You are on page 1of 4

Volume 5, Issue 2, February – 2020 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Random Pixel Selection Based Improved


LSB Image Steganography Method Using 1 D
Logistic Map and AES Encryption Algorithm
Hasi Saha MST. Rafia Chowdhury
Assistant Professor, Department of CSE Student ID, 1502043
HSTU, Dinajpur, Bangladesh HSTU, Dinajpur, Bangladesh

G C Saha* Masum Billah


Assistant Professor, Department of CSIT Assistant Professor, Department of CSIT
BSMRAU, Gazipur, Bangladesh BSMRAU, Gazipur, Bangladesh

Suraiya Yasmin
Assistant Professor, Department of CSIT
BSMRAU, Gazipur, Bangladesh

Abstract:- Steganography program is mainly concerned I. INTRODUCTION


about covering the way that a mystery message is being
sent, just as hiding the substance of the message. Any The steganography approach relies on hiding secret
computerized picture is contained pixels of various sizes messages inside innocent-looking messages or documents in
of lattices; different picture steganography algorithms order to dissuade the enemy from attempting to find the
have been created. In this research, it has been exploited secret message. There are numerous zones of security
the irregular pixel selection based improved LSB innovation that manages the assurance of secret information;
exchange technique to hide a message into a cover the most significant of these systems are cryptography and
image. We have considered a mystery message and a steganography. The principal system is cryptography which
spread picture. In the LSB approach, the essential is alluded to as "the study of secret". It incorporates
thought is to supplant the Least Significant Bits (LSB) encryption and decoding forms, encryption is the way
of the spread picture with the bits of the message to be toward changing over typical content to mixed up structure,
covered up without wrecking the property of the spread where the sender utilizes an encryption key to scramble the
picture altogether. The LSB-based system is the most message to transmit it through the unreliable open channel.
testing one as it is hard to separate between the spread Unscrambling is the way toward changing over encoded
item and stego-object as not many LSB bits of the content to typical content in the decipherable structure;
spread article are supplanted. In digital image there are subsequently the recreation of the first message is
diverse types of file setup available such as Bitmap, conceivable just if the beneficiary has the decoding key [1].
PNG, JPEG, GIF etc. The proposed method focused on
BMP images as it is uncompressed and convenient file The subsequent system is steganography which is
format to implement LSB steganography technique. characterized as a technique for security that shrouds
Before applying the proposed steganography method, information among the bits of a spread document, where the
we apply AES cryptography technique to encrypt the secret message is embedded in another medium with the
top-secret message to improve the security and it will goal that the very presence of the mystery message isn't
alter the top-secret message to into cipher text. Then perceivable. The spread document can be picture, sound or
through our propose method, we embed the ciphertext video; the most normally utilized being the picture records,
into the LSB of the blue component among RGB value. in which unused or irrelevant bits are supplanted with the
We select pixels randomly through using 1 D logistic secret information [2].
map. This method uses X-OR operation for embedding
and extracting. Various size data are embedded into the However, in our work we first encrypt the message by
images and PSNR are also considered for these images. using AES algorithm. Then we embed the secret message
It is being expected that the suggested technique will into randomly selected pixels through our proposed
able to hide large amount of data and retaining the methodology of embedding ciphertext into cover image. We
advantages of the LSB method. also use a password for filtering.

Keywords:- Steganography; Cryptography; 1 D Logistic


Map; AES Algorithm; Stego Image; PSNR.

IJISRT20FEB123 www.ijisrt.com 40
Volume 5, Issue 2, February – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
II. RELATED LITERATURES password 3 bits block is obtained and used in a circular
manner. The concept is shown below:
LSB steganography is the most broadly utilized
steganographic strategies because of its effortlessness and Secret password: SeCrEtWoRk
clear methodology. The secret message is put away at all ASCII value of password: 83 101 67 114 69 116
noteworthy piece plane of the spread document. This 87 111 82 107
strategy gets hard to recognize as in limited quantity of
changes is being made in the spread picture. Various Binary of password:
creators have utilized the straightforward LSB methods 010100110110010101000011011100100100010101110100
where LSB of pixels are supplanted by the secret bits [3]. 01010111011011110101001001101011
This idea may once in a while represent some genuine
security issues. Variations to the basic LSB based R=10100011 MSB of RGB= 110
steganography can be seen in [4] [5]. E-XOR encrypting G=10101101 3 bit block = 010
algorithm is used [6] to raise the security feature of LSB B=01001101 X-OR value= 100
method. In this, one RGB channels of shield image is R=00110101 MSB of RGB=011
designated and two LSBs of secret data are implanted in it. G=11010001 next 3bit block= 100
In [7], data are embedded by analyzing the block B=10101101 X-OR value= 111
complexity. Al-Bayati, M. have used stowing away of
interactive media secret records in double RGB spread Our proposed technique embeds the size of the
pictures utilizing LSB steganography systems. Mehdi and message first then it embeds the secret message (binary
Mureed improved the Kekre's algorithm on LSB strategy representation of ASCII value of each character) in the rest
and expanded the implanting limit while holding the nature of the pixels.
of stego picture [8]. Disorderly Map Based Random Image
Steganography Using LSB Technique is utilized by Sujarani A. Embedding Algorithm
Rajendran [9]. Singh S. & Kaur J. proposed a method of
Steganography in Exact Color Imageries by Even Odd Bit  Get the secret message
Carving [10].  Encrypt the message with AES algorithm
 Convert the AES cipher into binary
III. RESEARCH METHODS  Get the cover image
 Generate a chaotic sequence for selecting ‘x’ co-ordinate
Data security is a biggest concern of any organization. by using 1 D logistic map where x0=0.12, r =3.95 and
We propose “Dual Layer Security of data using LSB image n=length of the message, then multiply the sequence
steganography method through random selection of Pixels with the number of row and round the result
and AES encryption algorithm”. The main idea of our work  Generate a chaotic sequence for selecting ‘y’ co-ordinate
is to provide dual layer of security to sensitive data or by using 1 D logistic map where x0=0.15, r =3.97 and
messages by hiding it behind the digital images using n=length of the message, then multiply the sequence
proposed Improved LSB image steganography algorithm with the number of column and round the result
and the second layer security is given by encryption of  Select pixels randomly according to the value of (x , y)
secret message using AES-128 bits encryption algorithm.  Get the 10 character password
 Convert the password to binary
128 bits AES cryptographic algorithm takes a key and  Get consecutive 3 bits of the password in circular order
encrypt the plaintext into ciphertext. This ciphertext will be  Collect the MSB bits of a pixel(Red ,Green, blue color
embedded into a cover image using our steganographic component)
technique based on randomness. We select pixels randomly  Perform X-OR operation between the collected MSB
through filtering and the filtering is done by using the MSB bits and 3 bits block of the password
and a password. This method uses a 10 characters or 80 bits  Convert the result of X-OR operation in decimal, Dn
password for both filtering and embedding technique .The  X-OR the message bit with the blue component Dn th bit
characters are first converted to their ASCII value and these  Embed the result into LSB of blue component
ASCII values are converted to binary. From this binary

IJISRT20FEB123 www.ijisrt.com 41
Volume 5, Issue 2, February – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
B. Embedding Flowchart

Fig 1:- Flowchart of Embedding Process

IV. RESULTS AND CONCLUSION applies a circular password and X-OR operation for
embedding the secret message. The message bits are not
24 bit image Oiky.png was used for experiment. The directly embedded in the LSBs of the pixel which makes
output of the program run is remarkably similar to the more difficult to retrieve the cipher by Stegoanalyst. In
original image. The experimental results by applying our addition, the histogram is also showing very negligible
proposed method on different standard images are compared changes.
with other methods we have reviewed.
As the project merges the AES Cryptography with
The proposed algorithm uses random sequence to Steganography, if someone would crack the cipher from
embed message bits and changes very small number of bits cover image (all though, it’s not possible), the attacker will
when embedding a large cipher. The proposed technique have to provide the encryption password to decrypt the

IJISRT20FEB123 www.ijisrt.com 42
Volume 5, Issue 2, February – 2020 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
cipher. And an assumption says that, the attacker will need [8]. AL-Shatnawi, A. M., &alfawwaz, B. M., ‘An
about 1022 years to try all possible keys/password for the Integrated Image Steganography System with
weakest version AES 128 [11]. Improved Image Quality. Applied Mathematical
Sciences”, 2013, Vol. 7, no. 71, pp. 3545-3553.
The aim of our work is to improve the efficiency of [9]. Sujarani Rajendran, ManivannanDoraipandian,
LSB steganography by proposing an improved technique in “Chaotic Map Based Random Image
which pixels are selected randomly by using 1 D logistic Steganography Using LSB Technique”, 2017.
map for embedding message bit. The goal of our technique [10]. Singh S., & Kaur J., “Steganography in True Color
is to make difficult to determine the presence of the secret Images Using Even Odd Bit Slicing”, International
message and to excess the message. We have used a secret Journal of Engineering and Computer Science, 2015.
password and the most significant bits of the pixels for [11]. Satwinder Singh, “Dual Layer Security of data using
performing X-OR operation. Here we do not focus on the LSB Image Steganography Method and AES
capacity of embedding the message in the image rather we Encryption Algorithm”, 2015.
focus on enhancing the security. In our proposed technique
we didn’t embed the message bit directly into the LSB.
Rather we have done X-OR operation of the message bit
before embedding and embed the result into the LSB. Our
method also use AES cryptography algorithm to covert the
secret message into cipher text to add another layer of
security. Our method provides better PSNR value and lower
distortion. So our proposed technique fulfills the
requirements of steganography technique.

ACKNOWLEDGMENT

The authors wish to thank Dr.Ruzinoor Che Mat,


School of Creative Industry Management & Performing
Arts (SCIMPA), Universiti Utara Malaysia, Malaysia,
Kedah 06010 for his patronage to the dissemination of
knowledge, his valuable instructions, able guidance and
keen interest throughout the research. The author is also
grateful for his encouragement, precious comments and
valuable suggestion in preparation for this work.

REFERENCES

[1]. Thakur, J., & Kumar, N., “DES, AES and Blowfish:
Symmetric key cryptography algorithms simulation
based performance analysis”, International journal of
emerging technology and advanced engineering, 2011.
[2]. Singh, S., & Siddiqui, T. J., “A security enhanced
robust steganography algorithm for data hiding”,
International Journal of Computer Science Issues
(IJCSI), 2012, vol. 9, no. 1. pp. 131-139.
[3]. Shahin Shabnam , Prof K Hemachandran, “ 1 LSB
based Steganography using Bit masking method on
RGB planes”, 2016.
[4]. Ziad Alqadi, Bilal Zahran, Qazem Jaber,
BelalAyyoub, Jamil Al-Azzeh, “Enhancing the
Capacity of LSB Method by Introducing LSB2Z
Method”, 2019.
[5]. Rohit Chaudhary, Rishabh Kaushik and TuariqBeg,
“Imagesteganography using improved lsb algorithm”,
2018.
[6]. Sandeep Kumar, “Image steganography using
improved lsb and exor encryption algorithm improved
lsb and exor encryption algorithm”, 2014.
[7]. Gowtham dhanarasi, dr. A. Mallikarjunaprasad,
“Image steganography using block complexity
analysis”, 2012.

IJISRT20FEB123 www.ijisrt.com 43

You might also like