AUDISANKARA COLLEGE OF ENGINEERING AND
TECHNOLOGY
DEPARTMENT OF CSE
A TechnicalSeminar
on
STEGANOGRAPHY
Presented by
A.Keerthi Yadav
12G21A0505
Overview Introduction
 History
 Problem statement
 Objective of the study
 Scope
 Steganography techniques
 LSB algorithm
 Design phase
 Snapshots
 Results and discussion
 Conclusion and further enhancement
 References
INTRODUCTION
 Steganography comes from Greek word which means
covered or secret writing.
 Stegan means covered, graphy means writing
Continue
 “The goal of steganography is to hide messages in such a way that no
one apart from the intended recipient even knows that a message has been sent.”
 This can be achieve by concealing the existence of information within
seemingly harmless carriers or cover
 It can be understand by the following figure.
History
 The first recorded uses of steganography can be traced back to
440 BC when Herodotus mentions an example of
steganography in the histories of Herodotus.
 Ancient example is that of histories, who shaved the head of
his most trusted slave and tattooed a message on it. After his
hair had grown the message was hidden. The purpose was to
instigate a revolt against the Persians.
Problem Statement
 How can we send a message secretly to the destination.
 Using steganography, information can be hidden in carriers such as images,
audio files, text files, videos and data transmissions.
 In this study, I proposed a new framework of an image steganography system to
hide a digital text of a secret message.
Objective of the Study
Here primarily concentrated on the data security issues when
sending the data over the network using steganographic techniques.
The main objectives of the project are:
 Requirement of this steganography system is that the hider message
carried by stego-media should not be sensible to human beings.
 The other goal of steganography is to avoid drawing suspicion to the
existence of a hidden message.
 This approach of information hiding technique has recently become
important in a number of application areas.
Scope
 The scope of the project is to limit unauthorized access and provide better
security during message transmission. To meet the requirements, we use the
simple and basic approach of steganography.
 In this project, the proposed approach finds the suitable algorithm for
embedding the data in an image using steganography which provides the
better security pattern for sending messages through a network.
 For practically implementing the function of the discussed algorithms,
Microsoft .NET framework is used.
Steganography Technique
Pure steganography: Pure steganography is the process of embedding the
data into the object without using any private keys. This type of steganography
entirely depends upon the secrecy. This type of steganography uses a cover
image in which data is to be embedded, personal information to be
transmitted, and encryption decryption algorithms to embed the message into
image.
LSB Algorithm
 LSB (Least Significant Bit) substitution is the process of adjusting the least
significant bit pixels of the carrier image.
 It is a simple approach for embedding message into the image.
 The Least Significant Bit insertion varies according to number of bits in an
image.
 For an 8 bit image, the least significant bit i.e., the 8th bit of each byte of the
image is changed to the bit of secret message.
 For 24 bit image, the colors of each component like RGB (red, green and blue)
are changed.
 LSB is effective in using BMP images since the compression in BMP is lossless
How LSB Works
Structure of text file:
Any text file consists of streams of characters , each character is 1 byte
(ASCII code) each byte as all of us of course know consists of 8 bits .
Continue
Design Phase
Start
Application
Encryption Decryption
Image file
BMP image
file
Image Message
file
Image Messagefile
Figure: Block diagram for Steganography
Continue
ENCRYPTION PHASE:
The “Encryption phase” uses two types of files for encryption purpose.
One is the secret file which is to be transmitted securely, and the other is a carrier file
such as image. In the encryption phase the data is embedded into the image.
Figure: Encryption Phase Process
Continue
DECRYPTION PHASE:
The Decryption phase is reverse to encryption phase. In
decryption phase, the carrier image in which the data is hided is given as an input
file. decryption section uses the “Least Significant bit Algorithm” (LSB) by which
the encoded bits in the image is decoded and turns to its original state and gives
the output as a text document.
Figure: Decryption Phase Process
Snapshots
Continue
Continue
Continue
Continue
Continue
Results and Discussion
 In this project I mainly concentrated on embedding the data into an image
such that the image is protected and the data to the destination is sent
securely.
 The speed of embedding the data into the image is also high in the proposed
approach
 There are many steganographic algorithms available like JSteg, F5 and LSB
algorithms.
 But we used the Least Significant Bit algorithm in designing the
steganographic application because LSB algorithm works efficiently.
 The speed of embedding is also high when using LSB compared to the JSteg
algorithm.
Conclusion
 In the present world, the data transfers using internet is rapidly growing
because it is so easier as well as faster to transfer the data to destination. So,
many individuals and business people use to transfer business documents,
important information using internet.
 Security is an important issue while transferring the data using internet
because any unauthorized individual can hack the data and make it useless or
obtain information un- intended to him.
Stegnography

Stegnography

  • 1.
    AUDISANKARA COLLEGE OFENGINEERING AND TECHNOLOGY DEPARTMENT OF CSE A TechnicalSeminar on STEGANOGRAPHY Presented by A.Keerthi Yadav 12G21A0505
  • 2.
    Overview Introduction  History Problem statement  Objective of the study  Scope  Steganography techniques  LSB algorithm  Design phase  Snapshots  Results and discussion  Conclusion and further enhancement  References
  • 3.
    INTRODUCTION  Steganography comesfrom Greek word which means covered or secret writing.  Stegan means covered, graphy means writing
  • 4.
    Continue  “The goalof steganography is to hide messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  It can be understand by the following figure.
  • 5.
    History  The firstrecorded uses of steganography can be traced back to 440 BC when Herodotus mentions an example of steganography in the histories of Herodotus.  Ancient example is that of histories, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.
  • 6.
    Problem Statement  Howcan we send a message secretly to the destination.  Using steganography, information can be hidden in carriers such as images, audio files, text files, videos and data transmissions.  In this study, I proposed a new framework of an image steganography system to hide a digital text of a secret message.
  • 7.
    Objective of theStudy Here primarily concentrated on the data security issues when sending the data over the network using steganographic techniques. The main objectives of the project are:  Requirement of this steganography system is that the hider message carried by stego-media should not be sensible to human beings.  The other goal of steganography is to avoid drawing suspicion to the existence of a hidden message.  This approach of information hiding technique has recently become important in a number of application areas.
  • 8.
    Scope  The scopeof the project is to limit unauthorized access and provide better security during message transmission. To meet the requirements, we use the simple and basic approach of steganography.  In this project, the proposed approach finds the suitable algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network.  For practically implementing the function of the discussed algorithms, Microsoft .NET framework is used.
  • 9.
    Steganography Technique Pure steganography:Pure steganography is the process of embedding the data into the object without using any private keys. This type of steganography entirely depends upon the secrecy. This type of steganography uses a cover image in which data is to be embedded, personal information to be transmitted, and encryption decryption algorithms to embed the message into image.
  • 10.
    LSB Algorithm  LSB(Least Significant Bit) substitution is the process of adjusting the least significant bit pixels of the carrier image.  It is a simple approach for embedding message into the image.  The Least Significant Bit insertion varies according to number of bits in an image.  For an 8 bit image, the least significant bit i.e., the 8th bit of each byte of the image is changed to the bit of secret message.  For 24 bit image, the colors of each component like RGB (red, green and blue) are changed.  LSB is effective in using BMP images since the compression in BMP is lossless
  • 11.
    How LSB Works Structureof text file: Any text file consists of streams of characters , each character is 1 byte (ASCII code) each byte as all of us of course know consists of 8 bits .
  • 12.
  • 13.
    Design Phase Start Application Encryption Decryption Imagefile BMP image file Image Message file Image Messagefile Figure: Block diagram for Steganography
  • 14.
    Continue ENCRYPTION PHASE: The “Encryptionphase” uses two types of files for encryption purpose. One is the secret file which is to be transmitted securely, and the other is a carrier file such as image. In the encryption phase the data is embedded into the image. Figure: Encryption Phase Process
  • 15.
    Continue DECRYPTION PHASE: The Decryptionphase is reverse to encryption phase. In decryption phase, the carrier image in which the data is hided is given as an input file. decryption section uses the “Least Significant bit Algorithm” (LSB) by which the encoded bits in the image is decoded and turns to its original state and gives the output as a text document. Figure: Decryption Phase Process
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
    Results and Discussion In this project I mainly concentrated on embedding the data into an image such that the image is protected and the data to the destination is sent securely.  The speed of embedding the data into the image is also high in the proposed approach  There are many steganographic algorithms available like JSteg, F5 and LSB algorithms.  But we used the Least Significant Bit algorithm in designing the steganographic application because LSB algorithm works efficiently.  The speed of embedding is also high when using LSB compared to the JSteg algorithm.
  • 23.
    Conclusion  In thepresent world, the data transfers using internet is rapidly growing because it is so easier as well as faster to transfer the data to destination. So, many individuals and business people use to transfer business documents, important information using internet.  Security is an important issue while transferring the data using internet because any unauthorized individual can hack the data and make it useless or obtain information un- intended to him.