Beruflich Dokumente
Kultur Dokumente
net/publication/259471010
CITATION READS
1 636
2 authors, including:
Praveen Palanisamy
Microsoft
16 PUBLICATIONS 18 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Praveen Palanisamy on 30 December 2013.
Abstract—this paper presents a robust framework for secured they still rely on password encrypted files which
communication of data through images using steganography. automatically draws eaves-droppers attention just because it
The framework will help in developing applications that make is password protected. Since steganography overcomes this
sharing secrets and confidential information as easy as sharing drawback, it can be put to use as a primary tool to share
pictures, while making the users feel more secure about the
secrets, share confidential data, etc. For this use case
information exchanged. We have developed the framework to
create steg-images in JPEG format, which is more widely used scenario, we propose a robust, high capacity, and visually
than other formats. A pilot implementation is developed using imperceptible steganography framework tailored for the use
this framework on an embedded platform and the results are by common people with the presumption that strong steg-
discussed. analysis on large number of un-suspiciously shared images
is difficult.
Keywords—Steganography frame work, jpeg steganography,
steganography application framework. II. BACKGROUND
I. INTRODUCTION JPEG compression attains higher compression ratios
compared to most other standards while retaining the quality
Over the years, various Methods have been investigated and of the image. For this reason smartphones save the captured
developed to protect personal privacy. Encryption is images in .jpg format. Also JPEG is the widely used image
probably the most obvious one, and then comes format when it comes to photo sharing. Therefore the steg-
steganography. Encryption lends itself to noise and is image ought to be in JPEG format. For this, the
generally prone to detection while steganography is not steganography algorithm employed should be resistant to
easily detectable. The concepts of steganography has long the lossy compression by the JPEG standard in order to be
been in existence in the history of research but has not been able to efficiently retrieve the embedded data back at the
widely adopted as a means of secured communication. intended receiving end.
The goal of cryptography is to secure communications by The data flow diagram of embedding data in a JPEG image
changing the data into a form that an eavesdropper cannot is shown in Fig. 1. JPEG compression uses the DCT to
understand. Steganography techniques, on the other hand, transform successive sub-image blocks of 8x8 pixels, into
tend to hide the very existence of the data. Sending 64 DCT coefficients. Several steganography techniques for
encrypted information may draw attention, while invisible data hiding in JPEGs have been developed: Jsteg, JP Hide&
information will not. In this framework the two techniques Seek, F5 [1], Outguess [2]. All these techniques manipulate
are combined to increase the degree of security. Encryption the quantized DCT coefficients to embed the hidden
makes it unreadable, steganography makes it invisible. message. Using the generalized chi-square attack, Jsteg and
Images were chosen as the cover medium, as JP Hide &Seek with sequential message embedding are
communicating secret information through commonly detectable [3][4][8]. An effective approach to attack F5 and
shared images will be less suspicious of carrying sensitive Outguess were also proposed in [5]. Perturbed Quantization,
data as there are millions of photos shared everyday on PQ [6] aims to achieve high efficiency, with minimal
many different platforms. Even though image distortion, rather than a large capacity. This method with
steganography has many advantages and has potential, it is lesser capacity is not fit for the scenario being discussed.
not even as popular as the QR codes and bar codes even Most of the steganography evaluation papers and steg
with the advent of millions of smart phone users mainly analysis reports apply statistical and perceptual evaluation
because it's not available easily for the use of common using a direct comparison between the original and the
people. If two people want to share some secret digitally, stego-image. But in the peer to peer photo sharing scenarios,
it’s very unlikely to get a copy of the original image for steg
analysis and only the stego-image is available. This limits
the capability of the steg analysis systems against this use
case scenario.