SlideShare a Scribd company logo
CONTENTS………
Introduction
Steganography
Types of Steganography
Image Steganography
 LSB Algorithm
 Steganography is an art of hiding information inside
information.
 The main objective of Steganography is mainly
concerned with the protection of contents of the
hidden information.
 Images are ideal for information hiding because of
the large amount of redundant space is created in
the storing of images.
Introduction Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
 Steganography literally means
“covered writing”
Definition:
It is an art and science of hiding information by
embedding it in some other data.
Goals:
To hide a secret message within an object.
Do it such a way that the presence of message is
not visible.
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
Steganography
Introduction
Steganography
Image
Steganography
Dual layer security
•LSB algorithm
Types of
Steganography
An example of a message containing such a null
cipher is German Spy in World War II:
“Apparently neutral's protest is
thoroughly discounted
And ignored. Isman hard hit.
Blockade issue affects
Pretext for embargo on by products,
ejecting suets and Vegetable oils. ”
Taking the second letter in each word the
following message emerges:
Pershing sails from NY June 1.
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
General diagram of steganography
STEGANOGRAPHY Vs CRYPTOGRAPHY
 Cryptography hides the contents of a secret
message from a malicious people, whereas
steganography even conceal the existence of the
message.
 In cryptography, the system is broken when the
attacker can read the secret message.
 Breaking a steganography system need the
attacker to detect that steganography has been
used.
Introduction
Steganography
Image
Steganography
•LSB algorith
Types of
Steganography
 Most attractive multimedia objects are
Text steganography
Image steganography
Audio steganography
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Types of steganography
 Image steganography: Images are used as the message
carriers.Images are the most popular cover objects used for
steganography.
 Textual steganography: Text steganography can be
achieved by altering the text formatting, or by altering
certain characteristics of textual elements (e.g.,
characters).
 Audio steganography: In audio steganography, secret
message is embedded into digitized audio signal which
result slight altering of binary sequence of the
corresponding audio file.
Introduction
Steganography
Image
Steganography
•LSB algorith
Types of
Steganography
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
IMAGE STEGANOGRAPHY
Image Steganography requires following elements
to carry out the work:
 Cover medium: It is an image that holds secret
message.
 The Secret message: it is message to be
transmitted. It can be plain or encrypted text,
images or any other data.
 The Stego-key: it is key used to hide the
message (May or may not be used).
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
IMAGE STEGANOGRAPHY CONTIUED….
The image compression techniques are extensively
used in Steganography.
Two type of compression techniques are
 Lossy compression.
 Lossless compression.
 In Image steganography lossless compression is
generally used.
 The lossy compression may not maintain the
original images integrity. But lossless
compression maintains the data exactly.
 The compression on lossless image has no effect
on original image.
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
IMAGE STEGANOGRAPHY CONTIUED….
TECHNIQUES FOR USING IMAGE
STEGANOGRAPHY
By using LSB(Least Significant Bit algorithm)
Masking and Filtering
Algorithms and Transformation
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
The LSB algorithm
 The most common and popular method of
modern day steganography is to make use of LSB
of picture’s pixel information.
 This technique works best when the file is longer
than the message file and if image is grayscale.
 When applying LSB techniques to each byte of a
24 bit image,three bits can be encoded into each
pixel.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
 If the LSB of the pixel value of cover image C(i,j) is
equal to the message bit SM of secret massage to be
embedded, C(i,j) remain unchanged; if not, set the
LSB of C(i, j) to SM.
message embedding Procedure is given below:
S(i,j) = C(i,j) - 1, if LSB(C(i,j)) = 1 and SM = 0
S(i,j) = C(i,j) + 1, if LSB(C(i,j)) = 0 and SM = 1
S(I,j) = C(i,j), if LSB(C(i,j)) = SM
Where LSB(C(i, j)) stands for the LSB of cover image
C(i,j) and “SM” is the next message bit to be
embedded. S(i,j) is the stego image.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorith
Types of
Steganography
Data Embedding Algorithm
Step 1: Extract the pixels of the cover image.
Step 2: Extract the characters of the text le.
Step 3: Extract the characters from the Stego key.
Step 4: Choose first pixel and pick characters of
the Stego key and place it in first component of
pixel.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Data Embedding Algorithm
Step 5: Place some terminating symbol to indicate
end of the key. 0 has been used as a terminating
symbol in this algorithm.
Step 6: Insert characters of text le in each rst
component of next pixels by replacing it.
Step 7: Repeat step 6 till all the characters has been
embedded.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Data Extraction Algorithm
Step 1: Extract the pixels of the stego image.
Step 2: Now, start from first pixel and extract stego
key characters from first component of the
pixels. Follow Step3 up to terminating symbol,
otherwise follow step 4.
Step 4: If this extracted key matches with the key
entered by the receiver, then follow Step 5,
otherwise terminate the program.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Data Extraction Algorithm
Step 5: If the key is correct, then go to next pixels
and extract secret message characters from first
component of next pixels. Follow Step 5 till up to
terminating symbol, otherwise follow step 6.
Step 6: Extract secret message.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
 Example:
We can use images to hide things if we replace
the last bit of every color’s byte with a bit from
the message.
Message A-01000001
Image with 3 pixels
Pixel 1: 11111000 11001001 00000011
Pixel 2: 11111000 11001001 00000011
Pixel 3: 11111000 11001001 00000011
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Now we hide our message in the image.
Message: 01000001
Pixel 1: 11111000 11001001 00000010
Pixel 2: 11111000 11001000 00000010
Pixel 3: 11111000 11001001 00000011
New image:
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
CONCLUSION
 Hiding a message with steganography methods reduces
the chance of a message being detected.
 In and of itself, steganography is not a good solution to
secrecy, but neither is simple substitution and short block
permutation for encryption. But if these methods are
combined, you have much stronger encryption routines.
 Like any tool, steganography is neither inherently good
nor evil, it is the manner in which it is used which will
determine whether it is a benefit or a detriment to our
society.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
REFERENCES
 Implementation of LSB Steganography and its Evaluation for Various
File Formats. Int. J. Advanced Networking and Applications 868
 Introduction to image Steganography youtube video.
 Cryptography and network security by William Stallings 3rd edition.
Image Steganography using LSB
Image Steganography using LSB

More Related Content

What's hot

Steganography final report
Steganography final reportSteganography final report
Steganography final report
ABHIJEET KHIRE
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
Mikel Solabarrieta
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
Steganography
SteganographySteganography
Steganography
Josh Kumar
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
VijayMaheshwari12
 

What's hot (20)

Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

Steganography
SteganographySteganography
SteganographySonam M
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
Manasitilak
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
kartikeya upadhyay
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
Mahmut Yildiz
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 

Viewers also liked (6)

Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Steganography
SteganographySteganography
Steganography
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 

Similar to Image Steganography using LSB

Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
Sagar Kumar
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
NAIM PARVEZ GALIB
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
9905234521
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
ijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
ijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
IJCSEIT Journal
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
Omkar Rane
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis zaidsalfawzan
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
Ritu Agarwal
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 

Similar to Image Steganography using LSB (20)

Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Report
ReportReport
Report
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
K0815660
K0815660K0815660
K0815660
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 

Image Steganography using LSB

  • 1.
  • 3.  Steganography is an art of hiding information inside information.  The main objective of Steganography is mainly concerned with the protection of contents of the hidden information.  Images are ideal for information hiding because of the large amount of redundant space is created in the storing of images. Introduction Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 4.  Steganography literally means “covered writing” Definition: It is an art and science of hiding information by embedding it in some other data. Goals: To hide a secret message within an object. Do it such a way that the presence of message is not visible. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography Steganography
  • 5. Introduction Steganography Image Steganography Dual layer security •LSB algorithm Types of Steganography An example of a message containing such a null cipher is German Spy in World War II: “Apparently neutral's protest is thoroughly discounted And ignored. Isman hard hit. Blockade issue affects Pretext for embargo on by products, ejecting suets and Vegetable oils. ” Taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 7. STEGANOGRAPHY Vs CRYPTOGRAPHY  Cryptography hides the contents of a secret message from a malicious people, whereas steganography even conceal the existence of the message.  In cryptography, the system is broken when the attacker can read the secret message.  Breaking a steganography system need the attacker to detect that steganography has been used. Introduction Steganography Image Steganography •LSB algorith Types of Steganography
  • 8.  Most attractive multimedia objects are Text steganography Image steganography Audio steganography Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography Types of steganography
  • 9.  Image steganography: Images are used as the message carriers.Images are the most popular cover objects used for steganography.  Textual steganography: Text steganography can be achieved by altering the text formatting, or by altering certain characteristics of textual elements (e.g., characters).  Audio steganography: In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. Introduction Steganography Image Steganography •LSB algorith Types of Steganography
  • 11. Image Steganography requires following elements to carry out the work:  Cover medium: It is an image that holds secret message.  The Secret message: it is message to be transmitted. It can be plain or encrypted text, images or any other data.  The Stego-key: it is key used to hide the message (May or may not be used). Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 12. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography IMAGE STEGANOGRAPHY CONTIUED…. The image compression techniques are extensively used in Steganography. Two type of compression techniques are  Lossy compression.  Lossless compression.
  • 13.  In Image steganography lossless compression is generally used.  The lossy compression may not maintain the original images integrity. But lossless compression maintains the data exactly.  The compression on lossless image has no effect on original image. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography IMAGE STEGANOGRAPHY CONTIUED….
  • 14. TECHNIQUES FOR USING IMAGE STEGANOGRAPHY By using LSB(Least Significant Bit algorithm) Masking and Filtering Algorithms and Transformation Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 15. The LSB algorithm  The most common and popular method of modern day steganography is to make use of LSB of picture’s pixel information.  This technique works best when the file is longer than the message file and if image is grayscale.  When applying LSB techniques to each byte of a 24 bit image,three bits can be encoded into each pixel. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 16.  If the LSB of the pixel value of cover image C(i,j) is equal to the message bit SM of secret massage to be embedded, C(i,j) remain unchanged; if not, set the LSB of C(i, j) to SM. message embedding Procedure is given below: S(i,j) = C(i,j) - 1, if LSB(C(i,j)) = 1 and SM = 0 S(i,j) = C(i,j) + 1, if LSB(C(i,j)) = 0 and SM = 1 S(I,j) = C(i,j), if LSB(C(i,j)) = SM Where LSB(C(i, j)) stands for the LSB of cover image C(i,j) and “SM” is the next message bit to be embedded. S(i,j) is the stego image. Introduction Steganographic layer Image Steganography •LSB algorith Types of Steganography
  • 17. Data Embedding Algorithm Step 1: Extract the pixels of the cover image. Step 2: Extract the characters of the text le. Step 3: Extract the characters from the Stego key. Step 4: Choose first pixel and pick characters of the Stego key and place it in first component of pixel. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 18. Data Embedding Algorithm Step 5: Place some terminating symbol to indicate end of the key. 0 has been used as a terminating symbol in this algorithm. Step 6: Insert characters of text le in each rst component of next pixels by replacing it. Step 7: Repeat step 6 till all the characters has been embedded. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 19. Data Extraction Algorithm Step 1: Extract the pixels of the stego image. Step 2: Now, start from first pixel and extract stego key characters from first component of the pixels. Follow Step3 up to terminating symbol, otherwise follow step 4. Step 4: If this extracted key matches with the key entered by the receiver, then follow Step 5, otherwise terminate the program. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 20. Data Extraction Algorithm Step 5: If the key is correct, then go to next pixels and extract secret message characters from first component of next pixels. Follow Step 5 till up to terminating symbol, otherwise follow step 6. Step 6: Extract secret message. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 21.  Example: We can use images to hide things if we replace the last bit of every color’s byte with a bit from the message. Message A-01000001 Image with 3 pixels Pixel 1: 11111000 11001001 00000011 Pixel 2: 11111000 11001001 00000011 Pixel 3: 11111000 11001001 00000011 Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 22. Now we hide our message in the image. Message: 01000001 Pixel 1: 11111000 11001001 00000010 Pixel 2: 11111000 11001000 00000010 Pixel 3: 11111000 11001001 00000011 New image: Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 23. CONCLUSION  Hiding a message with steganography methods reduces the chance of a message being detected.  In and of itself, steganography is not a good solution to secrecy, but neither is simple substitution and short block permutation for encryption. But if these methods are combined, you have much stronger encryption routines.  Like any tool, steganography is neither inherently good nor evil, it is the manner in which it is used which will determine whether it is a benefit or a detriment to our society. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 24. REFERENCES  Implementation of LSB Steganography and its Evaluation for Various File Formats. Int. J. Advanced Networking and Applications 868  Introduction to image Steganography youtube video.  Cryptography and network security by William Stallings 3rd edition.

Editor's Notes

  1. Types of steganography.