1 RCC Institute of Information Technology Canal South Road, Beliaghata, Kolkata – 700 015 [Affiliated to West Bengal University of Technology] IMAGE STEGANOGRAPHY USING DISCRETE COSINE TRNASFORM ALGORITHM PROJECT REPORT SUBMITTED FOR PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE DEGREE OF BACHELOR OF TECHNOLOGY In INFORMATION TECHNOLOGY Submitted by: Chandratapa Roy (IT/2014/013) (11700214030) Surela Saha (IT/2014/014) (11700214079) Shipra Jha (IT/2014/032) (11700214064) Under the Guidance of Mr. Amit Khan (Assistant Professor, RCCIIT)
31
Embed
IMAGE STEGANOGRAPHY USING DISCRETE COSINE … · This is to certify that the project report entitled “Image Steganography In Frequency Domain Using Discrete Cosine Transform Algorithm”
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
RCC Institute of Information Technology
Canal South Road, Beliaghata, Kolkata – 700 015
[Affiliated to West Bengal University of Technology]
IMAGE STEGANOGRAPHY USING DISCRETE COSINE
TRNASFORM ALGORITHM
PROJECT REPORT SUBMITTED FOR PARTIAL FULFILLMENT OF THE REQUIREMENT
FOR THE DEGREE OF
BACHELOR OF TECHNOLOGY
In
INFORMATION TECHNOLOGY
Submitted by:
Chandratapa Roy
(IT/2014/013)
(11700214030)
Surela Saha
(IT/2014/014)
(11700214079)
Shipra Jha
(IT/2014/032)
(11700214064)
Under the Guidance of Mr. Amit Khan
(Assistant Professor, RCCIIT)
2
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to Mr. Amit Khan of the department of Information
Technology, whose role as project guide was invaluable for the project. We are extremely thankful for
the keen interest he took in advising us, for the books and reference materials provided for the moral
support extended to us.
Last but not the least we convey our gratitude to all the teachers for providing us the technical skill
that will always remain as our asset and to all non-teaching staff for the gracious hospitality they
offered us.
Place: RCCIIT, Kolkata
Date: /05/2018
………………………………
Chandratapa Roy
………………………………
Surela Saha
………………………………
Shipra Jha
3
Department of Information Technology
RCCIIT, Beliaghata,
Kolkata – 700 015,
West Bengal, India
Approval
This is to certify that the project report entitled “Image Steganography In Frequency
Domain Using Discrete Cosine Transform Algorithm” prepared under my supervision by CHANDRATAPA ROY (Roll No.: IT 2014/013) , SURELA SAHA (Roll No.: IT 2014/014 ), SHIPRA JHA
(Roll No.: IT 2014/032) , be accepted in partial fulfillment for the degree of Bachelor of
Technology in Information Technology.
It is to be understood that by this approval, the undersigned does not necessarily endorse
or approve any statement made, opinion expressed or conclusion drawn thereof, but
approves the report only for the purpose for which it has been submitted.
………………………………… …………………………………
Dr. Abhijit Das Mr. Amit Khan Associate Professor and Head, Assistant Professor, Department of Information Technology, Department of Information Technology,
RCC Institute of Information Technology RCC Institute of Information Technology
4
INDEX
Serial No Topic Page No 1. 2. Abstract 5
2. 3. Literature Study 6
3. 4. Introduction 9
4. 5. Problem Definition 16
5. 6. Planning 17
6. 7. Design 19
7. 8. Results and Discussions 27
8. 9. Conclusion 30
9. 10. Bibliography 31
5
ABSTRACT
The purpose of this project is to automate the existing manual system with the help of computerized
equipments and full-fledged computer software, fulfilling their requirements, so that their valuable
data or information can be stored for longer period with easy accessing and manipulation of the
same. Basically the project describes how to manage for good performance and better services for
the clients. The required software and hardware are easily available and easy to work with.
Image Steganography, as described above, can lead to error free, secure, reliable and fast
management system. It can assist the user to concentrate on the record keeping. Thus it will help
organization in better utilization of resources. The organization can maintain computerized records
without redundant entries. That means one need not be distracted by information that is not relevant,
while being able to reach the information
6
LITERATURE STUDY
WATERFALL MODEL: The Waterfall Model was first Process Model to be
introduced. It is very simple to understand and use. In a Waterfall model, each phase
must be completed before the next phase can begin and there is no overlapping in the
phases. Waterfall model is the earliest SDLC approach that was used for software
development.
In The Waterfall approach, the whole process of software development is divided into
separate phases. The outcome of one phase acts as the input for the next phase
sequentially. This means that any phase in the development process begins only if the
previous phase is complete. The waterfall model is a sequential design process in which
progress is seen as flowing steadily downwards (like a waterfall) through the phases
of Conception, Initiation, Analysis, Design, Construction, Testing,
What can we take from these findings? Well, the simple point is that steganography is not easy;with
knowledge of the algorithm/method (which we should always assume), it is very hard to hide
messages in an undetectable way. This difficulty increases with the size of the message and the
desired robustness of the scheme — a single bit could be hidden trivially (and not robustly) by
changing a random LSB of the image to alter the parity of the image’s bits, but once we want to
encode enough pseudorandom data to make a statistical attack possible, things swiftly become more
difficult. The flaw in the systems discussed is that they assumed certain parts of an image (either least
significant bits of LSBs or DCT coefficients) were pseudorandom when they in fact are not. A
possible approach to future techniques is to investigate ways of finding pseudorandom data in cover
works, possibly by applying focussed tests such as the chi-square test, and inserting information in
those parts of the image. Unfortunately, the amount of such data in most cover works is likely to be
small, as natural data tends to not be truly random, and good compression schemes will destroy such
pseudorandom data, as it carries no important perceptual information that cannot be recreated. Even
if, for example, we hide data in the thermal noise in a digital photo, this may change or destroy
properties of the sensor fingerprint, and by examining other images from the same camera, the
modification may be detected.
31
BIBLIOGRAPHY
[1] Eric Cole, Ronald D. Krutz, Consulting Editor (2003), Hiding in Plain Sight, Steganography and the Art of Covert Communication, Wiley Publishing, Inc.
[2] Stefan Katzenbeiser & Fabien A.P.Petitcolas(1999), Information Hiding Techniques for
Steganography and Digital Watermarking, Artech House, Computer Security series, Boston, London. [3] Fabien A.P.Petitcolas, Ross J.Anderson and Markus G.Kuhn, (1999) “Information Hiding – A
Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, pp.1062-1078.
[4] Mamta Juneja and Parvinder Singh Sandhu, (2013) “A New Approach for Information security using
an Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424. [5] P.Thiyagarajan, V.Natarajan, G.Aghila, V.Pranna Venkatesan, R.Anitha, (2013) “Pattern Based 3D
Image Steganography”, 3D Research center, Kwangwoon University and Springer 2013, 3DR
Express., pp.1-8. [6] Shamim Ahmed Laskar and Kattamanchi Hemachandran, (2013) “Steganography Based On
Random Pixel Selection For Efficient Data Hiding”, International Journal of Computer Engineering
and Technology, Vol.4, Issue 2, pp.31-44. [7] S.Shanmuga Priya, K.Mahesh and Dr.K.Kuppusamy, (2012) “Efficient Steganography Method To
Implement Selected Least Significant Bits in Spatial Domain”, International Journal of Engineering
Research and Applications,, Vol2, Issue 3, pp. 2632-2637.
[8] B. Sharmila and R.Shanthakumari, (2012) “Efficient Adaptive Steganography For Colour Images Based on LSBMR Algorithm”, ICTACT Journal on Image and Video Processing, Vol. 2, Issue:03,
pp.387-392.
[9] Shweta Singhal, Dr.Sachin Kumar and Manish Gupta, (2011) “A New Steganography Technique Based on Amendment in Blue Factor ”, International Journal of Electronics Communication and
Computer Engineering, Vol.2, Issue 1, pp.52-56.
[10] Fahim Irfan et. Al. ‘s (2011) “An Investigation into Encrypted Message Hiding through Images
Using LSB ”, International Journal of EST, [11] Rajkumar Yadav, (2011) “A Novel Approach For Image Steganography In Spatial Domain Using
Last Two Bits of Pixel Values”, International Journal of Security, Vol.5 Iss. 2 pp. 51-61.
[12] M.B.Ould MEDENI and El Mamoun SOUIDI, (2010) “A Generalization of the PVD Steganographic Method”, International Journal of Computer Science and Information Security, Vol.8.No.8, pp156-
159
[13] Weiqi Luo, Member, IEEE, Fangjun Huang, Member, IEEE, and Jiwu Huang, Senior Member, IEEE, (2010) “Edge Adaptive Image Steganography Based on LSB Matching Revisited”, IEEE
Transactions on Information Forensics and Security, Vol.5.No.2, pp.201-214.
[14] C.-H. Yang and M.-H. Tsai, (2010) “Improving Histogram-based Reversible Data Hiding by
Interleaving Predictions”, IET Image Processing, Vol.4. Iss. 4 pp. 223-234. [15] Venkata Abhiram.M, Sasidhar Imadabathuni, U.Padmalochini, Maheedhar Imadabathuni and
RamyaRamnath (2009), “Pixel Intensity Based Steganography with Improved Randomness”, International
Journal of Computer Science and Information Technology, Vol 2, No 2, pp.169-173. [16] G.Sahoo & Rajesh Kumar Tiwari (2009) “Hiding Secret Information in Movie Clip: A
Steganographic Approach”, International Journal of Computing and Applications, Vol. 4, No.1, pp
Techniques”, International Journal of Information Technology and Knowledge Management, Vol.
2, No. 1, pp 191-194.
[18] Hao-Tian Wu and Jean-Luc Dugelay , (2009) “Steganography in 3D Geometrics and Images by Adjacent Bit Mapping”, EURASIP Journal on Information Security, Vol. 2009, Article ID 317165,
pp1-10.International Journal of Computer Science & Engineering Survey (IJCSES) Vol.4, No.6, December