SlideShare a Scribd company logo
Steganography Part-2
H E E T H E S H V H A V L E
BMS COLLEGE OF ENGINEERING
Steganography
Hiding messages within other files
Like images, audios, videos, webpages…
Steganography
Hiding the existence of messages
JPEG Images
Steps Involved
1. Preprocessing
2. Transformation
3. Quantization
4. Encoding
Step 1: Preprocessing
First step is to convert red, green, blue color
channels to YCbCr space.
Y – Luminance
CbCr – Chrominance
Human eyes are more sensitive to Luminance
channel than the chrominance channel.
Grayscale images contain only
Luminance Channel.
Step 1: Preprocessing
Partition the images into blocks of 8x8 pixels
Step 1: Preprocessing
Partition the images into blocks of 8x8 pixels
Step 1: Preprocessing
Partition the images into blocks of 8x8 pixels
5 176 193 168 168 170 167 165
6 176 158 172 162 177 168 151
5 167 172 232 158 61 145 214
33 179 169 174 5 5 135 178
8 104 180 178 172 197 188 169
63 5 102 101 160 142 133 139
51 47 63 5 180 191 165 5
49 53 43 5 184 170 168 74
Pixel intensities of the block row 4, block column 28.
Step 1: Preprocessing
Subtract 127 from each pixel intensity in each block
5 176 193 168 168 170 167 165
6 176 158 172 162 177 168 151
5 167 172 232 158 61 145 214
33 179 169 174 5 5 135 178
8 104 180 178 172 197 188 169
63 5 102 101 160 142 133 139
51 47 63 5 180 191 165 5
49 53 43 5 184 170 168 74
Pixel intensities of the block row 4, block column 28.
-122 49 66 41 41 43 40 38
-121 49 31 45 35 50 41 24
-122 40 45 105 31 -66 18 87
-94 52 42 47 -122 -122 8 51
-119 -23 53 51 45 70 61 42
-64 -122 -25 -26 33 15 6 12
-76 -80 -64 -122 53 64 38 -122
-78 -74 -84 -122 57 43 41 -53
Pixel intensity values less 127 in block row 4, block column 28.
Step 2: Transformation
Transformation from Spatial Domain to Frequency
Domain to separate out the high and low frequencies.
JPEG compression algorithm uses the
Discrete Cosine Transform (DCT).
That’s a lot of computation!
(Around 4096 computations for each block)
Step 2: Transformation
Humans are unable to see aspects of an image that are
at really high frequencies. Since taking the DCT allows
us to isolate where these high frequencies are, we can
take advantage of this in choosing which values to
preserve. By multiplying the DCT matrix by some mask,
we can zero out elements of the matrix, thereby freeing
the memory that had been representing those values
Step 2: Transformation
-27.500 -213.468 -149.608 -95.281 -103.750 -46.946 -58.717 27.226
168.229 51.611 -21.544 -239.520 -8.238 -24.495 -52.657 -96.621
-27.198 -31.236 -32.278 173.389 -51.141 -56.942 4.002 49.143
30.184 -43.070 -50.473 67.134 -14.115 11.139 71.010 18.039
19.500 8.460 33.589 -53.113 -36.750 2.918 -5.795 -18.387
-70.593 66.878 47.441 -32.614 -8.195 18.132 -22.994 6.631
12.078 -19.127 6.252 -55.157 85.586 -0.603 8.028 11.212
71.152 -38.373 -75.924 29.294 -16.451 -23.436 -4.213 15.624
DCT values in block row 4, block column 28.
Step 2: Transformation
Step 3: Quantization
The next step in the JPEG algorithm is
the quantization step. Here we will make decisions about
values in the transformed image - elements near zero will
converted to zero and other elements will be shrunk so
that their values are closer to zero. All quantized values
will then be rounded to integers.
Quantization makes the JPEG algorithm an example
of lossy compression.
Step 3: Quantization
To quantize the above block, the JPEG algorithm first
divides each element by a prescribed value and then
rounds the result to produce integers. The values that are
used in the element-wise division step are given in
matrix Z below:
Step 3: Quantization
-2 -19 -15 -6 -4 -1 -1 0
14 4 -2 -13 0 0 -1 -2
-2 -2 -2 7 -1 -1 0 1
2 -3 -2 2 0 0 1 0
1 0 1 -1 -1 0 0 0
-3 2 1 -1 0 0 0 0
0 0 0 -1 1 0 0 0
1 0 -1 0 0 0 0 0
DCT values in block row 4, block column 28.
Step 3: Quantization
Step 4: Encoding
The last step in the JPEG process is to encode the
transformed and quantized image. The regular JPEG
standard uses an advanced version of Huffman coding. The
original image has dimensions 160 x 240 so that
160*240*8 = 307,200 bits are needed to store it to disk. If
we apply Huffman coding to the transformed and
quantized version of the image, we need only 85,143 bits
to store the image to disk. The compression rate is about
2.217bpp. This represents a savings of over 70% of the
original amount of bits needed to store the image!
JPEG Steganography
JPEG Steganography
There are various different steganography techniques for
JPEG images. One of the most common and popular one is
the LSB Steganography technique!
Various other algorithms include the F5
algorithm which uses a password using permutations
using a random generator.
Some more advanced algorithms are available
such as the SWAP DCT algorithm.
Least Significant Bit
Why the LSB method?
Image: 100x50
Total: 5000 pixels
1 pixel -> 3 Bytes
(R: 1 byte, G: 1 byte, B: 1 byte)
R: 1000 0010 G: 1010 0111 B: 0110 1001
Total of 5000 bits for hiding
Or 625 bytes (5000/8)
And this is just using 1 bit from each channel
JPEG Steganography
Some popular tools include:
Virtual Steganography Laboratory
StegJpeg
JSteg
Files such as images, audio, video and even this
PPT file can be embedded in a JPEG image!
JPEG Steganalysis
Uses Chi-Square attack to detect typical histogram change.
Difference between the theoretical expected frequency.
Can be categorized as first order statistical attack.
JPEG Steganalysis
Some other statistical methods for
StegAnalysis include:
Steganalysis Using Markov Model
Using SVM (Support Vector Machine) Classifier
(Basically this is pattern recognition)
Train it  Predict it
Questions?
Thank You!

More Related Content

What's hot

Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
SondosFadl
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
Dr. Kapil Gupta
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWT
IJSRD
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
IJEEE
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
Mazin Alwaaly
 
Dct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decompositionDct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decompositionMuhammad Younas
 
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
ijistjournal
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
Hossain Md Shakhawat
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transformHarshal Ladhe
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AIC
Touradj Ebrahimi
 
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXSQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
ijcsit
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
SondosFadl
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild Web
Symeon Papadopoulos
 
Jpeg dct
Jpeg dctJpeg dct
Jpeg dct
darshan2518
 
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Koteswar Rao Jerripothula
 
Naveen 9911103606 major ppt
Naveen 9911103606 major pptNaveen 9911103606 major ppt
Naveen 9911103606 major ppt
Naveen Rajgariya
 
Compression using JPEG
Compression using JPEGCompression using JPEG
Compression using JPEGSabih Hasan
 

What's hot (19)

Copy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial DomainCopy-Rotate-Move Forgery Detection Based on Spatial Domain
Copy-Rotate-Move Forgery Detection Based on Spatial Domain
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
 
A Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWTA Review on Image Compression using DCT and DWT
A Review on Image Compression using DCT and DWT
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Dct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decompositionDct,gibbs phen,oversampled adc,polyphase decomposition
Dct,gibbs phen,oversampled adc,polyphase decomposition
 
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
 
DCT
DCTDCT
DCT
 
Jpeg compression
Jpeg compressionJpeg compression
Jpeg compression
 
Image compression using discrete wavelet transform
Image compression using discrete wavelet transformImage compression using discrete wavelet transform
Image compression using discrete wavelet transform
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AIC
 
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXSQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
 
FAN search for image copy-move forgery-amalta 2014
 FAN search for image copy-move forgery-amalta 2014 FAN search for image copy-move forgery-amalta 2014
FAN search for image copy-move forgery-amalta 2014
 
Detecting image splicing in the wild Web
Detecting image splicing in the wild WebDetecting image splicing in the wild Web
Detecting image splicing in the wild Web
 
Jpeg dct
Jpeg dctJpeg dct
Jpeg dct
 
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
Image segmentation using advanced fuzzy c-mean algorithm [FYP @ IITR, obtaine...
 
Project004
Project004Project004
Project004
 
Naveen 9911103606 major ppt
Naveen 9911103606 major pptNaveen 9911103606 major ppt
Naveen 9911103606 major ppt
 
Compression using JPEG
Compression using JPEGCompression using JPEG
Compression using JPEG
 

Similar to Steganography Part 2

image processing for jpeg presentati.ppt
image processing for jpeg presentati.pptimage processing for jpeg presentati.ppt
image processing for jpeg presentati.ppt
naghamallella
 
CyberSec_JPEGcompressionForensics.pdf
CyberSec_JPEGcompressionForensics.pdfCyberSec_JPEGcompressionForensics.pdf
CyberSec_JPEGcompressionForensics.pdf
MohammadAzreeYahaya
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
VLSICS Design
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
VLSICS Design
 
Squashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse MatrixSquashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse Matrix
AIRCC Publishing Corporation
 
Squashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse MatrixSquashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse Matrix
AIRCC Publishing Corporation
 
Why Image compression is Necessary?
Why Image compression is Necessary?Why Image compression is Necessary?
Why Image compression is Necessary?
Prabhat Kumar
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
sipij
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
lazchi
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
IOSR Journals
 
J017156874
J017156874J017156874
J017156874
IOSR Journals
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
siddharth rathore
 
Image Compression
Image CompressionImage Compression
Image Compression
Paramjeet Singh Jamwal
 
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...
CSCJournals
 
lossy compression JPEG
lossy compression JPEGlossy compression JPEG
lossy compression JPEG
Mahmoud Hikmet
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490IJRAT
 
JPEG
JPEGJPEG
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
IRJET Journal
 

Similar to Steganography Part 2 (20)

image processing for jpeg presentati.ppt
image processing for jpeg presentati.pptimage processing for jpeg presentati.ppt
image processing for jpeg presentati.ppt
 
CyberSec_JPEGcompressionForensics.pdf
CyberSec_JPEGcompressionForensics.pdfCyberSec_JPEGcompressionForensics.pdf
CyberSec_JPEGcompressionForensics.pdf
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
Squashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse MatrixSquashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse Matrix
 
Squashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse MatrixSquashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse Matrix
 
B070306010
B070306010B070306010
B070306010
 
Data compression
Data compressionData compression
Data compression
 
Why Image compression is Necessary?
Why Image compression is Necessary?Why Image compression is Necessary?
Why Image compression is Necessary?
 
Post-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest CodingPost-Segmentation Approach for Lossless Region of Interest Coding
Post-Segmentation Approach for Lossless Region of Interest Coding
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Jpeg and mpeg ppt
Jpeg and mpeg pptJpeg and mpeg ppt
Jpeg and mpeg ppt
 
Image Compression
Image CompressionImage Compression
Image Compression
 
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...
 
lossy compression JPEG
lossy compression JPEGlossy compression JPEG
lossy compression JPEG
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
 
JPEG
JPEGJPEG
JPEG
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
 

Recently uploaded

COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

Steganography Part 2

  • 1. Steganography Part-2 H E E T H E S H V H A V L E BMS COLLEGE OF ENGINEERING
  • 2. Steganography Hiding messages within other files Like images, audios, videos, webpages…
  • 5. Steps Involved 1. Preprocessing 2. Transformation 3. Quantization 4. Encoding
  • 6. Step 1: Preprocessing First step is to convert red, green, blue color channels to YCbCr space. Y – Luminance CbCr – Chrominance Human eyes are more sensitive to Luminance channel than the chrominance channel. Grayscale images contain only Luminance Channel.
  • 7. Step 1: Preprocessing Partition the images into blocks of 8x8 pixels
  • 8. Step 1: Preprocessing Partition the images into blocks of 8x8 pixels
  • 9. Step 1: Preprocessing Partition the images into blocks of 8x8 pixels 5 176 193 168 168 170 167 165 6 176 158 172 162 177 168 151 5 167 172 232 158 61 145 214 33 179 169 174 5 5 135 178 8 104 180 178 172 197 188 169 63 5 102 101 160 142 133 139 51 47 63 5 180 191 165 5 49 53 43 5 184 170 168 74 Pixel intensities of the block row 4, block column 28.
  • 10. Step 1: Preprocessing Subtract 127 from each pixel intensity in each block 5 176 193 168 168 170 167 165 6 176 158 172 162 177 168 151 5 167 172 232 158 61 145 214 33 179 169 174 5 5 135 178 8 104 180 178 172 197 188 169 63 5 102 101 160 142 133 139 51 47 63 5 180 191 165 5 49 53 43 5 184 170 168 74 Pixel intensities of the block row 4, block column 28. -122 49 66 41 41 43 40 38 -121 49 31 45 35 50 41 24 -122 40 45 105 31 -66 18 87 -94 52 42 47 -122 -122 8 51 -119 -23 53 51 45 70 61 42 -64 -122 -25 -26 33 15 6 12 -76 -80 -64 -122 53 64 38 -122 -78 -74 -84 -122 57 43 41 -53 Pixel intensity values less 127 in block row 4, block column 28.
  • 11. Step 2: Transformation Transformation from Spatial Domain to Frequency Domain to separate out the high and low frequencies. JPEG compression algorithm uses the Discrete Cosine Transform (DCT). That’s a lot of computation! (Around 4096 computations for each block)
  • 12. Step 2: Transformation Humans are unable to see aspects of an image that are at really high frequencies. Since taking the DCT allows us to isolate where these high frequencies are, we can take advantage of this in choosing which values to preserve. By multiplying the DCT matrix by some mask, we can zero out elements of the matrix, thereby freeing the memory that had been representing those values
  • 13. Step 2: Transformation -27.500 -213.468 -149.608 -95.281 -103.750 -46.946 -58.717 27.226 168.229 51.611 -21.544 -239.520 -8.238 -24.495 -52.657 -96.621 -27.198 -31.236 -32.278 173.389 -51.141 -56.942 4.002 49.143 30.184 -43.070 -50.473 67.134 -14.115 11.139 71.010 18.039 19.500 8.460 33.589 -53.113 -36.750 2.918 -5.795 -18.387 -70.593 66.878 47.441 -32.614 -8.195 18.132 -22.994 6.631 12.078 -19.127 6.252 -55.157 85.586 -0.603 8.028 11.212 71.152 -38.373 -75.924 29.294 -16.451 -23.436 -4.213 15.624 DCT values in block row 4, block column 28.
  • 15. Step 3: Quantization The next step in the JPEG algorithm is the quantization step. Here we will make decisions about values in the transformed image - elements near zero will converted to zero and other elements will be shrunk so that their values are closer to zero. All quantized values will then be rounded to integers. Quantization makes the JPEG algorithm an example of lossy compression.
  • 16. Step 3: Quantization To quantize the above block, the JPEG algorithm first divides each element by a prescribed value and then rounds the result to produce integers. The values that are used in the element-wise division step are given in matrix Z below:
  • 17. Step 3: Quantization -2 -19 -15 -6 -4 -1 -1 0 14 4 -2 -13 0 0 -1 -2 -2 -2 -2 7 -1 -1 0 1 2 -3 -2 2 0 0 1 0 1 0 1 -1 -1 0 0 0 -3 2 1 -1 0 0 0 0 0 0 0 -1 1 0 0 0 1 0 -1 0 0 0 0 0 DCT values in block row 4, block column 28.
  • 19. Step 4: Encoding The last step in the JPEG process is to encode the transformed and quantized image. The regular JPEG standard uses an advanced version of Huffman coding. The original image has dimensions 160 x 240 so that 160*240*8 = 307,200 bits are needed to store it to disk. If we apply Huffman coding to the transformed and quantized version of the image, we need only 85,143 bits to store the image to disk. The compression rate is about 2.217bpp. This represents a savings of over 70% of the original amount of bits needed to store the image!
  • 21. JPEG Steganography There are various different steganography techniques for JPEG images. One of the most common and popular one is the LSB Steganography technique! Various other algorithms include the F5 algorithm which uses a password using permutations using a random generator. Some more advanced algorithms are available such as the SWAP DCT algorithm.
  • 23. Why the LSB method? Image: 100x50 Total: 5000 pixels 1 pixel -> 3 Bytes (R: 1 byte, G: 1 byte, B: 1 byte) R: 1000 0010 G: 1010 0111 B: 0110 1001 Total of 5000 bits for hiding Or 625 bytes (5000/8) And this is just using 1 bit from each channel
  • 24. JPEG Steganography Some popular tools include: Virtual Steganography Laboratory StegJpeg JSteg Files such as images, audio, video and even this PPT file can be embedded in a JPEG image!
  • 25. JPEG Steganalysis Uses Chi-Square attack to detect typical histogram change. Difference between the theoretical expected frequency. Can be categorized as first order statistical attack.
  • 26. JPEG Steganalysis Some other statistical methods for StegAnalysis include: Steganalysis Using Markov Model Using SVM (Support Vector Machine) Classifier (Basically this is pattern recognition) Train it  Predict it