SlideShare a Scribd company logo
1 of 25
Dr. Babasaheb Ambedkar Technological University, Lonere
Department of InformationDepartment of Information
Technology @2014-2018Technology @2014-2018
Project membersProject members
Abhijeet Khire.Abhijeet Khire.
Shweta Mahadik.Shweta Mahadik.
Madhav Solanke.Madhav Solanke.
Suraj Panavkar.Suraj Panavkar.
Dr. Babasaheb Ambedkar Technological University, Lonere
What is Steganography?
Steganography is the art and
science of writing hidden messages
in such a way that no one, apart
from the sender and intended
recipient, suspects the existence of
the message.
Problem Statement
 How can we send a message secretly to the
destination.
 Using steganography, information can be hidden
in carriers such as images.
 In this study, I proposed a new framework of an
image steganography system to hide a digital text
of a secret message.
Categories of Steganography
Text Steganography
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
Image Steganography
What is Image Steganography?
Image Steganography is the technique of hiding
the data within the image in such a way that prevents
the unintended user from the detection of the hidden
messages or data.
For example,
Cover Image
Data / Message
Stego Image
Applications of Image Steganography
Secure Private Files and Documents.
Hide Passwords and Encryption Keys.
Transport Highly Private Documents between
International Governments.
Transmit message/data without revealing the
existence of available message.
Image Domain
What Images are made up of ? :-What Images are made up of ? :-
Images are made up of lots of little dots called pixels. Each
pixel is represented as 3 bytes3 bytes – one for RedRed, one for GreenGreen
and one for BlueBlue.
Each byte is interpreted as an integer numberinteger number, which is how
much of that color is used to make the final color of the
pixel.
11111000 11001001 00000011
248 201 3
248 + 201 + 3 = Orange Color
Image Domain
The difference between two colors that differ by one
bit in either one red, green or blue value is impossible
detect for a human eyehuman eye.
So we can change the least significant (last) bit in a
byte, we either add or subtract one or more values
from the value it represents.
This means we can overwrite the last bit in a byte
without affecting the colors it appears to be.
Image Domain
A approach of hiding data within an
image file is Least Significant Bit (LSB)Least Significant Bit (LSB)
SubstitutionSubstitution.
In this method, we can take the
binary representation of the hidden
data and overwrite the LSB of each byte
within the cover image.
Least Significant Bit Substitution
Suppose we have the following binary representation for the
Cover Image.
10010101 00001101
10010110 00001111
Suppose we want to "hide" the following 4 bits of data: 10111011,
we get the following,
100101011 000011011
100101100 000011111
Where the each data bits are accommodated in the least
significant bits of each byte of the image.
Least Significant Bit Substitution
Least Significant Bit Substitution results in a
very minor distortion of the image which is very
much negligible for the human eyes.
Cover Image Stego Image
Substitution Levels
4-bits 5-bits
6-bits 7-bits
Pixel Indicator
This method uses the least two significant bits
of one of the channelsone of the channels to indicate existence of
data in the other two channelsother two channels.
Pixel Indicator
Example,
Initial Pixel Bytes: 10101101 11011010 11100101
Data to be Embedded: 11011101
Channel R: 1010111111
Channel G: 1101100101
Channel B: 1110011111
Pixel Indicator Bits
RR GG BB
Indicating Channel
Channels in
which Data is
Embedded
Stego Color Cycle
The SCC technique uses the RGB
images to hide the data in different
channels.
It keeps cycling the hidden data
between the Red, Green and Blue
channels, utilizing one channel at a
cycle time.
Triple-A
Triple-A technique uses the same principle of LSB,
where the secret is hidden in the least significant bits of
the pixels, with more randomizationrandomization in selection of the
number of bits used and the color channels that are
used.
• Two Seeds:
• To determine the used channels
• To determine the number of bits used
This randomization is expected to increase the security
of the system.
Max-bit
This method measures the intensityintensity of the pixel and
then hides data by random pixel selectionrandom pixel selection with a
goal to hide maximum data in each pixel.
This method is divided into three parts:
Encryption
Image Intensity Calculation
Steganography.
CONCLUSION :
Confidential communication and secret data storing
Steganography provides us with:
Potential capability to hide the existence of confidential data
Hardness of detecting the hidden (i.e., embedded) data
Strengthening of the secrecy of the encrypted data
Protection of data alteration
Access control system for digital content distribution
Media Database systems
Usage in modern printers
Alleged use by terrorists
Alleged use by intelligence services
Phase one image steganography_batu

More Related Content

What's hot

Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based SteganpgraphyOmkar Rane
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography2510stk
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESLovely Mnadal
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-SteganographySagar Kumar
 

What's hot (20)

Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Steganography
SteganographySteganography
Steganography
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 

Similar to Phase one image steganography_batu

Imagesteganographydbatuaudi
ImagesteganographydbatuaudiImagesteganographydbatuaudi
ImagesteganographydbatuaudiABHIJEET KHIRE
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...IJRES Journal
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEditor IJCATR
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr spaceIJECEIAES
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 

Similar to Phase one image steganography_batu (20)

Imagesteganographydbatuaudi
ImagesteganographydbatuaudiImagesteganographydbatuaudi
Imagesteganographydbatuaudi
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
Steganography
SteganographySteganography
Steganography
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 

More from ABHIJEET KHIRE

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...ABHIJEET KHIRE
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionABHIJEET KHIRE
 

More from ABHIJEET KHIRE (20)

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 question
 
Test resume
Test resumeTest resume
Test resume
 
Ddl
DdlDdl
Ddl
 
Create
CreateCreate
Create
 
All questions
All questionsAll questions
All questions
 
2 q on groups
2 q on groups2 q on groups
2 q on groups
 
1 q on operators
1 q on operators1 q on operators
1 q on operators
 
Q on subquery
Q on subqueryQ on subquery
Q on subquery
 
Q on joins
Q on joinsQ on joins
Q on joins
 
Q on functions
Q on functionsQ on functions
Q on functions
 
SQL QUERY PRACTICE
SQL QUERY PRACTICE SQL QUERY PRACTICE
SQL QUERY PRACTICE
 
Mysql schema emp dept
Mysql schema emp deptMysql schema emp dept
Mysql schema emp dept
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Phase one image steganography_batu

  • 1. Dr. Babasaheb Ambedkar Technological University, Lonere
  • 2. Department of InformationDepartment of Information Technology @2014-2018Technology @2014-2018 Project membersProject members Abhijeet Khire.Abhijeet Khire. Shweta Mahadik.Shweta Mahadik. Madhav Solanke.Madhav Solanke. Suraj Panavkar.Suraj Panavkar. Dr. Babasaheb Ambedkar Technological University, Lonere
  • 3. What is Steganography? Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
  • 4. Problem Statement  How can we send a message secretly to the destination.  Using steganography, information can be hidden in carriers such as images.  In this study, I proposed a new framework of an image steganography system to hide a digital text of a secret message.
  • 6. Text Steganography Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’
  • 8. What is Image Steganography? Image Steganography is the technique of hiding the data within the image in such a way that prevents the unintended user from the detection of the hidden messages or data. For example, Cover Image Data / Message Stego Image
  • 9. Applications of Image Steganography Secure Private Files and Documents. Hide Passwords and Encryption Keys. Transport Highly Private Documents between International Governments. Transmit message/data without revealing the existence of available message.
  • 10. Image Domain What Images are made up of ? :-What Images are made up of ? :- Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes3 bytes – one for RedRed, one for GreenGreen and one for BlueBlue. Each byte is interpreted as an integer numberinteger number, which is how much of that color is used to make the final color of the pixel. 11111000 11001001 00000011 248 201 3 248 + 201 + 3 = Orange Color
  • 11. Image Domain The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eyehuman eye. So we can change the least significant (last) bit in a byte, we either add or subtract one or more values from the value it represents. This means we can overwrite the last bit in a byte without affecting the colors it appears to be.
  • 12. Image Domain A approach of hiding data within an image file is Least Significant Bit (LSB)Least Significant Bit (LSB) SubstitutionSubstitution. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image.
  • 13. Least Significant Bit Substitution Suppose we have the following binary representation for the Cover Image. 10010101 00001101 10010110 00001111 Suppose we want to "hide" the following 4 bits of data: 10111011, we get the following, 100101011 000011011 100101100 000011111 Where the each data bits are accommodated in the least significant bits of each byte of the image.
  • 14. Least Significant Bit Substitution Least Significant Bit Substitution results in a very minor distortion of the image which is very much negligible for the human eyes. Cover Image Stego Image
  • 16. Pixel Indicator This method uses the least two significant bits of one of the channelsone of the channels to indicate existence of data in the other two channelsother two channels.
  • 17. Pixel Indicator Example, Initial Pixel Bytes: 10101101 11011010 11100101 Data to be Embedded: 11011101 Channel R: 1010111111 Channel G: 1101100101 Channel B: 1110011111 Pixel Indicator Bits RR GG BB Indicating Channel Channels in which Data is Embedded
  • 18. Stego Color Cycle The SCC technique uses the RGB images to hide the data in different channels. It keeps cycling the hidden data between the Red, Green and Blue channels, utilizing one channel at a cycle time.
  • 19. Triple-A Triple-A technique uses the same principle of LSB, where the secret is hidden in the least significant bits of the pixels, with more randomizationrandomization in selection of the number of bits used and the color channels that are used. • Two Seeds: • To determine the used channels • To determine the number of bits used This randomization is expected to increase the security of the system.
  • 20. Max-bit This method measures the intensityintensity of the pixel and then hides data by random pixel selectionrandom pixel selection with a goal to hide maximum data in each pixel. This method is divided into three parts: Encryption Image Intensity Calculation Steganography.
  • 21.
  • 22.
  • 23.
  • 24. CONCLUSION : Confidential communication and secret data storing Steganography provides us with: Potential capability to hide the existence of confidential data Hardness of detecting the hidden (i.e., embedded) data Strengthening of the secrecy of the encrypted data Protection of data alteration Access control system for digital content distribution Media Database systems Usage in modern printers Alleged use by terrorists Alleged use by intelligence services