0% found this document useful (0 votes)
13 views

Excellence of Steganography: State Board of Technical Education & Training, Ts

This document is a project report on the excellence of steganography submitted to the State Board of Technical Education & Training in Telangana, India. It was submitted by 5 students under the guidance of their lecturer Pavani. The report discusses using steganography techniques like LSB insertion to hide secret messages in digital images in order to securely transmit confidential data. It aims to implement an interactive Python-based program to perform image steganography without noticeable changes to the cover image.

Uploaded by

vinay itikala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Excellence of Steganography: State Board of Technical Education & Training, Ts

This document is a project report on the excellence of steganography submitted to the State Board of Technical Education & Training in Telangana, India. It was submitted by 5 students under the guidance of their lecturer Pavani. The report discusses using steganography techniques like LSB insertion to hide secret messages in digital images in order to securely transmit confidential data. It aims to implement an interactive Python-based program to perform image steganography without noticeable changes to the cover image.

Uploaded by

vinay itikala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 63

A

PROJECT REPORT
ON

EXCELLENCE OF STEGANOGRAPHY
Submitted to

STATE BOARD OF TECHNICAL EDUCATION & TRAINING, TS

In partial fulfilment of the requirement for the award of the degree of

DIPLOMA
In

COMPUTER ENGINEERING

Submitted By
B.KRISHNAVENI (20261-CM-033)
K.ABHI RAM VARMA (20261-CM-019)
B.SRIJA (20261-CM-027)
S.RAHUL (20261-CM-051)
B.RITHWIN (20261-CM-021)
Under the Esteemed guidance of
MS.V.PAVANI(B.Tech)
Lecturer
CSE Dept.

DEPARTMENT OF COMPUTER ENGINEERING


JYOTHISHMATHI INSTITUTE OF TECHNOLOGY
&SCIENCE

SECOND SHIFT POLYTECHNIC -261


(Approved by A.I.C.T.E & Affiliated to SBTET, Hyderabad)
Nustulapur, Karimnagar – 505481, Telangana
(2022–2023)
JYOTHISHMATHI INSTITUTE OF TECHNOLOGY & SCIENCE
SECOND SHIFT POLYTECHNIC - 261
(Approved by A.I.C.T.E & Affiliated to SBTET, Hyderabad)
Nustulapur, Karimnagar – 505481, Telangana
(2022–2023)

DEPARTMENT OF COMPUTER ENGINEERING

CERTIFICATE

This is to certify that B.KRISHNAVENI (20261-CM-033), K.ABHI RAM VARMA


(20261-CM-019),B.SRIJA(20261-CM-027),S.RAHUL (20261-CM-51),B.RITHWIN
(20261-CM-021) has successfully completed the Project entitled “EXCELLENCE OF
STEGANOGRAPHY” in the partial fulfilment for the award of degree of Diploma in
Computer Engineering during the academic year 2022-2023.

PROJECT GUIDE HEAD OF THE DEPARTMENT


MS.V.PAVANI(B.Tech) MRS. B.JAYA SRI(M.Tech)
Lecturer Assistant Professor
CSE Dept. CSE Dept.

EXTERNAL EXAMINER
ACKNOWLEDGEMENT

I wish to pay my thanks to Dr.K.SRINIVAS RAO, Principal, Jyothishmathi


Institute of Technology and Science, Second Shift Polytechnic, Karimnagar for
providing all required facilities and his support during the Project work.

My in-depth thanks to the Incharge of Diploma Mr.CH.SAJAN RAO,


Associate Professor Department of EEE, Jyothishmathi Institute of Technology and
Science , for providing necessary facilities throughout the Project work.

I would like to thank, Mrs.B. JAYASRI, Assistant Professor & HOD CSE
Department, for her valuable suggestions during the Project work.

I sincerely extend our thanks to project coordinator Mr.V.SUNIL KUMAR


Assistant Professor Department of CSE, valuable time in conducting presentations
and also providing their feedback with a lot of useful suggestions.

I would like to thank, Project Guide MS.V.PAVANI, Lecturer of CSE


Department, for his guidance during the Project work.

I also thank all the Faculty Members, Department of Computer Engineering for
their encouragement and assistance.

PROJECT ASSOCIATIVES:

B.KRISHNAVENI 20261-CM-033
K.ABHI RAM VARMA 20261-CM-019
B.SRIJA 20261-CM-027
S.RAHUL 20261-CM-051
B.RITHWIN 20261-CM-021
DECLARATION

I hereby declare that this Project Report on “EXCELLENCE OF


STEGANOGRAPHY” submitted in the department of Computer Engineering,
Jyothishmathi Institute of Technology and Science, Second Shift Polytechnic, Karimnagar
in partial fulfilment of the requirement for the award of the Diploma in Computer
Engineering is a bonafide record of our own work carried out under the supervision of
Mrs.B.JAYASRI, Assistant Professor, CSE Dept.
Also, I declare that the matter embodied in this report has not been submitted for the
award of any degree of any other institution or university previously.

Date: PROJECT ASSOCIATES:


Place: Karimnagar, B.KRISHNAVENI 20261-CM-033
K.ABHI RAM VARMA 20261-CM-019
B.SRIJA 20261-CM-027
S.RAHUL 20261-CM-051
B.RITHWIN 20261-CM-021
ABSTRACT

In this modern era, one of the major issue is to protect the secrecy of confidential data during
their transmission over a public channel. So we need a security over the data which is being
transmitted. To achieve this the powerful security, Steganography is needed.

Steganography is the practice of concealing the secret message with digital


images, audio and video files. The main objective of our project is to hide the data with an
image which is the collection of pixels usually stored in 24bit, it is nothing but image
steganography based on GUI.

Our Project aims to use the technique is LSB (Least Significant Bit) and the
algorithm is spatial domain method, so, that the human eye would not notice the hidden
messages within it. RGB is the color model in which each pixel is 3 bytes, uses LSB to hide
the data in three color channels. RGB images where each pixel is represented by three bytes
indicating the intensity of red, green and blue in which each primary color represented 8 bits.
We use bmp image format as it contains uncompressed data while pixels are chosen as
random rather than in order.

For implementing our project, the interactive language python with some packages
are used. Robustness, hiding capacity, Perceptual Transparency are important features of
steganography which made it strong, can transfer data more securely.
TABLE OF CONTENT

CERTIFICATE
DECLARATION
ACKNOWLEDGMENT
ABSTRACT

. Chapter - 1
INTRODUCTION 3
1.1 Introduction to Steganography
1.2 Project Definition
1.3 Statement of problem
1.4 Project Objectives
1.5 Project Scope
1.6 Steganography Architecture
. Chapter – 2
LITERATURE REVIEW 8

. Chapter – 3

REQUIREMENTS 13
3.1 Existence of the Steganography systems
3.2 Overview of the proposed systems
3.3 System Requirements
3.3.1 Functional Requirements
3.3.2 Non-Functional Requirements
3.3.3 Software Requirements
3.3.4 Hardware Requirements
. Chapter – 4
STEGANOGRAPHY 17
4.1 Types of Steganography
4.1.1 Text Steganography
4.1.2 Audio Steganography
4.1.3 Video Steganography
4.1.4 Network Steganography.
4.1.5 Image Steganography
. Chapter – 5
DESIGN METHODOLOGIES 31
5.1 Types of Algorithm’s in Image Steganography
. Chapter – 6

DIAGRAMS AND RESULT 39

6.1 Data Flow Diagram


6.2 Class Diagram
6.3 Encoding Algorithm
6.4 Decoding Algorithm
6.5 Output Of The Project
6.5.1 Encode
6.5.2 Decode

. Chapter – 7

APPLICATIONS OF SYSTEM 48
7.1 Advantages of Image Steganography
7.2 Applications of Image Steganography
. Chapter – 8
SYSTEM TESTING AND COMPARISION 51
8.1 Testing Analysis
8.2 Cryptography vs Steganography
. Chapter – 9
CONCLUSION AND REFERENCE 55
9.1 Conclusion
9.2 Reference

2
CHAPTER 1

INTRODUCTION

3
1.1 INTRODUCTION TO STEGANOGRAPHY

Steganography is a Greek word which means concealed writing. The word


Stegano means covered and graphical means writing. Steganography is a method of hiding
secret data by embedding it into an audio, video, image, or text file. It is one of the methods
employed to protect secret or sensitive data from malicious attacks. In ancient time, the data
was protected by hiding it on the back of wax, writing tables, stomach of rabbits or on the
scalp of the slaves. But today’s most of the people transmit the data in the form of text,
images, videos and audio over the medium. Steganography is defined the study of invisible
communication which is the art and science of communicating in a way which hides the
existence of the communication. In order to safely transmission of confidential data, the
multimedia object like audio, video, images are used as a cover of sources to hide the data.
The use of steganography can be combined with encryption as an extra step for hiding or
protecting data.

Image Steganographic technologies are very important part of the future for internet security
and privacy on open systems such as the internet. In today’s world, the communication is the
basic necessity of every growing area. Everyone wants the secrecy and safety of their
communicating data. We can achieve secret transmission of data by steganography and
cryptography.

Image Future internet security and privacy on open systems like the internet will greatly
benefit from steganographic technology. In today's society, communication is a fundamental
requirement for any expanding region. Everyone wants their communicating data to be secure
and secret. Steganography and cryptography enable the transport of data in an untraceable
manner.

Image Steganographic technology will play a critical role in the future of internet security
and privacy on public networks like the internet. The fundamental requirement of every
expanding sector in the modern world is communication. Everyone desires that their
communicating data be secure and confidential. Steganography and cryptography provide
secure data transmission.

4
1.2 PROJECT DEFINITION

In this project, we propose to develop a system to hiding data by using


“STEGANOGRAPHY” technique as I used many methods stands on some techniques to
have at the back-end a software for hiding data based on hiding algorithms.

After studying the data hiding algorithms we found many ways to hiding data
by using the multimedia files and the main question for me was “Where hidden data hides?”
as we found by our search to know where the data hides it’s important to know what is file
type of the data that is shall be hidden and the cover file type so it is possible to alter graphic
or sound files slightly without losing their overall viability for the viewer and listener. With
audio, you can use bits of file that contain sound not audible to the human ear. With graphic
images, you can remove redundant bits of color from the image and still produce a picture
that looks intact to human eye and is difficult to discern from its original. It is in those bits
that stego hides its data.

By the final of our Research, we developed a Graphical User Interface uses an


algorithm, to embed data in an image; The purposed system is called “Image Steganography”,
the aim of this project is to encrypt the data; the meaning of encrypt is to hide the data over an
image using different steganographic algorithms, in this system LSB is the algorithm that we
use to hiding the data.

The key concern I had after studying the data concealing techniques was, "Where
hidden data hides?" We discovered numerous methods of data hiding using multimedia files.
As we discovered via our research, it's crucial to understand the file type of the data that will
be hidden as well as the cover file type in order to make minor changes to graphic or sound
files without compromising their overall suitability for the viewer or listener. You can employ
audio file fragments that contain sound that is inaudible to human ears. Graphic images allow
you to remove unnecessary colour from the image and still create a picture that appears to the
human eye to be in tact.

By the end of our research, we created a graphical user interface that uses an
algorithm to embed data in an image. This system, which is called "Image Steganography,"
was created with the goal of encrypting the data. LSB is the steganographic algorithm that we
use in this system to hide the data.

5
1.3 STATEMENT OF PROBLEM

This project addresses the security problem of transmitting the data over internet
network, the main idea coming when we start asking that how can we send a message secretly
to the destination? The science of steganography answers this question. Using steganography,
information can be hidden in carriers such as images, audio files, text files, videos and data
transmissions.

In this document, we proposed some methods and algorithms of an image


steganography systems to hide a digital text of a secret message.

1.4 PROJECT OBJECTIVES

In this project we primarily concentrated on the data security issues when sending the
data over the network using steganography techniques.

The main objectives of our project are to product security tool based on
steganography techniques to hider message carried by stego-media which should not be
sensible to human beings and avoid drawing suspicion to the existence of hidden message.

6
1.5 PROJECT SCOPE

Our project scope is developed for hiding information in any image file to ensure the
safety of exchange the data between different parties and provide better security during
message transmission.

The scope of the project is implementation of steganography tools for hiding


information includes any type of information file and image files and the path where the user
wants to save image and extruded file. We will use LSB technique; the proposed approach is
to use the suitable algorithm for embedding the data in an image file; we will show a brief of
this algorithm that we used to hiding data.

1.6 STEGANOGRAPHY ARCHITECTURE

In the proposed system we concentrate on finding some algorithm to hide the data
inside images using steganography technique. An algorithm is designed to hide all the data
inputted within the image to protect the privacy of the data. Then, the system is developed
based on the new steganography algorithm.

This proposed system provides the user with two options encrypt and decrypt
the data, in encryption the secret information is hiding in with image file, and on the other
side the decryption is getting the hidden information from the stego image file, and also the
user can show the image size after and before the encryption.

The processes of encryption and decryption of the data file consists of:

1. Providing security for the data to be transmitted through network using steganography.

2. Proposing an approach for hiding the data within an image using a steganographic
algorithm which provides better accuracy and quality of hiding.

7
CHAPTER 2
LITERATURE REVIEW

8
In authors have proposed an adaptive least significant bit spatial domain embedding method.
This method divides the image pixels ranges (0-255) and generates a stego-key. This private
stego- key has 5 different gray level ranges of image and each range indicates to substitute
fixed number of bits to embed in least significant bits of image. The strength of proposed
method is its integrity of secret hidden information in stego-image and high hidden capacity.
The limitation is to hide extra bits of signature with hidden message for its integrity purpose.
It also proposed a method for color image just to modify the blue channel with this scheme
for information hiding. This method is targeted to achieve high hidden capacity plus security
of hidden message.

Yang et al. in proposed an adaptive LSB substitution-based data hiding method for image. To
achieve better visual quality of stego-image it takes care of noise sensitive area for
embedding. Proposed method differentiates and takes advantage of normal texture and edges
area for embedding. This method analyzes the edges, brightness and texture masking of the
cover image to calculate the number of k-bit LSB for secret data embedding. The value of k is
high at non- sensitive image region and over sensitive image area k value remain small to
balance overall visual quality of image. The LSB’s (k) for embedding is computed by the
high-order bits of the image. It also utilizes the pixel adjustment method for better stegoimage
visual quality through LSB substitution method. The overall result shows a good high hidden
capacity, but dataset for experimental results is limited; there is not a single image which has
many edges with noise region like ‘Baboon. If’.

In anthers have proposed LSB based image hiding method. Common pattern bits (stego-key)
are used to hide data. The LSB’s of the pixel are modified depending on the (stego-key)
pattern bits and the secret message bits. Pattern bits are combination of MxN size rows and
columns (of a block) and with random key value. In embedding procedure, each pattern bit is
matched with message bit, if satisfied it modifies the 2nd LSB bits of cover image otherwise
remains the same. This technique targets to achieve security of hidden message in stego-
image using a common pattern key. This proposed method has low hidden capacity because
single secret bit requires a block of (MxN) pixels.

9
In author proposed a Pixel value difference (PVD) and simple least significant bits scheme
are used to achieve adaptive least significant bits data embedding. In pixel value differencing
(PVD) where the size of the hidden data bits can be estimated by difference between the two
consecutive pixels in cover image using simple relationship between two pixels. PVD method
generally provides a good imperceptibility by calculating the difference of two consecutive
pixels which determine the depth of the embedded bits. Proposed method hides large and
adaptive k-LSB substitution at edge area of image and PVD for smooth region of image. So,
in this way the technique provides both larger capacity and high visual quality according to
experimental results. This method is complex due to adaptive k generation for substitution of
LSB.

In authors proposed a method of Multi-Pixel Differencing (MPD) which used more than two
pixels to estimate smoothness of each pixel for data embedding and it calculate sum of
difference value of four pixels block. For small difference value it uses the LSB otherwise for
high difference value it uses MPD method for data embedding. Strength is its simplicity of
algorithm but experimental dataset is too limited.

In author proposed another pixel value differencing method, it used the three pixels for data
embedding near the target pixel. It uses simple k-bit LSB method for secret data embedding
where number of k-bit is estimated by near three pixels with high difference value. To retain
better visual quality and high capacity it simply uses optimal pixel adjustment method on
target pixels. Advantage of method is histogram of stego-image and cover-image is almost
same, but dataset for experiments is too small.

In authors have introduced a high capacity of hidden data utilizing the LSB and hybrid edge
detection scheme. For edge computation two types of canny and fuzzy edges detection
method applied and simple LSB substitution is used to embed the hidden data. This scheme is
successful to embed data with higher peak signal to noise ratio (PSNR) with normal LSB
based embedding. The proposed scheme is tested on limited images dataset. This method is
not tested on extensive edges-based image like ‘Baboob.tif’.

Madhu et al. in proposed an image steganography method, based on LSB substitution and
selection of random pixel of required image area. This method is target to improve the
security where password is added by LSB of pixels. It generates the random numbers and
selects the region

10
of interest where secret message has to be hidden. The strength of method is its security of
hidden message in stego-image, but has not considers any type of perceptual transparency.

In proposed an image steganographic method of mapping pixels to alphabetic letters. It maps


the 32 letters (26 for English alphabetic and other for special characters) with the pixel values.
Five (5) bits are required to represent these 32 letters and authors have generated a table
where 4 cases design to represent these 32 letters. According to that table, each letter can be
represented in all 4 cases. It utilizes the image 7 MSB (Most Significant Bits) (27 = 128) bits
for mapping. Proposed method maps each 4-case from the 7 MSB’s of pixel to one of the 32-
cases in that table. These 4-cases increase the probability of matching. This algorithm keeps
the matching pattern of cover-image which is then used for extracting data from the stego-
image. Proposed method does not require any edge or smoothness computations but secret
data should be in the form of text or letter for embedding.

In , authors have introduced a data hiding technique where it finds out the dark area of the
image to hide the data using LSB. It converts it to binary image and labels each object using
8- pixel connectivity schemes for hiding data bits. This method required high computation to
find dark region its connectivity and has not tested on high texture type of image. Its hiding
capacity totally depends on texture of image.

Babita et al. in uses 4 LSB of each RGB channel to embed data bits, apply median filtering to
enhance the quality of the stego image and then encode the difference of cover and stego
image as key data. In decoding phase, the stego-image is added with key data to extract the
hidden data. It increases the complexity to applying filtering and also has to manage stego-
key. Proposed scheme has high secret data hiding capacity.

In author have proposed a pixel indicator technique with variable bits; it chooses one channel
among red, green and blue channels and embeds data into variable LSB of chosen channel.
Intensity of the pixel decides the variable bits to embed into cover image. The channel
selection criteria are sequential and the capacity depends on the cover image channel bits.
Proposed method has almost same histogram of cover and stego-image.

Hamid et al. in have proposed a texture-based image steganography. The texture analysis
technique divides the texture areas into two groups, simple texture area and complex texture
area.

11
Simple texture is used to hide the 3-3-2 LSB (3 bits for Red, 3 bits for Green, 2 bits for blue
channels) method. On the other hand, over complex texture area 4 LSB embedding technique
is applied for information hiding. The above method used the both (2 to 4 LSB for each
channel) methods depending on texture classification for better visual quality. Proposed
method has high hidden capacity with considering the perceptual transparency measures e.g.
PSNR etc.

M. Chaumont et al. in have proposed a DCT based data hiding method. It hides the color
information in a compress gray-level image. It follows the color quantization, color ordering
and the data hiding steps to achieve image steganography. The purpose of method is to give
free access to gray-level image to everyone but restricted access of same color images to
those who have its stego-key. It has high PSNR plus with noticeable artifact of embedding
data.

K. S. Babu et al. in proposed hiding secret information in image steganography for


authentication which is used to verify the integrity of the secret message from the stegoimage.
The original hidden message is first transformed from spatial domain to discrete wavelet
transform (DWT); the coefficients of DWT are then permuted with the verification code and
then embedded in the special domain of the cover image. The verification code is also
computed by special coefficient of the DWT. So this method can verify each row of the
image of modified or tampered by any attacker.

In a novel lossless or reversible data hiding scheme for binary images is proposed. JPEG2000
compressed data is used and the bit-depth of the quantized coefficients are also embedded
into some code-blocks. Proposed data embedding method is useful for binary images not for
gray or color images.

12
CHAPTER 3
REQUIREMENTS

13
3.1 EXISTANCE OF STEGANOGRPHY SYSTEMS.

As we know steganography is a method of concealing secret data inside various multimedia


carriers (E.g., Images, Videos, audio, network). We are currently working on Image
Steganography it is a process of hiding our secret data inside the images. Various
Steganography systems have been developed by various programmers. For achieving the
image steganography applications are used and some websites are also available for us. In
these applications or websites mostly, there will be options like insert image, text, key for
encryption and same process for decryption. In the encryption process text will be concealed
into image and then using the same application or website the receiver can decrypt the text.

3.2 OVERVIEW OF PROPOSED SYSTEM.


As we can observe that in the proposed system there is security issue as we can decrypt the
text with any another application or website. This will create a problem for the sender as well
as the receiver also. In the proposed systems we need internet for achieving the image
steganography. To avoid all these issues, we have developed a project based on LSB
substitution method works on a simple GUI, in our project firstly to achieve security. We are
firstly encrypting the text usingceaser cipher substitution. Then using LSB substitution we
encode the text into the image and thereceiver should use this program for decryption. If a
third person has the image but doesn’t know the program, suppose he/she has decrypted the
image using another algorithm he/she can see the text but in an encrypted way. This makes
our system more robust. And in the same way if a personhas our program but he doesn’t have
the encrypted image of this algorithm. Suppose he/she wantsto decrypt an image of another
different sender the program will able to decrypt the text but the text will be returned in an
encrypted way. This makes another sender data also to be secured by the third person.

As is common knowledge, steganography is a technique for hiding sensitive information


inside various multimedia carriers (such as images, videos, music, and networks). We are
now developing a method called image steganography that allows us to conceal sensitive
information within pictures. Different programmers have created different Steganography
systems. Text is hidden in a picture throughout the encryption process, and the recipient may
decode the text using the same programme or website.

14
3.3 SYSTEM REQUIREMENTS.
3.3.1 FUNCTIONAL REQUIREMENTS
Functional requirements are the requirements that define specific behavior or function
of the system.

⮚ Secret Text Message: The message which you want to hide should be written in this label.

⮚ Cover Image: Cover Image is the image is to be selected in which secret text

message can be hidden. This image can be any type of image with any image
extensions.

⮚ Stego Least Significant Bit Substitution encryption implementation is performed on

cover image to hide secret text message by replacing bits of cover image by the bits
of message.

⮚ Sender send this stego image file to intended recipient to which he does

want to communicate.

⮚ Receiver receives the stego image and opens in decryption option for getting hidden

text message inside that image.

3.3.2 NON-FUNCTIONAL REQUIREMENTS.

⮚ Safety Requirements:

As the image is between the sender and receiver both the sender and receiver should use same
program to Encrypt and Decrypt. Sender and receiver should take care of no one should steal
the code and use it for the image.

⮚ Security Requirements:

We have developed a GUI software in which embedded secret text data in image. Only
sender and receiver should be aware of encrypted file.

⮚ Software Quality Attributes:

The Quality of the software is maintained in such a way that only sender and receiver can
communicate through image. There is no probability of knowing secret image.
15
3.3.2 SOFTWARE REQUIREMENTS.

3.3.2.1 Operating system: Minimum windows XP or more, Linux, Ubuntu etc.…,


3.3.2.2 Software application: PyCharm.
3.3.2.3 Packages: OpenCV, types, PyAutoGUI, Tkinter, NumPy etc.…,

3.3.3 HARDWARE REQUIREMENTS.

3.3.3.1 Minimum hardware requirements:


3.3.3.1.1 Pentium 3 166 MHZ or Higher 128 mb RAM.
3.3.3.1.2 Hard drive space: m
3.3.3.1.3 Minimum 8GB.

16
CHAPTER 4

STEGANOGRAPHY

17
4.1 TYPES OF STEGANOGRAPHY

4.1.1 TEXT STEGANOGRAPHY.

It consists of hiding information inside the text files. In this method, the secret data is
hidden behind every nth letter of every word of text message. Numbers of methods are
available for hiding data in text file. These methods are:

i) Format Based Method

i) Random and Statistical Method

iii) Linguistics Method

Text steganography can be accomplished by changing the text's formatting or specific textual
elements' (such as characters') properties. The aim of coding method design is to create
modifications that are largely undetectable to the reader while being consistently decodeable (even in
the presence of nodes). Reliable decoding and minimal change are two criteria that are in some ways
at odds with one another. The difficulty in creating document marking techniques lies in this. The
three coding methods we suggest serve more as examples of various strategies than as a
comprehensive list of document marking methods. The methods can be applied singly or
collectively. The following are

18
Text steganography can be achieved by altering the text formatting, or by altering certain
characteristics of textual elements (eg., characters). The goal in the design of coding methods
is to develop alterations that are reliably decodable (even in the presence of node) yet largely
indiscernible to the reader. These criteria, reliable decoding and minimum visible change, are
somewhat conflicting herein lies the challenge in designing document marking techniques.
The three coding techniques that we propose illustrate different approaches rather than form
an exhaustive list of documents marking techniques. The techniques can be used either
separately or jointly. These are following:

1. Lino-Shift Coding: This is a method of altering a document by vertically shifting the


locations of text lines to encode the document uniquely.

2. Word-Shift Coding: This is a method of altering a document by horizontally shifting the


locations of words within text lines to encode the document uniquely

3. Feature Coding: This is a coding method that is applied either to a format file or to a bitmap
image of a document

4.1.2 AUDIO STEGANOGRAPHY.

In audio steganography, secret message is embedded into digitized audio signal which
result slight altering of binary sequence of the corresponding audio file. There are several
methods

19
are available for audio steganography. We are going to have a brief introduction on some of
them. It involves hiding data in audio files. This method hides the data in WAV, AU and
MP3 sound files. There are different methods of audio steganography. Those methods are

i) Low Bit Encoding


ii) Phase Coding
iii) Spread Spectrum

Audio steganography is an approach of hiding information within an audio signal. As data is


embedded in the signal, it gets changed. This modification should be created
indistinguishable to the human ear. Image can also be taken as a medium but audio
steganography is more impressive because of the features of Human Auditory System (HAS)
like large power, powerful range of hearing and high range of audible frequency.

Cryptography includes the encryption of message. It creates no attempt to conceal the


encrypted message. In steganography, the original message is not changed but the very
continuation is secret from the intruder by embedding the message in the selected medium.

An audio environment is decided by two considerations such as first, its digital description
and second, its transmission media. The transmission channel of an audio signal defines the

20
environments the signal can go through, on its method from encoder to decoder. This can be
digital end-end, analogue transmission, and increasing-decreasing resampling or “over-the-
air” environments.

4.1.3 VIDEO STEGANOGRPHY.

Video steganography is becoming an important research area in various data hiding


technologies, which has become a promising tool because not only the security requirement
of secret message transmission is becoming stricter but also video is more favored. In this
paper, according to the embedded position of secret message, video steganography is divided
into three categories: intra-embedding, pre-embedding and post-embedding. Intra-embedding
methods are categorized according to the video compression stages such as intra-prediction,
motion vectors, pixels interpolation, transform coefficients. Pre-embedding methods are
manipulated on the raw video, which can be classified into spatial and transform domains.
Post-embedding methods are mainly focused on the bitstreams, which means the procedure of
embedding and extraction of video steganography are all manipulated on the compressed bit
stream. Then we introduce the performance assessment for video steganography and the
future popular video steganography including H.265 video steganography, robust video
steganography and reversible video steganography. And challenges are finally discussed in
this paper.

21
Video Steganography is to hide the existence of the message from unauthorized party using
Video as cover file and hiding data in video. Steganography means covered writing it
includes process of concealing information within other file and also conceals the fact that a
secret message is being sent. In this paper a technique proposed is Hash based least
significant bit technique for video steganography. Least Significant Bit insertion method
embed data in the lower bits of RGB pixel of video and these changes will be minimal. Data
hiding is the process of embedding information in a video without changing its perceptual
quality and also keep away from knowledge of existence of massage.

4.1.4 NETWORK STEGANOGRAPHY.

Network steganography is a hidden communication technique, which utilizes the


legitimate traffic as the vehicle to transfer the secret information covertly over the untrusted
network. BitTorrent (BT) is one of the most prevalent P2P services for transmitting video
files over wireless networks. An enormous amount of video data is transmitted over
BitTorrent traffic continuously, to make it potentially available for confidential information
transfer. Hence, in this paper, the Bit torrent file-sharing service of P2P is chosen as the host
for information hiding, and a multimode steganographic method based on Bitfield message is
proposed. Taking advantage of BitTorrent cooperative transmission and the non-content-
authentication mechanism of Bitfield message, the secret information is delivered during the
exchange process of Bitmap Info between two peers. The steganographic mode is
dynamically selected in view of the secret size, achieving adaptive bandwidth. The
experimental results show that our scheme can resist statistical-based detection effectively
and outperform the existing method by obtaining a lower degree of detection rate under
machine learning-based steganalysis.

22
network steganography exploits the normal traffic as the carrier to transmit information
stealthily via untrusted networks. Compared with the static multimedia steganography, such
as image steganography, it is difficult for the monitor to locate and extract the covert data in
tremendous network flow. Hence, network steganography is an effective means of
transporting confidential information in networks. In recent years, it has become a hot
research topic in the field of information security due to the fine properties of network traffic.
There are two broad types of network covert channels: covert storage channel and covert
timing one. Covert storage channel embeds the secret information into the redundancies of
network protocols Although it is simple and easy to implement, it can be easily detected by
the existing methods.

4.1.5 IMAGE STEGANOGRAPHY.

Hiding the data by taking the Image as cover object is referred as image
steganography. In image steganography pixel intensities are used to hide the data. In digital
steganography, images are widely used cover source because there are number of bits
presents in digital representation of an image.

23
Image Steganography, as the name implies, is the process of concealing data within an image
file. The image chosen for this purpose is referred to as the cover image, and the image
obtained after steganography is referred to as the stego image.

Image steganography is performed for images and the concerning data is also decrypted to
retrieve the message image. Since this can be done in several ways, image steganography is
studied and one of the methods is used to demonstrate it. Image steganography refers to
hiding information i.e., text, images or audio files in another image or video files. The current
project aims to use steganography for a text with image using spatial domain technique. This
hidden information can be retrieved only through proper decoding technique. Images are an
excellent medium for concealing information because they provide a high degree of
redundancy – which means that there are lots of bits that are there to provide accuracy far
greater than necessary for the object’s use (or display).

Hiding information inside images is a popular technique nowadays. An image with a secret
message inside can easily be spread over the World Wide Web or in newsgroups. The use of
steganography in newsgroups has been researched by German steganographic expert
NielsProvos, who created a scanning cluster which detects the presence of hidden messages
inside images that were posted on the net. However, after checking one million images, no
hidden messages were

24
found, so the practical use of steganography still seems to be limited. Image Steganography is
the technique of hiding the data within the image in such a way that prevents the unintended
user from the detection of the hidden messages or data.

To hide a message inside an image without changing its visible properties, the cover source
can be altered in noisy areas with many color variations, so less attention will be drawn to the
modifications. The most common methods to make these alterations involve the usage of the
least- significant bit or LSB, masking, filtering and transformations on the cover image. These
techniques can be used with varying degrees of success on different types of image files The
project deals with learning about the various types of steganography available. Image
steganography is performed for images and the concerning data is also decrypted to retrieve
the message image. Since this can be done in several ways, image steganography is studied
and one of the methods is used to demonstrate it.

To a computer, an image is a collection of numbers that constitute different light intensities in


different areas of the image. This numeric representation forms a grid and the individual
points are referred to as pixels. Most images on the Internet consists of a rectangular map of
the image’s pixels (represented as bits) where each pixel is located and its color. These pixels
are displayed horizontally row by row.

25
The number of bits in a color scheme, called the bit depth, refers to the number of bits used
for each pixel. The smallest bit depth in current color schemes is 8, meaning that there are 8
bits used to describe the colour of each pixel. Monochrome and greyscale images use 8 bits
for each pixel and are able to display 256 different colors or shades of grey. Digital colour
images are typically stored in 24-bit files and use the RGB colour model, also known as true
colour. All colour variations for the pixels of a 24-bit image are derived from three primary
colours: red, green and blue, and each primary colour is represented by 8 bits. Thus, in one
given pixel, there can be 256 different quantities of red, green and blue, adding up to more
than 16-million combinations, resulting in more than 16-million colours. Not surprisingly the
larger amount of colours that can be displayed, the larger the file size.

When working with larger images of greater bit depth, the images tend to become too large to
transmit over a standard Internet connection. In order to display an image in a reasonable
amount of time, techniques must be incorporated to reduce the image’s file size. These
techniques make use of mathematical formulas to analyze and condense image data, resulting
in smaller file sizes. This process is called compression.

26
In images there are two types of compression: lossy and lossless. Both methods save storage
space, but the procedures that they implement differ. Lossy compression creates smaller files
by discarding excess image data from the original image. It removes details that are too small
for the human eye to differentiate, resulting in close approximations of the original image,
although not an exact duplicate. An example of an image format that uses this compression
technique is JPEG (Joint Photographic Experts Group).

Lossless compression, on the other hand, never removes any information from the original
image, but instead Represents data in mathematical formulas. The original image’s integrity is
maintained and the Decompressed image output is bit-by-bit identical to the original image
input. The most popular image Formats that use lossless compression is GIF (Graphical
Interchange Format) and 8-bit BMP (a Microsoft Windows bitmap file).

Compression plays a very important role in choosing which steganographic algorithm to use.
Lossy Compression techniques result in smaller image file sizes, but it increases the
possibility that the embedded Message may be partly lost due to the fact that excess image
data will be removed. Lossless compression Though, keeps the original digital image intact
without the chance of lost, although it does not compress the Image to such a small file size.
Different steganographic algorithms have been developed for both of these Compression
types and will be explained in the following sections.

Image steganography techniques can be divided into two groups: those in the Image Domain
and those in the Transform Domain. Image domain also known as spatial – domain
techniques embed messages in the intensity of the pixels directly, while for transform domain
also known as frequency – domain, images are first transformed and then the message is
embedded in the image. Image domain techniques encompass bit-wise methods that apply bit
insertion and noise manipulation and are Sometimes characterized as “simple systems”. The
image formats that are most suitable for image domain Steganography are lossless and the
techniques are typically dependent on the image format.

27
Steganography in the transform domain involves the manipulation of algorithms and image
transforms. These methods hide messages in more significant areas of the cover image,
making it more robust. Many Transform domain methods are independent of the image
format and the embedded message may survive Conversion between lossy and lossless
compression.

Image steganography is a GUI-based project in which we are hiding a secret message within
the image using encoding and decoding functions. We are creating a window in which there
are two buttons: encoding and decoding.

For encoding, select any image, this image will be converted into bmp format. Type message
in the message box then it will convert into base64, merge this encoded string into image and
the user can save the image where he/she wants.

For decoding, select the image which is encoded, the base64 string will get separated by
decoding, and by Tkinter module hidden text is shown in the textbox.

28
Fig: Encoding Image Fig: Encoded Image

Image Steganography refers to the process of hiding data within an image file. The image
selected for this purpose is called the cover image and the image obtained after steganography
is called the stego image.

This steganography approach entails concealing a huge amount of data (picture) within a
colour bitmap (bmp) image. The image will be filtered and segmented in his study, with bits
replacement applied to the appropriate pixels. These pixels are chosen at in order.

Detection of the message within the cover image is done by the process of steganalysis. This
can be done through comparison with the cover image. While efforts are being invested in
developing new algorithms with a greater degree of immunity against such attacks, efforts are
also being devoted towards improving existing algorithms for steganalysis, to detect the
exchange of secret information between terrorists or criminal elements.

Pictures are utilized as the famous cover objects for steganography. A message is installed in
an advanced picture through an inserting calculation. The subsequent stego picture is send to
the beneficiary. On the opposite side, it is prepared by the extraction calculation. Amid the
transmission of steno picture unauthenticated people can just notice the transmission of a
picture yet can’t figure the presence of the concealed messages.

The secret information is hidden in a way that it not visible to the human eyes. Deep learning
technology, which has emerged as a powerful tool in various applications including image
steganography, has received increased attention recently. The main goal of this project is to
explore and discuss various deep learning methods available in image steganography field.
Deep learning

29
techniques used for image steganography can be broadly divided into three categories –
traditional methods, Convolutional Neural Network-based and General Adversarial Network-
based methods. Along with the methodology, an elaborate summary on the datasets used,
experimental set-ups considered and the evaluation metrics commonly used are described in
this project. This project aims to help the fellow researchers by compiling the current trends,
challenges and some future direction in this field.

So, let’s understand why we use only LSB for storing data instead of MSB. Okay for example
lets take the 8-bit value 255. In that the left side first value is most important as we can see in
the image if we change the value of MSB to zero then the value will be reduced to 127. On
the other side we can see if we change the LSB value to zero then the 8-bit value will be 254.
From the above image we can observe that if we change the MSB then color will be changed
mostly the human eye can be identified, if we change the LSB the color will be slightly
changing so a human eye can be identified. So, we use LSB method in all mediums for
storing data.

30
CHAPTER 5
DESIGN METHODOLOGIES

31
5.1 Types of Algorithms in Image steganography
1) Spatial Domain Algorithm.
2) Transform Domain Algorithm.
3) Distortion Technique.
4) Masking And Filtering.
1) Spatial Domain Algorithm.
Spatial domain steganography remains a popular method, whereby
images are represented as a matrix of intensity values. It is the individual values of the spatial
domain that are commonly modified. This is because small changes to intensity values
generally cause hardly recognizable visual differences to the stego-object as a whole. The
early basis for this type of steganography was to exploit the limitations of the human visual
system (HVS).

Methods in Spatial Domain


Algorithm. i)LSB Substitution
Method.

LSB (Least Significant Bit) substitution is considered the most well-known method of
embedding in digital steganography. It relies on the principle that the least significant bit of any
byte is frequently indistinguishable from random noise and can therefore be replaced by bits from
a secret message. For example, Below Figure shows the full representation of a greyscale image
(on the left) paired with its representation in the LSB bit-plane. The LSB bit-plane appears
random and should therefore accommodate bit replacement with an encrypted message.
Advancements in steganalysis, however, revealed this naive assumption to be completely untrue,
leading to steganography methods exploiting this false concept.

Fig: Comparison of gray scale and LSB bit plane.

32
The early work on image steganography was by Bender et al., Adelson, and those working in
spread-spectrum steganography. Initially, these researchers based their schemes on exploiting
the limitations of the Human Visual System (HVS) and its sensitivity to contrast versus
spatial frequency. In the naive applications of LSB steganography, there was one qualifying
characteristic, that the change of the LSB of a byte would result in a stego-object being
visually indistinguishable from the cover-object. The concept of LSB is still widely applied in
modern steganography schemes. However, these methods are typically supported by complex
operations and cover codes to produce a secure scheme with improved embedding efficiency,
that is significantly harder to detect. One of the first known implementations for digital
steganography was a spatial domain technique proposed by Kurak and Mchugh. This method
embedded secret data within 4-LSB components and was the first case of steganography
exploiting detailed knowledge of the HVS. Typically, spatial techniques modify bits within an
image’s pixel values, replacing them directly with the secret message bits. The concept of bit
replacement would be that, for each pixel in an image, it can be assigned a corresponding
integer value, based on the intensity of a colour that is displayed by the pixel. Once converted
into a binary stream, individual bits can be extrapolated to determine whether they are
suitable for substitution. For example, functions can be included to prevent even values from
being decreased and odd values from being increased. Below Figure demonstrates the process
for LSB bit substitution steganography.

Fig: Break down of bit-plane of an image.

This concept formed the initial works in LSB steganography. However, naïve LSB schemes
are highly susceptible to Chi-square tests and statistical steganalysis. LSB encoding within
24-bit colour images was the most popular form of early spatial domain steganography. The
embedding technique was used across many software products. Capacity became the focus of
these techniques,

33
as 24- bit images allowed the user to store up to 3-bits for each modified pixel. The early
work in spatial domain steganography for colour based images was broken by the efforts of
Fridrich et al.
. To detect LSB steganography, Fridrich and her team considered a calculation of the ratio
between close colour pairs and all colour pairs in an image. Their idea was that for an image
with no secret messages, the number of close pairs of colours relative to the number of all
possible pairs of colours will be smaller than for an image that has a message already
embedded in it. To determine the ratio threshold, their team observed that further modifying a
stego-object with a new secret message will not modify the ratio in any significant manner.
Whereas if the image does not contain a secret message, then embedding will drastically
change the ratio. This knowledge can be used to determine the presence of LSB colour
encoded steganography and develop a detection algorithm. A test was used where a message
was randomly distributed throughout the LSB of selected pixels. The calculation is given to
the new stego-object and if the two ratios are almost identical, LSB steganography is
suspected.

ii) LSB Matching Method.

LSB matching is a method of LSB steganography first proposed


by Sharp. The concept was that instead of sequentially and
predictably substituting bits of target LSBs within an image, an
adaptive scheme would be constructed to be selective of the
features present in any particular cover-object. If the message bit
fails to match the LSB of the cover-image, then a ‘1’ value is either
added or subtracted from the value of the target pixel. To ensure
that the scheme for AoSo (Add or Subtract One) would be invertible,
an algorithm would be implemented to stop pixel values from being
modified outside of a predetermined range. While simple to
implement, it is surprisingly and significantly more challenging to
detect. than basic LSB substitution. A similar method was proposed
by Mielikainen who proposed that instead of using a random
function to determine the use of the +1 or −1 principle, a selection
feature can be introduced to set a binary function of two cover
pixels to the desired value. This improved method of LSB matching
maintained the same embedding efficiency as the original but

34
provided greater resistance to known attacks, such as the one
proposed by Westfeld . Westfeld’s attack relied upon a count of
arbitrary neighbor colours introduced by the embedding algorithm
for LSB matching. However, this means that the detection method
was only applicable to colour images and would not work for a
grayscale representation. A stronger method for greyscale images
was presented by Andrew Ker.

35
iii) Pixel Value Difference.

The pixel-value differencing (PVD) scheme provides high imperceptibility to the


stego image by selecting two consecutive pixels and designs a quantization range table to
determine the payload by the difference value between the consecutive pixels. Besides, it
offers the advantage of conveying a large number of payloads, while still maintaining the
consistency of an image characteristic after data embedding.

In recent years, several studies have been proposed to improve the PVD method. Wu et al.’s
presented a method combining pixel-value differencing and the LSB replacement method.
Yang and Weng proposed a multipixel differencing method that uses three difference values
in a four- pixel block to determine how many secret bits should be embedded, and Jung et
al.’s proposed an image data hiding method based on multipixel differencing and LSB
substitution. Liu and Shih proposed two extensions of the PVD method, the block-based
approach and Haar-based approach, and Yang et al. proposed an information hiding technique
based on blocked PVD. Liao et al.’s proposed a four-pixel differencing and modified LSB
substitution, and Yang et al.’s proposed a data hiding scheme using the pixel-value
differencing in multimedia images.

Some studies focused on increasing the capacity using LSB or a readjusted process to
improve the embedding capacity or image quantity. Few studies focus on the range table
design. Besides, it is intuitive to design it using the width of the power of two.

In this work, we design a new quantization range table based on the perfect square number to
decide the payload by the difference value between the consecutive pixels. It differs from the
design of Wu and Tsai’s scheme, in which the quantization range table is based on the range
width of the power of two. The perfect square number provides an elegant mathematical
model to develop a new quantization range table, which divides each range into two
subranges for embedding different numbers of secret bits.

36
2) Transform Domain Algorithm.
This is a more complex way of hiding information in an image. Various algorithms
and transformations are used on the image to hide information in it. Transform
domain embedding can be termed as a domain of embedding techniques for which a
number of algorithms have been suggested. The process of embedding data in the
frequency domain of a signal is much stronger than embedding principles that operate
in the time domain.
Most of the strong steganographic systems today operate within the transform
domain Transform domain techniques have an advantage over spatial domain
techniques as they hide information in areas of the image that are less exposed to
compression, cropping, and image processing. Some transform domain techniques
do not seem dependent on the image format and they may outrun lossless and lossy
format conversions. Transform domain techniques are broadly classified into:
1. Discrete Fourier transformation technique (DFT).
2. Discrete cosine transformation technique (DCT).
3. Discrete Wavelet transformation technique (DWT).
4. Lossless or reversible method (DCT)
5. Embedding in coefficient bits.
5. Distortion Technique.
Distortion techniques need knowledge of the original cover image during the
decoding process where the decoder functions to check for differences between the
original cover image and the distorted cover image in order to restore the secret
message. The encoder adds a sequence of changes to the cover image. So,
information is described as being stored by signal distortion. Using this technique, a
stego object is created by applying a sequence of modifications to the cover image.
This sequence of modifications is use to match the secret message required to
transmit. The message is encoded at pseudo- randomly chosen pixels. If the stego-
image is different from the cover image at the given message pixel, the message bit is
a “1.” otherwise, the message bit is a “0.” The encoder can modify the “1” value
pixels in such a manner that the statistical properties of the image are not affected.
However, the need for sending the cover image limits the benefits of this technique.
In any steganographic technique, the cover image should never be used more than
once. If an attacker tampers with the stego-image by cropping, scaling or rotating, the
receiver can easily detect it. In some cases, if the message is encoded .

37
3) Masking And Filtering.
These techniques hide information by marking an image, in the same way as to paper
watermarks. These techniques embed the information in the more significant areas
than just hiding it into the noise level. The hidden message is more integral to the
cover image. Watermarking techniques can be applied without the fear of image
destruction due to lossy compression as they are more integrated into the image.

Advantages of Masking and Filtering Technique:


1. This method is much more robust than LSB replacement with respect to
compression since the information is hidden in the visible parts of the
image.

Disadvantages of Masking and Filtering Technique:


1. Techniques can be applied only to gray scale images and restricted to 24 bits

38
CHAPTER 6
DIAGRAMS AND RESULT

6.1 DATAFLOW DIAGRAM


39
• Python is commonly used in steganography to embed hidden messages or information within an
image.

40
• Libraries such as NumPy, OpenCV, PyAutoGUI, and tkinter are frequently used in Python
steganography.

• NumPy is utilized to manipulate and store large arrays of numerical data, which can be useful when
working with image data.

• OpenCV is commonly used in image processing tasks, such as extracting and manipulating image
features or performing color space conversions.

• PyAutoGUI and tkinter can be used to create graphical user interfaces (GUIs) for steganography
applications, allowing users to interact with the program and input or output data.

6.2 CLASS DIAGRAM

• Class diagram depicts image steganography using Python libraries such as NumPy, OpenCV,
PyAutoGUI, Types, and Tkinter.

• The class diagram shows the interconnections and relationships between different classes involved
in image steganography.

• The NumPy library is used to perform mathematical operations and manipulate the image data.

41
• The OpenCV library is used for image processing and analysis, including the extraction of image
features and encoding/decoding of images.

• The PyAutoGUI library is used to automate the mouse and keyboard functions to make the process
of image steganography more efficient.

6.3 Encoding Algorithm.

Step 0: START

Step 1: Get the image and message as the parameters for Encoding function.

Step 2: Calculate the maximum bytes of the image.

Step 3: IF length of Secret image > number of bytes of image:

Raise “value error”

Step 4: Set the Delimeter as the user key.

Step 5: Convert the secret message into binary format using the MessageToBinary function in
program.

Step 6: Find the length of the Binary secret message.

Step 7: Initialize Data_Index=0

Step 8: Start FOR LOOP values in image:

Start FOR LOOP pixel in values:

#Convert the RGB values into binary format.

IF Data_index < length of binary secret message:

Modify the Least Significant bit of RGB colours to store our data.

IF data_index > length of binary secret

message: Break

Step 9: END of FOR LOOP pixel in

values. Step 10: END of FOR LOOP

42
values image. Step 11: Return Image.

Step 12: END

6.4 Decoding Algorithm.

Step 0: START

Step 1: Get the Image as a parameter for decoding algorithm.

Step 2: Start FOR LOOP values in image:

Start FOR LOOP pixels in values:

#Convert RGB values into binary format.

#Extract the data of the least significant for each pixel.

Step 3: End FOR LOOP pixels in values.

Step 4: End FOR LOOP values in image.

Step 5: Divide the extracted data into 8-bits each.

Step 6: Start FOR LOOP Bytes in 8-bit data

#Convert each byte into

characters. IF Decoded data

includes delimeter: Return

Decoded data

Step 7: End of FOR LOOP bytes in 8-bit data

Step 8: ENDs

6.4 OUTPUT OF THE PROJECT.

6.4.1 ENCODE.

43
44
45
6.4.2 DECODE:

46
47
CHAPTER 7

APPLICATIONS OF SYSTEM

48
Chapter-8

7.1 Advantages of Image Steganography.


1. Image Steganography is a method that makes it easy to conceal a message within
another to keep it secret. The result is that the hidden message remains hidden. A
steganography approach can benefit images.
2. Unlike other methods, Image steganography has the added benefit of
hiding communications so well that they receive no attention.
3. However, in countries where encryption is illegal, sending an encrypted message that
you can easily decipher will raise suspicion and may be risky.
4. Image Steganography is a form of encryption that protects the information
within a message and the connections between sender and receiver.
5. You can store an encrypted copy of a file containing sensitive information on the
server without fear of unauthorized parties gaining access to the data.
6. Government and law enforcement agencies can communicate secretly with the
help of steganography corporations.
7. The Image stenographic technique enables the concealment of the fact that messages
are being transmitted through digital media, such communication techniques are
invisible between the sender and the receiver, while cryptography obscures the
integrity of the information so that it is not understood by anyone.
8. Perceptual Transparency: Perceptual transparency is an important feature of
Image steganography.
9. Hiding Capacity: This feature deals with the size of information that can be
hidden inside the cover file. A larger hiding capacity allows use of a small cover
and thus reduces the band-width required to transmit the stegomedia.
10. Tamper Resistance: Of all the features, this feature is very important. This is
because, if the attacker is successful in destroying the steganographic technique then
the tamper– resistance property makes it difficult for the attacker or pirates to alter or
damage
the original data.

49
11. Robustness: Robustness is the ability of the hidden message to remain undamaged
even if the stego–media undergoes transformation, sharpening, linear and non-linear
filtering, scaling and blurring, cropping and various other techniques.
12. This approach featured security, capacity, and robustness, the three needed element
of steganography that creates it beneficial in hidden exchange of data through text
files and creating secret communication.

7.3 Applications of Image Steganography.

13. Secure Private Files and Documents.


14. Hide Passwords and Encryption Keys.
15. Transport Highly Private Documents between International Governments.
16. Transmit message and data without revealing the existence of available message.
17. To allow communication within an underground community. There are several
reports, for example, of persecuted religious minorities using steganography to
embed messages for the group within images that are posted to known Web sites.
18. Confidential communication and secret data storing.
19. Protection of data alteration.
20. Access control system for digital content distribution.
21. Media Database systems.
22. Defense and intelligence.
23. Medical.
24. Online Banking.
25. Other financial and commercial purposes.
26. For self-communication, image steganography is used to hide one-time
passwords (OTPs) in images that are stored on a mobile device.
27. Image Steganography can be used to enhance the security of various
applications, including secure communication.
28. Different approaches to secure communication, as discussed in the next section,
entail different implementations of steganography

50
CHAPTER 8
SYSTEM TESTING AND
COMPARISION

8.1 TESTING ANALYSIS.

51
• Tested the robustness of the stego-image by introducing noise, compression, or other types of image
alterations and verify that the hidden message can still be extracted.
• Tested the capacity of the stego-image by trying to hide larger messages and verifying that the
image can accommodate the additional data without visual distortion or loss of quality.
• Tested the performance of the steganography algorithm by measuring the time it takes to hide and
extract a message from an image, and compare it to other existing steganography techniques.
• Verified that the hidden message can be successfully extracted from the stego-image using the
correct key or password.

52
Chapter-9

8.2 Cryptography VS Steganography

STEGANOGRAPHY CRYPTOGRAPHY

The term Steganography is derived from the The term Cryptography is originally derived from
Greek word “steganos”, meaning hidden or the two Greek words “kryptos” and “graph”,
covered. meaning hidden and writing.

Steganography means covered writing. The Cryptography means secret writing. The art and
process of hiding digital information in a carrier science of studying methods of protecting data.
signal.

Steganography hides the trace of While cryptography uses the encryption to make
communication. the message incomprehensible.

Attack’s name in steganography is steganalysis. While in cryptography, nam i


Cryptanalys e s
is. Attack’s
In steganography, structure of data is not While in cryptography, structure of data is altered.
usually altered.

Steganography supports An While cryptography supports confidentiality and


confidentiality d authentication security principles as well as data
authentication security principles. integrity and non-repudiation.

In steganography, the fact that Sec While in cryptography only secret message is
a communication is taking place is ret hidden.
hidden.
In steganography, not much Cryptography involves the use of number theory,
mathematical transformations are mathematically etc., to modify data.
involved.
Its goal is to assist in secret communication, it Its goal is to encrypt the contents of the visible
conceals the occurrence of any exchange message to save the data.
between the sender and receiver.

It relies on the confidentiality of the method of It relies on the confidentiality of the key.
embedding.

53
Chapter-9

It is implemented on Audio, Video, Image and It is implemented only on Text Files.


Text Files.

It is used to carry several digital media. It is used to carry text-based data.

Its key is optional. Its key is necessary.

Input Files are at least two. Only one input File.

Broken when attacker reveals that Broken when an attacker can understand the secret
steganography has been used known as message known as Cryptanalysis.
Steganography.

The final result obtained is known as stego The final result obtained is known as cipher text.
media.
It is used for securing information against It is used for securing information against potential
potential eavesdroppers. eavesdroppers

The message which is embedded is invisible to The encrypted message which is encrypted is
an unaware viewer. unreadable to everyone without the decryption
key.

The goal of secure steganographic methods is The goal of a secure cryptographic is to prevent an
to prevent an observant intermediary from even interceptor from gaining any information about the
obtaining knowledge of the mere presence of plaintext from the intercepted cipher text.
the secret data.

54
CHAPTER 9

CONCLUSION AND REFERENCE

55
9.1 CONCLUSION

The proposed approach in this project uses a steganographic approach called image
steganography. The application creates a stego image in which personal
data is embedded inside the cover file image. It is reliable and secure.

Used a least significant bit (LSB) algorithm in this project for developing the application
which is faster and reliable and compression ratio is moderate compared to all algorithms.
The LSB is most simple. It is observed that through LSB Substitution method, the results
obtained in data hiding are pretty impressive as it utilizes the simple fact that any image could
be broken up to individual bit-planes each consisting of different levels of information. It is to
be noted that as discussed earlier, this method is only effective for bitmap images as these
involve lossless compression techniques. Also, in this project grey-scale images have been
used for demonstration. But this process can also be extended to be used for color images
where, bit- plane slicing is to be done individually for the top four bit-planes for each R, G, B
of the message image, which are again to be placed in the R, G, B planes of the cover image,
and extraction is done similarly. RGB is the color model in which each pixel is 3 bytes. RGB
image where each pixel is represented by three bytes indicating the intensity of red, green and
blue in which each primary color represents 8 bits. We use bmp image format as it contains
uncompressed data while pixels are chosen random rather than in order.

Though this project focusses on LSB and the algorithm is spatial domain method, So, that the
human eye would not notice the hidden messages within it.

56
9.2 REFERENCE

[1] Yogendra Kumar Jain, R. R. Ahirwal, A Novel Image Steganography Method with
Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys,
International Journal of Computer Science and Security (IJCSS) vol. 4, 1st March (2010).

[2] H. Yang, X. Sun, G. Sun. A High-Capacity Image Data Hiding Scheme Using Adaptive
LSB Substitution. Journal: Radioengineering Year: vol. 18, 4 Pages/record No.: 509-516,
(2009).

[3] Shashikala Channalli and Ajay Jadhav, “steganography An Art of Hiding Data,
International Journal on Computer Science and Engineering, IJCSE vol. 1, no.3 (2009).

[4] Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Member, IEEE, and Hung-Min
Sun, Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems,
IEEE Transactions on Information Forensics and Security, vol. 3, no. pp. 488-497. 3rd
September (2008).

[5] Ki-Hyun Jung, Kyeoung-Ju Ha, Kee-Young Yoo. Image data hiding method based on
multi-pixel differencing and LSB substitution methods. In Proc. 2008 International
Conference on Convergence and Hybrid Information Technology (ICHIT '08). Daejeon
(Korea), Aug. 28-30, p. 355-358, (2008).

[6] Hanling Zhang Guangzhi Geng Caiqiong Xiong, Image Steganography Using Pixel-Value
Differencing, Electronic Commerce and Security, ISECS '09. Second International
Symposium on May (2009).

[7] Chen, W. J., Chang, C. C. and Le, T. H. N., High Payload Steganography Mechanism
Using Hybrid Edge Detector, Expert Systems with Applications (ESWA 2010), vol. 37, no.
pp. 3292- 3301, 4th April (2010).

[8] V.Madhu Viswanatham, Jeswanth Manikonda, A Novel Technique for Embedding Data
in Spatial Domain, International Journal on Computer Science and Engineering, IJCSE vol. 2
Issues (2010).

57
[9] Al-Husainy, M. A., Image Steganography by Mapping Pixels to Letters, Journal of
Computer Science, vol.5 no.1, pp. 33-38, (2009).

[10] H.Motameni, M.Norouzi, M.Jahandar and A.Hatami, Labeling Method in Steganography,


World Academy of Science, Engineering and Technology, France. (2007).

[11] Babita Ahuja, Manpreet Kaur, Manav Rachna High-Capacity Filter Based
Steganography, International Journal of Recent Trends in Engineering, vol. 1, no. 1, May
(2009).

[12] Mohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub, RGB Intensity Based Variable-
Bits Image Steganography, IEEE Asia Pacific Services Computing Conference, pp.1322-
1327, (2008).

[13] Hamid, A. M., M. L. M. Kiah. Novel Approach for High Secure and High-Rate Data
Hidden in the Image Using Imag Texture Analysis. International Journal of Engineering and
Technology (IJET): 0975-4042, (2009).

[14] M. Chaumont and W. Puech, DCT-Based Data Hiding Method to Embed the Color
Information in a JPEG Grey Level Image, 14th European Signal Processing Conference
(EUSIPCO 2006), Florence, Italy, September 4-8, (2006), copyright by EURASIP.

[15] K. S. Babu, K. B. Raja, K. Kiran Kumar, T. H. Manjula Devi, K. R. Venugopal, L. M.


Pataki, Authentication of secret information in image steganography, IEEE Region 10
Conference, TENCON-2008, pp. 1-6, Nov. (2008).

[16] Shogo Ohyama, Michiharu Niimi,Kazumi Yamawaki,Hideki Noda, Lossless data hiding
using bit depth embedding for JPEG2000 compressed bit-stream. Journal of Communication
and Computer,

58

You might also like