1901
ISSN 2321 3361 © 2016 IJESC
Abstract:
Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a
better way of securing message than cryptography which only conceals the content of the message not the existence of the
message. Combining secret image with the carrier image gives the hidden image. The resultant image so formed is called as a stego
image which just looks like the original image but sometimes during the usage of various methods or algorithms the stego image
produced can have some differences like increase or decrease in the number of colors, repetitive patterns or difference in the file
size between the stego-image and the cover image. The stego image can be then tested by any unauthorized user and he/she can
easily retrieve the confidential information. The most popular technique used to detect the steganography is known as Steganalysis.
Steganalysis is used to analyze the chances of the image being detected. This technique will further help us to analyze the
performance of various algorithms in the field of steganography. Various Parameters i.e. average values in RS Analysis, average
values in Sample Pair Analysis, Mean squared error, PSNR(Peak signal to noise ratio) values will be evaluated and this will
help us in knowing which one is the best algorithm.
1. INTRODUCTION
Steganography is the art of hiding information and an effort to For example, when a secret message is hidden within a cover
conceal the existence of the embedded information. In image, the resulting product is a stego-image. A possible
steganography, the possible cover carriers are innocent looking formula of the process may be represented as: cover medium +
carriers (images, audio, video, text, or some other digitally embedded message + stego key = stego-medium
representative code) which will hold the hidden information.
A message is the information hidden and may be plaintext,2. PRINCIPLE OF STEGANOGRAPHY
cipher text, images, or anything that can be embedded into a bit The secret message is embedded inside the cover object in
stream. Together the cover carrier and the embedded message encrypted format by using a hiding algorithm and it is sent to a
create a stego-carrier. receiver over a network.
Hiding information may require a stego key which is additional The receiver then decrypted the message by applying the
secret information, such as a password, required for embedding reverse process on the cover data.
the information.
Fig 2.1
International Journal of Engineering Science and Computing, July 2016 8134 http://ijesc.org/
3. FUNDAMENTALS OF STEGANOGRAPHY These ranges may be quantified in several different
ways:
Three fundamental steganographic systems are defined: From 0 to 1, with any fractional value in between. This
a pure steganographic system, a secret key representation is used in theoretical analyses, and in
steganographic system, and a public key steganographic systems that use floating point representations.
system. In pure steganography, no keys are needed for Each color component value can also be written as
the communicating parties other than the embedding a percentage, from 0% to 100%.
and extracting algorithms. In computers, the component values are often stored
as integer numbers in the range 0 to 255, the range that a
While pure steganography does not involve the use or single 8-bit byte can offer. These are often represented
exchange of any secret information such as stego-keys, as either decimal or hexadecimal numbers.
both secret key steganography and public key High-end digital image equipment are often able to deal
steganography rely on the sharing of such keys. In a with larger integer ranges for each primary color, such
secret key steganographic system, a sender hides a as 0..1023 (10 bits), 0..65535 (16 bits) or even larger, by
secret message into a cover object using a secret key. extending the 24-bits (three 8-bit values) to 32-bit, 48-
The key used in the embedding process can also be used bit, or 64-bit units (more or less independent from the
to reverse the process in order to extract the hidden data. particular computer's word size).
In this steganographic system, it is assumed that the For example, brightest saturated red is written in the
communicating parties are able to transmit secret keys different RGB notations as:
over a secure channel. Finally, public key
steganography models after public key cryptography. Notation RGB triplet
Arithmetic (1.0, 0.0, 0.0)
4. RGB COLOR MODEL
Percentage (100%, 0%, 0%)
The RGB color model is an additive color model in (255, 0, 0) or
which red, green, and blue light are added together in Digital 8-bit per sometimes
various ways to reproduce a broad array of colors. channel #FF0000
The size of an image can be given in pixels, for (hexadecimal)
example an image which is 640 x 480 pixels contains
307,200 pixels. Each pixel is generally stored as 24-bit Digital 16-bit per
(65535, 0, 0)
or 8-bit. A 24-bit pixel has a possibility of 224 color channel
combination. The 24 bits of a 24-bit image are spread
over three bytes and each byte represents red, green and Table 1 RGB Notations
blue respectively.
5. STEGANALYSIS
STEGANALYSIS TECHNIQUES
International Journal of Engineering Science and Computing, July 2016 8135 http://ijesc.org/
Analyzing repetitive patterns may reveal the suitable than LSB modifications in case a lossy
identification of a steganography tool or hidden compression algorithm like JPEG is being used.
information. To inspect these patterns an approach is to
compare the original cover image with the stego image 7.2 Least Significant Bit Hiding (LSB) Method:
and note visible differences.
It is the most widely used technique for image
This is called a known-carrier attack. By comparing embedding. This method became very popular due to its
numerous images it is possible that patterns emerge as easy implementation. It embeds data in a cover image
signatures to a steganography tool. by replacing the least significant bits (LSB) of cover
image with most significant bits (MSB) of message
Another visual clue to the presence of hidden image.
information is padding or cropping of an image. With
some stego tools if an image does not fit into a fixed An image is represented as a collection of pixels. Each
size pixel is represented by 8 bits. Consider a pixel which is
It is cropped or padded with black spaces. There may represented as 0110 1010. Among these 8 bits, the bits
also be a difference in the file size between the stego- on the left side [0110] are known as MSB and the bits
image and the cover image. Another indicator is a large on the right side [1010] are known as LSB. Replacing
increase or decrease in the number of unique colors, or the MSB with secret message will have noticeable
colors in a palette which increase incrementally rather impact on color. However, replacing the LSB will not
than randomly be noticeable to the human eye.
6.3. Tools to detect Steganography It produces high number of near duplicate colors.
Human being can detect 6 or 7 bits of color, whereas
The disabling or removal of hidden information in radiologists can detect 8 or more bits of color.
images is dependent on the image processing
techniques. For example, with LSB methods of inserting This method needs proper cover image to hide secret
data, simply compressing the image using lossy message. This method may use either 8 bit image or 24
compression is enough to disable or remove the hidden bit image as a cover image. Each image has its own
message advantages and disadvantages.
There are several available steganographic detection When it uses 24 bit color image, large amount of space
tools such as Encase by Guidance Software etc. is needed to hide secret messages. It needs 24 bits (3
bytes) to represent each pixel. Among the 24 bits 3 bits
7. Techniques in Image Steganography (1 bit from each byte) are used to represent red, green,
There are numerous methods used in image blue color respectively. Consider the following grid that
steganography each of this method can be applied and represents the 3 pixels of a 24 bit color image
they have different degree of success, discussed below
are they methods: (01101001 11010100 11010001)
International Journal of Engineering Science and Computing, July 2016 8136 http://ijesc.org/
really easy to read off the least significant bits. It also
Hence the message is hidden successfully. But it needs isn't very smart - if the message doesn't completely fill
large amount of space [72 bits to hide 8 bits] for up the possible space then just the top part of the image
embedding. LSB may also use 8 bit image as a cover is degraded but the bottom is left unchanged - making it
image. Even it needs smaller space to hide data, it easy to tell what's been changed.
requires a careful approach.
8.2 HIDE SEEK
Because it needs one byte to represent a pixel, changing
the LSB of that byte will be resulting a visible changing This algorithm randomly distributes the message across
of color. The changes will be noticeable by human eye. the image. It is named after "Hide and Seek" - a
Human eye cannot differentiate grey values as easy as Windows 95 steganography tool that uses a similar
with different colors. Gray scale images are preferred technique. It uses a password to generate a random seed,
than color images. then uses this seed to pick the first position to hide in. It
continues to randomly generate positions until it has
Another important aspect is the selection of finished hiding the message.
compression technique. While using the lossy
compression algorithm, the hidden information might be It's a little bit smarter about how it hides because you
lost during decompression. have to try every combination of pixels in every order to
try and "crack" the algorithm - unless you have the
Hence, it is necessary for the LSB method to use password.
lossless compression. The Properties of LSB embedding
are: 8.3 FILTER FIRST
1. LSB is a simplest method for embedding secret This algorithm filters the image using one of the inbuilt
information into images. filters and then hides in the highest filter values first.
2. Embedding data into least significant bit will not be
perceived by the human eye. Hence the stego image It is essentially a fancier version of Blind Hide as it
looks like cover image. doesn't require a password to retrieve the message.
3. But slight image manipulation is vulnerable for cover Because we are changing the pixels we need to be
images. careful about filtering the picture because we don't want
4. Conversion from GIF or BMP to JPEG and back to use information for filtering that might change.
destroy the hidden information in LSB.
5. Statistical analysis with the stego images leads to the If we do, then it may be difficult (if not impossible) to
suspicion about the hidden data. retrieve the message again.
6. As ‘N’ ( no of bits to be replaced) increases,hiding
capacity increases but the appearance of the image So this algorithm filters the most significant bits, and
degrades. leaves the least significant bits to be changed.
Though LSB is simplest and easiest method for It is less noticeable on an image because using the filter
embedding data into images, when more number of ensures we are hiding in the parts of the image that are
information is hidden, the appearance of image the least noticeable.
degrades. Statistical analysis of the stego image leads to
the suspicion of hidden information. 8.4 BATTLE STEG
8. ALGORITHMS USED IN STEGANOGRAPHY The best of all this algorithm performs "Battleship
There are seven algorithms currently implemented, each Steganography". It first filters the image then uses the
use least significant bit steganography and some filter highest filter values as "ships". The algorithm then
the image first. randomly "shoots" at the image (like in Hide Seek) and
when it finds a "ship" it clusters it's shots around that hit
8.1 BLINDHIDE: in the hope of "sinking" the "ship".
This is the simplest way to hide information in an
image. It blindly hides because it just starts at the top After a while it moves away to look for other ships. The
left corner of the image and works it's way across the effect this has is that the message is randomly hidden,
image (then down - in scan lines) pixel by pixel. As it but often hidden in the "best" parts to hide in thanks to
goes along it changes the least significant bits of the the ships.
pixel colors to match the message.
To decode the process the least significant bits starting
at the top left are read off. This is not very secure - it's
International Journal of Engineering Science and Computing, July 2016 8137 http://ijesc.org/
It moves away to look for other ships so that we don't the original algorithms because the order of pixels kept
degrade an area of an image too greatly. It is secure in the dynamic array is not exactly the same
because you need a password to retrieve the message.
8.8 SLSB
8.5 DYNAMIC BATTLESTEG This algorithm filters the cover image by using a default
This algorithm do the same as Battle Steg except it use filter and hides information in those areas that get a
dynamic programming to make the hiding process faster better rate. The filter is applied to the most significant
and less memory intensive. It is NOT compatible with bits of every pixel, leaving the less significant to hide
the original algorithms because the order of pixels kept information.
in the dynamic array is not exactly the same.
The filter ensures the choice of areas of the image in the
8.6 DYNAMIC FILTERFIRST least impact with the inclusion of information, which
This algorithm do the same as Filter first except it use affects a greater difficulty of detecting the presence of
dynamic programming to make the hiding process faster hidden messages.
and less memory intensive. It is NOT compatible with
International Journal of Engineering Science and Computing, July 2016 8138 http://ijesc.org/
The higher the increment of original image RGB 6.3. PSNR RATIO
content the more likely the embedded message can be This is the ratio between power and corrupting noise
retrieved or noticed…. that corrupts the representation of image .Higher is the
value, better is the quality of image.
So, the best algorithm will be the one which will
produce less increment in RGB content as compared to 6.4. MEAN SQUARED ERROR (MSE)
original image…… This indicates the degree of similarity or differences
between two images. Lesser the mean square value of
6.2. SAMPLE PAIR ANALYSIS an image better is the quality and less distortion from
Sample Pairs Analysis utilizes finite state machines to original.
classify groups of pixels modified by a given pattern. Here is the table showing the RS analysis as well as
Sample Analysis on all the seven algorithms .The
Both Steganalysis techniques are very accurate at values of original image is also given……..
predicting the embedding rate on stego-images using
least significant bit embedding.
International Journal of Engineering Science and Computing, July 2016 8139 http://ijesc.org/
Furthermore when analyzed……We get all the 3 is for Filter First algorithm
values for sample pair analysis as well as PSNR ratio 4 is for Hide seek algorithm
and mean squared error….here are the graphs that 5 is for Battle Steg algorithm
easily represent the minimizing and maximizing 6 is for Dynamic Battle Steg algorithm
values….On the X-AXIS the numbering from 1 to 7 7 is for Dynamic Filter First algorithm
depicts the following algorithms…… Here are the graphs of the parameters showing the
1 is for SLSB algorithm. performances of all the algorithms…..
2 is for Blind hide algorithm
a) RS Analysis
International Journal of Engineering Science and Computing, July 2016 8140 http://ijesc.org/
c) PSNR values
d) MSE values
For you to know that this image has a hidden data you
7. The flow of the system do a Steganalysis using a tool comparing the RS
Basically what happens here is that a plain image that analysis or sample pair data of the original image and
does not contain any hidden data is been embedded with the stego-image.
a secret data (this can be either image or text) using a You will notice a change in the RGB percentage of the
Steganography studio, after embedding the data the image with higher RGB from the original image is
image now becomes a stego-image. normal the now with hidden data.
International Journal of Engineering Science and Computing, July 2016 8141 http://ijesc.org/
Fig 9.1
We will recommend for Steganography because it 3. Kevin Curran, “An Evaluation of Image Based
produced little increment in RGB (red, green and blue Steganography Methods” International Journal of
colors) compared to that of the original image in both Digital Evidence Fall 2003, Volume 2, Issue 2
the analysis and it has highest PSNR value (85.75) and
lowest mean square error as shown in the graphs. 4. Mr. Falesh M. Shelke, “Comparison of different
Though some other algorithms also produce lowest techniques for Steganography in images” International
MSE values but they failed on another parameters and Journal of Application or Innovation in Engineering &
SLSB gives the best performance among all……it Management Volume 3, Issue 2, February 2014
means that:
Less increment in RGB means SLSB will us an image 5. Sangeeta Dhal , “An In-depth Analysis of Various
without any noisy distortion…. Steganography Techniques” International Journal of
PSNR is high means the visual quality of the stego Security and Its Applications Vol.9, No.8 (2015), pp.67-
image will be very clear….. 94
So SLSB is concluded as the best algorithms among
all…… 6. Pooja Raw at, “Advanced Image Steganographic
9. FUTURE SCOPE Algorithms and Breaking strategies” International
From my findings there is growing interest in Journal of Computer Applications® (IJCA) (0975 –
Steganography due to the fact that communication over 8887)
the internet has out grown the way it used to be in the
last century. The fact that Steganography fully supports
International Journal of Engineering Science and Computing, July 2016 8142 http://ijesc.org/
7. Kavita Kadam, “Steganography Using Least Significant
Bit Algorithm” International Journal of Engineering
Research and Applications (IJERA) Vol. 2, Issue 3,
May-Jun 2012, pp. 338-341
International Journal of Engineering Science and Computing, July 2016 8143 http://ijesc.org/