image steganography combined with des encryption pre-processing

4

Click here to load reader

Upload: vigneshinfotech

Post on 10-Nov-2015

215 views

Category:

Documents


0 download

DESCRIPTION

Image Steganography Combined Image Steganography Combined

TRANSCRIPT

  • Image Steganography Combined with DES Encryption Pre-processing Yang Ren-er, Zheng Zhiwei, Tao Shun, Ding Shilei

    College of Information Science and EngineeringNingbo University, Ningbo 315211, China

    AbstractIn order to improve the security of steganography, this paper studied image steganography combined with pre-processing of DES encryption. When transmitting the secret information, firstly, encrypt the information intended to hide by DES encryption is encrypted, and then is written in the image through the LSB steganography. Encryption algorithm improves the lowest matching performance between the image and the secret information by changing the statistical characteristics of the secret information to enhance the anti-detection of the image steganography. The experimental results showed that the anti-detection robustness of image steganography combined with pre-processing of DES encryption is found much better than the way using LSB steganography algorithms directly.

    Keywords-Information hiding; Steganography; DES encryption; High security

    I. INTRODUCTIONSteganography is an information hiding technique

    developed in recent years. It is a procedure that makes use of human perceptive sense of visual or auralredundancy to digital multimedia, and that embeds the secret information in the public media to transfer digital media carrying confidential information to achieve covert communications[1]. Imperceptibility is an important feature of steganography, also called transparency or anti-detection performance whichincludes visual imperceptibility and statistical imperceptibility. The imperceptibility of steganography is enhanced by improving the method of steganography[2],or selecting an appropriate steganographic carrier[3], or improving the matching relationship between carrier image and secret information.Steganography is different from traditional encryption,which is theoretically based on cryptography to hide communication contents by encrypting plaintext, but it is difficult to mask the fact that communication occurred,and ciphertext transmission will easily arouse the attackers suspicions, and then it could be intercepted, attacked or cracked. Steganography complements thedeficiency of concealment of the encryption. Through transmitting communication contents hidden secretly inpublic media, it covers up the facts of realcommunication purpose and that communication occurred. It is not a competitive relation between steganography and encryption, but they can reinforceeach other, to further ensure the safety of covertcommunication[4]. This paper studied image steganography based on encryption, which combines the traditional encryption and information steganography. It not only makes the secret information transmission"incomprehensible" and "invisible", but makes the steganographic system have a higher anti-detection performance.

    II. IMAGE STEGANOGRAPHY COMBINED WITH ENCRYPTION

    A. DES Encryption DES uses a 56-bit key and an additional 8-bit parity bit, resulting in the largest 64-bit packet size. This is an iterative block cipher, using the technology known as the Feistel, which will encrypt the text block half. The use of sub-key pair, half of which application circulatory function, and then the output with the other half to " exclusive or" operator followed by the exchange of the two and a half, this process will continue, but in the end a cycle of non-exchange. DES uses 16 cycles, using xor,replacement, substitution, four basic arithmetic shift operations[5]. After the hidden information is encrypted, not only the invisibility of information is increased, but also the statistical characteristics of the information and the correlation between information are changed in the same time, which makes the information become 0-1bitstream, which is in the probability distribution. Inorder to verify the characteristics of encryption algorithm, download three English document of 32768 characters from the Internet, and inspect the 0 -1 distribution in the document before and after encryption. From table 1,before the encryption, the number of 0 and 1 is not balanced because of correlation between characters in the natural document, but after the encryption, binary stream of 0 s and 1 s close to equal probability distribution in the document.

    Table 1 the 0 -1 Distribution in the Document before and after Encryption

    document

    before the encryption

    after the encryption

    the number of 0

    the number of 1

    the number of 0

    the number of 1

    1 143674 118470 130931 1312132 143698 118446 131218 1309263 141719 120425 131069 1310754 142757 119387 131665 130479

    2014 Sixth International Conference on Measuring Technology and Mechatronics Automation

    978-1-4799-3434-8/14 $31.00 2014 IEEEDOI 10.1109/ICMTMA.2014.80

    316

    2014 Sixth International Conference on Measuring Technology and Mechatronics Automation

    978-1-4799-3434-8/14 $31.00 2014 IEEEDOI 10.1109/ICMTMA.2014.80

    323

    2014 Sixth International Conference on Measuring Technology and Mechatronics Automation

    978-1-4799-3434-8/14 $31.00 2014 IEEEDOI 10.1109/ICMTMA.2014.80

    323

    2014 Sixth International Conference on Measuring Technology and Mechatronics Automation

    978-1-4799-3434-8/14 $31.00 2014 IEEEDOI 10.1109/ICMTMA.2014.80

    323

    2014 Sixth International Conference on Measuring Technology and Mechatronics Automation

    978-1-4799-3435-5/14 $31.00 2014 IEEEDOI 10.1109/ICMTMA.2014.80

    323

  • Figure 1.Frequency of sequences of 0 and 1 in the tour

    B. LSB Steganography Combined with Digital Image

    The LSB (Least Significant Bit) which hides the secret information to the least significant bit of carrier information, is the most classic and simpleststeganography algorithm, which also features of a large capacity and concealment. It is still widely considered most practical and applied up to today.

    The LSB steganography uses the secret information instead of the last bit of the image pixels value, which is equivalent to superimposing a weak signal upon the original carrier signal, and therefore its difficult to realize visually. But during the embedding process, if the lowest bit of secret information is different from that ofpixel value, we need to change the lowest bit of pixel value, namely change the pixel value 2i to 2i+1 or 2i+1 to 2i. The parity value transform in the LSB steganography produces parity asymmetry. Fridirich et al. proposed the method of using this asymmetrical parity value transform of LSB to go on RS attack[7], and Westfield et al. proposed Chi-square test[8] to attack LSB steganography algorithm. If steganographic method can minimize the distortion of the histogram, it can fundamentally resist the attack of analysis methods aforementioned. So in this paper, we propose the steganography combined with encryption, encrypting the information intended to hide before the steganalysis with encryption pre-processing, and the imperceptibility of the steganography algorithm can be improved by reducing the distortion of the histogram.

    C. Image Steganography Combined withEncryption

    In order to improve the imperceptibility of steganography algorithm, this paper studied the steganography combined with encryption algorithm, which reach the goal by changing the matching relationship between carrier image and secret

    information. At the transmitting terminal, we firstly choose the appropriate image as the carrier, and then encrypt text information or documents designed to hide by DES encryption followed by using the LSB steganography algorithm to hide the encrypted information in the image; at the receiving terminal, firstly extract the encrypted information from the carrier image by the algorithm which is contrary to steganography algorithm, and then recover the hidden information by DES decryption algorithm.

    the secretinformation

    carrierimage

    secret key secret image

    the secretinformation

    DESEncryption

    decryptionalgorithm

    LSBimbedding

    Extraction algorithm

    Figure 2.the flow chart of Image Steganography Combined with Encryption

    D. The Evaluation Method of Steganography Algorithm

    1) Histogram Difference and the Sum of Histogram absolute Difference

    We denote )(nh as the image gray histograms function. For the gray level image of 8 bits,

    ]255,0[n . And )(nh is a sequence which represents the number of each pixel values in the image, namely

    1

    0

    1

    0)),(,()(

    W

    i

    H

    jjipnnh (1)

    Where

    vuvu

    ifif

    vu

    ,0,1

    ),(

    And )( jip indicates the images pixel value at ),( ji , W is the images width, H is the images height.

    317324324324324

  • We denote )(nh as the histogram of the original

    image and )(' nh as the encryption image, ]255,0[n . Then, ][nhm denote Histogram difference, namely ][][][ nhnhnHm (2)

    255

    0|)(')(|

    iihihHae (3)

    The absolute difference of histogram expresses how the image changes before and after the steganography. The smaller Hae is, the better imperceptibility of the steganography is.

    2) Relative Entropy of the Image before and after Steganography (KL divergence) Relative entropy of the image before and after steganography or the KL divergence is used to measure the security of the steganographic system put forward by Cachin[6].The decrease of the KL divergence shows the improvement of the steganographic systems safety performance. If the K_L divergence is zero, the steganographic system is absolutely safe, namely

    0,)||(

    PsPcD is absolutely safe

    2 5 5

    0 ][][l o g][)||(

    n s

    cc np

    npnpPsPcD (4)

    Where ][npc is gray levels probability distribution of

    carrier image, ][nps is that of steganasis image.

    III. EXPERIMENTAL RESULTS AND ANALYSIS Simulation experiments embed information that needs to hide and the information after DES encryption respectively to 512 x 512 pixel image 1-3 by LSB steganography algorithm. It is showed in Figure 3.

    Figure3. the experimental picture

    From the experimental results in Figure 3, we can seethe figure on the left, if the information is unencrypted before the LSB algorithm , the difference between carrier image and the steganasis image is large, if not, we can see it from the figure on the right, the difference is small. The smaller the histogram difference is, the better the performance of steganographic system is. From table 1 and its experimental results, we can also see that after the encryption, the histogram modification and KL divergence decrease, suggesting that after the encryption, the anti-interference performance of the steganography gets better. Thus, steganography system combined with encryption is superior to direct steganalysis.

    Figure 4. the histogram difference before and after steganography in two ways

    Table 2. steganasis image effects without encryption

    ,PDJH WKHKLVWRJUDP

    PRGLILFDWLRQ

    ./

    GLYHUJHQFH

    Table 3. steganasis image effects with encryption

    ,PDJH WKHKLVWRJUDP

    PRGLILFDWLRQ

    ./

    GLYHUJHQFH

    IV. CONCLUSIONSThis paper mainly probes the steganography carried by

    image, which combines DES encryption with LSB algorithm, and implements dual protect of hidden information, making the hidden information

    318325325325325

  • incomprehensible and invisible. Besides, the DES encryption algorithm changes the statistical characteristics of the secret information, and improvesthe lowest matching degree of its bitstream and carrier image, leading to a better imperceptibility of steganographic algorithm.

    REFERENCES

    [1] Roszizti Ibrahim Teoh Suk Kuan.Steganography Aglorithm

    toHide Secret Message inside an Image[J]. Technology and

    Application of Compute:English,2011,2(2),102-108

    [2] Der-Chyuna Lou, Chen-Hao Hu,LSB steganogrpahic method

    based on reversible histogram transformation function for resisting

    statistical steganalysis[J], Information Sciences,2012, 188:346-358.

    [3] Yifeng Sun,Fenlin Liu, Selecting cover for image steganography by

    correlation coefficient [C] ,2010 Second International Workshop on

    Educaton Technology and Computer Science, 159-162.

    [4]Marwaha, P.,Visual cryptographic steganogrpahy in

    images[C], Computer Communication and Networking

    Technologies(ICCCNT),2010 International Conference 2010:1-6.[5] Huanguo ZhangXiutao FengZhongpin TanYuzhen Liu

    Evolutionary cryptosystems and

    evolutionary design for DES [J], JOURNAL OF CHINA

    INSTITUTE OF COMMUNICATIONS200223(5)57-64.

    [6] C.Cachin, an information-theoretic model steganography, in

    IH98, LNCS 1525, Heidelberg: Springer- Verlag, 1998 306-318.

    [7] Fridrich J, Goljan M, Du R, Detecting lsb steganography in color

    and gray-images[C],IEEE Multimedia Special Issue on Security,

    2001:22-23.

    [8] A.Westfeld, A, Pfitzmann, Attacks on steganographyic system,

    Proceedings of the 3rd International Workshop on Information

    Hiding, Dresden, Germany, 1999:61-76

    319326326326326