90 PSNR
90 PSNR
90 PSNR
net/publication/331544868
A Robust and Secured Image Steganography using LSB and Random Bit
Substitution
CITATIONS READS
18 913
3 authors:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by U A Md Ehsan Ali on 06 March 2019.
ABSTRACT :In the era of information, secret communication is one of the most important issues in today's
communication systems. The development of digital communication with data secrecy becomes one of the main
purposes of the researchers. Among the data security techniques, steganography is an approach to hide the
existence of secret message in a carrier without being apprehended by the intruders. At present, it is important
to hide data as well as develop mechanisms by transporting them in such a way that the intruders cannot
understand the message. There are various data hiding methods that use different digital media. Digital images
are the most popular among the carrier formats because of their frequency on the Internet. In this paper, a new
approach of image steganography with least significant bit substitution is proposed where the information
embedded in the random bit position of a pixel. The experimental result signifies the importance of the proposed
method.
KEYWORDS: steganography, LSB substitution, data hiding, embedded message, retrieved message.
----------------------------------------------------------------------------------------------------------------------------- ----------
Date of Submission: 22-01-2019 Date of acceptance: 07-02-2019
----------------------------------------------------------------------------------------------------------------------------- ----------
I. INTRODUCTION
Communication in secret ways with others has always been one of the well-known glitches from the
ancient times. Nowadays, although cryptography and steganography are used for secured communication but
they are different in nature [1]-[6]. As cryptography reforms a message, it cannot be understood whereas
steganography hides the message so that it cannot be seen. The aim of steganography is to embed the
communication content in a public cover media [2], [3], [6]. As a result, the presence of concealed message can
be hidden. Digital steganography is the science of transferring information with secret message embedded in it.
Thus, steganography is a form of security technique where the existence of a message is kept hidden between
the sender and the intended recipient. Steganography is classified into 3 categories [2], [8]-[10],
• Pure steganography with no stego key. Here, the communicating parties assume that no other party is aware
of the communication.
• Secret key steganography with the stego key. Here, the communicating parties exchange the key prior to
communication. This is most susceptible to interruption.
• Public key steganography with a public key and a private key. Here, the both keys are used for secure
communication.
In general, Steganography focuses on hiding the secret messages in carriers with unnoticed and less
attractive way. Almost all digital file formats can be used as a carrier, but the suitable formats are those which
have a high degree of redundancy. There are various methods and algorithms of hiding data in different types of
digital file formats. There are many suitable steganographic techniques which are being used to obtain security
depending on the type of the carrier [2], [8]-[10].
• Image Steganography: When an image used as a cover object in steganography, it is known as image
steganography. Generally, pixel intensities of the image are used to hide the information in these
techniques.
• Network Steganography: Taking network protocol, such as TCP, UDP, ICMP, IP etc. as cover object, is
known as network protocol steganography. Here, steganography can be achieved by using unused header
bits of network protocols.
www.ajer.org Page 39
American Journal of Engineering Research (AJER) 2019
• Video Steganography: In video Steganography, the carrier for hidden information is video (combination of
pictures). To hide the information in each of the images in the video, normally, discrete cosine transforms
(DCT) technique is used. Various video formats such as H.264, Mp4, MPEG, AVI etc. are used in video
steganography.
• Audio Steganography: While using audio as a carrier for hiding information, it is called audio
steganography. Because of popularity of voice over IP (VOIP), it has become very important medium.
Digital audio formats such as WAVE, MIDI, AVI MPEG or etc. are used for this steganography.
• Text Steganography: To achieve information hiding in text steganography, different techniques such as
capital letters, white spaces, number of tabs, just like Morse code and etc. is used.
www.ajer.org Page 40
www.ajer.org
American Journal of Engineering Research (AJER) 2019
value was improved by 5.92% and 15.8% in first and second proposed method respectively [13]. A. Singh and
H. Singh proposed a new LSB steganography method where 2-2-4 message bits are embedded in the R-G-B
channels, respectively. In the study, applying the method on 2 different images, PSNR value was improved by
36.44% and 64.54%, respectively [14]. To hide information in grayscale and color images, Goyal, Ramaiya and
Dubey proposed 1-2-4 LSB method with the RSA algorithm to encrypt the message. 4 different images were
used to test the method and up to 41.48% improved PSNR value was achieved [15]. Sugathan proposed a new
LSB steganography algorithm where different embedding direction of message bits was used. Implementing the
method on 10 different images, a 1.32% improvement in PSNR value has been achieved compared to the
classical LSB method [16]. On the other hand, Kaur and Kochhar introduced two different LSB and DCT
techniques were used to perform steganography. Comparing the PSNR values with previous works the method
showed a good result and the security was improved by using DCT [17].
www.ajer.org Page 41
www.ajer.org
American Journal of Engineering Research (AJER) 2019
01000101 and the randomly chosen position is 5, 2, 6, 4, 5, 1, 7 and 4 then the encoding process is illustrated in
Table 1.
V. EXPERIMENTAL RESULT
The proposed steganography method has been implemented in MATLAB (R2014a) using the mostly
available three 24-bit images (Lena, pepper and baboon) with size 512×512as shown in Figure 2and the MSE,
SNR and PSNR have been measured. The message to embed in the entire experiment is "HelloWorld".
www.ajer.org Page 42
www.ajer.org
American Journal of Engineering Research (AJER) 2019
The result shows that the proposed method have the same PSNR value as the standard LSB method,
but the secret message is hidden in the random bit position of the pixel value in the proposed method whereas
the message is hidden in least significant bit of the pixel value in standard LSB. Due to this random bit
substitution, the attackers cannot retrieve the message although they detect the presence of the secret message in
the image. In addition, to enhance the security we can add an encryption technique for the text. Hence, the
proposed method provides a robust image steganography for secured communication.
VI. CONCLUSION
To communicate digitally with each other, and to share and exchange electronic documents among them,
computer-based communications are main and essential in modern life. In order to secured and protected
communication over Internet, the proposed method of image steganography hides the message bit in random
position of the pixel bits and hides a reference like standard LSB technique. Thus, it hides the reference not the
real data. The experimental measures PSNR and MSE for the proposed technique show that the method provides
good performance compared with the standard LSB in regards to invisibility and robustness.
REFERENCES
[1]. Uddin,M.P., Marjan, M.A.,Sadia, N.B.,Islam, M.R.: Developing an Efficient Algorithm to Combine Cryptography and
Steganography Based on ASCII Conversions and Cyclic Mathematical Function, 3rd IEEE International Conference on Informatics,
Electronics & Vision, Dhaka, Bangladesh,May 23-24(2014).
[2]. Islam, M.R.,Siddiqa, A., Uddin,M.P., Mandal, A.K., Hossain, M.D.: An efficient filtering based approach improving LSB image
steganography using status bit along with AES cryptography, 3rd IEEE International Conference on Informatics, Electronics &
Vision, Dhaka, Bangladesh, May 23-24(2014).
[3]. Uddin,M.P.,Saha, M.,Ferdousi, S.J., Afjal, M.I., Marjan, M.A.: Developing an Efficient Solution to Information Hiding through
Text Steganography along with Cryptography, 9th IEEE International Forum on Strategic Technology, CUET, Bangladesh, October
21-23, (2014).
[4]. Uddin,M.P., Afjal, M.I., Nitu, A.M., Islam, M.M., Marjan, M.A.: Development of a Symmetric-key Cryptographic Algorithm based
on ASCII and Radix Conversions, Institutional Engineering and Technology (IET), 5(1):19-24, April, (2015).
[5]. Basak, P., Arjuman, L., Nitu, A.M., Afjal, M.I., Uddin,M.P., Rabbi, M.F., Islam, M.R.: A Modified Blind Steganalysis Method
Based on the Moments of Characteristic Function, HBRP Advancement in Software Engineering and Testing, Volume 1 Issue 2,
pp. 1-9 (2018).
[6]. Sultana, S., Khanam, A., Islam, M.R., Nitu, A.M., Uddin,M.P., Afjal, M.I., Rabbi, M.F.: A Modified Filtering Approach of LSB
Image Steganography Using Stream Builder along with AES Encryption, HBRP Recent Trends in Information Technology and its
Applications, Volume 1 Issue 2, pp. 1-10 (2018).
[7]. Morkel, T.,Eloff, J.H.P., Olivier,M.S.: An Overview of Image Steganography, Proceedings of the Fifth Annual Information Security
South Africa Conference,Sandton, South Africa (2005).
[8]. Saha,A.,Halder, S., Kollya, S.: Image steganography using 24-bit bitmap images, 14th International Conference on Computer and
Information Technology, 56-60, (2011).
[9]. Karim,S.M.M., Rahman,M.S., Hossain, M.I.: A New Approach for LSB Based Image Steganography using Secret Key,
Proceedings of 14th IEEE International Conference on Computer and Information Technology, 286 – 291 (2011).
[10]. Wayner, P.: Disappearing Cryptography: Information Hiding: Steganography & Watermarking, ELSEVIER, 3rd Edition(2008).
[11]. Sumathi, C.P., Santanam, T., Umamaheswari, G.: A Study of Various Steganographic Techniques Used for Information Hiding”,
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6 (2013).
[12]. Zhou, X., Gong, W., Fu, W., Jin, L.: An Improved Method for LSB Based Color Image steganography Combined with
Cryptography, ICIS 2016, Okayama, Japan, IEEE June 26-29 (2016).
[13]. Akhtar, N., Khan, S., Johri, P.: An Improved Inverted LSB Image Steganography, IEEE International Conference on Issues and
Challenges in Intelligent Computing Techniques (ICICT) (2014).
[14]. Singh, A., Singh, H.: An Improved LSB based Image Steganography Technique for RGB Images, IEEEInternational Conference on
Electrical, Computer and Communication Technologies (ICECCT) (2015).
[15]. Goyal, S., Ramaiya, M., Dubey, D.: Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and
Grayscale Images, IEEE International Conference on Computational Intelligence and Communication Networks (2015).
[16]. Sugathan, S.: An Improved LSB Embedding Technique for Image Steganography, IEEE International Conference on Applied and
Theoretical Computing and Communication Technology (2016).
[17]. Kaur, G., Kochhar, A.: A steganography implementation based on LSB & DCT. International Journal for Science and Emerging
Technologies with Latest Trends, 4(1), pp.35-41 (2012).
U. A. Md. Ehasn Ali (ehsan_cse@hstu.ac.bd) received his B. Sc. degree in Computer Science and
Engineering from Hajee Mohammad Danesh Science and Technology University, Dinajpur,
Bangladesh in 2013. His main working interest is based on Image Processing, Expanding the
Applications of Artificial Intelligence, Machine Learning, Data Mining, Data Security
etc. Currently, he is working as a lecturer in Dept. of Computer Science and Engineering in Hajee
Mohammad Danesh Science and Technology University, Dinajpur, Bangladesh. He has several
scientific research publications in various aspects of Computer Science and Engineering.
www.ajer.org Page 43
www.ajer.org
American Journal of Engineering Research (AJER) 2019
Md. Sohrawordi (mdsohrawordicse@gmail.com) is working as a lecturer in Dept. of Computer
Science and Engineering in Hajee Mohammad Danesh Science and Technology University,
Dinajpur, Bangladesh. He received his B. Sc. degree in Computer Science and Engineering from
Hajee Mohammad Danesh Science and Technology University, Dinajpur, Bangladesh in 2013.
Now, he is pursuing M. Sc. degree in Computer Science and Engineering from Rajshahi
University of Engineering & Technology (RUET), Rajshahi, Bangladesh. His main working
interest is based on Image Processing, Artificial Intelligence, Data Mining, Mobile
Networks,cryptographyetc.He has several scientific research publications in various aspects of
Computer Science and Engineering.
U. A. Md. Ehasn Ali" A Robust and Secured Image Steganography using LSB and Random Bit
Substitution " American Journal of Engineering Research (AJER), vol.8, no.02, 2019, pp.39-44
www.ajer.org Page 44
www.ajer.org
View publication stats