SlideShare a Scribd company logo
1 of 31
IMAGE
STEGANOGRAPHY
Guided By:
Prof. Nikunj Gamit
Prepared By:
Nidhi Papaiyawala
201203100810041
(6th IT)
Content
 Definition of image steganography
 Advantages
 Limitations
 Application
 Block diagram of steganography
 Different techniques
 Introduction of LSB technique
 Merits and Demerits of LSB
 Introduction of DCT technique
 Application
 Error analysis
1
Image steganography
 Definition:
Steganography is the art of “concealed
writing” and it refers to techniques that hide
information inside objects known as “Cover
Objects”.
2
Advantages of steganography
 The secret message does not attract attention to
itself as an object of scrutiny.
 steganography is concerned with concealing a
secret message is being sent, as well as
concealing the contents of the message.
 Difficult to detect. Only receiver can detect.
 Provides better security for data sharing.
3
Limitations
 The confidentiality of information is maintained
by the algorithms, and if algorithms are known
then this technique is of no use.
 Password leakage may occur and it leads to the
unauthorized access of data.
4
Application
 several information sources like our private
banking information, some military secrets, can
be stored in a cover source.
 Steganography is used by some modern printers
and color laser printers.
 Steganography can be used for digital
watermarking.
5
Basic Block diagram
Embedding information:
6
Embedding
Process
Stego-Key
Embedded
message
Cover
Image
Stego
Image
(cont.)
Extracting information:
7
Extracting
Process
Stego-Key
Cover
Image
Stego
Image
Embedded
message
Different Techniques[1]
There are two categories:
1)Spatial Domain:
which mainly includes LSB(Least
Significant Bit)
2)Frequency Domain:
which includes DCT(Discrete cosine
transform) and Wavelet Transform.
8
Least Significant Bit
 Simple approach to embedding information in
a cover image.
 It operates on principle that the human eye can
not differentiate between two shade separated by
only one bit.
Algorithm to embed the message:[1]
 Read the cover image and text message which is
to be hidden in the cover image.
 Convert the color image into grey image.
9
(cont.)
 Convert text message in binary.
 Calculate the LSB of each pixel of cover image.
 Replace LSB of cover image with each bit of
secret message one by one.
 Write stego image.
10
Algorithm to extracting message
 Read the stego image.
 Calculate the LSB of each pixel of stego image.
 Extract the bits and covert each 8 bit in to
character.
11
Result of LSB
12
Cover image Stego image
 Merits
1) Simple to
implement.
2) High payload
capacity.
3) Low complexity.
 Demerits:
1) Vulnerable
corruption.
2) Vulnerable to
detection.
13
DCT(Discrete cosine transform)
 The DCT transforms a signal or image from the
spatial domain to the frequency domain.
 Grouping the pixels into 8 × 8 pixel blocks and
transforming the pixel blocks into 64 DCT.
 DCT allows an image to be broken up into
different frequency bands namely the high,
middle and low frequency bands
14
Process of DCT based image
Steganography are as follow:[2]
Embedding information:
 Load cover image and secret image.
 Divide the cover image in to 8x8 blocks of
pixels.
 Transform the cover image from spatial domain
to frequency using two dimensional DCT .
 Quantize the DCT coefficients by dividing using
factor in to the rounded value. 15
(cont.)
 Encrypt the secret image using RSA algorithm.
 Divide the encrypted image in to 8x8 blocks.
 Embed this data in the mid DCT coefficients of
cover image.
 Apply two dimensional inverse DCT to view it
in the spatial domain.
16
Block Diagram of DCT[2]
secret
message
17
Encryptio
n
Embeddi
ng
2D DCT
on each
block
8*8 block
preparatio
n
Cover
image
2D IDCT
on each
block
Stego
Embedding information:
Extracting information
 Read the Stego image.
 Divide the stego image in to 8x8 blocks of
pixels.
 Transform the stego image from spatial to
frequency domain by applying two dimensional
DCT on each block
 Quantize the DCT coefficients in to the rounded
value.
18
(cont.)
 Extract the encrypted image values from mid-
frequency coefficients.
 Decrypt the values using RSA algorithm.
 Apply two dimensional inverse DCT to view the
extracted image in the spatial domain.
19
Extracting information[2]
20
Stego
image
8*8 block
preparatio
n
2D DCT
on each
block
Extraction
2D IDCT
on each
block
Decryptio
n
Extracted
image
Result of DCT
21
Cover Image Secrete Image
Output at the receiver side
Cover Image Stego Image
22
Advantages
 Energy compaction.
 High compression ratio,
 Small bit error rate
 Good information integration ability.
23
Application
 It is often used in image processing, especially
for lossy compression, because it has a strong
"energy compaction" property.
24
Error Analysis [2]
(I)Bit Error Rate(BER):
 For the successful recovery of the hidden
information the communication channel must be
ideal.
 for the real communication channel, there will
be error while retrieving hidden information and
this is measured by BER.
all pixel
BER= 1 ∑ |image cov -image steg |
|image cov| i=0
25
(cont.)
(II)Mean Square Error:
 It is defined as the square of error between cover
image and stego image.
 The distortion in the image can be measured
using MSE and is calculated using Equation
n
MSE = 1 ∑ (cov-steg)2
n i=0
26
(cont.)
(III)Peak Signal to Noise Ratio (PSNR)
 It is the measure of quality of the image by
comparing the cover image with the stego
image, i.e. Difference between the cover and
Stego image is calculated using Equation.
PSNR = 10log10 2552/MSE
27
Conclusion.
 Steganography is the art and science of writing
hidden message that no one apart from the
sender and receiver, suspect the existence of the
message.
 DCT-Steganography is based on encryption. To
provide high security Steganography and
cryptography are combined together. This
technique encrypts secret information before
embedding it in the image.
 Larger PSNR indicates the higher the image
quality . a smaller PSNR means there is huge
distortion between the cover-image and the
stego image.
28
References
 Anil k Jain, “Fundamentals of digital image
processing", University of california-
davis,prentice hall.
 Proceeding of the 2006 International conference
on “Intelligent information hiding and
multimedia signal processing 2006 IEEE.
 K.B.Raja', C.R.Chowdary2, Venugopal K R3,
L.M.Patnaik , A Secure Image Steganography
using LSB, DCT and Compression Techniques
on Raw Images,2005 IEEE 29
THANK YOU
30

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
steganography
steganographysteganography
steganography
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 

Viewers also liked

Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationIOSR Journals
 
Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...I3E Technologies
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkIJSRD
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret dataVema Reddy
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Cypher technique
Cypher techniqueCypher technique
Cypher techniqueZubair CH
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationLaili Aidi
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewCSCJournals
 
Project Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By BhaskarProject Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By Bhaskarbhaskarnarula
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Alberto Villegas
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 

Viewers also liked (20)

Steganography
Steganography Steganography
Steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
 
Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural Network
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
Project Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By BhaskarProject Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By Bhaskar
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Steganography
SteganographySteganography
Steganography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 

Similar to Image steganography

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyIRJET Journal
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 

Similar to Image steganography (20)

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
C010511420
C010511420C010511420
C010511420
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

Image steganography

  • 1. IMAGE STEGANOGRAPHY Guided By: Prof. Nikunj Gamit Prepared By: Nidhi Papaiyawala 201203100810041 (6th IT)
  • 2. Content  Definition of image steganography  Advantages  Limitations  Application  Block diagram of steganography  Different techniques  Introduction of LSB technique  Merits and Demerits of LSB  Introduction of DCT technique  Application  Error analysis 1
  • 3. Image steganography  Definition: Steganography is the art of “concealed writing” and it refers to techniques that hide information inside objects known as “Cover Objects”. 2
  • 4. Advantages of steganography  The secret message does not attract attention to itself as an object of scrutiny.  steganography is concerned with concealing a secret message is being sent, as well as concealing the contents of the message.  Difficult to detect. Only receiver can detect.  Provides better security for data sharing. 3
  • 5. Limitations  The confidentiality of information is maintained by the algorithms, and if algorithms are known then this technique is of no use.  Password leakage may occur and it leads to the unauthorized access of data. 4
  • 6. Application  several information sources like our private banking information, some military secrets, can be stored in a cover source.  Steganography is used by some modern printers and color laser printers.  Steganography can be used for digital watermarking. 5
  • 7. Basic Block diagram Embedding information: 6 Embedding Process Stego-Key Embedded message Cover Image Stego Image
  • 9. Different Techniques[1] There are two categories: 1)Spatial Domain: which mainly includes LSB(Least Significant Bit) 2)Frequency Domain: which includes DCT(Discrete cosine transform) and Wavelet Transform. 8
  • 10. Least Significant Bit  Simple approach to embedding information in a cover image.  It operates on principle that the human eye can not differentiate between two shade separated by only one bit. Algorithm to embed the message:[1]  Read the cover image and text message which is to be hidden in the cover image.  Convert the color image into grey image. 9
  • 11. (cont.)  Convert text message in binary.  Calculate the LSB of each pixel of cover image.  Replace LSB of cover image with each bit of secret message one by one.  Write stego image. 10
  • 12. Algorithm to extracting message  Read the stego image.  Calculate the LSB of each pixel of stego image.  Extract the bits and covert each 8 bit in to character. 11
  • 13. Result of LSB 12 Cover image Stego image
  • 14.  Merits 1) Simple to implement. 2) High payload capacity. 3) Low complexity.  Demerits: 1) Vulnerable corruption. 2) Vulnerable to detection. 13
  • 15. DCT(Discrete cosine transform)  The DCT transforms a signal or image from the spatial domain to the frequency domain.  Grouping the pixels into 8 × 8 pixel blocks and transforming the pixel blocks into 64 DCT.  DCT allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands 14
  • 16. Process of DCT based image Steganography are as follow:[2] Embedding information:  Load cover image and secret image.  Divide the cover image in to 8x8 blocks of pixels.  Transform the cover image from spatial domain to frequency using two dimensional DCT .  Quantize the DCT coefficients by dividing using factor in to the rounded value. 15
  • 17. (cont.)  Encrypt the secret image using RSA algorithm.  Divide the encrypted image in to 8x8 blocks.  Embed this data in the mid DCT coefficients of cover image.  Apply two dimensional inverse DCT to view it in the spatial domain. 16
  • 18. Block Diagram of DCT[2] secret message 17 Encryptio n Embeddi ng 2D DCT on each block 8*8 block preparatio n Cover image 2D IDCT on each block Stego Embedding information:
  • 19. Extracting information  Read the Stego image.  Divide the stego image in to 8x8 blocks of pixels.  Transform the stego image from spatial to frequency domain by applying two dimensional DCT on each block  Quantize the DCT coefficients in to the rounded value. 18
  • 20. (cont.)  Extract the encrypted image values from mid- frequency coefficients.  Decrypt the values using RSA algorithm.  Apply two dimensional inverse DCT to view the extracted image in the spatial domain. 19
  • 21. Extracting information[2] 20 Stego image 8*8 block preparatio n 2D DCT on each block Extraction 2D IDCT on each block Decryptio n Extracted image
  • 22. Result of DCT 21 Cover Image Secrete Image
  • 23. Output at the receiver side Cover Image Stego Image 22
  • 24. Advantages  Energy compaction.  High compression ratio,  Small bit error rate  Good information integration ability. 23
  • 25. Application  It is often used in image processing, especially for lossy compression, because it has a strong "energy compaction" property. 24
  • 26. Error Analysis [2] (I)Bit Error Rate(BER):  For the successful recovery of the hidden information the communication channel must be ideal.  for the real communication channel, there will be error while retrieving hidden information and this is measured by BER. all pixel BER= 1 ∑ |image cov -image steg | |image cov| i=0 25
  • 27. (cont.) (II)Mean Square Error:  It is defined as the square of error between cover image and stego image.  The distortion in the image can be measured using MSE and is calculated using Equation n MSE = 1 ∑ (cov-steg)2 n i=0 26
  • 28. (cont.) (III)Peak Signal to Noise Ratio (PSNR)  It is the measure of quality of the image by comparing the cover image with the stego image, i.e. Difference between the cover and Stego image is calculated using Equation. PSNR = 10log10 2552/MSE 27
  • 29. Conclusion.  Steganography is the art and science of writing hidden message that no one apart from the sender and receiver, suspect the existence of the message.  DCT-Steganography is based on encryption. To provide high security Steganography and cryptography are combined together. This technique encrypts secret information before embedding it in the image.  Larger PSNR indicates the higher the image quality . a smaller PSNR means there is huge distortion between the cover-image and the stego image. 28
  • 30. References  Anil k Jain, “Fundamentals of digital image processing", University of california- davis,prentice hall.  Proceeding of the 2006 International conference on “Intelligent information hiding and multimedia signal processing 2006 IEEE.  K.B.Raja', C.R.Chowdary2, Venugopal K R3, L.M.Patnaik , A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images,2005 IEEE 29