Sunteți pe pagina 1din 26

STEGANOGRAPHY

By Deepanshi Arora
M.tech(2nd sem )

IN TRO D U CTIO N
Internet being an integral part of todays

world, is an unsafe medium for transfer of


secret information.
A genuine approach to this problem is

encryption. However it marks a message as


containing imp info. Suspecting security.
A significant approach STEGANOGRAPHY

overcomes this issue.

CRYPTO + STEG N O

Cryptography scrambles a message so it


cannot be understood

The Steganography hides the message so it

cannot be seen.
Even though both methods provide security, a

study is made to combine both cryptography


and Steganography methods into one system
for better confidentiality and security.

Steganography vs.
C ryptography

CRYPTOGRAPHY
(i) Message is not hidden.
(ii) Enemy can intercept the message.
(iii) Enemy can decrypt the message.

STEGANOGRAPHY
(i) Message is hidden.
(ii) Enemy can discover the medium.

The steganography approaches can be


divided into three types
Pure Steganography: This technique simply

uses the steganography approach only without


combining other methods.

Secret Key steganography: This uses the

combination of the secret key cryptography


technique and the steganography approach..

Public Key Steganography: To combine the

public key cryptography approach and the


steganography approach..

P R O JEC T SC O P E
This Project is for hiding information in any
image file. The scope of the project is
implementation of steganography tools for
hiding information.
This project proposes a secure communication

system. It employs cryptographic algorithm


together with steganography. The jointing of
these techniques provides a robust and strong
communication system that able to withstand
against attackers.

LITERATU RE SU RVEY
IMAGE BASED STEGANOGRAPHY AND

CRYPTOGRAPHY by Domenico Bloisi and Luca


Iocchi,2013
In this paper they described a method for integrating

together cryptography and steganography through


image processing using images as cover objects for
steganography and as keys for cryptography.
They showed that it is an effective system (making a

comparison with the well known F5 algorithm) and is


also a theoretically unbreakable cryptographic one.

LITERATU RE SU RVEY CO N TD .
Secure Data Hiding Algorithm Using Encrypted Secret

message by Harshitha K M, Dr. P. A. Vijaya International


Journal of Scientific and Research Publications, Volume 2, Issue
6, June 2012 1 ISSN 2250-3153, www.ijsrp.org

The hidden message is encrypted using a simple

encryption algorithm
N-bit LSB substitution technique is used as embedding

and extraction method .

The M AIN O BJECTIVES are:


To embed the maximum amount of data

(secret message) in cover image.


To embed maximum data in cover image with

minimum changes in the original cover image.


If intruder somehow makes some changes in

stego image, still we should be able to


retrieve the secret message.

M ETH O D O LO G Y
Two Tab Options----Encrypt & Decrypt..
ENCRYPTION--The secrete information is hiding

in with any type of image file.


DECRYPTION -- It is getting the secret

information from image file.

SO M E D EFIN ITIO N S
Cover medium: This is the medium in which we want to hide data
Embedded message: This is the hidden message we want to put
in the cover.
Stego-key: This is represented by some secret information, which is
needed in order to extract the embedded message from the
stegomedium
Stego-medium: This is the final piece of information that the
casual
observer can see.
We can define this simple formula:

Cover-medium + Embedded-message = Stego-message

BLO CK D IAG RAM

ALG O RITH M -TRAN SM ITTER


SID E
Step 1 - Reading a text file and

converting it to binary
Step 2 - Key generation
Step 3 - Converting key to binary
Step 4 - Reading the image and
converting the pixel values to binary
Step 6 Applying STEGO Tech. (LSB
substitution)
Step 7 - Getting stego image.

ALG O RITH M -RECIEVER SID E


Step1 : Reading the Stego image
Step 2 : Extracting the data from

image
Step 3 : Decryption
Step 4 : Converting data to ASCII
form and writing to file

CRYPTO G RAPH Y TECH N IQ U ES


There are some standards methods

which are used with cryptography


such as :
Secret key
Public key : DIFFIE - HELLMAN
Digital signature
Hash function

Im age Steganography
Techniques
Substitution Technique

-LSB
Transform Domain Technique

-DCT
Spread Spectrum Technique
Statistical Technique
Distortion Technique

LSB-Least Signifi
cant Bit
Least significant bit (LSB) insertion is a

common and simple approach for embedding


information in a cover file.

Unfortunately, it is vulnerable to even a slight


image manipulation.

H ID IN G M ETH O D

EM BED D IN G TH E
IN FO RM ATIO N

EM BED D IN G aIN A PIXEL

D CT-D iscrete Cosine Transform


It transforms a cover image from an
image representation into a frequency
representation by grouping the pixels
into non-overlapping blocks of 8 8
pixels and by transforming each of the
pixel blocks into 64 DCT coefficients.
The DCT coefficients of the transformed
cover image will be rounded off, and
then modified according to the secret
data

APPLICATIO N S
Images are widely used to store and transmit

the information through internet . It has


capacity of holding the information to 50% of
original size

In military operations.
Usage in modern communication.

Used in digital watermarking.

CONCLUSION
Steganography is a fascinating and
effective method of hiding data that
has been used throughout history.

It is used for data hiding,


watermarking or more secure central
storage method for such things as
passwords, or key processes.
Regardless, the technology is easy to

REFEREN CES
Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, An Encrypto-

Stego Technique Based secure data Transmission System,


PEC, Chandigarh.
Saleh Saraireh, Department of Communications and Electronic
Engineering, Philadelphia University,Amman, A SECURE DATA
COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND
STEGANOGRAPHY International Journal of Computer Networks

& Communications (IJCNC) Vol.5, No.3, May 2013

I. Venkata Sai Manoj, Cryptography and Steganography,


International Journal of Computer Applications (0975 8887),
Volume 1 No.12

B B Zaidan, A.A Zaidan, A.K. Al-Frajat and H.A. Jalab, On the


Differences between Hiding Information and Cryptography
Techniques: An Overview, Journal of Applied Sciences 10(15):
1650-1655, 2010

REFEREN CES CO N TD .
Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu, A

Survey on Cryptography and Steganography Methods for


Information Security, Internaltional Journal of Computer
Applications(0975-8887), Volume 12 No. 2, November 2010.
Dipti Kapoor Sarmah, Neha bajpai, Proposed System for Data
Hhiding Using Cryptography and Steganography, International
Journal of Computer Applications (0975 8887), Volume 8 No. 9,
October 2010.
Eiji Kawaguchi and Richard O. Eason, Principle and applications
of BPCS-Steganography, Kyushu Institute of Technology,
Kitakyushu, Japan, University of Maine, Orono, Maine 04469-5708.
Sashikala Channalli and Ajay Jadhav, Steganography An Art of
Hiding Data, International Journal on Computer Science and
Engineering Vol.1(3), 2009, 137-141.
A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2
(3), 626-630 630

S-ar putea să vă placă și