Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Rahul ., Jyoti
DOI Link: https://doi.org/10.22214/ijraset.2023.57655
Certificate: View Certificate
An image steganographic scheme is one kind of steganographic systems, where the secret message is hidden in a digital image with some hiding method. Someone can then use a proper embedding procedure to recover the hidden message from the image. The original image is called a cover image in steganography, and the message-embedded image is called a stego image. This Steganography technique is more popular in recent year than other steganography possibly because of the flood of electronic image information available with the advent of digital cameras and high-speed internet distribution. It can involve hiding information in the naturally occurred noise within the image. In this paper we provide a review on various image steganography techniques.
I. INTRODUCTION
The rise of internet plays an important role in information technology. Nowadays use of internet has been increasing day by day. Providing security has also become important issue due to the use of internet. Cryptography [1] and Steganography are the ways to provide the security to the information. Cryptography is used to encrypt the message so that it is protected from any third parties. Steganography is a method that is used to hide information in a cover so that nobody can guess it. The cover can be any image, text, audio or video. Steganography [2] defines from Greek word ‘Stegnos’ means secret and ‘Graphy’ means writing so overall means secret writing. The goal of Steganography is to hide the information whereas cryptography is used to protect the information from intruder or hacker. Due to the availability image file has been popularly used as the carrier.
Embedding data which is to be hidden requires two files first is innocent-looking image that will hold the hidden information, called the cover image. The second file is the message the information to be hidden [3]. Firstly the cover image and hidden message are combined to form stego image. A stego key is used to hide the message and then to extract the message. Most Steganography software use lossless 24 bit images such as BMP rather than JPEG. Each pixel is represented as a single byte in 8 bit GIF files. Pixel value is between 0 and 255.Pixel. Data is index to the color palette with 256 possible colors.
II. IMAGE STEGANOGRAPHY TECHNIQUES
Image Steganography techniques can be classified into two broad categories [4]:
Image domain also known as spatial domain techniques embed messages in the intensity of the pixels directly, while for transform domain also known as frequency domain, images are first transformed and then the message is embedded in the image
A. Image Domain
Image domain techniques encompass bit-wise methods that apply bit insertion and noise manipulation and are sometimes characterized as “simple systems”. The image formats that are most suitable for image domain steganography are lossless and the techniques are typically dependent on the image format.
Pixels: (00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
A: 10000001
Result: (00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001000 00100110 11101001)
2. LSB and Palette Based Images: Palette based images, for example GIF images, are another popular image file format commonly used on the Internet. By definition a GIF image cannot have a bit depth greater than 8, thus the maximum number of colours that a GIF can store is 256. GIF images are indexed images where the colours used in the image are stored in a palette, sometimes referred to as a colour lookup table. Each pixel is represented as a single byte and the pixel data is an index to the colour palette. The colours of the palette are typically ordered from the most used colour to the least used colours to reduce lookup time.
GIF images can also be used for LSB steganography, although extra care should be taken. The problem with the palette approach used with GIF images is that should one change the least significant bit of a pixel, it can result in a completely different colour since the index to the colour palette is changed. If adjacent palette entries are similar, there might be little or no noticeable change, but should the adjacent palette entries be very dissimilar, the change would be evident. One possible solution is to sort the palette so that the colour differences between consecutive colours are minimized. Another solution is to add new colours which are visually similar to the existing colours in the palette. This requires the original image to have less unique colours than the maximum number of colours (this value depends on the bit depth used).
Using this approach, one should thus carefully choose the right cover image. Unfortunately any tampering with the palette of an indexed image leaves a very clear signature, making it easier to detect. A final solution to the problem is to use greyscale images. In an 8-bit greyscale GIF image, there are 256 different shades of grey. The changes between the colours are very gradual, making it harder to detect.
B. Transform Domain
Steganography in the transform domain involves the manipulation of algorithms and image transforms .These methods hide messages in more significant areas of the cover image, making it more robust Many transform domain methods are independent of the image format and the embedded message may survive conversion between lossy and lossless compression.
One of these properties of JPEG is exploited to make the changes to the image invisible to the human eye. During the DCT transformation phase of the compression algorithm, rounding errors occur in the coefficient data that are not noticeable. Although this property is what classifies the algorithm as being lossy, this property can also be used to hide messages. It is neither feasible nor possible to embed information in an image that uses lossy compression, since the compression would destroy all information in the process. Thus it is important to recognize that the JPEG compression algorithm is actually divided into lossy and lossless stages. The DCT and the quantization phase form part of the lossy stage, while the Huffman encoding used to further compress the data is lossless. Steganography can take place between these two stages. Using the same principles of LSB insertion the message can be embedded into the least significant bits of the coefficients before applying the Huffman encoding. By embedding the information at this stage, in the transform domain, it is extremely difficult to detect, since it is not in the visual domain.
In level of steganography some steganographic algorithms can either be categorized as being in the image domain or in the transform domain depending on the implementation.
C. Patchwork
Patchwork is a statistical technique that uses redundant pattern encoding to embed a message in an image. The algorithm adds redundancy to the hidden information and then scatters it throughout the image. A pseudorandom generator is used to select two areas of the image (or patches) patch A and patch B. All the pixels in patch A is lightened while the pixels in patch B are darkened. In other words the intensities of the pixels in the one patch are increased by a constant value, while the pixels of the other patch are decreased with the same constant value. The contrast changes in this patch subset encodes one bit and the changes are typically small and imperceptible, while not changing the average luminosity.
A disadvantage of the patchwork approach is that only one bit is embedded. One can embed more bits by first dividing the image into sub-images and applying the embedding to each of them. The advantage of using this technique is that the secret message is distributed over the entire image, so should one patch be destroyed, the others may still survive. This however, depends on the message size, since the message can only be repeated throughout the image if it is small enough. If the message is too big, it can only be embedded once.
The patchwork approach is used independent of the host image and proves to be quite robust as the hidden message can survive conversion between lossy and lossless compression [8].
D. Spread Spectrum
In spread spectrum techniques, hidden data is spread throughout the cover-image making it harder to detect. A system proposed by Marvel et al. combines spread spectrum communication, error control coding and image processing to hide information in images.
Spread spectrum communication can be defined as the process of spreading the bandwidth of a narrowband signal across a wide band of frequencies. This can be accomplished by adjusting the narrowband waveform with a wideband waveform, such as white noise. After spreading, the energy of the narrowband signal in any one frequency band is low and therefore difficult to detect. In spread spectrum image steganography the message is embedded in noise and then combined with the cover image to produce the stego image. Since the power of the embedded signal is much lower than the power of the cover image, the embedded image is not perceptible to the human eye or by computer analysis without access to the original image.
III. EVALUATION OF DIFFERENT TECHNIQUES
All the above mentioned algorithms for image steganography have different strong and weak points and it is important to ensure that one uses the most suitable algorithm for an application. All steganographic algorithms have to comply with a few basic requirements. The most important requirement is that a steganographic algorithm has to be imperceptible. The authors propose a set of criteria to further define the imperceptibility of an algorithm [8].
These requirements are as follows:
The following table 1 compares least significant bit (LSB) insertion in BMP and in GIF files, JPEG compression steganography, the patchwork approach and spread spectrum techniques as discussed in previous section.
Table 1: Comparison of Image Steganography Algorithms
|
LSB in BMP |
LSB in GIF |
JPEG compression |
Patch work |
Spread spectrum |
Invisibility |
High |
Medium |
High |
High |
High |
Payload capacity |
High |
Medium |
Medium |
Low |
Medium |
Robustness against statistical attacks |
Low |
Low |
Medium |
High |
High |
Robustness against image manipulation |
Low |
Low |
Medium |
High |
Medium |
Independent of file format |
Low |
Low |
Low |
High |
High |
Unsuspicious file |
Low |
Low |
High |
High |
High |
The rise of internet plays an important role in information technology. Nowadays use of internet has been increasing day by day. Providing security has also become important issue due to the use of internet. An image steganographic scheme is one kind of steganographic systems, where the secret message is hidden in a digital image with some hiding method. Someone can then use a proper embedding procedure to recover the hidden message from the image. The original image is called a cover image in steganography, and the message-embedded image is called a stego image. In this paper we studied a review on various image steganography techniques.
[1] K. Pachghare, Cryptography & Information Security, Prentice-hall of India Pvt Ltd [2] Eric Cole, Hiding in Plain Text, Wiley Publishing, Inc. :2003 [3] Stefan Katzenbeisser and Fabien A. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Norwood, MA, USA, 2000. [4] Brainos II, A. C. A Study of Steganography and the Art of Hiding Information, East Carolina University, November 13, 2003. [5] Artz, D. Digital Steganography: Hiding Data within Data. IEEE Internet Computing, May 2001. IEEE. [6] T. Morkel , J.H.P. Eloff, M.S. Olivier, “An overview of image steganography” Information and Computer Security Architecture (ICSA), 2010 [7] Neil F. Jonhson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, pp 26-34, IEEE 1998. [8] A. Cheddad, J. Condell, K. Curran and P.M. Kevitt, \\\"Digital image steganography: survey and analysis of current methods.\\\" Signal Processing Journal, 2010.. [9] K B Raja, Venugopal K R and L M Patnaik, \\\"A Secure Stegonographic Algorithm using LSB, DCT and Image Compression on Raw Images\\\", Technical Report, Department of Computer Science and Engineering, December 2004. [10] P. Kruus, C. Scace,M. Heyman, and M. Mundy. (2003), \\\"A survey of steganography techniques for image files.\\\", Advanced Security Research Journal, 2003. [11] E Lin, E Delp, “A Review of Data Hiding in Digital Images”, Center for Education and Research Information Assurance and Security, 2011.
Copyright © 2023 Rahul ., Jyoti . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET57655
Publish Date : 2023-12-20
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here