SlideShare a Scribd company logo
1 of 11
Download to read offline
MTE PRESENTATION
Image
Steganography
CC
DELHI TECHNOLOGICAL
UNIVERSITY
YASH GUPTA
2K20/EC/241
NEXT
What is Steganography ?
Steganography is the science of writing hidden messages in such a way that no one apart from sender and intended recipient
even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted
form.This is where steganography can come into play. While cryptography provides privacy, steganography is intended to
provide secrecy.The aim of steganography is to hide the secret messages and also for communication and transferring of data.
So no one apart from the authorized sender and receiver will be aware of the existence of the secret data
In modern approach, depending on the cover medium, steganography can be divided into four types that are Text Steganography
,Image Steganography ,Audio Steganography ,Video Steganography
Figure 1.1 The same image revealed different hidden numbers when viewed through white, blue, green, and red lights.
An image is nothing more than a two dimensional signal. It is defined by the mathematical
function f(x,y) where x and y are the two co-ordinates horizontal and vertical.
The value of f(x,y) at any point is gives the pixel value at that point of an image.
What is an Image ?
Each number represents the value of the function f(x,y) at any point. In this case the
value 128 , 230 ,123 each represents an individual pixel value.
The dimensions of the picture is actually the dimensions of this two dimensional array.
I will be performing Image steganography so lets discuss what an image is
128
232
80 255
123
230 123
321
255
Figure 1.2 Original Image
The Least Significant Bit (LSB) technique modifies and replaces the last bit of each pixel with the secret message's data bit.
Basic Principle
A digital image is made up of a finite number of digital values called pixels. Pixels are the tiniest individual elements in an image,
storing values that represent a given color's brightness at any given time.
As a result, an image can be thought of as a pixel matrix (or two-dimensional array) with a predetermined number of rows and
columns.
As can be seen , changing the MSB has a larger impact on the final value than changing the LSB, so we use least significant bit
steganography.
1
0 1
1
1 1
1
1
MSB LSB
Value - 255
Value - 127
Huge Change in bytes Minimal Change in bytes
Value - 254
1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 0
Figure 1.3 Cover Image
[(225),(155),(99),(15),(155),(63),(1),(99),(219),(69),(18),(25)]
[(224),(154),(99),(14),(154),(63),(1),(99,(219),(69),(18),(25)]
How LSB technique works ?
Each pixel has an associated value that represents grey scale values ranging from 0 to 255, or 8-bit values.
Let's look at an example of how this technique works. Let's say we want to conceal the message "hi" in a 44 image with the
following pixel values:
Using the ASCII Table, we can convert the secret message into decimal
values and then into binary: 01101000110101. Now we convert each pixel
value to binary and replace each least significant bit with the message bits
in order (for example, 225 is 11100001, and we replace the last bit with the
first data bit(0), and so on). The pixel values will only change by +1 or -1,
which will be barely noticeable.
here is the changed pixel values they will have a minimal effect on image
Cover Image
Cover Image
Text
Stego Image
Text
Encryption Algorithm
Encryption Algorithm
Figure 1.4 Working of LSB
The following is the methodology used by the programme:
Algorithm for LSB
Cover Image: The image which is to be used to hide the data.
Stego Image: The image which has been embedded with the hidden data.
Convert the secret message to binary format.
Convert the image on the cover to grayscale. (Using grayscale is more convenient because an 8-bit per pixel grayscale image
has 8 bit sequences versus a 24-bit per pixel colored image with 24-bit sequences.)
Take the intensity value (which ranges from 0 to 255) for each pixel in the image and convert it to binary format.
Replace the right-most bit, also known as the LSB, with a bit from the secret message.
Repeat until all of the secret message's bits have been embedded. After that, the image will be referred to as a stego image.
Implementation
After running the first set of the code the original image would be displayed
After excecuting the second part the user will have to input the message which is to be hidden in the image. Here the message
"Matrix Laboratory" is used as an example for message that needs to be hidden.
Figure 1.7 Original Image
Implementation
After the message input by the used the program will return the grey scaled image that is cover image and stego image which
stores the hidden message at the output
Finally, the decoding programme will be run to uncover the stego image's hidden message using the same technique through
which the image is encoded
Figure 1.8 Cover & Stego Images
This method is very fast and easy to implementin comparison to other methods of steganography
The output image has very slightly difference to the input image
Instead of embedding the message in only the LSB we can embed the message in last two LSBs thus embedding even large
messages
This method forms the basics of many other complex algorithms
Instead of embedding the messages in only the LSB, we can embed the messages in last two LSBs,thus embedding even large
messages
This type of encodin the data is weak since it can be easily decoded by taking the LSB of the image and getting the message
in binary fomat
This method is too old because it was used long ago when other encodin methods were not yet developed.
When embedding the message in more than one LSB, the image quality may reduce depending on how many pixels are
changed.
Advantages
Disadvantages
Advantages & Disadvantags
Image steganography is used in Cyber Forensics
It is also used by Intelligence services
Copyright and to avoid piracy of intellectual rights
Secure Highly confidential files and data
Protect original data from unknown sources.
Applications
Mujtiba, Syed & Yousu, Salihah & Bisma, Syed & Siddiqi, Mehvish & Khaki, Zahidgulzar. (2017). COMPARISION OF LSB AND
DWT STEGANOGRAPHY TECHNIQUES. 10.21090/IJAERD.ETIECE08.
Macit, Hüseyin & Koyun, Arif & Güngör, Orhan. (2018). A REVIEW AND COMPARISON OF STEGANOGRAPHY TECHNIQUES.
Fahim Irfan et. Al. ‘s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB ”, International
Journal of EST,
Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using Last Two Bits of Pixel Values”,
International Journal of Security, Vol.5 Iss. 2 pp. 51-61.
References

More Related Content

What's hot

What's hot (20)

Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Steganography
SteganographySteganography
Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
Steganography Steganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Image Steganography using MATLAB

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATAAjinkya Nikam
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitYogeshIJTSRD
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
Image_steganography.pptx
Image_steganography.pptxImage_steganography.pptx
Image_steganography.pptxRashmiPrakash38
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 

Similar to Image Steganography using MATLAB (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
G0210032039
G0210032039G0210032039
G0210032039
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Image_steganography.pptx
Image_steganography.pptxImage_steganography.pptx
Image_steganography.pptx
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Image Steganography using MATLAB

  • 2. What is Steganography ? Steganography is the science of writing hidden messages in such a way that no one apart from sender and intended recipient even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted form.This is where steganography can come into play. While cryptography provides privacy, steganography is intended to provide secrecy.The aim of steganography is to hide the secret messages and also for communication and transferring of data. So no one apart from the authorized sender and receiver will be aware of the existence of the secret data In modern approach, depending on the cover medium, steganography can be divided into four types that are Text Steganography ,Image Steganography ,Audio Steganography ,Video Steganography Figure 1.1 The same image revealed different hidden numbers when viewed through white, blue, green, and red lights.
  • 3. An image is nothing more than a two dimensional signal. It is defined by the mathematical function f(x,y) where x and y are the two co-ordinates horizontal and vertical. The value of f(x,y) at any point is gives the pixel value at that point of an image. What is an Image ? Each number represents the value of the function f(x,y) at any point. In this case the value 128 , 230 ,123 each represents an individual pixel value. The dimensions of the picture is actually the dimensions of this two dimensional array. I will be performing Image steganography so lets discuss what an image is 128 232 80 255 123 230 123 321 255 Figure 1.2 Original Image
  • 4. The Least Significant Bit (LSB) technique modifies and replaces the last bit of each pixel with the secret message's data bit. Basic Principle A digital image is made up of a finite number of digital values called pixels. Pixels are the tiniest individual elements in an image, storing values that represent a given color's brightness at any given time. As a result, an image can be thought of as a pixel matrix (or two-dimensional array) with a predetermined number of rows and columns. As can be seen , changing the MSB has a larger impact on the final value than changing the LSB, so we use least significant bit steganography. 1 0 1 1 1 1 1 1 MSB LSB Value - 255 Value - 127 Huge Change in bytes Minimal Change in bytes Value - 254 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 Figure 1.3 Cover Image
  • 5. [(225),(155),(99),(15),(155),(63),(1),(99),(219),(69),(18),(25)] [(224),(154),(99),(14),(154),(63),(1),(99,(219),(69),(18),(25)] How LSB technique works ? Each pixel has an associated value that represents grey scale values ranging from 0 to 255, or 8-bit values. Let's look at an example of how this technique works. Let's say we want to conceal the message "hi" in a 44 image with the following pixel values: Using the ASCII Table, we can convert the secret message into decimal values and then into binary: 01101000110101. Now we convert each pixel value to binary and replace each least significant bit with the message bits in order (for example, 225 is 11100001, and we replace the last bit with the first data bit(0), and so on). The pixel values will only change by +1 or -1, which will be barely noticeable. here is the changed pixel values they will have a minimal effect on image Cover Image Cover Image Text Stego Image Text Encryption Algorithm Encryption Algorithm Figure 1.4 Working of LSB
  • 6. The following is the methodology used by the programme: Algorithm for LSB Cover Image: The image which is to be used to hide the data. Stego Image: The image which has been embedded with the hidden data. Convert the secret message to binary format. Convert the image on the cover to grayscale. (Using grayscale is more convenient because an 8-bit per pixel grayscale image has 8 bit sequences versus a 24-bit per pixel colored image with 24-bit sequences.) Take the intensity value (which ranges from 0 to 255) for each pixel in the image and convert it to binary format. Replace the right-most bit, also known as the LSB, with a bit from the secret message. Repeat until all of the secret message's bits have been embedded. After that, the image will be referred to as a stego image.
  • 7. Implementation After running the first set of the code the original image would be displayed After excecuting the second part the user will have to input the message which is to be hidden in the image. Here the message "Matrix Laboratory" is used as an example for message that needs to be hidden. Figure 1.7 Original Image
  • 8. Implementation After the message input by the used the program will return the grey scaled image that is cover image and stego image which stores the hidden message at the output Finally, the decoding programme will be run to uncover the stego image's hidden message using the same technique through which the image is encoded Figure 1.8 Cover & Stego Images
  • 9. This method is very fast and easy to implementin comparison to other methods of steganography The output image has very slightly difference to the input image Instead of embedding the message in only the LSB we can embed the message in last two LSBs thus embedding even large messages This method forms the basics of many other complex algorithms Instead of embedding the messages in only the LSB, we can embed the messages in last two LSBs,thus embedding even large messages This type of encodin the data is weak since it can be easily decoded by taking the LSB of the image and getting the message in binary fomat This method is too old because it was used long ago when other encodin methods were not yet developed. When embedding the message in more than one LSB, the image quality may reduce depending on how many pixels are changed. Advantages Disadvantages Advantages & Disadvantags
  • 10. Image steganography is used in Cyber Forensics It is also used by Intelligence services Copyright and to avoid piracy of intellectual rights Secure Highly confidential files and data Protect original data from unknown sources. Applications
  • 11. Mujtiba, Syed & Yousu, Salihah & Bisma, Syed & Siddiqi, Mehvish & Khaki, Zahidgulzar. (2017). COMPARISION OF LSB AND DWT STEGANOGRAPHY TECHNIQUES. 10.21090/IJAERD.ETIECE08. Macit, Hüseyin & Koyun, Arif & Güngör, Orhan. (2018). A REVIEW AND COMPARISON OF STEGANOGRAPHY TECHNIQUES. Fahim Irfan et. Al. ‘s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB ”, International Journal of EST, Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using Last Two Bits of Pixel Values”, International Journal of Security, Vol.5 Iss. 2 pp. 51-61. References