Seminar
Seminar
SEMINAR REPORT
ON
“STEGANOGRAPHY”
SUBMITTED BY
Sakshi Shinde (39064)
1
[Steganography]
CERTIFICATE
Date:
Guide:-Ms. M. V. Otari
Head
2
[Steganography]
Acknowledgment
I would like to express our gratitude towards Prof. Dr. Mrs. S. A. Itkar, Head of
Computer Engineering Department, PES Modern College of Engineering for her
kind co-operation and encouragement which helped me during the completion of
this report.
Also I wish to thank our Principal, Prof. Dr. Mrs. K. R. Joshi and all faculty
members for their whole hearted co-operation for completion of this report. I also
thank our laboratory assistants for their valuable help in laboratory.
Last but not the least, the backbone of my success and confidence lies solely on
blessings of dear parents and lovely friends.
3
[Steganography]
Contents
Abstract -----------------------------------------------------------------------5
List of Figures-------------------------------------------------------------------6
List of Tables--------------------------------------------------------------------7
List of Abbreviations-----------------------------------------------------------8
1).Introduction-------------------------------------------------------------------9
1.3) Objectives..----------------------------------------------------------------10
1.4 Motivation------------------------------------------------------------------11
2) Literature Survey-------------------------------------------------------------12
3.2.1) Algorithm----------------------------------------------------------19-20
4) Conclusion---------------------------------------------------------------------22-23
References------------------------------------------------------------------------24-25
4
[Steganography]
Abstract
5
[Steganography]
List Of Figures
1.Architecture Diagram
2.Working Diagram
6
[Steganography]
List Of Tables
7
[Steganography]
List Of Abbreviations
8
[Steganography]
1.
Introduction
9
[Steganography]
Steganography is the art and science of concealing information within other data
in such a way that it remains hidden from unintended observers. This clandestine
technique goes beyond encryption and focuses on disguising the very existence
of secret data. Unlike cryptography, which primarily secures information by
transforming it into an unreadable format, steganography aims to ensure that the
very presence of the data is not apparent.
In practice, steganography involves embedding a secret message, file, or data
within a seemingly innocuous "cover" medium, such as an image, audio file, or
text. The key concept is that the alteration of the cover medium is subtle and
imperceptible to the human senses or standard data analysis techniques. Common
methods include manipulating the least significant bits (LSBs) of pixel values in
images or altering the frequencies in audio files.
Steganography has a wide range of applications, from securing sensitive
communications to watermarking images and tracking digital assets. However, it
also has the potential for misuse in activities like cyber-espionage and digital
copyright infringement, making it a topic of interest for both security experts and
those seeking to protect their digital assets. The field of steganalysis, which is the
study of detecting hidden information, continues to evolve in tandem with
steganography, creating an ongoing cat-and-mouse game between those
concealing data and those trying to unveil it.
1.3 Objectives
1)To provide a comprehensive overview of steganography and its historical
context.
2)To analyse the techniques and methods used in steganography.
10
[Steganography]
1.4 Motivation
The motivation behind this report lies in the growing importance of data privacy
and security. As digital communication and information exchange continue to
expand, the need for effective tools and techniques to safeguard sensitive data
becomes paramount. By understanding steganography, we can better address the
challenges and opportunities it presents in the field of data security.
The internet allows for easy dissemination of information over large areas. This
is both a blessing and a curse since friends all over the world can view your
information but so can everyone else. Encrypting data has been the most popular
approach to protecting information but this protection can be broken with enough
computational power. An alternate approach to encrypting data would be to hide
it by making this information look like something else. This way only friends
would realize its true content. In particular, if the important data is hidden inside
of an image then everyone but your friends would view it as a picture. At the
same time your friends could still retrieve the true information. This technique is
often called data hiding or stenography and you will be implementing the
technique in the class project.
-Protection of Digital Media.
-Privacy of Information Transmitted across the world wide web.
11
[Steganography]
2.
Literature Survey
12
[Steganography]
13
[Steganography]
3.
Details of design/
Technology/Analytical and
Experimental Work
14
[Steganography]
15
[Steganography]
Embedding Rate: The embedding rate indicates how much data can be concealed
within the cover medium. Designers must consider the trade-off between
embedding rate and the likelihood of detection.
Key Management: Proper key management is crucial for maintaining the security
of steganographic systems. This involves generating, storing, and exchanging
keys securely.
Application-Specific Considerations: The design of a steganography system can
vary depending on its intended application. For instance, a system used for secure
communications may have different requirements compared to a system used for
watermarking or digital rights management.
Testing and Evaluation: The designed steganographic system should undergo
rigorous testing and evaluation to assess its performance in terms of security and
capacity. This often involves using steganalysis tools to test the system's
resilience to detection.
Ethical and Legal Considerations: Designers should also consider the ethical and
legal aspects of steganography, especially when it comes to the potential misuse
of such systems.
Overall, the design of steganography systems is a complex process that requires
a deep understanding of various techniques and trade-offs. Security, capacity, and
the perceptibility of alterations in the cover medium are key factors in the design
and implementation of steganography.
16
[Steganography]
Fig-1
Fig-2
17
[Steganography]
18
[Steganography]
Fidelity and Perceptibility Evaluation: After the extraction process, the system
may undergo an evaluation to assess the fidelity and perceptibility of the cover
medium. Alterations made during embedding should be imperceptible to the
human senses.
Application-Specific Components: Depending on the application, there may be
additional components. For example, a steganography system used for secure
communication may have encryption features, while a system used for
watermarking might include authentication mechanisms.
Testing and Evaluation Tools: To ensure the steganography system's
effectiveness and security, designers often use testing and evaluation tools. These
tools can help determine how well the system resists steganalysis and whether it
meets the specified requirements.
The architecture of a steganography system is adaptable to the specific needs of
its application. Whether it's used for secure communication, copyright protection,
or digital forensics, the core components mentioned above are typically present
in varying configurations and with different algorithms to achieve the desired
results.
3.2.1 Algorithm
Here's a high-level algorithm for text-based steganography using a simple LSB
(Least Significant Bit) technique. This algorithm outlines the steps for embedding
a text message into an image and extracting it later.
Embedding Algorithm:
1)Input:
Cover image (in which the message will be hidden)
Text message to be hidden
2)Convert Text to Binary:
Convert each character in the text message to its binary representation. For
example, "A" becomes "01000001."
3)Check Message Size:
19
[Steganography]
Ensure that the binary representation of the text message can fit into the cover
image without causing noticeable alterations. If the message is too large for the
image, consider compression or resizing.
4)Embedding Loop:
A)For each binary digit in the message (starting from the first):
a)Traverse the cover image pixel by pixel, row by row.
b)For each pixel, modify the least significant bit (LSB) of the color channels
(usually Red, Green, and Blue for RGB images) with the corresponding bit from
the binary message.
5)Output:
Save the stego-image (the modified cover image) with the hidden message.
Extraction Algorithm:
1)Input:
Stego-image (the image with the hidden message)
2)Extraction Loop:
Traverse the stego-image pixel by pixel, row by row.
For each pixel, extract the LSB of the color channels (R, G, B).
Append these LSBs to a buffer to reconstruct the binary message.
3)Convert Binary to Text:
Reconstruct the binary message and convert it back to text by grouping every 8
bits into a character.
4)Output:
Return the extracted text message.
It's important to note that this is a simplified algorithm for educational purposes.
In real-world steganography applications, additional techniques, such as
encryption, error correction, and more advanced embedding methods, are often
used to enhance security and resistance to steganalysis. The specific
implementation may also vary depending on the steganography tool or software
being use.
20
[Steganography]
21
[Steganography]
4.
Conclusion
22
[Steganography]
4.1 Conclusion
23
[Steganography]
5.
References
24
[Steganography]
5.1 References
25