Image Steganography
Image Steganography
Abstract—Overview: This paper proposes a novel approach to holds immense significance due to its ability to facilitate confidential
enhancing data security in digital images by combining crypto- data exchange while maintaining a veil of secrecy.
graphic methods with steganography techniques. By encrypting By employing image steganography, individuals and organizations
data with established algorithms like AES or RSA before embed- can communicate sensitive information securely, shielding it from
ding it into cover images, this integration ensures confidentiality, unauthorized access and surveillance. This clandestine nature of
even if the stego image is accessed by unauthorized parties. Key steganography makes it invaluable in scenarios where heightened se-
management techniques further enhance security by controlling curity measures are essential, such as military operations, intelligence
access to concealed data. Through a comprehensive review, our gathering, and confidential business transactions. Its effectiveness lies
survey provides insights into the effectiveness of cryptographic- in its ability to conceal information in plain sight, allowing parties to
steganographic techniques, paving the way for future research communicate without arousing suspicion. Thus, image steganography
and innovation. emerges as a pivotal tool in safeguarding privacy and ensuring secure
Objective: This paper investigates the efficacy and applica- communication channels in an increasingly digital and interconnected
tions of cryptographic-steganographic techniques in enhancing world.
data security within digital images. It analyzes RSA and AES Cryptography, derived from the Greek words ”kryptos” (meaning
encryption algorithms, along with LSB and DST steganography hidden) and ”graphein” (meaning writing), encompasses a broad
techniques for data concealment. Additionally, the integration of spectrum of techniques aimed at securing communication channels.
AES encryption with LSB and DST steganography is explored, From ancient ciphers and codes to modern-day cryptographic algo-
emphasizing their advantages in data security and covert trans- rithms, the evolution of cryptography has been marked by a relentless
mission. pursuit of confidentiality, authenticity, and non-repudiation. Funda-
Findings: The paper examines RSA and AES encryption mental cryptographic primitives include symmetric-key encryption,
algorithms, demonstrating their effectiveness in safeguarding asymmetric-key encryption, and hash functions, each serving distinct
sensitive information. Additionally, LSB and DST steganography purposes in ensuring data security. The proliferation of digital tech-
techniques are discussed, highlighting their strengths and weak- nology has propelled cryptography to the forefront of cybersecurity,
nesses. Furthermore, the fusion of AES encryption with LSB and where it plays a pivotal role in safeguarding sensitive information
DST steganography is explored, illustrating how this combination across diverse domains.
enhances data security and covert transmission capabilities.
Results: The proposed approach provides a robust means of
safeguarding sensitive information while maintaining its confi- Fig. 1. Cryptography Process
dentiality and integrity. It has promising implications across
various domains, including secure communication, copyright
protection, and clandestine data transmission.
Keywords— Advanced Encryption Standard (AES), Asymmetric Fig. 2. Steganography Process
Encryption, Cryptography, Data Hiding in Space and Time (DST)
Steganography, LSB (Least Significant Bit) Steganography, Rivest, .
Shamir, Adleman (RSA), Steganography, Symmetric Encryption Steganography finds its roots in ancient civilizations, where methods
like invisible ink and microdots were utilized for secretive commu-
I. I NTRODUCTION nication. However, the digital age has brought about a significant
transformation in steganographic techniques. A landmark develop-
Image steganography, an ancient practice of embedding concealed ment was the introduction of Least Significant Bit (LSB) embedding,
information within images, has experienced a resurgence in the digital which revolutionized the concealment of data within image files.
era, emerging as a pivotal tool for secure communication. This This breakthrough laid the groundwork for further advancements
paper embarks on an exploration of recent advancements in image in spatial domain techniques, greatly expanding the capacity for
steganography, delineating both traditional techniques and cutting- covert data transmission within images. These innovations signify
edge innovations that are reshaping the landscape of clandestine data steganography’s adaptation to the digital landscape, leveraging evolv-
transmission. Steganography, rooted in the Greek words ”steganos” ing technologies to enhance the concealment of information. Today,
(concealed) and ”graphia” (writing), is an ancient practice of hiding steganography remains an essential tool in covert communication,
information within seemingly innocuous carriers to avoid detection. employing sophisticated algorithms and techniques to ensure data
In the digital realm, particularly within the domain of images, secrecy in the digital realm.
steganography involves embedding data discreetly into the visual Amidst the expanding interest in image steganography, there exists
content, thus creating covert communication channels. This technique a pressing need to scrutinize and contextualize recent advancements
in the field. This review is motivated by a desire to comprehensively it into the image, cryptographic-steganographic techniques provide
assess the dynamic landscape of image steganography, elucidat- both confidentiality and stealth, making it more challenging for
ing the strengths, weaknesses, and emergent trends that underpin unauthorized parties to access or detect the hidden information.
contemporary practices. By synthesizing insights from traditional The development of cryptographic-steganographic techniques
methodologies and state-of-the-art innovations, this paper aims to holds significant promise for various applications, including secure
foster a nuanced understanding of image steganography’s capabilities communication, digital watermarking, and forensic analysis. Re-
and limitations, while advocating for responsible research practices search in this area is essential for advancing data security practices
to mitigate potential misuse. and addressing the evolving threats faced in the digital landscape.
A. Motivation II. L ITERATURE R EVIEW
Researching cryptographic-steganographic techniques to enhance In order to improve image steganography techniques, many meth-
data security in digital images is motivated by the need to better pro- ods are proposed like M. Srivastava, et al. explored two main
tect sensitive information online. With so much data being exchanged techniques: Least Significant Bit(LSB) embedding and R- Color
digitally, there’s a growing concern about keeping it safe from hackers Channel encoding using RSA algorithm to provide a more secure
and other threats. Traditional methods like encryption are good, but and efficient way of hiding information within images[1].
they can struggle with images. Plus, as technology advances, so do Hiding Information in Digital Images Using LSB Steganography
the ways hackers can attack. By finding new ways to hide and protect Technique, which delves into the application of Least Significant
data within images, we can make it harder for hackers to access it. Bit (LSB) steganography to conceal data within digital images. LSB
This research also has practical uses, like making communication steganography involves embedding secret information into the least
more secure or helping law enforcement analyze digital evidence. significant bit of each pixel in an image, aiming to minimize visual
Overall, the motivation is to create stronger and smarter ways to changes to the original image while hiding the data[2].The key
keep our information safe online. aspects of this technique includes its capacity, imperceptibility and
robustness. However its simplicity can make it vulnerable to advanced
B. Objective detection methods and there’s trade off between data capacity and
In the realm of cryptographic-steganographic techniques for en- image imperceptibility.
hancing data security within digital images. Firstly, it seeks to A. Manideep, C. N, et al. proposed a method to implement
assess the effectiveness of integrating cryptographic methods with the steganography and cryptography techniques together to create a
steganography techniques to bolster data security. Additionally, the robust security tool for hiding, the security tool encrypts the message
paper endeavors to conduct a detailed analysis of the RSA and AES data using the Advanced Encryption Standard(AES) and embeds the
encryption algorithms concerning their performance in concealing encrypted data within image using steganography methods as LSB[3].
data within digital images. Furthermore, it aims to evaluate the Subramanian et al. provides a comprehensive overview of recent
efficacy of commonly used steganography techniques such as Least advancements in image steganography, focusing on the application of
Significant Bit (LSB) and Distortion-Based Steganography (DST) in deep learning techniques.The study explores various methodologies
data concealment. Moreover, the paper explores potential approaches used in image steganography, including traditional methods, CNN-
for integrating AES encryption with LSB and DST steganography based approaches, and GAN-based methods[4].
techniques to enhance data security and covert transmission ca- Nadish Ayub and Arvind Selwal intoduces a novel method for
pabilities. Additionally, the investigation extends to exploring key concealing confidential information within images to enhance security
management techniques for controlling access to concealed data during communication by embedding data in the edge pixels of the
within digital images, thereby enhancing overall security. Moreover, carrier image using different edge detection filters in the Discrete Co-
the paper endeavors to provide valuable insights into the potential sine Transform(DCT) domain which shows promising results in terms
applications of cryptographic-steganographic techniques, such as of security, performance, and potential for future enhancements[5].
secure communication, copyright protection, and clandestine data Serdar Solak et al. mainly focused on methods to embed secret data
transmission. Finally, it aims to propose future research directions in digital images while maintaining imperceptibility and robustness
and innovations based on the findings and analysis presented herein. against attacks.The authors utilized Discrete Cosine Transform(DCT),
Discrete Wavelet Transform(DWT) and Discrete Fourier Trans-
C. Background form(DFT) for embedding secret data in the frequency domain[6].
In today’s digital age, the security of digital data, including images, Min-Allah et al. provided a detailed examination of quantum
is of paramount importance. With the widespread use of digital steganography techniques for embedding confidential data into carrier
communication channels, there’s a growing concern about protecting image using quantum computing schemes and discussing the superi-
sensitive information from unauthorized access and interception. ority of quantum steganography over classical methods[7].
Traditional methods of data security, such as encryption, play a Internet of things for enterprise systems of modern manufacturing,
crucial role in safeguarding digital information by converting it into researchers focused on the utilization of Internet of Things(IOT)
an unreadable format using complex algorithms. However, when in modern manufacturing systems.Ragab et al.[8] discuss how IoT
it comes to securing digital images, encryption alone may not be enables the connections of diverse devices and system facilitating
sufficient due to the unique challenges posed by image complexity data-driven decision making process.
and large file sizes. Hiding using Cryptography and Image/Audio Steganography
This is where steganography comes into play. Steganography presents a novel approach to enhancing data security through the
involves concealing data within other data in such a way that it integration of cryptography and steganography techniques. The au-
remains undetectable to unintended recipients. While steganography thors Paniker et al.[9] developed a system that combines cryptography
provides a means of covertly transmitting information, it does not and steganography to provide double protection for hidden data in
inherently provide encryption or ensure data confidentiality. image and audio files ensuring data confidentiality and privacy during
In response to the limitations of individual encryption and transmission.
steganography methods, researchers have begun exploring the integra- Tumma Srinivasarao et al.[10] introduces a novel approach that
tion of cryptographic and steganographic techniques. This approach, combines cryptography and steganography techniques to enhance
known as cryptographic-steganographic techniques, aims to combine information security.he study focuses on developing a secure com-
the strengths of encryption and steganography to enhance data secu- munication system for transmitting data over insecure channels. By
rity within digital images. By encrypting the data before embedding utilizing the play fair cipher method for encoding hidden textual
content and incorporating Discrete Cosine Transform (DCT) and tiality.K. Dhande and R. Channe proposes a secure and efficient
Logical Operation Exclusive OR (XOR) techniques for embedding encryption scheme using data hiding in encrypted images.The A-S
encrypted messages within images, the proposed system ensures a algorithm, utilizing symmetric stream cipher data hiding, is employed
high level of security and confidentiality. for this purpose. Users can utilize encryption keys and data hiding
Performance Analysis of The Last Significant Bit (LSB) Method keys to encrypt images and hide data within them[24].
in Steganography for Data Hiding in Image Data by Fadhlirrahman D. Naidu et al. proposed a method to securely embed data
Baso[11] focuses on evaluating the effectiveness of the LSB method into multimedia files such as images, videos, and audio using a
in steganography for concealing data within image files. The study combination of encryption and steganography techniques. The authors
investigates how the LSB method, known for its simplicity and emphasize the importance of ensuring the confidentiality of messages
capacity, can be utilized to hide messages securely within digital transmitted over the internet and highlight the challenges of securing
images. large amounts of data in the digital age[25].Implementation and Com-
Dagadita et al.[12] presents a in-depth exploration of conceal- parison of different Data Hiding Techniques[26] in Image Steganog-
ing data within digital images through Least Significant Bit(LSB) raphy” focuses on the implementation and comparison of three
technique. The study discusses various modern digital steganography commonly used image steganography techniques: LSB technique,
techniques and details the process of encoding data into cover images Pixel Value Differencing technique, and LSB Substitution based on
using LSB insertion. similarity of bit pairs emphasizing the significance of steganography
Saha et al.[13] provides a detailed exploration of steganogra- in protecting classified information and private conversations.
phy techniques used for hiding data in digital images. It covers J. Stephy and V. Subramaniyaswamy introduces the concept of
various aspects of steganography, including its historical origins, Reversible Data Hiding (RDH), which allows for the restoration of
the evolution of techniques from ancient times to modern digital the original cover image without any loss providing a comprehensive
applications, and the process of embedding secret data within cover analysis of different data hiding techniques and their significance
images. A Study of Data Hiding Using Cryptography and Steganog- in maintaining security requirements in various applications. Perfor-
raphy” by Priya Mathur and Amit Kumar Gupta[14] delves into mance of Cover Image Steganography for Hidden Information within
the techniques of cryptography and steganography for securing and Image File using Least Significant bit algorithm explores the use of
encrypting data.Improved File Security System Using Multiple Image steganography to conceal data within image files. The researchers
Steganography presents a novel approach to enhancing file security conducted experiments to determine the optimal file size for hiding
through multiple image steganography.A. G. Benedict[15] discusses data using the Least Significant bit algorithm[28].
the implementation of this approach using a Java Application and The pixel-based approach to Steganography offers a simple yet
emphasizes the importance of secure data retrieval from the cover effective method to maintain the characteristics of the image file while
images at the destination. securely hiding data within it. By leveraging the pixel composition
Dr. Raja Rajeswari N and Ms. Meenadshi M[16] focused on of images (typically consisting of red, green, and blue colors), the
the development of a steganography interface that conceals text- algorithm ensures the integrity and confidentiality of the hidden
based secret data within non-text files, such as images, audio, or information[29]. S. Sravani and R. Raniith explores the application of
video files and o enable clandestine communication by encoding and steganography, particularly the LSB algorithm, to conceal confidential
decoding data within image files using LSB (Least Significant Bit) data within images for secure transmission over the internet. This
steganography techniques. Secure File Sharing System using Image study he effectiveness of the steganography technique is assessed
Steganography and Cryptography Techniques presents a system that using metrics such as Mean Square Error (MSE) and Peak Signal to
integrates image steganography and cryptography to enhance the Noise Ratio (PSNR), highlighting its suitability for security-related
security of file sharing. The system encrypts sensitive data using tasks.
cryptography and hides it within an image using steganography This literature review underscores the breadth of techniques and
techniques[17]. innovations in image steganography, all aimed at bolstering data secu-
D. Wahono et al.[18] provides a novel steganographic technique for rity and confidentiality. Ranging from conventional LSB embedding
enhancing data security in spatial domain images proving to improve to state-of-the-art deep learning-based methods, each approach brings
the confidentiality of hidden information by utilizing adjacent pixels distinct strengths and complexities to the table. As technological
based difference expansion within digital images.Similarly,S. Bohra landscapes evolve, the fusion of cryptography and steganography
et al.[19] study gives a comprehensive review of modern steganog- stands out as a pivotal strategy, offering sturdy defenses for trans-
raphy techniques aiming to enhance the data security. mitting data securely. By comprehensively examining and assessing
A method for Image Steganography based on the NICE (Non- these methodologies, researchers can push the boundaries of the field,
linear Independent Component Estimation) model. The approach guaranteeing ongoing safeguarding of sensitive information amid the
involves redesigning and training the NICE model on an image digital age’s rapid expansion.
dataset to establish a bijective function mapping the dataset image
distribution to a simple data distribution[20].V. k. Sharma et al.[21]
proposed technique involves encrypting the secret image through III. P ROBLEM S TATEMENT
pixel scrambling operations such as circular shift and swapping, and
then embedding the scrambled image into the cover image. This Securing sensitive information exchanged through digital images
process is repeated for multiple rounds to enhance security. poses a significant challenge in today’s digital landscape. While
N. Menon and V. Vaithiyanathan presents a Triple Layer Data traditional encryption methods provide a level of security, their
Hiding Mechanism that combines cryptography and steganography effectiveness in safeguarding images remains uncertain due to the
to enhance data security. Cryptography ensures secure communica- unique characteristics of visual data. Additionally, the utilization of
tion, while steganography hides messages so that only the intended steganography techniques introduces complexities in maintaining data
recipients can detect them. By integrating these two techniques, the integrity and confidentiality within images. The integration of crypto-
proposed mechanism encrypts data at two levels before embedding graphic and steganographic methods shows promise but necessitates
it into an image[22]. Application of Steganography Imaging by AES a thorough examination of their efficacy, limitations, and practical
and Random Bit by A. Harika et al[23] explores the application of implications. Therefore, this research addresses the pressing need to
steganography imaging using Advanced Encryption Standard(AES) develop and assess robust cryptographic-steganographic techniques
and random bit techniques to conceal data within another medium tailored for enhancing data security within digital images, while also
to ensure secure data transfer maintaining integrity and confiden- exploring their diverse applications across various domains.
IV. P ROPOSED M ETHOD in computing power and mathematical algorithms.
The propsed approach explores the fusion of cryptographic meth-
ods with steganography as a means to enhance data security within 2) AES Algorithm (Symmetric Key Algorithm): The Ad-
digital images. This integration involves encrypting the payload vanced Encryption Standard (AES) is a symmetric encryption algo-
before embedding it into the cover image using established cryp- rithm used to secure sensitive data. It is a block cipher, meaning it
tographic algorithms like Advanced Encryption Standard(AES) or operates on fixed-size blocks of data, and it employs a substitution-
Rivest, Shamir, Adleman(RSA). Through such encryption, the confi- permutation network (SPN) structure.
dentiality of the hidden information is maintained, even if unautho-
rized parties gain access to the stego image. Moreover, employing key Key Expansion:
management techniques contributes to improve security by regulating The original AES algorithm supports key sizes of 128, 192, or 256
access to the concealed data. This amalgamation not only ensures bits. The key expansion algorithm expands the initial key into a key
the confidentiality and integrity of hidden information but also schedule containing a number of round keys, which are used in the
strengthens the system’s resistance against detection and extraction encryption and decryption processes.
attempts. By critically analyzing existing research in this area, our
survey aims to provide valuable insights into the efficacy and poten- Initial Round Key Addition:
tial applications of cryptographic-steganographic techniques, thereby The plaintext block is XORed with the first round key.
highlighting avenues for future research and innovation in the field.
Rounds:
The main encryption process consists of multiple rounds, the
Fig. 3. Flow Diagram of whole system number of which depends on the key size:
• For a 128-bit key, there are 10 rounds.
• For a 192-bit key, there are 12 rounds.
A. Cryptographic Techniques • For a 256-bit key, there are 14 rounds.
1) RSA Algorithm (Asymmetric Key Algorithm): RSA is Each round applies a series of transformations to the data block:
a widely used asymmetric encryption algorithm named after its
inventors Ron Rivest, Adi Shamir, and Leonard Adleman. It is based 1) SubBytes: Substitutes each byte of the state with a correspond-
on the difficulty of factoring large prime numbers. RSA encryption ing byte from a substitution box (S-box).
algorithm is a type of public-key encryption algorithm. Public Key 2) ShiftRows: Shifts the rows of the state matrix cyclically to the
encryption algorithm is also called the Asymmetric algorithm. Asym- left.
metric algorithms are those algorithms in which sender and receiver 3) MixColumns: Mixes the columns of the state matrix using a
use different keys for encryption and decryption. Each sender is fixed polynomial multiplication in a finite field.
assigned a pair of keys.The Public key is used for encryption, and the 4) AddRoundKey: XORs the state with the round key.
Private Key is used for decryption. Decryption cannot be done using After the final round, there is no MixColumns step.
a public key. The two keys are linked, but the private key cannot be
derived from the public key. The public key is well known, but the Final Round:
private key is secret and it is known only to the user who owns the In the final round, the SubBytes, ShiftRows, and MixColumns
key. It means that everybody can send a message to the user using steps are omitted, and only the AddRoundKey step is performed.
user’s public key. But only the user can decrypt the message using
his private key. Output:
Step to calculate RSA Algorithm The resulting ciphertext block is the encrypted form of the plain-
text.
Key Generation: Decryption in AES is essentially the same process as encryption
1) Choose two large prime numbers, p and q. but in reverse, using the inverse operations of the encryption steps
2) Compute their product, n = p × q. This is the modulus. and the round keys in reverse order.
3) Calculate Euler’s totient function, φ(n) = (p − 1) × (q − 1). The strength of AES lies in its resistance to various crypto-
4) Choose an integer e such that 1 < e < φ(n), and e is coprime graphic attacks, including brute-force attacks, differential and linear
with φ(n). This is the public exponent. cryptanalysis, and others. It is widely used in various applications,
5) Compute the modular multiplicative inverse of e modulo φ(n), including securing data transmission over networks, encrypting files
which gives us the private exponent d. This is the private key. and databases, and protecting sensitive information in storage and
communication.
Encryption:
1) To encrypt a message M , convert it into an integer m such B. Steganography Techniques
that 0 ≤ m < n. 1) Least Significant Bit (LSB) Steganography: LSB (Least
2) Compute the ciphertext C = me mod n. Significant Bit) steganography is a method employed to conceal
information within the least significant bit of digital data like images
Decryption: or audio files. The concept is to alter the least significant bit of
1) To decrypt the ciphertext C, compute the plaintext message each byte in the carrier file to encode the concealed information
M = C d mod n. without causing noticeable changes to the carrier file’s appearance or
The security of RSA relies on the difficulty of factoring the audio quality. This technique is widely used due to its simplicity and
modulus n into its prime factors, p and q. If an attacker could effectiveness in hiding data discreetly.In this technique, the bits of the
factorize n, they could compute φ(n) and obtain the private exponent image are replaced by the bits of the data to be embedded or hidden.
d from the public exponent e. However, for large enough primes, this The secret message can be inserted inside the image by altering only
factorization is computationally infeasible with current technology. the first rightmost bit of the image. While using this algorithm it
RSA is used for secure communication and digital signatures in should be noted that, when we apply this algorithm to each byte of
various cryptographic protocols and systems. However, it’s essential the 24-bit image, only three bits are capable to be embedded in each
to use sufficiently large key sizes to resist attacks based on advances pixel of the image.[9]
. TABLE I
Steps of Least Significant Bit(LSB) Algorithm. C OMPARISON OF AES AND RSA ALGORITHMS