Top Banner

of 32

Image Steganography Project by Ajit Kumar Satapathy

Apr 25, 2015

ReportDownload

Documents

ajitvssut

IMAGE STEGANOGRAPHYA PROJECT REPORT Submitted to Veer Surendra Sai University of Technology ,Burla in partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGYIN

COMPUTER SCIENCE AND ENGINEERING By

AJIT KUMAR SATAPATHYRegd No.-0801111094

Under guidance of Prof. Rakesh Mohanty

Degree of Computer Science and Engineering VEER SURENDRA SAI UNIVERSITY OF TECHNOLOGY : BURLA, ODISHA,INDIANOV 2011

2

VEER SURENDRA SAI UNIVERSITY OF TECHNOLOGY : BURLA

BONAFIDE CERTIFICATE

Certified that this project report

IMAGE STEGANOGRAPHY who carried out the

is the bonafide work of AJIT KUMAR SATAPATHY project work under my supervision.

SIGNATURE Prof.M.R.Kabat HEAD OF THE DEPARTMENT

SIGNATURE Prof .R.K.Mohanty SUPERVISOR

COMPUTER SCIENCE AND ENGG. VSSUT ,BURLA ODISHA

COMPUTER SCIENCE AND ENGG. VSSUT ,BURLA ODISHA

3 TABLE OF CONTENTS

CHAPTER NO. ABSTRACT

TITLE

PAGE NO. 6 7

LIST OF FIGURES

1.

INTRODUCTION

8

1.1 Steganography vs cryptography 1.2 Types of Steganography 1.2.1 Text stganography 1.2.1.1 Line shift coding 1.2.1.2 Word shift coding 1.2.1.3 Feature coding 1.2.1.4 Implementation 1.2.2 Image steganography 1.2.2.1 Least significant bits 1.2.2.2 Hiding the data 1.2.2.3 Recovery the data 1.2.2.4 Images detection 1.2.3 Audio Steganography 1.2.3.1 LSB Coding 1.2.3.2 Phase Coding 1.2.4 Video Steganogrphy 1.2.5 Need and applications of steganography

10 10 10 11 11 11 12 12 13 13 13 14 17 17 17 17 18

4

2 2.1 2.2 2.3 2.4 2.5 2.6 3 4

Literature Review TextSteganography:ANovelApproach Digital steganography for information security Digital signature authentication Digital Watermarking Steganography of plain text and image Morden Techniques of steganography

19 19 22 23 23 25 26 29 31

Multi segment steganography techniques Conclusion

5

ABSTRACT OF THE PAPER

In this paper I am going to introduce steganography and types of steganography mainly used in recent time. Mainly I am working on image steganography .first I am introduce some

concept on different types of steganography. Then I describe different techniques (classic as wellas modern techniques) of Image steganography. Then how it different from cryptography. In this

paper I am describing the complexity of the stego key serch.I am showing the Drawbacks of multi segment stganography techniques which used code table mechanism.

6 LIST OF FIGURES FIG.NO. TITLES

PAGE NO.

1 2 3 4 5 6 7

Overview of steganography process Steganography type diagram Text data Input image 15 Output image Output image by notepad 16 Covered data 1.jpg 36.1KB stego.jpg 36.3KB stegomessage 39.2KB LIST OF TABLE 1 code table

9 10 15 16

17 22

7

1. INTRODUCTIONThe word steganography is derived from the Greek words stegos meaning cover and grafia meaning writing ,defining it as covered writing . Steganography is one such prosecurity innovation in which secret data is embedded in a cover . The notion of data hiding or steganography was first introduced with the example of prisoners' secret message by Simmons in 1983 .

In ancient Greece, people used invisible ink or even the messengers body to write down messages and then hide them with wax- as a stego medium. Even earlier than the Greek use, there have been several dated messages found and embedded within the hieroglyphics of ancient Egyptian monuments . All these are methods used in previous years are also known as physical steganography. Nowadays we use different computer file formats to cover the message that the sender wants to hide. The medium used to carry the message is known as the cover medium. The medium after embedding or hiding the message is known as a stego medium. There are four basic cover media used nowadays for steganography purposes. The following formula (Equation 1.1) provides the idea behind the Steganographic process :

Cover medium + Hidden data + Stego_key = Stego_medium

fig 1.1

This process is shown in Figure 1.1. Assume three different characters for example Bob, Alice and Eve. Suppose Bob want to send a secret message M to Alice. So he can use one of the steganography techniques and hide the message. To increase complexity, he can also combine cryptography technique with steganography. Then Bob needs to send this stego data file to Alice. Alice when receive this stego data file, she needs to extract the original message by applying the decoding technique. If any eavesdropper, Eve, receive the stego data file the she is unable to detect that message is hidden in the stego file. This is the main advantage of using steganography method in communications as any third person cannotdetect that the conversation is going on. There are few well-known text steganography methods. One is to insert the secret message into a webpage or inside a markup language. In this method the message is hidden using html tags . In line

8 shift text steganography and in word shift text steganography the horizontal and vertical space between the two words is used to hide the message. The toughest text steganography technique is feature specific encoding, in which the characteristic of the letter is used to hide the message. There are some feature specific text steganography techniques available for different languages, for example : hindi characters .

Figure 1.. Overview of steganography process

9

1.1 Steganography vs CryptographySteganography and cryptography are closely related .Cryptography scrambles the message so they cant understand. Steganography hide the message that there no existence of the message in the first place , When steganography fails and the message can be detected ,it is still of no use as it is encrypted using cryptography techniques

1.2 Types of Steganography4 types of Steganography techniques are used that is text steganography ,image steganography,audio and video steganography.

steganography

Text

Audio Image Video

Fig 2 Steganography type diagram

.

10

1.2.1Text SteganographyText steganography can be achieved by altering the text formatting, or by altering certain characteristics of textual elements (e.g., characters). The goal in the design of coding methods is to develop alterations that are reliably decodable (even in the presence of noise) yet largely indiscernible to the reader. These criteria, reliable decoding and minimum visible change, are somewhat conflicting; herein lies the challenge in designing document marking techniques. The document format file is a computer file describing the document content and page layout (or formatting), using standard format description languages such as PostScript2, TeX, @off, etc. It is from this format file that the image - what the reader sees - is generated. The three coding techniques that we propose illustrate different approaches rather than form