A New Approach to Hide Text in Images Using Steganography

A New Approach to Hide Text in Images Using Steganography

Abstract:

In this paper, we have proposed a new steganographic algorithm that is used to hide text file inside an image. In order to increase/ maximize the storage capacity we have used a compression algorithm that compresses the data to be embedded. The compression algorithm we have used works in a range of 1bit to 8 bits per pixel ratio. By applying this algorithm we have developed an application that would help users to efficiently hide the data.

Existing System:

History of steganography dates back to 440 B.C. this technique was initiated by ancient Greeks, they shave the heads of their slaves and write the messages on their heads, after the hair had grown back, the slaves were sent to their allies without the enemies knowledge. Steganography was also used by Germans during the World War I and II. Also during the American Revolution, invisible ink was used by the revolutionaries for communication purposes. The motto behind developing steganographic methods is its application in secret communication between the members of an organization involved in mission critical situations like wars; also it can be used for communication between intelligence agencies etc.

Disadvantage:

The basic terminologies used in the steganography systems are: the cover message, secret message, the secret key and embedding algorithm. The cover message is the carrier of the message such as image, video, audio, text or some other digital media. The secret message is the information which is needed to be hidden in the suitable digital media. The secret key is usually used to embed the message depending on the hiding algorithms. The embedding algorithm is the way or the idea that usually used to embed the secret information in the cover message.

 

 

Proposed System:

The embedding form shown above comprises of three main browsing fields. One for the text file to be embedded, second for the image in which to embed the file and third for the cover image to hide the underlying distortion. One important point to note here is that the cover file can or cannot be same as the one used for the hiding process. After filling these necessary fields, the next step is to check the encryption checkbox. User need not to worry about the underlying compression procedure, which in turn is automatically performed by the system itself. User then need to provide the secret key twice for the verification procedure, various validations are applied here. The secret key along with the text file is embedded inside the image