SlideShare a Scribd company logo
1 of 26
DIGITAL STEGANOGRAPHY: HIDING DATA
WITHIN DATA
ABSTRACT
 Steganography is a method of hiding secret messages in a cover object while communication
takes place between sender and receiver.
 Security of secret or important information has always been a major issue from the past times
to the current time. It has always been the interested topic for researchers to develop secure
techniques to send data without revealing it to anyone other than the receiver.
 Therefore from day to day researchers have developed many techniques to fulfill secure
transfer of data and steganography is one of them. In this thesis we have developed a new
technique of image steganography inside the embedding the encrypted Data file or message
using Hash-LSB with RSA algorithm for providing more security to data as well as our data
hiding method.
 The developed technique uses a hash function to generate a pattern for hiding data bits into
LSB of RGB pixel values of the carry image.
AIM
 Hiding sensitive information vital for security purposes
 Securing private files and documents
OBJECTIVE
 The main objectives of our project are to product security tool based on
steganography techniques to hider message carried by stego-media which
should not be sensible to human beings and avoid drawing suspicion to the
existence of hidden message.
Information Hiding -Introduction
 Purpose:
 Hiding sensitive information vital for security purposes
 Securing private files and documents
 Hiding information - 3methods - Cryptography, Steganography, Watermarking.
 Cryptography - Data to be hidden is coded
 several techniques ; sophisticated
 visually obvious to be encrypted; appears non-sensical
 Watermarking
 Applies a copyright label ; prevents illegal use of content
 Improper removal causes degradation of original information
 Steganography -hiding information by using another information as a cover.
 Elements:
 cover component, message component, stego component.
Steganography -Introduction
 Types:
 Text steganography
 Image steganography
 Video steganography
 Audio steganography
 Image steganography is widely used.
 Images contain redundant information.
 Easy to manipulate few pixels without affecting visual data observably
 Slight changes in RGB values undetected by human eye (HVS) - Psychovisual
redundancy.
 Types: Text in image ; image in image
PROBLEM STATEMENT
 The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try
of hide messages physically. One disadvantage of linguistic steganography is that users must equip
themselves to have a good knowledge of linguistry.
 In recent years, everything is trending toward digitization. And with the development of the internet
technology, digital media can be transmitted conveniently over the network. Therefore, messages can be
secretly carried by digital media by using the steganography techniques, and then be transmitted through
the internet rapidly Steganography is the art of hiding the fact that communication is taking place, by
hiding information in other information.
 Many different carrier file formats can be used, but digital images are the most popular because of their
frequency on the internet. For hiding secret information in images, there exists a large variety of
steganography techniques some are more complex than others and all of them have respective strong and
weak points. So we prepare this application, to make the information hiding more simple and user
friendly.
PROBLEM ANALYSIS
 Steganography takes cryptography a step farther by hiding an encrypted message so that no
one suspects it exists. Ideally, anyone scanning your data will fail to know it contains
encrypted data.
 Data is first encrypted by the usual means and then inserted, using a special algorithm, into
redundant (that is, provided but unneeded) data that is part of a particular file format such as
a JPEG image.
 Think of all the bits that represent the same color pixels repeated in a row. By applying the
encrypted data to this redundant data in some random or non-conspicuous way, the result will
be data that appears to have the "noise" patterns of regular, non- encrypted data. A trademark
or other identifying symbol hidden in software code is sometimes known as a watermark.
EXISTING SYSTEM
 Data hiding for vector quantization (VQ)-based images focuses on the problem of embedding
secret data into a cover VQ-based image to achieve secret communication and data protection.
 VQ-based data-hiding methods into four no overlapping groups according to their reversibility and
output formats, introduce the details of the representative methods, summarize the features of the
representative methods, and compare the performance of the representative methods using peak
signal-to-noise ratio, capacity of secret data, and bit rate.
 An irreversible method is very likely a VQ-based data-hiding method that produces a stego-image
as its output, and it can embed more secret data than a reversible method. Nonstandard encoding
methods (e.g., joint neighboring coding) are becoming popular in reversible data hiding since they
can increase the capacity for embedding the secret data
DISADVANTAGE
 Huge number of data, huge file size, so someone can suspect about it.
 If this techniques is gone in the wrong hands like hackers, terrorist, criminals then this
can be very much dangerous.
PROPOSED SYSTEM
 Steganography is the art of hiding information and an effort to conceal the existence of the
embedded information.
 It serves as a better way of securing message than cryptography which only conceals the
content of the message not the existence of the message.
 Original message is being hidden within a carrier such that the changes so occurred in the
carrier are not observable. In this paper we will discuss how digital images can be used as a
carrier to hide messages.
 This paper also analyses the performance of some of the steganography tools. Steganography
is a useful tool that allows covert transmission of information over an over the
communications channel. Combining secret image with the carrier image gives the hidden
image. The hidden image is difficult to detect without retrieval
ADVANTAGE
 Alterations not visible to the human eye
 Simple & easiest way of hiding Information
 Hidden data can be distributed more evenly over the whole image in such a
way as to make it more robust
BLOCK DIAGRAM
USE CASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
HARDWARE REQUIREMENTS
 System : i3 core.
 Hard Disk : 500 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 4 gb.
SOFTWARE REQUIREMENTS
 Operating system : Windows 10.
 Coding Language : ASP.net, C#.net
 Tool : Visual Studio 2017
 Database : SQL SERVER 2014
MODULES
 IMPORTANT ASPECTS OF STEGANALYSIS
 DETECTING HIDDEN INFORMATION
 DISABLING STEGANOGRAOPHY
Methods:
 LSB substitution method:
 Deals with substituting LSB bits of corresponding pixels in image to store the text
message or another image as a message.
 Block method:
 blocks of the image are considered and DCT (discrete cosine transform) is done in
order to break them.
 Each block is then subdivided into 64 parts (DCT coefficients).
 These coefficients are modified i.e. the color gets modified a little by storing some
text or another image in it.
 Palette modification:
 Every image uses a set of color values.
 Palette Modification replaces the unused colors within an image’s color palette
with colors that represent the hidden message.
LSB substitution method -Algorithm:
 In the current project, emphasis is given to this
method.
 Simplicity
 Mostly Imperceivable
 One of the channels among RGB can be chosen, and LSB of its pixels altered
or all the channels could be used.
 Example:
(a) binary form of message to be hidden
(b) few pixel values on cover image
(c) LSB altered
Algorithm:
1. Input the message to be hidden. (either image
or text)
2. Check the maximum number of bits that can be
accepted by the cover image
3. Replace the LSB bits of the pixels in cover
image with the binary representation of the
message. => we obtain Stego image
 Either color image (RGB) or grayscale image can
be used as a cover image.
 In case of color image, 24bit image i.e. 8bits are
present for each for RGB so more number
information pixels can be stored.
 Modification can be done to either just the last 1
bit or 2,4 or more bits depending on
requirement.
CONCLUSTION
 It is observed that through LSB Substitution Steganographic method, the
results obtained in data hiding are pretty impressive as it utilizes the simple
fact that any image could be broken up to individual bit-planes each
consisting of different levels of information.
 It is to be noted that as discussed earlier, this method is only effective for
bitmap images as these involve lossless compression techniques. Also, in this
project grey-scale images have been used for demonstration.
 But this process can also be extended to be used for color images where,
bitplane slicing is to be done individually for the top four bit-planes for each
of R, G, B of the message image, which are again to be placed in the R, G, B
planes of the cover image, and extraction is done similarly.
FUTURE ENHANCEMENT
 The future work on this project is to improve the compression ratio of the
image to the text. This project can be extended to a level such that it can be
used for the different types of multimedia files.
References:
1. Johnson, Neil F. "Steganography."
Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web.
2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in
Computer Science and Software Engineering." Http://www.ijarcsse.com/.
N.p., Sept. 2014. Web.
3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to
Steganography.”
4. IEEE Security & Privacy Magazine, May-June 2013. Web.
5. Nick Nabavian. “Image steganography” Nov. 28, 2007.
http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano
graphy.pdf
6. Matlab help.

More Related Content

Similar to review.pptx

IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 
Image steganography in python with an ea
Image steganography in python with an eaImage steganography in python with an ea
Image steganography in python with an eaSandeshGajmal
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 

Similar to review.pptx (20)

IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Report
ReportReport
Report
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
Image steganography in python with an ea
Image steganography in python with an eaImage steganography in python with an ea
Image steganography in python with an ea
 
K0815660
K0815660K0815660
K0815660
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
N043020970100
N043020970100N043020970100
N043020970100
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

review.pptx

  • 1. DIGITAL STEGANOGRAPHY: HIDING DATA WITHIN DATA
  • 2. ABSTRACT  Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver.  Security of secret or important information has always been a major issue from the past times to the current time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver.  Therefore from day to day researchers have developed many techniques to fulfill secure transfer of data and steganography is one of them. In this thesis we have developed a new technique of image steganography inside the embedding the encrypted Data file or message using Hash-LSB with RSA algorithm for providing more security to data as well as our data hiding method.  The developed technique uses a hash function to generate a pattern for hiding data bits into LSB of RGB pixel values of the carry image.
  • 3. AIM  Hiding sensitive information vital for security purposes  Securing private files and documents
  • 4. OBJECTIVE  The main objectives of our project are to product security tool based on steganography techniques to hider message carried by stego-media which should not be sensible to human beings and avoid drawing suspicion to the existence of hidden message.
  • 5. Information Hiding -Introduction  Purpose:  Hiding sensitive information vital for security purposes  Securing private files and documents  Hiding information - 3methods - Cryptography, Steganography, Watermarking.  Cryptography - Data to be hidden is coded  several techniques ; sophisticated  visually obvious to be encrypted; appears non-sensical  Watermarking  Applies a copyright label ; prevents illegal use of content  Improper removal causes degradation of original information  Steganography -hiding information by using another information as a cover.  Elements:  cover component, message component, stego component.
  • 6. Steganography -Introduction  Types:  Text steganography  Image steganography  Video steganography  Audio steganography  Image steganography is widely used.  Images contain redundant information.  Easy to manipulate few pixels without affecting visual data observably  Slight changes in RGB values undetected by human eye (HVS) - Psychovisual redundancy.  Types: Text in image ; image in image
  • 7. PROBLEM STATEMENT  The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try of hide messages physically. One disadvantage of linguistic steganography is that users must equip themselves to have a good knowledge of linguistry.  In recent years, everything is trending toward digitization. And with the development of the internet technology, digital media can be transmitted conveniently over the network. Therefore, messages can be secretly carried by digital media by using the steganography techniques, and then be transmitted through the internet rapidly Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.  Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. So we prepare this application, to make the information hiding more simple and user friendly.
  • 8. PROBLEM ANALYSIS  Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.  Data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular file format such as a JPEG image.  Think of all the bits that represent the same color pixels repeated in a row. By applying the encrypted data to this redundant data in some random or non-conspicuous way, the result will be data that appears to have the "noise" patterns of regular, non- encrypted data. A trademark or other identifying symbol hidden in software code is sometimes known as a watermark.
  • 9. EXISTING SYSTEM  Data hiding for vector quantization (VQ)-based images focuses on the problem of embedding secret data into a cover VQ-based image to achieve secret communication and data protection.  VQ-based data-hiding methods into four no overlapping groups according to their reversibility and output formats, introduce the details of the representative methods, summarize the features of the representative methods, and compare the performance of the representative methods using peak signal-to-noise ratio, capacity of secret data, and bit rate.  An irreversible method is very likely a VQ-based data-hiding method that produces a stego-image as its output, and it can embed more secret data than a reversible method. Nonstandard encoding methods (e.g., joint neighboring coding) are becoming popular in reversible data hiding since they can increase the capacity for embedding the secret data
  • 10. DISADVANTAGE  Huge number of data, huge file size, so someone can suspect about it.  If this techniques is gone in the wrong hands like hackers, terrorist, criminals then this can be very much dangerous.
  • 11. PROPOSED SYSTEM  Steganography is the art of hiding information and an effort to conceal the existence of the embedded information.  It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message.  Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages.  This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval
  • 12. ADVANTAGE  Alterations not visible to the human eye  Simple & easiest way of hiding Information  Hidden data can be distributed more evenly over the whole image in such a way as to make it more robust
  • 18. HARDWARE REQUIREMENTS  System : i3 core.  Hard Disk : 500 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 4 gb.
  • 19. SOFTWARE REQUIREMENTS  Operating system : Windows 10.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2017  Database : SQL SERVER 2014
  • 20. MODULES  IMPORTANT ASPECTS OF STEGANALYSIS  DETECTING HIDDEN INFORMATION  DISABLING STEGANOGRAOPHY
  • 21. Methods:  LSB substitution method:  Deals with substituting LSB bits of corresponding pixels in image to store the text message or another image as a message.  Block method:  blocks of the image are considered and DCT (discrete cosine transform) is done in order to break them.  Each block is then subdivided into 64 parts (DCT coefficients).  These coefficients are modified i.e. the color gets modified a little by storing some text or another image in it.  Palette modification:  Every image uses a set of color values.  Palette Modification replaces the unused colors within an image’s color palette with colors that represent the hidden message.
  • 22. LSB substitution method -Algorithm:  In the current project, emphasis is given to this method.  Simplicity  Mostly Imperceivable  One of the channels among RGB can be chosen, and LSB of its pixels altered or all the channels could be used.  Example: (a) binary form of message to be hidden (b) few pixel values on cover image (c) LSB altered
  • 23. Algorithm: 1. Input the message to be hidden. (either image or text) 2. Check the maximum number of bits that can be accepted by the cover image 3. Replace the LSB bits of the pixels in cover image with the binary representation of the message. => we obtain Stego image  Either color image (RGB) or grayscale image can be used as a cover image.  In case of color image, 24bit image i.e. 8bits are present for each for RGB so more number information pixels can be stored.  Modification can be done to either just the last 1 bit or 2,4 or more bits depending on requirement.
  • 24. CONCLUSTION  It is observed that through LSB Substitution Steganographic method, the results obtained in data hiding are pretty impressive as it utilizes the simple fact that any image could be broken up to individual bit-planes each consisting of different levels of information.  It is to be noted that as discussed earlier, this method is only effective for bitmap images as these involve lossless compression techniques. Also, in this project grey-scale images have been used for demonstration.  But this process can also be extended to be used for color images where, bitplane slicing is to be done individually for the top four bit-planes for each of R, G, B of the message image, which are again to be placed in the R, G, B planes of the cover image, and extraction is done similarly.
  • 25. FUTURE ENHANCEMENT  The future work on this project is to improve the compression ratio of the image to the text. This project can be extended to a level such that it can be used for the different types of multimedia files.
  • 26. References: 1. Johnson, Neil F. "Steganography." Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web. 2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in Computer Science and Software Engineering." Http://www.ijarcsse.com/. N.p., Sept. 2014. Web. 3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to Steganography.” 4. IEEE Security & Privacy Magazine, May-June 2013. Web. 5. Nick Nabavian. “Image steganography” Nov. 28, 2007. http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano graphy.pdf 6. Matlab help.