Beruflich Dokumente
Kultur Dokumente
net/publication/320085309
CITATIONS READS
0 199
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Janusz Bobulski on 30 November 2017.
Summary. The content of our paper presents the ways of hiding information with
the usage of a digital pictures. A branch of science that deals with hiding messages
in the wider media is called steganography. Encrypting files with sensitive data
usually do not hide the existence and transmission of data. It seems therefore that
a significant complement or alternative for cryptographic methods is the use of
steganographic methods. Due to the rapid expansion of Internet and the associated
increase in data exchange appears to be a subject of interest in this field. In the paper
we present our own algorithms of hiding data in pictures, their implementations and
analysis. In this paper we emphasize high quality, undetectability of the methods
used. We define perfect steganography and we propose solutions to achieve this goal.
The proposed solution can be used to transmit secret information and to find use
in business, diplomacy, and other areas of human activity.
1 Introduction
The primary feature by which steganographic methods can be used is redun-
dancy. In information theory, redundancy is the amount of information that
exceeds the minimum required to solve a problem. Formally redundancy is
referred to as the number of bits that can be omitted and is not practically
noticeable. This paper focuses on the issue of redundancy in graphic files. The
presented method uses the fact that some bits of the image (least significant)
are imperceptible to the human eye. These bits are redundant bits [1].
The techniques used in steganography make it difficult to detect that there
is a hidden message inside an innocent file. This way you not only hide the
message itself, but also the fact that you are sending the message. This char-
acteristic makes steganography the ideal science for hiding messages on the
web, which is widely seen as a mass communication outlet [2].
This paper concerns steganography as a branch of science often related
to cryptography. While cryptography hides the content of the information
through its encryption, steganography tries to hide the fact of its occurrence.
There is the following division of steganographic systems: Pure Steganography,
2 Artur Jakubski and Janusz Bobulski
Steganography in pictures
Steganography for digital pictures, as well as for other media, uses a carrier
(in this case a picture) to forward a confidential message. Just as in other
cases, in steganography it is important to prepare the carrier (media) that it
does not arouse any suspicion.
In addition to normal hiding, digital images allow for the usage of specific
properties of the graphic format in which the image is saved, in order to
provide confidential information. One of the techniques that allow you to
hide information in a picture is to modify the least significant bit (LSB -
Least Significant Bit) [4, 5]. As its name indicates, the technique involves the
modified least significant bits of a numerical value describing the intensity of
the color at the selected location of a picture.
Generally, with the LSB method in an image, you can hide any information
stored in the form of consecutive bits. It is not important, whether it is a
text message, the encrypted text message or other image, or any other type
of binary file. Only limitation is the capacity of the media. In the example
picture of size of 800x600 pixels, assuming the modification of only one bit of
blue and one bit of green, you can send a secret message on a maximum of
120 000 bytes.
This subsection deals with issues related to the definition of perfect steganog-
raphy. The most important requirement is that a steganographic algorithm
has to be imperceptible. The fact that the image file has been modified can not
be seen. The container with the embedded information must be large enough,
but we do not analyze it in detail. It should also be resistant to manipula-
tion that hinders the extraction of embedded information; this problem is also
not analyzed in our paper. We discuss only one LSB steganographic method.
We are aware that this constitutes a restriction. Statistical steganalysis is the
practice of detecting hidden information through applying statistical tests on
image data.
Steganography that meets all of the above conditions is an example of
perfect steganography.
In 1998 C. Cachin in the paper [9] proposed an information-theoretic ap-
proach to steganography. Cachin’s paper, so-called perfectly secure stegosys-
tems were defined, where messages that carry and do not carry hidden in-
formation are statistically indistinguishable. This is also analyzed in detail
in [10, 11, 12]. Every steganographic scheme uses a pair of embedding and
extraction mappings Emb : C × K × M → C, Ext : C × K → M defined on
the sets of all possible covers C, stego keys K, and the set of messages M .
2.2 Algorithm
In this chapter we present the algorithm for generating an image with the
hidden information in it (the text). There are two approaches to this problem.
First, when a key and a text are hidden together in a picture. Secondly,
when the key is outside the picture. In this case, the key can be delivered to
4 Artur Jakubski and Janusz Bobulski
Output g - generator
1. Choose randomly g from the range < 2, p − 2 >
2. For i ← 0 to k − 1
If (g p−1/d[i] = 1) go to step 1
3. return g
3 Experiment
We used in our experiment images in size 800 x 600 pixels and 24 bits colour,
see Fig. 1. One of them was used as cover image C and the other as stego keys
K. The lenght of the messege was 1000 chars. According to the assumptions
of the algorithm, we took the initial value of 480000 and found the nearest
prime number 480003. This number must be larger than whole number of
pixels in image in order to posibility of writing in all image pixels. Then,
using the algorithm described earlier, we generated 138237 generators. Each
of this generators was used to hide the information in the image according
to the algorithm described above. The experiment was repeated for three
different images (see Fig. 1), and the results are shown in the Table 1. The
results obtained were analysed for Peak Signal to Noise Ratio (PSNR) level
[14]. The results are satisfactory because for different generators the PSNR
value stays around 74 dB.
The tests were then carried out for the percentage change in the number
of bits on which the information is written. We conducted the research for
different lengths of hidden message. Results are given in the table 2. The
length of the hidden information does not significantly affect the number of
bits changed in the image stego keys K.
Text lenght [char] Text lenght [bit] No. of changed bits % of changed bits PSNR [dB]
50 350 157 45 87
100 700 306 44 84
1000 7000 3377 48 74
10000 70000 35026 50 64
100000 700000 240372 34 56
Average 44 73
On the way to perfect steganography 7
4 Summary
As the study showed, the proposed algorithm is effective in hiding information
and provides a high level of PSNR. In addition, changes made to image K are
not noticeable (see Fig. 2). Another advantage of the algorithm is the ability
to select a generator, resulting in varying levels of changes in the image K.
The difference between the smallest and greatest changes is 440 bits, which
represents almost 12% of the total number of changed bits. These values refer
to the case in which the length of message M was 1000 characters (7000 bits).
Further work is planned to lead to the smallest changes in images. Using
Markov processes, we also plan to explore other scenarios so that stegano-
graphic systems are closer to perfect steganography [11, 15]. Another direc-
tion of research will be the use of the Chinese Remainder Theorem [16, 17] to
construct a steganographic system.
References
1. Fridrich, J. (2016) Steganography in digital media: principles, algorithms, and
applications, Cambridge University Press, Cambridge
2. Katzenbeisser S., Petitcolas F.A.P. (2000) Information Hiding Techniques for
Steganography and Digital Watermarking, Artech House, Boston.
3. Cox, I., Miller M., Bloom, J., Fridrich, J., Kalker, T., (2008) Digital water-
marking and steganography, Morgan Kaufmann
4. Cheddad A., Condell J., Curran K., Mc Kevitt P. (2010) Digital image steganog-
raphy: Survey and analysis of current methods, Signal Processing, 90: 727–752
5. Provos N., Honeyman P. (2002) Detecting Steganographic Content on the In-
ternet, Network and Distributed System Security Symposium 2002
6. Dyja R., Jakubski A. (2011) A Picture That is Something More Than Just a
Picture. Scientific Issues Jan Dlugosz University in Czestochowa. Mathematics,
Vol XVI: 111-116
7. Dyja R., Jakubski A. (2011) Steganography in Digital Multimedia., IT Tools
in Management and Education. Selected Problems, Wydawnictwo Politechniki
Czestochowskiej: 146-154
8 Artur Jakubski and Janusz Bobulski