SlideShare une entreprise Scribd logo
1  sur  27
Sk. Arman Ali (110241)
Palash Kumar Sarker(110243)
An Enhanced RGB Image
Steganography Tenique
Using Dynamic Secret Key
Outline
• Steganography
• Steganography and cryptography
• Objectives
• Literature Review
• Related Works
• Proposed System
• Experimental Result Analysis
• Conclusion
• References
Message
Steganography
• Art of secret communication.
• To place hidden information in a carrier.
• Most efficient way to ensure the privacy.
Steganography
Cover file(image,
audio, video)
Stego file(image,
audio, video)
History
Current
1st and 2nd
World Wars
440 B.C
Steganography and cryptography
• Same Purpose – To hide or protect important information.
• But different approach
Steganography – conceals information, making it unseen.
Cryptography – encrypts information, making it unreadable.
Objectives
• To pass a text through an image file in a
robust and advanced secured way.
• To embed secret information into only blue
channel of cover image.
• Better stego image quality.
• Dynamically embed to increase the security
using dynamic secret key.
Literature Review
DIGITAL APPROACHES
– Today, it often exists within digital
formats.
– It makes use of seemingly innocent cover files
such as text, audio, and image files.
– The embedded message may be anything that
can be encoded in binary
Literature Review(continued…)
KEY Requirements of Steganography EY
Requirements of
Steganography
Steganography
Robustness
Capacity
Perceptibility
Literature Review(continued…)
Steganography
Image
Audio
VideoText
Network
Types of Steganography
Literature Review(continued…)
REASONS FOR USING DIGITAL IMAGES
– It is the most widely used medium being used
today.
– Takes advantage of our limited visual perception
of colors.
– This field is expected to continually grow as
computer graphics power also grows.
– Many programs are available to apply
steganography.
IMAGE STEGANOGRAPHY
– Image steganography is a method of information
hiding into cover-image and generates a stego-image.
– This stego-image then sent the other party by known
medium, where the third party does not know that
this stego-image has hidden message.
– After receiving stego-image hidden message can
simply be extracted with or without stego-key
(depending on embedding algorithm) by the receiving
end
Literature Review(continued…)
Literature Review(continued…)
Types of image steganography
• Image domain
Also known as spatial domain techniques embed
messages in the intensity of the pixels directly.
• Transform domain
Also known as frequency domain, images are first
transformed and then the message is embedded in
the image.
Literature Review(continued…)
How does image Steganography work?
Related work
Improved LSB Based Steganography Technique [1]
-Capacity is high.
-LSB(1-3-4 ) is used for data embedding .
Limitations
-Human eye is very sensitive in red and green color.
-For edge area, change all bits of blue channel and it
decreases image quality.
-Very much easy to attack the stego image.
-PSNR is low.
[1] Mamta Juneja and Parvinder S. Sandhu, “An Improved LSB Based Steganography Technique for RGB Color
Images”, International Journal of Computer and Communication Engineering, Vol.2, No.4, July 2013.
Related work(continued…)
New Approach for LSB Based Image Steganography using
Secret Key [2]
-Secret key encrypts the hidden information.
-Hidden information is stored into variable position of LSB of
image.
Limitations
-Green channel is used to store data.
-Low payload. capacity
-Easy to detect.
[2] S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography
using Secret Key”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011) ,22-24
December, 2011, Dhaka, Bangladesh.
Related work(continued…)
Novel Approach to RGB Channel Based Image Steganography
Technique [3]
– High payload capacity.
– Pixel chosen dynamically.
Limitations
- Red, green and blue channel are used to store data.
- Low PSNR.
- Easy to detect the stego image.
[3]Gandharba Swain and Saroj Kumar Lenka, “A Novel Approach to RGB Channel Based Image Steganography
Technique”, International Arab Journal of e-Technology, Vol. 2, No. 4, June 2012.
Proposed System
Our proposed system is divided into two parts
Encoding Decoding
Message
Stegosystem
Encoder
Stego Image
Cover
Image
Stego Image
Stegosystem
Encoder
Message
Secret key
Data Embedding Process
Data Extracting Process
Experimental Result Analysis
User Interface
Experimental Result Analysis (cont..)
Experimental Result Analysis (cont..)
 PSNR
Calculation
 Payload Capacity
Experimental Result Analysis (cont..)
Result comparison
Experimental Result Analysis (cont..)
Result comparison
PSNRindB
Image name
Experimental Result Analysis (cont..)
Histogram Error Comparison
Conclusion
• Hiding data in best secured way.
• Bits are embedded into variable position of deeper
layer where variable position protects data against
intentional attacks.
• High robustness against intentional and unintentional
attack as well.
• The use of secret key gives a way to secure the
information from malicious user.
• Proposed system is implemented efficiently and most
robust, error free way.
• Dynamic secret key increases the security level.
References
[1] G. R. Manjula, A. Danti, “ Hash based least significant bit (2-3-3) image steganography in spatial domain”,
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol. 4, No. 1, February 2015.
[2] S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image
Steganography using Secret Key”, Proceedings of 14th International Conference on Computer and Information
Technology (ICCIT 2011) 22-24 December, 2011, Dhaka, Bangladesh.
[3] G. Chugh, R.K. Yadav and R. Saini, “A New Image Steganographic Based on Mod Factor for RGB Images”
International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol.7, No. 3,pp.27-44,
2014.
[4] A. K. Bairagi, “ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in
Data Security”, ISSN 2218-5224 (Online, Vol. 01, Issue 02, Manuscript Code: 110112).
[5] A. K. Bairagi, S. Mondal, R. Debnath, ” A Robust RGB Channel Based Image Steganography Technique using
a Secret Key”, 16th Int'l Conf. Computer and Information Technology, 8-10 March 2014, Khulna, Bangladesh.
[6] Juneja, Sandhu, “an Improved LSB Based Steganography Technique for RGB Color Images”, International
Journal of Computer and Communication Engineering, Vol. 2, No. 4, July 2013.
[7] R. Bahirat, A. Kolhe, “Overview of Secure Data Transmission Using Steganography”, International Journal of
Emerging Technology and Advanced Engineering, Vol. 4, Issue 3, March 2014.

Contenu connexe

Tendances

encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
INFOGAIN PUBLICATION
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
Kaushik Chakraborty
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
ijseajournal
 

Tendances (20)

Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
D010312230
D010312230D010312230
D010312230
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 

Similaire à A secured-rgb-image-steganography-using-secret-key

LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
ijtsrd
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 

Similaire à A secured-rgb-image-steganography-using-secret-key (20)

A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
L045056469
L045056469L045056469
L045056469
 
Stegnography
StegnographyStegnography
Stegnography
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
1.pdf
1.pdf1.pdf
1.pdf
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

A secured-rgb-image-steganography-using-secret-key

  • 1. Sk. Arman Ali (110241) Palash Kumar Sarker(110243) An Enhanced RGB Image Steganography Tenique Using Dynamic Secret Key
  • 2. Outline • Steganography • Steganography and cryptography • Objectives • Literature Review • Related Works • Proposed System • Experimental Result Analysis • Conclusion • References
  • 3. Message Steganography • Art of secret communication. • To place hidden information in a carrier. • Most efficient way to ensure the privacy. Steganography Cover file(image, audio, video) Stego file(image, audio, video)
  • 5. Steganography and cryptography • Same Purpose – To hide or protect important information. • But different approach Steganography – conceals information, making it unseen. Cryptography – encrypts information, making it unreadable.
  • 6. Objectives • To pass a text through an image file in a robust and advanced secured way. • To embed secret information into only blue channel of cover image. • Better stego image quality. • Dynamically embed to increase the security using dynamic secret key.
  • 7. Literature Review DIGITAL APPROACHES – Today, it often exists within digital formats. – It makes use of seemingly innocent cover files such as text, audio, and image files. – The embedded message may be anything that can be encoded in binary
  • 8. Literature Review(continued…) KEY Requirements of Steganography EY Requirements of Steganography Steganography Robustness Capacity Perceptibility
  • 10. Literature Review(continued…) REASONS FOR USING DIGITAL IMAGES – It is the most widely used medium being used today. – Takes advantage of our limited visual perception of colors. – This field is expected to continually grow as computer graphics power also grows. – Many programs are available to apply steganography.
  • 11. IMAGE STEGANOGRAPHY – Image steganography is a method of information hiding into cover-image and generates a stego-image. – This stego-image then sent the other party by known medium, where the third party does not know that this stego-image has hidden message. – After receiving stego-image hidden message can simply be extracted with or without stego-key (depending on embedding algorithm) by the receiving end Literature Review(continued…)
  • 12. Literature Review(continued…) Types of image steganography • Image domain Also known as spatial domain techniques embed messages in the intensity of the pixels directly. • Transform domain Also known as frequency domain, images are first transformed and then the message is embedded in the image.
  • 13. Literature Review(continued…) How does image Steganography work?
  • 14. Related work Improved LSB Based Steganography Technique [1] -Capacity is high. -LSB(1-3-4 ) is used for data embedding . Limitations -Human eye is very sensitive in red and green color. -For edge area, change all bits of blue channel and it decreases image quality. -Very much easy to attack the stego image. -PSNR is low. [1] Mamta Juneja and Parvinder S. Sandhu, “An Improved LSB Based Steganography Technique for RGB Color Images”, International Journal of Computer and Communication Engineering, Vol.2, No.4, July 2013.
  • 15. Related work(continued…) New Approach for LSB Based Image Steganography using Secret Key [2] -Secret key encrypts the hidden information. -Hidden information is stored into variable position of LSB of image. Limitations -Green channel is used to store data. -Low payload. capacity -Easy to detect. [2] S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography using Secret Key”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011) ,22-24 December, 2011, Dhaka, Bangladesh.
  • 16. Related work(continued…) Novel Approach to RGB Channel Based Image Steganography Technique [3] – High payload capacity. – Pixel chosen dynamically. Limitations - Red, green and blue channel are used to store data. - Low PSNR. - Easy to detect the stego image. [3]Gandharba Swain and Saroj Kumar Lenka, “A Novel Approach to RGB Channel Based Image Steganography Technique”, International Arab Journal of e-Technology, Vol. 2, No. 4, June 2012.
  • 17. Proposed System Our proposed system is divided into two parts Encoding Decoding Message Stegosystem Encoder Stego Image Cover Image Stego Image Stegosystem Encoder Message Secret key
  • 22. Experimental Result Analysis (cont..)  PSNR Calculation  Payload Capacity
  • 23. Experimental Result Analysis (cont..) Result comparison
  • 24. Experimental Result Analysis (cont..) Result comparison PSNRindB Image name
  • 25. Experimental Result Analysis (cont..) Histogram Error Comparison
  • 26. Conclusion • Hiding data in best secured way. • Bits are embedded into variable position of deeper layer where variable position protects data against intentional attacks. • High robustness against intentional and unintentional attack as well. • The use of secret key gives a way to secure the information from malicious user. • Proposed system is implemented efficiently and most robust, error free way. • Dynamic secret key increases the security level.
  • 27. References [1] G. R. Manjula, A. Danti, “ Hash based least significant bit (2-3-3) image steganography in spatial domain”, International Journal of Security, Privacy and Trust Management (IJSPTM) Vol. 4, No. 1, February 2015. [2] S. M. Masud Karim, Md. Saifur Rahman and Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography using Secret Key”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011) 22-24 December, 2011, Dhaka, Bangladesh. [3] G. Chugh, R.K. Yadav and R. Saini, “A New Image Steganographic Based on Mod Factor for RGB Images” International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol.7, No. 3,pp.27-44, 2014. [4] A. K. Bairagi, “ASCII based Even-Odd Cryptography with Gray code and Image Steganography: A dimension in Data Security”, ISSN 2218-5224 (Online, Vol. 01, Issue 02, Manuscript Code: 110112). [5] A. K. Bairagi, S. Mondal, R. Debnath, ” A Robust RGB Channel Based Image Steganography Technique using a Secret Key”, 16th Int'l Conf. Computer and Information Technology, 8-10 March 2014, Khulna, Bangladesh. [6] Juneja, Sandhu, “an Improved LSB Based Steganography Technique for RGB Color Images”, International Journal of Computer and Communication Engineering, Vol. 2, No. 4, July 2013. [7] R. Bahirat, A. Kolhe, “Overview of Secure Data Transmission Using Steganography”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4, Issue 3, March 2014.