Steganography is the art of hiding information in plain sight, and in this tutorial, I'll show you how to use Steghide — a very simple command line tool to do just that. In addition, I'll go over a bit of conceptual background to help you understand what's going on behind the scenes. This is a tool that's simple, configurable, and only takes a few seconds to hide information in many file types. this is the dbatu lonere university students project presentation.
2. Department of InformationDepartment of Information
Technology @2014-2018Technology @2014-2018
Project membersProject members
Abhijeet Khire.Abhijeet Khire.
Shweta Mahadik.Shweta Mahadik.
Madhav Solanke.Madhav Solanke.
Suraj Panavkar.Suraj Panavkar.
Dr. Babasaheb Ambedkar Technological University, Lonere
3. What is Steganography?
Steganography is the art and
science of writing hidden messages
in such a way that no one, apart
from the sender and intended
recipient, suspects the existence of
the message.
4. Problem Statement
How can we send a message secretly to the
destination.
Using steganography, information can be hidden
in carriers such as images.
In this study, I proposed a new framework of an
image steganography system to hide a digital text
of a secret message.
6. Text Steganography
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
8. What is Image Steganography?
Image Steganography is the technique of hiding
the data within the image in such a way that prevents
the unintended user from the detection of the hidden
messages or data.
For example,
Cover Image
Data / Message
Stego Image
9. Applications of Image Steganography
Secure Private Files and Documents.
Hide Passwords and Encryption Keys.
Transport Highly Private Documents between
International Governments.
Transmit message/data without revealing the
existence of available message.
10. Image Domain
What Images are made up of ? :-What Images are made up of ? :-
Images are made up of lots of little dots called pixels. Each
pixel is represented as 3 bytes3 bytes – one for RedRed, one for GreenGreen
and one for BlueBlue.
Each byte is interpreted as an integer numberinteger number, which is how
much of that color is used to make the final color of the
pixel.
11111000 11001001 00000011
248 201 3
248 + 201 + 3 = Orange Color
11. Image Domain
The difference between two colors that differ by one
bit in either one red, green or blue value is impossible
detect for a human eyehuman eye.
So we can change the least significant (last) bit in a
byte, we either add or subtract one or more values
from the value it represents.
This means we can overwrite the last bit in a byte
without affecting the colors it appears to be.
12. Image Domain
A approach of hiding data within an
image file is Least Significant Bit (LSB)Least Significant Bit (LSB)
SubstitutionSubstitution.
In this method, we can take the
binary representation of the hidden
data and overwrite the LSB of each byte
within the cover image.
13. Least Significant Bit Substitution
Suppose we have the following binary representation for the
Cover Image.
10010101 00001101
10010110 00001111
Suppose we want to "hide" the following 4 bits of data: 10111011,
we get the following,
100101011 000011011
100101100 000011111
Where the each data bits are accommodated in the least
significant bits of each byte of the image.
14. Least Significant Bit Substitution
Least Significant Bit Substitution results in a
very minor distortion of the image which is very
much negligible for the human eyes.
Cover Image Stego Image
16. Pixel Indicator
This method uses the least two significant bits
of one of the channelsone of the channels to indicate existence of
data in the other two channelsother two channels.
17. Pixel Indicator
Example,
Initial Pixel Bytes: 10101101 11011010 11100101
Data to be Embedded: 11011101
Channel R: 1010111111
Channel G: 1101100101
Channel B: 1110011111
Pixel Indicator Bits
RR GG BB
Indicating Channel
Channels in
which Data is
Embedded
18. Stego Color Cycle
The SCC technique uses the RGB
images to hide the data in different
channels.
It keeps cycling the hidden data
between the Red, Green and Blue
channels, utilizing one channel at a
cycle time.
19. Triple-A
Triple-A technique uses the same principle of LSB,
where the secret is hidden in the least significant bits of
the pixels, with more randomizationrandomization in selection of the
number of bits used and the color channels that are
used.
• Two Seeds:
• To determine the used channels
• To determine the number of bits used
This randomization is expected to increase the security
of the system.
20. Max-bit
This method measures the intensityintensity of the pixel and
then hides data by random pixel selectionrandom pixel selection with a
goal to hide maximum data in each pixel.
This method is divided into three parts:
Encryption
Image Intensity Calculation
Steganography.
21.
22.
23.
24. CONCLUSION :
Confidential communication and secret data storing
Steganography provides us with:
Potential capability to hide the existence of confidential data
Hardness of detecting the hidden (i.e., embedded) data
Strengthening of the secrecy of the encrypted data
Protection of data alteration
Access control system for digital content distribution
Media Database systems
Usage in modern printers
Alleged use by terrorists
Alleged use by intelligence services