SlideShare a Scribd company logo
IMAGE
STEGANOGRAPHY
Guided By:
Prof. Nikunj Gamit
Prepared By:
Nidhi Papaiyawala
201203100810041
(6th IT)
Content
 Definition of image steganography
 Advantages
 Limitations
 Application
 Block diagram of steganography
 Different techniques
 Introduction of LSB technique
 Merits and Demerits of LSB
 Introduction of DCT technique
 Application
 Error analysis
1
Image steganography
 Definition:
Steganography is the art of “concealed writing”
and it refers to techniques that hide information
inside objects known as “Cover Objects”.
2
Advantages of steganography
 The secret message does not attract attention to
itself as an object of scrutiny.
 steganography is concerned with concealing a
secret message is being sent, as well as concealing
the contents of the message.
 Difficult to detect. Only receiver can detect.
 Provides better security for data sharing.
3
Limitations
 The confidentiality of information is maintained by
the algorithms, and if algorithms are known then
this technique is of no use.
 Password leakage may occur and it leads to the
unauthorized access of data.
4
Application
 Several information sources like our private banking
information, some military secrets, can be stored in
a cover source.
 Steganography is used by some modern printers and
color laser printers.
 Steganography can be used for digital
watermarking.
5
Basic Block diagram
Embedding information:
6
Embedding
Process
Stego-Key
Embedded
message
Cover
Image
Stego
Image
(cont.)
Extracting information:
7
Extracting
Process
Stego-Key
Cover
Image
Stego
Image
Embedded
message
Different Techniques[1]
There are two categories:
1)Spatial Domain:
which mainly includes LSB(Least Significant
Bit)
2)Frequency Domain:
which includes DCT(Discrete cosine transform)
and Wavelet Transform.
8
Least Significant Bit
 Simple approach to embedding information in a
cover image.
 It operates on principle that the human eye can not
differentiate between two shade separated by only
one bit.
Algorithm to embed the message:[1]
 Read the cover image and text message which is to
be hidden in the cover image.
 Convert the color image into grey image.
9
(cont.)
 Convert text message in binary.
 Calculate the LSB of each pixel of cover image.
 Replace LSB of cover image with each bit of secret
message one by one.
 Write stego image.
10
Algorithm to extracting message
 Read the stego image.
 Calculate the LSB of each pixel of stego image.
 Extract the bits and covert each 8 bit in to character.
11
Result of LSB
12
Cover image Stego image
 Merits
1) Simple to
implement.
2) High payload
capacity.
3) Low complexity.
 Demerits:
1) Vulnerable
corruption.
2) Vulnerable to
detection.
13
DCT(Discrete cosine transform)
 The DCT transforms a signal or image from the
spatial domain to the frequency domain.
 Grouping the pixels into 8 × 8 pixel blocks and
transforming the pixel blocks into 64 DCT.
 DCT allows an image to be broken up into different
frequency bands namely the high, middle and low
frequency bands
14
Process of DCT based image
Steganography are as follow:[2]
Embedding information:
 Load cover image and secret image.
 Divide the cover image in to 8x8 blocks of pixels.
 Transform the cover image from spatial domain to
frequency using two dimensional DCT .
 Quantize the DCT coefficients by dividing using
factor in to the rounded value.
15
(cont.)
 Encrypt the secret image using RSA algorithm.
 Divide the encrypted image in to 8x8 blocks.
 Embed this data in the mid DCT coefficients of
cover image.
 Apply two dimensional inverse DCT to view it in
the spatial domain.
16
Block Diagram of DCT[2]
secret
message
17
Encryptio
n
Embeddi
ng
2D DCT
on each
block
8*8 block
preparatio
n
Cover
image
2D IDCT
on each
block
Stego
Embedding information:
Extracting information
 Read the Stego image.
 Divide the stego image in to 8x8 blocks of pixels.
 Transform the stego image from spatial to frequency
domain by applying two dimensional DCT on each
block
 Quantize the DCT coefficients in to the rounded
value.
18
(cont.)
 Extract the encrypted image values from mid-
frequency coefficients.
 Decrypt the values using RSA algorithm.
 Apply two dimensional inverse DCT to view the
extracted image in the spatial domain.
19
Extracting information[2]
20
Stego
image
8*8 block
preparatio
n
2D DCT
on each
block
Extraction
2D IDCT
on each
block
Decryptio
n
Extracted
image
Result of DCT
21
Cover Image Secrete Image
Output at the receiver side
Cover Image Stego Image
22
Advantages
 Energy compaction.
 High compression ratio,
 Small bit error rate
 Good information integration ability.
23
Application
 It is often used in image processing, especially for
lossy compression, because it has a strong "energy
compaction" property.
24
Error Analysis [2]
(I)Bit Error Rate(BER):
 For the successful recovery of the hidden
information the communication channel must be
ideal.
 for the real communication channel, there will be
error while retrieving hidden information and this is
measured by BER.
all pixel
BER= 1 ∑ |image cov -image steg |
|image cov| i=0
25
(cont.)
(II)Mean Square Error:
 It is defined as the square of error between cover
image and stego image.
 The distortion in the image can be measured using
MSE and is calculated using Equation
n
MSE = 1 ∑ (cov-steg)2
n i=0
26
(cont.)
(III)Peak Signal to Noise Ratio (PSNR)
 It is the measure of quality of the image by
comparing the cover image with the stego image, i.e.
Difference between the cover and Stego image is
calculated using Equation.
PSNR = 10log10 2552/MSE
27
Conclusion.
 Steganography is the art and science of writing
hidden message that no one apart from the sender
and receiver, suspect the existence of the message.
 DCT-Steganography is based on encryption. To
provide high security Steganography and
cryptography are combined together. This technique
encrypts secret information before embedding it in
the image.
 Larger PSNR indicates the higher the image quality.
A smaller PSNR means there is huge distortion
between the cover-image and the stego image.
28
References
 Anil k Jain, “Fundamentals of digital image processing",
University of california-davis,prentice hall.
 Proceeding of the 2006 International conference on
“Intelligent information hiding and multimedia signal
processing 2006 IEEE.
 K.B.Raja', C.R.Chowdary2, Venugopal K R3,
L.M.Patnaik , A Secure Image Steganography using
LSB, DCT and Compression Techniques on Raw
Images,2005 IEEE
29
THANK YOU
30

More Related Content

What's hot

Steganography
SteganographySteganography
Steganography
Saugata Palit
 
Info hiding
Info hidingInfo hiding
Info hiding
Muna AlKhayat
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
Manasitilak
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
Tejas_srinivas
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
Abhishek Dhara
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Praneeta Dehare
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Steganography
Steganography Steganography
Steganography
Satyam Sharma
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Steganography
SteganographySteganography
Steganography
Mayank Saxena
 
Steganography
SteganographySteganography
Steganography
Deepak Raj
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
Aishwarya Korde
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
Mumbai Academisc
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
Vikas Sharma
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
ARYA TM
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Info hiding
Info hidingInfo hiding
Info hiding
 
Steganography in android to hide applications
Steganography in android to hide applicationsSteganography in android to hide applications
Steganography in android to hide applications
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 

Viewers also liked

GDS GALILEO
GDS GALILEO GDS GALILEO
GDS GALILEO
Luh Gomez
 
Coverletter
CoverletterCoverletter
Coverletter
Sean Thompson
 
Brick Analysis
Brick Analysis Brick Analysis
Brick Analysis
downerj
 
Normas apa
Normas apaNormas apa
VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016
Muammer Cakir
 
Monica corazon
Monica corazonMonica corazon
Monica corazon
monicaligas
 
Regard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en AfriqueRegard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en Afrique
LINK 2 BUSINESS WORLD
 
Pbsmr dasar pbs
Pbsmr dasar pbsPbsmr dasar pbs
Pbsmr dasar pbs
AnnaRuhanna1968
 
The Essence of DevOps
The Essence of DevOpsThe Essence of DevOps
The Essence of DevOps
Jeff Sussna
 
Objective structuredclinicalexam
Objective structuredclinicalexamObjective structuredclinicalexam
Objective structuredclinicalexam
Hellen Kyakuwaire
 
Amadeus
AmadeusAmadeus
Amadeus
vivetatourism
 
Core java
Core javaCore java
Core java
Shivaraj R
 
Applying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing CodeApplying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing Code
C4Media
 

Viewers also liked (14)

GDS GALILEO
GDS GALILEO GDS GALILEO
GDS GALILEO
 
Coverletter
CoverletterCoverletter
Coverletter
 
Brick Analysis
Brick Analysis Brick Analysis
Brick Analysis
 
56264
5626456264
56264
 
Normas apa
Normas apaNormas apa
Normas apa
 
VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016VIOP - HalkInvest Investment Conference - Outlook 2016
VIOP - HalkInvest Investment Conference - Outlook 2016
 
Monica corazon
Monica corazonMonica corazon
Monica corazon
 
Regard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en AfriqueRegard sur le Management et l'Entrepreneuriat en Afrique
Regard sur le Management et l'Entrepreneuriat en Afrique
 
Pbsmr dasar pbs
Pbsmr dasar pbsPbsmr dasar pbs
Pbsmr dasar pbs
 
The Essence of DevOps
The Essence of DevOpsThe Essence of DevOps
The Essence of DevOps
 
Objective structuredclinicalexam
Objective structuredclinicalexamObjective structuredclinicalexam
Objective structuredclinicalexam
 
Amadeus
AmadeusAmadeus
Amadeus
 
Core java
Core javaCore java
Core java
 
Applying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing CodeApplying Java 8 Idioms to Existing Code
Applying Java 8 Idioms to Existing Code
 

Similar to Presentation i

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
Mohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ijma
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
Mumbai Academisc
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
ssusere02009
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
Mumbai Academisc
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
IRJET Journal
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
IOSR Journals
 
J017156874
J017156874J017156874
J017156874
IOSR Journals
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
ijsrd.com
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
B03208016
B03208016B03208016
B03208016
inventy
 

Similar to Presentation i (20)

A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
C010511420
C010511420C010511420
C010511420
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
B03208016
B03208016B03208016
B03208016
 

Recently uploaded

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

Presentation i

  • 1. IMAGE STEGANOGRAPHY Guided By: Prof. Nikunj Gamit Prepared By: Nidhi Papaiyawala 201203100810041 (6th IT)
  • 2. Content  Definition of image steganography  Advantages  Limitations  Application  Block diagram of steganography  Different techniques  Introduction of LSB technique  Merits and Demerits of LSB  Introduction of DCT technique  Application  Error analysis 1
  • 3. Image steganography  Definition: Steganography is the art of “concealed writing” and it refers to techniques that hide information inside objects known as “Cover Objects”. 2
  • 4. Advantages of steganography  The secret message does not attract attention to itself as an object of scrutiny.  steganography is concerned with concealing a secret message is being sent, as well as concealing the contents of the message.  Difficult to detect. Only receiver can detect.  Provides better security for data sharing. 3
  • 5. Limitations  The confidentiality of information is maintained by the algorithms, and if algorithms are known then this technique is of no use.  Password leakage may occur and it leads to the unauthorized access of data. 4
  • 6. Application  Several information sources like our private banking information, some military secrets, can be stored in a cover source.  Steganography is used by some modern printers and color laser printers.  Steganography can be used for digital watermarking. 5
  • 7. Basic Block diagram Embedding information: 6 Embedding Process Stego-Key Embedded message Cover Image Stego Image
  • 9. Different Techniques[1] There are two categories: 1)Spatial Domain: which mainly includes LSB(Least Significant Bit) 2)Frequency Domain: which includes DCT(Discrete cosine transform) and Wavelet Transform. 8
  • 10. Least Significant Bit  Simple approach to embedding information in a cover image.  It operates on principle that the human eye can not differentiate between two shade separated by only one bit. Algorithm to embed the message:[1]  Read the cover image and text message which is to be hidden in the cover image.  Convert the color image into grey image. 9
  • 11. (cont.)  Convert text message in binary.  Calculate the LSB of each pixel of cover image.  Replace LSB of cover image with each bit of secret message one by one.  Write stego image. 10
  • 12. Algorithm to extracting message  Read the stego image.  Calculate the LSB of each pixel of stego image.  Extract the bits and covert each 8 bit in to character. 11
  • 13. Result of LSB 12 Cover image Stego image
  • 14.  Merits 1) Simple to implement. 2) High payload capacity. 3) Low complexity.  Demerits: 1) Vulnerable corruption. 2) Vulnerable to detection. 13
  • 15. DCT(Discrete cosine transform)  The DCT transforms a signal or image from the spatial domain to the frequency domain.  Grouping the pixels into 8 × 8 pixel blocks and transforming the pixel blocks into 64 DCT.  DCT allows an image to be broken up into different frequency bands namely the high, middle and low frequency bands 14
  • 16. Process of DCT based image Steganography are as follow:[2] Embedding information:  Load cover image and secret image.  Divide the cover image in to 8x8 blocks of pixels.  Transform the cover image from spatial domain to frequency using two dimensional DCT .  Quantize the DCT coefficients by dividing using factor in to the rounded value. 15
  • 17. (cont.)  Encrypt the secret image using RSA algorithm.  Divide the encrypted image in to 8x8 blocks.  Embed this data in the mid DCT coefficients of cover image.  Apply two dimensional inverse DCT to view it in the spatial domain. 16
  • 18. Block Diagram of DCT[2] secret message 17 Encryptio n Embeddi ng 2D DCT on each block 8*8 block preparatio n Cover image 2D IDCT on each block Stego Embedding information:
  • 19. Extracting information  Read the Stego image.  Divide the stego image in to 8x8 blocks of pixels.  Transform the stego image from spatial to frequency domain by applying two dimensional DCT on each block  Quantize the DCT coefficients in to the rounded value. 18
  • 20. (cont.)  Extract the encrypted image values from mid- frequency coefficients.  Decrypt the values using RSA algorithm.  Apply two dimensional inverse DCT to view the extracted image in the spatial domain. 19
  • 21. Extracting information[2] 20 Stego image 8*8 block preparatio n 2D DCT on each block Extraction 2D IDCT on each block Decryptio n Extracted image
  • 22. Result of DCT 21 Cover Image Secrete Image
  • 23. Output at the receiver side Cover Image Stego Image 22
  • 24. Advantages  Energy compaction.  High compression ratio,  Small bit error rate  Good information integration ability. 23
  • 25. Application  It is often used in image processing, especially for lossy compression, because it has a strong "energy compaction" property. 24
  • 26. Error Analysis [2] (I)Bit Error Rate(BER):  For the successful recovery of the hidden information the communication channel must be ideal.  for the real communication channel, there will be error while retrieving hidden information and this is measured by BER. all pixel BER= 1 ∑ |image cov -image steg | |image cov| i=0 25
  • 27. (cont.) (II)Mean Square Error:  It is defined as the square of error between cover image and stego image.  The distortion in the image can be measured using MSE and is calculated using Equation n MSE = 1 ∑ (cov-steg)2 n i=0 26
  • 28. (cont.) (III)Peak Signal to Noise Ratio (PSNR)  It is the measure of quality of the image by comparing the cover image with the stego image, i.e. Difference between the cover and Stego image is calculated using Equation. PSNR = 10log10 2552/MSE 27
  • 29. Conclusion.  Steganography is the art and science of writing hidden message that no one apart from the sender and receiver, suspect the existence of the message.  DCT-Steganography is based on encryption. To provide high security Steganography and cryptography are combined together. This technique encrypts secret information before embedding it in the image.  Larger PSNR indicates the higher the image quality. A smaller PSNR means there is huge distortion between the cover-image and the stego image. 28
  • 30. References  Anil k Jain, “Fundamentals of digital image processing", University of california-davis,prentice hall.  Proceeding of the 2006 International conference on “Intelligent information hiding and multimedia signal processing 2006 IEEE.  K.B.Raja', C.R.Chowdary2, Venugopal K R3, L.M.Patnaik , A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images,2005 IEEE 29