SlideShare a Scribd company logo
1 of 35
Image Steganography
Steganography 
Steganos 
(Covered) 
Graphein 
(writing)
Steganography vs Cryptography 
• Cryptography is the science of encrypting data in such a way that one 
cannot understand the encrypted message, whereas in steganography the 
mere existence of data is concealed, such that even its presence cannot be 
noticed
COVER 
Message 
Embedding 
Process 
Stego-Object 
Message 
Communication 
System
Input data used 
• Cover of grayscale type (1000X674) 
• Message of grayscale type (256x256) 
• Why grayscale?
Cover Image 
Message Image 
Stego-Image
Embedding Algorithms
Least Significant Bit Substitution 
Cover Image Message 
Image 
Calculate size of message (rows 
,columns) 
Convert each pixel value into 
binary 
Reserve first 20 pixels for hiding message 
size information 
Convert each pixel into 
binary 
Sequentially Replace LSB’s of cover 
image pixels with message bit
Cover Image 
Message Image 
Stego-Image
Histogram of Cover Image Histogram of Stego Image
Difference between Histograms of Cover and 
Stego Image
Size of Image Mean Square Error Peak Signal to Noise 
Ratio 
100% 0.177 128.1002 
75% 0.1188 132.1314 
50% 0.0532 140.1627 
25% 0.0123 154.8155
LSB with Randomization 
 Instead to sequentially replacing the LSB’s of pixels of cover image with 
message bits ,the replacement is done on the basis of stego-key. 
 Stego-key is a stream of pseudo random numbers which lie between 0 and 
size of cover image
COVER 
Message 
Embedding 
Process 
Stego-Object 
Message 
Stego-key 
Stego-key
Histogram of Cover Image Histogram of Stego Image
Difference between Histograms of Cover and 
Stego Image
Size of Message Mean Square 
Error 
PSNR 
100% 0.1904 127.4116 
75% 0.1114 132.7703 
50% 0.0501 140.7565 
25% 0.0124 154.7397
Extraction 
• Input: stego-image, key 
• Step1: Convert the secret message into bit stream (Length L) 
• Step2: Generate L number of pseudo random number using seed key 
• Step3: for i=1 to L { Get lsb of pixel denoted by ith pixel position Append this lsb 
into secret bit stream } 
• Step4: Convert secret bit stream into secret message 
• End Output: secret message
History… 
• Shaving the head 
• Wood tablet covered with wax 
• Microdots 
• Invisible ink 
• Vexierbild 
• Acrostic 
• Paper mask
• Book : Hypnerotomachia Poliphili 
• “ Poliam Frater Franciscus Columna peramavit”
Wisdom from cryptography… 
We assume the method used to encipher the data is 
known to the opponent, so the security must lie in 
the choice of the key
Example of public key steganography 
• One way to build public key steganography system is the use of 
public key cryptosystem. 
• Both cryptographic algorithms and embedding functions 
assumed to be publicly known. 
• ‘ Natural randomness’ indistinguishable from ciphertext.
Attackers.. 
• Active attacker is not able to change the cover and its semantics 
entirely, but only make minor changes so that the original and 
modified cover-objects stay perceptually or semantically similar. 
• Malicious attacker forges messages or starts steganography 
protocols under the name of one communication partner.
Active attackers… 
• Steganographic system is extremely sensitive to cover modification. 
• A system is called robust if the embedded information cannot be 
altered without making drastic changes to stego-object. 
• Trade-off between security and robustness. 
• Two approaches to make steganography robust: 
i. Making embedding process robust 
ii. Reverse the modifications that have been applied.
Active attackers… 
• Robust algorithms have to place the information in perceptually most 
significant parts of the signal, since information encoded in noise 
component can be removed without great effort. 
• It is known that embedding rules operating in some transform domain of 
cover signal can be much more robust to modification than embedding 
algorithms operating in time domain. 
• Information is hidden in plain sight, so obviously, in fact, that it is impossible 
to modify without gross modifications to the transmitted object.
LSB matching 
• In LSB replacement , the cover pixels with even values either 
remain unchanged or are increased by 1, while inverse is true for 
odd-valued pixels. 
• LSB replacement can be easily detected. 
• In LSB matching, 1 is either randomly added to or subtracted 
from cover pixel value. It is much harder to detect.
Mielikainen’s improved LSB matching 
• Embedding is performed using a pair of pixels as a unit, where 
the LSB of the first pixel carries one bit of information, and a 
function of two pixel values carries another bit of information. 
• The modified method allows hiding the same payload as LSB 
matching but with fewer changes to the cover image.
Cover…
Message…
Cover histogram..
LSB replacement stego histogram..
LSB matching stego histogram..
Comparison 
0.25 
0.2 
0.15 
0.1 
0.05 
0 
Mean Squared Error 
Simple LSB LSB with Randomization LSB Matching 
100% 75% 50% 25% 
MSE 
Size of message
Thankyou

More Related Content

What's hot

Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
steganography
steganographysteganography
steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
Steganography Steganography
Steganography
 

Similar to Steganography

BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATAAjinkya Nikam
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.pptSantu Chall
 
Steganography
SteganographySteganography
SteganographySonam M
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoKavya P K
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-SteganographySagar Kumar
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 

Similar to Steganography (20)

BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Info hiding
Info hidingInfo hiding
Info hiding
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
ICIECA 2014 Paper 20
ICIECA 2014 Paper 20ICIECA 2014 Paper 20
ICIECA 2014 Paper 20
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
C3 s
C3 sC3 s
C3 s
 
Image Security
Image SecurityImage Security
Image Security
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
G017444651
G017444651G017444651
G017444651
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Steganography

  • 2. Steganography Steganos (Covered) Graphein (writing)
  • 3. Steganography vs Cryptography • Cryptography is the science of encrypting data in such a way that one cannot understand the encrypted message, whereas in steganography the mere existence of data is concealed, such that even its presence cannot be noticed
  • 4. COVER Message Embedding Process Stego-Object Message Communication System
  • 5. Input data used • Cover of grayscale type (1000X674) • Message of grayscale type (256x256) • Why grayscale?
  • 6. Cover Image Message Image Stego-Image
  • 8. Least Significant Bit Substitution Cover Image Message Image Calculate size of message (rows ,columns) Convert each pixel value into binary Reserve first 20 pixels for hiding message size information Convert each pixel into binary Sequentially Replace LSB’s of cover image pixels with message bit
  • 9. Cover Image Message Image Stego-Image
  • 10. Histogram of Cover Image Histogram of Stego Image
  • 11. Difference between Histograms of Cover and Stego Image
  • 12. Size of Image Mean Square Error Peak Signal to Noise Ratio 100% 0.177 128.1002 75% 0.1188 132.1314 50% 0.0532 140.1627 25% 0.0123 154.8155
  • 13. LSB with Randomization  Instead to sequentially replacing the LSB’s of pixels of cover image with message bits ,the replacement is done on the basis of stego-key.  Stego-key is a stream of pseudo random numbers which lie between 0 and size of cover image
  • 14. COVER Message Embedding Process Stego-Object Message Stego-key Stego-key
  • 15. Histogram of Cover Image Histogram of Stego Image
  • 16. Difference between Histograms of Cover and Stego Image
  • 17. Size of Message Mean Square Error PSNR 100% 0.1904 127.4116 75% 0.1114 132.7703 50% 0.0501 140.7565 25% 0.0124 154.7397
  • 18. Extraction • Input: stego-image, key • Step1: Convert the secret message into bit stream (Length L) • Step2: Generate L number of pseudo random number using seed key • Step3: for i=1 to L { Get lsb of pixel denoted by ith pixel position Append this lsb into secret bit stream } • Step4: Convert secret bit stream into secret message • End Output: secret message
  • 19. History… • Shaving the head • Wood tablet covered with wax • Microdots • Invisible ink • Vexierbild • Acrostic • Paper mask
  • 20.
  • 21. • Book : Hypnerotomachia Poliphili • “ Poliam Frater Franciscus Columna peramavit”
  • 22. Wisdom from cryptography… We assume the method used to encipher the data is known to the opponent, so the security must lie in the choice of the key
  • 23. Example of public key steganography • One way to build public key steganography system is the use of public key cryptosystem. • Both cryptographic algorithms and embedding functions assumed to be publicly known. • ‘ Natural randomness’ indistinguishable from ciphertext.
  • 24. Attackers.. • Active attacker is not able to change the cover and its semantics entirely, but only make minor changes so that the original and modified cover-objects stay perceptually or semantically similar. • Malicious attacker forges messages or starts steganography protocols under the name of one communication partner.
  • 25. Active attackers… • Steganographic system is extremely sensitive to cover modification. • A system is called robust if the embedded information cannot be altered without making drastic changes to stego-object. • Trade-off between security and robustness. • Two approaches to make steganography robust: i. Making embedding process robust ii. Reverse the modifications that have been applied.
  • 26. Active attackers… • Robust algorithms have to place the information in perceptually most significant parts of the signal, since information encoded in noise component can be removed without great effort. • It is known that embedding rules operating in some transform domain of cover signal can be much more robust to modification than embedding algorithms operating in time domain. • Information is hidden in plain sight, so obviously, in fact, that it is impossible to modify without gross modifications to the transmitted object.
  • 27. LSB matching • In LSB replacement , the cover pixels with even values either remain unchanged or are increased by 1, while inverse is true for odd-valued pixels. • LSB replacement can be easily detected. • In LSB matching, 1 is either randomly added to or subtracted from cover pixel value. It is much harder to detect.
  • 28. Mielikainen’s improved LSB matching • Embedding is performed using a pair of pixels as a unit, where the LSB of the first pixel carries one bit of information, and a function of two pixel values carries another bit of information. • The modified method allows hiding the same payload as LSB matching but with fewer changes to the cover image.
  • 32. LSB replacement stego histogram..
  • 33. LSB matching stego histogram..
  • 34. Comparison 0.25 0.2 0.15 0.1 0.05 0 Mean Squared Error Simple LSB LSB with Randomization LSB Matching 100% 75% 50% 25% MSE Size of message