International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015

A Survey on Various Techniques to Secure Images using various methods like stegnography watermarking and

Varsha Shakti1, Mr. Anil Khandekar2 Pursuing M.E.1, Asst. Professor2 Indore Institute of Science & Technology, Indore [email protected]

ABSTRACT: The image security on internet transfers is the concern of the hour as the breaching attacks into the image databases are rising every year. The hackers take advantage of the stolen personal and important images to fulfill their dangerous and unethical intentions. The image data theft can be used to defame a person on the internet by posting the illegal and unacceptable images of that person (internet user). Hence the images transfers have to be secure to ensure the privacy of the user’s image data. In this research, a number of image security systems have been studied to evaluate the research gap. Majority of the existing image security systems are not up to date to protect against the latest breaching attacks. So, we have proposed an effective and robust image security framework particularly designed for the images. The proposed has been designed and implemented using MATLAB. In this research, a hybrid image security framework has been proposed to overcome the problem stated earlier, which will be implemented by combining various techniques together to achieve the image security goal. The techniques included in the combination would be image compression, cryptography and . DWT compression has been used, because it is a stronger compression Algorithm. The stegano graphed image would be compressed to reduce its size. Blowfish Algorithm would be used for the encryption purposes. It offers maximum throughput (faster) and also energy efficient. Compressed image would be encrypted to enhance the image security. Real image will be hidden into another image. A cluster based steganographic technique will be used. Real image and face image would be analyzed, and the real image would be embedded in those areas of face image, where color schemes of the real image and face image would be most similar. Kmeans or Hierarchical clustering would be used as a clustering technique. An all new comparative analysis technique would be applied to make the comparison between real image and base image on the basis of color patterns.

Keywords:- Transfers Image Security, Image compression, Image steganography, Image encryption, image.

1. Introduction: converting a message text into an unreadable .A large number of cryptography algorithms have been created till Cryptography and Steganography are well known date with the primary objective of converting information and widely used techniques that manipulate information in into unreadable Cryptography systems can be broadly order to cipher or hide their existence respectively. classified into symmetric- systems and public key Steganography is the art and science of communicating in a systems. The symmetric key systems uses a common key for way which hides the existence of the communication. encryption and decryption of the message. This key is shared Steganography word is of Greek origin and essentially means privately by the sender and the receiver. The sender encrypts concealed writing. Protection of the transmitted data from the data using the joint key and then sends it to the receiver being intercepted or tampered has led to the development of who decrypts the data using the same key to retrieve the various steganographic techniques. Cryptography involves original message. The public-key systems that use a different

Paper ID: 2015/IJTRM/12/2015/6255 1

International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015

key for encryption as the one used for decryption. Public key Five hundred years ago, the Italian mathematician systems require each user to have two keys – a public key Jérôme Cardan reinvented a Chinese ancient method of secret and a private key (secret key). The sender of the data writing. The scenario goes as follows: a paper mask with encrypts the message using the receiver’s public key. The holes is shared among two parties, this mask is placed over a receiver then decrypts this message using his private key. blank paper and the sender writes his secret message through Cryptography scrambles a message so it cannot be the holes then takes the mask off and fills the blanks so that understood; the Steganography hides the message so it the message appears as an innocuous text. This method is cannot be seen. Even though both methods provide security, credited to Cardan and is called Cardan [4]. a study is made to combine both cryptography and This section attempts to give an overview of the Steganography methods into one system for better most important steganographic techniques in digital images. confidentiality and security. The most popular image formats on the internet are Graphics The steganography and cryptography differ in the Interchange Format (GIF), Joint way they are evaluated: steganography fails when the Photographic Experts Group (JPEG), and to a lesser ”enemy” is able to access the content of the cipher message, extent - the Portable Network Graphics (PNG). One of the while cryptography fails when the ”enemy” detects that there earliest methods to discuss digital steganography is credited is a secret message present in the steganographic medium. to Kurak and McHugh [1], who proposed a method which The disciplines that study techniques for deciphering cipher resembles embedding into the 4 LSBs (least significant bits). messages and detecting hide messages are called They examined image downgrading and contamination and steganalysis. Steganalysis is "the process of which is known now as image-based steganography. detecting steganography by looking at variances between bit The survey of Johnson [6] appeared in the patterns and unusually large file sizes" [3]. It is the art of “Information hiding” book, which limits its distribution discovering and rendering useless covert messages. The goal compared to a Journal paper which can be more affordable. of steganalysis is to identify suspected information streams, The classification, herein, of the techniques and that of determine whether or not they have hidden messages Johnson are different. Johnson classify steganography encoded into them, and, if possible, recover the hidden techniques into: Substitution systems, transform domain information. The cryptanalysis is the process of encrypted techniques, spread spectrum techniques, statistical methods, messages can sometimes be broken the cipher message is distortion techniques, and cover generation methods. Johnson otherwise called as breaking, although modern survey neither talks about the history of steganography nor its cryptography techniques are virtually unbreakable. grating applications.Johnson work has not included test images that together cryptography and steganography through some can allow readers visualize the concepts. media such as image. In this paper, the secret message is Creighton T. R. Hager worked on the Performance embedded within the image called cover-image. Cover-image and Energy Efficiency of Block Ciphers in Personal Digital carrying embedded secret data is referred as stegno-image. Assistants [3]: The author has performed a comparative analysis of various encryption algorithms on various kinds of data. This research has proved that blowfish outperforms all 2. Literature Survey: other encryption algorithms. Blowfish is the best, unbreakable and fast encryption algorithm than others. Gary The word steganography is originally derived from C.Kessler has written an Overview of Cryptography: Greek words which mean “Covered Writing”. It is defined as Cryptographic [3]: This is an old published paper on "hiding information within a noise; a way to supplement cryptography by Gary C. Kessler, and since then it was encryption, to prevent the existence of encrypted data from continuously updated till date. It was last updated in 2014. being detected" [1]. It has been used in various forms for The author suggested the great source for the cryptography thousands of years. In the 5th century BC Histaiacus shaved a algorithms again. It is very important to understand the slave’s head, tattooed a message on his skull and the slave encryption algorithm structure before putting it in the use. was dispatched with the message after his hair grew back [ 2, Navita Agarwal et al. have develope Efficient Pixel- 4,5,7]. shuffling Based Approach to Simultaneously Perform Image In Saudi Arabia at the King Abdulaziz City of Compression, Encryption and Steganography [1]: The science and technology, a project was initiated to translate authors have conducted a similar research, where they have into English some ancient Arabic manuscripts on secret applied compression, encryption and steganography on the writing which are believed to have been written 1200 years digital image data. Pixel shuffling based symmetric ago. Some of these manuscripts were found in Turkey and encryption algorithm, DCT for compression, WinRAR to Germany [10]. Image steganography are used to achieve the proposed model in this paper.

Paper ID: 2015/IJTRM/12/2015/6255 2

International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015

Evolution of Steganography: For understanding the term steganography, its predecessor i.e. cryptography, has to understand first. An art of protecting information by transforming it into an unreadable format, called cipher text is known as cryptography. To decipher this unreadable format, a secret key is required. Cryptography has followed man through many stages of evolution. Cryptography can be found as far back as 1900 B.C. in ancient Egyptian scribe using non-standard hieroglyphics in an inscription. From 500 – 600 B.C. Hebrew scribes used , a reversed alphabet simple solution cipher. From 50 - 60 B.C. Julius Caesar used a simple substitution with the normal alphabet in government communications. [1] Cryptography continued through history with many variations. Today cryptography Figure 1: Classification of Steganography has evolved as . Quantum cryptography combines physics and cryptography to produce Steganography is mainly of two types, linguistic a new that cannot be defeated without the steganography and technical steganography. sender and receiver having the knowledge of the attempted In linguistic steganography, machine readable data and failed intrusion. Through the long history of is encoded to innocuous natural language text, thereby cryptography, steganography was developed and flourished providing security against any arbitrator tolerating natural on its own. Steganography comes from the Greek steganos language as a communication medium.[4] In this approach, (covered or secret) and -graphy (writing or drawing). linguistic properties of a text are customized to hide Steganography can be defined as the hiding of information by information. Language has the property that a small local embedding messages within other, seemingly harmless change to a text, e.g. replacing a word by a word with same messages, graphics or sounds. During times of war, context, may result in text which is anomalous at the steganography is used usually. Invisible Inks were used in the document level, or with respect to the state of the world. American Revolutionary War by both the British and Hence finding linguistic transformations which can be American forces. Invisible ink was used to write information applied reliably and often is a challenging problem for on pieces of paper so that the paper appeared to the average Linguistic steganography.[5] person as just being blank pieces of paper. Liquids such as Technical Steganography: Technical steganography milk, vinegar and fruit juices were used, because when each is explained as a carrier rather than a text which can be one of these substances is heated it becomes dark and presented, as any other substantial medium such as microdots become visible to the human eye [3]. A thorough history of and invisible inks. In this context, the cover_media is the file steganography can be found in the followed content of this in which we will hide the secret_data, which may also be paper. encrypted using the stegokey. The resultant file is the stego_media (which will, of course be the same type of file Classification of Steganography: For decades people strove as the cover_ media). There are four ways to implement to develop innovative methods for secret communication. steganography: Classification of information hiding can be depicted as 1. Using text. follows: 2. Using images. 3. Using audio files. 4. Using video files

3. Steganography Combined with

Cryptography: There are many aspects to security and many applications. One essential aspect for secure communications which is needed with steganography is cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient.

Paper ID: 2015/IJTRM/12/2015/6255 3

International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015

There are some specific security requirements [30] features and only parties who possess the decoding stego-key for cryptography, including Authentication, Privacy / will be able to extract and view the features. In an image confidentiality, and Integrity Non-repudiation. database, keywords can be embedded to facilitate search engines. If the image is a frame of a video sequence, timing The three types of algorithms are described: markers can be embedded in the image for synchronization  Secret Key Cryptography (SKC):Uses a single key for with audio. The number of times an image has been viewed both encryption and decryption. can be embedded for “pay-per-view” applications. Secret  Public Key Cryptography (PKC): Uses one key for Communications: In many situations, transmitting a encryption and another for decryption (iii)Hash cryptographic message draws unwanted attention. The use of Functions: Uses a mathematical transformation to cryptographic technology may be restricted or forbidden by irreversibly "encrypt" information. Steganography is the law. However, the use steganography does not advertise other technique for secured communication. It covert communication and therefore avoids scrutiny of the encompasses methods of transmitting secret messages sender, message, and recipient. A trade secret, blueprint, or through innocuous cover carriers in such a manner that other sensitive information can be transmitted without the very existence of the embedded messages is alerting potential attackers or eavesdroppers. 7. undetectable. Information can be hidden in images [21], audio, video, text, or some other digitally representative 5. Conclusion: code. Steganography systems can be grouped by the type of covers [30] used (graphics, sound, text, executables) By this survey paper reader can get deep or by the techniques used to modify the covers understanding of what is steganography. It is analyzed that it o Substitution system b)Transform domain is impossible to stop and detect the threats completely. As techniques steganography is widespread, but alone it is not sufficient for o Spread spectrum techniques d)Statistical method hiding a secret message. So for this requirement, o Distortion techniques e)Cover generation methods cryptography is combined with steganography to archive the  same

References: 4. Applications: [1] A.Joseph Raphael, Dr.V Sundaram, “Cryptography and There are many applications for digital Steganography – A Survey”, Int. J. Comp. Tech. Appl., Vol 2 steganography of images, including copyright protection, (3), 626-630 ISSN:2229-6093. feature tagging, and secret communications [26]. Copyright [2] Gandharba Swain, Saroj Kumar Lenka,“A Hybrid Approach to Protection: A secret copyright notice or watermark can be Steganography Embedding at Darkest and Brightest Pixels”, Proceedings of the International Conference on embedded inside an image to identify it as intellectual Communication and Computational Intelligence – 2010, property [27]. This is the watermarking scenario where the Kongu Engineering College, Perundurai, Erode, T.N.,India.27 message is the watermark [27]. The “watermark” can be a – 29 December,2010.pp.529-534. relatively complicated structure. [3] Ronak Doshi,Pratik Jain,Lalit Gupta,” Steganography and Its In addition, when an image is sold or distributed an Applications in Security”, International Journal of Modern identification of the recipient and time stamp can be Engineering Research (IJMER) Vol.2, Issue.6, Nov-Dec. 2012 embedded to identify potential pirates. A watermark can also pp-4634-4638 ISSN: 2249- 6645. serve to detect whether the image has been subsequently [4] Richard Bergmair ,”Towards Linguistic Steganography: A modified [28]. Detection of an embedded watermark is Systematic Investigation of Approaches, Systems, and Issues Oct-03 – Apr-04. performed by a statistical, correlation, or similarity test, or by [5] Richard Bergmair. 2007 A comprehensive bibliography of measuring other quantity characteristic to the watermark in a linguistic steganography. In Proceedings of the SPIE stegoimage. Conference of security. Steganography and watermarking of The insertion and analysis of watermarks to protect multimedia contents, 6505. copyrighted material is responsible for the recent surge of [6] L. Y. POR, B. Delina, “”Information Hiding: A New Approach interest in digital steganography and data embedding. Feature in Text Steganography”, 7th WSEAS Int. Conf. on applied Tagging: Captions, annotations, time stamps, and other computer & applied computational science (ACACOS '08), descriptive elements can be embedded inside an image, such Hangzhou, China, April 6-8, 2008. as the names of individuals in a photo or locations in a map. [7] Chamkour Singh, Gauravdeep, “Cluster based Image Steganography using Pattern Matching”, IJAIR, vol. 2, issue 5, Copying the stego-image also copies all of the embedded 2013.

Paper ID: 2015/IJTRM/12/2015/6255 4

International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015

[8] Verma O.P., Agarwal R., Dafouti D., “Performance analysis of data encryption algorithms”, ICECT, vol. 5, pp. 399-403, IEEE, 2011 [9] Gary C.Kessler, “An overview of steganography for the computer forensics examinier”, vol. 6, no. 3, Forensic science communications, 2011. [10] Xiangui Kang, Jiwu Huang, “A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression”, ITCSVT, vol. 13, issue 8, pp. 776-786, IEEE, 2003. [11] Sonja Grgic, Mislav Grgic, “Performance Analysis of Image Compression Using Wavelets”, ITIE, vol. 48, issue 3, pp. 682- 695, IEEE, 2001. [12] Domenico Bloisi and Luca Iocchi, “IMAGE BASED STEGANOGRAPHY AND CRYPTOGRAPHY”, Sapienza University of Rome, Italy,2002. [13] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview of image steganography." ISSA. 2005. [14] Jalal Karam, “A New Approach In Wavelet Based Speech Compression”, Mathematical Methods, Computational Techniques, Non-LinearSystems, Intelligent Systems, pp. 228- 233, 2008 [15] IngYannSoon, FengZhou, ZhenLi, HaijunLei, Baiying Lei, A robust audio watermarking scheme based on lifting wavelet transform and singularvalue decomposition, Signal Processing, vol. 92, pp. 1985-2001, Science Direct, 2012

Paper ID: 2015/IJTRM/12/2015/6255 5