Excellence of Steganography: State Board of Technical Education & Training, Ts
Excellence of Steganography: State Board of Technical Education & Training, Ts
PROJECT REPORT
ON
EXCELLENCE OF STEGANOGRAPHY
Submitted to
DIPLOMA
In
COMPUTER ENGINEERING
Submitted By
B.KRISHNAVENI (20261-CM-033)
K.ABHI RAM VARMA (20261-CM-019)
B.SRIJA (20261-CM-027)
S.RAHUL (20261-CM-051)
B.RITHWIN (20261-CM-021)
Under the Esteemed guidance of
MS.V.PAVANI(B.Tech)
Lecturer
CSE Dept.
CERTIFICATE
EXTERNAL EXAMINER
ACKNOWLEDGEMENT
I would like to thank, Mrs.B. JAYASRI, Assistant Professor & HOD CSE
Department, for her valuable suggestions during the Project work.
I also thank all the Faculty Members, Department of Computer Engineering for
their encouragement and assistance.
PROJECT ASSOCIATIVES:
B.KRISHNAVENI 20261-CM-033
K.ABHI RAM VARMA 20261-CM-019
B.SRIJA 20261-CM-027
S.RAHUL 20261-CM-051
B.RITHWIN 20261-CM-021
DECLARATION
In this modern era, one of the major issue is to protect the secrecy of confidential data during
their transmission over a public channel. So we need a security over the data which is being
transmitted. To achieve this the powerful security, Steganography is needed.
Our Project aims to use the technique is LSB (Least Significant Bit) and the
algorithm is spatial domain method, so, that the human eye would not notice the hidden
messages within it. RGB is the color model in which each pixel is 3 bytes, uses LSB to hide
the data in three color channels. RGB images where each pixel is represented by three bytes
indicating the intensity of red, green and blue in which each primary color represented 8 bits.
We use bmp image format as it contains uncompressed data while pixels are chosen as
random rather than in order.
For implementing our project, the interactive language python with some packages
are used. Robustness, hiding capacity, Perceptual Transparency are important features of
steganography which made it strong, can transfer data more securely.
TABLE OF CONTENT
CERTIFICATE
DECLARATION
ACKNOWLEDGMENT
ABSTRACT
. Chapter - 1
INTRODUCTION 3
1.1 Introduction to Steganography
1.2 Project Definition
1.3 Statement of problem
1.4 Project Objectives
1.5 Project Scope
1.6 Steganography Architecture
. Chapter – 2
LITERATURE REVIEW 8
. Chapter – 3
REQUIREMENTS 13
3.1 Existence of the Steganography systems
3.2 Overview of the proposed systems
3.3 System Requirements
3.3.1 Functional Requirements
3.3.2 Non-Functional Requirements
3.3.3 Software Requirements
3.3.4 Hardware Requirements
. Chapter – 4
STEGANOGRAPHY 17
4.1 Types of Steganography
4.1.1 Text Steganography
4.1.2 Audio Steganography
4.1.3 Video Steganography
4.1.4 Network Steganography.
4.1.5 Image Steganography
. Chapter – 5
DESIGN METHODOLOGIES 31
5.1 Types of Algorithm’s in Image Steganography
. Chapter – 6
. Chapter – 7
APPLICATIONS OF SYSTEM 48
7.1 Advantages of Image Steganography
7.2 Applications of Image Steganography
. Chapter – 8
SYSTEM TESTING AND COMPARISION 51
8.1 Testing Analysis
8.2 Cryptography vs Steganography
. Chapter – 9
CONCLUSION AND REFERENCE 55
9.1 Conclusion
9.2 Reference
2
CHAPTER 1
INTRODUCTION
3
1.1 INTRODUCTION TO STEGANOGRAPHY
Image Steganographic technologies are very important part of the future for internet security
and privacy on open systems such as the internet. In today’s world, the communication is the
basic necessity of every growing area. Everyone wants the secrecy and safety of their
communicating data. We can achieve secret transmission of data by steganography and
cryptography.
Image Future internet security and privacy on open systems like the internet will greatly
benefit from steganographic technology. In today's society, communication is a fundamental
requirement for any expanding region. Everyone wants their communicating data to be secure
and secret. Steganography and cryptography enable the transport of data in an untraceable
manner.
Image Steganographic technology will play a critical role in the future of internet security
and privacy on public networks like the internet. The fundamental requirement of every
expanding sector in the modern world is communication. Everyone desires that their
communicating data be secure and confidential. Steganography and cryptography provide
secure data transmission.
4
1.2 PROJECT DEFINITION
After studying the data hiding algorithms we found many ways to hiding data
by using the multimedia files and the main question for me was “Where hidden data hides?”
as we found by our search to know where the data hides it’s important to know what is file
type of the data that is shall be hidden and the cover file type so it is possible to alter graphic
or sound files slightly without losing their overall viability for the viewer and listener. With
audio, you can use bits of file that contain sound not audible to the human ear. With graphic
images, you can remove redundant bits of color from the image and still produce a picture
that looks intact to human eye and is difficult to discern from its original. It is in those bits
that stego hides its data.
The key concern I had after studying the data concealing techniques was, "Where
hidden data hides?" We discovered numerous methods of data hiding using multimedia files.
As we discovered via our research, it's crucial to understand the file type of the data that will
be hidden as well as the cover file type in order to make minor changes to graphic or sound
files without compromising their overall suitability for the viewer or listener. You can employ
audio file fragments that contain sound that is inaudible to human ears. Graphic images allow
you to remove unnecessary colour from the image and still create a picture that appears to the
human eye to be in tact.
By the end of our research, we created a graphical user interface that uses an
algorithm to embed data in an image. This system, which is called "Image Steganography,"
was created with the goal of encrypting the data. LSB is the steganographic algorithm that we
use in this system to hide the data.
5
1.3 STATEMENT OF PROBLEM
This project addresses the security problem of transmitting the data over internet
network, the main idea coming when we start asking that how can we send a message secretly
to the destination? The science of steganography answers this question. Using steganography,
information can be hidden in carriers such as images, audio files, text files, videos and data
transmissions.
In this project we primarily concentrated on the data security issues when sending the
data over the network using steganography techniques.
The main objectives of our project are to product security tool based on
steganography techniques to hider message carried by stego-media which should not be
sensible to human beings and avoid drawing suspicion to the existence of hidden message.
6
1.5 PROJECT SCOPE
Our project scope is developed for hiding information in any image file to ensure the
safety of exchange the data between different parties and provide better security during
message transmission.
In the proposed system we concentrate on finding some algorithm to hide the data
inside images using steganography technique. An algorithm is designed to hide all the data
inputted within the image to protect the privacy of the data. Then, the system is developed
based on the new steganography algorithm.
This proposed system provides the user with two options encrypt and decrypt
the data, in encryption the secret information is hiding in with image file, and on the other
side the decryption is getting the hidden information from the stego image file, and also the
user can show the image size after and before the encryption.
The processes of encryption and decryption of the data file consists of:
1. Providing security for the data to be transmitted through network using steganography.
2. Proposing an approach for hiding the data within an image using a steganographic
algorithm which provides better accuracy and quality of hiding.
7
CHAPTER 2
LITERATURE REVIEW
8
In authors have proposed an adaptive least significant bit spatial domain embedding method.
This method divides the image pixels ranges (0-255) and generates a stego-key. This private
stego- key has 5 different gray level ranges of image and each range indicates to substitute
fixed number of bits to embed in least significant bits of image. The strength of proposed
method is its integrity of secret hidden information in stego-image and high hidden capacity.
The limitation is to hide extra bits of signature with hidden message for its integrity purpose.
It also proposed a method for color image just to modify the blue channel with this scheme
for information hiding. This method is targeted to achieve high hidden capacity plus security
of hidden message.
Yang et al. in proposed an adaptive LSB substitution-based data hiding method for image. To
achieve better visual quality of stego-image it takes care of noise sensitive area for
embedding. Proposed method differentiates and takes advantage of normal texture and edges
area for embedding. This method analyzes the edges, brightness and texture masking of the
cover image to calculate the number of k-bit LSB for secret data embedding. The value of k is
high at non- sensitive image region and over sensitive image area k value remain small to
balance overall visual quality of image. The LSB’s (k) for embedding is computed by the
high-order bits of the image. It also utilizes the pixel adjustment method for better stegoimage
visual quality through LSB substitution method. The overall result shows a good high hidden
capacity, but dataset for experimental results is limited; there is not a single image which has
many edges with noise region like ‘Baboon. If’.
In anthers have proposed LSB based image hiding method. Common pattern bits (stego-key)
are used to hide data. The LSB’s of the pixel are modified depending on the (stego-key)
pattern bits and the secret message bits. Pattern bits are combination of MxN size rows and
columns (of a block) and with random key value. In embedding procedure, each pattern bit is
matched with message bit, if satisfied it modifies the 2nd LSB bits of cover image otherwise
remains the same. This technique targets to achieve security of hidden message in stego-
image using a common pattern key. This proposed method has low hidden capacity because
single secret bit requires a block of (MxN) pixels.
9
In author proposed a Pixel value difference (PVD) and simple least significant bits scheme
are used to achieve adaptive least significant bits data embedding. In pixel value differencing
(PVD) where the size of the hidden data bits can be estimated by difference between the two
consecutive pixels in cover image using simple relationship between two pixels. PVD method
generally provides a good imperceptibility by calculating the difference of two consecutive
pixels which determine the depth of the embedded bits. Proposed method hides large and
adaptive k-LSB substitution at edge area of image and PVD for smooth region of image. So,
in this way the technique provides both larger capacity and high visual quality according to
experimental results. This method is complex due to adaptive k generation for substitution of
LSB.
In authors proposed a method of Multi-Pixel Differencing (MPD) which used more than two
pixels to estimate smoothness of each pixel for data embedding and it calculate sum of
difference value of four pixels block. For small difference value it uses the LSB otherwise for
high difference value it uses MPD method for data embedding. Strength is its simplicity of
algorithm but experimental dataset is too limited.
In author proposed another pixel value differencing method, it used the three pixels for data
embedding near the target pixel. It uses simple k-bit LSB method for secret data embedding
where number of k-bit is estimated by near three pixels with high difference value. To retain
better visual quality and high capacity it simply uses optimal pixel adjustment method on
target pixels. Advantage of method is histogram of stego-image and cover-image is almost
same, but dataset for experiments is too small.
In authors have introduced a high capacity of hidden data utilizing the LSB and hybrid edge
detection scheme. For edge computation two types of canny and fuzzy edges detection
method applied and simple LSB substitution is used to embed the hidden data. This scheme is
successful to embed data with higher peak signal to noise ratio (PSNR) with normal LSB
based embedding. The proposed scheme is tested on limited images dataset. This method is
not tested on extensive edges-based image like ‘Baboob.tif’.
Madhu et al. in proposed an image steganography method, based on LSB substitution and
selection of random pixel of required image area. This method is target to improve the
security where password is added by LSB of pixels. It generates the random numbers and
selects the region
10
of interest where secret message has to be hidden. The strength of method is its security of
hidden message in stego-image, but has not considers any type of perceptual transparency.
In , authors have introduced a data hiding technique where it finds out the dark area of the
image to hide the data using LSB. It converts it to binary image and labels each object using
8- pixel connectivity schemes for hiding data bits. This method required high computation to
find dark region its connectivity and has not tested on high texture type of image. Its hiding
capacity totally depends on texture of image.
Babita et al. in uses 4 LSB of each RGB channel to embed data bits, apply median filtering to
enhance the quality of the stego image and then encode the difference of cover and stego
image as key data. In decoding phase, the stego-image is added with key data to extract the
hidden data. It increases the complexity to applying filtering and also has to manage stego-
key. Proposed scheme has high secret data hiding capacity.
In author have proposed a pixel indicator technique with variable bits; it chooses one channel
among red, green and blue channels and embeds data into variable LSB of chosen channel.
Intensity of the pixel decides the variable bits to embed into cover image. The channel
selection criteria are sequential and the capacity depends on the cover image channel bits.
Proposed method has almost same histogram of cover and stego-image.
Hamid et al. in have proposed a texture-based image steganography. The texture analysis
technique divides the texture areas into two groups, simple texture area and complex texture
area.
11
Simple texture is used to hide the 3-3-2 LSB (3 bits for Red, 3 bits for Green, 2 bits for blue
channels) method. On the other hand, over complex texture area 4 LSB embedding technique
is applied for information hiding. The above method used the both (2 to 4 LSB for each
channel) methods depending on texture classification for better visual quality. Proposed
method has high hidden capacity with considering the perceptual transparency measures e.g.
PSNR etc.
M. Chaumont et al. in have proposed a DCT based data hiding method. It hides the color
information in a compress gray-level image. It follows the color quantization, color ordering
and the data hiding steps to achieve image steganography. The purpose of method is to give
free access to gray-level image to everyone but restricted access of same color images to
those who have its stego-key. It has high PSNR plus with noticeable artifact of embedding
data.
In a novel lossless or reversible data hiding scheme for binary images is proposed. JPEG2000
compressed data is used and the bit-depth of the quantized coefficients are also embedded
into some code-blocks. Proposed data embedding method is useful for binary images not for
gray or color images.
12
CHAPTER 3
REQUIREMENTS
13
3.1 EXISTANCE OF STEGANOGRPHY SYSTEMS.
14
3.3 SYSTEM REQUIREMENTS.
3.3.1 FUNCTIONAL REQUIREMENTS
Functional requirements are the requirements that define specific behavior or function
of the system.
⮚ Secret Text Message: The message which you want to hide should be written in this label.
⮚ Cover Image: Cover Image is the image is to be selected in which secret text
message can be hidden. This image can be any type of image with any image
extensions.
cover image to hide secret text message by replacing bits of cover image by the bits
of message.
⮚ Sender send this stego image file to intended recipient to which he does
want to communicate.
⮚ Receiver receives the stego image and opens in decryption option for getting hidden
⮚ Safety Requirements:
As the image is between the sender and receiver both the sender and receiver should use same
program to Encrypt and Decrypt. Sender and receiver should take care of no one should steal
the code and use it for the image.
⮚ Security Requirements:
We have developed a GUI software in which embedded secret text data in image. Only
sender and receiver should be aware of encrypted file.
The Quality of the software is maintained in such a way that only sender and receiver can
communicate through image. There is no probability of knowing secret image.
15
3.3.2 SOFTWARE REQUIREMENTS.
16
CHAPTER 4
STEGANOGRAPHY
17
4.1 TYPES OF STEGANOGRAPHY
It consists of hiding information inside the text files. In this method, the secret data is
hidden behind every nth letter of every word of text message. Numbers of methods are
available for hiding data in text file. These methods are:
Text steganography can be accomplished by changing the text's formatting or specific textual
elements' (such as characters') properties. The aim of coding method design is to create
modifications that are largely undetectable to the reader while being consistently decodeable (even in
the presence of nodes). Reliable decoding and minimal change are two criteria that are in some ways
at odds with one another. The difficulty in creating document marking techniques lies in this. The
three coding methods we suggest serve more as examples of various strategies than as a
comprehensive list of document marking methods. The methods can be applied singly or
collectively. The following are
18
Text steganography can be achieved by altering the text formatting, or by altering certain
characteristics of textual elements (eg., characters). The goal in the design of coding methods
is to develop alterations that are reliably decodable (even in the presence of node) yet largely
indiscernible to the reader. These criteria, reliable decoding and minimum visible change, are
somewhat conflicting herein lies the challenge in designing document marking techniques.
The three coding techniques that we propose illustrate different approaches rather than form
an exhaustive list of documents marking techniques. The techniques can be used either
separately or jointly. These are following:
3. Feature Coding: This is a coding method that is applied either to a format file or to a bitmap
image of a document
In audio steganography, secret message is embedded into digitized audio signal which
result slight altering of binary sequence of the corresponding audio file. There are several
methods
19
are available for audio steganography. We are going to have a brief introduction on some of
them. It involves hiding data in audio files. This method hides the data in WAV, AU and
MP3 sound files. There are different methods of audio steganography. Those methods are
An audio environment is decided by two considerations such as first, its digital description
and second, its transmission media. The transmission channel of an audio signal defines the
20
environments the signal can go through, on its method from encoder to decoder. This can be
digital end-end, analogue transmission, and increasing-decreasing resampling or “over-the-
air” environments.
21
Video Steganography is to hide the existence of the message from unauthorized party using
Video as cover file and hiding data in video. Steganography means covered writing it
includes process of concealing information within other file and also conceals the fact that a
secret message is being sent. In this paper a technique proposed is Hash based least
significant bit technique for video steganography. Least Significant Bit insertion method
embed data in the lower bits of RGB pixel of video and these changes will be minimal. Data
hiding is the process of embedding information in a video without changing its perceptual
quality and also keep away from knowledge of existence of massage.
22
network steganography exploits the normal traffic as the carrier to transmit information
stealthily via untrusted networks. Compared with the static multimedia steganography, such
as image steganography, it is difficult for the monitor to locate and extract the covert data in
tremendous network flow. Hence, network steganography is an effective means of
transporting confidential information in networks. In recent years, it has become a hot
research topic in the field of information security due to the fine properties of network traffic.
There are two broad types of network covert channels: covert storage channel and covert
timing one. Covert storage channel embeds the secret information into the redundancies of
network protocols Although it is simple and easy to implement, it can be easily detected by
the existing methods.
Hiding the data by taking the Image as cover object is referred as image
steganography. In image steganography pixel intensities are used to hide the data. In digital
steganography, images are widely used cover source because there are number of bits
presents in digital representation of an image.
23
Image Steganography, as the name implies, is the process of concealing data within an image
file. The image chosen for this purpose is referred to as the cover image, and the image
obtained after steganography is referred to as the stego image.
Image steganography is performed for images and the concerning data is also decrypted to
retrieve the message image. Since this can be done in several ways, image steganography is
studied and one of the methods is used to demonstrate it. Image steganography refers to
hiding information i.e., text, images or audio files in another image or video files. The current
project aims to use steganography for a text with image using spatial domain technique. This
hidden information can be retrieved only through proper decoding technique. Images are an
excellent medium for concealing information because they provide a high degree of
redundancy – which means that there are lots of bits that are there to provide accuracy far
greater than necessary for the object’s use (or display).
Hiding information inside images is a popular technique nowadays. An image with a secret
message inside can easily be spread over the World Wide Web or in newsgroups. The use of
steganography in newsgroups has been researched by German steganographic expert
NielsProvos, who created a scanning cluster which detects the presence of hidden messages
inside images that were posted on the net. However, after checking one million images, no
hidden messages were
24
found, so the practical use of steganography still seems to be limited. Image Steganography is
the technique of hiding the data within the image in such a way that prevents the unintended
user from the detection of the hidden messages or data.
To hide a message inside an image without changing its visible properties, the cover source
can be altered in noisy areas with many color variations, so less attention will be drawn to the
modifications. The most common methods to make these alterations involve the usage of the
least- significant bit or LSB, masking, filtering and transformations on the cover image. These
techniques can be used with varying degrees of success on different types of image files The
project deals with learning about the various types of steganography available. Image
steganography is performed for images and the concerning data is also decrypted to retrieve
the message image. Since this can be done in several ways, image steganography is studied
and one of the methods is used to demonstrate it.
25
The number of bits in a color scheme, called the bit depth, refers to the number of bits used
for each pixel. The smallest bit depth in current color schemes is 8, meaning that there are 8
bits used to describe the colour of each pixel. Monochrome and greyscale images use 8 bits
for each pixel and are able to display 256 different colors or shades of grey. Digital colour
images are typically stored in 24-bit files and use the RGB colour model, also known as true
colour. All colour variations for the pixels of a 24-bit image are derived from three primary
colours: red, green and blue, and each primary colour is represented by 8 bits. Thus, in one
given pixel, there can be 256 different quantities of red, green and blue, adding up to more
than 16-million combinations, resulting in more than 16-million colours. Not surprisingly the
larger amount of colours that can be displayed, the larger the file size.
When working with larger images of greater bit depth, the images tend to become too large to
transmit over a standard Internet connection. In order to display an image in a reasonable
amount of time, techniques must be incorporated to reduce the image’s file size. These
techniques make use of mathematical formulas to analyze and condense image data, resulting
in smaller file sizes. This process is called compression.
26
In images there are two types of compression: lossy and lossless. Both methods save storage
space, but the procedures that they implement differ. Lossy compression creates smaller files
by discarding excess image data from the original image. It removes details that are too small
for the human eye to differentiate, resulting in close approximations of the original image,
although not an exact duplicate. An example of an image format that uses this compression
technique is JPEG (Joint Photographic Experts Group).
Lossless compression, on the other hand, never removes any information from the original
image, but instead Represents data in mathematical formulas. The original image’s integrity is
maintained and the Decompressed image output is bit-by-bit identical to the original image
input. The most popular image Formats that use lossless compression is GIF (Graphical
Interchange Format) and 8-bit BMP (a Microsoft Windows bitmap file).
Compression plays a very important role in choosing which steganographic algorithm to use.
Lossy Compression techniques result in smaller image file sizes, but it increases the
possibility that the embedded Message may be partly lost due to the fact that excess image
data will be removed. Lossless compression Though, keeps the original digital image intact
without the chance of lost, although it does not compress the Image to such a small file size.
Different steganographic algorithms have been developed for both of these Compression
types and will be explained in the following sections.
Image steganography techniques can be divided into two groups: those in the Image Domain
and those in the Transform Domain. Image domain also known as spatial – domain
techniques embed messages in the intensity of the pixels directly, while for transform domain
also known as frequency – domain, images are first transformed and then the message is
embedded in the image. Image domain techniques encompass bit-wise methods that apply bit
insertion and noise manipulation and are Sometimes characterized as “simple systems”. The
image formats that are most suitable for image domain Steganography are lossless and the
techniques are typically dependent on the image format.
27
Steganography in the transform domain involves the manipulation of algorithms and image
transforms. These methods hide messages in more significant areas of the cover image,
making it more robust. Many Transform domain methods are independent of the image
format and the embedded message may survive Conversion between lossy and lossless
compression.
Image steganography is a GUI-based project in which we are hiding a secret message within
the image using encoding and decoding functions. We are creating a window in which there
are two buttons: encoding and decoding.
For encoding, select any image, this image will be converted into bmp format. Type message
in the message box then it will convert into base64, merge this encoded string into image and
the user can save the image where he/she wants.
For decoding, select the image which is encoded, the base64 string will get separated by
decoding, and by Tkinter module hidden text is shown in the textbox.
28
Fig: Encoding Image Fig: Encoded Image
Image Steganography refers to the process of hiding data within an image file. The image
selected for this purpose is called the cover image and the image obtained after steganography
is called the stego image.
This steganography approach entails concealing a huge amount of data (picture) within a
colour bitmap (bmp) image. The image will be filtered and segmented in his study, with bits
replacement applied to the appropriate pixels. These pixels are chosen at in order.
Detection of the message within the cover image is done by the process of steganalysis. This
can be done through comparison with the cover image. While efforts are being invested in
developing new algorithms with a greater degree of immunity against such attacks, efforts are
also being devoted towards improving existing algorithms for steganalysis, to detect the
exchange of secret information between terrorists or criminal elements.
Pictures are utilized as the famous cover objects for steganography. A message is installed in
an advanced picture through an inserting calculation. The subsequent stego picture is send to
the beneficiary. On the opposite side, it is prepared by the extraction calculation. Amid the
transmission of steno picture unauthenticated people can just notice the transmission of a
picture yet can’t figure the presence of the concealed messages.
The secret information is hidden in a way that it not visible to the human eyes. Deep learning
technology, which has emerged as a powerful tool in various applications including image
steganography, has received increased attention recently. The main goal of this project is to
explore and discuss various deep learning methods available in image steganography field.
Deep learning
29
techniques used for image steganography can be broadly divided into three categories –
traditional methods, Convolutional Neural Network-based and General Adversarial Network-
based methods. Along with the methodology, an elaborate summary on the datasets used,
experimental set-ups considered and the evaluation metrics commonly used are described in
this project. This project aims to help the fellow researchers by compiling the current trends,
challenges and some future direction in this field.
So, let’s understand why we use only LSB for storing data instead of MSB. Okay for example
lets take the 8-bit value 255. In that the left side first value is most important as we can see in
the image if we change the value of MSB to zero then the value will be reduced to 127. On
the other side we can see if we change the LSB value to zero then the 8-bit value will be 254.
From the above image we can observe that if we change the MSB then color will be changed
mostly the human eye can be identified, if we change the LSB the color will be slightly
changing so a human eye can be identified. So, we use LSB method in all mediums for
storing data.
30
CHAPTER 5
DESIGN METHODOLOGIES
31
5.1 Types of Algorithms in Image steganography
1) Spatial Domain Algorithm.
2) Transform Domain Algorithm.
3) Distortion Technique.
4) Masking And Filtering.
1) Spatial Domain Algorithm.
Spatial domain steganography remains a popular method, whereby
images are represented as a matrix of intensity values. It is the individual values of the spatial
domain that are commonly modified. This is because small changes to intensity values
generally cause hardly recognizable visual differences to the stego-object as a whole. The
early basis for this type of steganography was to exploit the limitations of the human visual
system (HVS).
LSB (Least Significant Bit) substitution is considered the most well-known method of
embedding in digital steganography. It relies on the principle that the least significant bit of any
byte is frequently indistinguishable from random noise and can therefore be replaced by bits from
a secret message. For example, Below Figure shows the full representation of a greyscale image
(on the left) paired with its representation in the LSB bit-plane. The LSB bit-plane appears
random and should therefore accommodate bit replacement with an encrypted message.
Advancements in steganalysis, however, revealed this naive assumption to be completely untrue,
leading to steganography methods exploiting this false concept.
32
The early work on image steganography was by Bender et al., Adelson, and those working in
spread-spectrum steganography. Initially, these researchers based their schemes on exploiting
the limitations of the Human Visual System (HVS) and its sensitivity to contrast versus
spatial frequency. In the naive applications of LSB steganography, there was one qualifying
characteristic, that the change of the LSB of a byte would result in a stego-object being
visually indistinguishable from the cover-object. The concept of LSB is still widely applied in
modern steganography schemes. However, these methods are typically supported by complex
operations and cover codes to produce a secure scheme with improved embedding efficiency,
that is significantly harder to detect. One of the first known implementations for digital
steganography was a spatial domain technique proposed by Kurak and Mchugh. This method
embedded secret data within 4-LSB components and was the first case of steganography
exploiting detailed knowledge of the HVS. Typically, spatial techniques modify bits within an
image’s pixel values, replacing them directly with the secret message bits. The concept of bit
replacement would be that, for each pixel in an image, it can be assigned a corresponding
integer value, based on the intensity of a colour that is displayed by the pixel. Once converted
into a binary stream, individual bits can be extrapolated to determine whether they are
suitable for substitution. For example, functions can be included to prevent even values from
being decreased and odd values from being increased. Below Figure demonstrates the process
for LSB bit substitution steganography.
This concept formed the initial works in LSB steganography. However, naïve LSB schemes
are highly susceptible to Chi-square tests and statistical steganalysis. LSB encoding within
24-bit colour images was the most popular form of early spatial domain steganography. The
embedding technique was used across many software products. Capacity became the focus of
these techniques,
33
as 24- bit images allowed the user to store up to 3-bits for each modified pixel. The early
work in spatial domain steganography for colour based images was broken by the efforts of
Fridrich et al.
. To detect LSB steganography, Fridrich and her team considered a calculation of the ratio
between close colour pairs and all colour pairs in an image. Their idea was that for an image
with no secret messages, the number of close pairs of colours relative to the number of all
possible pairs of colours will be smaller than for an image that has a message already
embedded in it. To determine the ratio threshold, their team observed that further modifying a
stego-object with a new secret message will not modify the ratio in any significant manner.
Whereas if the image does not contain a secret message, then embedding will drastically
change the ratio. This knowledge can be used to determine the presence of LSB colour
encoded steganography and develop a detection algorithm. A test was used where a message
was randomly distributed throughout the LSB of selected pixels. The calculation is given to
the new stego-object and if the two ratios are almost identical, LSB steganography is
suspected.
34
provided greater resistance to known attacks, such as the one
proposed by Westfeld . Westfeld’s attack relied upon a count of
arbitrary neighbor colours introduced by the embedding algorithm
for LSB matching. However, this means that the detection method
was only applicable to colour images and would not work for a
grayscale representation. A stronger method for greyscale images
was presented by Andrew Ker.
35
iii) Pixel Value Difference.
In recent years, several studies have been proposed to improve the PVD method. Wu et al.’s
presented a method combining pixel-value differencing and the LSB replacement method.
Yang and Weng proposed a multipixel differencing method that uses three difference values
in a four- pixel block to determine how many secret bits should be embedded, and Jung et
al.’s proposed an image data hiding method based on multipixel differencing and LSB
substitution. Liu and Shih proposed two extensions of the PVD method, the block-based
approach and Haar-based approach, and Yang et al. proposed an information hiding technique
based on blocked PVD. Liao et al.’s proposed a four-pixel differencing and modified LSB
substitution, and Yang et al.’s proposed a data hiding scheme using the pixel-value
differencing in multimedia images.
Some studies focused on increasing the capacity using LSB or a readjusted process to
improve the embedding capacity or image quantity. Few studies focus on the range table
design. Besides, it is intuitive to design it using the width of the power of two.
In this work, we design a new quantization range table based on the perfect square number to
decide the payload by the difference value between the consecutive pixels. It differs from the
design of Wu and Tsai’s scheme, in which the quantization range table is based on the range
width of the power of two. The perfect square number provides an elegant mathematical
model to develop a new quantization range table, which divides each range into two
subranges for embedding different numbers of secret bits.
36
2) Transform Domain Algorithm.
This is a more complex way of hiding information in an image. Various algorithms
and transformations are used on the image to hide information in it. Transform
domain embedding can be termed as a domain of embedding techniques for which a
number of algorithms have been suggested. The process of embedding data in the
frequency domain of a signal is much stronger than embedding principles that operate
in the time domain.
Most of the strong steganographic systems today operate within the transform
domain Transform domain techniques have an advantage over spatial domain
techniques as they hide information in areas of the image that are less exposed to
compression, cropping, and image processing. Some transform domain techniques
do not seem dependent on the image format and they may outrun lossless and lossy
format conversions. Transform domain techniques are broadly classified into:
1. Discrete Fourier transformation technique (DFT).
2. Discrete cosine transformation technique (DCT).
3. Discrete Wavelet transformation technique (DWT).
4. Lossless or reversible method (DCT)
5. Embedding in coefficient bits.
5. Distortion Technique.
Distortion techniques need knowledge of the original cover image during the
decoding process where the decoder functions to check for differences between the
original cover image and the distorted cover image in order to restore the secret
message. The encoder adds a sequence of changes to the cover image. So,
information is described as being stored by signal distortion. Using this technique, a
stego object is created by applying a sequence of modifications to the cover image.
This sequence of modifications is use to match the secret message required to
transmit. The message is encoded at pseudo- randomly chosen pixels. If the stego-
image is different from the cover image at the given message pixel, the message bit is
a “1.” otherwise, the message bit is a “0.” The encoder can modify the “1” value
pixels in such a manner that the statistical properties of the image are not affected.
However, the need for sending the cover image limits the benefits of this technique.
In any steganographic technique, the cover image should never be used more than
once. If an attacker tampers with the stego-image by cropping, scaling or rotating, the
receiver can easily detect it. In some cases, if the message is encoded .
37
3) Masking And Filtering.
These techniques hide information by marking an image, in the same way as to paper
watermarks. These techniques embed the information in the more significant areas
than just hiding it into the noise level. The hidden message is more integral to the
cover image. Watermarking techniques can be applied without the fear of image
destruction due to lossy compression as they are more integrated into the image.
38
CHAPTER 6
DIAGRAMS AND RESULT
40
• Libraries such as NumPy, OpenCV, PyAutoGUI, and tkinter are frequently used in Python
steganography.
• NumPy is utilized to manipulate and store large arrays of numerical data, which can be useful when
working with image data.
• OpenCV is commonly used in image processing tasks, such as extracting and manipulating image
features or performing color space conversions.
• PyAutoGUI and tkinter can be used to create graphical user interfaces (GUIs) for steganography
applications, allowing users to interact with the program and input or output data.
• Class diagram depicts image steganography using Python libraries such as NumPy, OpenCV,
PyAutoGUI, Types, and Tkinter.
• The class diagram shows the interconnections and relationships between different classes involved
in image steganography.
• The NumPy library is used to perform mathematical operations and manipulate the image data.
41
• The OpenCV library is used for image processing and analysis, including the extraction of image
features and encoding/decoding of images.
• The PyAutoGUI library is used to automate the mouse and keyboard functions to make the process
of image steganography more efficient.
Step 0: START
Step 1: Get the image and message as the parameters for Encoding function.
Step 5: Convert the secret message into binary format using the MessageToBinary function in
program.
Modify the Least Significant bit of RGB colours to store our data.
message: Break
42
values image. Step 11: Return Image.
Step 0: START
Decoded data
Step 8: ENDs
6.4.1 ENCODE.
43
44
45
6.4.2 DECODE:
46
47
CHAPTER 7
APPLICATIONS OF SYSTEM
48
Chapter-8
49
11. Robustness: Robustness is the ability of the hidden message to remain undamaged
even if the stego–media undergoes transformation, sharpening, linear and non-linear
filtering, scaling and blurring, cropping and various other techniques.
12. This approach featured security, capacity, and robustness, the three needed element
of steganography that creates it beneficial in hidden exchange of data through text
files and creating secret communication.
50
CHAPTER 8
SYSTEM TESTING AND
COMPARISION
51
• Tested the robustness of the stego-image by introducing noise, compression, or other types of image
alterations and verify that the hidden message can still be extracted.
• Tested the capacity of the stego-image by trying to hide larger messages and verifying that the
image can accommodate the additional data without visual distortion or loss of quality.
• Tested the performance of the steganography algorithm by measuring the time it takes to hide and
extract a message from an image, and compare it to other existing steganography techniques.
• Verified that the hidden message can be successfully extracted from the stego-image using the
correct key or password.
52
Chapter-9
STEGANOGRAPHY CRYPTOGRAPHY
The term Steganography is derived from the The term Cryptography is originally derived from
Greek word “steganos”, meaning hidden or the two Greek words “kryptos” and “graph”,
covered. meaning hidden and writing.
Steganography means covered writing. The Cryptography means secret writing. The art and
process of hiding digital information in a carrier science of studying methods of protecting data.
signal.
Steganography hides the trace of While cryptography uses the encryption to make
communication. the message incomprehensible.
In steganography, the fact that Sec While in cryptography only secret message is
a communication is taking place is ret hidden.
hidden.
In steganography, not much Cryptography involves the use of number theory,
mathematical transformations are mathematically etc., to modify data.
involved.
Its goal is to assist in secret communication, it Its goal is to encrypt the contents of the visible
conceals the occurrence of any exchange message to save the data.
between the sender and receiver.
It relies on the confidentiality of the method of It relies on the confidentiality of the key.
embedding.
53
Chapter-9
Broken when attacker reveals that Broken when an attacker can understand the secret
steganography has been used known as message known as Cryptanalysis.
Steganography.
The final result obtained is known as stego The final result obtained is known as cipher text.
media.
It is used for securing information against It is used for securing information against potential
potential eavesdroppers. eavesdroppers
The message which is embedded is invisible to The encrypted message which is encrypted is
an unaware viewer. unreadable to everyone without the decryption
key.
The goal of secure steganographic methods is The goal of a secure cryptographic is to prevent an
to prevent an observant intermediary from even interceptor from gaining any information about the
obtaining knowledge of the mere presence of plaintext from the intercepted cipher text.
the secret data.
54
CHAPTER 9
55
9.1 CONCLUSION
The proposed approach in this project uses a steganographic approach called image
steganography. The application creates a stego image in which personal
data is embedded inside the cover file image. It is reliable and secure.
Used a least significant bit (LSB) algorithm in this project for developing the application
which is faster and reliable and compression ratio is moderate compared to all algorithms.
The LSB is most simple. It is observed that through LSB Substitution method, the results
obtained in data hiding are pretty impressive as it utilizes the simple fact that any image could
be broken up to individual bit-planes each consisting of different levels of information. It is to
be noted that as discussed earlier, this method is only effective for bitmap images as these
involve lossless compression techniques. Also, in this project grey-scale images have been
used for demonstration. But this process can also be extended to be used for color images
where, bit- plane slicing is to be done individually for the top four bit-planes for each R, G, B
of the message image, which are again to be placed in the R, G, B planes of the cover image,
and extraction is done similarly. RGB is the color model in which each pixel is 3 bytes. RGB
image where each pixel is represented by three bytes indicating the intensity of red, green and
blue in which each primary color represents 8 bits. We use bmp image format as it contains
uncompressed data while pixels are chosen random rather than in order.
Though this project focusses on LSB and the algorithm is spatial domain method, So, that the
human eye would not notice the hidden messages within it.
56
9.2 REFERENCE
[1] Yogendra Kumar Jain, R. R. Ahirwal, A Novel Image Steganography Method with
Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys,
International Journal of Computer Science and Security (IJCSS) vol. 4, 1st March (2010).
[2] H. Yang, X. Sun, G. Sun. A High-Capacity Image Data Hiding Scheme Using Adaptive
LSB Substitution. Journal: Radioengineering Year: vol. 18, 4 Pages/record No.: 509-516,
(2009).
[3] Shashikala Channalli and Ajay Jadhav, “steganography An Art of Hiding Data,
International Journal on Computer Science and Engineering, IJCSE vol. 1, no.3 (2009).
[4] Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Member, IEEE, and Hung-Min
Sun, Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,
IEEE Transactions on Information Forensics and Security, vol. 3, no. pp. 488-497. 3rd
September (2008).
[5] Ki-Hyun Jung, Kyeoung-Ju Ha, Kee-Young Yoo. Image data hiding method based on
multi-pixel differencing and LSB substitution methods. In Proc. 2008 International
Conference on Convergence and Hybrid Information Technology (ICHIT '08). Daejeon
(Korea), Aug. 28-30, p. 355-358, (2008).
[6] Hanling Zhang Guangzhi Geng Caiqiong Xiong, Image Steganography Using Pixel-Value
Differencing, Electronic Commerce and Security, ISECS '09. Second International
Symposium on May (2009).
[7] Chen, W. J., Chang, C. C. and Le, T. H. N., High Payload Steganography Mechanism
Using Hybrid Edge Detector, Expert Systems with Applications (ESWA 2010), vol. 37, no.
pp. 3292- 3301, 4th April (2010).
[8] V.Madhu Viswanatham, Jeswanth Manikonda, A Novel Technique for Embedding Data
in Spatial Domain, International Journal on Computer Science and Engineering, IJCSE vol. 2
Issues (2010).
57
[9] Al-Husainy, M. A., Image Steganography by Mapping Pixels to Letters, Journal of
Computer Science, vol.5 no.1, pp. 33-38, (2009).
[11] Babita Ahuja, Manpreet Kaur, Manav Rachna High-Capacity Filter Based
Steganography, International Journal of Recent Trends in Engineering, vol. 1, no. 1, May
(2009).
[12] Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub, RGB Intensity Based Variable-
Bits Image Steganography, IEEE Asia Pacific Services Computing Conference, pp.1322-
1327, (2008).
[13] Hamid, A. M., M. L. M. Kiah. Novel Approach for High Secure and High-Rate Data
Hidden in the Image Using Imag Texture Analysis. International Journal of Engineering and
Technology (IJET): 0975-4042, (2009).
[14] M. Chaumont and W. Puech, DCT-Based Data Hiding Method to Embed the Color
Information in a JPEG Grey Level Image, 14th European Signal Processing Conference
(EUSIPCO 2006), Florence, Italy, September 4-8, (2006), copyright by EURASIP.
[16] Shogo Ohyama, Michiharu Niimi,Kazumi Yamawaki,Hideki Noda, Lossless data hiding
using bit depth embedding for JPEG2000 compressed bit-stream. Journal of Communication
and Computer,
58