Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion



A new steganography approach for data hiding is proposed. This approach uses the Least Significant Bits (LSB) insertion to hide data within encrypted image data. The binary representation of the hidden data is used to overwrite the LSB of each byte within the encrypted image randomly. Experimental results show that the correlation and entropy values of the encrypted image before the insertion are similar to the values of correlation and entropy after the insertion. Since the correlation and entropy have not changed, the method offers a good concealment for data in the encrypted image, and reduces the chance of the encrypted image being detected. The hidden data will be used to enable the receiver to reconstruct the same secret transformation table after extracting it and hence the original image can be reproduced by the inverse of the transformation and encryption processes. Digital images are being exchanged over various types of networks. With the huge growth of computer networks and the latest advances in digital technologies, a huge amount of digital data is being exchanged over various types of networks. It is often true that a large part of this information is confidential, private or both, which increase the demand for stronger encryption techniques . Encryption and steganography are the preferred techniques for protecting the transmitted data [7], as a result, there are various encryption systems to encrypt and decrypt image data, and it can be argued that there is no single encryption algorithm satisfies the different image types . Data exchange is a good example of an application that uses encryption to maintain data confidentiality between the sender and the receiver. In this paper, steganography is used to hide information to perform encryption. Steganography techniques are getting significantly more sophisticated and have been widely used. The Steganography techniques are the perfect supplement for encryption that allows a user to hide large amounts of information within an image. Thus, it is often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the hidden information before decryption take place . The problem with cryptography is that the encrypted message is obvious. This means that anyone who observes an encrypted message in transit can reasonably assume that the sender of the message does not want it to be read by casual observers. This makes it possible to deduce the valuable information. Thus, if the sensitive information will be transmitted over unsecured channel such as the internet, steganography technique can be used to provide an additional protection on a secret message. When hiding information inside images the LSB (Least Significant Bit) method is usually used. While the cryptography tries to convert an image to another one that is hard to understand, steganography involves hiding information so it appears that no information is hidden at all. Therefore, the person will not attempt to decrypt the information . For example, an alteration of the least significant digit for the color value of some pixels in an image will not affect the quality of the image and thus, enabling a message to be sent within an image using these bits . In this paper, steganography technique will be used to send the secret information along with an encrypted image.

Free download research paper



Related

technique for image encryption using digital signature

Clustering with a Genetically Optimized Approach

ENGPAPER.COM CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER