Post on 04-Apr-2018
transcript
7/29/2019 Phase 1 PPT
1/19
Project Seminar on Steganography
Using LSB Substitution Method
Submitted By -
Iti Sri
1KS09CS033
Kumari Pallavi
1KS09CS057
Manan Bakshi
1KS09CS034
2/26/2013 1Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
2/19
Table of Contents
Introduction to Steganography
Review of Literature
Motivation Problem Definition
Objectives
System Requirements References
2/26/2013 2Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
3/19
What is Steganography?
Greek Words:STEGANOSCovered
GRAPHIEWriting
Steganography is the art and science
of writing hidden messages in such a
way that no one apart from the
intended recipient knows of the
existence of the message.
This can be achieve by concealing the
existence ofinformation withinseemingly harmless carriers or cover
Carrier: image, video, audio, etc.
2/26/2013 3Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
4/19
Watermarking vs. Steganography
Goal of steganography
Intruder cannot detect a message
Primarily 1:1 communication
Goal of watermarking
Intruder cannot remove or replace the message Primarily 1:many communication
2/26/2013 4Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
5/19
Steganography, Cryptography, and Watermarking
There are two major branches of information hiding,Steganography and Watermarking
Watermarking: Communication in watermarking is the host signal, with
the embedded data providing copyright protection.
The existence of a watermark is often declared openly.
Any attempt to remove or invalidate the embeddedcontent renders the host useless.
2/26/2013 5Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
6/19
Cryptography:
Doesnt conceal the communication. Scrambles the data to prevent eavesdroppers
understanding the content. Cryptography involves various methods and
implementations. May be considered complementary and
orthogonal (unrelated).
Once the presence of hidden information is revealedor even suspected, the purpose of steganographyis defeated.
2/26/2013 6Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
7/19
2/26/2013 7Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
8/19
we can hide the message by substituting the
LSB of each pixel with information bits in 24bpp RGB image. 24 bpp RGB image is a 24 bit
depth colour image using RGB colour model.
24 bit refers to 8 bit for each RGB colourchannel, i.e. 8 bits for red, 8 bits for green and
8 bits for blue.
2/26/2013 8Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
9/19
This implies that we can store three bits of
information per pixel at the LSB of RGB. By
changing the LSB of RGB values of each pixel,
we may get maximum 2X2X2=8 different
shades. This change in the pixel bits will be
indiscernible to the human eye
2/26/2013 9Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
10/19
Literature Review
M. M Amin, M. Salleh, S . Ibrahim, M.R.K Atmin, and M.Z.I.
Shamsuddin, Information hiding using steganography, IEEE 4th National
Conference on Telecommunication Technology Proceedings, Shah Alam,
Malaysia, pp. 21-25, January 2003.
Deshpande Neeta, Kamalapur Snehal and Daisy Jacobs, Implementation
of LSB steganography and its evaluation for various bits, IEEE 1st
International Conference on Digital Information Management, India, pp.
173-178, December 2006.
S .K. Moon and R.S. Kawitkar, Data security using data hiding, IEEE
International Conference on Computational Intelligence and Multimedia
Applications, India, pp. 247-251, January 2007
2/26/2013 10Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
11/19
Literature Review Contd
A Vadivel, A.K.Majumdar and Shamik Sural, Performance comparison of
distance matrices in context-based image retrieval applications, IITkharagpur research work.
Beenish Mehboob and Rashid Aziz Faruqui, A steganographyimplementation, IEEE-International symposium on Biometrics & securitytechnologies, ISBAST, Islamabad, April 2008.
Gandharba Swain and Saroj Kumar Lenka, A hybrid approach tosteganography embedding at darkest and brightest pixels, Proceedings ofthe International Conference on Communication and ComputationalIntelligence ,Kongu Engineering College, Perundurai, Erode, T.N., India,pp.529-534, December 2010.
V. Lokeswara Reddy, Dr. A. Subramanyam and Dr.P. Chenna Reddy,Implementation of LSB steganography and its evaluation for various fileformats, Int. J. Advanced Networking and Applications, vol. 2, pp.868-872,2011.
2/26/2013 11Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
12/19
Motivation
Steganography received little attention in computing
Renewed interest because of industry desire to protect
copyrighted digital work
audio images
video
Text
Detect counterfeiter, unauthorized presentation, embed key,
embed author ID
2/26/2013 12Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
13/19
Problem Definition
Conventional LSB technique uses the least significant
bit of consecutive pixels for embedding the message
which draws suspicion to transmission of a hidden
message. If the suspicion is raised, then the goal ofsteganography is defeated.
2/26/2013 13Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
14/19
Objectives
Increase The robustness of Algorithm by
using keyless steganography
Propose a novel technique to hide
information in a 24 bpp RGB image usingmodified LSB substitution method.
Security Enhancement in Comparison with
Conventional AlgorithmsTo Increase Capacity of storing information
per pixel.
2/26/2013 14Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
15/19
Software Requirements
Application Used for Development:-
Language:- Java (jdk6)
Development Tool:-Eclipse, Notepad
Platform:-Cross Platform
Essential Software:-Java Runtime Environment
2/26/2013 15Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
16/19
Hardware Requirements
1 Mega Byte disc space.
Minimum 512 MB RAM.
Pentium 3 or above processor.
700 MHz processor speed.
2/26/2013 16Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
17/19
References
Petitcolas, F.A.P., Anderson, R., Kuhn, M.G., "Information Hiding - ASurvey", July1999, URL:http://www.cl.cam.ac.uk/~fapp2/publications/ieee99-infohiding.pdf(11/26/0117:00)
Farid, Hany, Detecting Steganographic Messages in Digital Images
Department of Computer Science, Dartmouth College, Hanover NH 03755 Moby Words II, Copyright (c) 1988-93, Grady Ward. All Rights Reserved.
Lyu, Siwei and Farid, Hany, Steganalysis Using Color Wavelet Statistics andOne-Class Support Vector Machines, Department of Computer Science,Dartmouth College, Hanover, NH 03755, USA
Farid, Hany, Detecting Hidden Messages Using Higher Order StatisticalModels Department of Computer Science, Dartmouth College, HanoverNH 03755
2/26/2013 17Department of Computer Science &Engineering,KSIT,Bangalore
7/29/2019 Phase 1 PPT
18/19
Wikipedia
Exploring Steganography: Seeing the Unseen
N. Johnson & S. Jajodia
www.jjtc.com/stegdoc/steg1995.html
Information Hiding: Techniques for
Steganography and Digital Watermarking S.Katzenbeisser, F. Petitcolas
Digital Watermarking H. Bergel, L.
OGorman
2/26/2013 18Department of Computer Science &Engineering,KSIT,Bangalore
http://en.wikipedia.org/wiki/Steganographyhttp://en.wikipedia.org/wiki/Steganography7/29/2019 Phase 1 PPT
19/19
Thank You !
2/26/2013 19Department of Computer Science &Engineering,KSIT,Bangalore