SlideShare a Scribd company logo
1 of 37
Download to read offline
Guided by,
Dr. Jyoti Pareek
Department of Computer Science
Rollwala Computer Center
Gujarat University
Ahmedabad

Hushen Savani (24)
Vikas Kantiya (10)
MCA-V
What is Steganography?
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Framework
Categories
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Steganography is the
art and science of writing
hidden messages in such a
way that no one, apart from
the sender and intended
recipient, suspects the
existence of the message.
Steganography Framework
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Framework
Categories
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics
Categories of Steganography
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Framework
Categories
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics
What is Image Steganography?
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Image Steganography is the technique
of hiding the data within the image in such a
way that prevents the unintended user from
the detection of the hidden messages or
data.
For example,

Cover Image

Data / Message

Stego Image
Applications of Image Steganography
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Secure Private Files and

Documents.
Hide Passwords and Encryption
Keys.
Transport Highly Private
Documents between International
Governments.
Transmit message/data without
revealing the existence of available
message.
Image Domain
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

What Images are made up of?:Images are made up of lots of little dots called
pixels. Each pixel is represented as 3 bytes –
one for Red, one for Green and one for Blue.
Red
Blue
11111000 11001001 00000011
248

201

3

Each byte is interpreted as an integer
number, which is how much of that color is
number
used to make the final color of the pixel.
248 + 201 + 3 = Orange Color
Image Domain
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

The difference between two colors

that differ by one bit in either one red,
green or blue value is impossible
detect for a human eye.
eye
So we can change the least significant
(last) bit in a byte, we either add or
subtract one or more values from the
value it represents.
This means we can overwrite the last
bit in a byte without affecting the
colors it appears to be.
Image Domain
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

A common approach of
hiding data within an image file
is Least Significant Bit (LSB)
Substitution.
Substitution
In this method, we can take
the binary representation of
the hidden data and overwrite
the LSB of each byte within the
cover image.
Least Significant Bit Substitution
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Suppose we have the following binary
representation for the Cover Image.
10010101 00001101
10010110 00001111

Suppose we want to "hide" the following 4 bits of
data: 1011,
we get the following,
10010101 00001101
10010110 00001111

Where the each data bits are accommodated in
the least significant bits of each byte of the image.
Least Significant Bit Substitution
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Least Significant Bit Substitution

results in a very minor distortion of
the image which is very much
negligible for the human eyes.

Cover Image

Stego Image
Substitution Levels
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

4-bits

5-bits

6-bits

7-bits
Pixel Indicator
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This method uses the least two

significant bits of one of the
channels to indicate existence of
data in the other two channels.
channels
Pixel Indicator
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Example,
R

G

B

Initial Pixel Bytes: 10101101 11011010 11100101
Data to be Embedded: 1101
Channel R: 10101111
Channel G: 11011001
Channel B: 11100111
Indicating Channel

Pixel Indicator Bits

Channels in
which Data is
Embedded
Stego Color Cycle
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

The SCC technique uses the

RGB images to hide the data
in different channels.
It keeps cycling the hidden
data between the Red,
Green and Blue channels,
utilizing one channel at a
cycle time.
Triple-A
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Triple-A technique uses the same principle

of LSB, where the secret is hidden in the
least significant bits of the pixels, with
more randomization in selection of the
number of bits used and the color
channels that are used.
• Two Seeds:
• To determine the used channels
• To determine the number of bits used
This randomization is expected to increase
the security of the system.
Max-bit
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This method measures the intensity of

the pixel and then hides data by
random pixel selection with a goal to
hide maximum data in each pixel.

This method is divided into three

parts:

Encryption
Image Intensity Calculation
Steganography.
Max-bit
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Original Image
Max-bit
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Grayscale Image
* All Black colored pixels are considered as Intense pixels.

Intense Pixels*
Statistics
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Triple-A

SCC

Max-bit

Bits/pixel

3.428

3

6.281

Capacity
Ratio

3.43/24 =>
14.28%

3/24 =>
12.5%

6.28/24 =>
26.1%
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Optimal Pixel adjustment

Procedure (OPAP) reduces the
distortion caused by the LSB
substitution method.
 In OPAP method the pixel value
is adjusted after the hiding of the
secret data.
This done to improve the quality
of the stego image without
disturbing the data hidden.
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

First a few least significant bits are substituted

with the data to be hidden.

Then in the pixel, the bits before the hidden

bits are adjusted suitably if necessary to give
less error.

Let n LSBs be substituted in each pixel.
Let d= decimal value of the pixel after the

substitution.
d1 = decimal value of last n bits of the pixel.
d2 = decimal value of n bits hidden in that
pixel.
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

If(d1~d2)<=(2^n)/2
then no adjustment is made
in that pixel.
Else
If(d1<d2)
d = d – 2^n .
If(d1>d2)
d = d + 2^n .

Where,
d is converted to binary and
written back to pixel
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Retrieval Process of Data:
Data
The retrieval follows

the extraction of the
least significant
bits(LSB) as hiding is
done using simple LSB
substitution.
Inverted Pattern
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This inverted pattern (IP) LSB

substitution approach uses the idea of
processing secret messages prior to
embedding.
In this method each section of secret
images is determined to be inverted or
not inverted before it is embedded.
In addition, the bits which are used to
record the transformation are treated
as secret keys or extra data to be reembedded.
Inverted Pattern
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

 The embedded string is S, the replaced string is R,

and the embedded bit string to divided to P parts.
 Let us consider n-bit LSB substitution to be made.
Then S and R are of n-bits length.
For P part in i = 1 to P
If MSE(Si,Ri) ≤ MSE(S’i,Ri)
Choose Si for embedding
Mark key(i) as logic ‘0’
If MSE(Si,Ri) ≥ MSE( S‘i,Ri)
Choose S‘ i for embedding
Mark key(i) as logic ‘1’
End For

Where,
MSE = Mean Squared Error
S is the data to be hidden
S‘ is the data to be hidden in inverted form.
Inverted Pattern
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Retrieval Process of Data:
Data
The stego-image and the key file are

required at the retrieval side.
First corresponding numbers of LSB
bits are retrieved from the stego-image.
If the key is ‘0’, then the retrieved bits
are kept as such.
Else if the key is ‘1’, then the bits are
inverted.
The bits retrieved in this manner from
every pixel of the stego-image gives the
data hidden.
IP Method Using Relative Entropy
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Relative entropy measures the

information discrepancy between
two different sources with an
optimal threshold obtained by
minimizing relative entropy.
In this method, instead of finding
the mean square error for inverted
pattern approach, the relative
entropy is calculated to decide
whether S or S‘ suites the pixel.
IP Method Using Relative Entropy
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Divide the cover image into P blocks of

same size, the embedding string is S,
and the replaced string is R.
For P part in i =1 to P
If rel.entropy(Si,Ri) ≤ rel.entropy (S‘i,Ri)
Choose Si for embedding
Mark key(i) as logic ‘0’
If rel.entropy (Si,Ri) ≥ rel.entropy (S‘i,Ri)
Choose S‘i for embedding
Mark key(i) as logic ‘1’
End For

Where,
S is the data to be hidden
S‘ is the data to be hidden in inverted form.
Decision Factors
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

 Peak Signal to Noise Ratio (PSNR): The PSNR is calculated using the equation,

 where Imax is the intensity value of each pixel which is

equal to 255 for 8 bit gray scale images.

 Mean Square Error (MSE): The MSE is calculated using the equation,

 where M and N denote the total number of pixels in

the horizontal and the vertical dimensions of the image
Xi, j represents the pixels in the original image and Yi,
j, represents the pixels of the stego image.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Pixel Value Differencing (PVD) is able to

provide a high quality stego image in
spite of the high capacity of the concealed
information.
That is, the number of insertion bits is
dependent on whether the pixel is an
edge area or smooth area.
In edge area the difference between the
adjacent pixels is more, whereas in
smooth area it is less.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Smooth Area

Edge Area

• While human perception is less sensitive to subtle

changes in edge areas of a pixel, it is more
sensitive to changes in the smooth areas.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This method hides the data in the

target pixel by finding the
characteristics of four pixels
surrounding it, indicated in the table
below:
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Select the maximum and the minimum

values(g) among the three pixel values that
have already finished the embedding process.
Consider upper pixel (g1), left pixel (g2) and
the upper left pixel (g3) in a given target pixel
g(x,y)
Calculate d using following:
d= [max (g1, g2, g3) – min (g1, g2, g3)]
 Using d , we get an idea as to whether the

target pixel is included in an edge area or in
smooth area.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Calculation of n: the number

of the insertion bits in a target
pixel Px,y is calculated, using
the following formula:
Statistics
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

OPAP

IP

PVD

Size of secret
data

25 kb

24.5 kb

22 kb

Image Size

242 kb

242 kb

242kb

MSE

0.1503

0.2635

12.4715

PSNR

56.71

51.86

37.87

Time (s)

7.65

7.96

8.6
Image Steganography

More Related Content

What's hot

Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 

What's hot (20)

Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
steganography
steganographysteganography
steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 

Viewers also liked

Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applicationsManasitilak
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 

Viewers also liked (6)

Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Steganography
Steganography Steganography
Steganography
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 

Similar to Image Steganography

Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Muqeed Hussain
 
2019 cvpr paper_overview
2019 cvpr paper_overview2019 cvpr paper_overview
2019 cvpr paper_overviewLEE HOSEONG
 
2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong Lee2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong LeeMoazzem Hossain
 
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by MadhuAN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by MadhuMadhu Rock
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyAly Arman
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis zaidsalfawzan
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learningpratik pratyay
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Camera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IICamera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IIYu Huang
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingStuart Hinchliff
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingStuart Hinchliff
 
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892Vadim Purinson
 
Deep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite ImageryDeep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite Imageryrlewis48
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...eSAT Publishing House
 

Similar to Image Steganography (20)

Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
 
2019 cvpr paper_overview
2019 cvpr paper_overview2019 cvpr paper_overview
2019 cvpr paper_overview
 
2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong Lee2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong Lee
 
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by MadhuAN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by Madhu
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
OpenCV.pdf
OpenCV.pdfOpenCV.pdf
OpenCV.pdf
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Camera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IICamera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning II
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
 
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
 
Deep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite ImageryDeep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite Imagery
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...
 

Recently uploaded

How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Dr. Asif Anas
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTDR. SNEHA NAIR
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeCeline George
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashasashalaycock03
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 

Recently uploaded (20)

How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
Unveiling the Intricacies of Leishmania donovani: Structure, Life Cycle, Path...
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINTARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
ARTICULAR DISC OF TEMPOROMANDIBULAR JOINT
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
How to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using CodeHow to Send Emails From Odoo 17 Using Code
How to Send Emails From Odoo 17 Using Code
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic SupportMarch 2024 Directors Meeting, Division of Student Affairs and Academic Support
March 2024 Directors Meeting, Division of Student Affairs and Academic Support
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
Work Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sashaWork Experience for psp3 portfolio sasha
Work Experience for psp3 portfolio sasha
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 

Image Steganography