2. ABSTRACT
Steganography is a method of hiding secret messages in a cover object while communication
takes place between sender and receiver.
Security of secret or important information has always been a major issue from the past times
to the current time. It has always been the interested topic for researchers to develop secure
techniques to send data without revealing it to anyone other than the receiver.
Therefore from day to day researchers have developed many techniques to fulfill secure
transfer of data and steganography is one of them. In this thesis we have developed a new
technique of image steganography inside the embedding the encrypted Data file or message
using Hash-LSB with RSA algorithm for providing more security to data as well as our data
hiding method.
The developed technique uses a hash function to generate a pattern for hiding data bits into
LSB of RGB pixel values of the carry image.
3. AIM
Hiding sensitive information vital for security purposes
Securing private files and documents
4. OBJECTIVE
The main objectives of our project are to product security tool based on
steganography techniques to hider message carried by stego-media which
should not be sensible to human beings and avoid drawing suspicion to the
existence of hidden message.
5. Information Hiding -Introduction
Purpose:
Hiding sensitive information vital for security purposes
Securing private files and documents
Hiding information - 3methods - Cryptography, Steganography, Watermarking.
Cryptography - Data to be hidden is coded
several techniques ; sophisticated
visually obvious to be encrypted; appears non-sensical
Watermarking
Applies a copyright label ; prevents illegal use of content
Improper removal causes degradation of original information
Steganography -hiding information by using another information as a cover.
Elements:
cover component, message component, stego component.
6. Steganography -Introduction
Types:
Text steganography
Image steganography
Video steganography
Audio steganography
Image steganography is widely used.
Images contain redundant information.
Easy to manipulate few pixels without affecting visual data observably
Slight changes in RGB values undetected by human eye (HVS) - Psychovisual
redundancy.
Types: Text in image ; image in image
7. PROBLEM STATEMENT
The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try
of hide messages physically. One disadvantage of linguistic steganography is that users must equip
themselves to have a good knowledge of linguistry.
In recent years, everything is trending toward digitization. And with the development of the internet
technology, digital media can be transmitted conveniently over the network. Therefore, messages can be
secretly carried by digital media by using the steganography techniques, and then be transmitted through
the internet rapidly Steganography is the art of hiding the fact that communication is taking place, by
hiding information in other information.
Many different carrier file formats can be used, but digital images are the most popular because of their
frequency on the internet. For hiding secret information in images, there exists a large variety of
steganography techniques some are more complex than others and all of them have respective strong and
weak points. So we prepare this application, to make the information hiding more simple and user
friendly.
8. PROBLEM ANALYSIS
Steganography takes cryptography a step farther by hiding an encrypted message so that no
one suspects it exists. Ideally, anyone scanning your data will fail to know it contains
encrypted data.
Data is first encrypted by the usual means and then inserted, using a special algorithm, into
redundant (that is, provided but unneeded) data that is part of a particular file format such as
a JPEG image.
Think of all the bits that represent the same color pixels repeated in a row. By applying the
encrypted data to this redundant data in some random or non-conspicuous way, the result will
be data that appears to have the "noise" patterns of regular, non- encrypted data. A trademark
or other identifying symbol hidden in software code is sometimes known as a watermark.
9. EXISTING SYSTEM
Data hiding for vector quantization (VQ)-based images focuses on the problem of embedding
secret data into a cover VQ-based image to achieve secret communication and data protection.
VQ-based data-hiding methods into four no overlapping groups according to their reversibility and
output formats, introduce the details of the representative methods, summarize the features of the
representative methods, and compare the performance of the representative methods using peak
signal-to-noise ratio, capacity of secret data, and bit rate.
An irreversible method is very likely a VQ-based data-hiding method that produces a stego-image
as its output, and it can embed more secret data than a reversible method. Nonstandard encoding
methods (e.g., joint neighboring coding) are becoming popular in reversible data hiding since they
can increase the capacity for embedding the secret data
10. DISADVANTAGE
Huge number of data, huge file size, so someone can suspect about it.
If this techniques is gone in the wrong hands like hackers, terrorist, criminals then this
can be very much dangerous.
11. PROPOSED SYSTEM
Steganography is the art of hiding information and an effort to conceal the existence of the
embedded information.
It serves as a better way of securing message than cryptography which only conceals the
content of the message not the existence of the message.
Original message is being hidden within a carrier such that the changes so occurred in the
carrier are not observable. In this paper we will discuss how digital images can be used as a
carrier to hide messages.
This paper also analyses the performance of some of the steganography tools. Steganography
is a useful tool that allows covert transmission of information over an over the
communications channel. Combining secret image with the carrier image gives the hidden
image. The hidden image is difficult to detect without retrieval
12. ADVANTAGE
Alterations not visible to the human eye
Simple & easiest way of hiding Information
Hidden data can be distributed more evenly over the whole image in such a
way as to make it more robust
21. Methods:
LSB substitution method:
Deals with substituting LSB bits of corresponding pixels in image to store the text
message or another image as a message.
Block method:
blocks of the image are considered and DCT (discrete cosine transform) is done in
order to break them.
Each block is then subdivided into 64 parts (DCT coefficients).
These coefficients are modified i.e. the color gets modified a little by storing some
text or another image in it.
Palette modification:
Every image uses a set of color values.
Palette Modification replaces the unused colors within an image’s color palette
with colors that represent the hidden message.
22. LSB substitution method -Algorithm:
In the current project, emphasis is given to this
method.
Simplicity
Mostly Imperceivable
One of the channels among RGB can be chosen, and LSB of its pixels altered
or all the channels could be used.
Example:
(a) binary form of message to be hidden
(b) few pixel values on cover image
(c) LSB altered
23. Algorithm:
1. Input the message to be hidden. (either image
or text)
2. Check the maximum number of bits that can be
accepted by the cover image
3. Replace the LSB bits of the pixels in cover
image with the binary representation of the
message. => we obtain Stego image
Either color image (RGB) or grayscale image can
be used as a cover image.
In case of color image, 24bit image i.e. 8bits are
present for each for RGB so more number
information pixels can be stored.
Modification can be done to either just the last 1
bit or 2,4 or more bits depending on
requirement.
24. CONCLUSTION
It is observed that through LSB Substitution Steganographic method, the
results obtained in data hiding are pretty impressive as it utilizes the simple
fact that any image could be broken up to individual bit-planes each
consisting of different levels of information.
It is to be noted that as discussed earlier, this method is only effective for
bitmap images as these involve lossless compression techniques. Also, in this
project grey-scale images have been used for demonstration.
But this process can also be extended to be used for color images where,
bitplane slicing is to be done individually for the top four bit-planes for each
of R, G, B of the message image, which are again to be placed in the R, G, B
planes of the cover image, and extraction is done similarly.
25. FUTURE ENHANCEMENT
The future work on this project is to improve the compression ratio of the
image to the text. This project can be extended to a level such that it can be
used for the different types of multimedia files.
26. References:
1. Johnson, Neil F. "Steganography."
Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web.
2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in
Computer Science and Software Engineering." Http://www.ijarcsse.com/.
N.p., Sept. 2014. Web.
3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to
Steganography.”
4. IEEE Security & Privacy Magazine, May-June 2013. Web.
5. Nick Nabavian. “Image steganography” Nov. 28, 2007.
http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano
graphy.pdf
6. Matlab help.