SlideShare a Scribd company logo
1 of 5
Download to read offline
NEW CHANNEL SELECTION RULE FOR JPEG STEGANOGRAPHY



OBJECTIVE:

      To improve higher security performance and reducing errors, the main
role of this project as present a new channel selection rule for Joint
Photographic Experts Group Steganography.



PROBLEM DIFINITION:

      The composite signal is subject to video lossy compression to become.
The message should survive the video lossy compression and can be identically
extracted from. This robustness constrain should have low distortion effect on
the reconstructed video as well as low effect on the data size (bit rate). Given
that can be identically extracted, in this paper; we use two metrics to evaluate
data-hiding algorithms in compressed video which are:


            1. Increase in data size: representing the overhead price paid for the
            embedded data;
            2. Drop in the reconstruction quality: this reconstruction is with
            quality loss than that without data hiding and is denoted by and
            expressed as the PSNR difference which is as well that of the
            quantity of the relative error and for P- and B-frame, respectively.
ABSTRACT:

              This paper deals with data hiding in compressed video. Unlike data
hiding in images and raw video which operates on the images themselves in the
spatial or transformed domain which are vulnerable to steganalysis, we target
the motion vectors used to encode and reconstruct both the forward predictive
(P)-frame and bidirectional (B)-frames in compressed video. The choice of
candidate subset of these motion vectors are based on their associated macro
block prediction error, which is different from the approaches based on the
motion vector attributes such as the magnitude and phase angle.


      A greedy adaptive threshold is searched for every frame to achieve
robustness while maintaining a low prediction error level. The secret message
bit stream is embedded in the least significant bit of both components of the
candidate motion vectors. The method is implemented and tested for hiding data
in natural sequences of multiple groups of pictures and the results are evaluated.
The evaluation is based on two criteria: minimum distortion to the reconstructed
video and minimum overhead on the compressed video size. Based on the
aforementioned criteria, the proposed method is found to performwell and is
compared to a motion vector attribute-based method from the literature.


EXISTING SYSTEM:

      The Existing System contained only steganography process for data
transfer without any security prediction. In this system developed new channel
selection method for data hiding, but it didn’t use any advanced methods and
factors for data hiding. So that, It produce lot of errors in the timing for image
decompress.
DISADVANTAGES:

            Less Security
            High amount of Perturbation Errors
            Very difficult for Image Decompression



PROPOSED SYSTEM:

      In proposed system contain advanced Perturbed Quantization rule for
data hiding. The process of data hiding as follows,

    LSB Algorithm
    Embedding data, which is to be hidden, into an image requires two files.
    The first is an innocent looking image that will hold the hidden
      information, called the cover image.
    The second file is the message – the information to be hidden



ADVANTAGES:

          Minimal detectable distortion
          Higher security performance

ALGORITHM USED:

      1. LSB (Least Significant Bit)
      2. AES (Advanced Encryption Standard)
ARCHITECTURE DIAGRAM:




                         Discrete Cosine
                           Transform
                                           Compressed
                                            Image File
                         Dividing And
  Input Image          Rounding Matrix                      Output
      File                                                 Image File
                                           Encode Secret
                                             Image Bits

                       Entropy Encoder




SYSTEM REQUIREMENTS:

Hardware requirements:

   Intel Pentium IV
   256/512 MB RAM
   1 GB Free disk space or greater
   1 GB on Boot Drive
   17” XVGA display monitor
      1 Network Interface Card (NIC
Software requirements:

   MS Windows XP/2000
   MS IE Browser 6.0/later
   MS .Net Framework 4.0
   MS Visual Studio.Net 2005
   Internet Information Server (IIS)
   MS SQL Server 2005
   Windows Installer 3.1



APPLICATIONS:

     1. Deductive Agencies
     2. Government Secret Code
     3. Military Agencies

More Related Content

What's hot

Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
IJRAT
 
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
CSCJournals
 
Dc31472476
Dc31472476Dc31472476
Dc31472476
IJMER
 

What's hot (14)

Q180304102109
Q180304102109Q180304102109
Q180304102109
 
Medical Image Compression
Medical Image CompressionMedical Image Compression
Medical Image Compression
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
 
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
 
IRJET- Remote Sensing Image Retrieval using Convolutional Neural Network with...
IRJET- Remote Sensing Image Retrieval using Convolutional Neural Network with...IRJET- Remote Sensing Image Retrieval using Convolutional Neural Network with...
IRJET- Remote Sensing Image Retrieval using Convolutional Neural Network with...
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Jl2516751681
Jl2516751681Jl2516751681
Jl2516751681
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
Dc31472476
Dc31472476Dc31472476
Dc31472476
 
Medical image compression
Medical image compressionMedical image compression
Medical image compression
 

Viewers also liked

Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
ZTech Proje
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
ZTech Proje
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
ZTech Proje
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
ZTech Proje
 

Viewers also liked (20)

Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
 
Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...Psdot 6 web based security analysis of opass authentication schemes using mob...
Psdot 6 web based security analysis of opass authentication schemes using mob...
 
Psdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptualPsdot 9 facial expression recognition in perceptual
Psdot 9 facial expression recognition in perceptual
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
Psdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visualPsdot 8 a weak security notion for visual
Psdot 8 a weak security notion for visual
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Psdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computingPsdot 15 performance analysis of cloud computing
Psdot 15 performance analysis of cloud computing
 
a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
Psdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computingPsdot 18 performance analysis of cloud computing
Psdot 18 performance analysis of cloud computing
 
message passing interface
message passing interfacemessage passing interface
message passing interface
 
Psdot 2 design and implementation of persuasive cued click-points and evalua...
Psdot 2 design and implementation of persuasive cued  click-points and evalua...Psdot 2 design and implementation of persuasive cued  click-points and evalua...
Psdot 2 design and implementation of persuasive cued click-points and evalua...
 
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...Psdot 3 building and maintaining trust in internet voting with biometrics aut...
Psdot 3 building and maintaining trust in internet voting with biometrics aut...
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 
Psdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering systemPsdot 13 robust data leakage and email filtering system
Psdot 13 robust data leakage and email filtering system
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 

Similar to Psdot 17 new channel selection rule for jpeg steganography

Similar to Psdot 17 new channel selection rule for jpeg steganography (20)

IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
 
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding...
 
Reversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulationReversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulation
 
Effective Compression of Digital Video
Effective Compression of Digital VideoEffective Compression of Digital Video
Effective Compression of Digital Video
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS  Designing an efficient image encr...
IEEE 2014 MATLAB IMAGE PROCESSING PROJECTS Designing an efficient image encr...
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Digital Image Processing - Image Compression
Digital Image Processing - Image CompressionDigital Image Processing - Image Compression
Digital Image Processing - Image Compression
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKING
 
Image Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency DomainImage Encryption Using Differential Evolution Approach in Frequency Domain
Image Encryption Using Differential Evolution Approach in Frequency Domain
 
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSIONA REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
A REVIEW ON LATEST TECHNIQUES OF IMAGE COMPRESSION
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniques
 
designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Psdot 17 new channel selection rule for jpeg steganography

  • 1. NEW CHANNEL SELECTION RULE FOR JPEG STEGANOGRAPHY OBJECTIVE: To improve higher security performance and reducing errors, the main role of this project as present a new channel selection rule for Joint Photographic Experts Group Steganography. PROBLEM DIFINITION: The composite signal is subject to video lossy compression to become. The message should survive the video lossy compression and can be identically extracted from. This robustness constrain should have low distortion effect on the reconstructed video as well as low effect on the data size (bit rate). Given that can be identically extracted, in this paper; we use two metrics to evaluate data-hiding algorithms in compressed video which are: 1. Increase in data size: representing the overhead price paid for the embedded data; 2. Drop in the reconstruction quality: this reconstruction is with quality loss than that without data hiding and is denoted by and expressed as the PSNR difference which is as well that of the quantity of the relative error and for P- and B-frame, respectively.
  • 2. ABSTRACT: This paper deals with data hiding in compressed video. Unlike data hiding in images and raw video which operates on the images themselves in the spatial or transformed domain which are vulnerable to steganalysis, we target the motion vectors used to encode and reconstruct both the forward predictive (P)-frame and bidirectional (B)-frames in compressed video. The choice of candidate subset of these motion vectors are based on their associated macro block prediction error, which is different from the approaches based on the motion vector attributes such as the magnitude and phase angle. A greedy adaptive threshold is searched for every frame to achieve robustness while maintaining a low prediction error level. The secret message bit stream is embedded in the least significant bit of both components of the candidate motion vectors. The method is implemented and tested for hiding data in natural sequences of multiple groups of pictures and the results are evaluated. The evaluation is based on two criteria: minimum distortion to the reconstructed video and minimum overhead on the compressed video size. Based on the aforementioned criteria, the proposed method is found to performwell and is compared to a motion vector attribute-based method from the literature. EXISTING SYSTEM: The Existing System contained only steganography process for data transfer without any security prediction. In this system developed new channel selection method for data hiding, but it didn’t use any advanced methods and factors for data hiding. So that, It produce lot of errors in the timing for image decompress.
  • 3. DISADVANTAGES:  Less Security  High amount of Perturbation Errors  Very difficult for Image Decompression PROPOSED SYSTEM: In proposed system contain advanced Perturbed Quantization rule for data hiding. The process of data hiding as follows,  LSB Algorithm  Embedding data, which is to be hidden, into an image requires two files.  The first is an innocent looking image that will hold the hidden information, called the cover image.  The second file is the message – the information to be hidden ADVANTAGES:  Minimal detectable distortion  Higher security performance ALGORITHM USED: 1. LSB (Least Significant Bit) 2. AES (Advanced Encryption Standard)
  • 4. ARCHITECTURE DIAGRAM: Discrete Cosine Transform Compressed Image File Dividing And Input Image Rounding Matrix Output File Image File Encode Secret Image Bits Entropy Encoder SYSTEM REQUIREMENTS: Hardware requirements:  Intel Pentium IV  256/512 MB RAM  1 GB Free disk space or greater  1 GB on Boot Drive  17” XVGA display monitor  1 Network Interface Card (NIC
  • 5. Software requirements:  MS Windows XP/2000  MS IE Browser 6.0/later  MS .Net Framework 4.0  MS Visual Studio.Net 2005  Internet Information Server (IIS)  MS SQL Server 2005  Windows Installer 3.1 APPLICATIONS: 1. Deductive Agencies 2. Government Secret Code 3. Military Agencies