SlideShare a Scribd company logo
1 of 21
Download to read offline
Department of InformationDepartment of Information
Technology @2014-2018Technology @2014-2018
Project membersProject members
Abhijeet Khire.Abhijeet Khire.
Shweta Mahadik.Shweta Mahadik.
Madhav Solanke.Madhav Solanke.
Suraj Panavkar.Suraj Panavkar.
Dr. Babasaheb Ambedkar Technological University, Lonere
What is Steganography?
Steganography is the art and
science of writing hidden messages
in such a way that no one, apart
from the sender and intended
recipient, suspects the existence of
the message.
Problem Statement
 How can we send a message secretly to the
destination.
 Using steganography, information can be hidden
in carriers such as images.
 In this study, I proposed a new framework of an
image steganography system to hide a digital text
of a secret message.
Categories of Steganography
What is Image Steganography?
Image Steganography is the technique of hiding
the data within the image in such a way that prevents
the unintended user from the detection of the hidden
messages or data.
For example,
Cover Image
Data / Message
Stego Image
Applications of Image Steganography
Secure Private Files and Documents.
Hide Passwords and Encryption Keys.
Transport Highly Private Documents between
International Governments.
Transmit message/data without revealing the
existence of available message.
Image Domain
What Images are made up of?:-What Images are made up of?:-
Images are made up of lots of little dots called pixels. Each
pixel is represented as 3 bytes3 bytes – one for RedRed, one for GreenGreen
and one for BlueBlue.
Each byte is interpreted as an integer numberinteger number, which is how
much of that color is used to make the final color of the
pixel.
11111000 11001001 00000011
248 201 3
248 + 201 + 3 = Orange Color
Image Domain
The difference between two colors that differ by one
bit in either one red, green or blue value is impossible
detect for a human eyehuman eye.
So we can change the least significant (last) bit in a
byte, we either add or subtract one or more values
from the value it represents.
This means we can overwrite the last bit in a byte
without affecting the colors it appears to be.
Image Domain
A approach of hiding data within an
image file is Least Significant Bit (LSB)Least Significant Bit (LSB)
SubstitutionSubstitution.
In this method, we can take the
binary representation of the hidden
data and overwrite the LSB of each byte
within the cover image.
Least Significant Bit Substitution
Suppose we have the following binary representation for the
Cover Image.
10010101 00001101
10010110 00001111
Suppose we want to "hide" the following 4 bits of data: 10111011,
we get the following,
100101011 000011011
100101100 000011111
Where the each data bits are accommodated in the least
significant bits of each byte of the image.
Least Significant Bit Substitution
Least Significant Bit Substitution results in a
very minor distortion of the image which is very
much negligible for the human eyes.
Cover Image Stego Image
Substitution Levels
4-bits 5-bits
6-bits 7-bits
Pixel Indicator
This method uses the least two significant bits
of one of the channelsone of the channels to indicate existence of
data in the other two channelsother two channels.
Pixel Indicator
Example,
Initial Pixel Bytes: 10101101 11011010 11100101
Data to be Embedded: 11011101
Channel R: 1010111111
Channel G: 1101100101
Channel B: 1110011111
Pixel Indicator Bits
RR GG BB
Indicating Channel
Channels in
which Data is
Embedded
Stego Color Cycle
The SCC technique uses the RGB
images to hide the data in different
channels.
It keeps cycling the hidden data
between the Red, Green and Blue
channels, utilizing one channel at a
cycle time.
Triple-A
Triple-A technique uses the same principle of LSB,
where the secret is hidden in the least significant bits of
the pixels, with more randomizationrandomization in selection of the
number of bits used and the color channels that are
used.
• Two Seeds:
• To determine the used channels
• To determine the number of bits used
This randomization is expected to increase the security
of the system.
Max-bit
This method measures the intensityintensity of the pixel and
then hides data by random pixel selectionrandom pixel selection with a
goal to hide maximum data in each pixel.
This method is divided into three parts:
Encryption
Image Intensity Calculation
Steganography.
Max-bit
Original Image
Max-bit
Grayscale Image Intense Pixels*
* All Black colored pixels are considered as Intense pixels.
Triple-A SCC Max-bit
Bits/pixel 3.428 3 6.281
Capacity Ratio 3.43/24 =>
14.28%
3/24 => 12.5% 6.28/24 => 26.1%
Statistics
Imagesteganographydbatuaudi

More Related Content

What's hot

Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color imagesIAEME Publication
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMijcsit
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color imagesIIT Delhi
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2IAEME Publication
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...IJMER
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...
Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...
Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...Jonathon Hare
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
image basics and image compression
image basics and image compressionimage basics and image compression
image basics and image compressionmurugan hari
 
Tracking of objects with known color signature - ELITECH 20
Tracking of objects with known color signature - ELITECH 20Tracking of objects with known color signature - ELITECH 20
Tracking of objects with known color signature - ELITECH 20Lukas Tencer
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 

What's hot (19)

Visual cryptography scheme for color images
Visual cryptography scheme for color imagesVisual cryptography scheme for color images
Visual cryptography scheme for color images
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
Data Redundacy
Data RedundacyData Redundacy
Data Redundacy
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
 
Data compression
Data compressionData compression
Data compression
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...
Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...
Multimodal Searching and Semantic Spaces: ...or how to find images of Dalmati...
 
Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
image basics and image compression
image basics and image compressionimage basics and image compression
image basics and image compression
 
Tracking of objects with known color signature - ELITECH 20
Tracking of objects with known color signature - ELITECH 20Tracking of objects with known color signature - ELITECH 20
Tracking of objects with known color signature - ELITECH 20
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
F0343545
F0343545F0343545
F0343545
 

Similar to Imagesteganographydbatuaudi

Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...IJRES Journal
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 

Similar to Imagesteganographydbatuaudi (20)

Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Steganography
SteganographySteganography
Steganography
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 

More from ABHIJEET KHIRE

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...ABHIJEET KHIRE
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionABHIJEET KHIRE
 

More from ABHIJEET KHIRE (20)

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 question
 
Test resume
Test resumeTest resume
Test resume
 
Ddl
DdlDdl
Ddl
 
Create
CreateCreate
Create
 
All questions
All questionsAll questions
All questions
 
2 q on groups
2 q on groups2 q on groups
2 q on groups
 
1 q on operators
1 q on operators1 q on operators
1 q on operators
 
Q on subquery
Q on subqueryQ on subquery
Q on subquery
 
Q on joins
Q on joinsQ on joins
Q on joins
 
Q on functions
Q on functionsQ on functions
Q on functions
 
SQL QUERY PRACTICE
SQL QUERY PRACTICE SQL QUERY PRACTICE
SQL QUERY PRACTICE
 
Mysql schema emp dept
Mysql schema emp deptMysql schema emp dept
Mysql schema emp dept
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Imagesteganographydbatuaudi

  • 1. Department of InformationDepartment of Information Technology @2014-2018Technology @2014-2018 Project membersProject members Abhijeet Khire.Abhijeet Khire. Shweta Mahadik.Shweta Mahadik. Madhav Solanke.Madhav Solanke. Suraj Panavkar.Suraj Panavkar. Dr. Babasaheb Ambedkar Technological University, Lonere
  • 2. What is Steganography? Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
  • 3. Problem Statement  How can we send a message secretly to the destination.  Using steganography, information can be hidden in carriers such as images.  In this study, I proposed a new framework of an image steganography system to hide a digital text of a secret message.
  • 5. What is Image Steganography? Image Steganography is the technique of hiding the data within the image in such a way that prevents the unintended user from the detection of the hidden messages or data. For example, Cover Image Data / Message Stego Image
  • 6. Applications of Image Steganography Secure Private Files and Documents. Hide Passwords and Encryption Keys. Transport Highly Private Documents between International Governments. Transmit message/data without revealing the existence of available message.
  • 7. Image Domain What Images are made up of?:-What Images are made up of?:- Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes3 bytes – one for RedRed, one for GreenGreen and one for BlueBlue. Each byte is interpreted as an integer numberinteger number, which is how much of that color is used to make the final color of the pixel. 11111000 11001001 00000011 248 201 3 248 + 201 + 3 = Orange Color
  • 8. Image Domain The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eyehuman eye. So we can change the least significant (last) bit in a byte, we either add or subtract one or more values from the value it represents. This means we can overwrite the last bit in a byte without affecting the colors it appears to be.
  • 9. Image Domain A approach of hiding data within an image file is Least Significant Bit (LSB)Least Significant Bit (LSB) SubstitutionSubstitution. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image.
  • 10. Least Significant Bit Substitution Suppose we have the following binary representation for the Cover Image. 10010101 00001101 10010110 00001111 Suppose we want to "hide" the following 4 bits of data: 10111011, we get the following, 100101011 000011011 100101100 000011111 Where the each data bits are accommodated in the least significant bits of each byte of the image.
  • 11. Least Significant Bit Substitution Least Significant Bit Substitution results in a very minor distortion of the image which is very much negligible for the human eyes. Cover Image Stego Image
  • 13. Pixel Indicator This method uses the least two significant bits of one of the channelsone of the channels to indicate existence of data in the other two channelsother two channels.
  • 14. Pixel Indicator Example, Initial Pixel Bytes: 10101101 11011010 11100101 Data to be Embedded: 11011101 Channel R: 1010111111 Channel G: 1101100101 Channel B: 1110011111 Pixel Indicator Bits RR GG BB Indicating Channel Channels in which Data is Embedded
  • 15. Stego Color Cycle The SCC technique uses the RGB images to hide the data in different channels. It keeps cycling the hidden data between the Red, Green and Blue channels, utilizing one channel at a cycle time.
  • 16. Triple-A Triple-A technique uses the same principle of LSB, where the secret is hidden in the least significant bits of the pixels, with more randomizationrandomization in selection of the number of bits used and the color channels that are used. • Two Seeds: • To determine the used channels • To determine the number of bits used This randomization is expected to increase the security of the system.
  • 17. Max-bit This method measures the intensityintensity of the pixel and then hides data by random pixel selectionrandom pixel selection with a goal to hide maximum data in each pixel. This method is divided into three parts: Encryption Image Intensity Calculation Steganography.
  • 19. Max-bit Grayscale Image Intense Pixels* * All Black colored pixels are considered as Intense pixels.
  • 20. Triple-A SCC Max-bit Bits/pixel 3.428 3 6.281 Capacity Ratio 3.43/24 => 14.28% 3/24 => 12.5% 6.28/24 => 26.1% Statistics