# Introduction ince everything is computerized these days and all the data is transmitted and shared through internet, we need to have security of higher orders to protect the confidential data. Thus we need cryptography and steganography concepts the drawback of cryptography is it will be known that we have encrypted data and well before and people starts to crack it. But in the case of steganography it's not possible to know that there is data embedded into a medium. If there is a large stream of medium audio, video, image) it's not possible to guess which contains the embedded data. It is quite different from cryptography where cryptography helps in keeping the message as a secret where steganography helps in keeping the existence message as a secret among neither of it is perfect. If the data hidden was revealed, then the steganography is slightly defeated. The security can be increased by the combination of cryptography. Another two technologies namely watermarking and fingerprinting are nearer to stenography but has different requirements. In those two techniques the hidden information can be visible, but in steganography the information is crucial. A successful attack of stenographic system has an advanced observation of information hiding inside the file, whereas the fingerprinting and watermarking techniques cannot have the capability of detecting the mark. The realization of potential with respect to steganography in new product information was also started in the business. The leakage of information can be avoided by communicating with well-known channels. Hiding the information in the form of photographs can be less suspected than communication. This paper helps us to know about the overview of different algorithms used for security purpose in steganography both in business and personal use. # II. # Different Kinds of Steganography Almost every digital file can be employed for performing the steganography, formats with a high degree of redundancy are more helpful. Redundancy means bits of an object/a file that provide accuracy to it far better than necessary for the object's use and display for example if we have a photograph of clear sky most of the pixels in the image are in blue they are considered are redundant pixels in this case all those unnecessary pixels are defined in the matrix are defined a number of times, but in fact not necessary so they are called the least significant bits. These redundant bits of can be altered without the without creating a visible distortion in the final image. Image and audio files especially meet this required criterion. Figure below shows the four main categories of file formats that are used in current steganography technology. Image also known as spatial, domain techniques embed messages in the intensity of the pixels directly, while for transform, also known as frequency domain, images are first transformed and then the message is embedded in the image this makes the transform domain secured little extent more than image domain. The image steganography further divided into these fallowing categories based on the technique applied for the process The most familiar technique employed in the steganography is LSB in BMP images bitmap images are not optimized in size like JPEG so there is chance of having higher redundant pixels and in turn we have least significant bits making this process more reliable for steganography. Most of the digital files having the degree of redundancy can be used in steganography. Redundancy means the object bits that provide more accuracy for objects use and display than the required content, these bits can be altered without being detected easily. Generally image and audio files will comply with the above requirement. Information hiding plays an important role in steganography. As text files have small redundant data is not used very often in text steganography. Hiding information in images is focused in this paper. In internet the more amount of redundancy bits present in the representation of a digital image are the most popular cover objects for steganography. Similar techniques for both image and audio files take place in hiding the information. Audio steganography in masking is the different technique, which explodes hiding information of the human ear unnoticeably (in this case the sound that was audible becomes inaudible). Steganography generally refers to the technique of information embedding within the messages and the network protocols used in the network transmission. The steganography can be used in OSI network model of converting channels. Image steganography is widely used because of the frequency of images is increased due to the social networking at an average 40 million new images are uploading to the internet per week. . # a) Related Works Steganography: Past, Present, Future; James C. Judge GSEC Version 1.2f This paper briefly stated, Definition of steganography on which steganography can be performed. And number of processes that will hide a message within an object that are available currently, where the hidden message will not be apparent to an observer. This paper explored steganography from birth to till date and the future scope of steganography. A Survey of Image Steganography Techniques; Mehdi Hussain and Mureed Hussain, IJAST Vol. 54, May, 2013. In this paper different forms of the steganography are discussed Image, Network, Audio, Video and text steganography are discussed, and summarized the 9 spatial domain techniques that are used in the image steganography from which we used the LSB in spatial domain. Also discussed techniques in transform domain applied on the image. # b) Existing technology The current technology is the combination cryptography and steganography. The content in the medium is protected in this technology but the medium is not protected this makes it easy to intrude into and makes the content to be exploited easily. There is no technique to protect the medium explicitly. # c) Proposed technology Here we are proposing a technology to protect the carrier medium so that the chances of guessing the medium contains data is minimal. # d) Description In image steganography by LSB method we predict the least significant bits in the image which are raised to repetitive patterns in the digital images and we place the cipher or plain text content into those bits so that the output image is un distorted or with minimal distortion if the process carried out un ideally. But the image containing text is not protected, out method will carry out the process of protecting the medium the image is protected by steganographing into another image. It is carried out by either Adobe(R)Photoshop(TM) v11 above or Simulink(R) Mat Lab(TM) V 2010 a above. This process is carried out in two steps 1. Generating the darker version of the image to be hidden (Decreasing the lightness). 2. Generating the differential image matrix of darker image and the Cover Medium. In this method to obtain the required hidden image we need the undistorted cover image is key. Image as key method enhances the security to very high level. The decoder needed to have the key image else obtaining image is near impossible, it is impossible to guess the key image from the stream of millions of images over the internet. i. Protecting the cover medium 1. Generating the darker version of the image to be hidden: All the images in the RGB (not dealing with CMYK in this method) will have the matrix structure and for every pixel (square or round) we have the values for Red, Green and Blue. From the fact that Red, Green and Blue are the primary subtractive colors. Every pixel will have the RGB(0,0,0) to RGB(255,255,255) where RGB(0,0,0) is black and RGB(255,255,255) is white. And all the color in between are spread over the visible spectrum of colors 16.8 million (16777216) colors to generate the darker version of the image we can perform two operations I. Decreasing the lightness of the image II. Decreasing the RGB range. Both methods do nearly same work making the RGB high value to (<255, <255, <255) so that there will be no brighter pixels in the image. In mat lab in order to Decrease the RGB high limit we need divide the matrix by approximately 15 or get approximately 8% of the original pixels so that the resultant image matrix the white pixel RGB (255,255,255) will Become RGB (15, 15, 15) approximately. # Generating the differential image matrix of darker image and the Cover Medium: We need to consider relatively brighter image as the cover medium. To generate the differential image matrix the fallowing equation is applied. AS the cover medium is sufficiently brighter when the image to be hidden in darker version is subtracted there is not much visible disturbance in the image is observed. And this image will be transmitted to end user. ii. Un-hiding algorithm 1. For un-hiding the image we need to acquire final image and undistorted cover image as key. 2. Darker version of the hidden image is acquired by calculating the difference of the final image and the undistorted cover image. 3. The original can be obtained by multiplying the image back by 15 or approx. 830% of the darkened image # e) Limitations As huge image is processing is involved in every step the time complexity of the algorithm will be considerably high. There is chance of losing the originality of the of the image because the RGB matrix store only integers. During the transmission the resolution of final image and cover image should not change, else the total Least Significant Bits will be disturbed destroying the image. # f) Results This is a BMP image this is used for LSB technique steganography using the current existing method. The least significant bits in the bitmap matrix are manipulated and the required cipher text in inserted in to ![darkerImage = |imageToBeHiden/15| or = |imageToBeHidden*8%| resultImage = |imageTo Be Protected-coverImage| Darkened Hidden Image = |finalImage ~ original Cover Image HiddenImage = |darkenedImage *15| or = |darkenedImage *1500%| Global Journal of C omp uter S cience and T echnology Volume XV Issue I Version I Year ( )](image-2.png "") ![](image-3.png "") © 2015 Global Journals Inc. (US) 1 © 2015 Global Journals Inc. (US) Security Enhancement in Image Steganography a Matlab Approach the image. Now a new method to secure this image is implemented in order to do this the image needed to darken using the techniques described in the paper above. The steganography image is then subjected to darkening gives the below result When this Bitmap image darkened every pixel from the range of 0-255 in each spectrum of color will be reduced down to 0-15 this gives the darker version. Can be achieved by either mat lab of Photoshop. We used mat lab 2014a and image processing tool box for image functions in it. i ## . Protecting the steganography image For protecting this image we need to use another image to hide this image into that image. The target image must be considerably brighter so that when we calculate the difference the output shouldn't have considerable distortion. ## The final output image (Difference of darkened image and cover image looks as below). The final output image looks almost similar to the original cover image as the cover image is containing most pixels bright. This image contains the steganography image that contains the cipher text. And for obtaining the hidden image we need the original cover Image as the key for revealing. This completes the process of securing the image in another cover image. And to get the hidden image back we need two images the final image and original cover image which acts as key. * RJImagesteganographyr. Poornima1and India. 2. Steganography and Steganalysis: Different Approaches, Soumyendu Das Information Security Consultant Kolkata India; India Iswarya 21 M. Tech., Department Of Advanced Computing, Sastra University, India. M. Tech., Department Of Advanced Computing, Sastra University, ; Bijoy Bandyopadhyay Institute of Radio physics & Electronics, University of Calcutta, Kolkata, Sugata Sanyal, Tata Institute of Fundamental Research Mumbai * Steganography and Steganalysis TMoerland Leiden Institute of Advanced Computing Science * Steganography and Steganalysis: An Overview JSilman SANS Institute 2001 * Exploring steganography: seeing the unseen NFJohnson SJajodia IEEE Computer 31 2 1998 * Steganography: past, present, future. SANS Institute publication JCJudge 2001 * FA PPetitcolas RJAnderson MGKuhn Information Hiding-A Survey July, 1999 87 Process of IEEE * Digital steganography: hiding data within data DArtz Internet Computing. IEEE 5 3 2001