0% found this document useful (0 votes)
58 views4 pages

AI-Enhanced LSB Steganography Interface Concealed Data Embedding Framework

The document discusses an AI-enhanced LSB steganography interface that was created to conceal data within images. The interface allows users to encode data into an image using LSB insertion and decode the original message from the embedded image. AI-based encryption methods are also integrated to enhance security of the concealed data.

Uploaded by

stark panther
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views4 pages

AI-Enhanced LSB Steganography Interface Concealed Data Embedding Framework

The document discusses an AI-enhanced LSB steganography interface that was created to conceal data within images. The interface allows users to encode data into an image using LSB insertion and decode the original message from the embedded image. AI-based encryption methods are also integrated to enhance security of the concealed data.

Uploaded by

stark panther
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

2023 9th International Conference on Smart Structures and Systems (ICSSS)

AI-Enhanced LSB Steganography Interface:


Concealed Data Embedding Framework
Dr. Raja Rajeswari N Ms. Meenadshi M
Department of Mechanical Engineering Department of Computer Science and Engineering
Saveetha Engineering College Saveetha Engineering College
2023 9th International Conference on Smart Structures and Systems (ICSSS) | 979-8-3503-8420-8/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICSSS58085.2023.10407062

Chennai, India Chennai, India


rajarajeswari@[Link] meenadshi20@[Link]

Abstract— Steganography involves concealing text-based object. To extract the Message from a stego-object, both the
secret data within non-text files such as image, audio, or video cover-object and the associated decoding key are crucial,
files, with the extraction of the hidden data taking place at its especially if a stego-key was employed during encoding [17].
destination. This avoids detection. Therefore, it becomes
challenging for anyone to detect the presence of a concealed This project's scope and objective involve concealing
message within the image, highlighting the increasing information within various image files using steganography
importance of data privacy in contemporary times. The tools. This project enables users to conceal data within an
primary objective of Steganography is to enable clandestine image file, allowing them to save both the altered image and
communication between two individuals, typically involving the retrieved file at their chosen destination. Use the enter key
the processes of encoding and decoding. This project to start a new paragraph. The appropriate spacing and indent
specifically focuses on image Steganography, allowing the are automatically applied.
encoding and decoding of data within an image file. Through
the utilization of steganography, an individual can conceal a II. RELATED WORK
substantial amount of text, comprising thousands of words,
within a standard-sized image. To implement this A. Steganography Using Python
Steganography approach, Python Image Library (PIL) is According to Sengupta Rajrishi, this study gives the idea
employed in conjunction with the Tkinter framework. LSB about the huge assortment of steganography procedures for
(Least Significant Bit) steganography techniques are applied concealing mystery data in pictures. It also explains about the
for encryption and decryption functionalities. The primary various requirements of applications that range from
goal is to create an application that employs LSB insertion to imperceptibility of data to covering up enormous mystery
encode data within a cover image and, in a user-friendly message. He uses the libraries of Python to carry out the
manner, decode the original message from the embedded techniques of Steganography [5].
image. Additionally, AI-based encryption methodologies are
integrated to enhance data security and fortify the concealment
of information within the images, showcasing the synergy
between advanced encryption techniques and traditional B. LSB Steganography and Its Evaluation
steganographic methods. Deshpande, Neeta, Kamalapur Snehal, and Daisy Jacobs
propose Least Significant Bit (LSB) embedding, concealing
Keywords—secret, hidden, steganography, encoding, data imperceptibly in cover images, supporting 24-bit, 8-bit,
decoding, LSB, Python, PIL, Tkinter, data security, AI or grayscale formats. They evaluate 2, 4, 6 LSBs for .png
I. INTRODUCTION and .bmp files [8].
Meanwhile, B. Karthikeyan enhances LSB replacement
Steganography originates from the Greek terms “Seganos” steganography by introducing randomized key generation
and “graphy”. The word is literally translated to covered
and a scanning technique. The logical XNOR operation,
writing. Steganography has the ability to hide information in
such a way that it cannot get detected and not able to find that coupled with column-wise permutation, secures plaintext
communication is taking place [1][3]. embedding in the cover image [10].

Concealing data's presence involves integrating it into


established communication channels discreetly. The core C. Other Approaches
elements of a steganography model encompass the Carrier, According to Jasleen and Kour, he discusses the various
Message, and Password [3]. The Carrier, or cover-object, types and techniques of steganography. He provides an
hides the embedded Message, ensuring its secrecy. This overall view of the techniques available along their strengths
Message holds confidential data and can as-sume diverse and weaknesses. “Embedding” refers to the process of
forms like plaintext, ciphertext, or even non-textual content hiding data in any multimedia like image, video or audio
[9]. The Password, or stego-key, ensures that only recipients using steganography [6].
possessing the corresponding decoding key can extract the According to S. Sriram, a unique approach is presented to
Message from the cover-object [4]. Combining the cover- transmit sensitive data through an interrupted
object with a covertly embedded Message forms the stego-
communication channel, utilizing both Cryptography and

979-8-3503-8420-8/23/$31.00 ©2023 IEEE

Authorized licensed use limited to: Bahria University. Downloaded on April 04,2024 at [Link] UTC from IEEE Xplore. Restrictions apply.
Steganography techniques. This Steganography method is pixel value to binary, retrieving the next message bit, and
showcased by employing the Python Image Library setting a temporary variable based on the comparison
alongside the OpenCV framework [7]. between the message bit and the least significant bit (LSB)
of the pixel, achieved via XOR operation [19]. The output
III. PROPOSED WORK
image's pixels are updated accordingly. This continues until
This paper discusses about the application that is built as all message bits are embedded [13], after which the resulting
a GUI using the libraries of Python that automates the image with the encoded data is saved locally.
process of steganography using LSB (Least Signifi-cant Bit) 2) Decoding Module: The decoding process involves the
technique and make it simpler and more user-friendly. The following steps.
user can easily perform two functions; encode an image with • Length of message is determined by decoding the
hidden information and then decode a hidden information first 32 bits.
from an embedded image [9][11]. • Take out the length of the message from the pixels.
• Separate out last two bits from each pixel.
• Append them to obtain the encoded message [13].
• Finally, display the original image and encoded
message to local system.
3) AI-Based Encryption: In this implementation, the AI
technique employed is not explicitly related to encryption
but rather in generating a randomized encryption key. The
method utilizes a randomized key generation
process,involving a random encryption key composed of
lowercase alphabets is generated using Python's random
library [18]. The AI aspect lies in the inherent randomness
produced by the algorithm, providing a level of
Fig. 1. Architecture Diagram unpredictability that enhances the security of the XOR-
based encryption. This randomized key ensures a greater
Encoding gets the input of an image file of any format level of complexity and makes it significantly harder for
and secret message in the form of text [14] and gives the unauthorized entities to decipher the encoded information
output of a PNG image embedded with the secret message. [2], fortifying the encryption process by introducing an
Decoding gets the input of an embedded image file and gives element of unpredictability through AI-generated
the output of the original image file in PNG format and the randomness.
hidden message. The benefits of this image-based steganogrpahy
A. Algorithm – LSB Approach system are as follows:
• Robust Framework enabling secure data
Least Significant Bit (LSB) signifies the least impactful
transmission via embedded information within image files
bit in pixel values. LSB embedding relies on the idea that [14].
modifying this bit minimally influences the visible color • Utilizes the Least Significant Bit (LSB) approach
change, especially notable in cases like black where 0 for hiding data while preserving image quality.
represents the color. Even when altering the last bit, the • AI Integration enhances security through
induced changes remain subtle [12]. When the LSB value randomized key generation and scanning techniques.
transitions from 0 to 1, it will retain its black coloration, • User-Friendly Interface simplifies encoding and
albeit in a lighter shade. decoding processes across various image formats.
The LSB approach offers versatility in terms of the types • Imperceptible Data ensures hidden information
of files it can conceal. It can hide various forms of data, remains visually undetectable to the human eye.
including text, images, or other files, within image files like • Enhanced Data Privacy safeguards sensitive
PNG, JPEG, or BMP formats. The capacity to embed data information by concealing it within images.
depends on the image's size and color depth, typically • Seamless Extraction facilitates easy retrieval of
allowing a proportion of the image's bits to be used for concealed data from encoded images.
concealing information without visibly altering the image • Advancements in Steganography merge AI and LSB
[15]. While LSB-based steganography provides a techniques for improved security.
straightforward method for hiding information, it comes • Discreet Information Hiding conceals data without
with certain limitations. For instance, repeatedly altering the compromising the visual integrity of the image [11].
LSBs might lead to image degradation or visual artifacts if • Contribution to Security strengthens the encryption
the changes accumulate. Additionally, it may be vulnerable process for covert communication.
to specific steganalysis techniques designed to detect LSB • Innovative Approach integrates AI and traditional
alterations. steganography methods for enhanced privacy.
1) Encoding Module: The encoding process follows • Encrypted Communication enables secure
specific steps to embed data within an image. Firstly, the exchanges by embedding data within images.
image is converted to grayscale and resized if needed. The
message itself is converted into binary format. Initializing IV. RESULTS AND DISCUSSION
the output image to match the input one, the process iterates This section illuminates the outcomes and
through each pixel [13]. Actions include converting the implications of the devised image steganography project. It

Authorized licensed use limited to: Bahria University. Downloaded on April 04,2024 at [Link] UTC from IEEE Xplore. Restrictions apply.
scrutinizes the efficacy of techniques like LSB-based By harnessing AI capabilities, the encryption process
encoding and AI-integrated encryption. Evaluating practical becomes more sophisticated, ensuring a higher level of data
performance and data security applications, it explores the concealment while maintaining imperceptibility to the
project's significance and limitations. Through in-depth human eye. The AI models involved in this process analyze
analysis and interpretation, this section offers insights into image characteristics, allowing for the identification of
the techniques' robustness, aiming to provide optimal embedding points within the image pixels. This
comprehensive understanding. strategic embedding minimizes visual alterations,
preserving the integrity of the cover image.
A. Algorithm Involved
The encoding process is elaborately handled through
Class: IMG_Stegno 'encode_frame2,' where selected images are prepared for
output_image_size = 0 text embedding. On the other hand, 'decode_frame2' focuses
Function: main(root) on extracting hidden text from selected images during the
Initialize GUI components and layout decoding phase. The 'decode' function is pivotal, as it
Function: back(frame) performs the extraction of concealed data from images using
Destroy the current frame and display the main frame a specific decoding strategy.
Function: encode_frame1(F) To facilitate data transformation, 'generate_Data'
Display frame for selecting an image for encoding converts textual information into a binary format, crucial for
Function: decode_frame1(F) encoding into images. 'modify_Pix' is a critical function
Display frame for selecting an image for decoding responsible for altering image pixels to encode the binary
Function: xor_encrypt(data, key) data effectively. 'encode_enc' handles the core process of
Encrypt the data using XOR encryption embedding data into image pixels, while 'enc_fun'
Function: encode_with_ai(text_a, myImg) orchestrates the overall encoding of text into selected
Encode the provided text within the image using AI- images.
based encryption The main program orchestrates the entire steganographic
Function: encode_frame2(e_F2) process by initializing the GUI and creating an instance of
Display frame for encoding the selected image with the IMG_Stegno class. It executes the 'main' function, which
text acts as the entry point, providing users with a seamless and
Function: decode_frame2(d_F2) interactive interface to perform image-based steganography.
Display frame for decoding the selected image to This detailed pseudocode presents a structured framework
extract hidden text that delineates the logic, processes, and interactions of the
Function: decode(image) system.
Decode hidden data from the image Fig. 2. GUI Steganography Application
Function: generate_Data(data)
Convert text data into binary format
Function: modify_Pix(pix, data)
Modify pixels in the image to encode data
Function: encode_enc(newImg, data)
Encode the provided data within the image pixels
Function: enc_fun(text_a, myImg)
Encode the text into the selected image
Function: frame_3(frame)
Destroy the current frame and display the main frame
Main Program:
Initialize GUI
Create an instance of IMG_Stegno class
Execute main function to display the main frame
Start GUI loop to interact with users

The provided pseudocode offers a comprehensive


blueprint for a sophisticated image-based steganography
system encapsulated within the IMG_Stegno class. This
class encompasses various functions, each meticulously
designed to execute key aspects of steganographic
processes. The 'main' function initializes the graphical user
interface (GUI), setting the stage for user interaction.
Within this framework, the 'encode_frame1' and
'decode_frame1' functions present distinct frames for users
to select images for encoding or decoding, respectively. B. Workflow Involved
'xor_encrypt' stands as a crucial method for encrypting data This GUI application was designed and built to be user-
using the XOR encryption technique. 'encode_with_ai' friendly. It allows the user to perform the process of
utilizes AI-based encryption methods to embed provided encryption and decryption on an image file without the need
text within images. Here, AI augments the security and to know about the algorithm involved. They can easily
efficiency of the encoding process by leveraging advanced perform these operations with the help of this application.
algorithms to conceal data within image pixels. The results from the application are represented with

Authorized licensed use limited to: Bahria University. Downloaded on April 04,2024 at [Link] UTC from IEEE Xplore. Restrictions apply.
pictures of each page of the GUI application. [4] Sengupta, Rajrishi, and C. Umarani. "Steganography Using
Select the choice you want to perform whether to encode Python." IITM Journal of Management and IT 12.1 (2021): 40-
43.
or decode. Using the LSB based technique, the selected
[5] Kour, Jasleen, and Deepankar Verma. "Steganography
operation is carried out. If any error occurs such as no image
techniques–A review paper." International Journal of Emerging
is selected or no message has been entered, etc., the error is Research in Management & Technology 3.5 (2014): 132-135.
displayed and redirected to previous page. This [6] S. Sriram, B. Karthikeyan, V. Vaithiyanathan and M. M. Anishin
steganography technique is useful for secure data Raj, "An approach of cryptography and steganography using
transmission over some medium. This approach offers an rotor cipher for secure transmission," 2015 IEEE International
advantage by producing stego-images that conceal data Conference on Computational Intelligence and Computing
while maintaining a visually authentic appearance of high Research (ICCIC), 2015, pp. 1-4, doi:
fidelity. 10.1109/ICCIC.2015.7435669.
[7] Neeta, Deshpande, Kamalapur Snehal, and Daisy Jacobs.
V. CONCLUSION "Implementation of LSB steganography and its evaluation for
various bits." 2006 1st international conference on digital
Steganography holds significant importance in the information management. IEEE, 2006.
realms individuals incorporating it into their daily activities. [8] Angel, Nuthalapati Pauline, J. A. M. Rexie, and M. Mythily.
This method enables concealed communication, and we've "Security Key-Based Steganography for Images." 2023 Second
implemented an advanced image steganography system International Conference on Electrical, Electronics, Information
leveraging the Least Significant Bit (LSB) technique to and Communication Technologies (ICEEICT). IEEE, 2023.
establish a secure communication channel. The primary [9] B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti
benefit of this application lies in its ability to accommodate and M. Gomathymeenakshi, "An improved steganographic
various picture formats without requiring conversion to technique using LSB replacement on a scanned path image",
International Journal of Network Security, vol. 15, no. 1, pp. 314-
bitmap [16]. Additionally, it imposes minimal constraints on 318, 2013.
the file size for hiding, as it maximizes the utilization of [10] Adebayo, Olawale Surajudeen, et al. "Data Privacy System Using
memory space to conceal files within pictures. Steganography and Cryptography." (2022).
Steganography is capable of doing many more things than [11] Kaur, Sharanpreet, et al. "A systematic review of computational
just hiding text information inside an image. It has the ability image steganography approaches." Archives of Computational
to apply its technique on other media such as Methods in Engineering 29.7 (2022): 4775-4797.
communication channels, audio files or other binary or text [12] Wang, Shuaina, Hang Yin, and Xiangkun Wang. "Research on
files. With the development of technology occurring day by the Improvement of LSB-based Image Steganography
day, we will be able to carry out steganography in a more Algorithm." Academic Journal of Science and Technology 5.3
(2023): 222-224.
efficient way and it will be of great help for law enforcement
[13] Mandal, Pratap Chandra, et al. "Digital image steganography: A
and others to be easily carried out via the internet.
literature survey." Information sciences (2022).
REFERENCES [14] Yang, Aimin, et al. "A novel image steganography algorithm
[1] Chinniyan, Kavitha, et al. "Image Steganography Using Deep based on hybrid machine leaning and its application in
Neural Networks." Intelligent Automation & Soft Computing cyberspace security." Future Generation Computer Systems 145
34.3 (2022). (2023): 293-302.
[2] Edwar, Jacinto G., and Montiel A. Holman. "Enhanced Security: [15] Martín, Alejandro, et al. "Evolving Generative Adversarial
Implementation of Hybrid Image Steganography Technique Networks to improve image steganography." Expert Systems
using Low-Contrast LSB and AES-CBC Cryptography." with Applications 222 (2023): 119841.
International Journal of Advanced Computer Science and [16] Gao, Kai, et al. "Steganographic secret sharing via AI-generated
Applications 13.8 (2022). photorealistic images." EURASIP Journal on Wireless
[3] Sulong, Ghazali Bin, and Maria A. Wimmer. "Image hiding by Communications and Networking 2022.1 (2022): 1-23.
using spatial domain steganography." Wasit Journal of Computer [17] Al Azzam, S. B. N. "The AI algorithm for text encryption using
and Mathematics Science 2.1 (2023): 39-45.
Steganography." Mesopotamian Journal of Cybersecurity 2020
[2] Pilania, Urmila, Rohit Tanwar, and Keshav Kaushik. (2022): 18-27.
[3] "Steganography Tools and Their Analysis Concerning Distortion [18] Sultana, Habiba, et al. "A novel hybrid edge detection and LBP
in Stego I mage." International Conference on Advances in Data Code-Based Robust Image Steganography method." Future
Science and Computing Technologies. Singapore: Springer Internet 15.3 (2023): 108.
Nature Singapore, 2022.

Authorized licensed use limited to: Bahria University. Downloaded on April 04,2024 at [Link] UTC from IEEE Xplore. Restrictions apply.

You might also like