0% found this document useful (0 votes)
26 views

Seminar

Uploaded by

SAKSHI SHINDE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Seminar

Uploaded by

SAKSHI SHINDE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

[Steganography]

SEMINAR REPORT
ON
“STEGANOGRAPHY”

SUBMITTED BY
Sakshi Shinde (39064)

Under The Guidance of


Ms. M. V. Otari

DEPARTMENT OF COMPUTER ENGINEERING


PROGRESSIVE EDUCATION SOCIETY’S MODERN
COLLEGE OF ENGINEERING,PUNE-05

SAVITRIBAI PHULE PUNE UNIVERSITY,PUNE


2023-24

1
[Steganography]

DEPARTMENT OF COMPUTER ENGINEERING


PROGRESSIVE EDUCATION SOCIETY’S MODERN
COLLEGE OF ENGINEERING,PUNE-05

SAVITRIBAI PHULE PUNE UNIVERSITY,PUNE


2023-24

CERTIFICATE

This is to certify that Sakshi Manik Shinde from Third Year


Computer Engineering has successfully completed her seminar work
titled "Steganography” at PES Modern College of Engineering in the
partial fulfilment of the Bachelor’s degree in computer engineering
under Savitribai Phule Pune University.

Date:

Guide:-Ms. M. V. Otari

(Prof. Dr. Mrs. S. A. Itkar)

Head

Department of Computer Engineering

2
[Steganography]

Acknowledgment

It gives me pleasure in presenting the seminar report on “Steganography”.

Firstly, I would like to express my indebtedness appreciation to my guide M. V.


Otari. Her constant guidance and advice played very important role in successful
completion of the report. She always gave me his/her suggestions, that were
crucial in making this report as flawless as possible.

I would like to express our gratitude towards Prof. Dr. Mrs. S. A. Itkar, Head of
Computer Engineering Department, PES Modern College of Engineering for her
kind co-operation and encouragement which helped me during the completion of
this report.

Also I wish to thank our Principal, Prof. Dr. Mrs. K. R. Joshi and all faculty
members for their whole hearted co-operation for completion of this report. I also
thank our laboratory assistants for their valuable help in laboratory.

Last but not the least, the backbone of my success and confidence lies solely on
blessings of dear parents and lovely friends.

Sakshi Manik Shinde

3
[Steganography]

Contents

Abstract -----------------------------------------------------------------------5

List of Figures-------------------------------------------------------------------6

List of Tables--------------------------------------------------------------------7

List of Abbreviations-----------------------------------------------------------8

1).Introduction-------------------------------------------------------------------9

1.1) Brief Description---------------------------------------------------------10

1.2) Problem Statement------------------------------------------------------10

1.3) Objectives..----------------------------------------------------------------10

1.4 Motivation------------------------------------------------------------------11

2) Literature Survey-------------------------------------------------------------12

2.1) Literature Survey..-------------------------------------------------------13

3)Details of design/technology/Analytical and/or experimental work-

3.1) Detailed Design----------------------------------------------------------14-16

3.2) Architectural Diagram------------------------------------------------17-18

3.2.1) Algorithm----------------------------------------------------------19-20

3.2.2) Future scope----------------------------------------------------------21

4) Conclusion---------------------------------------------------------------------22-23

References------------------------------------------------------------------------24-25

4
[Steganography]

Abstract

Steganography (a rough Greek translation of the term Steganography is secret


writing) has been used in various forms for 2500 years. Steganography is the art
and science of hiding information by embedding messages within other,
seemingly harmless messages. It has found use in variously in military,
diplomatic, personal and intellectual property applications. Briefly stated,
steganography is the term applied to any number of processes that will hide a
message within an object, where the hidden message will not be apparent to an
observer. This paper will explore steganography from its earliest instances
through potential future application. This paper introduces steganography by
explaining what it is, providing a brief history with illustrations of some methods
for implementing steganography. Though the forms are many, the focus of the
software evaluation in this paper is on the use of images in steganography. We
have even discussed various secret communication methods used, its comparison
with Cryptography and Digital Watermarking. Finally, future projections on this
perfect file encryption technique are made, along with few explanations using our
own software and programs.
Keywords: -
Information Hiding, Data Security, Digital Steganography, Cryptography, Cover
Media, Image Steganography, Audio Steganography, Text Steganography,
Steganographic Techniques, Data Privacy, Information Extraction,
Cryptographic Algorithms.

5
[Steganography]

List Of Figures

1.Architecture Diagram
2.Working Diagram

6
[Steganography]

List Of Tables

In This report I don’t use any table


Table count is 0

7
[Steganography]

List Of Abbreviations

1)AI: Artificial Intelligence


2)LSB: Least Significant Bit
3)PNG: Portable Network Graphics
4)JPEG: Joint Photographic Experts Group
5)GUI: Graphical User Interface

8
[Steganography]

1.
Introduction
9
[Steganography]

1.1 Brief Description

Steganography is the art and science of concealing information within other data
in such a way that it remains hidden from unintended observers. This clandestine
technique goes beyond encryption and focuses on disguising the very existence
of secret data. Unlike cryptography, which primarily secures information by
transforming it into an unreadable format, steganography aims to ensure that the
very presence of the data is not apparent.
In practice, steganography involves embedding a secret message, file, or data
within a seemingly innocuous "cover" medium, such as an image, audio file, or
text. The key concept is that the alteration of the cover medium is subtle and
imperceptible to the human senses or standard data analysis techniques. Common
methods include manipulating the least significant bits (LSBs) of pixel values in
images or altering the frequencies in audio files.
Steganography has a wide range of applications, from securing sensitive
communications to watermarking images and tracking digital assets. However, it
also has the potential for misuse in activities like cyber-espionage and digital
copyright infringement, making it a topic of interest for both security experts and
those seeking to protect their digital assets. The field of steganalysis, which is the
study of detecting hidden information, continues to evolve in tandem with
steganography, creating an ongoing cat-and-mouse game between those
concealing data and those trying to unveil it.

1.2 Problem Statement


How can we enhance the capacity of steganographic techniques to hide more data
within a cover medium while minimizing the risk of detection, ensuring that the
modifications are imperceptible to the human eye or ear?

1.3 Objectives
1)To provide a comprehensive overview of steganography and its historical
context.
2)To analyse the techniques and methods used in steganography.

10
[Steganography]

3)To examine the applications of steganography in various domains.


4)To discuss the challenges and vulnerabilities associated with steganography.
5)To explore potential countermeasures and prospects.

1.4 Motivation
The motivation behind this report lies in the growing importance of data privacy
and security. As digital communication and information exchange continue to
expand, the need for effective tools and techniques to safeguard sensitive data
becomes paramount. By understanding steganography, we can better address the
challenges and opportunities it presents in the field of data security.
The internet allows for easy dissemination of information over large areas. This
is both a blessing and a curse since friends all over the world can view your
information but so can everyone else. Encrypting data has been the most popular
approach to protecting information but this protection can be broken with enough
computational power. An alternate approach to encrypting data would be to hide
it by making this information look like something else. This way only friends
would realize its true content. In particular, if the important data is hidden inside
of an image then everyone but your friends would view it as a picture. At the
same time your friends could still retrieve the true information. This technique is
often called data hiding or stenography and you will be implementing the
technique in the class project.
-Protection of Digital Media.
-Privacy of Information Transmitted across the world wide web.

11
[Steganography]

2.
Literature Survey
12
[Steganography]

2.1 Literature Survey

1)Anderson, R., & Petitcolas, F. A. (1998). On the limits of steganography. IEEE


Journal of Selected Areas in Communications, 16(4), 474-481.
2)Fridrich, J. (2009). Steganography in digital media: Principles, algorithms, and
applications. Cambridge University Press.
3)Singh, A. K., & Verma, M. (2011). Steganography: A review of information
hiding. International Journal of Computer Applications, 28(12), 44-50.
4)Zollner, M., & Westfeld, A. (2002). Attacks on steganographic systems
breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-tools and
some lessons learned. Proceedings of SPIE, 4675, 305-316.
5)Alattar, A. M. (2004). Reversible watermark using the difference expansion of
a generalized integer transform. IEEE Transactions on Image Processing, 13(8),
1147-1156.
6)Saini, M., & Saini, R. K. (2012). A comprehensive review of image
steganography. International Journal of Advanced Research in Computer Science
and Software Engineering, 2(4), 89-95.
7)DeCann, B., & Forcinito, N. (2005). Steganography and steganalysis: Different
approaches. International Journal of Digital Evidence, 4(1), 1-14.
8)Crandall, R., & Lewis, J. P. (2003). Secure steganographic schemes for palette-
based images. Journal of Electronic Imaging, 12(2), 264-276.
9)Barni, M., & Bartolini, F. (2005). Watermarking for multimedia security:
Recent advances and prospects. IEEE Transactions on Circuits and Systems for
Video Technology, 15(9), 1113-1128.
10)Mielikainen, J. (2006). LSB matching revisited. IEEE Signal Processing
Letters, 13(5), 285-287.

These references provide a comprehensive overview of various aspects of


steganography, including techniques, security, and applications.

13
[Steganography]

3.
Details of design/
Technology/Analytical and
Experimental Work
14
[Steganography]

3.1 Details of Design


The design of a steganography system involves various components and
techniques for concealing information within a cover medium while maintaining
the cover's appearance and integrity. Below are some key details regarding the
design of steganography:
Cover Medium Selection: The first step in designing a steganographic system is
to choose an appropriate cover medium. This medium can be an image, audio file,
video, text document, or any digital data type. The selection depends on the nature
of the information to be concealed and the desired level of invisibility.
Embedding Technique: There are different techniques for embedding data within
the chosen cover medium. Common methods include LSB (Least Significant Bit)
replacement, transformation in the frequency domain (e.g., discrete cosine
transform), and spread spectrum methods. The choice of technique impacts the
capacity, security, and perceptibility of the hidden data.
Stego-Key: Many steganographic systems use a stego-key, which is a secret
parameter or key used during the embedding and extraction process. The stego-
key helps determine how the data is hidden and how it can be retrieved. Security
often relies on the secrecy of this key.
Data Compression: In some cases, data compression techniques are used to make
the embedded information more compact, allowing it to fit within the cover
medium without significant alterations that could raise suspicion.
Capacity vs. Security Trade-off: Designers must consider the trade-off between
the amount of data that can be hidden (capacity) and the security of the
steganographic system. Higher capacity can make the hidden data more
vulnerable to detection, while overly secure methods may limit the amount of
data that can be concealed.
Steganalysis Countermeasures: To enhance the security of steganographic
systems, designers often implement countermeasures against steganalysis. These
countermeasures aim to thwart efforts to detect the presence of hidden data.
Fidelity and Perceptibility: An essential aspect of steganography design is
maintaining the fidelity and perceptibility of the cover medium. If the alterations
made during the embedding process are noticeable, the steganography system
may be ineffective.

15
[Steganography]

Embedding Rate: The embedding rate indicates how much data can be concealed
within the cover medium. Designers must consider the trade-off between
embedding rate and the likelihood of detection.
Key Management: Proper key management is crucial for maintaining the security
of steganographic systems. This involves generating, storing, and exchanging
keys securely.
Application-Specific Considerations: The design of a steganography system can
vary depending on its intended application. For instance, a system used for secure
communications may have different requirements compared to a system used for
watermarking or digital rights management.
Testing and Evaluation: The designed steganographic system should undergo
rigorous testing and evaluation to assess its performance in terms of security and
capacity. This often involves using steganalysis tools to test the system's
resilience to detection.
Ethical and Legal Considerations: Designers should also consider the ethical and
legal aspects of steganography, especially when it comes to the potential misuse
of such systems.
Overall, the design of steganography systems is a complex process that requires
a deep understanding of various techniques and trade-offs. Security, capacity, and
the perceptibility of alterations in the cover medium are key factors in the design
and implementation of steganography.

16
[Steganography]

3.2 Architecture Diagram

Fig-1

Fig-2

The architecture of a steganography system can vary depending on the specific


application and the techniques employed. However, a typical steganography

17
[Steganography]

system consists of several key components. Here's an overview of the architecture


of a steganography system:
Cover Medium (Carrier): This is the digital data, such as an image, audio file,
video, or text document, in which the secret information will be concealed. The
cover medium serves as the vessel for hiding the data.
Embedding Process: This component is responsible for embedding the secret
information into the cover medium. The embedding process utilizes various
techniques and algorithms to make subtle changes to the cover medium, such as
altering pixel values in an image or modifying the frequency components in
audio.
Secret Message (Data to be Hidden): This is the information that the user wants
to conceal within the cover medium. It can be any type of data, such as text, files,
or other digital content.
Stego-Key: A stego-key is often used to control the embedding process. It's a
secret parameter or key that determines how the data is hidden and how it can be
extracted. The security of the steganography system often depends on the secrecy
of this key.
Data Compression (Optional): In some cases, data compression techniques are
employed to reduce the size of the secret message. This allows more data to be
hidden within the cover medium without making noticeable alterations.
Steganography Software/Tool: Steganography software or tools are used to
facilitate the embedding and extraction processes. These tools provide a user-
friendly interface for selecting cover media, setting embedding parameters, and
generating stego-images or stego-files.
Extraction Process: This component is responsible for extracting the hidden data
from the stego-medium. It employs the stego-key and reverse techniques to reveal
the secret information while leaving the cover medium intact.
Steganalysis Countermeasures (Optional): To enhance the security of
steganography systems, designers may implement countermeasures against
steganalysis. These countermeasures aim to thwart efforts to detect the presence
of hidden data, such as statistical analysis, watermark detection, or noise analysis.
Key Management: Proper key management is essential to maintain the security
of the steganography system. This involves the generation, secure storage, and
exchange of keys between authorized parties.

18
[Steganography]

Fidelity and Perceptibility Evaluation: After the extraction process, the system
may undergo an evaluation to assess the fidelity and perceptibility of the cover
medium. Alterations made during embedding should be imperceptible to the
human senses.
Application-Specific Components: Depending on the application, there may be
additional components. For example, a steganography system used for secure
communication may have encryption features, while a system used for
watermarking might include authentication mechanisms.
Testing and Evaluation Tools: To ensure the steganography system's
effectiveness and security, designers often use testing and evaluation tools. These
tools can help determine how well the system resists steganalysis and whether it
meets the specified requirements.
The architecture of a steganography system is adaptable to the specific needs of
its application. Whether it's used for secure communication, copyright protection,
or digital forensics, the core components mentioned above are typically present
in varying configurations and with different algorithms to achieve the desired
results.

3.2.1 Algorithm
Here's a high-level algorithm for text-based steganography using a simple LSB
(Least Significant Bit) technique. This algorithm outlines the steps for embedding
a text message into an image and extracting it later.
Embedding Algorithm:
1)Input:
Cover image (in which the message will be hidden)
Text message to be hidden
2)Convert Text to Binary:
Convert each character in the text message to its binary representation. For
example, "A" becomes "01000001."
3)Check Message Size:

19
[Steganography]

Ensure that the binary representation of the text message can fit into the cover
image without causing noticeable alterations. If the message is too large for the
image, consider compression or resizing.
4)Embedding Loop:
A)For each binary digit in the message (starting from the first):
a)Traverse the cover image pixel by pixel, row by row.
b)For each pixel, modify the least significant bit (LSB) of the color channels
(usually Red, Green, and Blue for RGB images) with the corresponding bit from
the binary message.
5)Output:
Save the stego-image (the modified cover image) with the hidden message.
Extraction Algorithm:
1)Input:
Stego-image (the image with the hidden message)
2)Extraction Loop:
Traverse the stego-image pixel by pixel, row by row.
For each pixel, extract the LSB of the color channels (R, G, B).
Append these LSBs to a buffer to reconstruct the binary message.
3)Convert Binary to Text:
Reconstruct the binary message and convert it back to text by grouping every 8
bits into a character.
4)Output:
Return the extracted text message.

It's important to note that this is a simplified algorithm for educational purposes.
In real-world steganography applications, additional techniques, such as
encryption, error correction, and more advanced embedding methods, are often
used to enhance security and resistance to steganalysis. The specific
implementation may also vary depending on the steganography tool or software
being use.

20
[Steganography]

3.2.2 Future Scope


Steganography, though is still a fairly new idea. There are constant
advancementsin the computer field, suggesting advancements in the field of
steganography as well. It is likely that there will soon be more efficient and more
advanced techniques for Steganal- ysis. A hopeful advancement is the improved
sensitivity to small messages. Knowing how difficult it is to detect the presence
of a fairly large text file within animage, imagine how difficult it is to detect even
one or two sentences embedded inan image! It is like finding a microscopic
needle in the ultimate haystack. What isscary is that such a small file of only one
or two sentences may be all that is neededto commence a terrorist attack. In the
future, it is hoped that the technique ofSteganalysis will advance such that it will
become much easier to detect even smallmessages within an image. The
following section describe areas for research which were offshootsof, or
tangential to,our main objectives.
1. Detecting Steganography in Image Files:
Can steganography be detected in images files? This is difficult question. It
maybe possible to detect a simple Steganographic technique by simple analyzing
the lowonder bits of the image bytes. If the Steganographic algorithm is more
complex, however, and spreads the embedded data over the image is random way
or encryptsthe data before embedding, it may be nearly impossible to detect.
2.Steganography in printed media:
If the data is embedded in an image, the image printed, then scanned and stored
ina file can the embedded data be recovered? This would require a special form
of a steganography to which could allow for inaccuracies in the printing and
scanning equipment.
3. Steganography on the World Wide Web:
The world wide web(www) makes extensive use of inline images. There are
literal- lymillions of images on various web pages worldwide. an application to
serve as a web browser to retrieve data embedded in web pageimages. This stego-
web could operate on top of the existing WWW and be a meansof covertly
disseminating information.

21
[Steganography]

4.
Conclusion
22
[Steganography]

4.1 Conclusion

It is observed that through LSB Substitution Steganographic method, the


headresultsob- tained in data hiding are pretty impressive as it utilizes the simple
fact that anyimage could be broken up to individual bit-planes each consisting of
different levelsof in- formation. It is to be noted that as discussed earlier, this
method is only ef-fective for bitmap images as these involve lossless compression
techniques. But thisprocess can also be extended to be used for color images
where, bitplane slicing is tobe done individually for the top four bit-planes for
each of R, G, B of the messageimage.
1. A simple image hiding scheme has been introduced.
2. The affection o the image compression procedure can be avoided.
3. The improved scheme obtains more benefits from the smooth cover image
than the non-smooth cover image.

23
[Steganography]

5.
References
24
[Steganography]

5.1 References

1)Fridrich, J. (2009). "Steganography in Digital Media: Principles, Algorithms,


and Applications." [ISBN: 978-0521513522]
2)Anderson, R., & Petitcolas, F. (1998). "On the Limits of Steganography." IEEE
Journal of Selected Areas in Communications, 16(4), 474-481.
3)Katzenbeisser, S., & Petitcolas, F. A. (Eds.) (2000). "Information Hiding
Techniques for Steganography and Digital Watermarking." [ISBN: 978-
1598290752]
4)Delp, E. J., & Avcibas, I. (2002). "Image Watermarking and Steganography."
IEEE Signal Processing Magazine, 19(3), 34-46.
5)Westfeld, A., & Pfitzmann, A. (1999). "Attacks on Steganographic Systems."
Proceedings of Information Hiding, 61-76.
6)Provos, N., Honeyman, P., & McDonald, D. (2001). "Hide and Seek: An
Introduction to Steganography." IEEE Security & Privacy, 99-101.
7)Johnson, N. F., & Jajodia, S. (1998). "Steganalysis of Images Created Using
Current Steganography Software." Proceedings of Information Hiding, 273-289.
8)Zhang, X., Wang, S., Liu, Y., & Tang, Z. (2014). "Survey of Steganography in
Digital Media." Journal of Visual Communication and Image Representation,
25(5), 1373-1391.
9)Chandramouli, R., & Memon, N. (2001). "Analysis of LSB Based Image
Steganography Techniques." Proceedings of the Information Hiding Workshop,
47-60.
10)Hossain, M. S., & Muhammad, G. (2015). "A Survey of Digital Watermarking
and Steganography Techniques for Multimedia Protection." Journal of Network
and Computer Applications, 60, 38-56.

25

You might also like