Professional Documents
Culture Documents
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/224250353
CITATIONS
READS
1,180
5 authors, including:
Asoke Nath
St. Xavier's College, Kolkata
195 PUBLICATIONS 493 CITATIONS
SEE PROFILE
Agniswar Dutta
Department of Computer Science
St. Xaviers College (Autonomous), Kolkata
Kolkata, India
e-mail: agnispeaks@gmail.com
Sankar Das
Shalabh Agarwal
Asoke Nath
Department of Computer Science
St. Xaviers College (Autonomous), Kolkata
Kolkata, India
e-mail: asokejoy@gmail.com
[keywords:steganography,MSA,LSB,encry
ption,decryption]
I.
INTRODUCTION
Remarks
0
0
0
0
0
1
1
0
0
0
1
1
1
0
0
0
1
1
1
0
0
0
1
0
0
0
0
1
0
1
1
1
1
0
0
1
0
0
0
1
1
0
0
1
1
0
0
1
0
0
0
0
1
0
0
(ASCII Code=160)
(1) W
e encrypt the secret message file using simple bit
shifting and XOR operation in the secret
message file.
Original bits
Right shift by 1-bit
XORing left 4 bits with right 4 bits
and substituting in right 4-bits
Right shift by 2-bits
XORing left 4 bits with right 4 bits
and substituting in right 4-bits
(ASCII Code=162)
(ii)
(iii)
(iv)
B. Steganography Algorithm:
In the present work we have use the substitution of
LSB and LSB+3 bits of the cover file in alternate
bytes. The last 300 bytes of the cover file we use for
embedding password, size of the secret message file.
After that we start to embed the secret message file.
We read one byte from encrypted secret message file
and convert it into 8 bits and then we take 2 bits of
the encrypted secret message and substitute the LSB
and LSB+3 bits of the cover file and then leave one
byte of the cover file intact. Then again substitute 2
bits. The same process we repeat for all 8 bits of the
263
Bits
to
substitute
ASCII
code
Modified
Byte
0,0
-0,1
-1,0
-1,1
--
0
0
0
0
0
0
0
0
64
66
67
68
76
70
80
73
@
B
C
D
L
F
P
H
1
1
1
1
1
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
1
0
0
0
1
1
1
1
0
0
1
1
0
0
1
1
0
0
0
1
0
0
0
1
0
Cover
file type
.BMP
2.
3.
4.
5.
6.
.JPG
.DOC
.WAV
.AVI
.EXE
264
+
Fig_10: Cover File
Name=rhionos.avi.
(Size=76800B)
265
+
Fig_13: Cover File
Name=clc.doc.
(Size=26624B)
+
Fig_16: Cover File
Name=mshearts.exe
(Size=126976B)
+
Fig_19: Cover File
Name=power.ppt
(Size=99328B)
+
Fig_22: Cover File
Name=Bin.mp3
(Size=10337178B)
TABLE III : LISTING OF COVER FILES AND SECRET MESSAGES WITH THE TIME REQUIRED TO
EMBED ENCRYPTED SECRET MESSAGE FILE
Sl.
No.
Cover file
Name
1.
photo.jpg
image)
2.
(8 MP
Secret message
Size
Name
Time
Size
Encoding
Decoding
2.60 MB
joy1.jpg
1870 bytes
5 sec
5 sec
clc.doc
26.0 KB
aa.txt
150 bytes
0.5 sec
0.5 sec
3.
Blue.bmp
1.37 MB
clc.doc
26.0 KB
1 min
4.
mshearts.exe
124 KB
aa.txt
150 bytes
0.5 sec
0.5 sec
5.
rhinos.avi
25 MB
myfile1.pdf
14.9 KB
40 sec
40 sec
266
7 sec
1 min
sec
6.
Bin.mp3
9.85 MB
clc.txt
934 bytes
3 sec
3 sec
7.
power.ppt
97.0 KB
aa.txt
150 bytes
0.5 sec
0.5 sec
8.
desert.bmp
2.25 MB
sunset.jpg
69.5 KB
3 min
sec
3 min
sec
IV. CONCLUSION
[2]Advanced steganographic approach for hiding
encrypted secret message in LSB, LSB+1, LSB+2
and LSB+3 bits in non-standard cover files, Joyshree
Nath, Sankar Das, Shalabh Agarwal and Asoke
Nath , International Journal of Computer
Applications(0975-8887)
Vol 14-No7, Feb 2011
ACKNOWLEDGMENT
The authors sincerely express their gratitude to
Department of Computer Science for providing
necessary help and assistance. AN is also
extremely grateful to University Grants
Commission for providing fund for continuing
minor research project on Data encryption using
symmetric key and public key crypto system.
The authors are very much grateful to all current
students of semester-6 Computer Science
Honours for their constant encouragement during
the progress of this research project.
REFERENCES
[1] Data Hiding and Retrieval, A.Nath, S.Das,
A.Chakrabarti, Proceedings of IEEEInternational
conference on Computer Intelligence and
Computer Network held at Bhopal from 26-28
Nov, 2010.
267