ISSN 2319-7080 International Journal of Computer Science and Communication Engineering Volume 3 issue 1(February 2014 issue) w w w .ijcsce.org 35 LITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network Jasmeet Kaur 1 , Nitika Kapoor 2 , Harish Kundra 3 1 Research Scholar, 2,3 Assistant Professor 1,2,3 Department of Computer Science and Engineering, Rayat Institute of Engineering and Information Technology Railmajra, SBS Nagar, (Punjab) INDIA 1 [email protected], 2 [email protected], 3 [email protected]Abstract : - The paper describes the progress in the field of Steganography. The idea behind this technique is to hide the information in the media. The challenge is to make the hidden information untraceable. The concept originate from spatial domain to more enhanced technique. The proposed technique in this paper is Neural Network. By using this technique we make hide the information in better way than simpler techniques in spatial domain. I. INTRODUCTION Classic methods of securing communication mainly base on cryptography, which encrypts plain text to generate cipher text. However, the transmission of cipher text may easily arouse attackers ‟ suspicion, and the cipher text may thus be intercepted, attacked or decrypted violently. In order to make up for the shortcomings of cryptographic techniques, steganography has been developed as a new covert communication means in recent years. It transfers message secretly by embedding it into a cover medium with the use of information hiding techniques. Cryptography and Steganography are two important branches of information security. Cryptography provides encryption techniques for a secure communication. Cryptography is the science that studies the mathematical techniques for keeping message secure and free from attacks [6]. Steganography is the art and science of hiding communication. The word steganography is derived from the Greek word stegos ‖ meaning cover‖ and grafia‖ meaning writing ‖ defining it as ―covered writing .Steganography involves hiding information so it appears that no information is hidden at all. Steganalysis is the science of detecting hidden information. The goal of steganalysis is to break steganography. Steganalysis deals with three important attacks. (a) Visual attacks: one can identify the stego image with the naked eyes (b) Statistical attacks: they reveal the smallest alterations in an image statistical behaviour. It is further subdivided into (i) Passive attack: identifying the presence or absence of a covert messages or embedding algorithm used (ii) Active attacks: used to investigate embedded message length or hidden message location or secret key used in hidden process (c) Structural attacks: identifying the changes in the cover file. Steganography is employed in various useful applications, e.g., copyright control of materials, enhancing robustness of image search engines and smart IDs (identity cards) where individuals‟ details are embedded in their photographs. Other applications are video-audio synchronization, companies‟ safe circulation of secret data, TV broadcasting, TCP/IP packets (for instance a unique ID can be embedded into an image to analyze the network traffic of particular users), and also checksum embedding [8]. One method of common Steganography technique is to hide the secret message in the least significant bits of pixels of the cover image. The image quality of stego image achieved by applying the LSB technique is very closer to the original one. But the drawback is it cannot survive image processing manipulations. One method of LSB Steganography involves manipulating the LSB plane from direct replacement of the cover image with message bits to some type of logical or arithmetic combination between two. Several examples of LSB techniques are found. This technique achieves both high capacity and low perceptibility. But it is not very sophisticated and subject to extraction by unwanted persons. Masking and filtering techniques usually restricted to 24 bits or grayscale images. These methods are effectively similar to „paper watermarks‟, creating markings in an image. This can be achieved for example by modifying the luminance of parts of the image. While masking does change the visible properties of an image, it can be done in such a way that the human eye will not notice the anomalies. Least Significant Bit maintains a good visual quality of stego-image, it can hide little information. Considering the drawback of LSB, some methods begin to take account of the visual identity that human eyes are insensitive to edged and textured areas when embedding secret information, such as BPCS(biplane complexity segmentation),PVD(pixel value differencing), MBNS (multiple base notational system ), SOC, Side Match and WCL. The capacity of embedded information is thereby greatly improved while the quality of visual imperceptibility is maintained. As human vision sensitivity is complex, it is hard to exactly decide whether a pixel is in less sensitivity areas or not. Thus, based on the contrast and texture sensitivity, we train self-organizing map Neural Networks (NNs) trained to distinguish pixels in less sensitive areas from pixels in more sensitive areas. So, NNs trained is the secret key. Then, we use NNs trained to classify pixels, and select pixels in less sensitive areas to embed more secret data. On the receiving side, the original image is not needed for extracting the embedded data. Neural approach adds the complexity for the hackers accessing and also presents high potentiality in defense operations. Neural Steganography is a powerful tool that enables people to communicate without possible eavesdroppers even knowing there is a form of communication. Basic elements of steganography in images are shown in Figure 1. The carrier image in steganography is
5
Embed
LITERATURE SURVEY: Steganography Using …static.ijcsce.org/wp-content/uploads/2014/04/IJCSCE020714.pdfLITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
ISSN 2319-7080 International Journal of Computer Science and Communication Engineering Volume 3 issue 1(February 2014 issue)
w w w .ijcsce.org
35
LITERATURE SURVEY: Steganography Using Redundant
Bit Replacement By Neural Network Jasmeet Kaur
1, Nitika Kapoor
2, Harish Kundra
3
1Research Scholar,
2,3Assistant Professor
1,2,3 Department of Computer Science and Engineering, Rayat Institute of Engineering and Information Technology