Documente Academic
Documente Profesional
Documente Cultură
BY:
ARNAB MITRA
SUMAN KALYAN DAS
RAHUL CHATTERJEE
Project submitted in Partial Fulfillment of the
Requirements for the Degree of B TECH in
Information Technology of Techno
India,Saltlake.
Techno India,Saltlake
Project Outline
3 of
1
Original message is converted into cipher text by using secret key and
then hidden into the LSB of original image.
Overview
5 of
1
Project Phases
6 of
1
The Project is divided into following important six phases:
Encryption Phase
Encoding Phase
Pixel Modification & Splitting Phase
Overlapping Phase
Decoding Phase:
Decryption Phase:
Encryption Module
7 of
1
The data in the LSB of an image is not a secure way to hide the
data. The process of steganalysis can easily detect such images for
the presence of hidden data.
Inorder to make the stego-image RS resistant, the pixels in the
image are modified so that the hidden data is distributed
thoughout the image.
Splitting and Overlapping Phase
9 of
1
In the splitting phase, the image is divided into two shares.
First, the source image is divided into black and white, that is, the
image contains only black and white pixels.
Overlapping phase is done at the receiver side. The two shares of images that comprises of opposite pixels to each
other would produce the original image when overlapped.
When the two shares of image are combined, we are actually combining the hidden text in the two shares.
Snapshot
Snapshot
Snapshot
Snapshot
Future Work
16
of 1
Send the any multimedia data in encryted form with audio, video
or text format.
Conclusion
17 of
1