A combination of picture and text steganography

  • Category: Science
  • Words: 2161
  • Published: 12.03.19
  • Views: 765
Download This Paper

Pages: 5

Abstract— Steganography is the fine art and technology of hiding information simply by embedding text messages within other, seemingly safe message. In this paper, we proposed a brand new method which can be more secure and reliable. In conventional LSB method, the LSB little bit is used to embed secret bit. With this method, all of the eight components of a cote is used to embed a secret little bit. All the pieces from MSB to LSB of each pixel is compared to a secret bit plus the position from the bit that matched with the secret little bit is placed. After sneaking in all the secret bits an array of positions is definitely produced. The positioning array can now be secured in a text, photo, audio or video and sent to the receiver online. The cover image can be not delivered but the term of the cover image is definitely sent figuratively, metaphorically. In this paper, we used the DNA approach to safeguarded the position array which is textual content steganography. While data happen to be embedded within a cover graphic without any improvements, lowest MSE and highest PSNR worth is assessed. The payload capacity is likewise maximum.

Keywords— Picture Steganography, Textual content Steganography, LSB, DNA, Payload Capacity.

I. INTRODUCTION

Today, the internet is a public, cooperative and self-sustaining facility accessible to hundreds of millions of individuals worldwide. So , the security is the most common concern of information technology and communication. Cryptography is a means of securing info with the objective of converting information into unreadable ciphers (an encrypted item of text). A large number of cryptographic methods have been suggested to secure details. But the issue with the cryptography is that the existence of information is usually understandable. Steganography is suggested to hide the presence of information. Steganography deals with sneaking in information within a given media without making any obvious changes in that. Steganography originates from the Greek words “stegos” and “grafia” meaning protected writing. Steganography is labeled based on cover media. Text message, image, sound, video, and protocol are being used as cover.

In text steganography, the information is usually hidden behind some other text. In photo steganography, an image is used because cover to hide information. It is the most common strategy because of the constraint of the man visual system (HVS). The human eye cant find the huge selection of colors and insignificant changes in the quality of the image that results from steganography. Least Significant Bit (LSB) replacement technique is the most common technique for image steganography. The LSB bit of every single pixel in the cover photo is used to embed the trick message.

This paper proposed a new method of concealing information by simply combining picture and textual content steganography. Picture steganography will be based upon our individual visual system (HVS). Now a days steganography is very much well-known. As a result online hackers are aware of this technique. They attack stego pictures to break the steganography and reveal the knowledge. Many methods have been suggested to improve the changes in stego photos results from steganography. But still provides the chance of problems as some alterations occurred on stego photo due to concealing the information in it. In this paper, all of us propose a brand new technique where the information is usually hidden in an exceedingly cover photo without making any changes in it. We hide information in any from the eight components of each pixel that matches with the secret parts. Then we all store the position of pieces that meet. After covering all the top secret bits we get a position mixture. Then all of us secure the position array by simply DNA way which is text steganography. GENETICS, or deoxyribonucleic acid, is definitely the hereditary material in humans and almost other organisms. Following the completion of the text steganography a unique DNA series is found. DNA sequence is the composition of four nitrogenous basics of DNA (Adenine, Thymine, Cytosine, and Guanine). This sequence is definitely sent online instead of sending the stego image. The cover photo must can be found on the receiver’s computer.

2. EXISTING WORKS

Rupali Bhardwaj ainsi que al. [8] proposed a technique which provides three levels of security, complementing top secret message, covering the complemented message in cover photo pixels that happen to be selected at random, inverted tad LSB steganography is used. A random seed is used to choose the random -pixels and the meaning bits are embedded whatsoever significant little bit of chosen nullement.

Huda Dheyauldeen Najeb et al proposed a method that combines text and image steganography which is based on LSB and bit aircraft slicing. Initial, a text file can be hidden inside a greyscale cover image making use of the LSB method. The stego1 image can then be embedded within another cover image employing bit planes slicing.

Yogita Birdi et approach. [10] proposed a method that encrypts the info and then embeds within an image using the raster scan technique. This method applied the raster scan approach of CRT display. Pieces are embedded in the cover image in left to right and right to still left scan.

Shivani Chauhan et approach. [11] recommended a method which will take a great RGB image as a cover image plus the secret textual content is hidden in three aircraft of RGB image. The secret text can be encrypted first using symmetrical key cryptography technique. Then this ciphertext is usually hidden in three planes of RGB graphic using raster scan technique. 2 bits are inlayed in the LSB of reddish colored plane. 2 bits are embedded in LSB of green planes using raster scan (first scan still left to right and next search within right to left). 4 bits are inserted in LSB of blue plane employing raster search within (first scan top to bottom and next scan bottom to top). Better MSE and PSNR are examined.

Giridhar Maji ou al. [12] proposed a technique that uses two pictures named cover image and reference image to add a key message and also a secret key. The cover image can be used to hide top secret data as well as the reference image is used intended for the encoding process. The reference picture is split up into blocks and paired LSB bits are stored in that blocks.

Rishi Agrawal et al. [13] suggested a method that uses a dictionary based alternative method to add data inside the DNA series. The secret concept is converted to 8-bit binary. The binary string can be checked whether it be a multiple of six or not really. If not the extra 0s are added. By using the codon secret bit strings are converted to the DNA series. The codon is the 3 letter mix of DNA bases such as ACTION, GAG, and ATG etc . The DNA sequence is definitely sent to the receiver. This approach ensures decrease cracking probability.

Malathi P ain al. [14] proposed a paper which is based on DNA bases. A random GENETICS sequence is taken. Then the DNA basics are binary converted employing DNA dictionary method and the bases are assigned two-digit binary principles uniquely. The base A is definitely 00, Capital t is 01, G is definitely 10 and C is usually 11. The key message can be converted to ASCII values then converted to binary. The binary bits will be hidden inside binary transformed DNA. Two random essential values are being used. First key K1 is utilized to XOR the communication and make it a ciphertext. The second key K2 is used to segment the binary changed DNA pattern. After covering the secret parts a artificial DNA series is produced and delivered to the recipient.

III. RECOMMENDED METHOD

In this conventional paper, we combined the image and text steganography to better security and payload potential. This method is usually divided into two parts. The first component is picture steganography as well as the second is text steganography.

A. Photo Steganography

Instead of looking at only the LSB bit, all of us use any of the eight components of each pixel to hide a secret little bit. MSB is regarded as as location 1 and LSB as position almost eight. Each bit of secret meaning is compared to all the eight bits from MSB to LSB of each and every pixel. The position of the little bit that combined first while using secret little is trapped in a position mixture. For subsequent secret tad, we take another pixel and compare the key bit with all the eight bits of a cote value. If the bit goes, the position can be stored in similar array. All of us go through each of the secret bits and store the positions. For each secret bit, we get a position benefit. For eight secret parts, we need eight pixels sequentially. We get eight positions. The image steganography is done. The secret message is concealed inside the cover image without any changes.

N. Text Steganography

From this method, Textual content steganography can be used to secure the positioning array. Every single element of the position array is definitely between 1 and almost eight. It needs several bits to symbolize each element of the position array in binary. After symbolizing each element of the position array in binary we get a bit stream. In case the position array has almost 8 elements we have a thirty-two bit long bit stream. We employ DNA method to hide the bit stream. GENETICS consists of 4 nitrogenous facets (Adenine, Thymine, Cytosine, and Guanine). In a nutshell, A, To, G, and C. By making use of these nitrogenous bases we are able to create sequences called DNA sequence. Allow A=00, T=01, G=10 and C=11. We can use the combination of these nitrogenous bases to symbolize the position by simply DNA pattern. That is

1 = 00 01 = AT a couple of = 00 10 = AG

three or more = 00 11 = AC 5 = 01 00 = TA

your five = 01 01 sama dengan TT 6 = 01 10 = TG

six = 01 11 sama dengan TC 8 = a thousand = GA

So , finally, we get a DNA series like ATTTATATATATATAT. For 8-bit secret concept, a DNA sequence of length 18 is made. Text steganography is completed. This kind of text is definitely sent to the receiver. The cover graphic that holds the top secret message pieces must exist in both the senders and receivers pc. Some pictures must be predefined for cover images plus the sender symbolically sent the name of the cover graphic to the recipient.

All the existing strategies improve the MSE and PSNR value by providing an efficient protocol. Our motivation is to accomplish the lowest MSE and highest PSNR worth. In phrases, we want to cover data inside an image without changing the image.

Within our proposed method, the value of MSE is absolutely no. After adding the value of MSE in the equation of PSNR, we got infinity. That means the caliber of the image is definitely 100 % accurate.

Existing strategies improve the MSE and PSNR value by simply decreasing the payload ability. In our approach, payload ability is optimum comparing the existing methods mainly because all the px of the cover image can be used to hide data.

Existing methods will be dependent on picture file forms. But the proposed method is self-employed of picture file types.

From this method, text message steganography can be used to secure the positioning array.

The length of DNA Sequence is definitely 2 5. N.

Here D is the total number of portions that has been inlayed in the cover image.

That means, to get a single persona of the secret message, this kind of algorithm produces a DNA sequence of of sixteen (2 * 8) plans. So to get 100 personas long message, a GENETICS sequence of 1600 duration is produced which is very much secure. If the hacker is plenty genius to break the text steganography and get the position array, the secret meaning is still properly secured as the cover graphic is unfamiliar.

V. BOTTOM LINE

The proposed technique is highly properly secured because the cover image is definitely not distributed through the net. The mixture of image and text steganography makes it more secure than other existing methods. The popular DNA strategy is used in hiding the position array to confuse the hacker. All existing strategies use 8-bit binary portrayal but in this technique, we symbolize each value by some bits. This technique is very simple nevertheless reliable and efficient. The main concern is that the cover graphic must can be found in the receiver’s computer. The sender should never send the cover graphic over the internet. Therefore the security of hidden info is certain. In future, you want to provide a better algorithm to get securing the position array employing an image, audio tracks or online video steganography.

Need writing help?

We can write an essay on your own custom topics!