Sunteți pe pagina 1din 18

Steganography in Images

BY:
ARNAB MITRA
SUMAN KALYAN DAS
RAHUL CHATTERJEE
Project submitted in Partial Fulfillment of the
Requirements for the Degree of B TECH in
Information Technology of Techno
India,Saltlake.

Under the Guidance of


Aparajita Chowdhury
Department of Information
Technology

Techno India,Saltlake
Project Outline
3 of
1

About the Project


Overview
Project phases
Encryption Module
Pixel Modification phase
Splitting & Overlapping phase
Screenshots
Future Work
Conclusion
About the Project
4 of
1

The Project aims at secure data hiding of confidential information and


its transmission over networks.

Original message is converted into cipher text by using secret key and
then hidden into the LSB of original image.
Overview
5 of
1
Project Phases
6 of
1
The Project is divided into following important six phases:
Encryption Phase
Encoding Phase
Pixel Modification & Splitting Phase
Overlapping Phase
Decoding Phase:
Decryption Phase:
Encryption Module
7 of
1

8 Bit Encryption Technique


Step 1: Generate the ASCII value of the letter
Step 2: Generate the corresponding binary value of it.
[Binary value should be 8 digits e.g. for decimal 32 binary number
should be 00100000]
Step 3: Reverse the 8 digits binary number
Step 4: Take a 4 digits divisor (>=1000) as the Key
Step 5: Divide the reversed number with the divisor
Step 6: Store the remainder in first 3 digits & quotient in next 5
digits (remainder and quotient wouldnt be more than 3 digits and
5 digits long respectively. If any of these are less then 3 and 5
digits respectively we need to add required number of 0s (zeros) in
the left hand side. So, this would be the cipertext i.e. encrypted
text.
Now store the remainder in first 3 digits & quotient in next 5
digits.
Pixel Modification Phase
8 of
1

The data in the LSB of an image is not a secure way to hide the
data. The process of steganalysis can easily detect such images for
the presence of hidden data.
Inorder to make the stego-image RS resistant, the pixels in the
image are modified so that the hidden data is distributed
thoughout the image.
Splitting and Overlapping Phase
9 of
1
In the splitting phase, the image is divided into two shares.

Each share of the image contains a set of pixels of the original


image.

First, the source image is divided into black and white, that is, the
image contains only black and white pixels.

Secondly, a key image is generated of the same dimensions, where


each pixel is randomly set to white or black.

Third, the original image is encrypted using this key


Splitting and overlapping Phase
10
of 1

Finally, each image is then doubled in size - each pixel becomes a


2x2 square of pixels. Black pixels have black pixels in the top-left
and bottom-right corners while the other two pixels are white, while
a white pixel in the original image produces the opposite 2x2
square.
Splitting and Overlapping Phase
11 of
1

Overlapping phase is done at the receiver side. The two shares of images that comprises of opposite pixels to each
other would produce the original image when overlapped.
When the two shares of image are combined, we are actually combining the hidden text in the two shares.
Snapshot
Snapshot
Snapshot
Snapshot
Future Work
16
of 1

Send the any multimedia data in encryted form with audio, video
or text format.
Conclusion
17 of
1

It can be concluded that when normal image security using


steganographic and visual cryptographic technique is applied, the
decryption of the encoded authenticated data becomes a
cumbersome effort. The security features of the steganographic
technique are highly optimized using the least significant bit
manipulation along with visual cryptography.
Thank You ! ! !
18
of 1

S-ar putea să vă placă și