Documente Academic
Documente Profesional
Documente Cultură
By Deepanshi Arora
M.tech(2nd sem )
IN TRO D U CTIO N
Internet being an integral part of todays
CRYPTO + STEG N O
cannot be seen.
Even though both methods provide security, a
Steganography vs.
C ryptography
CRYPTOGRAPHY
(i) Message is not hidden.
(ii) Enemy can intercept the message.
(iii) Enemy can decrypt the message.
STEGANOGRAPHY
(i) Message is hidden.
(ii) Enemy can discover the medium.
P R O JEC T SC O P E
This Project is for hiding information in any
image file. The scope of the project is
implementation of steganography tools for
hiding information.
This project proposes a secure communication
LITERATU RE SU RVEY
IMAGE BASED STEGANOGRAPHY AND
LITERATU RE SU RVEY CO N TD .
Secure Data Hiding Algorithm Using Encrypted Secret
encryption algorithm
N-bit LSB substitution technique is used as embedding
M ETH O D O LO G Y
Two Tab Options----Encrypt & Decrypt..
ENCRYPTION--The secrete information is hiding
SO M E D EFIN ITIO N S
Cover medium: This is the medium in which we want to hide data
Embedded message: This is the hidden message we want to put
in the cover.
Stego-key: This is represented by some secret information, which is
needed in order to extract the embedded message from the
stegomedium
Stego-medium: This is the final piece of information that the
casual
observer can see.
We can define this simple formula:
converting it to binary
Step 2 - Key generation
Step 3 - Converting key to binary
Step 4 - Reading the image and
converting the pixel values to binary
Step 6 Applying STEGO Tech. (LSB
substitution)
Step 7 - Getting stego image.
image
Step 3 : Decryption
Step 4 : Converting data to ASCII
form and writing to file
Im age Steganography
Techniques
Substitution Technique
-LSB
Transform Domain Technique
-DCT
Spread Spectrum Technique
Statistical Technique
Distortion Technique
LSB-Least Signifi
cant Bit
Least significant bit (LSB) insertion is a
H ID IN G M ETH O D
EM BED D IN G TH E
IN FO RM ATIO N
APPLICATIO N S
Images are widely used to store and transmit
In military operations.
Usage in modern communication.
CONCLUSION
Steganography is a fascinating and
effective method of hiding data that
has been used throughout history.
REFEREN CES
Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, An Encrypto-
REFEREN CES CO N TD .
Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu, A