SlideShare a Scribd company logo
IMAGE
STEGANOGRAPHY IN LSB
Presented by:
Ritu Agarwal
9910103516
CRYPTOGRAPHY & STEGANOGRAPHY
CRYPTOGRAPHY :
The art of protecting information by transforming it
(encrypting it) into an unreadable format, called cipher text.
Only those who possess a secret key can decipher (or decrypt)
the message into plain text.
STEGANOGRAPHY:
Steganography is basically referred as hidden writing. It is
entirely different from cryptography. In cryptography ,we
basically perform the encryption and decryption by changing
the text into another form.
STEGANOGRAPHY
But in steganography, we do not change the text into
another form but just hide it into the image or audio so
that the attacker doesn’t know about the hidden message.
RSA algorithm is a part of cryptography in which a text
message is hidden in some other form. Using steganography
alongwith RSA algorithm works for 2-level security.
Introduction to RSAAlgorithm
TYPES
Types of Steganography:
1. Image Steganography
2. Text Steganography
3. Video Steganography
4. Protocol Steganography
5. Audio Steganography
HOW STEGANOGRAPHYWORKS
 Now the question is how steganography works!!
 In steganography first we select the text or any file that we
want to send to another person.
 Then we select the image or audio file in which we want
to hide our file(containing message).
 Then we use the steganography software for encryption.
 After encryption the text file is now converted in an image
file which contains our confidential data.
 Then the receiver will also use the same software for
decryption.
IMAGE STEGANOGRAPHY
WITH RSAALGORITHM
 How the image steganography works:
Before encrypting file into image file, we use the well
defined RSA Algorithm to increase the security of the data
transmission.
Then, we use this encrypted message to be encrypted
o9nce again into the image file.
 Every image is formed of the pixels. There are a number
of pixels in the image. Every pixel is formed of 24 bits.
Each pixel has 8 bits of red color, 8 bits of green color and
8 bits of blue color(RGB).
 Also the file that we want to send to the receiver is also formed
from a number of bits.
 Now the next step is to store every 3 bits of the file in every
pixel’s Least Significant bit (LSB) i.e. 1-1 bit in 8th bit of red ,
blue, green color bits.
 In this way our encryption will be done.
 In this way, decryption can also be performed by extracting the
8th bit of every color from each pixel.
CODE ANALYSIS
 First we extract the image by using
Image im=Image.fromfile(imagepath);
Get the height and width by im.height and im.width
Get the pixel info by using
Bitmap bt=new bitmap(im);
IMAGE STEGANOGRAPHY
 Now we extract the file and get the fileinfo by using
FileInfo fi=new FileInfo(filepath)
We convert the file into stream of bytes by using
fc=File.ReadAllBytes(file path)
 Now we perform the encryption
In encryption function, we start a loop and in loop we access
every byte of the file 3 times .
We also use the functions ‘byte2bool’ and ‘bool2byte’ which
converts byte into bits and vice-versa
 Starting from LSB, in the first iteration we first put 3 bits
of the file in the red pixel, then in the green one and in
third i.e. blue we put 2 bits.
 The chromatic influence of blue color is maximum for
human eye so we change only 2 bits of it.
 When all the bytes of the file are not able to store in the
last bits of every color then we start to replace the 7 th bit
of every color.
 In this way the storing capacity of the image file increases
but little noise is also increased in the image
 In the same way we can perform the decryption
THANK YOU

More Related Content

What's hot

Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
ABHIJEET KHIRE
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Steganography
SteganographySteganography
SteganographySonam M
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
 
Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
Tutorial Learners
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
James Ridgway
 
Steganography document
Steganography documentSteganography document
Steganography document
BSheghembe
 
Steganography
SteganographySteganography
Steganography
Josh Kumar
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
Mikel Solabarrieta
 
Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Image Security
Image SecurityImage Security
Image Security
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Steganography
SteganographySteganography
Steganography
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Stegnography
StegnographyStegnography
Stegnography
 

Viewers also liked

steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
Saurabh Kaushik
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
Preeti Yadav
 
Steganography
SteganographySteganography
Steganography
bhaskarnarula
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
Pratik Poddar
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
Girish Ram M
 
Steganography
SteganographySteganography
Steganography
PRACHETA BISWAS
 

Viewers also liked (9)

steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
File000133
File000133File000133
File000133
 
Steganography
SteganographySteganography
Steganography
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 

Similar to Steganography with RSA Algorithm

Rsa cryptography &steganography
Rsa cryptography &steganographyRsa cryptography &steganography
Rsa cryptography &steganography
Puneet Singla
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
Editor IJCATR
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
NAIM PARVEZ GALIB
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
VijayMaheshwari12
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
Omkar Rane
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
CSCJournals
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
9905234521
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Steganography
SteganographySteganography
Steganography
NarayanlalMenariya
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
Image steganography in python with an ea
Image steganography in python with an eaImage steganography in python with an ea
Image steganography in python with an ea
SandeshGajmal
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
IJMTST Journal
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
Be32364369
Be32364369Be32364369
Be32364369
IJERA Editor
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 

Similar to Steganography with RSA Algorithm (20)

Rsa cryptography &steganography
Rsa cryptography &steganographyRsa cryptography &steganography
Rsa cryptography &steganography
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Steganography
SteganographySteganography
Steganography
 
K0815660
K0815660K0815660
K0815660
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Image steganography in python with an ea
Image steganography in python with an eaImage steganography in python with an ea
Image steganography in python with an ea
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Be32364369
Be32364369Be32364369
Be32364369
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 

Recently uploaded

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 

Recently uploaded (20)

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 

Steganography with RSA Algorithm

  • 1. IMAGE STEGANOGRAPHY IN LSB Presented by: Ritu Agarwal 9910103516
  • 2. CRYPTOGRAPHY & STEGANOGRAPHY CRYPTOGRAPHY : The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. STEGANOGRAPHY: Steganography is basically referred as hidden writing. It is entirely different from cryptography. In cryptography ,we basically perform the encryption and decryption by changing the text into another form.
  • 3. STEGANOGRAPHY But in steganography, we do not change the text into another form but just hide it into the image or audio so that the attacker doesn’t know about the hidden message.
  • 4. RSA algorithm is a part of cryptography in which a text message is hidden in some other form. Using steganography alongwith RSA algorithm works for 2-level security. Introduction to RSAAlgorithm
  • 5. TYPES Types of Steganography: 1. Image Steganography 2. Text Steganography 3. Video Steganography 4. Protocol Steganography 5. Audio Steganography
  • 6. HOW STEGANOGRAPHYWORKS  Now the question is how steganography works!!  In steganography first we select the text or any file that we want to send to another person.  Then we select the image or audio file in which we want to hide our file(containing message).
  • 7.  Then we use the steganography software for encryption.  After encryption the text file is now converted in an image file which contains our confidential data.  Then the receiver will also use the same software for decryption.
  • 8. IMAGE STEGANOGRAPHY WITH RSAALGORITHM  How the image steganography works: Before encrypting file into image file, we use the well defined RSA Algorithm to increase the security of the data transmission. Then, we use this encrypted message to be encrypted o9nce again into the image file.
  • 9.  Every image is formed of the pixels. There are a number of pixels in the image. Every pixel is formed of 24 bits. Each pixel has 8 bits of red color, 8 bits of green color and 8 bits of blue color(RGB).
  • 10.  Also the file that we want to send to the receiver is also formed from a number of bits.  Now the next step is to store every 3 bits of the file in every pixel’s Least Significant bit (LSB) i.e. 1-1 bit in 8th bit of red , blue, green color bits.  In this way our encryption will be done.  In this way, decryption can also be performed by extracting the 8th bit of every color from each pixel.
  • 11.
  • 12. CODE ANALYSIS  First we extract the image by using Image im=Image.fromfile(imagepath); Get the height and width by im.height and im.width Get the pixel info by using Bitmap bt=new bitmap(im);
  • 13. IMAGE STEGANOGRAPHY  Now we extract the file and get the fileinfo by using FileInfo fi=new FileInfo(filepath) We convert the file into stream of bytes by using fc=File.ReadAllBytes(file path)
  • 14.  Now we perform the encryption In encryption function, we start a loop and in loop we access every byte of the file 3 times . We also use the functions ‘byte2bool’ and ‘bool2byte’ which converts byte into bits and vice-versa
  • 15.  Starting from LSB, in the first iteration we first put 3 bits of the file in the red pixel, then in the green one and in third i.e. blue we put 2 bits.  The chromatic influence of blue color is maximum for human eye so we change only 2 bits of it.  When all the bytes of the file are not able to store in the last bits of every color then we start to replace the 7 th bit of every color.
  • 16.  In this way the storing capacity of the image file increases but little noise is also increased in the image  In the same way we can perform the decryption