Top Banner
N.BALA GANGADHAR (08X25A04 04) E.MALLIKARJUNA RAO (07X21A0418) D .VENKAT A GANESH (07X21A0414)
16

IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

Apr 09, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    1/16

    N.BALA GANGADHAR (08X25A0404)

    E.MALLIKARJUNA RAO (07X21A0418)

    D.VENKATA GANESH (07X21A0414)

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    2/16

    Steganography - Definitiony Steganography

    y from the Greek word steganos meaning covered

    y and the Greek word graphie meaning writing

    y Steganography is the process of hiding of a secret messagewithin an ordinary message and extracting it at its destination

    y Anyone else viewing the message will fail to know it containshidden/encrypted data

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    3/16

    Example

    Carrier File Carrier File with

    Hidden Message

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    4/16

    Other data hiding techniques..y Watermarking

    The main goal ofwatermarking is to hide a message m in someaudio or video (cover) data d, to obtain new data d',

    practically indistinguishable from d, by people, in such a waythat an eavesdropper cannot remove or replace m in d'.

    y Cryptography

    Cryptography is a technique to scramble a confidentialmessage to make it unreadable for a third party. But cannothide its presence, i.e., the location of the secret message isobvious.

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    5/16

    Steganography - Historyy 440B.C.

    y Histiaeus shaved the head of his most trusted slave and

    tattooed it with a message which disappeared after the hair

    had regrown. To instigate a revolt against Persians.

    y 1st and 2nd World Wars

    y German spies used invisible ink to print very small dots on

    letters.

    y Microdots Blocks of text or images scaled down to the

    size of a regular dot.

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    6/16

    Why Image Files?y Digital image data contains a great deal of redundant

    information (high capacity)

    y Unlike audio or video, typically no copyright issues to arousesuspicion

    y However, audio and video files have greater capacity thandigital images

    y Researchers discourage use of clip art, images with text, fewcolor variations, and/or distinct lines

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    7/16

    General

    General steganographicsteganographic modelmodel

    Steganographic algorithms are in general based on replacingnoise component of a digital object with a to-be-hidden

    message.

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    8/16

    Steganography technique:

    Least Significant Bity Messages are encoded in the least significant bit of every byte

    in an image. By doing so, the value of each pixel is changedslightly, but not enough to make significant visual in image,even when compared to the original image.

    Consider a pixel sequence:

    11100001 01100110 01100110 10111011

    10110001 10010010 01110110 00100101

    01000101 10001001 01110101 01000101

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    9/16

    Steganography Technique:Least Significant BitExample: Inserting the word b using LSB techniques in abovesequence:

    y b = 01100010

    After encoding the sequence is changed as below

    11100000 01100111 01100110 1011101010110000 10010010 01110111 00100100

    01000101 10001001 01110101 01000101

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    10/16

    Decryption

    yIn the decryption section we use steganalysis, which is used tofind out a stego-file among the given file.

    yThe embeded information can only be extracted by using aspecial extracting program called sniffer- dog program.

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    11/16

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    12/16

    Drawbacks of LSB technique

    y Limits the number of bytes that are available for holding the

    payload.

    y LSB technique can hide only 10% (or less) of the data amounts

    of the vessel data.

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    13/16

    To overcome drawbacks..

    y To overcome the drawbacks in the LSB technique BPCS

    technique.

    y In BPCS we can replace all of the noise-like regions in the bit-

    planes of the vessel image with secret data withoutdeteriorating the image quality.

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    14/16

    ResultOriginal image Stego image

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    15/16

    Conclusion

    yThis project describes a technique successfully embed data inan color image.

    yThe data extracted from the cover image also depends on thepixels values of the image.

  • 8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

    16/16

    THANK YO

    U