Project presentation on Image Steganography using MATLAB. Project under Digital Design, Signals and Systems and Communication System.
Tool Used - MATLAB
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
Image and text Encryption using RSA algorithm in java PiyushPatil73
About RSA
RSA is an encryption algorithm.
Developed in: 1977.
Developed by: Ron Rivest, Adi Shamir, and Leonard Adleman.
The RSA algorithm is the most commonly used public key encryption algorithm.
Two keys are used: Public Key and Private Key.
Public Key: For encryption.
Private Key: For decryption, also known as a secret key.
Public Key: Shared with the public that wants to send us data.
Private Key: Kept secret so that when someone sends us data encrypted by our
Public Key, we can decrypt the data using the Private Key.
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
This presentation provides an introduction to the Data hiding or Steganography topic, it also shows the types of Steganography, advantages and the related applications.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
This presentation provides an introduction to the Data hiding or Steganography topic, it also shows the types of Steganography, advantages and the related applications.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
ABSTRACT. This research discussed about the data hiding information using steganography and cryptography. New method are discussed to secure data without change the quality of image as cover medium. Steganographic method is used by find the similarity bit of the message with bit of the MSB (Most Significant Bit) image cover. Finding of similarity process is done by divide and conquer method.The results are bit indexposition, thenthenencrypted using cryptographic. In this paper we using DES (Data Encryption Standard) algorithm. We use data information as message, images, and key as an input. Then, we use our method to secure message. The output is encrypted bit index which containt data hiding information and can be used to secure the messages. To reconstruct the contents, we require the same image and same key. Outcomes of our method can be used to secure the data. The advantages of this method are the capacity of stored data hiding of messages can be larger than the image. The image quality will not change and the capacity of stored messages can be larger than the image. Acoording to the research, both gray scale and colorful images can be used as image cover, except the image contains 100% black and 100% white. Bit matching process on image which have much variety of color takes less time. The damage of messages due to the addition of “salt and pepper” noise starts from 0.00049 of MSE.
Steganography is the technique of hiding the fact that communication is taking place,by hiding data in other data. Many different carrier file formats such as image, audio, video, DNA etc can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques. In this paper different steganographic techniques are described.
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
Image to Image Encoder using Least Significant BitYogeshIJTSRD
The purpose of “Image to Image Encoder†is to hide an image inside another image. Using the LSB method, which facilitates data hiding in an image. It works with JPEG and PNG formats for the cover image and always creates tiff encoded image due to its compression. Least Significant Bit Embeddings LSB are the general steganographic procedure that might be utilized to install information into a variety of digital media, the most studied applications are utilizing LSB embedding to hide one picture inside another. The security to keep up secrecy of message is accomplished by making it infeasible for a third individual to distinguish and recover the secret message. This method can be used in various fields for data security like for secret communication and data transfer via networks, for storing and transferring sensitive data and information in the defense sector. As the normal viewers can not identify the slight difference in the encoded image without the reference of the original cover image, this method ensures more security than cryptographic methods. Samthomas Raphael | Dr. Ganesh D "Image to Image Encoder using Least Significant Bit" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41253.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41253/image-to-image-encoder-using-least-significant-bit/samthomas-raphael
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
Increased use of electronic communication has given birth to new ways of transmitting information securely. Steganography is a science of hiding information by embedding it in some other data called host message. Images are most known objects for steganography. The host message before steganography and stego message after steganography have the same characteristics. The given work is to be done by evaluating it on MATALAB. While evaluation one can calculate SNR, PSNR and BER for individual information Bit for conceal bit and analysis effect on results.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
2. What is Steganography ?
Steganography is the science of writing hidden messages in such a way that no one apart from sender and intended recipient
even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted
form.This is where steganography can come into play. While cryptography provides privacy, steganography is intended to
provide secrecy.The aim of steganography is to hide the secret messages and also for communication and transferring of data.
So no one apart from the authorized sender and receiver will be aware of the existence of the secret data
In modern approach, depending on the cover medium, steganography can be divided into four types that are Text Steganography
,Image Steganography ,Audio Steganography ,Video Steganography
Figure 1.1 The same image revealed different hidden numbers when viewed through white, blue, green, and red lights.
3. An image is nothing more than a two dimensional signal. It is defined by the mathematical
function f(x,y) where x and y are the two co-ordinates horizontal and vertical.
The value of f(x,y) at any point is gives the pixel value at that point of an image.
What is an Image ?
Each number represents the value of the function f(x,y) at any point. In this case the
value 128 , 230 ,123 each represents an individual pixel value.
The dimensions of the picture is actually the dimensions of this two dimensional array.
I will be performing Image steganography so lets discuss what an image is
128
232
80 255
123
230 123
321
255
Figure 1.2 Original Image
4. The Least Significant Bit (LSB) technique modifies and replaces the last bit of each pixel with the secret message's data bit.
Basic Principle
A digital image is made up of a finite number of digital values called pixels. Pixels are the tiniest individual elements in an image,
storing values that represent a given color's brightness at any given time.
As a result, an image can be thought of as a pixel matrix (or two-dimensional array) with a predetermined number of rows and
columns.
As can be seen , changing the MSB has a larger impact on the final value than changing the LSB, so we use least significant bit
steganography.
1
0 1
1
1 1
1
1
MSB LSB
Value - 255
Value - 127
Huge Change in bytes Minimal Change in bytes
Value - 254
1
1
1 1
1
1 1
1
1 1
1
1 1
1
1 0
Figure 1.3 Cover Image
5. [(225),(155),(99),(15),(155),(63),(1),(99),(219),(69),(18),(25)]
[(224),(154),(99),(14),(154),(63),(1),(99,(219),(69),(18),(25)]
How LSB technique works ?
Each pixel has an associated value that represents grey scale values ranging from 0 to 255, or 8-bit values.
Let's look at an example of how this technique works. Let's say we want to conceal the message "hi" in a 44 image with the
following pixel values:
Using the ASCII Table, we can convert the secret message into decimal
values and then into binary: 01101000110101. Now we convert each pixel
value to binary and replace each least significant bit with the message bits
in order (for example, 225 is 11100001, and we replace the last bit with the
first data bit(0), and so on). The pixel values will only change by +1 or -1,
which will be barely noticeable.
here is the changed pixel values they will have a minimal effect on image
Cover Image
Cover Image
Text
Stego Image
Text
Encryption Algorithm
Encryption Algorithm
Figure 1.4 Working of LSB
6. The following is the methodology used by the programme:
Algorithm for LSB
Cover Image: The image which is to be used to hide the data.
Stego Image: The image which has been embedded with the hidden data.
Convert the secret message to binary format.
Convert the image on the cover to grayscale. (Using grayscale is more convenient because an 8-bit per pixel grayscale image
has 8 bit sequences versus a 24-bit per pixel colored image with 24-bit sequences.)
Take the intensity value (which ranges from 0 to 255) for each pixel in the image and convert it to binary format.
Replace the right-most bit, also known as the LSB, with a bit from the secret message.
Repeat until all of the secret message's bits have been embedded. After that, the image will be referred to as a stego image.
7. Implementation
After running the first set of the code the original image would be displayed
After excecuting the second part the user will have to input the message which is to be hidden in the image. Here the message
"Matrix Laboratory" is used as an example for message that needs to be hidden.
Figure 1.7 Original Image
8. Implementation
After the message input by the used the program will return the grey scaled image that is cover image and stego image which
stores the hidden message at the output
Finally, the decoding programme will be run to uncover the stego image's hidden message using the same technique through
which the image is encoded
Figure 1.8 Cover & Stego Images
9. This method is very fast and easy to implementin comparison to other methods of steganography
The output image has very slightly difference to the input image
Instead of embedding the message in only the LSB we can embed the message in last two LSBs thus embedding even large
messages
This method forms the basics of many other complex algorithms
Instead of embedding the messages in only the LSB, we can embed the messages in last two LSBs,thus embedding even large
messages
This type of encodin the data is weak since it can be easily decoded by taking the LSB of the image and getting the message
in binary fomat
This method is too old because it was used long ago when other encodin methods were not yet developed.
When embedding the message in more than one LSB, the image quality may reduce depending on how many pixels are
changed.
Advantages
Disadvantages
Advantages & Disadvantags
10. Image steganography is used in Cyber Forensics
It is also used by Intelligence services
Copyright and to avoid piracy of intellectual rights
Secure Highly confidential files and data
Protect original data from unknown sources.
Applications
11. Mujtiba, Syed & Yousu, Salihah & Bisma, Syed & Siddiqi, Mehvish & Khaki, Zahidgulzar. (2017). COMPARISION OF LSB AND
DWT STEGANOGRAPHY TECHNIQUES. 10.21090/IJAERD.ETIECE08.
Macit, Hüseyin & Koyun, Arif & Güngör, Orhan. (2018). A REVIEW AND COMPARISON OF STEGANOGRAPHY TECHNIQUES.
Fahim Irfan et. Al. ‘s (2011) “An Investigation into Encrypted Message Hiding through Images Using LSB ”, International
Journal of EST,
Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using Last Two Bits of Pixel Values”,
International Journal of Security, Vol.5 Iss. 2 pp. 51-61.
References