Asdip3.pdf

download Asdip3.pdf

of 3

Transcript of Asdip3.pdf

  • 7/23/2019 Asdip3.pdf

    1/3

    Random Image Steganography in Spatial DomainDr. Diwedi Samia

    1, Dipesh Aawa2

    2NIST,2Boal, 2Inia

    agrawaldipesh@aiLcom

    b- Steganography is an art of hiding information insome media. This paper describes various image steganography

    techniques, based on spatial domain and by considering pixelvalues in binary format. Spatial domain is based on physicallocation of pixels in an image. Generally bit gray level or colourimages can be used as a cover to hide data. Again binary

    representations of these pixels are considered to hide secretinformation. Random bits from these btes are used to replace

    the bits of secret. In this paper, many steganography techniquescan be used like Least Signicant Bit (LSB), layout management

    schemes, replacing only 's or only zero's from lower nibblefrom the bte are considered for hiding secret message in an

    image. Along with these techniques, some more methods areproposed, based on selection of random pixels from an image andagain secret data is hidden in random bits of these randomlyselected pixels. For this purpose, many parameters of an image

    are considered like physical location of pixels, intensity value ofpixel, etc.

    w Steganography, LSB, Raster Scan, Random scan,

    Layout Management

    I. INTRODUCTON

    Stegaography is a tecique of hidg secret formatio

    ay of media lke - mage, text, audio ad video. Messa?

    eto be hidde is cocealed aother le called cover meda.Combiatio of secret message ad cover le is called as

    -stegoll. This stego is trasmitd oer a etork to specieddestatio. Data ca be hdde Ipxels of a mage.

    A pixel has some teger value, based o the tesity ofcolour that is displayed by a pixel. This teger value ca be

    convered ino binary forma, i.e. he form of bye of 1 'sd O's. Ididua bts o tese bytes c be used to desecret formatio. These bits ca be selected radomly oma bte ad replaced ith a secret data. Pixels which data is

    to be hidde are also selected radomly, om a mage.Thus, pixels used for data hidg ca be selected usig

    various algoritms ad teciques, described this paper are- ayout maagemet schemes []. Also, bits om eachselected pixel ca chose radoml usig some algorims,like SB [].

    This paper proposes ew methods for selectio of pixelsom a mage, radomly for hidg secret data. Also some

    teciques are proposed to select bits radomly om the bteswhich represet pixels of a image.

    II. EATED WO

    Stegaography is oe more iformatio secrity tool likeCrptography ad atermarkg. Crptography There are somay image stegaography techiques based o spatialdomai. Spatial doma meas actual physical locatio of a

    pixel a image. While hidg data a pixel, the physicallocatio of a pixel is cosidered ad the the biary format of

    that pixel value is used to hide the data.

    Least Signcant Bit:

    Oe of the simplest ad very popular teique ofstegaography is east Sigicat Bit (SB). this

    tecique, least sigicat bit or bits of a pixel are replacedby the bits of data to be hidde [].

    SB ca be exteded up to 4 least sigicat positiosom a bte, i. e. we ca replace four bits of hidde data with

    the origal value of a pixel, whose biary value is of 8 bits.So, out of 8 bits, at max 4 bits ca be used to hide data. eca replace last two bits also. Replacig fo bits, may causedistortio a image due to oticeable chage colour adtesity of a mage.

    B. Replacing only 's or Zero's:

    other tecique is, to cosider biary values of a pixel

    d epce all 's ony from a for ea ignifican bts,with the bits of data to be hidde [4].

    Same way we can do for O's ony. This wll damic.allyhide umber of bits or btes, the cover medm. Detectof hidde data will be very difcult for ay iuder.

    C. Layout Management hemes:

    other approach ca be, to cosider layout of pixels oma image various ways, ad accordg to the logicalsequece of pixels, data ca be hidde the SBs, up to fo

    positios at max [].

    Pixels ca be cosidered ay sequece like, startig omcee positio ad comig outside i a rectagular way.Similarly, startg om outer pixel, goig towards the cee a rectagular way. This approach is sho ge givebelow.

    other approach is, cosider pixels i sake movemet,diagoal movemet, startg om top le or top right orbottom le or bottom right.

    978--4673-530-4/3/$300 203 I

  • 7/23/2019 Asdip3.pdf

    2/3

    Hece we ca use ay aragemet of pixels ad ca makelogical sequece of these pixels to hide secret data.

    T P P

    iJl

    Fig. I Logical sequence of pixels om centre to outer side

    Stng Point Tenan2 Point

    \

    .

    -l.

    Fig. 2 Logical sequence of pixels towards centre om outer side

    . PROPOSED WO

    our work, we proposed folloig methods of hidg databased o radom bits of radom pixel positios of a image.

    Replacing Intermediate Bit

    Usig this tecique, ay bit or ay termediate bit oma give bte (of a pixel value) ca be replaced by the bit of adata to be hidde.

    For ex. Origal data is -

    10101110

    01010100

    LE I

    COVRDAA

    00011101 11001101

    11101111 10110001

    Message to hide is - 000

    11110001

    10101000

    Bits are replaced accordig to ay radom sequece omSB to MSB positio

    LE IT

    COVRDAA + DAA= G

    10111110 00011111 11001101 111000015t

    Bitn

    a Bit6

    t

    Bit4

    t

    Bit

    01011100 11101111 10100001 101010104

    t

    h Bit 3f

    d Bit5t

    h Bitn

    d Bit

    Uderled bits shows the bits of secret message arereplaced ith the bits of origal data at that positio.

    B. Raster Scan Principle

    This method is simila to Raster Sca prciple ofdisplayig a image o RT display. I this, pixels omalteate horizotal les ae used for replacig the secretiformatio. A smple SB scheme ca be used for pixels ofrst horizotal le. The secod le is skipped. Aga thrdle is used to hide secret formatio ad so o. e ca also

    use : terlacig, 4: terlacg ad so o.osider origal data -

    LE III

    COVRDAA

    10101110 00011101 11001101

    11100010 01011011 00111001

    10101010 11100010 00101010

    00000000 00011100 1100001 0

    M o d - 000

    11110001

    11000111

    01011100

    11111110

    Message will be hidde usig followig tecique.

    LE IV

    COVRDAA + DAA= G

    00 0000 0000 000011100010 01011011 00111001 11000111

    000 000 00000 00000000000 00011100 1100001 0 11111110

    above table, idividual bits of secret message arereplaced ith bits of origal pixels. Pixels are selectedaccordg to the raster sca method.

    Random an Principle

    This method is similar to Radom Sca prciple ofdisplayig a image o RT display. this, the sequece, which pixels are dra, they are used to hide secretiformatio. Aga ay simple data hidg algoritm lke SB,ca be used to hide secret iformatio. By this method, dataca be hidde radom pixels a mage.

    10101110

    11100010

    10101010

    00000000

    LE V

    COVRD

    00011101 11001101

    01011011 00111001

    11100010 00101010

    00011100 1100001 0

    M o d - 000

    11110001

    11000111

    01011100

    11111110

    Message will be hidde usig followig tecique.

    LE VI

    COVRDAA + DAA= G

    00 00011101 000 000011100010 0000 00111001 11000111000 11100011 0000 0101110100000000 00000 1100001 0

  • 7/23/2019 Asdip3.pdf

    3/3

    I this table, dividual bits of secret message are replaced stegaography, based o spatial doma stegaography adwith dividual bits of origal pixels. here pixels are radom bit stegaography.selected radomly.

    D. Colour based data hiding

    I this scheme oe xed colour is used to hide secret data.

    Itesity values of this xed colour are coverted to biayformat ad the secret formatio is hidde this biay data.

    For ex. cosider a gray scale 8 bit image, havg tesityvalues ragg om 0 to 55.

    Suppose we have xed a colour, whose tesity value is55. Bary value of this is - 000.

    e ill d total umber of pixels om a mage, havgthe same tesity value.

    Suppose there are 50 pixels foud. The we ca hide secretiformatio these 50 pixels, usig ay data hidg

    tecique like - SB etc.e ca exed this tecique by takg more tha oe

    xed colour of pixels, om a mage.

    E Shape based data hiding

    I this scheme, ay shape ca be take to hide the data a image. For ex. cosider a iagular shape. As sho gure below.

    Fig. 3 Shape based datahidg

    Accordig to gure, secret formatio ca be hidde oly the pixels which are available iagular shape, stead ofhidg secret formatio whole image. e ca use ayshape havg ay dimesios.

    e ca exted this tecique, by usig ay shape of aydimesio at ay place a mage.

    IV.ONUSIONI this paper, alog with existg teciques of image

    stegaography, some ew methods for hidg data magesare discussed. Data ca be hidde pixels. Physical locatioof these pixels ca be decided usig the teciques which aredescribed i this paper. Aer selectig radom pixels, thesecret data ca be hidde radom bits, which are

    represeted the btes of biary digits. hile selectig thesepixels, may parameters om a mage are cosidered for ex.olour of pixels, physical locatio of pixels etc. Based o

    these parameters ad by cosiderg some more parametersom a mage, we ca derive some more teciques of image

    EFEENES[1] li K Hmood, B B Zaindan, -an overview o n hiding nformaton

    techniques in imagesl journa of applied sciences 10 (18): 20942100

    2010 ISSN 18125654.2010 Asian network for scientic information.

    [2] Saneev Manchanda, Mayank De S. B Sngh -Customized andsecure image steganography through random numbers ogic Signal Processing:an International Joual, Volume 1: issue (I).

    [3] Mohammad anvir Parvez, Adnan Abdulziz Gutub, -RB ntensitbased variabe bits image stegaographyl 2008 IEEE AsiaPacic ServicesComputing Conrence.

    [4] Rengaraan mirtharaan, Jiaohua Qin, John Bosco BalagurRayappan. Inrmation echnology Jour nal 11(5): 566576 2012ISSN 181256382012 sian Network for Scientic Infoation.

    Dr. Samidha Dwivedi Sharma is cently working as a Head of theDepment of Information Technology. NRI Group of Institutions.Bhopal. MP. IDIA She has of more than 15 Yes teachingexperience in different esteemed university She Worked as aChairperson (HOD) of Information System with King Abdulaziz

    University (Female Section). Rabigh. Saudi rabia om 2010 to2011 e as been teacig for 15 yearsShe completed herbachelor's degree in Science (BSc) with Mathematics subject in 1992om Dr H S Gour Central University (formerly. Sagar University)Sagar. M p India She received her Master degree in ComputerApplication in the year 1997 om Barkatullah University. Bhopal.

    India She has obtained Ph D Degree in Computer Science andApplication om Dr H S Gour Central University (formerly. Sagar

    University) Sagar. M p India Her elds of interests e DatabaseManagement Systems. Mobile database. Data Structure and mobile

    computing She has published 5 national d inteational researchpapers She is a life member ofSTE

    Dipesh Agrawal was bo on January 6. 1983 in Nasik. Mahashtra,India He has received the BE degree in Computer Engineering frommrutvahini College of Engineering, Pune University, Pune,Maharashtra. India, in Sept 2007 He is cently pursuing his MTechdegree in Information Technology om NRI Institute of Science andTechnology. RGTU University. Bhopal. Madhya Pradesh. India Hisareas of interest include Image Processing. Steganography andInformation Security