International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 11 Issue: 04 | Apr 2024
p-ISSN: 2395-0072
www.irjet.net
DEVELOPMENT OF AN IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT Adenusi Dauda Adeite1, Adeboje Olawale2, Ojedapo Halleluya3, Babatunde Olalekan Lawal 4, Latifat Odeniyi 5 1Adenusi Dauda Adeite, Dept. of Mathematical and Computing Sciences, KolaDaisi University, Ibadan.
Email: dauda.adenusi@koladaisiuniversity.edu.ng 2Second Author Affiliation & Address Font size 11 3Example: Professor, Dept. of xyz Engineering, xyz college, state, country ---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Ensuring information security is a crucial aspect
transmission across public networks. Through cryptographic algorithms, the original plaintext undergoes transformation into ciphertext, which can only be reversed into plaintext by individuals possessing the secret key. Cryptography serves as a well-established and widely employed method for securing sensitive data. It has been integrated into cloud computing technology by numerous cloud service provider[2].
of exchanging messages or communicating information over the internet. Confidentiality of communication is often protected using various techniques, with cryptography being a prominent method used for multimedia. However, in certain scenarios, simply keeping the content of messages confidential may not be sufficient, and concealing the very existence of the message, known as steganography, may offer enhanced security. Steganography involves hiding a confidential message within digital files, such as images, audio, or video files. However, hiding information is not just enough, there is also need for encryption of the secret message before hiding it in the cover image. This research work tries to hide text file and encrypt it using Elliptic Curve Cryptography into a cover image of any formats using least significant bit (LSB). The stego file was evaluated using standard metrics such as Mean Square Error and Peak Signal Noise Ratio.
The two basic information encryption techniques are symmetric encryption and asymmetric encryption. Symmetric encryption is also called secret key encryption and Asymmetric encryption is also called public key encryption. Elliptic Curve Cryptography (ECC) is an asymmetric encryption type, which is the counterpart of modular multiplication in Rivest-Shamir-Adleman (RSA) and the counterpart of modular exponentiation is multiple additions [3] Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. Elliptic curve cryptography helps in providing a high level of security with smaller key size compared to other cryptographic technique which depends on integer factorization or discrete logarithmic problem [4].
Key Words: Cover Image, Stego Key, Stego Image, Steganography, Secret Message
1.INTRODUCTION Hiding information is a subfield of security which encompasses a wide range of methods for digitally concealing information. One significant area within information hiding is steganography. Steganography deals with writing of hidden messages in a way that no one can suspect the existence of the message, apart from the sender. This is a form of security through obscurity. [1].
Least significant Bit (LSB) is the simplest approach for embedding information in cover image is the use of least significant bit (LSB). This technique embeds the bits of the message directly into least significant bit plane of the cover image. In a deterministic sequence, modulating the least significant bit does not result in human perceptible difference because the amplitude of the change is very small. To hide a secret message inside an image, a proper cover image is required, because least significant bit method uses bits of each pixel in the image, and also it is very important to use a lossless compression of a data compression algorithm because when using a lossless compression, it will retain the hidden information but when a lossy compression is used the hidden information will be lost in the transformation process of the lossy compression [5].
Steganography has emerged as a compelling and extensively researched field with diverse applications. An essential aspect of steganography is the careful selection of a suitable cover image to effectively hide a specific secret message, ensuring the security of the resulting stego image [1]. In this paper, an image steganography was developed that utilizes the Least Significant Bit (LSB) steganography technique in combination with cryptography. Cryptography, the practice of concealing information through encryption, safeguards data by converting it into an incomprehensible form. Its utility lies in ensuring secure
© 2024, IRJET
|
Impact Factor value: 8.226
|
ISO 9001:2008 Certified Journal
|
Page 1141