0% found this document useful (0 votes)
23 views4 pages

2020 Paper2 Linear-Recursion

This paper discusses an innovative approach to information hiding using a linear recursive method to enhance steganography techniques. It focuses on embedding secret messages within 24-bit BMP images by randomizing pixel selection, thereby improving robustness against detection. The effectiveness of the proposed method is analyzed based on three parameters: capacity, robustness, and perceptibility.

Uploaded by

advika370
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

2020 Paper2 Linear-Recursion

This paper discusses an innovative approach to information hiding using a linear recursive method to enhance steganography techniques. It focuses on embedding secret messages within 24-bit BMP images by randomizing pixel selection, thereby improving robustness against detection. The effectiveness of the proposed method is analyzed based on three parameters: capacity, robustness, and perceptibility.

Uploaded by

advika370
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Scientific & Engineering Research Volume 11, Issue 6, June-2020 314

ISSN 2229-5518

Information Hiding using Linear Recursion


Ruchika Sharma
Assistant Professor, JaganNath Institute Of Management Sciences,
JIMS, New Delhi-110085
E-mail: [email protected], [email protected]

Dr.Vinay Kumar
Ex Scientist, GOI and Ex Dean & Professor, VIPS, GGSIPU, Delhi, India
E-mail: [email protected]

Abstract

Preserving the privacy of information has been always a challenge to the researcher community. Since the advent of Information
Communication Technology, it has become even more challenging to maintain the privacy of information while transferring it over the public
network. Many techniques have been developed and are being used for the purpose. Onlookers are also working side by side to break the
techniques to breach privacy. Encryption provides a level of security however, it is not meant for hiding the very communication channel.
Information hiding, also known as Steganography, helps in hiding the communication channel itself by placing the information in other
digital media. How randomly the place for hiding a single bit of message is selected in digital media to hide the message, determines the

IJSER
strength of steganography. This paper proposes an information hiding approach based on a recursive equation to randomize the selection
of pixels in digital media while hiding the information. We have used a 24 bit BMP image as cover digital media. We also analyzed the
strength of the approach against the three parameters: Perceptibility, Robustness and Capacity.

Keywords - Steganography, BMP file, linear recursion, steganalysis, Information hiding, perceptibility, robustness, capacity.

1. INTRODUCTION
Information Hiding is the process of hiding secret Least Significant bit(LSB) substitution is the most basic
information in an appropriate carrier [11, 13]. A carrier can example of spatial domain steganography.
be any digital file e.g., audio, video, image, text, etc., [10, 12,
14]. To hide information, Steganography is used. 1.2 Frequency Domain Steganography
Steganography is a process of embedding secret In Frequency domain steganography, images are first
information in digital media [1, 2, 8, 9]. This paper intends converted into the frequency domain and then secret
to generate pixel locations in the BMP image file to hide information is embedded in their transformed coefficients
secret information. [17]. The flowchart of spatial domain steganography is
The goal of steganography is to hide the very fact that shown in Fig. 2.
communication is taking place. Steganography can be
classified in two ways :

1.1 Spatial Domain Steganography


Spatial domain steganography works directly on pixel
values[16].In Spatial Domain Steganography, secret
information directly embeds in pixel values. The flowchart
of spatial domain steganography is shown in Fig. 1

Discrete Cosine Transform (DCT) and discrete wavelet


transform (DWT) are examples of the Frequency domain
steganography technique.
IJSER © 2020
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 11, Issue 6, June-2020 315
ISSN 2229-5518

This paper proposes a new way of hiding information in c. 8-bit (256 colours)
digital cover using Linear Recursive approach. The main d. 24-bit (16 million colours). Even in 24-bit colour,
advantage of using the Linear Recursive approach is its the colours are restricted to RGB combinations
Robust feature. In the proposed approach, the bit places are
randomized to hide secret information, so it becomes more The BMP file format stores colour information for each and
difficult for any intruder to detect the very presence of every pixel in the image without any compression. For
secret information. example, a 60x60 pixel BMP image will include color data
The paper is organized into 7 sections. Section 2 contains a for 3600 pixels. This way of storing image information
theoretical description of the Linear recursive approach. allows crisp, high-quality graphics, but it generates files
Section 3 contains a description of bitmap file format. In having large file sizes. The JPEG (Joint Photographic Expert
Section 4, the conceptual approach of Linear Recursion is Group) and GIF (Graphical Interchange formats) are also
explained with an algorithm to find randomize bit locations bitmaps, but they use image compression algorithms which
to hide secret information is generated. Section 5 explains can significantly decrease their file size. For this reason,
the implementation process of the proposed approach. In JPEG and GIF images are used on the Web, while BMP
section 6, Steganalysis is done to check the strength of images are often used for printable images [3, 4].
embedded algorithm against three parameters capacity,
robustness and perceptibility. The paper is concluded in 4. CONCEPTUAL APPROACH
Section 7. In this paper, the linear recursive approach is used. The
concept focuses on using a 24 bit BMP image format to hide
2. LINEAR RECURSIVE APPROACH information. Linear recursive approach generates different
Recursion is the process of repeating items in a self-similar pixel locations in a 24 bit BMP file to hide secret
way. The most common application of recursion is in information. A 24 bit BMP file format is best for hiding

IJSER
computer science, in which it refers to a method of defining secret information because of its size. The concept considers
functions in which the function being defined is applied a 24 Bit BMP image, Linear recursive approach and initial
within its own definition [7]. value which is used with a linear recursive approach.
When the Linear Recursive approach is used to hide The algorithm to generate pixel locations to hide secret
information, we interpret it as a “Recursive Approach to information is as follows:
Data Hiding”. Linear Recursive approach is used to send 4.1 The initial value finds the first-pixel position to hide
secret messages embedded inside digital cover like information and then using this initial value in linear
pictures, videos, etc. recursive approach, the next pixel position is generated and
Using the linear recursive approach, one may find places so on. For example, if 24 bit BMP is of 40 *50 size then the
(bit positions) where secret information can be hidden. The total number of pixels in the image is 2000. Each pixel is of
recursive approach is used to find the location where we 3 bytes so total image size is 6000 bytes. The total space for
can make changes in bit positions. We find places where hiding secret information is 6000 bytes.
information can be changed and later we can retrieve the 4.2 This paper uses a modulo mathematical approach to
information by using the same recursive approach. generate new pixel locations if the generated pixel position
is beyond the total size. If the recursive approach generates
3. BMP FILE FORMAT pixel position which is beyond 6000, for example, 7345 then
BitMap files are uncompressed; hence they are large in size. the Modulo mathematical approach is used. Modulo
The advantage is that they are simple and got wide mathematical approach takes out the mod of the number
acceptance in Windows programs. and generates the remainder. In the above example, 7345
Bitmap files are structured in four parts: mod 6000 will generate 1345th location. So the secret
3.1. The bitmap file header i.e., the size of the bitmap information will be stored at 1345th pixel location.
file 4.3 Incase if the modulo approach generates the same pixel
location then increment the pixel location by 1 and secret
3.2. The bitmap information header i.e., the color format, information will be stored at a new incremented location.
compression if used and the file dimensions. For example, if the modulo approach generates 1345th
location again then the new incremented pixel location is
3.3..The bitmap color table i.e., which contains details of all 1345+1=1346. So secret information will be hidden at this
the colors present in the bitmap new location.
3.4. The bitmap document array, which contains the actual
bits of the bitmap image in a consecutive line-by-line pixel
5. IMPLEMENTATION
array [2].
Suppose the secret message to be hidden, is “Linear
Bitmap file formats can be saved in four different bit
recursive equation”. To hide the above sentence, we have to
depths:
generate ASCII code of all alphabets and then their
a. 1-bit (monochrome)
corresponding binary equivalents
b. 4-bit (16 colours),
Alphabets ASCII Code Binary
IJSER © 2020
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 11, Issue 6, June-2020 316
ISSN 2229-5518

Equivalent equivalent is 01101100, we find another pixel locations to


store LSB i.e., 0 of the secret message, we again generate
108 01101100 pixel locations as follows
l
t8 = at7+5
105 01101001 t8=2*765+5=1535
i
t9=2*1535+5=3075
110 01101110 t10=2*3075 + 5=6155
n
t11=2*6155+5=12315
101 01100101
e t12= 2*12315+5=24635
t13=2*24635+5=49275
97 01100001
a t14=2*49275+5=98555
114 01110010 t15=2*98555+5=197115
r Second alphabet i, whose MSB, the last bit will be stored at
197115th pixel location.
Now to store the next character n, whose binary equivalent
Total characters in secret message =23 is 01101110, we will again find pixel locations. To store 0
Each character takes one byte in memory. (the LSB of the secret message), the calculated pixel location
Total number of bits to be hidden= 23* 8= 184 bits is
Consider a Linear Recursive Equation t16 = 394235 but we have total 27000 locations.
tn = a tn-1 + b So to store t16 we use the modulo Mathematical Approach.
The constant value of a=2 The modulo approach generates remainders. So using this
The constant value of b=5 approach, we can generate new locations to hide
Initial value (t0) = 1

IJSER
information.
Using this recursive Equation, we will find out the pixel As we have generated t16=394235,
locations where the first alphabet of secret information can We use the mod to take out new location
be hidden. t16= t16 mod 270000=124235 so the LSB 0 of secret
Let us take a 24-bit BMP image of 300*300 size i.e 300 information 01101110 will be stored at a new calculated
columns and 300 rows. byte location is 124235.
The total number of pixels=300*300 =90000 pixels. t17=788475, t17=t17 mod 270000=248475, so the 18th bit of
Each pixel takes 3 bytes of storage, so the total number of secret information ‘1’ will be stored at 2,48,475th byte
bytes=90000*3=270000 bytes location.
Total space occupied by 24-bit BMP image in bytes = t18=1576955, t18=t18 mod 270000=226955, so the 19th bit of
270000. secret information ‘1’ will be stored at 226955th byte
First alphabet is l whose binary equivalent is 01101100. location.
Starting from LSB, the first bit is 0. t19=3153915, t18=t18 mod 270000=183915
This means the first bit i.e., 0 of the secret message will be When we take out mod operation, it is possible to get the
stored at t0 location. same location again. This will create a problem as already
t0=1, so 0 will be hidden at pixel location 1 some information is hidden at that location.
Now, To resolve this issue, we increment the byte location by 1
t1=a t0 + b and store the hidden information at a new location.
t1=2*1+5=7 For example, t19= 183915 and t23 =183915.
This means the second bit i.e., 0 of the secret message will 20th bit of hidden information will be stored at 183915th
be stored at 7th pixel. location but t23 also generated the same location so 24th bit
t2= a t1 + b cannot be stored at that location.
t2= 2* 7 + 5=19 The solution is
This means the third bit i.e., 1 of the secret message will be t23=183915+1=183916, so the 24th bit will be stored at a
stored at 19th pixel. new location, which is generated by incrementing the byte
t3= a t2 + 5 location by 1.
t3 = 2* 19 + 5=43
This means the fourth bit i.e., 1 of the secret message will be 6. STEGANALYSIS
stored at 43rd pixel. Steganalysis refers to the detection of hidden content. It
t4 = 91, so fifth bit i.e., 0 will be hidden at 91th pixel identifies the existence of hidden information. The objective
t5 = 187, so sixth bit i.e., 1 will be hidden at 187th pixel of steganalysis is to determine accurately whether a secret
t6 = 379, so seventh bit i.e., 1 will be hidden at 379th pixel message is hidden in the stego cover or not [5].
t7 =765, so eighth bit i.e., MSB 0 will be hidden at 765th Steganography and steganalysis go side by side to ensure
pixel the strength of the embedded algorithm of a
We found the places to store the binary equivalent of l at steganographic communication system. The embedded
different pixel locations. To hide next i, whose binary
IJSER © 2020
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 11, Issue 6, June-2020 317
ISSN 2229-5518

algorithm is tested on three parameters: Capacity, [4] Kirkby, D., (2001). BMP Format, Available at
Robustness and Perceptibility. http://atlc.sourceforge.net/bmp.html
Capacity: This factor determines the amount of information [5] Niels Provos and Peter Honeyman, Hide and seek: An introduction to
that can be hidden in the given digital cover. The more steganography, IEEE Security and Privacy, vol. 1, no.3, pp. 32-44, 2003.
information is hidden the more it is likely to be detected. [6] Lin T. and Delp J., “A Review of Data Hiding in Digital Images,” in
Robustness: It is the amount of modification the stego cover Proceedings of the Image Processing, Image Quality, and Image Capture
can withstand before an adversary can destroy Conference, Georgia, pp. 274-278, 1999.
hidden information [6]. [7] Kumar, V., (2002). Discrete Mathematics. New Delhi, India: BPB
Perceptibility: It is the factor that determines whether the Publication.
stego is maintaining the similarity with the original digital [8] Stallings, W., (1999). Cryptography & Network Security: Principles and
cover. More similarity implies it is less likely to be Practice. NY, USA: Prentice Hall.
perceived as stego. [9] Schneier, B., (1996). Applied Cryptography: Protocol, Algorithms, and
These three factors are represented in Fig. 3 and used to Source Code in C, 2nd ed., John Wiley & Sons, New York
determine the quality of the embedding algorithm in any [10] Bender, W., Gruhl, D., Morimoto, N. and Lu, A. (1996). ‘Techniques for
steganographic system [15]. Since these factors are data hiding’. IBM Systems Journal, Vol. 35, Nos. 3–4, pp.313–336.
contradictory, a balanced approach needs to be adopted. [11] F.A.P Petitcolas, R.J. Anderson and M.G. Kuhn ; “Information Hiding
We propose to carry out the planned work to overcome a Survey”, Proceedings of the IEEE, vol.-87, issue 7, pp. 1062-1078, 1999.
such limitations and achieve an optimized result. [12] K. Ahsan, & D. Kundur , “Practical data hiding in TCP/IP”, Proceeding
of the workshop on multimedia security at ACM multimedia,2002.
[13] K..M. Singh, L.S. Singh, A.B. Singh and K.S. Devi,“Hiding Secret
Message in Edges of the Images”, Information and Communication
Technology, 2007. ICICT ‘07, pp. 238-241.

IJSER
[14] Jagvinder Kaur and Sanjeev Kumar, ” Study and Analysis of Various
Image Steganography Techniques” IJCST Vol.2, Issue 3, September 2011
[15] Johnson, N.F. and Jajodia, S. (1998b), ‘Steganalysis of images created
using current steganography software’, Proceedings of the 2nd Information
Hiding Workshop, Portland, OR, April 14-17, pp. 273-289.
[16] A. Westfeld, “F5-A steganographic algorithm: High capacity Despite
Better Steganalysis”, Proc.4th Int’l Information Hiding. Workshop, Springer
,verlag vol . 2137 , New York,2001.
[17] I. Cox, J. Kilian, T. Leighton and T. Shamoon, “Secure spread spectrum
7. CONCLUSION watermarking for multimedia”. IEEE Transaction On Image processing, Vol
We have introduced a new technique of hiding information 6, issue 12 , pp1673-1687,1997.
in BMP image files using the Recursive Equation Approach.
A recursive equation is used to find the location of the next Biographical Notes
pixel in the cover image while hiding the next bit of the
secret message. The strength of the proposed technique is Ruchika Sharma is an Assistant Professor in Jagannath Institute of
also analyzed using different parameters of steganalysis. Management Sciences, Delhi. She completed MBA(IT) from Symbiosis and
M.Phill in Computer Science from Global Open University.
Dr. Vinay Kumar did his Ph. D. from the University of Delhi, MCA from
ACKNOWLEDGEMENT Jawaharlal Nehru University, Delhi. He worked as a scientist in National
Informatics Centre (NIC), Government of India for approximately 21 years.
Encouragement, support and suggestions for content He also worked with Vivekananda Institute of Professional Studies (VIPS),
improvement from all colleagues, peers and seniors are affiliated to GGSIPU, as Professor and Dean of the IT Department and
gratefully acknowledged, which will remain essential for Research and Publication. He has extensively contributed to the knowledge
present and future scientific thought processes beyond arena through his books and research publications. He has published over 100
scheduled professional endeavors. research papers in refereed journals and authored a book of Discrete
Mathematics and a memoir Killed Instinct.

REFERENCES
[1] Anderson, R. and Petitcolas, F., (1998). ‘On the limits of steganography’.
IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp.474–
481.
[2] Cole, E., (2003). Hiding in Plain Sight: Steganography and the Art of
Covert Communication. USA: Wiley Publishing.
[3] W. Brown and B.J. Shepherd, Graphics File Formats: Reference and
Guide, Manning Publications, Greenwich, Conn, 1995

IJSER © 2020
http://www.ijser.org

You might also like