronics Conference (NAECON'94).

[11]  Y.P. Huang,et al.  The Assessment System of Human Visual Spectral Sensitivity Curve by Frequency Modulated Light , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[12]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[13]  Stefan Katzenbeisser,et al.  Hiding Techniques for Steganog - raphy and Digital Watermarking , 2000 .

[14]  Abraham Lempel,et al.  Compression of individual sequences via variable-rate coding , 1978, IEEE Trans. Inf. Theory.

[15]  Der-Chyuan Lou,et al.  Steganographic Method for Secure Communications , 2002, Comput. Secur..

[16]  John Kadvany,et al.  Positional Value and Linguistic Recursion , 2007 .

[17]  Roshidi Din,et al.  The capability of image in hiding a secret message , 2006 .

[18]  Andrew D. Ker Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.

[19]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[20]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[21]  Mohammad Shirali Shahreza An improved method for steganography on mobile phone , 2005 .

[22]  N. Memon,et al.  Transcoding GIF images to JPEG-LS , 1997 .

[23]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.

[24]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[25]  Julie K. Petersen Telecommunications Illustrated Dictionary , 2002 .

[26]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[27]  Lip Yee Por,et al.  WhiteSteg: a new scheme in information hiding using text steganography , 2008 .