• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. Research Journal of Information Technology
  2. Vol 5 (3), 2013
  3. 456-461
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 456-461
crossmark

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
Research Article

An Efficient Steganographic Method by using Image Fragments With High Security

B. Elangovan and S. Mohana

ABSTRACT


Picture quality and undetectability are the key aspects of steganography. In this study, the proposed framework uses a novel approach to enhance the steganographic scheme with optimized picture quality and higher anti-steganalysis capability. To achieve this, the secret image is hidden in the carrier image by creating layers in Stegoimage. Differing from previous works, this method retains the quality of the carrier image and it doesn’t depend on the size of the carrier image and shows better imperceptibility. To abate to the damage in the reconstructed carrier image, the secret image is divided into two segments, one with odd bytes and the other with even bytes. These are embedded into the carrier image in the form of layers rather than embedding it on the carrier image itself. A pass-key is used for security purpose. This is done after pointing out the related approaches and then highlighting this model’s contributions with respect to the embedding and extraction processes.
PDF Abstract XML References Citation
Received: April 29, 2013;   Accepted: June 17, 2013;   Published: August 06, 2013

How to cite this article

B. Elangovan and S. Mohana, 2013. An Efficient Steganographic Method by using Image Fragments With High Security. Research Journal of Information Technology, 5: 456-461.

URL: https://scialert.net/abstract/?doi=rjit.2013.456.461

Search


INTRODUCTION


A steganographic system conceals secret data in a carrier image so as not to arouse a suspicion apart from the sender and receiver. According to Stefan and Fabin (2000), Steganography is secret way of communicating by hiding the existence of communication itself. Cryptograohy is the well known cousin of steganography where the message is scrambled to prevent the message from hackers (Salem et al., 2011; Amirtharajan et al., 2011, 2012).

In the present digital world, a steganographic system keeps the presence of secret data imperceptible (Amirtharajan and Rayappan, 2012a-d; Cheddad et al., 2010; Janakiraman et al., 2012a, b). But steganographic system tends to be detectable in the cover medium. Even if secret data is not detected, the existence of it modifies the carrier image’s statistical properties. This leads to eavesdroppers to easily identify the changes in the properties of Stegoimage (Amirtharajan et al., 2012).

This study introduces a new steganographic system of hiding the secret data with higher anti-steganalysis capability by adding the fragmented data files of secret image as layers to the carrier image.

RELATED WORK

In steganography, embedding the secret bits in the redundant bits of the stego object and transmits as a carrier image (Karthikeyan et al., 2012; Padmaa et al., 2011; Rajagopalan et al., 2012; Thanikaiselvan et al., 2011; Thenmozhi et al., 2012). Presently, most of the steganographic processes depend on the size of the carrier image. Thus a large sized secret data cannot be embedded in a carrier image of smaller size. Moreover there are chances for the carrier image to overflow when certain crypto algorithms are used during encryption. In such cases, a part of the secret image will be lost.

Considering these as the barriers in steganographic system this proposed model overcomes these difficulties.

PROPOSED WORK

As told earlier this idea mainly focuses on undetectability. So this framework begins by splitting the secret image into two segments of odd and even bytes. These are embedded into the carrier image in layers sequentially along with the encrypted text. This forms the Stegoimage. This is sent to the receiver. The receiver first isolates the carrier image and the hidden data (two segments of hidden image and encrypted text). Then the receiver uses the pass-key and retrieves the original hidden image and plain text from the encrypted text. The detailed implementation of this idea is as follows.

HIDING PROCESS

The sender first loads the secret image. This image is divided into two segments. The first segment consists of all the odd bytes and the second segment consists of all the even bytes. These are stored as separate data files. Then the binary data of the carrier image that is selected is followed by the sentinel string which is used to distinguish the carrier image from the rest of the layers. Then the above two data files are embedded sequentially with pass-key as the delimiter between them. This pass-key is also used to encrypt the text using Data Encryption Standard. This encrypted text is also embedded into the carrier image. Thus the Stegoimage consists of carrier image followed by a sentinel string which separates the carrier image from rest of the layers. This sentinel string is followed by the odd bytes data file, the even bytes data file and the encrypted text being embedded sequentially in layers with pass-key as the delimiter. This Stegoimage is sent to the receiver. The implementation of hiding process is presented in the form of an algorithm as follows.

Hiding algorithm:
Image for - An Efficient Steganographic Method by using Image Fragments With High Security

RETRIEVING PROCESS

The receiver loads the Stegoimage after which the receiver isolates the carrier image and the hidden data (secret image and encrypted text) with sentinel string as the delimiter. From this hidden data the receiver extracts the (1) odd bytes data (2) even bytes data (3) encrypted text separately by using pass-key as the delimiter. The retrieving process is carried out only if the receiver’s pass-key matches with the pass-key in the Stegoimage. Then the hidden image is formed by merging the odd byte file and even byte file alternatively. Finally the encrypted text is decrypted by using Data Encryption Standard algorithm with pass-key.

Retrieving algorithm
Image for - An Efficient Steganographic Method by using Image Fragments With High Security

ALGORITHM IMPLEMENTATION

As an implementation of the hiding process, Fig. 1 acts as the secret image which is segmented into two data files (Oj(S)-odd bytes and Ek (S)-even bytes). Figure 2 acts as the carrier image (C) which will be loaded with two data files Oj (S) and Ek (S) and the encrypted form of text to be hidden using pass-key. This process produce the StegoImage C'.

In Fig. 3, the process of hiding secret image and the text with Carrier Image is shown.

The retrieving process loads the Stegoimage C' and checks the pass-key with the hidden data, if it matches, it extracts the secret image (Si) and the decrypted text.

In Fig. 4 the process of extracting the secret image (Fig. 5) and the hidden text with the use of correct pass-key (Pk) is shown.

Image for - An Efficient Steganographic Method by using Image Fragments With High Security
Fig. 1: Sample secret image (Si) to be segmented into two data files

Image for - An Efficient Steganographic Method by using Image Fragments With High Security
Fig. 2: Sample carrier image (C) which will be loaded with two data files

Image for - An Efficient Steganographic Method by using Image Fragments With High Security
Fig. 3: Hiding secret image and Text in a carrier image

Image for - An Efficient Steganographic Method by using Image Fragments With High Security
Fig. 4: Retrieving secret image and text from carrier image

Image for - An Efficient Steganographic Method by using Image Fragments With High Security
Fig. 5: Retrieved secret image from the carrier image

CONCLUSION


This study introduces a new steganographic system of hiding the secret data with high security. This is ensured by dividing the secret image into two segments. Moreover, this method does not depend on the size of carrier image. Thus a secret data of any size can be embedded into the carrier image in layers without affecting the statistical properties of carrier image. This method can be further extended to hide multimedia data.

REFERENCES


  1. Amirtharajan, R., R.R. Subrahmanyam, P.J.S. Prabhakar, R. Kavitha and J.B.B. Rayappan, 2011. MSB over hides LSB: A dark communication with integrity. Proceedings of the IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, December 12-14, 2011, Bangalore, Karnataka, India, pp: 1-6.
    CrossRef

  2. Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRefDirect Link

  3. Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRefDirect Link

  4. Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRefDirect Link

  5. Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRefDirect Link

  6. Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRefDirect Link

  7. Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRefDirect Link

  8. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRefDirect Link

  9. Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRefDirect Link

  10. Karthikeyan, B., V. Vaithiyanathan, B. Thamotharan, M. Gomathymeenakshi and S. Sruti, 2012. LSB replacement stegnography in an image using pseudorandomised key generation. Res. J. Appl. Sci. Eng. Technol., 4: 491-494.
    Direct Link

  11. Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRefDirect Link

  12. Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRefDirect Link

  13. Salem, Y., M. Abomhara, O.O. Khalifa, A.A. Zaidan and B.B. Zaidan, 2011. A review on multimedia communications cryptography. Res. J. Inform. Technol., 3: 146-152.
    CrossRefDirect Link

  14. Stefan, K. and A. Fabin, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London, UK.

  15. Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link

  16. Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRefDirect Link

Search


Related Articles

Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
Inverted Pattern in Inverted Time Domain for Icon Steganography
Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
Random Image Steganography and Steganalysis: Present Status and Future Directions
Firmware for Data Security: A Review

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved