2. STEGANOGRAPHY
• Definition
Steganography is the technique of hiding secret data within an ordinary, non-secret,
file or message in order to avoid detection; the secret data is then extracted at its
destination. The use of steganography can be combined with encryption as an extra step
for hiding or protecting data.
Steganography can be used to conceal almost any type of digital content, including
text, image, video or audio content; the data to be hidden can be hidden inside almost
any other type of digital content. The content to be concealed through steganography
called hidden text is often encrypted before being incorporated into the innocuous
seeming cover text file or data stream. If not encrypted, the hidden text is commonly
processed in some way in order to increase the difficulty of detecting the secret content.
Steganography is practiced by those wishing to convey a secret message or code.
While there are many legitimate uses for steganography, malware developers have also
been found to use steganography to obscure the transmission of malicious code.
4. LEVEL O:-
The above diagram represents level 0 data flow diagram
of our proposed model of steganography using Inverse
Wavelet Transform and genetic Algorithm. The
proposed model accepts the input of cover image
(original image) from the entity of user interface. The
application also uses key for encrypting. Although the
final objective is to understand the intensity of RS
analysis for the different types of stego images to be
used, but for the sake of simplicity, the above figure
shows the protected user text message (encrypted) as
the obvious outcome of the proposed system.
5. LEVEL 1:-
The above diagram represents level 1 data flow diagram
of our proposed model of steganography using Inverse
Wavelet Transform and genetic Algorithm. So from
Fig.3, it can be seen that the main process {1.0} in level
0 is generically classified as two sub-process e.g.
Message Embedding {1.1} and Message Extraction
{1.2}, where the internal processing using Inverse
Wavelet Transform and Genetic Algorithm will lead to
design a robust application against RS-analysis. It
embeds the secret message in the cover media (e.g.
image, audio, video, etc.) to hide the existence of the
message. To resist to RS analysis, the influence on the
correlation of pixels needs to be compensated
6. THE STEPS OF THE CRIME
1.Download and extract the JPHS (JPEG Hide and JPEG Seek) tool:
gwdg.de site
Alpine Security site
2. Download a cover image (the image you will hide the data inside of) and a hide image (the image you
will hide inside the cover image):
The cover image should be roughly 10 times the size of the hide image. In our example, we will use a
HD Background as the cover image and a picture of a cute kitten as the hide image.
-Cover Image - background.jpg (found doing a Google search for "hd backgrounds)
Hide Image - kitten.jpg (found doing a Google search for "lilbub")
3. Run Jphswin. Accept the terms. Do the following:
Click on "Open jpeg", select "background.jpg" and click "open":
Save the steg'd file (the kitten.jpg file hidden in the background.jpg file) as another file name, so we can
compare the new file containing the hidden data with the original file. Click "Save jpeg as" and use the
file name "bridge.jpg" (or something different than the original name):