13-11-2012, 04:17 PM
Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics
Combine use of Steganography.pdf (Size: 560.67 KB / Downloads: 89)
Abstract
The proposed system highlights a novel approach for
creating a secure steganographic method and visual
cryptography for data hiding in computer forensics. Although
there has been an extensive research work in the past, but
majority of the research work has no much optimal
consideration for robust security towards the encrypted image.
The proposed method encodes the secret message in least
significant bits of the original image, where the pixels values of
the encrypted image are modified by the genetic algorithm to
retain their statistic characters, thereby making the detection of
secret of message difficult. Use of Genetic algorithm has
compelled the system for enhancing the security. The proposed
system hides data in a real image and achieve its detection after
under went to visual cryptography. The main aim of the
proposed model is to design a feasible RS- resistance secure
algorithm which combines the use of both steganography and
visual cryptography for improving security, reliability and
efficiency for secret message. The implementation is done in
java platform which shows that the proposed system has better
resilienc by considering the steganalysis.
INTRODUCTION
Hiding information by embedding secret data into an
innocuous medium is often referred to as steganography.
Steganography can be applied electronically by taking a
message (a binary file) and some sort of cover (often a sound
or image file) and combining both to obtain a “stego-object”.
The RS analysis is considered as one of the most famous
steganalysis algorithm which has the potential to detect the
hidden message by the statistic analysis of pixel values [1].
The process of RS steganalysis uses the regular and singular
groups as the considerations in order to estimate the
correlation of pixels [2]. The presence of robust correlation
has been witness in the adjacent pixels. But unfortunately
using traditional LSB replacing steganography [3], the
system renders the alteration in the proportion in singular and
regular groups which exposes the presence of the
steganography. Ultimately, it will not be so hard to decrypt
the secret message. Both the topic of steganography and
visual cryptography has been considered as a distinct topic
for image security. Although there are extensive researches
based on combining these two approaches [4] [5] [6], but the
results are not so satisfactory with respect to RS analysis.
RELATED WORK
Ghascmi ct al.. [12] proposed a novel steganography scheme
based on integer wavelet transform and Genetic algorithm
Umamaheswari [13] compress the secret message and encrypt
it by the receiver’s public key along with the stego key and
embed both messages in a carrier using an embedding
algorithm. Shyamalendu Kandar [14] proposed a technique of
well known k-n secret sharing on color images using a
variable length key with share division using random number.
Anupam [15] describes how such an even-odd encryption
based on ASCII value is applied and how encrypted message
converting by using Gray code and embedding with picture
can secured the message and thus makes cryptanalyst’s job
difficult.
PROPOSED SYSTEM
The proposed work is basically a framework designed in java
swing with two modules e.g. Steganography using Genetic
Algorithm and Visual Cryptography. An input image is
accepted as cover image for the input message in plain text
format. After embedding the secret message in LSB (least
significant bit) of the cover image, the pixel values of the
steg-image are modified by the visual cryptography to keep
their statistic characters. The experimental results should
prove the proposed algorithm’s effectiveness in resistance to
steganalysis with better visual quality. The user can select
their targeted information in terms of plain text for embedding
the secret message in LSB of the cover image. The
implications of the visual cryptography will enable the pixels
value of the steg-image to keep their statistic character. LSB
steganography has low computation complexity and high
embedding capacity, in which a secret binary sequence is
used to replace the least significant bits of the host medium.
This is also one of the strong algorithms which keeps the
information proof from any intruder.
ALGORITHMDESCRIPTION
The simplest way to hide binary data on an image is to use a
lossless image format (such as a Bitmap) and replace the x
least significant bits of each pixel in scan lines across the
image with the binary data. This is not secure as an attacker
can simply repeat the process to quickly recover the hidden
information. This technique, known here as “BlindHide”
because of the way it blindly hides information, is also not
good at hiding – the initial portion of the image is left
degraded while the rest remains untouched.
A tool known as “Hide and Seek for Windows 95” [17]
attempts to get around the security issues in BlindHide by
randomly distributing the hidden information across the
image. A more modern version of this algorithm, dubbed
“HideSeek”, is used here. HideSeek uses a random seed
(provided by hashing a password) to pick the order in which
it will write to the pixels. HideSeek is much more secure
than BlindHide, but does not necessarily leave the image in a
better condition. The noise introduced by HideSeek is
randomly placed and often causes the resulting stego-image
to look speckled.
CONCLUSION
The proposed system has discussed implementation of
securely using steganographic technique using genetic
algorithm and visual cryptography using pseudorandom
number. It can be concluded that when normal image
security using steganographic and visual cryptographic
technique is applied, it makes the task of the investigators
unfeasible to decrypt the encoded secret message. The
security features of the steganographic is highly optimized
using genetic algorithm. The proposed system is highly
resilient against RS attack and optimally used for both
grayscale and colored output in visual secret shares making it
highly compatible for real-time applications. The future work
could be towards the enhancing the algorithm using neural
network for the visual cryptography, so that the system can
generate highly undetectable secret shares using certain set of
training data which might be automatically generated and is
disposed after the task has been performed. Such type of
approach might render the most secure steganographic and
visual cryptographic scheme.