ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

A New Approach to Secure Communication with Steganography and Cryptography

Sourav Dinda
Department of CSE, Bengal Institute of Technology & Management, Santiniketan,India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

In this paper we hide the message (data), using the concept of Steganography; in such a way that on-one apart from the sender and intended recipient even realizes there is a hidden message. The proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The new approach is based on the LSB (Least Significant Bit) method. Also a new approach is proposed to securely sending the message using Cryptographic concept in Steganography. From the sender side the encrypted message is send and hides it in a saved picture and encodes the message. At the receiver side decryption is done to get original message.

 

Keywords

Steganography, Cryptography, LSB (Least Significant Bit), Image Pixel.

INTRODUCTION

Today, the term steganography includes the concealment of digital information within computer files.At that time, computational security needs have been focused on different features secrecy or confidentiality. This has resulted in an explosive growth of the field of information hiding. Moreover, the rapid growth of publishing and broadcasting technology also requires an alternative solution in hiding information. The copyright of digital media such as audio, video and other media available in digital form may lead to large-scale unauthorized copying. The problem of unauthorized copying is of great concern especially to the music, film, book and software publishing industries.
To overcome, here I have proposed a new approach so that from the sender’s side the data will be send securely to the receiver’s side. By proposed method user can select an image file for data hiding and save it as the output file. The saved output image file will contain the secret message hidden inside it. Only receiver will able to read actual message after decoding the image file containing the hidden data. To retrieve the messages from the picture select the particular image. Then we get the information about the picture.
The purpose of the paper is to create a medium to transfer data securely using steganography. In this paper we use the image file as a cover and encode the text message into the image. After encoding we will save the encoded image file (containing the actual message) with the new file name. The encoded image file is sent to the destination point. The receiver at the destination can get the actual text message by decoding the image file.

PROPOSED METHODOLOGY

The proposed system provides facility to hide data within the file, before the end of the file. This is efficient while transferring the image through the network. In this system the data will be Steganographic using LSB method. The simplest approach to hiding data within an image file is called least significant bit (LSB) insertion. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image. If we are using 24-bit colour, the amount of change will be minimal and indiscernible to the human eye. Any colour pixel is made of a combination of RED-GREEN-BLUE (RGB) .Where in each RGB components consists of 8 bits. If the letters in ASCII are to be represented within the colour pixels, the rightmost digit, called the Least Significant Bit (LSB), can be altered. Any variation in the value of this bit leads to minimal variation in colour. GIF and 8-bit BMP files employ what is known as lossless compression, a scheme that allows the software to exactly reconstruct the original image. JPEG, on the other hand, uses lossy compression, which means that the expanded image is very nearly the same as the original but not an exact duplicate. If we have to hide word 'AIG' in the image, we take the LSB of every colour and hide each bit of the word in its RGB Combination. To insert letter "A", we modify three colour pixels with 3 bits in each colour pixel.
Let us think of our original pixel (a single image pixel) as bits:
(R7 R6 R5 R4 R3 R2 R1 R0, G7 G6 G5 G4 G3 G2 G1 G0, B7 B6 B5 B4 B3 B2 B1 B0)
Our message (single message character) bits look likes – (c7 c6 c5 c4 c3 c2 c1 c0)
Then we can place three of these character bits in the lowest red pixel, three more in the lowest green pixel, and the last two in the lowest blue pixel as follows:
(R7 R6 R5 R4 R3 c7 c6 c5, G7 G6 G5 G4 G3 c4 c3 c2, B7 B6 B5 B4 B3 B2 c1 c0)
Original pixel of image (225, 100, 100)
Original pixel of image= (11100001, 01100100, 01100100 )
Message character – “a” value= (0 1 1 0 0 0 0 1) //ASCII VALUE
After applying steganography theory, we got Image’s pixel + message bits = (11100100, 01100100, 01100101)
i.e. New pixel = (11100100, 01100100, 01100101)
new pixel = ( 228,100, 101 ) and old pixel = (225, 100, 100)
So, we find there is small change in pixel value, so the actual image and encoded image looks almost same.
Also, the proposed following Algorithm for sending encrypted data through the Image Steganography:
Encryption:
Step-0:Check whether Client is properly connected with the Server or not.
Step-1:Accept Plain Text (generally called Text) from the sender.
Step-2:Make sure the Key, generated by the Sender’s side, received by Receiver.
Step-3:Find out the ASCII value for each character of the Plain Text.
Step-4:Find out Encrypted value by adding the ASCII value and RANDOM key value. The character for the corresponding
Encrypted value will be the Cipher Character.
Step-5:Form the Cipher Text or Encrypted Text from the each encrypted characters.
Step-6: Embedded the Encrypted Text in an image and encode it (using above proposed method)and send through a medium to the Receiver’s side.
Decryption:
Step-7:decode the message from the image using our proposed method.
Step-8: decoded message decompose into a character array for the Cipher Text.
Step-8:Find out the ASCII value for each character for cipher text.
Step-9:Find out the ASCII Value for the Plain Text character by deducting the Key value from the ASCII Value.
Step-10:Generate the character for the corresponding ASCII Value.
Step-11:Form the Original Text or Plain Text from array of characters and get original Message from the Sender.

DESIGN FLOW, INTERFACE DESIGN & ALGORITHM

Image file is now sent through a medium to the intendant recipient. In the receiver’s side, by using the decoding algorithm hiding text message in the image is decoded & original text will be shown.
 
In Figure (1.2), the interface design has been shown in the following. In Encoding section user will type the intendant message and select the image file (in bmp format) where the message’s character ASCII value & RGB value (in terms of 8 bits) are formulated(i.e., encoding) with my proposed algorithm and the hiding message in the image are saved in the another file with a given stegno key.
In decoding interface section, first we have to select the saved encoded image file. By means of decoded key and stegno key, decode the image file and extract the original message which is send by the sender.
In figure (2.1), from the sender’s side the original text message is decomposed into a character set and by using a random key the ASCII value of each character is encrypted. The encrypted message is then send to the proposed Image
Steganographic interface, we will found the original encrypted message. Now by using sender key, the encrypted message is Decrypted (block: decryption) and original message is received by the receiver.

EXPERIMENTAL RESULTS & DISCUSSION

From the proposed methodology, I develop an interface for Image Steganography, where user can type his/her message in the text area (see Output Window: 1.1) then select the image file in which the text will be encoded (in Output Window: 1.2).
Then we have to save the encoded image file in another name that is shown in output window: 1.3
When we want to get original message, the select the saved encoded image file (see Output Window: 1.4) and the select decode option for original output.(in Output Window: 1.5)
In another proposed algorithm by using own cryptographic principle the message “BITM” is encrypted with random generated key 13 (see Output Window: 2.1) and shown the decrypted message(shown in Output Window: 2.2).
The decrypted message is then send to the Image Steganographic interface and lastly we found the original message. Here the data will be more secured.

CONCLUSION

I conclude by finding that Steganography offers a great potential for security of data copyright and detection of infringers. Through Steganography all artistic creations pictures and songs can be protected from piracy. Most data hiding systems take advantage of human perceptual weaknesses, but have weakness of their own. It seems that no system of data hiding is totally immune to attack. However Steganography has its place in security. So, I have doing to secure the user data in a new approach with the concept of steganography and in other way I have coded double security so that no one can hack, except the sender & receiver, the data. It will be useful in Government & Law enforcement section for secured ITES related work, in Banking sector and Communication between two diplomats of two countries.

Figures at a glance

Figure 1 Figure 2 Figure 3 Figure 4
Figure 1 Figure 2 Figure 3 Figure 4
Figure 5 Figure 6 Figure 7
Figure 5 Figure 6 Figure 7

References