Page 1
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 1/11
Presented by
Maheshwara MFID8115MAH
B.E-CSE.,IV yr
PSNA C!!e"e # En"$neer$n" % &e'hD$nd$"(! ,&a)$!nad(
E-Ma$! $d * shanter+")a$!.')
Cnta't n * ++/005
C!$## 2e(ben 3a)a!esh
FID818C4I B.E-CSE. IV r PSNA C!!e"e # En"$neer$n" % &e'h
D$nd$"(! ,&a)$!nad(
E-Ma$! $d * '!$##re(ben")a$!.')Cnta't n +8+//0
Page 2
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 2/11
ABSTRACT
In a ste"an"ra6h$' syste) the 'n#$dent$a!
te7t r 'n#$dent$a! $)a"e $s h$dden $ns$de a
'er $)a"e $n red(ndant b$t 6s$t$ns. A#ter
the 'n#$dent$a! $n#r)at$n $s e)bedded
$nt the 'er $)a"e the 'han"e $n
a66earan'e # the 'er $)a"e sh(!d nt be
a66arent t na9ed eye: s that nbdy w$!!
s(s6e't that s)eth$n" $s there $ns$de. &
)a9e $t st$!! se'(re the 'n#$dent$a! te7t r
$)a"e 'an be en'ry6ted and e)bedded.
A#ter $t $s bta$ned at the re'e$er $t 'an be
de'ry6ted. In th$s 6a6er we hae (sed
Internat$na! data en'ry6t$n a!"r$th) t
en'ry6t the 'n#$dent$a! $n#r)at$n and the
en'ry6ted te7t r $)a"e $s e)bedded $nt
the 'er $)a"e $n the #!!w$n" )anner.
&he 'er $)a"e $s d$$ded $nt bytes. In
ea'h byte ne b$t # the en'ry6ted data $s t
be e)bedded. In the #$rst byte the #$rst b$t
6s$t$n, $n the se'nd byte the se'nd b$t
6s$t$n, $n the th$rd byte the th$rd b$t
6s$t$n and s n t$!! the 8th byte. A"a$n $n
the +th byte the #$rst b$t 6s$t$n, $n the 1/th
byte the se'nd b$t 6s$t$n and s n t$!! the
1th byte. A"a$n $n the 10 th byte the 1st b$t
6s$t$n, $n the 18th byte the ;nd b$t 6s$t$n
And s n. &h$s tr$'9 $s 'nt$n(ed t$!! the
end # the en'ry6ted data. Nw th$s tta!
$)a"e sh(!d be sent t the re'e$er and
re'e$er sh(!d de'ry6t and "et the
'n#$dent$a! te7t r $)a"e.
Keywords-'$6her,ste"an"ra6hy,
'ry6t"ra6hy, en'ry6t$n, de'ry6t$n, ste",
e)bedd$n", $ntr(der.
I. INTRODUCTION
Ste"an"ra6hy $s the 6ra't$'e # h$d$n" 6r$ate
$n#r)at$n w$th $n s)eth$n" that a66ears t be
nth$n" (t # the (s(a!. Ste"an"ra6hy $s
'n#(sed w$th 'ry6t"ra6hy: bth are t 6rte't
6r$ate $n#r)at$n. Cry6t"ra6hy (ses
en'ry6t$n and de'ry6t$n. <here as
ste"an"ra6hy (ses en'ry6t$n, e)bedd$n" $nt
a 'er $)a"e and de'ry6t$n. S ste"an"ra6hy
$s a tw !ee! se'(r$ty )e'han$s). Een $n
ste"an"ra6hy n bdy w$!! s(s6e't that s)e
h$dden data $s there . Ste"an"ra6hy 'an be three
ty6es. &hse are* Ste"an"ra6hy $n $)a"es,
ste"an"ra6hy $n a(d$ and ste"an"ra6hy $n
$de. &h$s 6a6er re6resents ste"an"ra6hy $n
$)a"e $.e. the #$rst 'ate"ry. In th$s ty6e the
'er$n" #$!e $s an $)a"e where the 6r$ate
$n#r)at$n $s t be e)bedded. Here 6r$ate
$n#r)at$n )eans 6r$ate te7t r 6r$ate $)a"e.
In se'nd 'ate"ry the 'er #$!e $s a $de
$ns$de wh$'h the 6r$ate $n#r)at$n $s t be
e)bedded. In th$rd 'ate"ry the 'er #$!e $s an
a(d$.
Page 3
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 3/11
<hen h$d$n" $n#r)at$n $ns$de $)a"es
(s(a!!y 4SB =!east s$"n$#$'ant b$t> )ethd $s
(sed. & a ')6(ter an $)a"e $s s$)6!y a
#$!e that shws the d$##erent '!rs and
$ntens$t$es # !$"ht n d$##erent areas # an
$)a"e. B(t $n )y wr9 I hae (sed a
d$##erent a66ra'h. In the #$rst byte the #$rst
b$t 6s$t$n, $n the se'nd byte the se'nd
B$t 6s$t$n, $n the th$rd byte the th$rd b$t
6s$t$n and s n t$!! the 8th byte. A"a$n $n
&he +th byte the #$rst b$t 6s$t$n, $n the 1/th
byte the se'nd b$t 6s$t$n and s n t$!! the
1th byte. A"a$n $n the 10 th byte the 1st b$t
6s$t$n, $n the 18th byte the ;nd b$t 6s$t$n
and s n. &h$s tr$'9 $s 'nt$n(ed t$!! the end
# the en'ry6ted data. Here ne 6$nt we 'an
nte $s the !en"th # the 'er $)a"e sh(!d
be 8 t$)es than the '$6her data. <e hae
d$##erent ty6es # $)a"e #$!es !$9e BMP,
?PE@ et'. I hae (sed ?PE@. ?PE@ "$es
"d 6er#r)an'e
<hen $n#r)at$n $s h$dden $ns$de $de the
6r"ra) r 6ersn h$d$n" the $n#r)at$n
w$!! (s(a!!y (se the DC& =d$s'rete 's$ne
trans#r)> )ethd. DC& wr9s by s!$"ht!y
'han"$n" the ea'h # the $)a"es $n the
$de, s('h that $t $s nt nt$'eab!e.
Ste"an"ra6hy $n $de $s s$)$!ar t
ste"an"ra6hy $n $)a"e. <hen a s)a!!
a)(nt # $n#r)at$n $s h$dden $ns$de #
$de $t $s nt nt$'eab!e at a!!, hweer the
)re $n#r)at$n $t $s h$dden the )re
nt$'eab!e $t be')e. <hen h$d$n"
$n#r)at$n $ns$de a(d$ #$!es the te'hn$(e
(s(a!!y (sed $s !w b$t en'd$n" wh$'h $s
s)ewhat s$)$!ar t 4SB that $s "enera!!y
(sed $n $)a"es. &he 6rb!e) w$th !w b$t
en'd$n" $s that $t $s (s(a!!y nt$'eab!e t
the h()an ear s that $t $s a r$s9y )ethd.
&h$s )ethd wr9s by add$n" rand) n$ses
t the s$"na! the $n#r)at$n $s 'n'ea!
$ns$de a 'arr$er and s6read a'rss the
#re(en'y s6e'tr(). E'h h$d$n" $s yet
anther )ethd # h$d$n" $n#r)at$n $ns$de
an a(d$ #$!e. &h$s )ethd (ses the e'hes $n
s(nd #$!es $n rder t try and h$de the
$n#r)at$n. By s$)6!y add$n" e7tra s(nd
t an e'h $n a(d$ #$!e $n#r)at$n 'an be
'n'ea!ed.
Instead # h$d$n" the d$re't $n#r)at$n, $#
we h$de $ts '$6her by (s$n" a ')6!e7
a!"r$th) the syste) 'an atta$n anther !ee!
# se'(r$ty. In )y wr9 I hae (sed
Internat$na! data en'ry6t$n a!"r$th) t
en'ry6t at sender and de'ry6t at re'e$er.
&he sender and re'e$er sh(!d share the
9ey as 6er the a!"r$th). In se't$n ;, I hae
'!ear!y )ent$ned hw IDEA $s wr9$n" and
hw )y 6r6sed ste" syste) $s wr9$n".
Page 4
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 4/11
II. THE PROPOSED SYSTEM
&he ent$re 6r'ess 'an be (nderstd by
re#err$n" the #!!w$n" three se't$ns. Here I
hae d$s'(ssed ab(t IDEA and the
e)bedd$n" 6r'ess.
IDEA Algorithm
&he IDEA '$6her was dee!6ed by (e$a
4a$ and ?a)es Massey $n 1++/. It was 'a!!ed
PES =Pr6sed En'ry6t$n Standard>. &he
ne7t year, a#ter s)e 'are#(! er$#$'at$n $t
was 'a!!ed IPES =I)6red PES>. Its na)e
was 'han"ed t IDEA $n 1++;. IDEA $s
based n s)e $)6ress$e theret$'a!
#(ndat$ns and, a!th("h 'ry6tana!ys$s has
)ade s)e 6r"ress a"a$nst red('ed-r(nd
ar$ants, the a!"r$th) st$!! see)s strn". In
)y 6$n$n $t $s the best and )st se'(re
b!'9 '$6her a!"r$th) aa$!ab!e t the
6(b!$' at th$s t$)e. &he #(t(re # IDEA $s
nt '!ear. &here has been n r(sh t ad6t $t
as a re6!a'e)ent t DES, 6art!y be'a(se
6e6!e are st$!! wa$t$n", t see hw we!! the
a!"r$th) #ares d(r$n" the ')$n" years #
'ry6tana!ys$s.
IDEA $s a b!'9 '$6her: $t 6erates n
b$t 6!a$nte7t b!'9s. &he 9ey $s 1;8 b$ts
!n". &he sa)e a!"r$th) $s (sed #r bth
en'ry6t$n and de'ry6t$n. &he des$"n
6h$!s6hy beh$nd the a!"r$th) $s three
a!"ebra$' 6erat$ns are (sed: a!! 'an be
eas$!y $)6!e)ented $n bth hardware and
s#tware ;G. &he 6erat$ns are* 2,
Add$t$n )d(! ;1 and M(!t$6!$'at$n
)d(! =;1 1>. &hese 6erat$ns 6erate
n 1 b$t s(b-b!'9s.
F$".1 re6resents an er$ew # IDEA. &he
-b$t data b!'9 $s d$$ded $nt #(r 1 b$t
s(b b!'9s* 1, ;, and . &hese #(r
s(b b!'9s be')e the $n6(t t the #$rst
r(nd # the a!"r$th). &here are e$"ht
r(nds tta!. In ea'h r(nd the #(r s(b
b!'9s are 2ed, added and )(!t$6!$ed
w$th ne anther and w$th 1-b$t s(b 9eys.
Between r(nds, the se'nd and th$rd s(b
b!'9s are swa66ed. F$na!!y, the #(r s(b
b!'9s are ')b$ned w$th #(r s(b 9eys $n
an (t6(t trans#r)at$n.
Page 5
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 5/11
F$".1 IDEA a!"r$th)
In ea'h r(nd the se(en'e # 'a!'(!at$ns $sas #!!ws*
1. M(!t$6!y 1 and the #$rst s(b 9ey J1.
;. Add ; and se'nd s(b 9ey J;.. Add and the th$rd s(b 9ey J.
. M(!t$6!y and the #(rth s(b 9ey J.5. 2 the res(!ts # ste6s 1 and .
. 2 the res(!ts # ste6s ; and .
0. M(!t$6!y the res(!ts # ste6 5 w$th the #$#th
S(b 9ey J5.8. Add the res(!ts # ste6s and 0.
+. M(!t$6!y the res(!ts # ste6 8 w$th the
s$7th s(b 9ey J.
1/. Add the res(!ts # ste6s 0 and +.11. 2 the res(!ts # ste6s 1 and +.1;. 2 the res(!ts # ste6s and +.
1. 2 the res(!ts # ste6s ; and 1/.
1. 2 the res(!ts # ste6s and 1/.
&he (t6(t # the r(nd $s the #(r s(b
b!'9s that are the res(!ts # ste6s 11, 1;, 1,
and 1. Swa6 the tw $nner b!'9s e7'e6t
#r the !ast r(nd and that $s the $n6(t t the
ne7t r(nd. A#ter the e$"hth r(nd, there $s a#$na! (t6(t trans#r)at$n*
1. M(!t$6!y 1 and the #$rst s(b 9ey J1.;. Add ; and se'nd s(b 9ey J;.
. Add and the th$rd s(b 9ey J.
. M(!t$6!y and the #(rth s(b 9ey J.
F$na!!y the #(r s(b b!'9s are reatta'hed t
6rd('e the '$6her te7t. Creat$n" the s(b
9eys $s a!s easy. &he a!"r$th) (ses 5; #the) =s$7 #r ea'h # the e$"ht r(nds and
#(r )re #r the (t6(t trans#r)at$n.
F$rst, the 1;8-b$t 9ey $s d$$ded $nt e$"ht
1-b$t s(b 9eys. &hese are the #$rst e$"ht s(b9eys #r the a!"r$th) =the s$7 #r the #$rst
r(nd and the #$rst tw #r the se'ndr(nd>. &hen the 9ey $s rtated ;5 b$ts t the
!e#t and a"a$n d$$ded $nt e$"ht s(b 9eys.
&he #$rst #(r are (sed $n r(nd ;: the !ast#(r are (sed $n r(nd . &he 9ey $s rtated
anther ;5 b$ts t the !e#t #r the ne7t e$"ht
s(b 9eys, and s n (nt$! the end # the
a!"r$th). De'ry6t$n $s e7a't!y the sa)e,e7'e6t that the s(b 9eys are reersed and
s!$"ht!y d$##erent. &he de'ry6t$n s(b 9eys
are e$ther the add$t$e r )(!t$6!$'at$e$nerses # the en'ry6t$n s(b 9eys. Fr the
6(r6se # IDEA, the a!! Ker s(b b!'9 $s
'ns$dered t re6resent ;1 L -1 #r)(!t$6!$'at$n )d(! ;1 1: th(s the
)(!t$6!$'at$e $nerse # / $s /G. Ca!'(!at$n"
these 9eys ta9es s)e d$n", b(t y( n!y
hae t d $t n'e #r ea'h de'ry6t$n 9ey.
&he E)bedd$n" Pr'ess
&he 'er $)a"e $s t be 'nerted t
b$nary. &he 6r$ate $n#r)at$n $s t be
'nerted t b$nary. &hen $t sh(!d be
en'ry6ted by IDEA a!"r$th) t "et the
'$6her te7t. &he '$6her te7t 'an be e)bedded
Page 6
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 6/11
$nt the 'er $)a"e. &here are )any ways
# e)bedd$n". &he )st (s(a! way $s 4SB
=!east s$"n$#$'ant b$t> $nsert$n 1G. ne b$t #
the '$6her $s e)bedded $nt the 1st b$t #
ea'h byte # the 'er $)a"e. In th$s 6a6er I
(sed a d$##erent a66ra'h. In the #$rst byte
the #$rst b$t 6s$t$n, $n the se'nd byte the
se'nd b$t 6s$t$n, $n the th$rd byte the
th$rd b$t 6s$t$n and s n t$!! the 8 th byte.
A"a$n $n the +th byte the #$rst b$t 6s$t$n, $n
the 1/th byte the se'nd b$t 6s$t$n and s
n t$!! the 1th byte. A"a$n $n the 10 th byte
the 1st b$t 6s$t$n, $n the 18 th byte the ;nd b$t
6s$t$n and s n. &h$s tr$'9 $s 'nt$n(ed
t$!! the end # the en'ry6ted data. Here ne
6$nt we 'an nte $s the !en"th # the 'er
$)a"e sh(!d be 8 t$)es than the '$6her
data. A!s $# the !en"th # the '$6her data $s
!ess than 18th # the 'er $)a"e then Kers
are t be added t the '$6her t )a9e $ts
!en"th 18th # the 'er $)a"e. &he re'e$er
w$!! '!!e't the '$6her #r) the res6e't$e b$t
6s$t$ns and de'ry6t $t t "et the a't(a!
$n#r)at$n. &he IDEA a!"r$th) (ses a
ery ')6!e7 'a!'(!at$n s $t w$!! be ery
d$##$'(!t #r the $ntr(der t ha'9 the data.
III. ALGORITHMS
Algorithm1 (Text in Image)
Ste61- Cnert the 'er $)a"e t b$nary
Ste6; Cnert the 6r$ate data t b$nary.
Ste6 Ma9e s(re that the !en"th # 'er
$)a"e $s e7a't!y 8 t$)es than that # the
6r$ate data. I# the 'er $)a"e $s !ess than 8
t$)es, then a b$""er $)a"e 'an be ta9en, r
$# the !en"th # 6r$ate data $s !ess than 18th
# the 'er $)a"e than Keres 'an be
6added.
Ste6 A66!y$n" IDEA a!"r$th) t
en'ry6t the 6r$ate data by (s$n" the 1;8-b$t
9ey. Nw we "t the '$6her.
Ste65 E)bed the '$6her $nt the 'er
$)a"e as d$s'(ssed $n se't$n II.
Ste6 Nw send the tta! $)a"e t re'e$er
Ste60 2e'e$er '!!e'ts the b$ts #r) ea'h
byte #r) the d$##erent b$t 6s$t$ns as he
9nws the 6s$t$ns and a66!$es the IDEA
a!"r$th) w$th the sa)e 1;8-b$t =as (sed by
sender> 9ey t de'ry6t and "et the h$dden
$n#r)at$n.
Page 7
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 7/11
Algorithm2 (Image in Image)
Ste61- Cnert the 'er $)a"e t b$nary
Ste6; Cnert the 6r$ate $)a"e t b$nary.
Ste6 Ma9e s(re that the !en"th # 'er
$)a"e $s e7a't!y 8 t$)es than that # the
6r$ate $)a"e. I# the 'er $)a"e $s !ess than
8 t$)es then a b$""er $)a"e 'an be ta9en, r
$# the !en"th # 6r$ate $)a"e $s !ess than
18th # the 'er $)a"e than Keres 'an be
6added.
Ste6 A66!y$n" IDEA a!"r$th) t
en'ry6t the 6r$ate $)a"e by (s$n" the 1;8-
b$t 9ey. Nw we "t the '$6her.
Ste65 E)bed the '$6her $nt the 'er
$)a"e as d$s'(ssed $n se't$n II.
Ste6 Nw send the tta! $)a"e t re'e$er
Ste60 2e'e$er '!!e'ts the b$ts #r) ea'h
byte #r) the d$##erent b$t 6s$t$ns as he
9nws the 6s$t$ns and a66!$es the IDEA
a!"r$th) w$th the sa)e 1;8-b$t =as (sed by
sender> 9ey t de'ry6t and "et the h$dden
$)a"e.
IV THE SECURITY OF THE SYSTEM
&here are tw !ee!s # se'(r$ty $n th$s
6r6sed ste" syste). F$rst!y the $ntr(der
'annt s(s6e't by see$n" the $)a"e that
there $s s)eth$n" h$dden $ns$de $t. I# at a!!
he s(s6e'ts then what are the b$t 6s$t$ns,
hw he w$!! $dent$#y. I# the b$t 6s$t$ns
$dent$#$ed hw he 'an "et the 9ey t de'ry6t
the '$6her. I# the $ntr(der w$!! try t ha'9 by
h$t and tr$a! )ethd he )ay ta9e years
t"ether.
V. EXPERIMENTAL RESULTS
A!"r$th)1- F$".; re6resents hw the te7t $s
h$dden $ns$de the $)a"e. F$". re6resents the
trans)$tted $)a"e and #$". re6resents the
de'ry6t$n at the re'e$er.
Page 8
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 8/11
F$".; h$d$n" the te7t $n the $)a"e
&he 6r$ate te7t t be h$dden $s* we w$!!
)eet t)rrw at + AMO. &he 'er $)a"e
F$". &rans)$tted I)a"e=&e7t $s h$dden>
Page 9
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 9/11
F$". De'ry6t$n at the re'e$er
A!"r$th);-F$".5 re6resents hw the 6r$ate
$)a"e $s h$dden $ns$de the 'er $)a"e.
F$".- re6resents the trans)$tted tta! $)a"e
and #$".0 re6resents the de'ry6t$n at the
re'e$er.
F$".5 h$d$n" # the $)a"e $ns$de the 'er
$)a"e
&he !e#t s$de $)a"e shwn $n #$".5 $s the
6r$ate $)a"e t be h$dden $n s$de the r$"ht
s$de $)a"e.
Page 10
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 10/11
F$". &rans)$tted tta! I)a"e
F$".0 De'ry6t$n at the re'e$er
VI COC!"#IO
• As we 'an bsere #r) the res(!ts
bth the a!"r$ths wr9s ery #$ne.
# '(rse I hae bsered by ta9$n"
ther sa)6!es a!s.
• It 6r$des )(!t$6!e !ee!s #
se'(r$ty. I# at a!! the $ntr(der
s(s6e'ts $t $s ery ery d$##$'(!t #r
h$) t ha'9 the data.
• B(t the )a$n de)er$t $s the sender
and re'e$er sh(!d a"ree the b$t
$nsert$n 6s$t$ns and the 9ey. &he
$)a"e (a!$ty s!$"ht!y de"rades.
• &h$s 6r'ess 'an be e7tended t send
6r$ate $)a"e $n 'er $)a"e.
• It 'an a!s be re#erred t de$se new
6r'ess hw t send 6r$ate
data$)a"e $n a(d$ as we!! as $de.
Page 11
8/14/2019 Image in image steganography
http://slidepdf.com/reader/full/image-in-image-steganography 11/11
$E%E$ECE#
1G Mha))ad A!$ Ban$ (nes, A)an
?antan, A New Ste"an"ra6hy A66ra'h
#r I)a"e En'ry6t$n E7'han"e by (s$n" the
4SB $nsert$nO, I?CSNS Internat$na!
?(rna! # C)6(ter S'$en'e % Netwr9
Se'(r$ty, V! 8, N , ?(ne ;//8.
;G Antt$ Ha)a!anen, Matt$ &))$s9a and
?r)a S9ytta, .08 @$"ab$ts
I)6!e)entat$n # the IDEA Cry6t"ra6h$'
A!"r$th)O, 1;th 'n#eren'e n F$e!d
Pr"ra))ab!e 4"$' and A66!$'at$ns,
Mnt6e!!$er, Fran'e, Se6t ;//;.
G A!6hae$s Man"arae, In Art$'!e Jne-
H.r"GO Mar'h 18th ;//.
G M$rs!a Dbs$'e9, In Art$'!e Mdern
Cry6t"ra6hyO, CKe'9 &e'hn$'a! n$ers$ty
$n Pra"(e.
5G 2ss ?. Andersn, Fab$an A.P.
Pet$t'!as,
n &he 4$)$ts # ste"an"ra6hyO, IEEE
?(rna! # se!e'ted Areas $n '))(n$'at$n,
1=>, 0-81, May 1++8.