Thursday, April 4, 2019

Steganography Using Lsb Insertion Technique Computer Science Essay

Steganography Using Lsb Insertion Technique calculator Science EssaySteganography is a method use for turnt a pass on by ameliorate in a carrier info. There argon two types of knowledge. They ar internal entropy and immaterial info .The external culture contains visible part or audible part of instruction which is non useful for selective information owner and the internal in pution contains infix data.The proficiencys apply in Steganography makes hard to let on entomb out mental object in spite of appearance an chain charge up. By this technique we argon not only bill a message but also we argon hiding the message. Steganography system is designed to encode and rewrite a clandestine file embed in contrive file with a random least Signifi hatfult Bit (LSB) insertion technique. By using this technique the secret data atomic number 18 public exposure out among the type data in a random manner with the ease of a secret key. The key generates pseud orandom numbers and identifies where and in which order orphic message is laid out. Steganography includes cryptography which is an good for Steganography .In cryptography, dispersal is applied to secret message.INTRODUCTIONThe shootive information transmitted comes in rough forms and it is employ for more than onenessness operation. Communications should be done secretly. Secret communication varies from bank transfers, corporate communications and credit nib purchase. Steganography is an art of embedding a secret message into a normal message. Steganography is utilize in watermarking for protecting data copyrights .Unsurprisingly, methods of Steganography change because innocuous spam satisfys be growing frequently by embedded texts coding is technique used to make secret message scribbled for third fellowship and are normally used in internet. The encrypted message is targeted by attackers in cryptography because it hides the message content. An another data hidin g technique known as watermarking used for embedding and hiding, some symbol data or digital manifest in the digital valuable data like photo picture, digital movie, musical sound etc. Watermarking solve is mainly used to protect ownership or copyrights of the data. In this technique, hardness of embedded examine and hidden evidence are in truth small and is important. In this technique the important information is present in external information which is visible or audible.In the Steganography technique, confidential information is make invisible to a human eye by embedding it as a dummy data much(prenominal)(prenominal) as a speech sound and a digital exposure. Steganography contains another investigate topic called as steganalysis which is used to scrape a stego file from the open files. Steganalysis is used in detecting suspicious moving-picture show file. The suspicious range files are embedded with the crime associated informationAll traditional Steganography techniqu es have limited information-hiding capacity. These techniques sewer hide 10% or less than 10% data of a carrier data. The principle of these techniques is to replace frequence components of carrier or to replace LSB spotlights of multivalued pictorial matter with secret information. Steganography uses image as a carrier data and it embeds secret information in twat planes .We reverse replace all noise like regions in the bit planes without disturbing the quality of image and is termed as B.P.C.S Steganography .BPCS Steganography is known as Bit plane complexness segmentation Steganography.BACKGROUND HISTORYSteganography is derived from a Greek word which means as a cover writing or hidden writing. In Steganography stegos means cover and grafia means writing.THEORYSteganography is used to hide confidential information from human eyes by embedding it in a carrier data such as digital image or speech sound. A carrier data is a colour image having RGB color components in a multi -bit data structure. The embedded information is extracted using special extracting architectural plan and key .The techniques of Steganography are different from file camouflage or file fancy technique.File deception is a technique used for hiding secret data in computer file and it closely looks like a Steganography. But, it is an trick to disguise a secret-data file as a normal file and is possible in files which have dont care option. For example, Word file or JPEG image OR MPEG get out allow for transmiting an extra data (extension) at the give the sack of a regular file. Even an extra data (which target be encrypted) are added, the JPEG image, word file or MPEG looks like the airplane pilot image and original sound, or document on the computer. People may think this is due to Steganography. The lengthy files are substantially sight by engineers. So, file deception and Steganography are different.The Steganography softwares that are available in the market are footst alld on file deception. In Steganography, if widening file size is increased by embedding the information then the program is called as File deception. A secret data can be made unreadable by encrypting the data. The secret data should be encrypted to make it unreadable for third party. With the help of data encryption, secret data can be rubber eraser. info encryption is based on data scrambling and it uses a secret key. Data encryption can create a doubt to the people that owner of the data is hiding something in an image. In data encryption we can fix easily that he is hiding something in a image. Therefore encryption of data is not enough. Steganography is the solution for data encryption.There are two types of data in Steganography .they are secret data and carrier data. Secret data is very valuable when compared to the carrier data. Carrier data is a type of dummy data which is not so important but it is needed. The data which is embedded is called as stego data.If we want to recover the secret data , we can extract that data from stego data.We need a special program or a key for data extraction..The carrier is image data which has color components of red green and blue colors in 24 bit pel structure. The figure below shows an example of carrier image and stego image. The secret data is embedded in stego image.Steganography is a method of hiding the secret data by fixing it in media data .For example in the figure a secret data is embedded but we cant strike in which place the secret data is embedded. The Embedded data leave be very safe in the Steganography because it will hide content of the message and location of hidden image. There are many methods to embed the data .but it is very hard to find about the method used in embedding the message.. Steganography can co-operate with cryptography to embed the encrypted data safely. In Steganography , Stego data will not have any evidence about the embedded data.The Steganography user should discard t he original carrier data after embedding such that it will not allow comparison of stego and original data. Embedded capacity should be larger. BPCS method is the method available method for image Steganography. If anyone detect the Steganography image, it is very difficult for him to retrieve the hidden image. There are trio basic ways to hide a message in image. They are nip, substitution and generation. Using Injection method we can find in which place data to be inserted and using substitution we can find least significant bits for hiding the message. Using generation method we can create a new file based on the hidden information.Method of implementationLeast significant bit insertion is one of the important methods of implementation. In this method, the LSB bits of byte are altered so that it form bit string and gibes an embedded file. By changing the LSB bits, it will cause some small differences in color which are not noticeable to human eye. After that an image is comp ressed and a text message is hidden in image .In LSB method, LSB bits of the covered image is altered such that they form embedded information. Embedding a message into cover image will result a stego image. For normal vision, stego image looks identical as cover image this is because of only small changes of pixel set. Therefore there is no significant difference. The embedded message is sequentially embedded in covered image so that it is aristocratic for a third party to recover the message by retrieving the pixels sequentially starting from the introductory pixel of the image. Steganography uses a key which as a better security. It is difficult to recover the embedded image without valid key.LEAST SIGNIFICANT snack INSERTIONLeast significant bit insertion is the common technique used in Steganography. In LSB method, an image is used. An image is more than strings and string of bytes. Each byte in an image represents different colors. The farthermost few bits in a color byt e do not hold much significance as the first few bits. Therefore only two bits differ in last few bits that represent a color which is undistinguishable to human eyes. In LSB method, least significant bits of a cover image are altered such that we can embed information. The example shows how letter A is hidden in first 8 bytes of 3 pixels in a 24 bit image. Since the 8 bit letter A requires only 8 bytes to hide it, ninth byte of the 3 pixels used to hide the next piece of the hidden message.Example shows that in a 24 bit image, letter A can be hidden in first 8 bytes of 3 pixelsPixels (00100111 11101001 11001000)(00100111 11001000 11101001)(11001000 00100111 11101001)A 01000010Result (0010011011101001 11001000)(0010011011001000 11101000)(110010010010011011101001)The five at a lower placelined bits are the 5 bits which were altered. With LSB insertion technique, on an average half of the bits of an image are changed. A is a 8 bit letter and requires 8 bytes for hiding. The ninth by te of 3 pixels is used for hiding next character of secret message.The tenuous variations of this technique allows a message to embed into two or more least significant bits per bytes, and increases the information hidden capacity of the cover object .but cover object is degraded and easily detec knock back.LSB insertion is easy to implement and is also easily attacked if the modifications are done wrongly. Improper modifications in color palette and guileless image calculations will destroy hidden message. Image resizing and image cropping are some examples of image manipulations. occupations of SteganographySteganography is relevant the following areas.1).Private communication and secret data storing.2).Security of data.3).Accessing the control system for distributing the digital content4).Media data base systems.The application area of Steganography differs based on the features utilized in a system.1).Private communication and secret data storingThe secretiveness of embedded data is important in this area. Steganography provides capacity for hiding the existence of secret data and Steganography makes very hard to detect the embedded data in a image and Steganography strengthens the encrypted data.In Steganography, occupy a carrier data according to the size of embedded data. Carrier data should not be effective. Now embed the secret data using an embedding program with the help of a key. To recover the embedded data, an extracting program is used with a key. Before starting the communication in this case, Key negotiation is used2).Security for a dataSteganography is used in military applications for maintaining the secret data .In military secret information should be very secure to avoid sudden attacks on them from enemies. Steganography can hide the existence of contents of data but it cannot hide the presence of data. Data should not be larger than carrier image .Steganography strengthens the secrecy of the data. Fragility of the embedded data is a dvantage for this application area. Embedded data can be rather fragile than robust. But embedded data is fragile in most of the Steganography programs. No one can change or tampered the data .If anyone changes or tampers the data, and then it can be easily detected by the extraction program.3). Accessing the control system for distributing the digital content In this application, embedded data is explained to air the content. Here embedded data is hidden data. Digital contents are being commonly distributed by internet. Some music companies release the music for free in some electronic network sites and in some sites it charges for the music downloads. Digital contents are equally distributed to user who rilees the web pages. Even it is possible to send digital content to e-mail messages it takes more time. We can to upload any content on the web page we can issue a special access key to extract the content. In Steganography a prototype of an access control system is developed f or distributing the digital content through internet. This can be explained by following steps.1).The content owner will classify his digital content in a folder and embeds the folder according to Steganography method by accessing the folder access key and uploads embedded content on web page.2).On the web page, owner will explains the contents clearly and publicises it worldwide and gives his contact information on web page.3).The owner will receive access request from the customer who visited that web page. and then owner creates an access key and provides it to the customer for free or charge.4).Media database systemsIn this type of application secrecy of data is not important, converting two types of data into one data is important. Photos, Pictures, movies and music will come under media data. For example the media data for a photograph will contain about the title of the photo and day of the month and time of a photo and it also contain about the camera used to take that pho tograph.Data hiding in .bmp imagesThere are several formats exists for an digital image. .BMP, JPG, GIF are some formats .Each format is associated with advantage and disadvantages. Because of its simplicity, windows BMP file offers more advantages. It has an advantage of widely spreader and the information contained is minimum .Bmp file is a double star file.bmp file is divided into four sections such as file header, image header, color table and pixel data. The file header is used to know about size of the image and to learn where actual image data is located within the file. The Image header gives information about the image and its data format such as width and height of the image. Image header also gives information such as how many bits are used per pixel and checks whether the image data is compressed data or uncompressed data. Depending on the image data, color table will be present. When color table is not present, a gravel of bit masks are used to extract the color inform ation from the image data. When dealing with 24-bit image, color table is not present. When dealing with 8-bit image, color table consists of 256 entries. Each entry consists of four bytes of data. In these four bytes of data, first lead bytes are blue, green and red colors values .The fourth byte must be equal to zero because it is not used. In 8-bit format, each pixel is represented by single byte of the data which is tycoon in to color table. In 24-bit format, each pixel I represented by RGB component values .The pixel data holds entire hidden data and there are changes by one pixel value either positive or negative.MATLABThe MATLAB is a language for technical computing. MATLAB integrates computation, visualization and programming in a easy way in which problems and solutions are expresses in mathematical notation. Typical uses include math and computationData acquisitionAlgorithm developmentModelling, simulation and protypingData analysis, exploration and visualizationApplicati on developmentMATLAB is a system whose data element is an array without dimensions. It allows in solving computing programs such as Matrix and vectors formulations. It writes program in a scalar language such as FORTRAN within a fraction of seconds.MATLAB can be abbreviated as a matrix laboratory. MATLAB was developed to access matrix software. The matrix software was developed by linpack and eispack projectsdeveloped .MATLAB engine incorporates LAPACK and BLAS libraries by embedding the state of art in software for matrix computation.Matlab has evolved over a period of years with input from many users. MATLAB has buzz off a standard tool for advanced courses such as engineering, maths, and sciences .MATLAB is like a tool for high re inquisition productivity, analysis and development.MATLAB SYSTEMMATLAB system consists of five main parts1).desktop tools and development environment2).MATLAB Mathematical functions subroutine subroutine library3).MATLAB language4).graphics5).MATLAB application program interface1).Desktop tools and development environmentMATLAB is a set of tools and facilities that helps to use and to become more productive with MATLAB function and files. In MATLAB most of the tools are graphical user interfaces and includes MATLAB desktop, assertion window, editor in chief and debugger, code analyzer and browser for viewing help, workspace and folders.2). MATLAB Mathematical functions libraryMATLAB is a huge collection of computational algorithms ranging from elementary functions such as sum, sine, cosine and complex arithmetic to more sophisticated functions like matrix inverse, matrix Eigen values, Bessel functions and fast Fourier transforms3). MATLAB languageMATLAB language is an high level matrix language with control coalesce statements, functions, data structures, and object-oriented programming features. It allows small and large programming .In programming in large is to create fill in large and complex application programs and p rogramming in small is to create quick and dirty establish away programs.4). GRAPHICS-MATLAB is having extensive facilities to viewing vectors and matrices as graphs. It includes high level functions for two dimensional and three dimensional data visualization, image processing, and presentation graphics .MATLAB also includes low-level functions and allows in customizing appearance of graphics to build complete graphical user interfaces on MATLAB application.5).MATLAB Application program interface (API)-It is a library which allows us to write C and FORTRAN programs to interact with MATLAB .It also includes facilities such as calling routines from MATLAB, calling MATLAB as a computational engine and for reading and writing MATA FILES.MATLAB working environmentMATLAB DESKTOP-It is the main application window in MATLAB. This window consists of five sub windows such as occurrent directory, command history, workspace browser, command window, and a figure which is shown while displayi ng a graphic.The User types commands in command window and expressions at the prompt. The output of these commands is displayed. In MATLAB, workspace is defined as a set of variables created by user in work session. These variables are shown in workspace browser. The workspace browser launches array editor by gabbleing on a variable. In array editor, we can edit properties of a variable and we can also get information about the variables.In MATLAB, the current directory tab is above the workspace tab. The Current directory tab shows contents of current directory and its path is shown in current directory window. In windows operating system, the path cMATLABwork indicates work as a subdirectory and MATLAB as a main directory and is installed in c drive. In current directory window, click on an arrow button to see recently used paths. To change a current directory, click on a button on right aspect of a window.To find M-files and other MATLAB files, MATLAB uses a assay path that is organized in system files. The files that are to be runned in MATLAB should locate in the current directory or in directories available on look path .Math work related tools and files that are supplied by MATLAB are already exist in search path. On desktop from file menu select set path to modify or to add search path or to see which directories are existing on search path. To avoid perennial changing, the current directory adds a commonly used search paths to directory.In MATLAB, the commands used by the user in current and earlier sessions are recorded in command history window. Using right click on command history window, we can select and re-execute previously entered MATLAB then it launches a menu. For execution of the commands select the options from menu. We can select non-homogeneous options from menu for execution of the commands which are useful in implementation of various commands.MATLAB EDITOR TO CREATE M-FILESThe MATLAB editor is used for creating M-files. The grap hical window will appear in a separate window or a sub window. The M-files are represented as extension .m on desktop. MATLAB editor is having some options to debug a file and saving a file and to view the file. In differentiating various codes MATLAB editor will perform some simple checkings. In MATLAB, text editor is used to write and to edit M-functions. To edit a text in MATLAB, type as EDIT at prompt then it an M-file is opened with a filename. Therefore it is ready for editing. The files should be in a search path or in a current directory.How to get help in MATLABUse the MATLAB help browser for any help in the MATLAB. The help browser will be opened in a separate window when we click on symbol (?) on desktop toolbar or in command window type as help. The Browser Help is displayed separately as a hypertext mark-up language document .HELP browser is incorporated into MATLAB desktop .HELP pane and DISPLAY pane are the two panes that are available in HELP browser. HELP pane is u sed in finding the information and display pane is used for viewing the information. To perform a search, Navigator pane is used.CONCLUSIONSThis project explains techniques for embedding a data in an color image and also some features are added which include file types excluding bitmap images and Steganography methods. Data extracted from cover image depends on pixel values of an imageCODING %I=imread(sravs.bmp) %%read an imageI=uigetfile(.bmp,select the iamge)I=imread(I)b=1disp(orginal text to be embedded)%txt= textread(message.txt, %c, whitespace , )fid = fopen(message.txt)A=fread(fid,schar)fclose(fid)A1=char(A)disp(embedding text)txt=A1txtN = 8*numel(txt) %%%%%%% to find out the total no of elements for the textS = numel(I) %%%% total no of elements for the imageif N Swarning( Text truncated to be within size of image )%%%%%%if text size is more than the image size%%%%%% process block segmentationtxt = txt(1floor(S/8))%%%%%% dividing into 8*8 blocks for the textN = 8*numel(txt )end%%%%% initializing the total no of bits for the text and the imagep = 2bh = 2(b-1)I1 = reshape(I,1,S)%%%%% resize the elemnts for the new image size%figure ,imshow(I1,truesize)addl = S-N%%%%%%%take the difference of the elments for the imagfe and the textdim = size(I)I2 = round(abs(I1(1N)))%%%%%%take the complexness of each blocksi = sign(I1(1N))for k = 1Nif si(k) == 0%%%%%%%replace ment of the bits for the complexity blockssi(k) = 1endI2(k) = round(I2(k))if mod((I2(k)),p) = hI2(k) = I2(k) hendendbt = dec2bin(txt,8)%%%%%%bint = reshape(bt,1,N)d = h*48bi = (h*bint) d %%%%%%remove the complexity blocks of the image and replace with the non complexity blocksof imageI3 = double(I2) + bibinadd = bi zeros(1,addl)I4 = double(si).*double(I3)I5 = I4 I1(N+1S)intl = reshape(I5,dim)%%%%%%resize the image and display the stego cotentsfigure,imshow(intl)title(stegnograph image)%returnfigure,imshow(I)title(original image)I=im2bw(I)%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%decoding%%%%%%%%%%%%%%%%%%%%siz=length(txt)bsiz = 8*sizn = numel(intl)if bsiz nerror(Size of text given exceeds the supreme that can be embedded in the image)returnenddim = size(intl)addl = n-bsizI1 = reshape(intl,1,n)I2 = round(abs(I1(1bsiz)))p = 2bh = 2(b-1)rb = zeros(1,bsiz)for k = 1bsizI2(k) = round(I2(k))r = rem(I2(k),p)if r = hrb(k) = 1endendrbi = (dec2bin(rb,1))rbin = reshape(rbi,siz,8)rectxt = (bin2dec(rbin))disp(retrived text from the steg image)rextxt=char(rectxt)return

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.