Documente Academic
Documente Profesional
Documente Cultură
Lecturer, Department of Computer Science and Engineering, Baba Farid College of Engineering & Technology,
Bathinda – 151001
The Encrypt and Scatter technique tries to All the above mentioned algorithms for
emulate white noise. It is mostly used in image steganography have different strong
image steganography. White Noise Storm is and weak points and it is important to ensure
one such program that employs spread that one uses the most suitable algorithm for
spectrum and frequency hopping. It does an application. The most important
this by scattering the message throughout an requirement is that a steganographic
image on eight channels within a random algorithm has to be imperceptible.
number that is generated by the previous Following criteria has been proposed for
window size and data channel. The channels imperceptibility of an algorithm:
then swap rotate, and interlace amongst each
other. Each channel represents one bit and as Invisibility – The invisibility of a
steganographic algorithm is the first and
foremost requirement, since the strength of cause suspicion. Abnormal file size, for
steganography lies in its ability to be example, is one property of an image that
unnoticed by the human eye. The moment can result in further investigation of the
that one can see that an image has been image by a warden.
tampered with, the algorithm is The levels at which the algorithms satisfy
compromised [11]. the requirements are defined as high,
medium and low. A high level means that
Payload capacity – Unlike watermarking, the algorithm completely satisfies the
which needs to embed only a small amount requirement, while a low level indicates hat
of copyright information, steganography in the algorithm has a weakness in this
other hand requires sufficient embedding requirement. A medium level indicates that
capacity [12]. the requirement depends on outside
influences, for example the cover image
Robustness against statistical attacks – used. LSB in GIF images has the potential
Statistical steganalysis is the practice of of hiding a large message, but only when the
detecting hidden information through most suitable cover image has been chosen
applying statistical tests on image data. [1]. The ideal, in other words a perfect
Many steganographic algorithms leave a steganographic algorithm would have a high
“signature” when embedding information level in every requirement. Unfortunately in
that can be easily detected through statistical the algorithms that are evaluated here, there
analysis. is not one algorithm that satisfies all of the
requirements. Thus a trade-off will exist in
Robustness against image manipulation – most cases depending upon the need.
while being transmitted the image may
undergo changes by an active attacker in an 5. DISCUSSION
attempt to remove hidden Information.
Image manipulation, such as cropping or LSB is the most popular and straight
rotating, can be performed on the image. forward technique for image steganography
These manipulations may destroy the hidden but it is also most vulnerable to attacks. It is
message. It is preferable for steganographic very easy to find data present in image using
algorithms to be robust against malicious steganalysis if we are using LSB method.
changes to the image Also it results in image degradation if
amount of data to be hidden is more.
Independent of file format – With many Masking is more robust than LSB insertion
different image file formats used on the with respect to compression, cropping, and
Internet, it might seem suspicious that only some image processing. This technique
one type of file format is continuously actually extends an image data by masking
communicated between two parties. The the secret data over the original data as
most powerful steganographic algorithms opposed to hiding information inside of the
thus possess the ability to embed data. Encryption and scatter technique
information in any type of file. provides more security as it is harder to
detect but as like LSB it results in
Unsuspicious files – This requirement degradation of the image. So the major issue
includes all characteristics of a while discussing the steganography is the
steganographic algorithm that may result in robustness against attacks. An ideal
images that are not used normally and may
algorithm is one that fulfills all the subtraction of two images result in a new
requirements discussed above. image whose pixel at co-ordinate (x, y) is
the difference between the pixels as the
6. PROPOSED WORK same locations in the two images being
subtracted. Depending on the hardware or
All the methods used for embedding data in software being used, the actual mechanism
an image work on the principle of one image of implementing arithmetic, logic operation
file. A new technique can be designed based can be done sequentially. In this method,
on the concept that a single image file may first a supporting image is selected and then
be divided into two or more sub image files based on our requirements (i.e. the size of
and based on our requirements. We can message) we select the appropriate container
embed the required data into a particular file. If we consider the size of the supporting
chosen sub image file which is, of course, a image as, M1 x N1, then we can place the
part of mother image file. This concept helps container file inside the supporting file in a
us in designing a methodology for both region defined by A(x, y) and B(x + r, y + s)
hiding and extracting information. for a suitable value of r and s,
In contrast to the LSB scheme being used where 0 ≤ r ≤ M1 and 0 ≤ s ≤ N1
for hiding the data, our main purpose here is
to consider the entire byte representing any
particular pixel for storing the information. 7. CONCLUSION
Consequently, by the process of replacing
the entire byte for embedding information in The suitability of steganography as a tool to
the container Image, only one pixel can be conceal highly sensitive information has
used to store three characters, whereas by been discussed by using a new methodology
LSB technique one need a minimum of nine sharing the concept of hybridization and a
pixels to store these three characters as three multilevel of security of data is achieved.
pixels are required to store a single This suggests that an image containing
character. Further, if we replace all pixel encrypted data can be transmitted to any
values of an image then the entire image where across the world in a complete
generally changes and may look completely secured form. Downloading such image and
like another image of suspicious. However, using it for many times will not permit any
by the use of the concept of hybridization unauthorized person to share the hidden
both the supporting file and the container information. Industries like music, film,
file together give the impression of a normal publishing and organization like ministry
unsuspicious image file. Again when the and military will definitely be highly
volume of data to be sent is comparatively benefited by the use of such techniques. So
less than the container image file, instead of the use of steganography and cryptography
choosing all pixels for replacement a collectively can be used for increasing the
selected number of pixels can be considered security and robustness of the technique
for our purpose. against the attacks.