Image Processing
Image Processing
1. Introduction
1.1. LSB Image Steganography
The word "Steganography" is a Greek word which means "covered or hidden writing".
In other words Steganography is technique of hiding information behind the cover
medium. Steganography can be done with Text, images, video, audio media and protocol
steganography. In our work we are going to use digital image steganography because
digital images have a large amount of redundant data and for this reason it is possible to
hide message inside image file [1]. Image Steganography requires following elements to
carry out the work:
Cover medium: It is an image that holds secret message.
The Secret message: it is message to be transmitted. It can be plain or encrypted
text, images or any other data.
The Stego-key: it is key used to hide the message (May or may not be used).
Data is hidden in such a way that nobody notices its presence in cover medium. The
main motive of steganography is to hide the existence of communication [2].
1.2. Advance Encryption Standard (AES-128 bits)
Advanced Encryption Standard (AES), also known as Rijindael is used for
securing information. AES is a symmetric block cipher that has been analyzed
extensively and is used widely now-a-days. AES, symmetric key encryption
algorithm is used with key length of 128-bits for this purpose. High security,
mathematical soundness, resistance to all known attacks, high encryption speed,
worldwide royalty free use, suitability across wide range of hardware and software are the
characteristics of AES algorithm. Loopholes are there in DES and 3DES encryption
algorithm but AES algorithm does not have such loopholes so far [3]. The basic structure
of AES is shown in Figure 1.
2. Previous Work
There are lots of methods available that can be used to implement steganography using
various multimedia content.
260
S.M. M. Karim et al. [4] proposed a new approach that provides very good security to
data. They use LSB approach with secret key. This secret key is used to hide the sensitive
information and this information is stored on different LSBs of image.
On the bases of Human visual system (HVS) X. Qing, et al., [5] proposed a new
technique in which sensitive information is embedded in all planes of RGB components
of an image.
In [6] author proposes an enhanced LSB algorithm for image steganography. In this
proposed work they only embed secret information in blue component of the RGB model.
This method reduces the leap in color scale because only blue components are used to
embed the secret information.
H. Yang, et al., [7] presented a new adaptive LSB based method for image
steganography. It uses the pixel adjustment technique for better stego image quality. This
adaptive LSB substitution results in high hidden capacity.
Authors in [8] use the vector quantization table to embed the secret information by
which the hidden capacity and stego size is increased.
Nouf A. Al-Otaibi, et al., [9] designed a new system called 2-layer security system for
hiding the sensitive information on personal computers. They divide the system in two
layer namely cryptography layer and steganography layer. For steganography layer LSB
algorithm is used. This system is designed on visual basic platform. Authors also done
study on improving hidden capacity.
In [10] LSB based image steganography method is proposed. To hide the data common
bit pattern is used. According to the message and the pattern bits LSBs of pixels are
modified. This method has low hidden capacity.
Kamali, S.h., et al., [11] analyze and present the modified AES image encryption
algorithm (MAES) which provide greater security to image data. The modification done
in ShiftRow transformation. The results also prove that the MAES gives better encryption
results than original AES algorithm, against various statistical attacks.
3. Proposed Work
Data security is a biggest concern of any organization. We propose the work called
Dual Layer Security of data using LSB Image Steganography Method and AES
Encryption Algorithm. The main idea of our work is to provide dual layer of security to
sensitive data or messages by hiding it behind the digital images using LSB image
Steganography algorithm and the second layer encrypt this stego image using AES-128
bits encryption algorithm.
3.1. Structure of Proposed System
In our work we utilize both cryptography and steganography. In order to get more
security to the data we combine both the technique. Proposed System consists of two
layers, namely Steganography Layer and Encryption/Decryption Layer.
3.1.1. Steganography Layer: In this process first we have to provide two inputs to the
LSB steganography algorithm. First input is cover image in which secret message is
embedded and second is secret message itself. Output of this process is Stego Image
(image with secret message). Figure 2(a) shows Embedding and encryption process and
Figure 2(b) depicts how message extraction and decryption is done.
261
(a)
(b)
01001111
11010101
11110110
00001111
11011010
10000001
01001110
11010100
11110110
00001111
11011011
10000001
In the above example note that only five bits have been changed out of nine bits. It
depends upon the secret message that is to be embedded.
Digital images can be of two types 8 bit or 24 bit. In 8 bits image only one bit of
information can be embedded. But in 24 bits image we can embed three bits of
information in each pixel as shown in above example. A picture of resolution of 800600
can store 1,440,00 bits of embedded data [12]. Changing the LSB of each pixel does not
affect the appearance of the original image and hence the Stego-image looks almost
similar to the cover image. LSB is simplest algorithm with high payload capacity.
262
3.1.2. Encryption/Decryption Layer: The core of second layer in our system is AES
128 bits Encryption algorithm. The output of first layer is Stego image with embedded
secret message in it. In this layer we encrypt the stego image with AES algorithm by
providing 128 bits public key for encryption. In the receiver end reverse process is
applied by decrypting the stego image.
263
4.2. Encrypting /Decrypting Stego Image using AES 128 bit Algorithm
Encryption/Decryption layer shown in Figure 4. We provide stego image and 16
characters (128 bits) encryption key as input to this layer and the output of this layer is
encrypted stego image shown in figure 6(c). Stego image is encrypted using AES 128 bit
algorithm because of its numerous advantages over other encryption algorithms and there
is no brute force and cryptanalysis has been encountered on AES [15].
264
4.4. Comparison between Cover Image, stego and Encrypted Stego Image
In this section all the three possible images are observed, i.e., cover image, stego and
encrypted stego image as shown in Figure 6(a), 6(b), and 6(c). As we observed that there
is no difference in both the stego and cover image. Nobody can observe the usage of
steganography to hide the data in cover image and changes are so minimal that human eye
cant even see. Changes in image are done at pixel level that is almost unnoticeable which
leads to high security. After the encryption of stego image, it becomes encrypted as
shown in Figure 6(c).
(a)
(b)
(c)
Figure 6. (a) Cover Image (b) Stego image (c) Encrypted Stego Image
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
265
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
266