SlideShare a Scribd company logo
1 of 19
Image Steganography Using
Mode 16 Method(M16M)
Presented By :
 Arko Kundu
4th
year CSE, UIT, BU
 Kaushik Chakrarborty
4th
year CSE, UIT, BU
 Sauvik Bhattacharyaa
Associate Professor(CSE), UIT, BU
Department of Computer Science and Technology
University Institute of Technology,
THE UNIVERSITY OF BURDWAN
What is STEGANOGRAPHY?
According to Wikipedia :
Steganography is the art and science of writing
hidden messages in such a way that no one apart from the sender and
intended recipient even realizes there is a hidden message.
The word comes from Greek steganos or “covered”
and graphie or “writing” meaning “covered or hidden writing”.
Two examples of how it appeared:
1.Demaratus sent a warning about a forthcoming attack to Greece by
writing it on a wooden panel and covering it in wax.
2.Another ancient example is that of Histiaeus encouraged
Aristagoras of Miletus to revolt against Persian king. He shaved the
head of his most trusted slave and tattooed a message on it. After
his hair had grown the message was hidden.
Real World Cases
Steganography is being used as a very powerful technique, even to Criminal
Organizations :
1.USA reported that bin Laden and others "are hiding maps
and photographs of terrorist targets and posting instructions for terrorist activities
on sports chat rooms , pornographic bulletin boards and other websites, U.S. and
foreign officials say.“
2. Hello Kitty images were used by Colombian Drug lord Juan Carlos Ramirez Abadia
to hide messages to his minions as Steganography vector. Abadia apparently picked
Hello Kitty ashis courier because his wife was a big fan of the Japanese icon -- she
had even decorated one of her rooms in a Brazilian house with Hello Kitty-themed
chairs, watches and wallpaper
The Hello Kitty Image which was
used as the Stego Image
The Modern Framework(The Prisoners Problem)
Here Alice and Bob are two Inmates who wish to communicate and Wendy
is the Warden and examines all the message passed between them.
Secret
Message
Secret
Message
Secret
Message
Secret
Message
Secret KeySecret Key
Message
Retrieval
Algorithm
Message
Retrieval
Algorithm
Suppress
Message
Suppress
Message
Stego
Message
Stego
Message
Embedding
Algorithm
Embedding
Algorithm
Cover
Message
Cover
Message
Secret KeySecret Key
Is
Stego
msg?
Is
Stego
msg?
ALICE WENDY BOB
Most simple properties of
general Steganography
All key properties for
Good Steganography
Characteristics Of Strong Steganography
What’s happening before
embedding ??
Seed Pixel Selection
Seed Pixel Generation for embedding message bits is
dependent on the intensity value of the previous pixel selected.
It includes a decision factor (dp) which is dependent on
intensity with a fixed way of calculating the next pixel.
x=x1+2+dp
y=y1+2+dp
(x,y)=new Pixel position
(x1,y1)=previous Pixel position
Intensity >80 &&
<=160
Intensity >160 &&
<=255
dp=1
dp=2
dp=3
Intensity <=80
An Example… (Seed Pixel Selection)
122 45 69 132 256 145 56 79 112 125
156 125 169 123 79 78 12 186 123 69
224 212 145 125 147 86 45 110 236 26
119 248 46 112 48 23 79 45 90 156
119 79 116 189 53 30 130 90 141 171
56 71 26 83 43 75 93 67 116 49
90 112 179 212 201 38 99 119 157 39
83 53 89 115 63 78 90 76 255 255
131 141 176 159 126 146 255 73 86 255
An Example
( Neighboring Pixel Selection )
112 48 23
189 53 30
83 43 75
i+1,j
i+1,j-1 i+1,j+1
i,j-1 i,j+1
i-1,j-1 i-1,j+1
i-1,j
Embedding Technique
The Summarized Algorithm is as follows :
1.Select a seed pixel.
2.Select the neighbouring pixels.
3.Find the intensity of the neighbouring pixels .Find out and store the
remainder after dividing the intensity by 16.
Let the remainder be R .
4.Subtract R from the intensity and hence the resultant is divisible by
16.
Cont………
5. Now add different values to the resultant intensity according to the different
4 bit binary message to be embedded according to the table given below :-
MSG VALUE TO BE ADDED
0000 0
0001 1
0010 2
0011 3
0100 4
0101 5
0110 6
0111 7
1000 8
1001 9
1010 10
1011 11
1100 12
1101 13
1110 14
1111 15
6. The modified intensity is replaced in the original image matrix.
7. At the end we get the stego matrix embedded with the message.
Embedding Example
Message to be embedded = 0011
 
The summarized Algorithm is as follows :
1.Select a seed pixel.
2.Select the neighbouring pixels.
3.Find the intensity of the neighbouring pixels and find out and store
the remainder after dividing it by 16. Let the remainder be R .
4. Now R represents the Decimal Value of the embedded message .
When converted to 4-bit binary format we get our resultant message at
the receiver’s end.
Extracting Technique
Extracting Example
Extracted Message = 0011
What the difference in picture
quality after embedding ?
Original Lena (Capacity=19684 characters) Stego Lena
PSNR (after embedding the 19684 characters) = 34.6516
PSNR (after embedding 1000 characters) = 47.3268
After Embedding
19684 Characters
What’s ahead in FUTURE……………. ??
 In today’s world, we often listen a popular term “Hacking”..
So, whatever be the technique will be developed in
future, degree of security related with that has to be kept in
mind. It is hoped that Dual Steganography, “Steganography
along with Cryptography “ may be used to achieve some
of the future solution for this above mentioned problem.
 In the near future, the most important use of steganographic
techniques will probably be lying in the field of “Digital
Watermarking”.
Can be used to enhance a country’s security system regarding
confidential documents.
Conclusion
The work dealt with the techniques for steganography as
related to gray scale image. A new and efficient
steganographic method for embedding secret messages
into images without producing any major changes has
been proposed. Although in this method it has been shown
that each four bit of the secret message has been mapped
in the pixels of the cover image, but this method can be
extended to map n no of bits also by considering more no
of features of the embedding pixels. This method also
capable of extracting the secret message without the cover
image. This approach can also be used in coloured images.
Questions …. ???
With Regards…..!!!
 Arko Kundu
 Kaushik Chakrarborty
 Sauvik Bhattacharyaa

More Related Content

What's hot

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based SteganpgraphyOmkar Rane
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography2510stk
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganographyAslesha Niki
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganographyAnnsona Ansilon
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsSri Madhur
 

What's hot (20)

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganography
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 

Similar to Image Steganography Using Mode 16 Method (M16M

Discrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyDiscrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyKaushik Chakraborty
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxssuser2299e8
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyMonica Turner
 
Steganography
SteganographySteganography
SteganographyPavninder
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
 
Identification of Steganographic Signatures in Stego Images Generated By Dis...
Identification of Steganographic Signatures in Stego Images  Generated By Dis...Identification of Steganographic Signatures in Stego Images  Generated By Dis...
Identification of Steganographic Signatures in Stego Images Generated By Dis...IOSR Journals
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Presentation i
Presentation iPresentation i
Presentation inidhip216
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 

Similar to Image Steganography Using Mode 16 Method (M16M (20)

Discrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyDiscrete Cosine Transform Stegonagraphy
Discrete Cosine Transform Stegonagraphy
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Steganography
SteganographySteganography
Steganography
 
STEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptxSTEGANOGRAPHY Seminar (1).pptx
STEGANOGRAPHY Seminar (1).pptx
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Steganography
SteganographySteganography
Steganography
 
Multimedia Steganography
Multimedia SteganographyMultimedia Steganography
Multimedia Steganography
 
Steganography
SteganographySteganography
Steganography
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
Identification of Steganographic Signatures in Stego Images Generated By Dis...
Identification of Steganographic Signatures in Stego Images  Generated By Dis...Identification of Steganographic Signatures in Stego Images  Generated By Dis...
Identification of Steganographic Signatures in Stego Images Generated By Dis...
 
Isc
IscIsc
Isc
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Presentation i
Presentation iPresentation i
Presentation i
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Image Steganography Using Mode 16 Method (M16M

  • 1. Image Steganography Using Mode 16 Method(M16M) Presented By :  Arko Kundu 4th year CSE, UIT, BU  Kaushik Chakrarborty 4th year CSE, UIT, BU  Sauvik Bhattacharyaa Associate Professor(CSE), UIT, BU Department of Computer Science and Technology University Institute of Technology, THE UNIVERSITY OF BURDWAN
  • 2. What is STEGANOGRAPHY? According to Wikipedia : Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. The word comes from Greek steganos or “covered” and graphie or “writing” meaning “covered or hidden writing”. Two examples of how it appeared: 1.Demaratus sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax. 2.Another ancient example is that of Histiaeus encouraged Aristagoras of Miletus to revolt against Persian king. He shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden.
  • 3. Real World Cases Steganography is being used as a very powerful technique, even to Criminal Organizations : 1.USA reported that bin Laden and others "are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms , pornographic bulletin boards and other websites, U.S. and foreign officials say.“ 2. Hello Kitty images were used by Colombian Drug lord Juan Carlos Ramirez Abadia to hide messages to his minions as Steganography vector. Abadia apparently picked Hello Kitty ashis courier because his wife was a big fan of the Japanese icon -- she had even decorated one of her rooms in a Brazilian house with Hello Kitty-themed chairs, watches and wallpaper The Hello Kitty Image which was used as the Stego Image
  • 4. The Modern Framework(The Prisoners Problem) Here Alice and Bob are two Inmates who wish to communicate and Wendy is the Warden and examines all the message passed between them. Secret Message Secret Message Secret Message Secret Message Secret KeySecret Key Message Retrieval Algorithm Message Retrieval Algorithm Suppress Message Suppress Message Stego Message Stego Message Embedding Algorithm Embedding Algorithm Cover Message Cover Message Secret KeySecret Key Is Stego msg? Is Stego msg? ALICE WENDY BOB
  • 5. Most simple properties of general Steganography All key properties for Good Steganography Characteristics Of Strong Steganography
  • 7. Seed Pixel Selection Seed Pixel Generation for embedding message bits is dependent on the intensity value of the previous pixel selected. It includes a decision factor (dp) which is dependent on intensity with a fixed way of calculating the next pixel. x=x1+2+dp y=y1+2+dp (x,y)=new Pixel position (x1,y1)=previous Pixel position Intensity >80 && <=160 Intensity >160 && <=255 dp=1 dp=2 dp=3 Intensity <=80
  • 8. An Example… (Seed Pixel Selection) 122 45 69 132 256 145 56 79 112 125 156 125 169 123 79 78 12 186 123 69 224 212 145 125 147 86 45 110 236 26 119 248 46 112 48 23 79 45 90 156 119 79 116 189 53 30 130 90 141 171 56 71 26 83 43 75 93 67 116 49 90 112 179 212 201 38 99 119 157 39 83 53 89 115 63 78 90 76 255 255 131 141 176 159 126 146 255 73 86 255
  • 9. An Example ( Neighboring Pixel Selection ) 112 48 23 189 53 30 83 43 75 i+1,j i+1,j-1 i+1,j+1 i,j-1 i,j+1 i-1,j-1 i-1,j+1 i-1,j
  • 10. Embedding Technique The Summarized Algorithm is as follows : 1.Select a seed pixel. 2.Select the neighbouring pixels. 3.Find the intensity of the neighbouring pixels .Find out and store the remainder after dividing the intensity by 16. Let the remainder be R . 4.Subtract R from the intensity and hence the resultant is divisible by 16. Cont………
  • 11. 5. Now add different values to the resultant intensity according to the different 4 bit binary message to be embedded according to the table given below :- MSG VALUE TO BE ADDED 0000 0 0001 1 0010 2 0011 3 0100 4 0101 5 0110 6 0111 7 1000 8 1001 9 1010 10 1011 11 1100 12 1101 13 1110 14 1111 15 6. The modified intensity is replaced in the original image matrix. 7. At the end we get the stego matrix embedded with the message.
  • 12. Embedding Example Message to be embedded = 0011
  • 13.   The summarized Algorithm is as follows : 1.Select a seed pixel. 2.Select the neighbouring pixels. 3.Find the intensity of the neighbouring pixels and find out and store the remainder after dividing it by 16. Let the remainder be R . 4. Now R represents the Decimal Value of the embedded message . When converted to 4-bit binary format we get our resultant message at the receiver’s end. Extracting Technique
  • 15. What the difference in picture quality after embedding ? Original Lena (Capacity=19684 characters) Stego Lena PSNR (after embedding the 19684 characters) = 34.6516 PSNR (after embedding 1000 characters) = 47.3268 After Embedding 19684 Characters
  • 16. What’s ahead in FUTURE……………. ??  In today’s world, we often listen a popular term “Hacking”.. So, whatever be the technique will be developed in future, degree of security related with that has to be kept in mind. It is hoped that Dual Steganography, “Steganography along with Cryptography “ may be used to achieve some of the future solution for this above mentioned problem.  In the near future, the most important use of steganographic techniques will probably be lying in the field of “Digital Watermarking”. Can be used to enhance a country’s security system regarding confidential documents.
  • 17. Conclusion The work dealt with the techniques for steganography as related to gray scale image. A new and efficient steganographic method for embedding secret messages into images without producing any major changes has been proposed. Although in this method it has been shown that each four bit of the secret message has been mapped in the pixels of the cover image, but this method can be extended to map n no of bits also by considering more no of features of the embedding pixels. This method also capable of extracting the secret message without the cover image. This approach can also be used in coloured images.
  • 19. With Regards…..!!!  Arko Kundu  Kaushik Chakrarborty  Sauvik Bhattacharyaa