Image Steganography PPT
Image Steganography PPT
Technology
Progress Seminar
B-Tech In Computer Science And Engineering
“ Image Steganography ”
By Guide
Mr. Shubham Pancheshwar Prof. Namita Gahukar
Mr. Virendra Shahane Computer Science And
Mr. Preshit Kale Engineering
Ms. Purvi Daharwal Guru Nanak Institute of
Ms. Chaitali Wankhede Technology, Nagpur
CONTENT
• Introduction
• History
• Problem Statement
• Objectives
• Scope
• Steganography Techniques
• Design Phase
• Snapshots
• Results and Discussion
• Conclusion
• References
Introduction
Continue
“The goal of steganography is to hide messages in such a way that no
one apart from the intended recipient even knows that a message
has been sent.”
• During the "Cold War" period, US and USSR wanted to hide their
sensors in the enemy's facilities. These devices had to send data to
their nations, without being spotted.
• In October 2001, the New York Times published an article claiming that al-
Qaeda had used steganography to encode messages into images, and then
transported these via e-mail and possibly via USENET to prepare and execute
the September 11, 2001 terrorist attack.
Problem Statement
• In this project, the proposed approach finds the suitable algorithm for
embedding the data in an image using steganography which provides
the better security pattern for sending messages through a network.
• Normally, after embedding the data into the image, the image may lose its resolution. In
the proposed approach, the image remains unchanged in its resolution as well in size.
• The speed of embedding the data into the image is also high in the proposed approach
such that the image is protected and the data to the destination is sent securely.
• For the decryption phase, I have used the same Python programming language for the
purpose of designing.
• There are many steganographic algorithms available like JSteg, F5 and LSB algorithms. I
have used the Least Significant Bit algorithm in designing the steganographic application
because LSB algorithm works efficiently when we consider bit map images .bmp files. The
speed of embedding is also high when using LSB compared to the JSteg algorithm.
Conclusion
• In the present world, the data transfers using internet is rapidly growing
because it is so easier as well as faster to transfer the data to destination.
So, many individuals and business people use to transfer business
documents, important information using internet.
• The future work on this project is to improve the compression ratio of the
image to the text. This project can be extended to a level such that it can
be used for the different types of image formats like .bmp, .jpeg, .tif etc.,
in the future. The security using Least Significant Bit Algorithm is good
but we can improve the level to a certain extent by varying the carriers as
well as using different keys for encryption and decryption.
References
2) Arun Kumar Singh, Juhi Singh, Dr. Harsh Vikram Singh, “Steganography in Images Using LSB Technique
(2015)”. International Journal of Latest Trends in Engineering and Technology (IJLTET)(2015)
3) Johnson, Neil F/ Doric, Zoran / Jajodia, Information Hiding : Steganography and Watermarking Attacks and
Countermeasures (Advances in Information Security, Volume 1)
5) V. Lokeswara Reddy, Dr. A. Subramanyam, Dr. P. Chenna Reddy, “Implementation of LSB Steganography and its
Evaluation for Various File Formats”.