SlideShare a Scribd company logo
Project Guide: Dr. Jyoti Bharti
Project Members:
Lovely Mandal
Vriti Mathur
Dipesh Agrawal
Ankur Malik
Abstract
This project introduces a new methodology for
hiding a text data into an rgb image.
The proposed technique can encode any color image
files in order to protect confidential text data from
unauthorized access. It can be applied to a very small
images (24 × 24) as well as large images (1024 × 1024).
We use Image quality parameters: Peak Signal to
Noise Ratio, Mean Square Error and Entropy. This
method comprises of three steps: one for scanning the
image, second for message hiding and third for
decrypting the message from the image.

 Steganography is the art of hiding a message or data in the
form of text, image or multimedia into an image such that it
can’t be detectable by naked eyes.
Q. How it is different from Cryptography?
In cryptography, the original message is converted into
meaningless text, which can draw suspicion.
Compared to this, Steganography is more secure, as the very
existence of the message embedded in the image is concealed.
What is Steganography?

 Payload: Original message is called payload.
 Carrier Image: The image in which the message is
embedded is called Carrier Image.
 Stego-image: The image formed after hiding the payload
into Carrier Image is called Stego-image.
 Encryption technique or hiding technique: The
methodology used to hide the message into the image is
called encryption technique.
Steganographic Terms

 Scanning Technique: Processing
the image such that each pixel of
the image is traversed once is
called Scanning Technique.
 Decryption: The retrieval of
original message
from the Stego-image is called
Decryption
and the technique used is known
as Decryption technique.

 The method comprises of three steps:
1. Scanning
2. Encryption
3. Decryption
Proposed Work

 Consists of 2 traversals:
1. Spiral Traversal 2. Snake Traversal
Scanning

 Image is divided into blocks of 50 X 50 pixels.
 Blocks are traversed by Snake traversal.
 And within a block, pixels are traversed by Spiral
traversal.

 Carrier image is divided into red, green and blue
plane.
Encryption
we take another plane called Auxiliary matrix, and
set each of its values to 0.
Take message from user and convert to ascii
Traverse red plane with Scanning technique to search for pixel intensity
equal to that of ascii value.
If found ,then
convert the
corresponding
LSB of blue
plane to 1
and at corresponding
position of auxiliary
matrix write index of the
letter.
traverse auxiliary matrix with
scanning technique
and produce a
random order
of indices.
convert indices
into binary.
Store binary to the boundary values of LSB of green plane.

Merge all the planes to get the Stego-image.

Decryption
Divide Stego-image in red, green and blue planes.
LSB of blue
plane is
extracted.
LSB of green
plane is
extracted.
LSB of blue plane
traversed using
Scanning technique.
If value is found 1 then corresponding
value in red plane is taken.
Generates a random
order of intensity
value list.
69 80 76 72
Traverse boundary of LSB of green
plane, 4 pixels at a time.
0001= 1
0010= 2
0100= 4
0011= 3
Extract 4 bits at a time and
convert it into decimal.
Generate random order of
decimal digits.
These digits are indices.

Arrange random intensity values extracted earlier
according to the order of extracted indices.
69 80 76 72
72 69 76 80 Convert
ASCII
values into
charactersH E L P
This is the decrypted message

Results
Original image
Histogram of Original Image Histogram of Stego-image
Stego-image
PSNR
MSE
Entropy

 This technique results in less modification of bits
resulting in less randomness in the image. The image
quality metrics i.e. higher Peak Signal to Noise Ratio
(PSNR) and lower Mean Square errors itself prove
that the proposed technique has good quality of the
Stego-image.
Conclusion
STEGANOGRAPHY PRESENTATION SLIDES

More Related Content

What's hot

Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Steganography
SteganographySteganography
Steganography
Jitendra Singh Deshwal
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
VijayMaheshwari12
 
steganography
steganographysteganography
steganography
Manika Arora
 
Steganography
SteganographySteganography
Steganography
Kirthan S Holla
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Steganography
SteganographySteganography
Steganography
Khushbu Chudasama
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
Nikhil Tripathi
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Steganography ppt
Steganography pptSteganography ppt
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
VijayMaheshwari12
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
Fatema Panvelwala
 

What's hot (20)

Stegnography
StegnographyStegnography
Stegnography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 

Similar to STEGANOGRAPHY PRESENTATION SLIDES

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute People
paperpublications3
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
IOSR Journals
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
IJECEIAES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
ijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
ijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
IJCSEIT Journal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
akashreport
akashreportakashreport
akashreport
Akash Goel
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
eSAT Publishing House
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
eSAT Journals
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
nooriasukmaningtyas
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ijma
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 

Similar to STEGANOGRAPHY PRESENTATION SLIDES (20)

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute People
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
akashreport
akashreportakashreport
akashreport
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 

STEGANOGRAPHY PRESENTATION SLIDES

  • 1. Project Guide: Dr. Jyoti Bharti Project Members: Lovely Mandal Vriti Mathur Dipesh Agrawal Ankur Malik
  • 2. Abstract This project introduces a new methodology for hiding a text data into an rgb image. The proposed technique can encode any color image files in order to protect confidential text data from unauthorized access. It can be applied to a very small images (24 × 24) as well as large images (1024 × 1024). We use Image quality parameters: Peak Signal to Noise Ratio, Mean Square Error and Entropy. This method comprises of three steps: one for scanning the image, second for message hiding and third for decrypting the message from the image.
  • 3.   Steganography is the art of hiding a message or data in the form of text, image or multimedia into an image such that it can’t be detectable by naked eyes. Q. How it is different from Cryptography? In cryptography, the original message is converted into meaningless text, which can draw suspicion. Compared to this, Steganography is more secure, as the very existence of the message embedded in the image is concealed. What is Steganography?
  • 4.   Payload: Original message is called payload.  Carrier Image: The image in which the message is embedded is called Carrier Image.  Stego-image: The image formed after hiding the payload into Carrier Image is called Stego-image.  Encryption technique or hiding technique: The methodology used to hide the message into the image is called encryption technique. Steganographic Terms
  • 5.   Scanning Technique: Processing the image such that each pixel of the image is traversed once is called Scanning Technique.  Decryption: The retrieval of original message from the Stego-image is called Decryption and the technique used is known as Decryption technique.
  • 6.   The method comprises of three steps: 1. Scanning 2. Encryption 3. Decryption Proposed Work
  • 7.   Consists of 2 traversals: 1. Spiral Traversal 2. Snake Traversal Scanning
  • 8.   Image is divided into blocks of 50 X 50 pixels.  Blocks are traversed by Snake traversal.  And within a block, pixels are traversed by Spiral traversal.
  • 9.   Carrier image is divided into red, green and blue plane. Encryption
  • 10. we take another plane called Auxiliary matrix, and set each of its values to 0.
  • 11. Take message from user and convert to ascii
  • 12. Traverse red plane with Scanning technique to search for pixel intensity equal to that of ascii value. If found ,then convert the corresponding LSB of blue plane to 1 and at corresponding position of auxiliary matrix write index of the letter.
  • 13. traverse auxiliary matrix with scanning technique and produce a random order of indices. convert indices into binary.
  • 14. Store binary to the boundary values of LSB of green plane.
  • 15.  Merge all the planes to get the Stego-image.
  • 16.  Decryption Divide Stego-image in red, green and blue planes. LSB of blue plane is extracted. LSB of green plane is extracted.
  • 17. LSB of blue plane traversed using Scanning technique. If value is found 1 then corresponding value in red plane is taken. Generates a random order of intensity value list. 69 80 76 72
  • 18. Traverse boundary of LSB of green plane, 4 pixels at a time. 0001= 1 0010= 2 0100= 4 0011= 3 Extract 4 bits at a time and convert it into decimal. Generate random order of decimal digits. These digits are indices.
  • 19.  Arrange random intensity values extracted earlier according to the order of extracted indices. 69 80 76 72 72 69 76 80 Convert ASCII values into charactersH E L P This is the decrypted message
  • 20.  Results Original image Histogram of Original Image Histogram of Stego-image Stego-image PSNR MSE Entropy
  • 21.   This technique results in less modification of bits resulting in less randomness in the image. The image quality metrics i.e. higher Peak Signal to Noise Ratio (PSNR) and lower Mean Square errors itself prove that the proposed technique has good quality of the Stego-image. Conclusion