0% found this document useful (0 votes)
41 views

Steganograpy: BY:-Gaurav Gupta Mohd. Arif Khan Poonam Yadav

This document summarizes steganography, which is the process of hiding a secret message within an ordinary message. It discusses the history of steganography, benefits, why it is different from cryptography, the scope of a student project on steganography, and a review of the project. It also outlines future enhancements and the methodology used, specifically hiding information in the least significant bits of image file bytes to embed a secret message without noticeable changes to the image.

Uploaded by

Gaurav Gupta
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Steganograpy: BY:-Gaurav Gupta Mohd. Arif Khan Poonam Yadav

This document summarizes steganography, which is the process of hiding a secret message within an ordinary message. It discusses the history of steganography, benefits, why it is different from cryptography, the scope of a student project on steganography, and a review of the project. It also outlines future enhancements and the methodology used, specifically hiding information in the least significant bits of image file bytes to embed a secret message without noticeable changes to the image.

Uploaded by

Gaurav Gupta
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

STEGANOGRAPY

BY:-
Gaurav Gupta
Mohd. Arif Khan
Poonam Yadav
Content

1. Steganography Introduction
2. Steganography History
3. Benefits
4. Why Not Cryptography?
5. Project Scope
6. Project review
7. Future Enhancement
8. Methodology
9. Steganography Technique
STEGANOGRAPHY
 Steganography
◦ from the Greek word steganos meaning “covered”
◦ and the Greek word graphie meaning “writing”
 Steganography is the process of hiding of a secret
message within an ordinary message and
extracting it at its destination
 Anyone else viewing the message will fail to know

it contains hidden/encrypted data


STEGANOGRAPHY HISTORY
 Greek history – warning of invasion by
scrawling it on the wood underneath a wax
tablet. To casual observers, the tablet
appeared blank.
 Both Axis and Allied spies during World War II

used such measures as invisible inks -- using milk,


fruit juice or urine which darken when heated.
 Invisible Ink is also a form of steganography.
Benefit
 Keeping your code program secure.
 Protecting your rights.
 Use this program for hiding other
information.
 Get the ideas for development or create a
similar applications in the future.
Why not Encryption?
Confidentiality

Steganography Encryption
(hide existence of the secret message, (encrypt the message,
but do not use encryption
but do not hide the message)

• Ideally nobody can see both parties are • Anybody can see both parties are
secretly communicating. communicating in secret.

• Innocent. • Suspicious.
PROJECT SCOPE
 This Project is developed for hiding information in any image
file.The scope of the project is implementation of steganography
tools for hiding information includes any type of information file
and image files and the path where the user wants to save image
and extruded file.
Project review
• Steganography is a technique for hiding
information inside media such as sound, image
or video.
• In my project will use steganography technique
for hiding some Text inside a Image.
• For doing an application of my project I will use
Java language.
FUTURE ENHANCEMENT
 In the future version of this project the data may be hidden in
audio file and other types of files. The data is to be hidden will
be in encrypted form and in compress form so a large amount
of data can be hidden more securely.
METHODOLOGY:-
 Two Tab Options----Encrypt & Decrypt…..

1-ENCODING-The secrete information is hiding in with


any type of image file.

2-DECODING- It is getting the secret information from


image file.
Basic Principle in Steganography
SECRE TEXT

STEAGNO
OBJECT
COVER IMAGE
Encoder

Key
Decoder
SECRET TEXT Communication
s Channel

COVER IMAGE
Digital Image, Example
STEGANOGRAPHY TECHNIQUE.
Everything in a computer is stored as 1’s and 0’s (a bit). Bits are
grouped in sets of eight, one set is called a byte.
1 0 10011000
11111111
0 00001000
Bits Bytes
One byte can be used to represent each letter of the alphabet. This is
what is used in text files.
01000001 = A
01000010 = B
01000011 = C
Pictures are made up of lots of little dots called pixels. Each pixel is
represented as 3 bytes – one for red, one for green and one for blue.

11111000 11001001 00000011

248 201 3

Each byte is interpreted as a number, which is how much of that colour


is used to make the final colour of the pixel.

248 + 201 + 3 = Orange Colour


The difference between two color that differ by one in either one
red, green or blue value is impossible to see with the human eye.

248 + 201 + 3 = Original Color


248 + 201 + 4 = Blue +1

247 + 201 + 3 = Red -1

If we change the least significant (last) bit in a byte, we either add or


subtract one from the value it represents.

This means we can overwrite the last bit in a byte without affecting
the colour it appears to be.
We can use images to hide things if we replace the last bit of every
colour’s byte with a bit from the message.
Message: A 01000001
Image with 3 pixels:

Pixel 1: 11111000 11001001 00000011


Pixel 2:
11111000 11001001 00000011
Pixel 3:
11111000 11001001 00000011
Now we hide our message in the image:

Pixel 1: 11111000
11111000 11001001
11001001 00000010
00000011
Pixel 2: 11111000 11001000
11001001 00000010
00000011
Pixel 3: 11111000 11001001 00000011
New image:
Even if we do this across a big image and with a really large
message, it is still hard to tell that anything is wrong.

Original With Hidden


Message
THANK YOU

You might also like