SlideShare a Scribd company logo
IMAGE
STEGANOGRAPHY
Guided By:
Prof. Nikunj Gamit
Prepared By:
Nidhi Papaiyawala
201203100810041
(6th IT)
Content
 Definition of image steganography
 Advantages
 Limitations
 Application
 Block diagram of steganography
 Different techniques
 Introduction of LSB technique
 Merits and Demerits of LSB
 Introduction of DCT technique
 Application
 Error analysis
1
Image steganography
 Definition:
Steganography is the art of “concealed
writing” and it refers to techniques that hide
information inside objects known as “Cover
Objects”.
2
Advantages of steganography
 The secret message does not attract attention to
itself as an object of scrutiny.
 steganography is concerned with concealing a
secret message is being sent, as well as
concealing the contents of the message.
 Difficult to detect. Only receiver can detect.
 Provides better security for data sharing.
3
Limitations
 The confidentiality of information is maintained
by the algorithms, and if algorithms are known
then this technique is of no use.
 Password leakage may occur and it leads to the
unauthorized access of data.
4
Application
 several information sources like our private
banking information, some military secrets, can
be stored in a cover source.
 Steganography is used by some modern printers
and color laser printers.
 Steganography can be used for digital
watermarking.
5
Basic Block diagram
Embedding information:
6
Embedding
Process
Stego-Key
Embedded
message
Cover
Image
Stego
Image
(cont.)
Extracting information:
7
Extracting
Process
Stego-Key
Cover
Image
Stego
Image
Embedded
message
Different Techniques[1]
There are two categories:
1)Spatial Domain:
which mainly includes LSB(Least
Significant Bit)
2)Frequency Domain:
which includes DCT(Discrete cosine
transform) and Wavelet Transform.
8
Least Significant Bit
 Simple approach to embedding information in
a cover image.
 It operates on principle that the human eye can
not differentiate between two shade separated by
only one bit.
Algorithm to embed the message:[1]
 Read the cover image and text message which is
to be hidden in the cover image.
 Convert the color image into grey image.
9
(cont.)
 Convert text message in binary.
 Calculate the LSB of each pixel of cover image.
 Replace LSB of cover image with each bit of
secret message one by one.
 Write stego image.
10
Algorithm to extracting message
 Read the stego image.
 Calculate the LSB of each pixel of stego image.
 Extract the bits and covert each 8 bit in to
character.
11
Result of LSB
12
Cover image Stego image
 Merits
1) Simple to
implement.
2) High payload
capacity.
3) Low complexity.
 Demerits:
1) Vulnerable
corruption.
2) Vulnerable to
detection.
13
DCT(Discrete cosine transform)
 The DCT transforms a signal or image from the
spatial domain to the frequency domain.
 Grouping the pixels into 8 × 8 pixel blocks and
transforming the pixel blocks into 64 DCT.
 DCT allows an image to be broken up into
different frequency bands namely the high,
middle and low frequency bands
14
Process of DCT based image
Steganography are as follow:[2]
Embedding information:
 Load cover image and secret image.
 Divide the cover image in to 8x8 blocks of
pixels.
 Transform the cover image from spatial domain
to frequency using two dimensional DCT .
 Quantize the DCT coefficients by dividing using
factor in to the rounded value. 15
(cont.)
 Encrypt the secret image using RSA algorithm.
 Divide the encrypted image in to 8x8 blocks.
 Embed this data in the mid DCT coefficients of
cover image.
 Apply two dimensional inverse DCT to view it
in the spatial domain.
16
Block Diagram of DCT[2]
secret
message
17
Encryptio
n
Embeddi
ng
2D DCT
on each
block
8*8 block
preparatio
n
Cover
image
2D IDCT
on each
block
Stego
Embedding information:
Extracting information
 Read the Stego image.
 Divide the stego image in to 8x8 blocks of
pixels.
 Transform the stego image from spatial to
frequency domain by applying two dimensional
DCT on each block
 Quantize the DCT coefficients in to the rounded
value.
18
(cont.)
 Extract the encrypted image values from mid-
frequency coefficients.
 Decrypt the values using RSA algorithm.
 Apply two dimensional inverse DCT to view the
extracted image in the spatial domain.
19
Extracting information[2]
20
Stego
image
8*8 block
preparatio
n
2D DCT
on each
block
Extraction
2D IDCT
on each
block
Decryptio
n
Extracted
image
Result of DCT
21
Cover Image Secrete Image
Output at the receiver side
Cover Image Stego Image
22
Advantages
 Energy compaction.
 High compression ratio,
 Small bit error rate
 Good information integration ability.
23
Application
 It is often used in image processing, especially
for lossy compression, because it has a strong
"energy compaction" property.
24
Error Analysis [2]
(I)Bit Error Rate(BER):
 For the successful recovery of the hidden
information the communication channel must be
ideal.
 for the real communication channel, there will
be error while retrieving hidden information and
this is measured by BER.
all pixel
BER= 1 ∑ |image cov -image steg |
|image cov| i=0
25
(cont.)
(II)Mean Square Error:
 It is defined as the square of error between cover
image and stego image.
 The distortion in the image can be measured
using MSE and is calculated using Equation
n
MSE = 1 ∑ (cov-steg)2
n i=0
26
(cont.)
(III)Peak Signal to Noise Ratio (PSNR)
 It is the measure of quality of the image by
comparing the cover image with the stego
image, i.e. Difference between the cover and
Stego image is calculated using Equation.
PSNR = 10log10 2552/MSE
27
Conclusion.
 Steganography is the art and science of writing
hidden message that no one apart from the
sender and receiver, suspect the existence of the
message.
 DCT-Steganography is based on encryption. To
provide high security Steganography and
cryptography are combined together. This
technique encrypts secret information before
embedding it in the image.
 Larger PSNR indicates the higher the image
quality . a smaller PSNR means there is huge
distortion between the cover-image and the
stego image.
28
References
 Anil k Jain, “Fundamentals of digital image
processing", University of california-
davis,prentice hall.
 Proceeding of the 2006 International conference
on “Intelligent information hiding and
multimedia signal processing 2006 IEEE.
 K.B.Raja', C.R.Chowdary2, Venugopal K R3,
L.M.Patnaik , A Secure Image Steganography
using LSB, DCT and Compression Techniques
on Raw Images,2005 IEEE 29
THANK YOU
30

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
Editor IJCATR
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
James Ridgway
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
Mikel Solabarrieta
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 

What's hot (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography
SteganographySteganography
Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
Ritu Agarwal
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
IOSR Journals
 
Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...
I3E Technologies
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural Network
IJSRD
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
Vema Reddy
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
Editor IJCATR
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
Zubair CH
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
Laili Aidi
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
Girish Ram M
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
CSCJournals
 
Project Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By BhaskarProject Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By Bhaskarbhaskarnarula
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
Alberto Villegas
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
Journal For Research
 
Steganography
SteganographySteganography
Steganography
bhaskarnarula
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
Adaptive block-based pixel value differencing steganography
Adaptive block-based pixel value  differencing steganographyAdaptive block-based pixel value  differencing steganography
Adaptive block-based pixel value differencing steganography
Osama Hosam
 

Viewers also liked (20)

Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure CommunicationA Novel Method of Generating (Stream Cipher) Keys for Secure Communication
A Novel Method of Generating (Stream Cipher) Keys for Secure Communication
 
Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural Network
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Cypher technique
Cypher techniqueCypher technique
Cypher technique
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
Project Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By BhaskarProject Management Activities Of Project Manager By Bhaskar
Project Management Activities Of Project Manager By Bhaskar
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Steganography
SteganographySteganography
Steganography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Adaptive block-based pixel value differencing steganography
Adaptive block-based pixel value  differencing steganographyAdaptive block-based pixel value  differencing steganography
Adaptive block-based pixel value differencing steganography
 

Similar to Image steganography

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
Mohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ijma
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
ssusere02009
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
IRJET Journal
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
ijsrd.com
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
IOSR Journals
 
J017156874
J017156874J017156874
J017156874
IOSR Journals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 

Similar to Image steganography (20)

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
C010511420
C010511420C010511420
C010511420
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 

Recently uploaded

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 

Recently uploaded (20)

Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 

Image steganography

  • 1. IMAGE STEGANOGRAPHY Guided By: Prof. Nikunj Gamit Prepared By: Nidhi Papaiyawala 201203100810041 (6th IT)
  • 2. Content  Definition of image steganography  Advantages  Limitations  Application  Block diagram of steganography  Different techniques  Introduction of LSB technique  Merits and Demerits of LSB  Introduction of DCT technique  Application  Error analysis 1
  • 3. Image steganography  Definition: Steganography is the art of “concealed writing” and it refers to techniques that hide information inside objects known as “Cover Objects”. 2
  • 4. Advantages of steganography  The secret message does not attract attention to itself as an object of scrutiny.  steganography is concerned with concealing a secret message is being sent, as well as concealing the contents of the message.  Difficult to detect. Only receiver can detect.  Provides better security for data sharing. 3
  • 5. Limitations  The confidentiality of information is maintained by the algorithms, and if algorithms are known then this technique is of no use.  Password leakage may occur and it leads to the unauthorized access of data. 4
  • 6. Application  several information sources like our private banking information, some military secrets, can be stored in a cover source.  Steganography is used by some modern printers and color laser printers.  Steganography can be used for digital watermarking. 5
  • 7. Basic Block diagram Embedding information: 6 Embedding Process Stego-Key Embedded message Cover Image Stego Image
  • 9. Different Techniques[1] There are two categories: 1)Spatial Domain: which mainly includes LSB(Least Significant Bit) 2)Frequency Domain: which includes DCT(Discrete cosine transform) and Wavelet Transform. 8
  • 10. Least Significant Bit  Simple approach to embedding information in a cover image.  It operates on principle that the human eye can not differentiate between two shade separated by only one bit. Algorithm to embed the message:[1]  Read the cover image and text message which is to be hidden in the cover image.  Convert the color image into grey image. 9
  • 11. (cont.)  Convert text message in binary.  Calculate the LSB of each pixel of cover image.  Replace LSB of cover image with each bit of secret message one by one.  Write stego image. 10
  • 12. Algorithm to extracting message  Read the stego image.  Calculate the LSB of each pixel of stego image.  Extract the bits and covert each 8 bit in to character. 11
  • 13. Result of LSB 12 Cover image Stego image
  • 14.  Merits 1) Simple to implement. 2) High payload capacity. 3) Low complexity.  Demerits: 1) Vulnerable corruption. 2) Vulnerable to detection. 13
  • 15. DCT(Discrete cosine transform)  The DCT transforms a signal or image from the spatial domain to the frequency domain.  Grouping the pixels into 8 × 8 pixel blocks and transforming the pixel blocks into 64 DCT.  DCT allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands 14
  • 16. Process of DCT based image Steganography are as follow:[2] Embedding information:  Load cover image and secret image.  Divide the cover image in to 8x8 blocks of pixels.  Transform the cover image from spatial domain to frequency using two dimensional DCT .  Quantize the DCT coefficients by dividing using factor in to the rounded value. 15
  • 17. (cont.)  Encrypt the secret image using RSA algorithm.  Divide the encrypted image in to 8x8 blocks.  Embed this data in the mid DCT coefficients of cover image.  Apply two dimensional inverse DCT to view it in the spatial domain. 16
  • 18. Block Diagram of DCT[2] secret message 17 Encryptio n Embeddi ng 2D DCT on each block 8*8 block preparatio n Cover image 2D IDCT on each block Stego Embedding information:
  • 19. Extracting information  Read the Stego image.  Divide the stego image in to 8x8 blocks of pixels.  Transform the stego image from spatial to frequency domain by applying two dimensional DCT on each block  Quantize the DCT coefficients in to the rounded value. 18
  • 20. (cont.)  Extract the encrypted image values from mid- frequency coefficients.  Decrypt the values using RSA algorithm.  Apply two dimensional inverse DCT to view the extracted image in the spatial domain. 19
  • 21. Extracting information[2] 20 Stego image 8*8 block preparatio n 2D DCT on each block Extraction 2D IDCT on each block Decryptio n Extracted image
  • 22. Result of DCT 21 Cover Image Secrete Image
  • 23. Output at the receiver side Cover Image Stego Image 22
  • 24. Advantages  Energy compaction.  High compression ratio,  Small bit error rate  Good information integration ability. 23
  • 25. Application  It is often used in image processing, especially for lossy compression, because it has a strong "energy compaction" property. 24
  • 26. Error Analysis [2] (I)Bit Error Rate(BER):  For the successful recovery of the hidden information the communication channel must be ideal.  for the real communication channel, there will be error while retrieving hidden information and this is measured by BER. all pixel BER= 1 ∑ |image cov -image steg | |image cov| i=0 25
  • 27. (cont.) (II)Mean Square Error:  It is defined as the square of error between cover image and stego image.  The distortion in the image can be measured using MSE and is calculated using Equation n MSE = 1 ∑ (cov-steg)2 n i=0 26
  • 28. (cont.) (III)Peak Signal to Noise Ratio (PSNR)  It is the measure of quality of the image by comparing the cover image with the stego image, i.e. Difference between the cover and Stego image is calculated using Equation. PSNR = 10log10 2552/MSE 27
  • 29. Conclusion.  Steganography is the art and science of writing hidden message that no one apart from the sender and receiver, suspect the existence of the message.  DCT-Steganography is based on encryption. To provide high security Steganography and cryptography are combined together. This technique encrypts secret information before embedding it in the image.  Larger PSNR indicates the higher the image quality . a smaller PSNR means there is huge distortion between the cover-image and the stego image. 28
  • 30. References  Anil k Jain, “Fundamentals of digital image processing", University of california- davis,prentice hall.  Proceeding of the 2006 International conference on “Intelligent information hiding and multimedia signal processing 2006 IEEE.  K.B.Raja', C.R.Chowdary2, Venugopal K R3, L.M.Patnaik , A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images,2005 IEEE 29