CFP last date
20 January 2025
Reseach Article

Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files

by Joyshree Nath, Sankar Das, Shalabh Agarwal, Asoke Nath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 14 - Number 7
Year of Publication: 2011
Authors: Joyshree Nath, Sankar Das, Shalabh Agarwal, Asoke Nath
10.5120/1894-2522

Joyshree Nath, Sankar Das, Shalabh Agarwal, Asoke Nath . Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files. International Journal of Computer Applications. 14, 7 ( February 2011), 31-35. DOI=10.5120/1894-2522

@article{ 10.5120/1894-2522,
author = { Joyshree Nath, Sankar Das, Shalabh Agarwal, Asoke Nath },
title = { Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 14 },
number = { 7 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume14/number7/1894-2522/ },
doi = { 10.5120/1894-2522 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:02:47.153175+05:30
%A Joyshree Nath
%A Sankar Das
%A Shalabh Agarwal
%A Asoke Nath
%T Advanced steganographic approach for hiding encrypted secret message in LSB,LSB+1,LSB+2 and LSB+3 bits in non standard cover files
%J International Journal of Computer Applications
%@ 0975-8887
%V 14
%N 7
%P 31-35
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In digital steganography normally image, audio or video files are the standard cover files or the host files for embedding secret message such as text, image, audio or video. Nath et al.(2) explored the standard method for hiding secret message inside standard cover files such as image, audio or video files. In the present work we have shown how we can hide secret message in encrypted form in some non standard cover files such as .exe, .com, .pdf, .doc, .xls, .mdb, .ppt files. However, the size of the secret message must be very small in comparison to cover file. The secret message is converted to encrypted form using MSA algorithm(2) and then we hide the encrypted message inside the non standard cover file. To hide encrypted secret message we insert the 8 bits in 2 consecutive bytes of cover file in LSB, LSB+1, LSB+2 and LSB+3 positions. This method could be very effective to hide some information in some executable file. To make the entire process secured we have introduced the password when we hide message and while encrypting the secret message we have to input some text_key. While hiding secret message in cover file we embed 1 byte information in two consecutive bytes of the cover file. There is a risk factor that it may damage the cover file in such a way that the embedded cover file may not behave in proper way as it was behaving before insertion of secret message. However, there is one advantage that we can embed more data in a cover file. We propose that our new method could be most appropriate for hiding any file in any non-standard cover file such as executable file such as .EXE or .COM file, compiler, MS-Office files, Data Base files such as .MDB, .PDF file. Our method will now give open challenge to all user that it is possible to hide any small secret message inside in any non standard cover files. The present work shows that we can hide information in almost all files except pure text or ASCII file. The only restriction is the size of secret message should be extremely small in comparison to cover file. The present method may be implemented in digital water marking in any legal electronic documents, Bank data transactions, in government sectors, in defense, in schools and colleges.

References
  1. Symmetric key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244
  2. Data Hiding and Retrieval, A.Nath, S.Das, A.Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010.
  3. William Stallings, "Cryptography and Network Security: Principles and Practices." 3rd edition, 2003.
  4. http://en.wikipedia.org/wiki/ Steganography
  5. An Overview of Image Steganography by T.Morkel, J.H.P. Eloff and M.S.Oliver.
  6. An Overview of Steganography by Shawn D. Dickman
  7. Digital Steganography: Hiding data within Data, IEEE Internet Computing, May/June 2001, pp. 75-80.
  8. Cyber Warfare: steganography vs. Steganalysis, Communications of the ACM, Vol 47, Issue 10, Oct 2004, PP. 76-82
Index Terms

Computer Science
Information Sciences

Keywords

steganographic MSA algorithm(2) secret message