An Implementation of LSB Steganography Using DWT Technique

نویسندگان

  • G. Raj Kumar
  • M. Maruthi
  • Prasada Reddy
  • T. Lalith Kumar
چکیده

Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. In steganography, there is a technique in which the least significant bit is modified to hide the secret message, known as the least significant bit (LSB) steganography. Least significant bit matching images are still not well detected, especially, at low embedding rate. In this paper, we have improved the least significant bit steganalyzers by analyzing and manipulating the features of some existing least significant bit matching steganalysis techniques. This paper explains the LSB Embedding technique with lifting based DWT schemes by using Micro blaze Processor implemented in a FPGA using System C coding. Keywords— DWT, FPGA, LSB, Micro Blaze, Steganography. Introduction The art or practice of concealing a message, image, or file within another message, image, or fileis called Steganography. The word steganography combines steganos meaning "co-vered, concealed, or protected", and graphein meaning "writing". Generally, the hidden messages will appear to be (or be part of) something else: images, articles or some other cover text. Steganalysis develops theories, methods and techniques that can be used to detect hidden messages in multimedia docu-ments. The documents without any hidden messages are called cover documents and the documents with hidden messages are denoted by stego documents. In steganography, there is a technique in which the least significant bit is modified to hide the secret message, this technique is known as the least significant bit (LSB) steganography or LSB embedding. A digital image is described using a 2-D matrix of the intestines at each grid point (i.e. pixel). Typically, gray images use 8 bits, whereas coloured utilizes 24 bits to describe the colour model, such as RGB model. The steganography system which uses an image as the cover object is referred to as an image steganography system. The shift from cryptography to steganography is due to that concealing the image existence as stego-images enable to embed the secret message to cover images. Steganography conceptually implies that the message to be transmitted is not visible to the informal eye. Steganography has been used for thousands of years to transmit data without being intercepted by unwanted viewers. It is an art of hiding information inside other information. The main objective of Steganography is mainly concerned with the protection of contents of the hidden information. Images are ideal for information hiding because of the large amount of redundant space is created in the storing of images. Secret messages are transferred through unknown cover carriers in such a manner that the very existence of the embedded messages is undetectable.Carriers include images,audio,video,text or any other digitally represented code or transmission.The hidden message may be plaintext or another as a bit stream. 2. THE LSB TECHNIQUE We have implemented the LSB steganography algorithm in gray scale images to reduce the complexity of the system. It is the process of embedding data within the domain of another data, this data can be text, image, audio, or video contents and the scope of the current paper covers only codes (integer values). The embedded data is invisible to the human eye i.e., it is hidden in such a way that it cannot be retrieved without knowing the extraction algorithm. In this paper we evaluated the technique using gray scale images of size International Journal of Engineering Research and General Science Volume 2, Issue 6, October-November, 2014 ISSN 2091-2730 399 www.ijergs.org 64*64 in which each pixel value was represented with 8 bit representation. Example: Take the number 300, and its binary equivalent is 100101100 embedded into the least significant bits of pixel values of the Cover image. If we overlay these 9 bits over the LSB of the 9 bytes cover image pixel values, we get the following (where bits in bold have been changed) 10010101 0000110

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

FPGA Implementation of Lifting DWT based LSB Steganography using Micro Blaze Processor

We present an information hiding technique that utilizes lifting schemes to effectively hide information in images. A successful information hiding should result in the extraction of the hidden data from the image with high degree of data integrity. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. The ...

متن کامل

Dwt and Lsb Algorithm Based Image Hiding in a Video

IJES AT | Aug-Sep 2013 170 Available online @ http://www.ijesat.org  Abstract Video Steganography is a method of hiding data into a carrying Video file. This data can be text, audio, image or a video itself. The video based Steganography is better than the other existing methods because of its high data security and it can accommodate large amount of secret data. The Discrete Wavelet Transform...

متن کامل

Secret Data Sharing through Video Using Dwt & Lsb

Video Steganography is a method of hiding data into a carrying Video file. This data can be text, audio, image or a video itself. The video based Steganography is better than the other existing methods because of its high data security and it can accommodate large amount of secret data. The Discrete Wavelet Transformation (DWT) and the Least Significant Bit (LSB) Algorithm based data insertion ...

متن کامل

Compression and Segmentation of JPEG Images Using DWT

Hiding capacity is very important for efficient covert communications. For JPEG compressed images, it is necessary to enlarge the hiding capacity because the available redundancy is very limited. Steganography enables to have a secret communication in modern information technology using Dual Transform Technique for Robust Steganography (DTTRS) [1]. The implementation of the Dual transform techn...

متن کامل

A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...

متن کامل

An Optimized FPGA Implementation of LSB Replacement Steganography Using DWT

This work focuses on the image steganography with an image compression using Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be succ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014