SlideShare a Scribd company logo
DIGITAL STEGANOGRAPHY: HIDING DATA
WITHIN DATA
ABSTRACT
 Steganography is a method of hiding secret messages in a cover object while communication
takes place between sender and receiver.
 Security of secret or important information has always been a major issue from the past times
to the current time. It has always been the interested topic for researchers to develop secure
techniques to send data without revealing it to anyone other than the receiver.
 Therefore from day to day researchers have developed many techniques to fulfill secure
transfer of data and steganography is one of them. In this thesis we have developed a new
technique of image steganography inside the embedding the encrypted Data file or message
using Hash-LSB with RSA algorithm for providing more security to data as well as our data
hiding method.
 The developed technique uses a hash function to generate a pattern for hiding data bits into
LSB of RGB pixel values of the carry image.
AIM
 Hiding sensitive information vital for security purposes
 Securing private files and documents
OBJECTIVE
 The main objectives of our project are to product security tool based on
steganography techniques to hider message carried by stego-media which
should not be sensible to human beings and avoid drawing suspicion to the
existence of hidden message.
Information Hiding -Introduction
 Purpose:
 Hiding sensitive information vital for security purposes
 Securing private files and documents
 Hiding information - 3methods - Cryptography, Steganography, Watermarking.
 Cryptography - Data to be hidden is coded
 several techniques ; sophisticated
 visually obvious to be encrypted; appears non-sensical
 Watermarking
 Applies a copyright label ; prevents illegal use of content
 Improper removal causes degradation of original information
 Steganography -hiding information by using another information as a cover.
 Elements:
 cover component, message component, stego component.
Steganography -Introduction
 Types:
 Text steganography
 Image steganography
 Video steganography
 Audio steganography
 Image steganography is widely used.
 Images contain redundant information.
 Easy to manipulate few pixels without affecting visual data observably
 Slight changes in RGB values undetected by human eye (HVS) - Psychovisual
redundancy.
 Types: Text in image ; image in image
PROBLEM STATEMENT
 The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try
of hide messages physically. One disadvantage of linguistic steganography is that users must equip
themselves to have a good knowledge of linguistry.
 In recent years, everything is trending toward digitization. And with the development of the internet
technology, digital media can be transmitted conveniently over the network. Therefore, messages can be
secretly carried by digital media by using the steganography techniques, and then be transmitted through
the internet rapidly Steganography is the art of hiding the fact that communication is taking place, by
hiding information in other information.
 Many different carrier file formats can be used, but digital images are the most popular because of their
frequency on the internet. For hiding secret information in images, there exists a large variety of
steganography techniques some are more complex than others and all of them have respective strong and
weak points. So we prepare this application, to make the information hiding more simple and user
friendly.
PROBLEM ANALYSIS
 Steganography takes cryptography a step farther by hiding an encrypted message so that no
one suspects it exists. Ideally, anyone scanning your data will fail to know it contains
encrypted data.
 Data is first encrypted by the usual means and then inserted, using a special algorithm, into
redundant (that is, provided but unneeded) data that is part of a particular file format such as
a JPEG image.
 Think of all the bits that represent the same color pixels repeated in a row. By applying the
encrypted data to this redundant data in some random or non-conspicuous way, the result will
be data that appears to have the "noise" patterns of regular, non- encrypted data. A trademark
or other identifying symbol hidden in software code is sometimes known as a watermark.
EXISTING SYSTEM
 Data hiding for vector quantization (VQ)-based images focuses on the problem of embedding
secret data into a cover VQ-based image to achieve secret communication and data protection.
 VQ-based data-hiding methods into four no overlapping groups according to their reversibility and
output formats, introduce the details of the representative methods, summarize the features of the
representative methods, and compare the performance of the representative methods using peak
signal-to-noise ratio, capacity of secret data, and bit rate.
 An irreversible method is very likely a VQ-based data-hiding method that produces a stego-image
as its output, and it can embed more secret data than a reversible method. Nonstandard encoding
methods (e.g., joint neighboring coding) are becoming popular in reversible data hiding since they
can increase the capacity for embedding the secret data
DISADVANTAGE
 Huge number of data, huge file size, so someone can suspect about it.
 If this techniques is gone in the wrong hands like hackers, terrorist, criminals then this
can be very much dangerous.
PROPOSED SYSTEM
 Steganography is the art of hiding information and an effort to conceal the existence of the
embedded information.
 It serves as a better way of securing message than cryptography which only conceals the
content of the message not the existence of the message.
 Original message is being hidden within a carrier such that the changes so occurred in the
carrier are not observable. In this paper we will discuss how digital images can be used as a
carrier to hide messages.
 This paper also analyses the performance of some of the steganography tools. Steganography
is a useful tool that allows covert transmission of information over an over the
communications channel. Combining secret image with the carrier image gives the hidden
image. The hidden image is difficult to detect without retrieval
ADVANTAGE
 Alterations not visible to the human eye
 Simple & easiest way of hiding Information
 Hidden data can be distributed more evenly over the whole image in such a
way as to make it more robust
BLOCK DIAGRAM
USE CASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
HARDWARE REQUIREMENTS
 System : i3 core.
 Hard Disk : 500 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 4 gb.
SOFTWARE REQUIREMENTS
 Operating system : Windows 10.
 Coding Language : ASP.net, C#.net
 Tool : Visual Studio 2017
 Database : SQL SERVER 2014
MODULES
 IMPORTANT ASPECTS OF STEGANALYSIS
 DETECTING HIDDEN INFORMATION
 DISABLING STEGANOGRAOPHY
Methods:
 LSB substitution method:
 Deals with substituting LSB bits of corresponding pixels in image to store the text
message or another image as a message.
 Block method:
 blocks of the image are considered and DCT (discrete cosine transform) is done in
order to break them.
 Each block is then subdivided into 64 parts (DCT coefficients).
 These coefficients are modified i.e. the color gets modified a little by storing some
text or another image in it.
 Palette modification:
 Every image uses a set of color values.
 Palette Modification replaces the unused colors within an image’s color palette
with colors that represent the hidden message.
LSB substitution method -Algorithm:
 In the current project, emphasis is given to this
method.
 Simplicity
 Mostly Imperceivable
 One of the channels among RGB can be chosen, and LSB of its pixels altered
or all the channels could be used.
 Example:
(a) binary form of message to be hidden
(b) few pixel values on cover image
(c) LSB altered
Algorithm:
1. Input the message to be hidden. (either image
or text)
2. Check the maximum number of bits that can be
accepted by the cover image
3. Replace the LSB bits of the pixels in cover
image with the binary representation of the
message. => we obtain Stego image
 Either color image (RGB) or grayscale image can
be used as a cover image.
 In case of color image, 24bit image i.e. 8bits are
present for each for RGB so more number
information pixels can be stored.
 Modification can be done to either just the last 1
bit or 2,4 or more bits depending on
requirement.
CONCLUSTION
 It is observed that through LSB Substitution Steganographic method, the
results obtained in data hiding are pretty impressive as it utilizes the simple
fact that any image could be broken up to individual bit-planes each
consisting of different levels of information.
 It is to be noted that as discussed earlier, this method is only effective for
bitmap images as these involve lossless compression techniques. Also, in this
project grey-scale images have been used for demonstration.
 But this process can also be extended to be used for color images where,
bitplane slicing is to be done individually for the top four bit-planes for each
of R, G, B of the message image, which are again to be placed in the R, G, B
planes of the cover image, and extraction is done similarly.
FUTURE ENHANCEMENT
 The future work on this project is to improve the compression ratio of the
image to the text. This project can be extended to a level such that it can be
used for the different types of multimedia files.
References:
1. Johnson, Neil F. "Steganography."
Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web.
2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in
Computer Science and Software Engineering." Http://www.ijarcsse.com/.
N.p., Sept. 2014. Web.
3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to
Steganography.”
4. IEEE Security & Privacy Magazine, May-June 2013. Web.
5. Nick Nabavian. “Image steganography” Nov. 28, 2007.
http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano
graphy.pdf
6. Matlab help.

More Related Content

Similar to review.pptx

IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
ijtsrd
 
Image steganography in python with an ea
Image steganography in python with an eaImage steganography in python with an ea
Image steganography in python with an ea
SandeshGajmal
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
INFOGAIN PUBLICATION
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Journal For Research
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
IOSR Journals
 
Ijetr042105
Ijetr042105Ijetr042105
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
ijtsrd
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
ijtsrd
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
ijtsrd
 
N043020970100
N043020970100N043020970100
N043020970100
ijceronline
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
VijayMaheshwari12
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
CSCJournals
 

Similar to review.pptx (20)

IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Report
ReportReport
Report
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
Image steganography in python with an ea
Image steganography in python with an eaImage steganography in python with an ea
Image steganography in python with an ea
 
K0815660
K0815660K0815660
K0815660
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
N043020970100
N043020970100N043020970100
N043020970100
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 

Recently uploaded

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

review.pptx

  • 1. DIGITAL STEGANOGRAPHY: HIDING DATA WITHIN DATA
  • 2. ABSTRACT  Steganography is a method of hiding secret messages in a cover object while communication takes place between sender and receiver.  Security of secret or important information has always been a major issue from the past times to the current time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone other than the receiver.  Therefore from day to day researchers have developed many techniques to fulfill secure transfer of data and steganography is one of them. In this thesis we have developed a new technique of image steganography inside the embedding the encrypted Data file or message using Hash-LSB with RSA algorithm for providing more security to data as well as our data hiding method.  The developed technique uses a hash function to generate a pattern for hiding data bits into LSB of RGB pixel values of the carry image.
  • 3. AIM  Hiding sensitive information vital for security purposes  Securing private files and documents
  • 4. OBJECTIVE  The main objectives of our project are to product security tool based on steganography techniques to hider message carried by stego-media which should not be sensible to human beings and avoid drawing suspicion to the existence of hidden message.
  • 5. Information Hiding -Introduction  Purpose:  Hiding sensitive information vital for security purposes  Securing private files and documents  Hiding information - 3methods - Cryptography, Steganography, Watermarking.  Cryptography - Data to be hidden is coded  several techniques ; sophisticated  visually obvious to be encrypted; appears non-sensical  Watermarking  Applies a copyright label ; prevents illegal use of content  Improper removal causes degradation of original information  Steganography -hiding information by using another information as a cover.  Elements:  cover component, message component, stego component.
  • 6. Steganography -Introduction  Types:  Text steganography  Image steganography  Video steganography  Audio steganography  Image steganography is widely used.  Images contain redundant information.  Easy to manipulate few pixels without affecting visual data observably  Slight changes in RGB values undetected by human eye (HVS) - Psychovisual redundancy.  Types: Text in image ; image in image
  • 7. PROBLEM STATEMENT  The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try of hide messages physically. One disadvantage of linguistic steganography is that users must equip themselves to have a good knowledge of linguistry.  In recent years, everything is trending toward digitization. And with the development of the internet technology, digital media can be transmitted conveniently over the network. Therefore, messages can be secretly carried by digital media by using the steganography techniques, and then be transmitted through the internet rapidly Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.  Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. So we prepare this application, to make the information hiding more simple and user friendly.
  • 8. PROBLEM ANALYSIS  Steganography takes cryptography a step farther by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.  Data is first encrypted by the usual means and then inserted, using a special algorithm, into redundant (that is, provided but unneeded) data that is part of a particular file format such as a JPEG image.  Think of all the bits that represent the same color pixels repeated in a row. By applying the encrypted data to this redundant data in some random or non-conspicuous way, the result will be data that appears to have the "noise" patterns of regular, non- encrypted data. A trademark or other identifying symbol hidden in software code is sometimes known as a watermark.
  • 9. EXISTING SYSTEM  Data hiding for vector quantization (VQ)-based images focuses on the problem of embedding secret data into a cover VQ-based image to achieve secret communication and data protection.  VQ-based data-hiding methods into four no overlapping groups according to their reversibility and output formats, introduce the details of the representative methods, summarize the features of the representative methods, and compare the performance of the representative methods using peak signal-to-noise ratio, capacity of secret data, and bit rate.  An irreversible method is very likely a VQ-based data-hiding method that produces a stego-image as its output, and it can embed more secret data than a reversible method. Nonstandard encoding methods (e.g., joint neighboring coding) are becoming popular in reversible data hiding since they can increase the capacity for embedding the secret data
  • 10. DISADVANTAGE  Huge number of data, huge file size, so someone can suspect about it.  If this techniques is gone in the wrong hands like hackers, terrorist, criminals then this can be very much dangerous.
  • 11. PROPOSED SYSTEM  Steganography is the art of hiding information and an effort to conceal the existence of the embedded information.  It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message.  Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we will discuss how digital images can be used as a carrier to hide messages.  This paper also analyses the performance of some of the steganography tools. Steganography is a useful tool that allows covert transmission of information over an over the communications channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval
  • 12. ADVANTAGE  Alterations not visible to the human eye  Simple & easiest way of hiding Information  Hidden data can be distributed more evenly over the whole image in such a way as to make it more robust
  • 18. HARDWARE REQUIREMENTS  System : i3 core.  Hard Disk : 500 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 4 gb.
  • 19. SOFTWARE REQUIREMENTS  Operating system : Windows 10.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2017  Database : SQL SERVER 2014
  • 20. MODULES  IMPORTANT ASPECTS OF STEGANALYSIS  DETECTING HIDDEN INFORMATION  DISABLING STEGANOGRAOPHY
  • 21. Methods:  LSB substitution method:  Deals with substituting LSB bits of corresponding pixels in image to store the text message or another image as a message.  Block method:  blocks of the image are considered and DCT (discrete cosine transform) is done in order to break them.  Each block is then subdivided into 64 parts (DCT coefficients).  These coefficients are modified i.e. the color gets modified a little by storing some text or another image in it.  Palette modification:  Every image uses a set of color values.  Palette Modification replaces the unused colors within an image’s color palette with colors that represent the hidden message.
  • 22. LSB substitution method -Algorithm:  In the current project, emphasis is given to this method.  Simplicity  Mostly Imperceivable  One of the channels among RGB can be chosen, and LSB of its pixels altered or all the channels could be used.  Example: (a) binary form of message to be hidden (b) few pixel values on cover image (c) LSB altered
  • 23. Algorithm: 1. Input the message to be hidden. (either image or text) 2. Check the maximum number of bits that can be accepted by the cover image 3. Replace the LSB bits of the pixels in cover image with the binary representation of the message. => we obtain Stego image  Either color image (RGB) or grayscale image can be used as a cover image.  In case of color image, 24bit image i.e. 8bits are present for each for RGB so more number information pixels can be stored.  Modification can be done to either just the last 1 bit or 2,4 or more bits depending on requirement.
  • 24. CONCLUSTION  It is observed that through LSB Substitution Steganographic method, the results obtained in data hiding are pretty impressive as it utilizes the simple fact that any image could be broken up to individual bit-planes each consisting of different levels of information.  It is to be noted that as discussed earlier, this method is only effective for bitmap images as these involve lossless compression techniques. Also, in this project grey-scale images have been used for demonstration.  But this process can also be extended to be used for color images where, bitplane slicing is to be done individually for the top four bit-planes for each of R, G, B of the message image, which are again to be placed in the R, G, B planes of the cover image, and extraction is done similarly.
  • 25. FUTURE ENHANCEMENT  The future work on this project is to improve the compression ratio of the image to the text. This project can be extended to a level such that it can be used for the different types of multimedia files.
  • 26. References: 1. Johnson, Neil F. "Steganography." Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web. 2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in Computer Science and Software Engineering." Http://www.ijarcsse.com/. N.p., Sept. 2014. Web. 3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to Steganography.” 4. IEEE Security & Privacy Magazine, May-June 2013. Web. 5. Nick Nabavian. “Image steganography” Nov. 28, 2007. http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano graphy.pdf 6. Matlab help.