Information Hiding Using Least Significant Bit Steganography and Cryptography

Full Text (PDF, 615KB), PP.27-34

Views: 0 Downloads: 0

Author(s)

Shailender Gupta 1,* Ankur Goyal 1 Bharat Bhushan 1

1. Department of Electrical & Electronics Engineering, YMCAUST, Faridabad, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2012.06.04

Received: 11 Feb. 2012 / Revised: 10 Mar. 2012 / Accepted: 23 Apr. 2012 / Published: 8 Jun. 2012

Index Terms

Cryptography, Image hiding, Least-significant bit (LSB) method, Steganography

Abstract

Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalysis so as to make it more secure we encrypt the raw data before embedding it in the image. Though the encryption process increases the time complexity, but at the same time provides higher security also. This paper uses two popular techniques Rivest, Shamir, Adleman (RSA) algorithm and Diffie Hellman algorithm to encrypt the data. The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.

Cite This Paper

Shailender Gupta, Ankur Goyal, Bharat Bhushan, "Information Hiding Using Least Significant Bit Steganography and Cryptography", International Journal of Modern Education and Computer Science (IJMECS), vol.4, no.6, pp.27-34, 2012. DOI:10.5815/ijmecs.2012.06.04 

Reference

[1]Neil F. Johnson and Sushil Jajodia, "Steganalysis of Image Created Using Current Steganography Software", Workshop of Information Hiding Proceedings, Portland Oregon, USA,15-17 April,1998. Lecture Notes in Computer Science, Vol.1525, Springer-Verlag (1998).
[2]Clair, Bryan, "Steganography: How to Send a Secret Message", 8 Nov. 2001 www.strangehorizons.com/2001/20011008/steganography.shtml.
[3]Bender, W., D. Gruhl, and N. Morimoto, "Techniques for data hiding", IBM Systems Journal , vol. 35, no. 3/4, 1996, pp. 131-336.
[4]Moller. S.A., Pitzmann, and I. Stirand, "Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best", in Information Hiding: First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 7-21.
[5]Gruhl, D., A. Lu, and W. Bender, "Echo Hiding in Information Hiding", First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer,1996, pp. 295-316.
[6]Kurak, C., and J. McHughes, "A Cautionary Note On Image Downgrading", in IEEE Computer Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp. 153-159.
[7]van Schyndel, R. G., A. Tirkel, and C. F. Osborne, "A Digital Watermark", in Proceedings of the IEEE International Conference on Image Processing, vol. 2, 1994, pp. 86-90.
[8]Johnson, N. F., and S. Jajodia, "Exploring Steganography: Seeing the Unseen", IEEE Computer, vol. 31, no. 2, 1998, pp. 26-34.
[9]Rhodas, G. B., "Method and Apparatus Responsive to a Code Signal Conveyed Through a Graphic Image", U.S. Patent 5,710,834, 1998.
[10]Swanson, M. D., B. Zhu, and A. H. Tewk, "Transparent Robust Image Watermarking", in Proceedings of the IEEE International Conference on Image Processing, vol. 3, 1996, pp. 211-214.
[11]Pitas, I., "A Method for Signature Casting on Digital Images," in International Conference on Image Processing, vol. 3, IEEE Press, 1996, pp. 215-218.
[12]Maxemchuk, N. F., "Electronic Document Distribution", AT&T Technical Journal, September/October 1994, pp. 73-80.
[13]Low, S. H., et al., Document Marking and Identifications Using Both Line and Word Shifting," in Proceedings of Infocom'95, 1995, pp. 853-860.
[14]Low, S. H., N. F. Maxemchuk, and A. M. Lapone, "Document Identification for Copyright Protection Using Centroid Detection", IEEE Transactions on Communications, vol. 46, no. 3, 1998, pp. 372-383.
[15]Low, S. H., and N. F. Maxemchuk, "Performance Comparison of Two Text Marking Methods", IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998, pp. 561-572.
[16]"Information Hiding Techniques for Steganography and Digital water Mark", Stepfan Katzenbeisser, Fabien A.P. patitcolas chapter no 3, pp no. 56. Also available at amazon.com.
[17]Johnson, Neil F., and SushilJajodia. "Exploring Steganography: Seeing the Unseen", IEEE Computer Feb. 1998: 26-34.
[18]A. Ker, "Improved detection of LSB steganography in grayscale images," in Proc. Information Hiding Workshop, vol. 3200, Springer LNCS, pp. 97–115, 2004.
[19]A. Ker, "Steganalysis of LSB matching in greyscale images," IEEE Signal Process. Lett., Vol. 12, No. 6, pp. 441–444, June 2005.
[20]Sujay Narayana and Gaurav Prasad, "TWO NEW APPROACHES FOR SECURED IMAGE STEGANOGRAPHY USING CRYPTOGRAPHIC TECHNIQUES AND TYPE CONVERSIONS", in Signal & Image Processing : An International Journal(SIPIJ) Vol.1, No.2, December 2010.
[21]"Cryptography and Network Security: principles and practices", William Stallings, pearsons education, first Indian reprint 2003.