0% found this document useful (0 votes)
189 views

Image Steganography PPT

Uploaded by

darka9089
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views

Image Steganography PPT

Uploaded by

darka9089
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Guru Nanak Institute Of

Technology

Progress Seminar
B-Tech In Computer Science And Engineering
“ Image Steganography ”

By Guide
Mr. Shubham Pancheshwar Prof. Namita Gahukar
Mr. Virendra Shahane Computer Science And
Mr. Preshit Kale Engineering
Ms. Purvi Daharwal Guru Nanak Institute of
Ms. Chaitali Wankhede Technology, Nagpur
CONTENT
• Introduction
• History
• Problem Statement
• Objectives
• Scope
• Steganography Techniques
• Design Phase
• Snapshots
• Results and Discussion
• Conclusion
• References
Introduction
Continue
 “The goal of steganography is to hide messages in such a way that no
one apart from the intended recipient even knows that a message
has been sent.”

 This can be achieve by concealing the existence of information within


seemingly harmless carriers or cover

 It can be understand by the following figure.


History
• The first recorded uses of steganography can be traced back to
440 BC when Herodotus mentions an example of
steganography in the histories of Herodotu.

• ancient example is that of histories, who shaved the head of


his most trusted slave and tattooed a message on it. After his
hair had grown the message was hidden. The purpose was to
instigate a revolt against the Persians.
Continue

• During the "Cold War" period, US and USSR wanted to hide their
sensors in the enemy's facilities. These devices had to send data to
their nations, without being spotted.

• In October 2001, the New York Times published an article claiming that al-
Qaeda had used steganography to encode messages into images, and then
transported these via e-mail and possibly via USENET to prepare and execute
the September 11, 2001 terrorist attack.
Problem Statement

• How can we send a message secretly to the destination.

• Using steganography, information can be hidden in carriers such as


images, audio files, text files, videos and data transmissions.

• In this study, I proposed a new framework of an image steganography


system to hide a digital text of a secret message.
Objectives
In my project I primarily concentrated on the data security issues when
sending the data over the network using steganographic techniques.

The main objectives of the project are

• Requirement of this steganography system is that the hider message


carried by stego-media should not be sensible to human beings.

• The other goal of steganography is to avoid drawing suspicion to the


existence of a hidden message.

• This approach of information hiding technique has recently become


important in a number of application areas.
Scope
• The scope of the project is to limit unauthorized access and provide
better security during message transmission. To meet the
requirements, I use the simple and basic approach of steganography.

• In this project, the proposed approach finds the suitable algorithm for
embedding the data in an image using steganography which provides
the better security pattern for sending messages through a network.

• For practically implementing the function of the discussed algorithms,


Tkinter And Pill is used.
Steganography
Techniques
Pure Steganography : Pure Steganography is the process of
embedding the data into the object without using any private keys. This
type of steganography entirely depends upon the secrecy. This type of
steganography uses a cover image in which data is to be embedded,
personal information to be transmitted, and encryption decryption
algorithms to embed the message into image.
Design Phase

Figure: Block diagram for Image Steganography


Continue
ENCRYPTION PHASE :

• The “ Encryption Phase ” uses two types of files for


encryption purpose. One is the secret file which is to be
transmitted securely, and the other is a carrier file such as
image. In the encryption phase the data is embedded into
the image.

Figure: Encryption Phase Process


Continue
DECRYPTION PHASE :

• The “ Decryption Phase ” is reverse to encryption phase. In


decryption phase, the carrier image in which the data is hided is
given as an input file. decryption section uses the “Least Significant
bit Algorithm” (LSB) by which the encoded bits in the image is
decoded and turns to its original state and gives the output as a
text document.

Figure: Decryption Phase Process


Snapshots
Continue
Continue
Results and
• In Discussion
this project I mainly concentrated on embedding the data into an image. I have
designed the steganographic application which embedded the data into the image.

• Normally, after embedding the data into the image, the image may lose its resolution. In
the proposed approach, the image remains unchanged in its resolution as well in size.

• The speed of embedding the data into the image is also high in the proposed approach
such that the image is protected and the data to the destination is sent securely.

• For the decryption phase, I have used the same Python programming language for the
purpose of designing.

• There are many steganographic algorithms available like JSteg, F5 and LSB algorithms. I
have used the Least Significant Bit algorithm in designing the steganographic application
because LSB algorithm works efficiently when we consider bit map images .bmp files. The
speed of embedding is also high when using LSB compared to the JSteg algorithm.
Conclusion
• In the present world, the data transfers using internet is rapidly growing
because it is so easier as well as faster to transfer the data to destination.
So, many individuals and business people use to transfer business
documents, important information using internet.

• Security is an important issue while transferring the data using internet


because any unauthorized individual can hack the data and make it
useless or obtain information un- intended to him.

• The future work on this project is to improve the compression ratio of the
image to the text. This project can be extended to a level such that it can
be used for the different types of image formats like .bmp, .jpeg, .tif etc.,
in the future. The security using Least Significant Bit Algorithm is good
but we can improve the level to a certain extent by varying the carriers as
well as using different keys for encryption and decryption.
References

1) Mohammed A. Saleh, “Image Steganography Techniques”. International Journal of Advanced Research in


Computer and Communication Engineering (IJARCCE) (2018)

2) Arun Kumar Singh, Juhi Singh, Dr. Harsh Vikram Singh, “Steganography in Images Using LSB Technique
(2015)”. International Journal of Latest Trends in Engineering and Technology (IJLTET)(2015)

3) Johnson, Neil F/ Doric, Zoran / Jajodia, Information Hiding : Steganography and Watermarking Attacks and
Countermeasures (Advances in Information Security, Volume 1)

4) Tayana Morkel, “IMAGE STEGANOGRAPHY APPLICATIONS FOR SECURE COMMUNICATION”.


University of Pretoria, Pretoria May 2012.

5) V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “Implementation of LSB Steganography and its
Evaluation for Various File Formats”.

You might also like