0% found this document useful (0 votes)
9 views17 pages

Image Steganography

Image
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views17 pages

Image Steganography

Image
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Name: C SAIKIRAN

SkillsBuild Email ID:


[email protected] College Name:
Andhra University College of Engineering (A)
College State: Andhra Pradesh
Internship Domain: [Cyber Security]
Internship Start and End Date: [3rd June 2024
to 12th July 2024] - 6 weeks
IMAGE
STEGANOGR
APHY
INTRODUCTION TO
IMAGE STEGANOGRAPHY
Image steganography is the practice of hiding secret information
within digital images. This technique exploits the redundancy in
image data, such as the least significant bits (LSBs) of pixel
values, to embed hidden messages without noticeably altering
the image's appearance.
AGENDA

The agenda of this project to send a secret text to higher officials using the
steganography concept and RGB technique, ensuring that criminals or others cannot
identify the image or its hidden content. Thos project will involve encoding the secret
text into the least significant bits of the image’s pixels, making the alterations
imperceptible to the human eye.
What is Image Steganography

Hiding Data Invisible to the Eye Secured


Communication
Image steganography The hidden data is
This technique allows for
involves embedding secret concealed in a way that it is
secure communication, as
data, such as text, images, undetectable to the casual
the existence of the hidden
or even files, within the observer, making the image
data is hidden from anyone
pixels of a digital image. appear normal and
who is not aware of its
unaltered.
presence.
Least Significant Bit (LSB) Insertion : One of the most straightforward and widely used techniques
in image steganography. This method involves modifying the least significant bits of the pixels in a
digital image to encode hidden information.
Here’s a detailed look at how LSB steganography works:

1. Image Pixels:
Digital images are composed of pixels, each represented
by bits. In a grayscale image, each pixel can be
represented by 8 bits.
In a color image (like RGB), each pixel is represented by 24 bits (8 bits for red, 8 bits for
green, and 8 bits
for blue).

2. Least Significant Bit:


The least significant bit is the lowest bit in a byte. For example, in the byte 10110101, the
least significant bit is the rightmost one (1).

3. Embedding Process:
To hide information, the least significant bit of each pixel’s color value is altered to match
4. Extracting Process:
The hidden information can be extracted by reading the least significant bits of
the pixels in the same order they were modified.
WHO ARE THE END USERS OF THE PROJECT?

The primary end users for this steganography project include government and
military personnel secure communication, corporate executives protecting proprietary
data, and journalists sharing sensitive information discreetly.
IT and cyber security teams can integrate this technique to enhance
organizational data security.
Additionally, the person who wants to send any secret message other person in
a hidden format then this project will helpful for them.
YOUR SOLUTION AND ITS VALUE PROPOSITION

Steganography is the basic concept to hide the data inside other data.
In this project RGB Mechanism is used for pixel manipulation.
XOR operation is used for encryption and decryption of the test inside the image.
The project reads an image and hides the secret text within the pixel values using the least
significant bits (LSB) method.
For security purpose that means to avoid unauthorized users taking the advantage of the message,
a secret key used to hide and unhide the data.
Finally, By using this project we can hide the data inside an image using secret key and for unhide
the message secret is used.
Implementing Image
Steganography with Python
Image Manipulation
1
Using Python's image processing libraries, such as Pillow, you can
read, manipulate, and save image files.

Data Embedding
2
Algorithms are used to encode the secret data into the image's pixels,
ensuring i remains invisible.

Decoding and Extraction


3
Complementary algorithms are employed to extract the hidden data from
the image, reverting the steganographic process.
Demonstrating the Project with Sample
Images

Input Image Hidden Data Output Image Data Extraction


An image used to The information that The image with the The process of
hide the secret data. will be embedded hidden data, retrieving the hidden
within the image. indistinguishable from data from the output
the original. image.
LIBRARIES

P i llow :
Pillow manipulati
: F im
F o on.
r
a g e
OpenCV: For
im a g e
m a n ip ulation. advanced
image
INSTALL processing.

NumPy: For
numerical
operations.
MODELLING

ENCODING PROCESS:
Load the image.
Convert the message into binary format.
Modify the image's pixel values to
encode the message.

DECODING PROCESS:
Load the encoded image.
Extract the binary data from pixel
values. Convert binary data back to
the original message.
RESULT
ORIGINAL ENCODED
IMAGE IMAGE

DECODED MESSAGE : BHARAT MATA KI JAI


https://github.com/saikirancoder-159/Hiding-a-text-insid
e-an-image
THANK
YOU

You might also like