SlideShare a Scribd company logo
1 of 31
IMAGE
STEGANOGRAPHY
Guided By:
Prof. Nikunj Gamit
Prepared By:
Nidhi Papaiyawala
201203100810041
(6th IT)
Content
 Definition of image steganography
 Advantages
 Limitations
 Application
 Block diagram of steganography
 Different techniques
 Introduction of LSB technique
 Merits and Demerits of LSB
 Introduction of DCT technique
 Application
 Error analysis
1
Image steganography
 Definition:
Steganography is the art of “concealed writing”
and it refers to techniques that hide information
inside objects known as “Cover Objects”.
2
Advantages of steganography
 The secret message does not attract attention to
itself as an object of scrutiny.
 steganography is concerned with concealing a
secret message is being sent, as well as concealing
the contents of the message.
 Difficult to detect. Only receiver can detect.
 Provides better security for data sharing.
3
Limitations
 The confidentiality of information is maintained by
the algorithms, and if algorithms are known then
this technique is of no use.
 Password leakage may occur and it leads to the
unauthorized access of data.
4
Application
 Several information sources like our private banking
information, some military secrets, can be stored in
a cover source.
 Steganography is used by some modern printers and
color laser printers.
 Steganography can be used for digital
watermarking.
5
Basic Block diagram
Embedding information:
6
Embedding
Process
Stego-Key
Embedded
message
Cover
Image
Stego
Image
(cont.)
Extracting information:
7
Extracting
Process
Stego-Key
Cover
Image
Stego
Image
Embedded
message
Different Techniques[1]
There are two categories:
1)Spatial Domain:
which mainly includes LSB(Least Significant
Bit)
2)Frequency Domain:
which includes DCT(Discrete cosine transform)
and Wavelet Transform.
8
Least Significant Bit
 Simple approach to embedding information in a
cover image.
 It operates on principle that the human eye can not
differentiate between two shade separated by only
one bit.
Algorithm to embed the message:[1]
 Read the cover image and text message which is to
be hidden in the cover image.
 Convert the color image into grey image.
9
(cont.)
 Convert text message in binary.
 Calculate the LSB of each pixel of cover image.
 Replace LSB of cover image with each bit of secret
message one by one.
 Write stego image.
10
Algorithm to extracting message
 Read the stego image.
 Calculate the LSB of each pixel of stego image.
 Extract the bits and covert each 8 bit in to character.
11
Result of LSB
12
Cover image Stego image
 Merits
1) Simple to
implement.
2) High payload
capacity.
3) Low complexity.
 Demerits:
1) Vulnerable
corruption.
2) Vulnerable to
detection.
13
DCT(Discrete cosine transform)
 The DCT transforms a signal or image from the
spatial domain to the frequency domain.
 Grouping the pixels into 8 × 8 pixel blocks and
transforming the pixel blocks into 64 DCT.
 DCT allows an image to be broken up into different
frequency bands namely the high, middle and low
frequency bands
14
Process of DCT based image
Steganography are as follow:[2]
Embedding information:
 Load cover image and secret image.
 Divide the cover image in to 8x8 blocks of pixels.
 Transform the cover image from spatial domain to
frequency using two dimensional DCT .
 Quantize the DCT coefficients by dividing using
factor in to the rounded value.
15
(cont.)
 Encrypt the secret image using RSA algorithm.
 Divide the encrypted image in to 8x8 blocks.
 Embed this data in the mid DCT coefficients of
cover image.
 Apply two dimensional inverse DCT to view it in
the spatial domain.
16
Block Diagram of DCT[2]
secret
message
17
Encryptio
n
Embeddi
ng
2D DCT
on each
block
8*8 block
preparatio
n
Cover
image
2D IDCT
on each
block
Stego
Embedding information:
Extracting information
 Read the Stego image.
 Divide the stego image in to 8x8 blocks of pixels.
 Transform the stego image from spatial to frequency
domain by applying two dimensional DCT on each
block
 Quantize the DCT coefficients in to the rounded
value.
18
(cont.)
 Extract the encrypted image values from mid-
frequency coefficients.
 Decrypt the values using RSA algorithm.
 Apply two dimensional inverse DCT to view the
extracted image in the spatial domain.
19
Extracting information[2]
20
Stego
image
8*8 block
preparatio
n
2D DCT
on each
block
Extraction
2D IDCT
on each
block
Decryptio
n
Extracted
image
Result of DCT
21
Cover Image Secrete Image
Output at the receiver side
Cover Image Stego Image
22
Advantages
 Energy compaction.
 High compression ratio,
 Small bit error rate
 Good information integration ability.
23
Application
 It is often used in image processing, especially for
lossy compression, because it has a strong "energy
compaction" property.
24
Error Analysis [2]
(I)Bit Error Rate(BER):
 For the successful recovery of the hidden
information the communication channel must be
ideal.
 for the real communication channel, there will be
error while retrieving hidden information and this is
measured by BER.
all pixel
BER= 1 ∑ |image cov -image steg |
|image cov| i=0
25
(cont.)
(II)Mean Square Error:
 It is defined as the square of error between cover
image and stego image.
 The distortion in the image can be measured using
MSE and is calculated using Equation
n
MSE = 1 ∑ (cov-steg)2
n i=0
26
(cont.)
(III)Peak Signal to Noise Ratio (PSNR)
 It is the measure of quality of the image by
comparing the cover image with the stego image, i.e.
Difference between the cover and Stego image is
calculated using Equation.
PSNR = 10log10 2552/MSE
27
Conclusion.
 Steganography is the art and science of writing
hidden message that no one apart from the sender
and receiver, suspect the existence of the message.
 DCT-Steganography is based on encryption. To
provide high security Steganography and
cryptography are combined together. This technique
encrypts secret information before embedding it in
the image.
 Larger PSNR indicates the higher the image quality.
A smaller PSNR means there is huge distortion
between the cover-image and the stego image.
28
References
 Anil k Jain, “Fundamentals of digital image processing",
University of california-davis,prentice hall.
 Proceeding of the 2006 International conference on
“Intelligent information hiding and multimedia signal
processing 2006 IEEE.
 K.B.Raja', C.R.Chowdary2, Venugopal K R3,
L.M.Patnaik , A Secure Image Steganography using
LSB, DCT and Compression Techniques on Raw
Images,2005 IEEE
29
THANK YOU
30

More Related Content

What's hot

Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applicationsManasitilak
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 

Viewers also liked

GDS GALILEO
GDS GALILEO GDS GALILEO
GDS GALILEO Luh Gomez
 
Brick Analysis
Brick Analysis Brick Analysis
Brick Analysis downerj
 
VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016Muammer Cakir
 
Regard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en AfriqueRegard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en AfriqueLINK 2 BUSINESS WORLD
 
The Essence of DevOps
The Essence of DevOpsThe Essence of DevOps
The Essence of DevOpsJeff Sussna
 
Objective structuredclinicalexam
Objective structuredclinicalexamObjective structuredclinicalexam
Objective structuredclinicalexamHellen Kyakuwaire
 
Applying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing CodeApplying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing CodeC4Media
 

Viewers also liked (14)

GDS GALILEO
GDS GALILEO GDS GALILEO
GDS GALILEO
 
Coverletter
CoverletterCoverletter
Coverletter
 
Brick Analysis
Brick Analysis Brick Analysis
Brick Analysis
 
56264
5626456264
56264
 
Normas apa
Normas apaNormas apa
Normas apa
 
VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016
 
Monica corazon
Monica corazonMonica corazon
Monica corazon
 
Regard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en AfriqueRegard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en Afrique
 
Pbsmr dasar pbs
Pbsmr dasar pbsPbsmr dasar pbs
Pbsmr dasar pbs
 
The Essence of DevOps
The Essence of DevOpsThe Essence of DevOps
The Essence of DevOps
 
Objective structuredclinicalexam
Objective structuredclinicalexamObjective structuredclinicalexam
Objective structuredclinicalexam
 
Amadeus
AmadeusAmadeus
Amadeus
 
Core java
Core javaCore java
Core java
 
Applying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing CodeApplying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing Code
 

Similar to Image Steganography Techniques Guide

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyIRJET Journal
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
B03208016
B03208016B03208016
B03208016inventy
 

Similar to Image Steganography Techniques Guide (20)

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
C010511420
C010511420C010511420
C010511420
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
B03208016
B03208016B03208016
B03208016
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Image Steganography Techniques Guide

  • 1. IMAGE STEGANOGRAPHY Guided By: Prof. Nikunj Gamit Prepared By: Nidhi Papaiyawala 201203100810041 (6th IT)
  • 2. Content  Definition of image steganography  Advantages  Limitations  Application  Block diagram of steganography  Different techniques  Introduction of LSB technique  Merits and Demerits of LSB  Introduction of DCT technique  Application  Error analysis 1
  • 3. Image steganography  Definition: Steganography is the art of “concealed writing” and it refers to techniques that hide information inside objects known as “Cover Objects”. 2
  • 4. Advantages of steganography  The secret message does not attract attention to itself as an object of scrutiny.  steganography is concerned with concealing a secret message is being sent, as well as concealing the contents of the message.  Difficult to detect. Only receiver can detect.  Provides better security for data sharing. 3
  • 5. Limitations  The confidentiality of information is maintained by the algorithms, and if algorithms are known then this technique is of no use.  Password leakage may occur and it leads to the unauthorized access of data. 4
  • 6. Application  Several information sources like our private banking information, some military secrets, can be stored in a cover source.  Steganography is used by some modern printers and color laser printers.  Steganography can be used for digital watermarking. 5
  • 7. Basic Block diagram Embedding information: 6 Embedding Process Stego-Key Embedded message Cover Image Stego Image
  • 9. Different Techniques[1] There are two categories: 1)Spatial Domain: which mainly includes LSB(Least Significant Bit) 2)Frequency Domain: which includes DCT(Discrete cosine transform) and Wavelet Transform. 8
  • 10. Least Significant Bit  Simple approach to embedding information in a cover image.  It operates on principle that the human eye can not differentiate between two shade separated by only one bit. Algorithm to embed the message:[1]  Read the cover image and text message which is to be hidden in the cover image.  Convert the color image into grey image. 9
  • 11. (cont.)  Convert text message in binary.  Calculate the LSB of each pixel of cover image.  Replace LSB of cover image with each bit of secret message one by one.  Write stego image. 10
  • 12. Algorithm to extracting message  Read the stego image.  Calculate the LSB of each pixel of stego image.  Extract the bits and covert each 8 bit in to character. 11
  • 13. Result of LSB 12 Cover image Stego image
  • 14.  Merits 1) Simple to implement. 2) High payload capacity. 3) Low complexity.  Demerits: 1) Vulnerable corruption. 2) Vulnerable to detection. 13
  • 15. DCT(Discrete cosine transform)  The DCT transforms a signal or image from the spatial domain to the frequency domain.  Grouping the pixels into 8 × 8 pixel blocks and transforming the pixel blocks into 64 DCT.  DCT allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands 14
  • 16. Process of DCT based image Steganography are as follow:[2] Embedding information:  Load cover image and secret image.  Divide the cover image in to 8x8 blocks of pixels.  Transform the cover image from spatial domain to frequency using two dimensional DCT .  Quantize the DCT coefficients by dividing using factor in to the rounded value. 15
  • 17. (cont.)  Encrypt the secret image using RSA algorithm.  Divide the encrypted image in to 8x8 blocks.  Embed this data in the mid DCT coefficients of cover image.  Apply two dimensional inverse DCT to view it in the spatial domain. 16
  • 18. Block Diagram of DCT[2] secret message 17 Encryptio n Embeddi ng 2D DCT on each block 8*8 block preparatio n Cover image 2D IDCT on each block Stego Embedding information:
  • 19. Extracting information  Read the Stego image.  Divide the stego image in to 8x8 blocks of pixels.  Transform the stego image from spatial to frequency domain by applying two dimensional DCT on each block  Quantize the DCT coefficients in to the rounded value. 18
  • 20. (cont.)  Extract the encrypted image values from mid- frequency coefficients.  Decrypt the values using RSA algorithm.  Apply two dimensional inverse DCT to view the extracted image in the spatial domain. 19
  • 21. Extracting information[2] 20 Stego image 8*8 block preparatio n 2D DCT on each block Extraction 2D IDCT on each block Decryptio n Extracted image
  • 22. Result of DCT 21 Cover Image Secrete Image
  • 23. Output at the receiver side Cover Image Stego Image 22
  • 24. Advantages  Energy compaction.  High compression ratio,  Small bit error rate  Good information integration ability. 23
  • 25. Application  It is often used in image processing, especially for lossy compression, because it has a strong "energy compaction" property. 24
  • 26. Error Analysis [2] (I)Bit Error Rate(BER):  For the successful recovery of the hidden information the communication channel must be ideal.  for the real communication channel, there will be error while retrieving hidden information and this is measured by BER. all pixel BER= 1 ∑ |image cov -image steg | |image cov| i=0 25
  • 27. (cont.) (II)Mean Square Error:  It is defined as the square of error between cover image and stego image.  The distortion in the image can be measured using MSE and is calculated using Equation n MSE = 1 ∑ (cov-steg)2 n i=0 26
  • 28. (cont.) (III)Peak Signal to Noise Ratio (PSNR)  It is the measure of quality of the image by comparing the cover image with the stego image, i.e. Difference between the cover and Stego image is calculated using Equation. PSNR = 10log10 2552/MSE 27
  • 29. Conclusion.  Steganography is the art and science of writing hidden message that no one apart from the sender and receiver, suspect the existence of the message.  DCT-Steganography is based on encryption. To provide high security Steganography and cryptography are combined together. This technique encrypts secret information before embedding it in the image.  Larger PSNR indicates the higher the image quality. A smaller PSNR means there is huge distortion between the cover-image and the stego image. 28
  • 30. References  Anil k Jain, “Fundamentals of digital image processing", University of california-davis,prentice hall.  Proceeding of the 2006 International conference on “Intelligent information hiding and multimedia signal processing 2006 IEEE.  K.B.Raja', C.R.Chowdary2, Venugopal K R3, L.M.Patnaik , A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images,2005 IEEE 29