Beruflich Dokumente
Kultur Dokumente
M.SAVYA IV/IVB.Tech
ABSTRACT
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security of information does not matter. The explosive growth of computer systems and their interconnections via networks has increased the dependency on the information stored and communication using these systems. Thus the field of cryptography has got more attention nowadays. More and more complex techniques for encrypting the information are proposed every now and then. Some advanced encryption algorithms like RSA, DES, AES etc. which are extremely hard to crack have been developed. But, as usual, when a small step is made to improve the security, more work is done in the opposite direction by the hackers to break it. Thus they are able to attack most of these algorithms and that too, successfully. Even complex algorithms like RSA are no exception to this. So, to deceive the hackers, people have started to follow a technique called Steganography. It is not an entirely new technique and has been in the practice from ancient times. In this method, the data is hidden behind unsuspecting objects like images, audio, video etc. so that people cannot even recognize that there is a second message behind the object. Images are commonly used in this technique. In this paper, we have proposed a technique for hiding data secretly behind images. The existing techniques for image Steganography have some serious drawbacks and we have tried to overcome those with ours. Here, the pixels in the images are replaced with the new ones, which are almost identical to the old ones, in a manner that can be used to retrieve back the hidden data. We have implemented this technique practically and found the results satisfying.
STEGANOGRAPHY DEFINITION:
Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present.
STEGANOGRAPHY IN IMAGES:
In essence, image steganography is about exploiting the limited powers of the human visual system. Within reason, any plain text, ciphertext, other images, or anything that can be embedded in a bit stream can be hidden in an image. The common methods followed for hiding data in images are the Least Significant Bit (LSB) Insertion technique in which the LSB of the pixel values are replaced with the data to be encoded in binary form, the Masking Technique in which the original bits are masked with data bits and the Filtering Technique in which certain transformations are done on the image to hide data. The last two techniques
hide data by marking an image in a manner similar to paper watermarks But, there are some drawbacks with these methods which hinders their use. DRAWBACKS IN THE CURRENT TECHNIQUES: Extremely liable to attacks like Image Manipulation techniques where the pixels will be scanned for a possible relation which will be used to trace out the actual characters. Only 24 bit messages are suitable and 8 bit images are to be used at great risk. Extreme Care needs to be taken in the selection of the cover image, so that changes to the data will not be visible in the stego-image. Commonly known images, such as famous paintings must be avoided.
find a position corresponding to that character search the surrounding pixels and find a pixel value closer to all of them replace the current pixel and the reference pixel with this value move to the next row 5. Set a pixel value as a threshold. 6. Repeat steps 4 and 5 for the Password from the bottom of the image.
Decoding:
The Algorithm for retrieving the original message from the steganographed image follows this sequence: 1. Get the Image and the Password. 2. Move to the bottom row in the image where password hiding starts. 3. Find the value of the reference pixel. 4. Search the entire row for the same pixel value. 5. Find the position of that pixel and decode the character. 6. Repeat steps 3 thro 5 till the threshold is reached. 7. Concatenate all the characters found so far (Actual Password). 8. If the found password does not match the given password go to step 11. 9. Move to the top row in which the first character of original data was stored. 10. Repeat the sequence followed in steps 3 to 7 to get the original message. 11. Display the result.
FLOW DIAGRAM
The flow diagram of our propsed system may be shown as:
Encoding
Decoding
IMPLEMENTATION:
With the algorithm described in brief, let us describe the pixel replacement technique in detail. First, we shall see how the original message and the password are hidden into the image and then well discuss how to retrieve message for the authorized person who knows the correct password.
individual characters. The following process is repeated for all the characters in the message. A position for hiding the character is chosen according to some relation with that character. The relation can be something like the ASCII value of the character, the order of occurence of that character in the Alphabetical or Reverse order if it is an alphabet etc. For example, the position of the character R can be chosen as: ASCII Value of R = 82, So, position = 82 50 = 32. (only eg. any value instead of 50 can be used)
Example: Let us consider a sample image whose pixels are replaced in this way. This can be explained by the following figure: (a)Image Before Replacement (b) Image After Replacement
For the sake of explanation, the pixels are shown clearly in this figure. But, in real situations, these will not be visible at all because the colour chosen for replacing is so close to the original colour that cannot be found by the human eye but still can be found out by the computer.The above mentioned steps of finding a suitable colour and replacing the pixels is continued for all the characters in the encrypted message.
Setting a Threshold:
The final step in hiding the message is to set a threshold pixel in a fixed position to indicate the end of the encrypted message. This is essential for decoding the message from the image. Otherwise, we cannot find the end of the message.
PRACTICAL IMPLEMENTATION:
We have completed a project using this pixel replacement technique using Visual Basic 6.0. Various types of images like JPEG, BMP, GIF etc are used as source image and the results are noted. The results are promising. Let us see one of the results here which uses a BMP image:
Original Image
Contaminated Image
As seen from this example, there are no big changes visible between the actual image and the one in which data is hidden. Thus, our proposed technique can be an useful one for hiding messages in images. ADVANTAGES OF OUR TECHNIQUE: Cost of cracking the hidden message is extremely high. The data cannot be easily decoded without the key using Image Manipulation techniques. Any type of image, 8 or 24 bits can be used. There is no increase in the size of the image due to data in it. There are no constraints on the choice of the image.
CONCLUSION:
To overcome the drawbacks in the existing cryptography and steganography techniques, we have proposed a new technique for hiding data in images. Our technique is less prone to attacks and since the data is strongly encrypted and the cost of retrieving it by unauthorized persons is extremly high. Since the pixels are replaced with almost identical
pixels, it is difficult to even identify that there is a second message hidden. So, we hope that our technique will be used widely in the future.
REFERENCES:
1. Steganography by Markus Kuhn, Steganography Mailing List. 2. Network and Internetwork Security by William Stallings, Addison-Wesley. 3. Steganography by Dorian A. Flowers Xavier, University of Louisiana 4. http://www.thur.de/ulf/stegano 5. http://www.cs.uct.ac.za