New approach in steganography by integrating different LSB algorithms and applying ra
#1


Presented by:
A.Karthic

[attachment=11043]
New approach in steganography by integrating different LSB algorithms and applying randomization concept to enhance Data Security
ABSTRACT:
In this paper we propose a new technique in steganography to hide the information to be hidden with digital image. Here we take BMP image to hide the data. We take most common Steganography algorithm LSB as base and made some changes in it based upon our innovative idea that is integration of first LSB algorithm and second LSB algorithm. We consider here security as main aspect. So, we also apply randomization concept for selecting the pixel in image to hide data. Random values are generated upon secret key. Hackers cannot find random numbers unless they have key with them. Detailed visual and statistical analysis of the algorithm reveals that it yields satisfactory results. When compared with other existing algorithms, it is easy to prove that the difficulty of decoding the proposed algorithm is high.
INTRODUCTION TO STEGANOGRAPHY:
Similar to cryptography, steganography provides a means of communicating secret messages. While cryptography scrambles a message so that it cannot be understood, steganography hides the very existence of the message by hiding it inside a carrier file of some type. An eavesdropper can intercept cryptographic message, but may not even know a steganography message exists. Encryption and steganography achieve the same goal via different means. Encryption encodes the data so that an unintended recipient cannot determine its intended meaning. Steganography, in contrast attempts to prevent an unintended recipient from suspecting that the data is there. Combining encryption with steganography allows for a better private communication.
The goal of steganography is to avoid drawing suspicion to the transmission of the secret message. On other hand, steganalysis is a way of detecting possible secret communication using against steganography. That is, steganalysis attempts to defeat steganography techniques. It relies on the fact that hiding information in digital media alters the carriers and introduces unusual signatures or some form of degradation that could be exploited. Thus, it is crucial that a steganography system to ascertain that the hidden messages are not detectable.
METHOD DETAILS:
A. Message & Image Manipulation

The secret message to be hidden in the cover is converted to a bit stream which allows equivalent bit manipulation of the cover, depending on the values in the bit stream of the message. The current system demands that once the bit stream is obtained, it is broken into 8-bit blocks. Similarly, the image is broken into 8-pixel blocks, with each pixel of the block corresponding to a bit in the 8-bit block.
B. Traditional Least Significant Bit Substitution
LSB substitution is the most popular method used for Steganography due to its ease of application and less perceptual impact. The current embedding process uses LSB Steganography as the basis to implement a more robust technique. The secret message is converted to a bit stream and each bit of the message is embedded into the LSB of the pixels of the image. This ensures that the pixel value changes almost by one, which does not result in a significant change in the image quality perceptually. The word almost used here is significant as probabilistically there is 50% chance the LSB to be changed is already the one desired, and, hence no change to the image is made.
First LSB algorithm
1 0 0 1 0 0 0 1
Here only the last bit of the pixel is modified to hide the data. It is implemented highly because of its simplicity and good picture quality.
Second LSB algorithm
1 0 0 1 0 0 0 1
Here last two bits are subjected to change to increase the amount of data to be hidden. Eventually the picture quality is less than our first LSB algorithm.
C.INTEGRATION OF ALGORITHMS
The improvement of LSB information hiding algorithm mainly aims at the images of BMP type. Research revealed that, the reaction of human eyes to Red, Blue and Green is different. According to the brightness formula:
I = 0.3R + 0.59G + 0.11B
And the theory of the human visual cells sensitivity of colour, human eyes are most sensitive to the green, the next is to the red, and the least is to the blue [6]. Therefore, the different least bits of brightness components of the red, green, and blue of each pixel can be replaced by the hiding data. And according to the basic principle of the Least Significant Bits Information Hiding algorithm, the effect of replacing the least bit on original data is only 1, the second least bit replacement’s effect is 2, and the third’s is 4, and so on, the nth is 2n−1 . The higher the bit, the greater effect is. By taking advantage of the less eyesight relevance to the lower bits, the data to be hidden are embedded into the lower (first few least) bits of each pixel. If the least bit is changed in green component of the colour, the resulting effect on the brightness is 20 × 0.59 = 0.59. If the same change is made to red component, the effect on the brightness is 20 × 0.3 = 0.3. If the first 2 least bits of the blue component are altered, the effect on the brightness is (20 + 21) × 0.11 = 0.33. So, all
Effects are not greater than the maximum change in brightness the traditional LSB algorithm brings about: 20 × 0.59 = 0.59, which cannot be perceived by human eyes. Thus, for each 3-byte in the bitmap, 1+1+2=4 bits can be used for replacement. This means an increase in the hiding efficiency by about 17%, a great improvement by this improved LSB algorithm, compared with using the tradition LSB method. Moreover, there is no impact on the hiding result.
Reply
#2
show me some new methods please
Reply
#3
to get information about the topic steganography project full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-steganography-full-report

http://studentbank.in/report-steganograp...port--8121

http://studentbank.in/report-steganograp...d-abstract

http://studentbank.in/report-steganograp...ed-in-java

http://studentbank.in/report-steganograp...121?page=5

http://studentbank.in/report-steganograp...121?page=2

http://studentbank.in/report-steganograp...121?page=4

http://studentbank.in/report-audio-steganography

http://studentbank.in/report-video-steganography

http://studentbank.in/report-new-approac...pplying-ra

http://studentbank.in/report-steganograp...121?page=3

http://studentbank.in/report-steganography--10609

http://studentbank.in/report-image-steganography

http://studentbank.in/report-an-overview...ganography
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: integrating technology into art, steganography algorithms list, lilitha s opening date for applying, simple lsb substitution, new approach in steganography by integrating different lsb algorithms and applying ra, watkins refers to the skills of attracting highly skilled workers of integrating new workers and developing and retraining cu, methods and algorithms in steganography 2012,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,081 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,057 15-02-2017, 03:40 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 721 14-02-2017, 11:26 AM
Last Post: ijasti
  Steganography implemented in Java science projects buddy 14 12,158 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  steganography full report project report tiger 31 33,830 07-07-2015, 02:57 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,964 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,702 27-01-2015, 12:09 AM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,259 19-09-2014, 12:52 AM
Last Post: [email protected]
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,766 04-02-2013, 04:49 PM
Last Post: seminar details
  application projects in java and vb.net (titles and topics) project topics 1 5,481 28-11-2012, 01:11 PM
Last Post: seminar details

Forum Jump: