HOME JOURNALS CONTACT

Research Journal of Information Technology

Year: 2013 | Volume: 5 | Issue: 2 | Page No.: 209-217
DOI: 10.17311/rjit.2013.209.217
Concealed to Protect and Protect to Conceal: A Conserved Stego Image
Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan

Abstract: In the ubiquitous computing world, data are accessed by everyone at any time anywhere. People want to perform their business and personal tasks on-line. A person always wants to be on communication for banking, shopping and learning. The attractive and faster access on line facilities have to concern the secrecy of the messages exchanged over the communication media. Besides the communicating parties, there is a chance for the intruder to access the secret data. Data should be secured such that no malicious user knows the presence of the secret data. Everybody in this universe needs a secret communication world. To satisfy the need of all the Internet users, information hiding technology has developed. The most powerful weapon to hide a secret message is steganography, which is older than cryptography. This study presents one more algorithm involving three easily implementable but complex procedures to increase the security during transmission of secret data. The routines are key value based k-bit embedding, embedding in line with Fibonacci series and by Shannon-Fano encoding, respectively. Each method follows an ideal procedure to encapsulate more secret information at the same time meeting other requirements for an idyllic transmission. The performance of this study is evaluated by means of MSE and PSNR and the results are tabled.

Fulltext PDF Fulltext HTML

How to cite this article
Rengarajan Amirtharajan, R. Anushiadevi, V. Meena, V. Kalpana and J.B.B. Rayappan, 2013. Concealed to Protect and Protect to Conceal: A Conserved Stego Image. Research Journal of Information Technology, 5: 209-217.

Keywords: Shannon-Fano encoding, Information hiding, steganography and Fibonacci series

INTRODUCTION

Steganography appeared before cryptography. In the 5th century BC, King Darius used steganography for his communication. He used their political prisoners as cover medium and tattooed the secret message onto the shaven scalp of the prisoner. It becomes stego after hair grows. Wax tablets, invisible inks and microdots were also used for Steganography (Kahn, 1983). While Cryptography protects the contents of a message (Schneier, 2007), Steganography holds responsibility for defending information and communicating bodies (Stefan and Fabin, 2000; Bender et al., 1996, 2000). Traits of Steganography and that of Watermarking are almost alike. One of the main differences between these two techniques needs to be highlighted (Hmood et al., 2010a, b; Cheddad et al., 2010; Zaidan et al., 2010).

Digital watermarking ascertains no exclusion of or unchangeable watermark despite the fact of being bluntly evident (Stefan and Fabin, 2000). But Steganography, conversely, zooms in on masquerading secret information (Amirtharajan and Rayappan, 2012a-d).

Fig. 1: Embedding process

But it falls short if the secret content is exposed by the interloper (Padmaa et al., 2011; Qin et al., 2010). The advancements in computer technology today have improved the electronic media such as text (Shirali-Shahreza and Shirali-Shahreza, 2008; Al-Azawi and Fadhil, 2010), image (Chan and Cheng, 2004; Thanikaiselvan et al., 2011; Rajagopalan et al., 2012; Janakiraman et al., 2012a, b), audio (Zhu et al., 2011) and video (Al-Frajat et al., 2010) used for the steganographic communication (Zanganeh and Ibrahim, 2011; Luo et al., 2008; Thenmozhi et al., 2012).

Image Steganography uses image as cover object by hiding the relevant information in the cover image so that avoiding the information to be exposed to an intruder (Stefan and Fabin, 2000; Amirtharajan and Rayappan, 2012a-d). Digital images are used as cover-images in steganography because of their higher propagation and higher degree of redundancy in steganography because of their higher propagation and higher degree of redundancy. Steganography possesses two vital imputes, namely, payload and sensitivity. Steganography utilizes human insight as human wits are not taught to search for records having veiled information. Therefore, steganography conceals data from hackers. Payload is the amount of the secret information a cover image has (Amirtharajan and Rayappan, 2012a-d).

At the transmitter end, the secret message is embedded into the cover image as shown in Fig. 1. At the receiver end, the stego image is extracted to get the original secret message. Fundamental principle of Steganography is to maneuver the cover file’s pixels and their corresponding values in succession, thus turning it to a code which is helpful in rebuilding the message while retrieving. This study tries to study the performances of 3 such suggested methods from Amirtharajan et al. (2012).

PROPOSED METHODOLOGY

In this study, three different embedding techniques such as k-bit embedding with a key, embedding based on Fibonacci series, embedding secret text encoded by Shannon-Fano encoding technique are implemented for information hiding. The MSE and PSNR for the above three methods have been calculated and tabulated. The pros and cons of the methods are also discussed in this study. Block diagram of this proposed technique is shown in Fig. 2.

Algorithm for k bit embedding with a key

Fig. 2: Block diagram of proposed technique

Figure 3 represents the flow chart for k-bit embedding with a key.

Algorithm for embedding based on Fibonacci series

Figure 4 gives the flow chart for embedding based on Fibonacci series.

Algorithm for embedding secret text encoded by Shannon fano encoding technique

Figure 5 represents the Flow chart for embedding secret text encoded by Shannon-Fano encoding technique.

Fig. 3: Flow chart for k-bit embedding with a key

RESULTS AND DISCUSSION

To evaluate the performance of the implemented methods several experiments have been conducted, two image quality metrics are analysed are as follows. The MSE and PSNR values calculated for the proposed techniques are shown in the Table 1.

MSE: Mean square error this measures the signal to noise ratio. It is calculated from finding difference of intensities between cover image and stego image:

Where:

M = No. of rows in the image
N = No. of columns in the image
Xi,j, Yi,j = Pixel intensity of the stego imagecover image.

PSNR: Peak signal to noise ratio is calculated by finding the ratio between the maximum intensity and the distortion in the image after embedding:

where, Imax is maximum intensity of the image.

Fig. 4: Flow chart for embedding based on Fibonacci series

Fig. 5: Flow chart for embedding secret text encoded by Shannon-Fano encoding technique

As given in the table, rose image (cover image) of dimension 250x250 having the size of about 1.09 KB is taken for the execution of all the three methods. The MSE and PSNR values for individual plane for all the three methods are charted. For Fibonacci and Shanon Fano methods, the red plane has higher PSNR than blue and green. If judged against these two, the latter bids added imperceptibility than the former. It escapes human suspicion. Needless to mention here is the fact that in the first method entrenching takes place for chosen pixels only whereas in the second one, it is done for the entire pixels. In the K-bit embedding proposal, embedding is done by shifting the key values ranging from 2 to 14, whose MSE values face ups and downs in all the planes. As it is vivid, key value 2 tenders high imperceptibility of 58 dB than the rest which designates that it is fairly a high quality image.

The original covers and their resultant stego are given in Fig. 6a, b, 7a, b and 8a, b, respectively for three methods.

Table 1: Comparison table of three methods

Fig. 6(a-b): Results for k-bit embedding for key value = 14 (a) Cover image and (b) Stego image

Fig. 7(a-b): Results for embedding based on Fibonacci series, (a) Cover image and (b) Stego image

Fig. 8(a-b): Results for embedding secret text encoded by Shannon-Fano encoding technique, (a) Cover image and (b) Stego image

They have high degree of similarity which makes their characterization pretty hard. The fact of identification of secret data remains quite difficult. As a final point, this construct is capable of accomplishing soaring rate of capability, refuge and stoutness.

CONCLUSION

This study, rooted in K-bit embedding, Fibonacci series and Shannon-Fano encoding method projects a data masking algorithm apt for elevated privacy, capacity. By defining the strictures of selection or amount of pixels and key values, data is implanted adaptively as said by the algorithm. In this fashion, it circumvents huge deformation and can push in extra surreptitious data. This upshot offers the leeway of safe and sound conduction of desired information through computer. Tentative results prove that this anticipated scheme validates the conclusion and without doubt surpasses the former plots. Hence, this method is a viable means for covert communication.

REFERENCES

  • Al-Azawi, A.F. and M.A. Fadhil, 2010. Arabic text steganography using kashida extensions with huffman code. J. Applied Sci., 10: 436-439.
    CrossRef    Direct Link    


  • Al-Frajat, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010. Hiding data in video file: An overview. J. Applied Sci., 10: 1644-1649.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. An intelligent chaotic embedding approach to enhance stego-image quality. Inform. Sci., 193: 115-124.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Brownian motion of binary and gray-binary and gray bits in image for stego. J. Applied Sci., 12: 428-439.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139.
    CrossRef    Direct Link    


  • Amirtharajan, R. and J.B.B. Rayappan, 2012. Inverted pattern in inverted time domain for icon steganography. Inform. Technol. J., 11: 587-595.
    CrossRef    Direct Link    


  • Amirtharajan, R., J. Qin and J.B.B. Rayappan, 2012. Random image steganography and steganalysis: Present status and future directions. Inform. Technol. J., 11: 566-576.
    CrossRef    Direct Link    


  • Bender, W., D. Gruhl, N. Morimoto and A. Lu, 1996. Techniques for data hiding. IBM Syst. J., 35: 313-336.
    CrossRef    Direct Link    


  • Bender, W., W. Butera, D. Gruhl, R. Hwang, F.J. Paiz and S. Pogreb, 2000. Applications for data hiding. IBM Syst. J., 39: 547-568.
    CrossRef    Direct Link    


  • Chan, C.K. and L.M. Cheng, 2004. Hiding data in images by simple LSB substitution. Pattern Recognit., 37: 469-474.
    CrossRef    Direct Link    


  • Cheddad, A., J. Condell, K. Curran and P. McKevitt, 2010. Digital image steganography: Survey and analysis of current methods. Signal Process., 90: 727-752.
    CrossRef    Direct Link    


  • Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
    CrossRef    Direct Link    


  • Hmood, A.K., H.A. Jalab, Z.M. Kasirun, B.B. Zaidan and A.A. Zaidan, 2010. On the capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
    CrossRef    Direct Link    


  • Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Pixel forefinger for gray in color: A layer by layer stego. Inform. Technol. J., 11: 9-19.
    CrossRef    Direct Link    


  • Kahn, D., 1983. The Codebreakers: The Story of Secret Writing. Macmillan, New York, USA


  • Luo, G., X. Sun and L. Xiang, 2008. Multi-blogs steganographic algorithm based on directed hamiltonian path selection. Inform. Technol. J., 7: 450-457.
    CrossRef    Direct Link    


  • Padmaa, M., Y. Venkataramani and R. Amirtharajan, 2011. Stego on 2n: 1 Platform for users and embedding. Inform. Technol. J., 10: 1896-1907.
    CrossRef    Direct Link    


  • Qin, J., X. Xiang and M.X. Wang, 2010. A review on detection of LSB matching steganography. Inform. Technol. J., 9: 1725-1738.
    CrossRef    Direct Link    


  • Rajagopalan, S., R. Amirtharajan, H.N. Upadhyay and J.B.B. Rayappan, 2012. Survey and analysis of hardware cryptographic and steganographic systems on FPGA. J. Applied Sci., 12: 201-210.
    CrossRef    Direct Link    


  • Schneier, B., 2007. Applied Cryptography: Protocols, Algorithms and Source Code in C. 2nd Edn., John Wiley and Sons, New Delhi, India, ISBN-13: 9788126513680, Pages: 784


  • Shirali-Shahreza, M. and S. Shirali-Shahreza, 2008. High capacity persian/arabic text steganography. J. Applied Sci., 8: 4173-4179.
    CrossRef    Direct Link    


  • Stefan, K. and A. Fabin, 2000. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, London, UK


  • Thanikaiselvan, V., S. Kumar, N. Neelima and R. Amirtharajan, 2011. Data battle on the digital field between horse cavalry and interlopers. J. Theor. Applied Inform. Technol., 29: 85-91.
    Direct Link    


  • Thenmozhi, K., P. Praveenkumar, R. Amirtharajan, V. Prithiviraj, R. Varadarajan and J.B.B. Rayappan, 2012. OFDM+CDMA+Stego = Secure communication: A review. Res. J. Inform. Technol., 4: 31-46.
    CrossRef    Direct Link    


  • Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    CrossRef    Direct Link    


  • Zanganeh, O. and S. Ibrahim, 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inform. Technol. J., 10: 1285-1294.
    CrossRef    Direct Link    


  • Zhu, J., R.D. Wang, J. Li and D.Q. Yan, 2011. A huffman coding section-based steganography for AAC audio. Inform. Technol. J., 10: 1983-1988.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved