YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 1/16

N.BALA GANGADHAR (08X25A0404)

E.MALLIKARJUNA RAO (07X21A0418)

D.VENKATA GANESH (07X21A0414)

Page 2: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 2/16

Steganography - Definitiony Steganography

y from the Greek word steganos meaning covered

y and the Greek word graphie meaning writing

y Steganography is the process of hiding of a secret messagewithin an ordinary message and extracting it at its destination

y Anyone else viewing the message will fail to know it containshidden/encrypted data

Page 3: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 3/16

Example

Carrier File Carrier File with

Hidden Message

Page 4: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 4/16

Other data hiding techniques..y Watermarking

The main goal of watermarking is to hide a message m in someaudio or video (cover) data d , to obtain new data d' ,

practically indistinguishable from d , by people, in such a waythat an eavesdropper cannot remove or replace m in d' .

y Cryptography

Cryptography is a technique to scramble a confidentialmessage to make it unreadable for a third party. But cannothide its presence, i.e., the location of the secret message isobvious.

Page 5: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 5/16

Steganography - Historyy 440 B.C.

y Histiaeus shaved the head of his most trusted slave and

tattooed it with a message which disappeared after the hair

had regrown. To instigate a revolt against Persians.

y 1st and 2nd World Wars

y German spies used invisible ink to print very small dots on

letters.

y Microdots Blocks of text or images scaled down to the

size of a regular dot.

Page 6: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 6/16

Why Image Files?y Digital image data contains a great deal of redundant

information (high capacity)

y Unlike audio or video, typically no copyright issues to arousesuspicion

y However, audio and video files have greater capacity thandigital images

y Researchers discourage use of clip art, images with text, fewcolor variations, and/or distinct lines

Page 7: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 7/16

General

General steganographicsteganographic modelmodel

Steganographic algorithms are in general based on replacingnoise component  of a digital object with a to-be-hidden

message.

Page 8: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 8/16

Steganography technique:

Least Significant Bity Messages are encoded in the least significant bit of every byte

in an image. By doing so, the value of each pixel is changedslightly, but not enough to make significant visual in image,even when compared to the original image.

Consider a pixel sequence:

11100001 01100110 01100110 10111011

10110001 10010010 01110110 00100101

01000101 10001001 01110101 01000101

Page 9: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 9/16

Steganography Technique:Least Significant BitExample: Inserting the word b using LSB techniques in abovesequence:

y b = 01100010

After encoding the sequence is changed as below

11100000 01100111 01100110 1011101010110000 10010010 01110111 00100100

01000101 10001001 01110101 01000101

Page 10: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 10/16

Decryption

yIn the decryption section we use steganalysis, which is used tofind out a stego-file among the given file.

yThe embeded information can only be extracted by using aspecial extracting program called sniffer- dog program.

Page 11: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 11/16

Page 12: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 12/16

Drawbacks of LSB technique

y Limits the number of bytes that are available for holding the

payload.

y LSB technique can hide only 10% (or less) of the data amounts

of the vessel data.

Page 13: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 13/16

To overcome drawbacks..

y To overcome the drawbacks in the LSB technique BPCS

technique.

y In BPCS we can replace all of the noise-like regions in the bit-

planes of the vessel image with secret data withoutdeteriorating the image quality.

Page 14: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 14/16

ResultOriginal image Stego image

Page 15: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 15/16

Conclusion

yThis project describes a technique successfully embed data inan color image.

yThe data extracted from the cover image also depends on thepixels values of the image.

Page 16: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1

http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 16/16

THANK YO

U


Related Documents