7. Proposed research topic Steganography Data Protection & Encryption
through Information Security.
we are going to study detail observation of Steganography technology
and Steganalysis, definition of steganography technique, definition of
data and information detection (Steganalysis)
Introduction
20. Main Focus
Main focus of our research Steganography and Steganalysis, as define
in the introduction.
Steganography is scientific technique to hide and protect data and
information from unauthorized user and preforms specific modifications
on the object to protect and hide.
Research is divided into two parts; we can say start and end in starting
portion object or file is going to hide and ending portion the hidden file is
going to reshape into its original form and define as:
21. First Part:
What is Steganography?
How Steganography work?
What is the methodology of Steganography?
How algorithms use to perform Steganography?
During Steganography process which elements are
involve?
Second Part:
What is Steganalysis?
How Steganalysis work?
What is the methodology of Steganalysis?
How algorithms use to perform Steganalysis?
During Steganalysis process which elements are
involve?
22. Images Steganography
Classification of Images Steganography involves the following
Communication Algorithms
Insertion Technique Least Significant Bit (LSB)
Filtering & Masking
23. Communication Algorithms:
Data and information can embedded into undetected cover
There are three common communication techniques
1. Discrete wavelet transformation technique (DWT)
2. Fast Fourier transformation technique (FFT)
3. Discrete cosine transformation technique (DCT)
27. Insertion Technique Least Significant Bit (LSB)
• LSB used for transmission of data.
• digital signal processing images.
• Images are of two type 8 bit and 24 bit.
In 24 bit image 3 bit data embedded.
In 8 bit image 1 bit data embedded.
28. Filtering & Masking
• Many signals are mask and the first signal unmask,
• used in watermarking method.
44. Technical In Steganography and stegnalysis
• Detecting Steganography content on the Internet.
• Survey of Data mining Technique for stengalysis .
• Using Image quality Metrics in stegnalysis
• Using Image-adaption technique
• The investigation of hidden data/ info
50. Experiment & observations
There are number of research paper demonstrated on steganography in
different ways but our research focuses on core issue of our research
image steganography and one technique with LSB.
Data collection for steganography described different assumptions and
parities related to our topic (image steganography). Water marking and
least significant bit calculated that for image steganography these two
techniques are effective and used as common. In water marking if we
add one image with another image the output must be combination of
these images, it’s very simple phenomena and often observed.
52. Example-2
Two images are stored in memory locations one image worked as object
and other is host image.
Host image bits are selected for hide the object image as shown below.
Host image pixels 10110001
Secret image pixels0011111
And the output image pixels 10110011
Experiment & observations
53. Experiment & observations
One issue explored during experiment by comparing images it is difficult
to prevent attacks.
As 16 bit audio signals are
Audio bit Audio in Binary Audio with encode
output
1001 1000 0011 1100 0 1001 1000 0011 1100
1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1111 0011 1100 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
1000 1000 0001 1111 1 1000 1000 0001 1111
54. Experiment & observations
In one 8 bit/channel image size is 1000x1400 pixels and compressed by
use Jseg, JPEG image file format used DCT (Discrete cosine transform )
to hide information of image size 8x8 pixel image block into coefficients
of 64 (Discrete cosine transform) and least significant bits of DCT no
longer used inside which the hidden information embedded.
Statistical analysis or test introduced if actual image has changed (alter)
in its original form statistical characteristics accepted.