High Secured Image by LSB Steganography Technique Using Matlab
IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
-
Upload
bala-gangadhar -
Category
Documents
-
view
231 -
download
0
Transcript of IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
![Page 1: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/1.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 1/16
N.BALA GANGADHAR (08X25A0404)
E.MALLIKARJUNA RAO (07X21A0418)
D.VENKATA GANESH (07X21A0414)
![Page 2: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/2.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 2/16
Steganography - Definitiony Steganography
y from the Greek word steganos meaning covered
y and the Greek word graphie meaning writing
y Steganography is the process of hiding of a secret messagewithin an ordinary message and extracting it at its destination
y Anyone else viewing the message will fail to know it containshidden/encrypted data
![Page 3: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/3.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 3/16
Example
Carrier File Carrier File with
Hidden Message
![Page 4: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/4.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 4/16
Other data hiding techniques..y Watermarking
The main goal of watermarking is to hide a message m in someaudio or video (cover) data d , to obtain new data d' ,
practically indistinguishable from d , by people, in such a waythat an eavesdropper cannot remove or replace m in d' .
y Cryptography
Cryptography is a technique to scramble a confidentialmessage to make it unreadable for a third party. But cannothide its presence, i.e., the location of the secret message isobvious.
![Page 5: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/5.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 5/16
Steganography - Historyy 440 B.C.
y Histiaeus shaved the head of his most trusted slave and
tattooed it with a message which disappeared after the hair
had regrown. To instigate a revolt against Persians.
y 1st and 2nd World Wars
y German spies used invisible ink to print very small dots on
letters.
y Microdots Blocks of text or images scaled down to the
size of a regular dot.
![Page 6: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/6.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 6/16
Why Image Files?y Digital image data contains a great deal of redundant
information (high capacity)
y Unlike audio or video, typically no copyright issues to arousesuspicion
y However, audio and video files have greater capacity thandigital images
y Researchers discourage use of clip art, images with text, fewcolor variations, and/or distinct lines
![Page 7: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/7.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 7/16
General
General steganographicsteganographic modelmodel
Steganographic algorithms are in general based on replacingnoise component of a digital object with a to-be-hidden
message.
![Page 8: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/8.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 8/16
Steganography technique:
Least Significant Bity Messages are encoded in the least significant bit of every byte
in an image. By doing so, the value of each pixel is changedslightly, but not enough to make significant visual in image,even when compared to the original image.
Consider a pixel sequence:
11100001 01100110 01100110 10111011
10110001 10010010 01110110 00100101
01000101 10001001 01110101 01000101
![Page 9: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/9.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 9/16
Steganography Technique:Least Significant BitExample: Inserting the word b using LSB techniques in abovesequence:
y b = 01100010
After encoding the sequence is changed as below
11100000 01100111 01100110 1011101010110000 10010010 01110111 00100100
01000101 10001001 01110101 01000101
![Page 10: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/10.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 10/16
Decryption
yIn the decryption section we use steganalysis, which is used tofind out a stego-file among the given file.
yThe embeded information can only be extracted by using aspecial extracting program called sniffer- dog program.
![Page 11: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/11.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 11/16
![Page 12: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/12.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 12/16
Drawbacks of LSB technique
y Limits the number of bytes that are available for holding the
payload.
y LSB technique can hide only 10% (or less) of the data amounts
of the vessel data.
![Page 13: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/13.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 13/16
To overcome drawbacks..
y To overcome the drawbacks in the LSB technique BPCS
technique.
y In BPCS we can replace all of the noise-like regions in the bit-
planes of the vessel image with secret data withoutdeteriorating the image quality.
![Page 14: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/14.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 14/16
ResultOriginal image Stego image
![Page 15: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/15.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 15/16
Conclusion
yThis project describes a technique successfully embed data inan color image.
yThe data extracted from the cover image also depends on thepixels values of the image.
![Page 16: IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1](https://reader030.fdocuments.in/reader030/viewer/2022021220/577d2ef81a28ab4e1eb07daa/html5/thumbnails/16.jpg)
8/7/2019 IMAGE BASED STEGANOGRAPHY USING LSB TECHNIQUE1
http://slidepdf.com/reader/full/image-based-steganography-using-lsb-technique1 16/16
THANK YO
U