SlideShare a Scribd company logo
A Project On
“BLIND RECOVERY OF
COVERED DATA FROM DIGITAL
CARRIER ”
Presented By-
NIKAM AJINKYA
HARBA VIJAY
AVHAD SOMINATH
GUIDED BY-
Prof. M.N KALE
 Introduction
 Existing System
 Proposed System
 Encryption Techniques
 Decryption Technique
 Results
 Advantages
 Conclusion
 Reference
Classification
 Digital Data embedding.
 Applications may vary.
 Improved Embedding performance.
 Improved recovery performance.
 Extension to limited attacking.
 After extracting the data hidden original image is retrieved.
Classification
What Is Data Hiding ?
 Reversible Data Hiding technique image is compressed
and encrypted
 Secret encryption key used can access the image and
decrypt
 After extracting the data hidden original image is
retrieved.
Classification
Classification
Compressed and Encrypted use in Existing
System
 Reduce the risk of using Cryptography algorithm alone.
 Cryptography algorithm + Information hiding technique.
 Symmetric key Encryption.
 Attention on the blind recovery of secret data hidden.
 Encryption algorithm remain hidden from host.
Classification
 Vessel data.
 Steganography is that embedding capacity is very large.
 For a 'normal' image, roughly 50% of the data might be
replaceable with secret data.
 Password use as a symmetric key.
Classification
 Image Encryption.
 Size of image The host image is an 8-bit or higher
grey level image
 For color host images, the binary cipher text can be
inserted into one or all of the RGB components.
 Image Decryption.
 For color images, the data is decomposed into each RGB
component
 Each 1-bit layer is extracted and correlated with the
appropriate cipher.
 into an 8-bit image based on floating point numbers.
SYSTEM ARCHITECTURE
 Random Distribution of Message
 Generation of Seed
 Random position Selection
 Bit Smarter
Input : Message,shared secret,cover image,seed.
Output : Stego image.
initialize with shared seed
while data left to embed do
get pixel from cover image
if pixel !=0 and pixel !=1 then
get next LSB from message
replace LSB with Message LSB
end if
insert pixel into stego image
end while
Color Base
• There is a large amount of redundant bits in
an image. The redundant bits of an object are
those bits that can be altered.
• The alteration cannot be visibly detected by
human eyes, due to use of blue color.
• Every pixel in a color image composed of
three colors Red, Green and Blue so every
pixel contains 24 bits
Classification
LSB
• Replaces the least significant bit of cover image
with the message bits..
• Image alteration is not perceptible for any human
eyes
as its value will affect the pixel value only by “1”.
• So, this property is used to hide the data in the
image. Here we have considered last two bits as LSB
bits as they will affect the pixel value only by “3”.
 Divide the cover image into set of groups (2x
8)pixel.
 Separate the R, G and B band of each pixel.
 Extract hash value.
 Random number generation
 Use hash values to determine the selected
pixel for each block.
 Data bits are replaced on selected pixels
Classification
M-IGLS
1. First Convert Host Image To Observation Vector Form
y(m), m=1,2…...m
2. Create Partition
N1.N2/M
3. Number Of Carrier Used By Embedder.
4. Finding Noisy region.
5. Create M-IGLS Header
6. Stego Analysis.
•H - Host image
•M - finite image alphabet.
•N1,N2 – image size in pixel.
Image
Algorithm
Results
Encoding Process
Classification
Images
Classification
Decoding Process
Classification
Decoded Message
Classification
Advantages
1) Confidential communication and secret data
storing
2) Protection of data alteration
3)Access control system for digital content
distribution
4) Media Database systems
Classification
Applications
1)Confidential communication and secret data
storing
2)Protection of data alteration
3)Access control system for digital content
distribution
4)Use in Military application to Protect data.
5)Use To Protect data In School , Colleges ,
Office
Classification
Conclusion
For Experimental studies we have taken four different
algorithms for encryption Hide And Seek, LFSR, Single Bit
LSB, Color Based. and we decrypted the Message from our
Single Static Algorithm MIGLS. with Attention on the blind
recovery of secret data hidden in medium.
Hence in this project in decryption phase algo decrypt
the Message from stego image by using Single Static
Algorithm MIGLS successfully.
Classification
Reference
1] Extracting Spread-Spectrum Hidden Data from Digital Media Ming Li, Member,
IEEE, Michel Kulhandjian, Dimitris A. Pados, Member, IEEE, Stella N. Batalama,
Senior Member, IEEE, and Michael J. Medley, Senior Member IEEE,IEEE
Transactions on Secure Computing vol:8 NO:7 2013.
2] Literature Survey On Modern Image Steganographic Techniques Priya Thomas
Department of Computer Science and Engineering Nehru College of Engineering
and Research Center, Kerala, India.International Journal of Engineering Research
Technol-ogy Issue 5, May - 2013 ISSN: 2278-0181.
3] M. Li, D. A. Pados, S. N. Batalama, and M. J. Medley, ”Passive spreadspectrum
steganalysis,” in Proc. IEEE Intern. Conf. Image Proc. (ICIP), Brussels,
Belgium,Sept. 2011, pp. 1997-2000.
4] A. Valizadeh and Z. J. Wang, ”Correlation-and-bit-aware spread spectrum
embedding for data hiding,” IEEE Trans. Inform. Forensics and Security, vol. 6 , pp.
267-282,June 2011.

More Related Content

What's hot

Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
Indhi G. Powlette
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
Steganography
SteganographySteganography
Steganography
Jitendra Singh Deshwal
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
iosrjce
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
J017426467
J017426467J017426467
J017426467
IOSR Journals
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
AnsabArshad
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
Aly Arman
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 
G017444651
G017444651G017444651
G017444651
IOSR Journals
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
O017429398
O017429398O017429398
O017429398
IOSR Journals
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
2510stk
 
Secure Data Transfer Over Internet Using Image Crypto-Steganography
Secure Data Transfer Over Internet Using Image Crypto-SteganographySecure Data Transfer Over Internet Using Image Crypto-Steganography
Secure Data Transfer Over Internet Using Image Crypto-Steganography
Oluwatobiloba Oluwole
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ijcsit
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Praneeta Dehare
 

What's hot (20)

Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Steganography
SteganographySteganography
Steganography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
C010511420
C010511420C010511420
C010511420
 
J017426467
J017426467J017426467
J017426467
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
G017444651
G017444651G017444651
G017444651
 
E017443136
E017443136E017443136
E017443136
 
O017429398
O017429398O017429398
O017429398
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Secure Data Transfer Over Internet Using Image Crypto-Steganography
Secure Data Transfer Over Internet Using Image Crypto-SteganographySecure Data Transfer Over Internet Using Image Crypto-Steganography
Secure Data Transfer Over Internet Using Image Crypto-Steganography
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 

Similar to BLIND RECOVERY OF DATA

Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
ijtsrd
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
VijayMaheshwari12
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
YogeshIJTSRD
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
ijsrd.com
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
IRJET Journal
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
CSCJournals
 
F1803063236
F1803063236F1803063236
F1803063236
IOSR Journals
 
Ijetr042105
Ijetr042105Ijetr042105
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
Dr. Amarjeet Singh
 
review.pptx
review.pptxreview.pptx
review.pptx
TechNest1
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
 

Similar to BLIND RECOVERY OF DATA (20)

Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
Image to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant BitImage to Image Encoder using Least Significant Bit
Image to Image Encoder using Least Significant Bit
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
F1803063236
F1803063236F1803063236
F1803063236
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
review.pptx
review.pptxreview.pptx
review.pptx
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 

Recently uploaded

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 

Recently uploaded (20)

Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 

BLIND RECOVERY OF DATA

  • 1. A Project On “BLIND RECOVERY OF COVERED DATA FROM DIGITAL CARRIER ” Presented By- NIKAM AJINKYA HARBA VIJAY AVHAD SOMINATH GUIDED BY- Prof. M.N KALE
  • 2.  Introduction  Existing System  Proposed System  Encryption Techniques  Decryption Technique  Results  Advantages  Conclusion  Reference Classification
  • 3.  Digital Data embedding.  Applications may vary.  Improved Embedding performance.  Improved recovery performance.  Extension to limited attacking.  After extracting the data hidden original image is retrieved. Classification What Is Data Hiding ?
  • 4.  Reversible Data Hiding technique image is compressed and encrypted  Secret encryption key used can access the image and decrypt  After extracting the data hidden original image is retrieved. Classification
  • 6.  Reduce the risk of using Cryptography algorithm alone.  Cryptography algorithm + Information hiding technique.  Symmetric key Encryption.  Attention on the blind recovery of secret data hidden.  Encryption algorithm remain hidden from host. Classification
  • 7.  Vessel data.  Steganography is that embedding capacity is very large.  For a 'normal' image, roughly 50% of the data might be replaceable with secret data.  Password use as a symmetric key. Classification
  • 8.  Image Encryption.  Size of image The host image is an 8-bit or higher grey level image  For color host images, the binary cipher text can be inserted into one or all of the RGB components.
  • 9.  Image Decryption.  For color images, the data is decomposed into each RGB component  Each 1-bit layer is extracted and correlated with the appropriate cipher.  into an 8-bit image based on floating point numbers.
  • 11.  Random Distribution of Message  Generation of Seed  Random position Selection  Bit Smarter
  • 12. Input : Message,shared secret,cover image,seed. Output : Stego image. initialize with shared seed while data left to embed do get pixel from cover image if pixel !=0 and pixel !=1 then get next LSB from message replace LSB with Message LSB end if insert pixel into stego image end while
  • 13. Color Base • There is a large amount of redundant bits in an image. The redundant bits of an object are those bits that can be altered. • The alteration cannot be visibly detected by human eyes, due to use of blue color. • Every pixel in a color image composed of three colors Red, Green and Blue so every pixel contains 24 bits
  • 14. Classification LSB • Replaces the least significant bit of cover image with the message bits.. • Image alteration is not perceptible for any human eyes as its value will affect the pixel value only by “1”. • So, this property is used to hide the data in the image. Here we have considered last two bits as LSB bits as they will affect the pixel value only by “3”.
  • 15.  Divide the cover image into set of groups (2x 8)pixel.  Separate the R, G and B band of each pixel.  Extract hash value.  Random number generation  Use hash values to determine the selected pixel for each block.  Data bits are replaced on selected pixels Classification
  • 16. M-IGLS 1. First Convert Host Image To Observation Vector Form y(m), m=1,2…...m 2. Create Partition N1.N2/M 3. Number Of Carrier Used By Embedder. 4. Finding Noisy region. 5. Create M-IGLS Header 6. Stego Analysis.
  • 17. •H - Host image •M - finite image alphabet. •N1,N2 – image size in pixel. Image
  • 23. Classification Advantages 1) Confidential communication and secret data storing 2) Protection of data alteration 3)Access control system for digital content distribution 4) Media Database systems
  • 24. Classification Applications 1)Confidential communication and secret data storing 2)Protection of data alteration 3)Access control system for digital content distribution 4)Use in Military application to Protect data. 5)Use To Protect data In School , Colleges , Office
  • 25. Classification Conclusion For Experimental studies we have taken four different algorithms for encryption Hide And Seek, LFSR, Single Bit LSB, Color Based. and we decrypted the Message from our Single Static Algorithm MIGLS. with Attention on the blind recovery of secret data hidden in medium. Hence in this project in decryption phase algo decrypt the Message from stego image by using Single Static Algorithm MIGLS successfully.
  • 26. Classification Reference 1] Extracting Spread-Spectrum Hidden Data from Digital Media Ming Li, Member, IEEE, Michel Kulhandjian, Dimitris A. Pados, Member, IEEE, Stella N. Batalama, Senior Member, IEEE, and Michael J. Medley, Senior Member IEEE,IEEE Transactions on Secure Computing vol:8 NO:7 2013. 2] Literature Survey On Modern Image Steganographic Techniques Priya Thomas Department of Computer Science and Engineering Nehru College of Engineering and Research Center, Kerala, India.International Journal of Engineering Research Technol-ogy Issue 5, May - 2013 ISSN: 2278-0181. 3] M. Li, D. A. Pados, S. N. Batalama, and M. J. Medley, ”Passive spreadspectrum steganalysis,” in Proc. IEEE Intern. Conf. Image Proc. (ICIP), Brussels, Belgium,Sept. 2011, pp. 1997-2000. 4] A. Valizadeh and Z. J. Wang, ”Correlation-and-bit-aware spread spectrum embedding for data hiding,” IEEE Trans. Inform. Forensics and Security, vol. 6 , pp. 267-282,June 2011.

Editor's Notes

  1. ok