Top Banner
Project Guide : Mr. M. Suman Team Members : K. Sai Pranitha (07FE1A0419) T. Ushasri (07FE1A0423) M.V.R. Amaralingeswara Rao (08FE5A0417) V. Kanaka Rao (08FE5A0418) VIGNAN’S LARA INSTITUTE OF Image Based Steganography Using LSB Insertion Technique
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Image Based Steganography_Presentation

Project Guide : Mr. M. Suman

Team Members :

K. Sai Pranitha (07FE1A0419) T. Ushasri (07FE1A0423) M.V.R. Amaralingeswara Rao (08FE5A0417) V. Kanaka Rao (08FE5A0418)

VIGNAN’S LARA INSTITUTE OF TECHNOLOGY AND SCIENCE, VADLAMUDI

Image Based Steganography Using LSB Insertion Technique

Page 2: Image Based Steganography_Presentation

Steganographyfrom the Greek word ◦ ‘steganos’ meaning “covered”◦ ‘graphie’ meaning “writing”

Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination

It includes numerous secret communication methods that conceal the message’s very existence.

Anyone else viewing the message will fail to know it contains hidden/encrypted data

Image Based Steganography Using LSB Insertion Technique

Page 3: Image Based Steganography_Presentation

Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.

A message sent by a German spy in World WarII

Pershing sails from NY June 1Pershing sails from NY June 1

Image Based Steganography Using LSB Insertion Technique

Page 4: Image Based Steganography_Presentation

Pershing Sails from NY June 1Pershing Sails from NY June 1

Rot 13Rot 13

Crefuvat fnvyf sebz AL Whar 1Crefuvat fnvyf sebz AL Whar 1

Image Based Steganography Using LSB Insertion Technique

Page 5: Image Based Steganography_Presentation

Stego - key

Stego System Encoder

Stego - Object

Cover - object

Message

Image Based Steganography Using LSB Insertion Technique

Page 6: Image Based Steganography_Presentation

Steganography Tool

Steganography Tool

Steganography Tool

Steganography Tool

Message File

Message File

Cover File

Cover File

Message File

Message File

Steg File(with hidden

data)

Steg File(with hidden

data)

Steg File(with hidden

data)

Steg File(with hidden

data)

Hiding ImagesHiding Images Extracting ImagesExtracting Images

Image Based Steganography Using LSB Insertion Technique

Page 7: Image Based Steganography_Presentation

bmp jpeg gif wav mp3 Amongst others…

Image Based Steganography Using LSB Insertion Technique

Page 8: Image Based Steganography_Presentation

Image Based Steganography Using LSB Insertion Technique

Page 9: Image Based Steganography_Presentation

Image Based Steganography Using LSB Insertion Technique

Page 10: Image Based Steganography_Presentation

Common hiding techniques

◦ Appended to a file

◦ Hidden in the unused header portion of the file near the beginning of the file contents

◦ An algorithm is used to disperse the hidden message throughout the file Modification of LSB (Least Significant Bit) Other

Image Based Steganography Using LSB Insertion Technique

Page 11: Image Based Steganography_Presentation

Messages are encoded in the least significant bit of every byte in an image. By doing so, the value of each pixel is changed slightly, but not enough to make significant visual changes to the image, even when compared to the original.

Example: Inserting the word “bomb” using LSB techniques:

◦ b = 01100010◦ o = 01101111 ◦ m = 01101101 ◦ b = 01100010

Image bits:

Image Based Steganography Using LSB Insertion Technique

Page 12: Image Based Steganography_Presentation

Enhancing the least significant bits alerts investigators of possible embedding of hidden data.

bliss.bmp

No Steganography

Detected

bliss_stego.bmp

SteganographyDetected}

Image Based Steganography Using LSB Insertion Technique

}

Page 13: Image Based Steganography_Presentation

Methods of detecting the use of Steganography

◦ Visual Detection (JPEG, BMP, GIF, etc.)

◦ Audible Detection (WAV, MPEG, etc.)

◦ Statistical Detection (changes in patterns of the pixels or LSB – Least Significant Bit) or Histogram Analysis

◦ Structural Detection - View file properties/contents size difference date/time difference contents – modifications checksum

Image Based Steganography Using LSB Insertion Technique

Page 14: Image Based Steganography_Presentation

Detecting Steganography by viewing it. Original Image Steganograph

Image

Image Based Steganography Using LSB Insertion Technique

Page 15: Image Based Steganography_Presentation

Simplicity to embed the bits of message directly into the LSB plane of cover image.

High perceptual transparency of LSB.

Does not change the size of the file

Image Based Steganography Using LSB Insertion Technique

Page 16: Image Based Steganography_Presentation

If the picture with hidden info is converted to another format, then the hidden data ma be lost

If the message size is greater than cover image size, then the bandwidth required to transmit stego-image decreases

Image Based Steganography Using LSB Insertion Technique

Page 17: Image Based Steganography_Presentation

Digital watermarking.

Used in colour lasers to track the originating printer.

Confidential communication and secret data storing

Media database systems

Image Based Steganography Using LSB Insertion Technique

Page 18: Image Based Steganography_Presentation

1. www.ims.nus.edu.sg/Programs/imgsci/files/memon/sing_stego.pdf

2. www.ece.stevens-tech.edu/~mouli/lsbsteg.pdf

3. Chandramouli, R.;   Memon, N, Analysis of LSB based image steganography techniques, Image Processing, 2001. Proceedings., Thessaloniki , Greece.

4. T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in HS Venter, JHP Eloff, L Labuschagne and MM Eloff (eds), Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically)

5. Kesslet, Gary C. An Overview of Steganography for the Computer Forensics Examiner, Burlington, 2004.

6. en.wikipedia.org/wiki/Steganography

Image Based Steganography Using LSB Insertion Technique

Page 19: Image Based Steganography_Presentation

Image Based Steganography Using LSB Insertion Technique

Page 20: Image Based Steganography_Presentation

Image Based Steganography Using LSB Insertion Technique