INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

A Novel Data Hiding Tool Based On PVD: Steganopixtrans

Sanjive Tyagi, Rakesh Kumar Dwivedi, Ashendra Kumar Saxena

Abstract: This paper presents a novel software tool SteganoPixTrans based on pixel value differencing method (PVD). Proposed tool consists of a tailored package that transformed secret data like video, audio, image, text into Base64 format, a common pipeline (CP). Then another designed package transform Base64 text format into binary segments, additionally these segments are used in embedding process. A PVD based steganography using SteganoPixTrans tool is achieved by concealing secret information by dividing host image into 2 x 2 blocks of pixels and crisscrosses it in zigzag fashion; the PVD is calculated for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. This paper introduces a unique approach of a common pipeline (CP) to conceal confidential data of most file formats inside another carrier image that supports lossless data compression like PNG (Portable Network Graphics), GIF (Graphics Interchange Format) and BMP (Bitmap Image File) etc. Exploratory result displays that the proposed approach provides productive software tool in term of secured Steganography and high payload. SteganoPixTrans is integrated software developed on NetBeans IDE 8.2 in Java. Java is an Operating System independent programming language that permits running this software on machines with different operating System.

Index Terms : Embedding Secret Bits, Common Pipeline, Pixel Value Differencing (PVD), Non-overlapping, Security, Software Tool, Steganography. ——————————  ——————————

1. INTRODUCTION procedure trusts on the likelihood that whole pixels cannot be SECURITY is a principal part of any place in our life to keep used to implant to same number of secret bits. There are the information assured with the objective that any some picked pixels which can be utilized to embed a more unapproved could not steal them. Accordingly, there is a prominent number of pixel bits without influencing visual sincere enthusiasm for a protected correspondence of secret quality though a few pixels can conceal just less number of data through the Internet. In this manner, different data secret bits for the reason on the other chance that a more security systems have been perceived to guarantee the prominent number of bits are implanted, at that point visual privacy of digital information like secret key assurance, finger- quality effects. In study author observed the amount of bits to printing protection, eye-lock security, private key, and so on. be embedded relies upon the complexities between sets of On the contrary, today in worldwide computerized close-by pixels and furthermore suggested that PVD method communication, exercises like unlawful accessing, mitigating, can adequately give bigger inserting limit with amazing and breaking the copyright rules are expanding enormously, intangibility of stego-image. This methodology segments the and furthermore secret information on open unreliable network carrier image into non-overlapping squares containing two channel may be intentionally tempered by some adversary interfacing pixels and changes the pixel differences in each who endeavors to prevent the data from being viably sent or square for embedding the secret information. PVD is arranged gotten. In this manner, there is a need to ensure to protect such a way, that pixel modification does not affect visual private data by utilizing advanced security approaches which nature of gray valued image and 24-bits red, green and blue can be developed by concealing confidential data inside (RGB) color image as per to the characteristics of human another digital carrier medium or by transforming it into a non- vision affectability. comprehensible model. In this way, steganography and A method of PVD checks the carrier image from the upper- cryptography advancements can be optimistic step in left corner to right-corner repeatedly for each row of pixels computerized information security structure. Cryptography has matrix, and segments it into squares with two adjoining non- its own feature to secure the secret information by making covering pixels in each block. Amount of bits to be implanted is non-comprehensible. As such, its weakness is encryption controlled by properties of smoothness and PVD (Pixel value information can make the suspicious about its security and can differencing) of carrier image. A smoothness and complexity be tempered by the attacker although supported perspective of property of the carrier image is characterized based on steganography is, it ensures the secret information by contrast estimation of two-pixel squares. In the edge area pixel embedding it into another digital medium secretly, and so value differencing contrast is significantly bigger while smooth making the confidential information inconspicuous so there is region has little contrasts. The greater the PVD the more bits less likelihood of susceptibility [1]. Steganography is an to be inserted secretively. A multi-pixel differencing strategy evolving research field keeping the target to give best in was recommended by [3] in which a square of four pixels is progress of data security structure. Pixel-Value Differencing being utilized to determine the number bits to be inserted (PVD) strategy was presented by author in [2] to insert secret dependent on three PVD (Pixel value differencing). In [4], the information inside gray valued digital image. Proposed author recommended a multi-PVD (Pixel value differencing) ———————————————— image steganography dependent on LSB (Least Significant  Sanjive Tyagi, College of Computing Sciences and Information Bit) substitution. Two upgraded version of PVD strategies Technology, Teerthanker Mahaveer University, India, Mob-91- recommended by [5] that utilizing with square based 9219869447, E-mail: [email protected] concealing strategy. In [6], the author recommended LSB  Rakesh Kumar Dwivedi, College of Computing Sciences and (Least Significant Bit) substitution inside four-pixel square. In Information Technology, Teerthanker Mahaveer University, India, E- [7], author exhibited steganography strategy dependent on mail: [email protected]  Ashendra Kumar Saxena, College of Computing Sciences and PVD (Pixel value differencing) of interactive media images. Information Technology, Teerthanker Mahaveer University, India, E- mail: [email protected]

3028 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

1 RELATED WORK software S-Tools has the feature to conceal secret data in In order to construct high disguising limit, a PVD (Pixel value carrier medium of type GIF, BMP, and WAV files. S-Tools has differencing) methodology proposed by author in [8] that the capacity to conceal various secret files of larger size in one utilizing three-pixel sets, which are molded uniformly, vertically, cover file. Embedding capacity is 12.80 percent. Base64 and corner to corner in 2 x 2 block pixels. In order to enhance encoding and decoding is being employed in proposed hiding capacity, the author in [9] exhibited Pixel-value steganography tools SteganoPixTrans. The Base64 format differencing (PVD) based steganography joined with LSB [21] is used to represent binary data of image, text, audio and strategy that using block of 2 x 2 pixels. The work exhibited in video files using ASCII set of characters with help of [10] presents an expansion of FPPD (Five Pixel Pair conversion system of radix-64 that can be used on most of the Differencing) steganography [11] strategy that allows imparting computer system. There are 64 Characters used to encode different sort of secret data by installing crosswise over image file into Base64 format. It does not uses any special different carrier images. A modulus method is being utilized to character except ‗+‘ and ‗/‘. Special symbol ‗=‘ is used in some control starting, end and kind of secret information. Author in special cases this is generally used as padding character. [12] presented strategy validity and reliability of image Other ASCII characters used in radix-64 are numbers 0 to 9, steganography using distribution approach. A methodology in 26 lower case alphabets and 26 upper case alphabets. [13] displayed a steganography development based on Various inbuilt function are available in programming difference of inter-block with the utilization of eight-queen's languages to transform files like video, audio, image, text into solutions. A methodology of image steganography exhibited by Base64 text format and vice-versa. The features of various [14] using a pixel mapping plan with eight-queen's solutions. steganography tools have been analyzed under this study; The strategy exhibited in [15], presents the PVD they all having common objective of steganography, some are steganography wherein secret bits are installed into a couple emphasizing on security, while others are emphasizing on of pixels, signified by pixel and pixel+1. The work exhibited in higher capacity steganography. The abilities of the product is [16] presents the steganography methodology that joins the dependent on format of cover file, formats of secret files, likelihood of pixel marker with assortments of two ordinary embedding capacity, cryptographic scheme, steganographic steganography strategy, known as PVD (Pixel value schemes so on. It is found in study that embedding capacity differencing) and LSB (Least Significant Bit). In [17], author denotes the amount of secret information having the choice to introduced hashing method utilizing quadratic probing that can be concealed into a particular carrier medium. Generally, be valuable in mapping secret bits. Throughout the years, expanding the limit of concealed data will make the stego- numerous algorithms and software tools were proposed for image increasingly prominent in survey. Practically all steganographic system, the basic methodologies include steganographic software accompanies their qualities and Least significant bit inclusion, Masking and filtering, shortcomings, and they are primarily dependent on various Transformations. The quality of every strategy depends on strategies, computations and algorithms. This paper presents heftiness, image quality and limit, by definition it implies the an innovative steganography software tool SteganoPixTrans capacity of data to be covered up in a transporter medium with based on pixel value differencing method (PVD), having the no suspicious sign present in any inserted data. Author in [18] capabilities to hide any format of file by implementing a describe that Hide and Seek, S-Tools, Hide4PGP and Secure concept of common pipeline (CP). Engine Professional are some of prominent software tools for LSB steganography. Files supporting lossless compression 2 PROPOSED STEGANOPIXTRANS TOOL like PNG, BMP, GIF and WAV are taken as cover files for The purpose of this paper is to present a novel steganography concealing secret information. JSteg, F3, F4 and F5 tools SteganoPixTrans dependent on pixel value differencing techniques are designed for transform domain steganography. (PVD) algorithms, we have presented this scheme in [19]. Steganos Security Suite JSteg, outguess, F5, JSteg shella, SteganoPixTrans have the capacities to conceal any format of JPHS are some of prominent software tools for transform file by actualizing a technique of common pipeline (CP). In domain steganography. Document based steganography proposed paper, input to CP is file of any format that is software tools like Snow and Tex to conceal secret data within convertible to Base64 format and outcome of CP is Base64 tabs, spaces, or other locations to .txt, .doc, . so on files. text format. Proposed tool consists of a tailored package that We have introduced in [19] high capacity steganography transformed secret data like video, audio, image, text into based on PVD protected using Shamir‘s threshold scheme Base64 format, a common pipeline (CP) than can be and authentication by implementing framework of permutation. transformed into binary form. At that point another designed This paper presents steganography software tool package convert Base64 text format into binary slices, SteganoPixTrans based on pixel value differencing (PVD) moreover these slices are utilized in implanting process algorithms of [19]. In [20], the author suggested that secretively. Presented tool SteganoPixTrans is implemented steganography tool Invisible Secrets 4 is considered as an on the basis of our proposed novel pixel value differencing amazing security package that can cover up and encode algorithms in [19], which are described here as followed: The documents, likewise can abolish web signs and scrap files. pixel value difference is computed for all Red, Green, and Blue Carrier files formats like PNG, BMP, HTML, JPG and WAV are (RGB) components between non-overlapping pixels of acceptable for such steganography tool. Embedding capacity selected diagonal path of cover image. is 12.80 percent. The steganography tool Puffer version 4.04 conceals information within the pixels of 24-bit color PNG or 2.1 Algorithm to Embed Secret Bits into Cover Image BMP image. Embedding capacity is 38.40 percent. Hermetic Input: Cover image of dimension m x n and secret image of Stego 8.04 can conceal any kind of file format of secret data size of dimension c x r, where m, n, c and r dimension of inside carrier BMP images, by applying encryption key. image in pixels. Embedding capacity is 12.20 percent. The steganography

3029 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

Output: Stego-image of dimension m x n. dimension of image and m is equals to n is taken. Step 1: For 2 x 2 block of pixel-to-edit =P1,1(R,G,B) to Step 2: Select a pair of non-overlapping pixel from cross Pm,n(R,G,B) diagonally in 2 x 2 pixels block, where m x n is diagonal of 2 x 2 pixel block diagonally in 2 x 2 pixels block. dimension of image and m is equals to n is taken. Step 3: Compute pixel value difference dk‘ for each RGB Step 2: Select a pair of non-overlapping pixel from across component between pair Pi,j(R,G,B) and Pi+1,j+1(R,G,B) and diagonal of 2 x 2 pixels block. pair Pi,j+1(R,G,B) and Pi+1,j(R,G,B) diagonally where i = 1 to n Step 3: Compute pixel value difference dk for each RGB and j=1 to m and k={r, g, b}. component between pair Pi,j(R,G,B) and Pi+1,j+1(R,G,B) and pair Step 4: Secret bits are to extracted using LSB technique based Pi,j+1(R,G,B) and Pi+1,j(R,G,B) diagonally as path diagonally in 2 on pixel value difference for each RGB component. Numbers x 2 pixels block, where i = 1 to n and j=1 to m and k={r, g, b}. of bits to be extracted are categorized into four cases as given Step 4: Secret bits are embedded using LSB technique based i. If pixel value difference dk‘ lies between 0 to 8 then no bit on pixel value difference for each RGB component. Numbers to be extracted. of bits to be embedded are categorized into four cases as ii. If pixel value difference dk‘ lies between 9 to 16 then one given bit is to be extracted from corresponding R, G, B i. If pixel value difference dk lies between 0 to 8 then no bit component. to be hidden. iii. If pixel value difference dk‘ lies between 17 to 24 then two ii. If pixel value difference dk lies between 9 to 16 then one bits are to be extracted from corresponding R, G, B bit is to be hidden in corresponding R, G, B component. component. iii. If pixel value difference dk lies between 17 to 24 then two iv. If pixel value difference dk‘ lies between 25 to 255 then bits are to be hidden in corresponding R, G, B three bits are to be extracted from corresponding R, G, B components. component. iv. If pixel value difference dk lies between 25 to 255 then Step 5: If pixel value difference dk‘ does not satisfy any four three bits are to be hidden in corresponding R, G, B case of step 4 then discard selected pair of pixel to extract the component. secret bits and go to step 1. Step 5: Select number bits to be embedded into variable Step 6: Store number bits to be extracted into variable No- Secret-Bits of secret file (image/text/video/audio etc.) Secret-Bits according to obtained case from step 4. according to obtained case from step 4. Step 7: Select a pair of pixel belongs to four cases obtained Step 6: Select a pair of pixels belongs to four cases obtained from step 4 in order to extract secret bit/bits and extracting from step 4 in order to embed secret bit/bits and embedding process takes individually to corresponding R, G, B process takes place individually to corresponding R, G, B components respectively as follows components respectively as follows i. If (Step4: case i is true) then no bit is extracted. i. If (Step 4: case i is true) then no bit is embedded. ii. If (Step4: case ii is true) then if decimal (Pi,j(R,G,B)) <= ii. If (Step 4: case ii is true) then if decimal (Pi,j(R,G,B)) <= decimal(Pi+1,j+1(R,G,B)) then extract three bits by taking decimal(Pi+1,j+1(R,G,B)) then hide three bits by embedding one bit from LSB of each Pi,j(R), Pi,j(G) , Pi,j(B) and extract one bit into LSB of each Pi,j(R), Pi,j(G) ,Pi,j(B) and hide next three bits by taking one bit from LSB of each three bits by embedding one bit into LSB of each Pi+1,j+1(R), Pi+1,j+1(G) , Pi+1,j+1(B), else vice-versa, here 6 Pi+1,j+1(R), Pi+1,j+1(G) , Pi+1,j+1(B), else vice-versa, here 6 bits bits are extracted. are hidden. iii. If (Step 4: case iii is true) then if decimal(Pi,j(R,G,B)) <= iii. If (Step 4: case iii is true) then if decimal(Pi,j(R,G,B)) <= decimal(Pi+1,j+1(R,G,B)) then extract six bits by taking two decimal(Pi+1,j+1(R,G,B)) then hide six bits by embedding bits from 2 LSBs of each Pi,j(R), Pi,j(G) , Pi,j(B) and extract two bits into 2 LSBs of each Pi,j(R),Pi,j(G),Pi,j(B) and hide next six bits by taking two bitsfrom2 LSBs of each six bits by embedding two bits into 2 LSBs of Pi+1,j+1(R), Pi+1,j+1(G) , Pi+1,j+1(B), else vice-versa, here 12 Pi+1,j+1(R),Pi+1,j+1(G) , Pi+1,j+1(B), else vice-versa, here 12 bits are extracted. bits are hidden. iv. If (Step 4: case iv is true) then if decimal (Pi,j(R,G,B)) <= iv. If (Step 4: case iv is true) then if decimal (Pi,j(R,G,B)) <= decimal(Pi+1,j+1(R,G,B)) then extract nine bits by taking decimal(Pi+1,j+1(R,G,B)) then hide nine bits by embedding three bitsfrom3 LSBs of each Pi,j(R), Pi,j(G) , Pi,j(B) and three bits into 3 LSBs of each Pi,j(R),Pi,j(G) ,Pi,j(B) and hide extract next nine bits by taking three bitsfrom3 LSBs of nine bits by embedding three bits 3 LSBs of Pi+1,j+1(R), each Pi+1,j+1(R), Pi+1,j+1(G) , Pi+1,j+1(B), else vice-versa, here Pi+1,j+1(G), Pi+1,j+1(B), else vice-versa, here 18 bits are 18 bits are extracted. hidden. Similarly repeat Step 7 for pair Pi,j+1(R,G,B) and Pi+1,j(R,G,B) Similarly repeat Step 6 for pair Pi,j+1(R,G,B) and Pi+1,j(R,G,B) Step 8: Arrange secret bits into eight bits in order to construct Step 7: Compute pixel value difference dk‘ of each RGB one character of Base64 format of secret data. component for selected pair of embedded pixels in Step 6 then Step 9: Repeat step 1 through 8 until all pair of non- check dk‘ that should be with the same range of four case of overlapping blocks are selected on across diagonally path for Step 4: if it does not satisfy then discard this pair of pixel for extraction process //end for step 1 embedding. Step 8: Repeat Step1 through 8 until all pair of non- 2.3 Developed Tools SteganoPixTrans overlapping blocks on cross diagonally path is selected This sub section discusses the different phases of 2.2 Algorithm to Extract Secret Bits from Stego-Image implementation of SteganoPixTrans. Input: Stego-image of dimension m x n. Output: Secret image of size of dimension c x r. 2.3.1 Development Environment Step 1: For 2 X 2 block of pixel-to-extract = P1,1(R,G,B) to SteganoPixTrans is integrated software developed on Pm,n(R,G,B) diagonally in 2 x 2 pixels block, where m x n is NetBeans IDE 8.2 in Java. Java is a high-performance

3030 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

language integrating computation, visualization, and image. programming in an easy-to-use environment with graphical  Quantity of bits to be embedded is determined by user interface (GUI). NetBeans is an open-source integrated properties of smoothness and contrast of cover image. development environment (IDE) for developing with Java, Smoothness and contrast properties of the cover PHP, C++, and other programming languages. image are classified on the basis of difference value of two-pixel blocks as described in algorithms. 2.3.2 Architecture of SteganoPixTrans  In the edge region pixel-value differencing is SteganoPixTrans consists of core modules to allow easy substantially larger whereas smooth area has little visualization of its inner architecture. The key steps that were difference. The bigger the PVD, the more bits to be involved in the building of SteganoPixTrans were: embedded covertly. . Defining the goals of SteganoPixTrans, i.e. implementing a complete steganographic system with 2.3.4 Steps for Execution of SteganoPixTrans Tool tailored encryption, Base64 decode, Base64 encode In this subsection, steps are described by following transformation and pre-processing stages. screenshots of SteganoPixTrans Software Tool . The encoding and decoding modules of Step 1: After loading SteganoPixTrans software – Fig.1 steganography are linked to various packages like describe the initial stage of Graphical User Interface (GUI) encryption, Base64 decode, Base64 encode transformation. User interaction can as application software. . Development of classes and modules are being done using object oriented approach with GUI interface for executing each process like selecting cover image, selecting secret file, starting embedding process, starting extracting process etc. . In embedding process size of embedded secret bits and type of embedded file is stored in stego-cover file so that extraction process should not traverse all pixels block of stego-cover file. It improves the time complexity of extraction algorithm. . A computation technique using modulus function is being used to extract left unsegment bit(s) just after extracting the last segment of bits from RGB components (24 bits block) of stego-images. This approach extracts each embedded bit(s). Fig.1. Initial GUI SteganoPixTrans Tool . System testing against attacks scenarios. This involves initially testing of each module against a Step 2: Selecting the Cover Image- Click on button Select range of attacks. Subsequently, a final test was carried Cover Image, then File chooser is displayed, and then selects out to illustrate the efficiency and security of the overall the desired cover image as shown in Fig. 2. system SteganoPixTrans. . Easy to use by designing graphical user interface (GUI).

2.3.3 Capabilities of SteganoPixTrans . A software tool SteganoPixTrans based on image steganography algorithm is being developed. . This is the implementation of embedding procedure that takes place in non-overlapping diagonal pixels block from left to right and diagonal pixels block from right to left are taken with in a of 2 x 2 block as a path of targeted career locations. . SteganoPixTrans consists of a tailored package that transformed most of the image or video or audio or text formats into Base64 text format. . SteganoPixTrans comprises another custom-made package that transformed it into binary form; therefore Fig.2. GUI to choose cover image file secret file can be taken of any format which can be converted into Base64. Step 3: Selected cover image is displayed as shown in Fig. 3. . Two custom-made packages are implemented in SteganoPixTrans for embedding and extracting the image with following features  The pixel value differencing is computed for Red, Green, and Blue (RGB) components between non- overlapping pixels of selected diagonal path of cover

3031 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

Fig. 3. GUI to display selected cover image Fig. 6. GUI to display selected stego-image Step 4: Selecting the secret file- Click on button Select Secret File then file chooser is displayed, then select desired secret Step 7: Extracting process- Click on button Start Extracting file as shown in Fig. 4. Process, then extracting process starts and extracted image is displayed as shown in Fig. 7.

Fig.4. GUI to choose secret file

Step 5: Selected secret file is displayed shown in Fig. 5.

Fig.7. GUI to display extracted secret file

2.3.5 Tailored Modules of SteganoPixTrans Tool SteganoPixTrans is made up of numerous Java classes and modules, few core classes and modules are described in this sub section. Several function parameters are used in tailored classes where meaning of each parameter is self-descriptive. . SteganoPixTransGUI.java one of front-end program comprises of public class SteganoPixTransGUI extends javax.swing.JFrame, this class is used to design Graphical User Interface for proposed tool. JFileChooser, a Java Fig. 5. GUI to display selected secret file class instantiated in customized module as Step 6: Embedding process- Click on button Start Embedding MyFileChooser() is invoked to choose desired cover file Process, then embedding process starts and Stego-Image is name (Fig. 2), secret file name (Fig. 4). Easy to use GUI displayed as shown in Fig. 6. components are aimed for selecting cover image, secret file and for starting embedding process, extracting process on clicking the button as followed- . On clicking the button Select Cover Image, selected file is displayed on GUI as shown in screen shoot Fig. 3.

3032 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

Similarly On clicking the button Select Secret File, . ConvertBase64ToFileDEcoder.java includes tailored public selected file is displayed on GUI as shown in screen shoot class ConvertBase64ToFileDEcoder and constructor Fig. 5. ConvertBase64ToFileDEcoder (String . StartFileEmbedProcess.java contains custom-made public ExtractedBase64FileName, String ExtractedFileName) class StratFileEmbedProcess and constructor IOException, Exception. This constructor when invoked, it StratFileEmbedProcess (String coverImageFileName, transform Base64 format of file to original format of secret String secretFileName, String StegoImageFileExtension) file. This customized class is using Apache commons throws IOException, Exception. This constructor is code open source method Base64.decodeBase64(byte []) invoked by instantiating a class StratFileEmbedProcess operates directly on binary stream. This method converts on clicking the button Start Embedding Process (Fig. 6). Base64 format of file to original binary stream of file. This constructor contains codes to embed the secret bits . Customized module static int[] EmbedSecreteBits(String of selected secret file into selected cover image by embedBitSecret, String bitsRed, String bitsGreen, String implementing the PVD based steganography algorithm. bitsBlue, int NoBitsToHide, int rgbNoBitsToHide) throws . StartExtractFileProcess.java contains custom-made public IOException, Exception, used to embed secret bits string class StartExtractFileProcess and constructor into RGB components of each pixel. This module is StartExtractFileProcess (String stegoImageFileName, invoked by constructor of StratFileEmbedProcess.java. String ExtractedBitsTextFileName) throws IOException, . Customized module static String ExtractBits (String Exception. This constructor is invoked by instantiating a bitsFromExtract, int rgbNoBitsToExtract) used to extract class StartExtractFileProcess on clicking the button Start secret bits string from RGB components of each pixel Extracting Process (Fig. 7). This constructor extracts the which is invoked by constructor of bits of secret file from stego-image file by implementing StartExtractFileProcess.java the extracting process of PVD based steganography . ConvertBitsToBase64.java includes the tailored public algorithms. class ConvertBitsToBase64 and constructor . ConvertFileToBase64ENcoder.java contains tailored ConvertBitsToBase64 (String ExtractedBitsTextFileName, public class ConvertFileToBase64ENcoder and String ExtractedBase64FileName) throws IOException, constructor ConvertFileToBase64ENcoder (String Exception. This constructor when invoked, it transforms secretFileName) throws IOException, Exception, used to extracted bits to char (Base64) text file, then constructor transform secret data like video, audio, image, text into ConvertBase64ToFileDEcoder is invoked to obtain original Base64 format, a common pipeline (CP), a platform to secret file. provide secret bits for embedding process. This method is . Stego-files and extracted files are also displayed on GUI invoked for preprocessing before embedding process as shown in screen shoot Fig. 6 and Fig. 7. starts. This customized class is using Apache commons code open source method Base64.encodeBase64(byte[]) operates directly on binary stream. This method converts binary stream of any format of file into Base64.

Fig. 8. Stego-images (i) Lena.png (ii) airplane.bmp (iii) Baboon.png (iii) Peppers.png

(i) (ii) (iii) (iv)

Table 1. PSNR and Embedding capacity of different experimented images by using consecutive blocks of 2 x 2 pixels of cover images Embedding capacity in ER SN File Name Image File Size in KB bits PSNR 5.87 1 lina.png 512 x 512 (24 bits) 462.73 1572864.00 50.1106 5.87 2 airplane.bmp 512 x 512 (24 bits) 768.05 1572864.00 50.3287 5.87 3 peppers.png 512 x 512 (24 bits) 526.12 1572864.00 55.3342 5.87 4 baboon.png 512 x 512 (24 bits) 622.26 1572864.00 53.6577

Table 2. PSNR and Embedding capacity of different experimented images by using even consecutive blocks of 2 x 2 pixels of cover images

SN File Name Image File Size in KB Embedding capacity in PSNR ER 3033 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

bits 2.89 1 lina.png 512 x 512 (24 bits) 462.73 786432.00 53.5116 2.89 2 airplane.bmp 512 x 512 (24 bits) 768.05 786432.00 53.228 2.89 3 peppers.png 512 x 512 (24 bits) 526.12 786432.00 56.8328 2.89 4 baboon.png 512 x 512 (24 bits) 622.26 786432.00 57.1874

Fig. 9. Embedding rate (capacity) by choosing consecutive and even consecutive pixels blocks

3034 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

Fig. 10. PSNR values by choosing consecutive and even consecutive pixels blocks

3 EXPERIMENTAL RESULT At this point we are analyzing the performance of our proposed tool SteganoPixTrans for PVD based steganography where m and n are dimension of cover image. by utilizing various stego-images of PNG and BMP formats As indicated by the embedding capacity assessment in Table 1 shown in Fig. 8. and Table 2, a higher estimation of ER indicates that approach PSNR (Peak Signal-to-Noise Ratio) is defined as has better execution as far as the embedding capacity, that is, a carrier image has hold additional confidential bits. However, a small estimation of ER indicates inferior performance. We have experimented proposed steganography tool

SteganoPixTrans with various images like lina.png, MSE denotes Mean Square Error given as: airplane.bmp, peppers.png, baboon.png. Table 1, Fig. 9 and Fig. 10 depicts the embedding rate and visual quality in PSNR of different investigated stego-images obtained from SteganoPixTrans tool by using consecutive blocks of 2 x 2 pixels of cover images. Table 2, Fig. 9 and Fig. 10 demonstrates embedding rate and visual quality in PSNR of different investigated stego-images obtained from where MAX is generally maximum amplitude of the signal or SteganoPixTrans tool by using even consecutive blocks (one simply 255 (for 8 bit data representation 2^8 -1), i and j block left after one targeted block of embedding) of 2 x 2 represents the image coordinates, m and n are dimensions of pixels. Fig. 9 illustrates embedding capacity is significantly the image and I(i, j) is generated stego-image and K(i, j) is the acceptable of presented approach of software tool and Fig. 10 cover image (original image). If PSNR value is less than 30dB, illustrates that the visual quality of stego-image is satisfactory then it indicates there is distortion in image due to embedding in respect to PSNR. Validation of results obtained from of data otherwise better visual quality. If PSNR value is greater proposed tool is done by choosing different targeted locations than 40dB, then high visual quality image is being considered. by using the two cases of experiments. In first, SteganoPixTrans tool using PVD based steganography by Embedding rate is used to represent the percentage of the targeting consecutive blocks of 2 x 2 pixels of cover image and embedded bits of secret data inside the cover image pixel computed embedding rate and PSNR values are shown in area. Table 1, Fig. 9 and Fig. 10. In second, SteganoPixTrans tool The ER is characterized as in eq. (3) using PVD based steganography by changing number of 3035 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

targeting embedding locations by selecting even consecutive 2008. blocks (one block left after one targeted block) of 2 x 2 pixels [6] X. Liao, Q.-Y. Wen, and J. Zhang, ―A Steganographic and computed embedding rate and PSNR values are shown in Method for Digital Images with Four-Pixel Differencing and Table 2, Fig.9 and Fig. 10. It is observed by comparing the Modified LSB Substitution,‖ Journal of Visual embedding rate and PSNR values of both the mentioned Communication and Image Representation, vol. 22, no. 1, cases, that, in first case embedding rate is high than pp. 1–8, 2011. embedding rate of case 2 because number of targeted location [7] C.-H. Yang, C.-Y. Weng, H.-K. Tso, and S.-J. Wang, ―A in case 1 is higher, whereas PSNR values is improved in case Data Hiding Scheme using the Varieties of Pixel-Value 2 as embedding locations are lesser than case 1. This varying Differencing in Multimedia Images,‖ Journal of Systems embedding rate facility is provided in our proposed and Software, vol. 84, no. 4, pp. 669–678, 2011. SteganoPixTrans tool without much impact on visual quality of [8] K.-C. Chang, P.S. Huang, T.-M. Tu, and C.-P. Chang stego-images. Therefore proposed SteganoPixTrans tool is ―Adaptive Image Steganographic Scheme Based on Tri- productive software in term of secured steganography and Way Pixel-Value Differencing,‖ in Proceedings of the IEEE sufficiently high embedding capacity. International Conference on Systems, Man, and Cybernetics (SMC 07), pp. 1165–1170, 2007. 4 CONCLUSION [9] X. Liao, Q.Y. Wen, S. Shi, ―Distributed Steganography,‖ in Presented SteganoPixTrans software tool comprises of Proceedings of Seventh International Conference on custom-made package that converts confidential information Intelligent Information Hiding and Multimedia Signal like video, audio, image, text etc. into Base64 layout, a Processing, pp. 153-156, 2011. common pipeline (CP) that is a platform to convert secret file [10] Fendi, A. Wibisurya, and Faisal, ―Distributed Steganography into Base64 format, also vice-versa. Quality of this tool is that using Five Pixel Pair Differencing and Modulus Function,‖ in comprises the ability to conceal any format of file which can be Proceedings of International Conference on Computer converted into Base64 format. Additionally encouraging Science and Computational Intelligence, ICCSCI, Bali, characteristic of proposed SteganoPixTrans software tool Indonesia,116 (2017), pp. 334–341, 2017. based on PVD steganography methodology is that embedding [11] A.K. Gulve, M.S. Joshi, ―An Image Steganography capacity can be managed by manipulating targeted Algorithm with Five Pixel Pair Differencing and Gray Code consecutive pixels blocks of cover image. Here it is Conversion,‖ International Journal of Image, Graphics and suggestible to trade implanting capacity regarding less Signal Processing, Vol. 6(3), pp. 12-20, 2014. thickness of alterations in cover file since the security of [12] S. Tyagi, A. K. Saxena, and S. Garg, ―Secured High confidential information is the significant prerequisite for Capacity Steganography using Distribution Technique concealed communication, therefore it is preferable to select with Validity and Reliability‖, in Proceedings of even consecutive pixels blocks instead of consecutive pixels International Conference on System Modeling & blocks. In light of our outcomes, we accept that adequate high Advancement in Research Trends, Moradabad, India, implanting bit rate might be accomplished with sufficiently high pp.109 –114, 2016. PSNR value by concentrating on even consecutive pixels [13] V. Kumar, A. Bansal, and S. K. Muttoo, ―Data Hiding blocks and improved secured image steganography. The Method Based on Inter-Block Difference in Eight Queens exploratory assessment and result evaluation shows that Solutions and LSB Substitution‖, International Journal of introduced SteganoPixTrans tool is secured with higher Information Security and Privacy, (IGI Global), Vol. 8(2), imperceptibility of stego-image and adequate payloads within pp. 55-68, 2014.. carrier image. This innovative approach is experimentally [14] A. Bansal, S. K. Muttoo, and V. Kumar, ―Data Hiding feasible. Approach Based on Eight-Queens Problem and Pixel Mapping Method‖, International Journal of Signal REFERENCES Processing, Image Processing and Pattern Recognition, [1] S. Tyagi, R. K. Dwivedi, and A. K. Saxena, "A Novel PDF Vol.7(5), pp.47-58, 2014. Steganography Optimized Using Segmentation Technique," [15] K. Joshi , S. Gill, and R. K. Yadav, ―A New Method of International Journal of Information Technology, Image Steganography Using 7th Bit of a Pixel as Indicator https://doi.org/10.1007/s41870-019-00309-7, Springer, pp 1-9, by Introducing the Successive Temporary Pixel in the 2019. Gray Scale Image‖, Journal of Computer Networks and [2] D.-C. Wu and W.-H. Tsai, ―A steganographic method for Communications, Hindawi, Volume 2018, pp. 10, 2018. images by pixel-value differencing,‖ Pattern Recognition [16] A. A. Al-Sadi, E.S.M. El-Alfy , ―An Adaptive Letters, vol. 24(9-10), pp. 1613–1626, 2003. Steganographic Method for Color Images Based on LSB [3] C. H. Yang and C. Y. Weng, ―A steganographic method for Substitution and Pixel Value Differencing,‖ in Proceedings digital images by multi-pixel differencing,‖ in Proceedings of (ACC 2011) Communications in Computer and of International Computer Symposium, pp. 831–836, Information Science, Vol . (191), Springer. Taipei, Taiwan, 2006. [17] S. Tyagi, R. K. Dwivedi, and A. K. Saxena, "A High [4] K.-H. Jung, K.-J. Ha, and K.-Y. Yoo, ―Image data hiding Capacity PDF Text Steganography Technique Based on method based on multi-pixel differencing and LSB Hashing Using Quadratic Probing", International Journal of Intelligent Engineering and Systems , Vol.12, No.3, pp. substitution methods,‖ in Proceedings of International Conference on Convergence and Hybrid Information 192-202, 2019. Technology (ICHIT 08), pp. 355–358, 2008. [18] Chen Ming Zhang Ru Niu Xinxin Yang Yixian, ―Analysis of [5] J.-C. Liu and M.-H. Shih, ―Generalizations of pixel-value Current Steganography Tools: Classifications & Features‖, differencing steganography for data hiding in images,‖ Proceedings of the 2006 International Conference on Fundament- Informaticae, vol. 83, no. 3, pp. 319–335, IntelligentInformation Hiding and Multimedia Signal

3036 IJSTR©2019 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 8, ISSUE 12, DECEMBER 2019 ISSN 2277-8616

Processing, Information Security Center, Beijing University of Posts & Telecomm, Beijing 100876, China. [19] Sanjive Tyagi, Rakesh Kumar Dwivedi, Ashendra Kumar Saxena, ―High Capacity Steganography Protected using Shamir‘s threshold scheme and Permutation Framework‖, International Journal of Innovative Technology and Exploring Engineering (IJITEE), accepted. NOW PUBLISHED [20] Akram M. Zeki, Adamu A. Ibrahim and Azizah A. Manaf, ―Steganographic Software: Analysis and Implementation‖, International Journal of Computers and Communications, Issue 1, Volume 6, 2012, pp. 35-42. [21] https://en.wikipedia.org/wiki/Base64.

.

3037 IJSTR©2019 www.ijstr.org