SlideShare une entreprise Scribd logo
1  sur  25
Dr. Babasaheb Ambedkar Technological University, Lonere
Department of InformationDepartment of Information
Technology @2014-2018Technology @2014-2018
Project membersProject members
Abhijeet Khire.Abhijeet Khire.
Shweta Mahadik.Shweta Mahadik.
Madhav Solanke.Madhav Solanke.
Suraj Panavkar.Suraj Panavkar.
Dr. Babasaheb Ambedkar Technological University, Lonere
What is Steganography?
Steganography is the art and
science of writing hidden messages
in such a way that no one, apart
from the sender and intended
recipient, suspects the existence of
the message.
Problem Statement
 How can we send a message secretly to the
destination.
 Using steganography, information can be hidden
in carriers such as images.
 In this study, I proposed a new framework of an
image steganography system to hide a digital text
of a secret message.
Categories of Steganography
Text Steganography
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
‘Secret inside’
Image Steganography
What is Image Steganography?
Image Steganography is the technique of hiding
the data within the image in such a way that prevents
the unintended user from the detection of the hidden
messages or data.
For example,
Cover Image
Data / Message
Stego Image
Applications of Image Steganography
Secure Private Files and Documents.
Hide Passwords and Encryption Keys.
Transport Highly Private Documents between
International Governments.
Transmit message/data without revealing the
existence of available message.
Image Domain
What Images are made up of ? :-What Images are made up of ? :-
Images are made up of lots of little dots called pixels. Each
pixel is represented as 3 bytes3 bytes – one for RedRed, one for GreenGreen
and one for BlueBlue.
Each byte is interpreted as an integer numberinteger number, which is how
much of that color is used to make the final color of the
pixel.
11111000 11001001 00000011
248 201 3
248 + 201 + 3 = Orange Color
Image Domain
The difference between two colors that differ by one
bit in either one red, green or blue value is impossible
detect for a human eyehuman eye.
So we can change the least significant (last) bit in a
byte, we either add or subtract one or more values
from the value it represents.
This means we can overwrite the last bit in a byte
without affecting the colors it appears to be.
Image Domain
A approach of hiding data within an
image file is Least Significant Bit (LSB)Least Significant Bit (LSB)
SubstitutionSubstitution.
In this method, we can take the
binary representation of the hidden
data and overwrite the LSB of each byte
within the cover image.
Least Significant Bit Substitution
Suppose we have the following binary representation for the
Cover Image.
10010101 00001101
10010110 00001111
Suppose we want to "hide" the following 4 bits of data: 10111011,
we get the following,
100101011 000011011
100101100 000011111
Where the each data bits are accommodated in the least
significant bits of each byte of the image.
Least Significant Bit Substitution
Least Significant Bit Substitution results in a
very minor distortion of the image which is very
much negligible for the human eyes.
Cover Image Stego Image
Substitution Levels
4-bits 5-bits
6-bits 7-bits
Pixel Indicator
This method uses the least two significant bits
of one of the channelsone of the channels to indicate existence of
data in the other two channelsother two channels.
Pixel Indicator
Example,
Initial Pixel Bytes: 10101101 11011010 11100101
Data to be Embedded: 11011101
Channel R: 1010111111
Channel G: 1101100101
Channel B: 1110011111
Pixel Indicator Bits
RR GG BB
Indicating Channel
Channels in
which Data is
Embedded
Stego Color Cycle
The SCC technique uses the RGB
images to hide the data in different
channels.
It keeps cycling the hidden data
between the Red, Green and Blue
channels, utilizing one channel at a
cycle time.
Triple-A
Triple-A technique uses the same principle of LSB,
where the secret is hidden in the least significant bits of
the pixels, with more randomizationrandomization in selection of the
number of bits used and the color channels that are
used.
• Two Seeds:
• To determine the used channels
• To determine the number of bits used
This randomization is expected to increase the security
of the system.
Max-bit
This method measures the intensityintensity of the pixel and
then hides data by random pixel selectionrandom pixel selection with a
goal to hide maximum data in each pixel.
This method is divided into three parts:
Encryption
Image Intensity Calculation
Steganography.
CONCLUSION :
Confidential communication and secret data storing
Steganography provides us with:
Potential capability to hide the existence of confidential data
Hardness of detecting the hidden (i.e., embedded) data
Strengthening of the secrecy of the encrypted data
Protection of data alteration
Access control system for digital content distribution
Media Database systems
Usage in modern printers
Alleged use by terrorists
Alleged use by intelligence services
Phase one image steganography_batu

Contenu connexe

Tendances

Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
Lovely Mnadal
 

Tendances (20)

Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with SteganographyImage secret sharing using Shamir's scheme with Steganography
Image secret sharing using Shamir's scheme with Steganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Steganography
SteganographySteganography
Steganography
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 

Similaire à Phase one image steganography_batu

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
ANUP PALARAPWAR
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
IJECEIAES
 

Similaire à Phase one image steganography_batu (20)

Imagesteganographydbatuaudi
ImagesteganographydbatuaudiImagesteganographydbatuaudi
Imagesteganographydbatuaudi
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
Steganography
SteganographySteganography
Steganography
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 

Plus de ABHIJEET KHIRE

Plus de ABHIJEET KHIRE (20)

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 question
 
Test resume
Test resumeTest resume
Test resume
 
Ddl
DdlDdl
Ddl
 
Create
CreateCreate
Create
 
All questions
All questionsAll questions
All questions
 
2 q on groups
2 q on groups2 q on groups
2 q on groups
 
1 q on operators
1 q on operators1 q on operators
1 q on operators
 
Q on subquery
Q on subqueryQ on subquery
Q on subquery
 
Q on joins
Q on joinsQ on joins
Q on joins
 
Q on functions
Q on functionsQ on functions
Q on functions
 
SQL QUERY PRACTICE
SQL QUERY PRACTICE SQL QUERY PRACTICE
SQL QUERY PRACTICE
 
Mysql schema emp dept
Mysql schema emp deptMysql schema emp dept
Mysql schema emp dept
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Phase one image steganography_batu

  • 1. Dr. Babasaheb Ambedkar Technological University, Lonere
  • 2. Department of InformationDepartment of Information Technology @2014-2018Technology @2014-2018 Project membersProject members Abhijeet Khire.Abhijeet Khire. Shweta Mahadik.Shweta Mahadik. Madhav Solanke.Madhav Solanke. Suraj Panavkar.Suraj Panavkar. Dr. Babasaheb Ambedkar Technological University, Lonere
  • 3. What is Steganography? Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
  • 4. Problem Statement  How can we send a message secretly to the destination.  Using steganography, information can be hidden in carriers such as images.  In this study, I proposed a new framework of an image steganography system to hide a digital text of a secret message.
  • 6. Text Steganography Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ‘Secret inside’
  • 8. What is Image Steganography? Image Steganography is the technique of hiding the data within the image in such a way that prevents the unintended user from the detection of the hidden messages or data. For example, Cover Image Data / Message Stego Image
  • 9. Applications of Image Steganography Secure Private Files and Documents. Hide Passwords and Encryption Keys. Transport Highly Private Documents between International Governments. Transmit message/data without revealing the existence of available message.
  • 10. Image Domain What Images are made up of ? :-What Images are made up of ? :- Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes3 bytes – one for RedRed, one for GreenGreen and one for BlueBlue. Each byte is interpreted as an integer numberinteger number, which is how much of that color is used to make the final color of the pixel. 11111000 11001001 00000011 248 201 3 248 + 201 + 3 = Orange Color
  • 11. Image Domain The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eyehuman eye. So we can change the least significant (last) bit in a byte, we either add or subtract one or more values from the value it represents. This means we can overwrite the last bit in a byte without affecting the colors it appears to be.
  • 12. Image Domain A approach of hiding data within an image file is Least Significant Bit (LSB)Least Significant Bit (LSB) SubstitutionSubstitution. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image.
  • 13. Least Significant Bit Substitution Suppose we have the following binary representation for the Cover Image. 10010101 00001101 10010110 00001111 Suppose we want to "hide" the following 4 bits of data: 10111011, we get the following, 100101011 000011011 100101100 000011111 Where the each data bits are accommodated in the least significant bits of each byte of the image.
  • 14. Least Significant Bit Substitution Least Significant Bit Substitution results in a very minor distortion of the image which is very much negligible for the human eyes. Cover Image Stego Image
  • 16. Pixel Indicator This method uses the least two significant bits of one of the channelsone of the channels to indicate existence of data in the other two channelsother two channels.
  • 17. Pixel Indicator Example, Initial Pixel Bytes: 10101101 11011010 11100101 Data to be Embedded: 11011101 Channel R: 1010111111 Channel G: 1101100101 Channel B: 1110011111 Pixel Indicator Bits RR GG BB Indicating Channel Channels in which Data is Embedded
  • 18. Stego Color Cycle The SCC technique uses the RGB images to hide the data in different channels. It keeps cycling the hidden data between the Red, Green and Blue channels, utilizing one channel at a cycle time.
  • 19. Triple-A Triple-A technique uses the same principle of LSB, where the secret is hidden in the least significant bits of the pixels, with more randomizationrandomization in selection of the number of bits used and the color channels that are used. • Two Seeds: • To determine the used channels • To determine the number of bits used This randomization is expected to increase the security of the system.
  • 20. Max-bit This method measures the intensityintensity of the pixel and then hides data by random pixel selectionrandom pixel selection with a goal to hide maximum data in each pixel. This method is divided into three parts: Encryption Image Intensity Calculation Steganography.
  • 21.
  • 22.
  • 23.
  • 24. CONCLUSION : Confidential communication and secret data storing Steganography provides us with: Potential capability to hide the existence of confidential data Hardness of detecting the hidden (i.e., embedded) data Strengthening of the secrecy of the encrypted data Protection of data alteration Access control system for digital content distribution Media Database systems Usage in modern printers Alleged use by terrorists Alleged use by intelligence services