SlideShare a Scribd company logo
1 of 11
Image steganography
EE7150 – Digital Image Processing – Fall 2015
Savitha Bhallamudi
Information Hiding -Introduction
 Purpose:
 Hiding sensitive information vital for security purposes
 Securing private files and documents
 Hiding information - 3methods - Cryptography, Steganography, Watermarking.
 Cryptography - Data to be hidden is coded
 several techniques ; sophisticated
 visually obvious to be encrypted; appears non-sensical
 Watermarking
 Applies a copyright label ; prevents illegal use of content
 Improper removal causes degradation of original information
 Steganography -hiding information by using another information as a cover.
 Elements:
 cover component, message component, stego component.
Steganography -Introduction
 Types:
 Text steganography
 Image steganography
 Video steganography
 Audio steganography
 Image steganography is widely used.
 Images contain redundant information.
 Easy to manipulate few pixels without affecting visual data observably
 Slight changes in RGB values undetected by human eye (HVS) - Psychovisual
redundancy.
 Types: Text in image ; image in image
Image steganography
 Initially used in images sent through emails.
 Presence detected by huge size of the stego-images.
 Various techniques available:
 LSB substitution method
 Blocking method
 Palette modification method
 LSB technique can be used for BMP(bitmap) images.
 Blocking method – DCT and DWT – used for JPEG images
 Palette based method – used for GIF images.
Methods:
 LSB substitution method:
 Deals with substituting LSB bits of corresponding pixels in image to store the text
message or another image as a message.
 Block method:
 blocks of the image are considered and DCT (discrete cosine transform) is done in
order to break them.
 Each block is then subdivided into 64 parts (DCT coefficients).
 These coefficients are modified i.e. the color gets modified a little by storing some
text or another image in it.
 Palette modification:
 Every image uses a set of color values.
 Palette Modification replaces the unused colors within an image’s color palette
with colors that represent the hidden message.
LSB substitution method -Algorithm:
 In the current project, emphasis is given to this
method.
 Simplicity
 Mostly Imperceivable
 One of the channels among RGB can be chosen, and LSB of its pixels altered
or all the channels could be used.
 Example:
(a) binary form of message to be hidden
(b) few pixel values on cover image
(c) LSB altered
Algorithm:
1. Input the message to be hidden. (either image
or text)
2. Check the maximum number of bits that can be
accepted by the cover image
3. Replace the LSB bits of the pixels in cover
image with the binary representation of the
message. => we obtain Stego image
 Either color image (RGB) or grayscale image can
be used as a cover image.
 In case of color image, 24bit image i.e. 8bits are
present for each for RGB so more number
information pixels can be stored.
 Modification can be done to either just the last 1
bit or 2,4 or more bits depending on
requirement.
In the above example, image1 represents cover image and image2 is to be
hidden. As stated earlier, using too many or too less bits causes the cover image
to be distorted too much, making the steganography obvious.
 Generally ideal to replace only about half of the pixels with the
message in order to keep the stego image visually good.
4. To retrieve the original image,
 Number of bits used to store the secret image should be known.
 The host image is scanned, to pick out the least significant bits
according the number used
 These are then used to create a new image such that the LSB
bits extracted now become the most significant bits in the
retrieved image.
References:
1. Johnson, Neil F. "Steganography."
Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web.
2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in
Computer Science and Software Engineering." Http://www.ijarcsse.com/.
N.p., Sept. 2014. Web.
3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to
Steganography.”
4. IEEE Security & Privacy Magazine, May-June 2013. Web.
5. Nick Nabavian. “Image steganography” Nov. 28, 2007.
http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano
graphy.pdf
6. Matlab help.
THANK YOU

More Related Content

Similar to Image_steganography.pptx

An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisIOSR Journals
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATAAjinkya Nikam
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
Imagesteganographydbatuaudi
ImagesteganographydbatuaudiImagesteganographydbatuaudi
ImagesteganographydbatuaudiABHIJEET KHIRE
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed satIAESIJEECS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 

Similar to Image_steganography.pptx (20)

An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
Uncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and AnalysisUncompressed Image Steganography using BPCS: Survey and Analysis
Uncompressed Image Steganography using BPCS: Survey and Analysis
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Report
ReportReport
Report
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
G0210032039
G0210032039G0210032039
G0210032039
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Imagesteganographydbatuaudi
ImagesteganographydbatuaudiImagesteganographydbatuaudi
Imagesteganographydbatuaudi
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 

Recently uploaded

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 

Recently uploaded (20)

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Image_steganography.pptx

  • 1. Image steganography EE7150 – Digital Image Processing – Fall 2015 Savitha Bhallamudi
  • 2. Information Hiding -Introduction  Purpose:  Hiding sensitive information vital for security purposes  Securing private files and documents  Hiding information - 3methods - Cryptography, Steganography, Watermarking.  Cryptography - Data to be hidden is coded  several techniques ; sophisticated  visually obvious to be encrypted; appears non-sensical  Watermarking  Applies a copyright label ; prevents illegal use of content  Improper removal causes degradation of original information  Steganography -hiding information by using another information as a cover.  Elements:  cover component, message component, stego component.
  • 3. Steganography -Introduction  Types:  Text steganography  Image steganography  Video steganography  Audio steganography  Image steganography is widely used.  Images contain redundant information.  Easy to manipulate few pixels without affecting visual data observably  Slight changes in RGB values undetected by human eye (HVS) - Psychovisual redundancy.  Types: Text in image ; image in image
  • 4. Image steganography  Initially used in images sent through emails.  Presence detected by huge size of the stego-images.  Various techniques available:  LSB substitution method  Blocking method  Palette modification method  LSB technique can be used for BMP(bitmap) images.  Blocking method – DCT and DWT – used for JPEG images  Palette based method – used for GIF images.
  • 5. Methods:  LSB substitution method:  Deals with substituting LSB bits of corresponding pixels in image to store the text message or another image as a message.  Block method:  blocks of the image are considered and DCT (discrete cosine transform) is done in order to break them.  Each block is then subdivided into 64 parts (DCT coefficients).  These coefficients are modified i.e. the color gets modified a little by storing some text or another image in it.  Palette modification:  Every image uses a set of color values.  Palette Modification replaces the unused colors within an image’s color palette with colors that represent the hidden message.
  • 6. LSB substitution method -Algorithm:  In the current project, emphasis is given to this method.  Simplicity  Mostly Imperceivable  One of the channels among RGB can be chosen, and LSB of its pixels altered or all the channels could be used.  Example: (a) binary form of message to be hidden (b) few pixel values on cover image (c) LSB altered
  • 7. Algorithm: 1. Input the message to be hidden. (either image or text) 2. Check the maximum number of bits that can be accepted by the cover image 3. Replace the LSB bits of the pixels in cover image with the binary representation of the message. => we obtain Stego image  Either color image (RGB) or grayscale image can be used as a cover image.  In case of color image, 24bit image i.e. 8bits are present for each for RGB so more number information pixels can be stored.  Modification can be done to either just the last 1 bit or 2,4 or more bits depending on requirement.
  • 8. In the above example, image1 represents cover image and image2 is to be hidden. As stated earlier, using too many or too less bits causes the cover image to be distorted too much, making the steganography obvious.
  • 9.  Generally ideal to replace only about half of the pixels with the message in order to keep the stego image visually good. 4. To retrieve the original image,  Number of bits used to store the secret image should be known.  The host image is scanned, to pick out the least significant bits according the number used  These are then used to create a new image such that the LSB bits extracted now become the most significant bits in the retrieved image.
  • 10. References: 1. Johnson, Neil F. "Steganography." Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web. 2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in Computer Science and Software Engineering." Http://www.ijarcsse.com/. N.p., Sept. 2014. Web. 3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to Steganography.” 4. IEEE Security & Privacy Magazine, May-June 2013. Web. 5. Nick Nabavian. “Image steganography” Nov. 28, 2007. http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano graphy.pdf 6. Matlab help.