Top Banner
STEGANOGRAPHY Project Guide: Dr. Jyoti Bharti Project Members: Lovely Mandal Vriti Mathur Dipesh Agrawal Ankur Malik
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: STEGANOGRAPHY PRESENTATION SLIDES

STEGANOGRAPHY

Project Guide: Dr. Jyoti Bharti

Project Members:

Lovely Mandal Vriti Mathur Dipesh Agrawal Ankur Malik

Page 2: STEGANOGRAPHY PRESENTATION SLIDES

AbstractThis project introduces a new methodology for hiding a text data into an rgb image. The proposed technique can encode any color image files in order to protect confidential text data from unauthorized access. It can be applied to a very small images (24 × 24) as well as large images (1024 × 1024). We use Image quality parameters: Peak Signal to Noise Ratio, Mean Square Error and Entropy. This method comprises of three steps: one for scanning the image, second for message hiding and third for decrypting the message from the image.

Page 3: STEGANOGRAPHY PRESENTATION SLIDES

Steganography is the art of hiding a message or data

in the form of text, image or multimedia into an image such that it can’t be detectable by naked eyes.

Q. How it is different from Cryptography?

In cryptography, the original message is converted into meaningless text, which can draw suspicion.Compared to this, Steganography is more secure, as the very existence of the message embedded in the image is concealed.

What is Steganography?

Page 4: STEGANOGRAPHY PRESENTATION SLIDES

Payload: Original message is called payload. Carrier Image: The image in which the message

is embedded is called Carrier Image. Stego-image: The image formed after hiding the

payload into Carrier Image is called Stego-image. Encryption technique or hiding technique:

The methodology used to hide the message into the image is called encryption technique.

Steganographic Terms

Page 5: STEGANOGRAPHY PRESENTATION SLIDES

Scanning Technique:

Processing the image such that each pixel of the image is traversed once is called Scanning Technique.

Decryption: The retrieval of original message from the Stego-image is called Decryption and the technique used is known as Decryption technique.

Page 6: STEGANOGRAPHY PRESENTATION SLIDES

The method comprises of three steps:

1. Scanning2. Encryption3. Decryption

Proposed Work

Page 7: STEGANOGRAPHY PRESENTATION SLIDES

Consists of 2 traversals:

1. Spiral Traversal 2. Snake Traversal

Scanning

Page 8: STEGANOGRAPHY PRESENTATION SLIDES

Image is divided into blocks of 50 X 50 pixels. Blocks are traversed by Snake traversal. And within a block, pixels are traversed by Spiral

traversal.

Page 9: STEGANOGRAPHY PRESENTATION SLIDES

Carrier image is divided into red, green and

blue plane.

Encryption

Page 10: STEGANOGRAPHY PRESENTATION SLIDES

we take another plane called Auxiliary matrix, and set each of its values to 0.

Page 11: STEGANOGRAPHY PRESENTATION SLIDES

Take message from user and convert to ascii

Page 12: STEGANOGRAPHY PRESENTATION SLIDES

Traverse red plane with Scanning technique to search for pixel intensity equal to that of ascii value.

If found ,then convert the corresponding LSB of blue plane to 1

and at corresponding position of auxiliary matrix write index of the letter.

Page 13: STEGANOGRAPHY PRESENTATION SLIDES

traverse auxiliary matrix with scanning technique

and produce a random order of indices.

convert indices into binary.

Page 14: STEGANOGRAPHY PRESENTATION SLIDES

Store binary to the boundary values of LSB of green plane.

Page 15: STEGANOGRAPHY PRESENTATION SLIDES

Merge all the planes to get the Stego-image.

Page 16: STEGANOGRAPHY PRESENTATION SLIDES

Decryption

Divide Stego-image in red, green and blue planes.

LSB of blue plane is extracted.

LSB of green plane is extracted.

Page 17: STEGANOGRAPHY PRESENTATION SLIDES

LSB of blue plane traversed using Scanning technique.

If value is found 1 then corresponding value in red plane is taken.

Generates a random order of intensity value list.

69 80 76 72

Page 18: STEGANOGRAPHY PRESENTATION SLIDES

Traverse boundary of LSB of green plane, 4 pixels at a time.

0001= 1

0010= 2

0100= 4

0011= 3

Extract 4 bits at a time and convert it into decimal.

Generate random order of decimal digits.

These digits are indices.

Page 19: STEGANOGRAPHY PRESENTATION SLIDES

Arrange random intensity values extracted earlier according to the order of extracted

indices.

69 80 76 72

72 69 76 80

Convert ASCII values into charactersH E L P

This is the decrypted message

Page 20: STEGANOGRAPHY PRESENTATION SLIDES

Results

Original image

Histogram of Original Image

Histogram of Stego-image

Stego-image

PSNR

MSE

Entropy

Page 21: STEGANOGRAPHY PRESENTATION SLIDES

This technique results in less modification of

bits resulting in less randomness in the image. The image quality metrics i.e. higher Peak Signal to Noise Ratio (PSNR) and lower Mean Square errors itself prove that the proposed technique has good quality of the Stego-image.

Conclusion

Page 22: STEGANOGRAPHY PRESENTATION SLIDES

Thank you