Beruflich Dokumente
Kultur Dokumente
equivalent to superimposing a weak signal upon the Figure 2.the flow chart of Image Steganography Combined with Encryption
original carrier signal, and therefore it’s difficult to
realize visually. But during the embedding process, if the D. The Evaluation Method of
lowest bit of secret information is different from that of Steganography Algorithm
pixel value, we need to change the lowest bit of pixel 1) Histogram Difference and the Sum of Histogram
value, namely change the pixel value 2i to 2i+1 or 2i+1 absolute Difference
to 2i. The parity value transform in the LSB
steganography produces parity asymmetry. Fridirich et al. We denote h(n) as the image gray histogram’s
proposed the method of using this asymmetrical parity function. For the gray level image of 8 bits,
value transform of LSB to go on RS attack[7], and n [0,255] . And h(n) is a sequence which
Westfield et al. proposed Chi-square test[8] to attack LSB represents the number of each pixel values in the image,
steganography algorithm. If steganographic method can namely
minimize the distortion of the histogram, it can
fundamentally resist the attack of analysis methods W 1 H 1
aforementioned. So in this paper, we propose the h(n) (n, p(i, j )) (1)
steganography combined with encryption, encrypting the i 0 j 0
information intended to hide before the steganalysis with Where
encryption pre-processing, and the imperceptibility of the
1, if u v
steganography algorithm can be improved by reducing (u, v) ,
the distortion of the histogram. 0 if u v ˈ
C. Image Steganography Combined with And p (iˈj ) indicates the image’s pixel value
Encryption
In order to improve the imperceptibility of at (i, j ) , W is the image’s width, H is the image’s
steganography algorithm, this paper studied the height.
steganography combined with encryption algorithm,
which reach the goal by changing the matching
relationship between carrier image and secret
324
317
We denote h(n) as the histogram of the original
Simulation experiments embed information that Table 2. steganasis image effects without encryption
needs to hide and the information after DES encryption ,PDJH WKHKLVWRJUDP .̢/
respectively to 512 x 512 pixel image 1-3 by LSB
PRGLILFDWLRQ GLYHUJHQFH
steganography algorithm. It is showed in Figure 3.
325
318
incomprehensible and invisible. Besides, the DES [4]Marwaha, P.,Visual cryptographic steganogrpahy in
encryption algorithm changes the statistical images[C], Computer Communication and Networking
characteristics of the secret information, and improves Technologies(ICCCNT),2010 International Conference 2010:1-6.
the lowest matching degree of its bitstream and carrier [5] Huanguo ZhangˈXiutao FengˈZhongpin TanˈYuzhen Liuˈ
image, leading to a better imperceptibility of Evolutionary cryptosystems and
steganographic algorithm. evolutionary design for DES [J], JOURNAL OF CHINA
INSTITUTE OF COMMUNICATIONSˈ2002ˈ23(5)˖57-64.
REFERENCES
[6] C.Cachin, “an information-theoretic model steganography,” in
[1] Roszizti Ibrahim Teoh Suk Kuan.Steganography Aglorithm IH98, LNCS 1525, Heidelberg: Springer- Verlag, 1998˖306-318.
toHide Secret Message inside an Image[J]. Technology and [7] Fridrich J, Goljan M, Du R, Detecting lsb steganography in color
Application of Compute:English,2011,2(2),102-108 and gray-images[C],IEEE Multimedia Special Issue on Security,
[2] Der-Chyuna Lou, Chen-Hao Hu,LSB steganogrpahic method 2001:22-23.
based on reversible histogram transformation function for resisting [8] A.Westfeld, A, Pfitzmann, Attacks on steganographyic system,
statistical steganalysis[J], Information Sciences,2012, 188:346-358. Proceedings of the 3rd International Workshop on Information
[3] Yifeng Sun,Fenlin Liu, Selecting cover for image steganography by Hiding, Dresden, Germany, 1999:61-76
correlation coefficient [C] ,2010 Second International Workshop on
Educaton Technology and Computer Science, 159-162.
326
319