SlideShare a Scribd company logo
1 of 26
CONTENTS………
Introduction
Steganography
Types of Steganography
Image Steganography
 LSB Algorithm
 Steganography is an art of hiding information inside
information.
 The main objective of Steganography is mainly
concerned with the protection of contents of the
hidden information.
 Images are ideal for information hiding because of
the large amount of redundant space is created in
the storing of images.
Introduction Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
 Steganography literally means
“covered writing”
Definition:
It is an art and science of hiding information by
embedding it in some other data.
Goals:
To hide a secret message within an object.
Do it such a way that the presence of message is
not visible.
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
Steganography
Introduction
Steganography
Image
Steganography
Dual layer security
•LSB algorithm
Types of
Steganography
An example of a message containing such a null
cipher is German Spy in World War II:
“Apparently neutral's protest is
thoroughly discounted
And ignored. Isman hard hit.
Blockade issue affects
Pretext for embargo on by products,
ejecting suets and Vegetable oils. ”
Taking the second letter in each word the
following message emerges:
Pershing sails from NY June 1.
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
General diagram of steganography
STEGANOGRAPHY Vs CRYPTOGRAPHY
 Cryptography hides the contents of a secret
message from a malicious people, whereas
steganography even conceal the existence of the
message.
 In cryptography, the system is broken when the
attacker can read the secret message.
 Breaking a steganography system need the
attacker to detect that steganography has been
used.
Introduction
Steganography
Image
Steganography
•LSB algorith
Types of
Steganography
 Most attractive multimedia objects are
Text steganography
Image steganography
Audio steganography
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Types of steganography
 Image steganography: Images are used as the message
carriers.Images are the most popular cover objects used for
steganography.
 Textual steganography: Text steganography can be
achieved by altering the text formatting, or by altering
certain characteristics of textual elements (e.g.,
characters).
 Audio steganography: In audio steganography, secret
message is embedded into digitized audio signal which
result slight altering of binary sequence of the
corresponding audio file.
Introduction
Steganography
Image
Steganography
•LSB algorith
Types of
Steganography
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
IMAGE STEGANOGRAPHY
Image Steganography requires following elements
to carry out the work:
 Cover medium: It is an image that holds secret
message.
 The Secret message: it is message to be
transmitted. It can be plain or encrypted text,
images or any other data.
 The Stego-key: it is key used to hide the
message (May or may not be used).
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
IMAGE STEGANOGRAPHY CONTIUED….
The image compression techniques are extensively
used in Steganography.
Two type of compression techniques are
 Lossy compression.
 Lossless compression.
 In Image steganography lossless compression is
generally used.
 The lossy compression may not maintain the
original images integrity. But lossless
compression maintains the data exactly.
 The compression on lossless image has no effect
on original image.
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
IMAGE STEGANOGRAPHY CONTIUED….
TECHNIQUES FOR USING IMAGE
STEGANOGRAPHY
By using LSB(Least Significant Bit algorithm)
Masking and Filtering
Algorithms and Transformation
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
The LSB algorithm
 The most common and popular method of
modern day steganography is to make use of LSB
of picture’s pixel information.
 This technique works best when the file is longer
than the message file and if image is grayscale.
 When applying LSB techniques to each byte of a
24 bit image,three bits can be encoded into each
pixel.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
 If the LSB of the pixel value of cover image C(i,j) is
equal to the message bit SM of secret massage to be
embedded, C(i,j) remain unchanged; if not, set the
LSB of C(i, j) to SM.
message embedding Procedure is given below:
S(i,j) = C(i,j) - 1, if LSB(C(i,j)) = 1 and SM = 0
S(i,j) = C(i,j) + 1, if LSB(C(i,j)) = 0 and SM = 1
S(I,j) = C(i,j), if LSB(C(i,j)) = SM
Where LSB(C(i, j)) stands for the LSB of cover image
C(i,j) and “SM” is the next message bit to be
embedded. S(i,j) is the stego image.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorith
Types of
Steganography
Data Embedding Algorithm
Step 1: Extract the pixels of the cover image.
Step 2: Extract the characters of the text le.
Step 3: Extract the characters from the Stego key.
Step 4: Choose first pixel and pick characters of
the Stego key and place it in first component of
pixel.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Data Embedding Algorithm
Step 5: Place some terminating symbol to indicate
end of the key. 0 has been used as a terminating
symbol in this algorithm.
Step 6: Insert characters of text le in each rst
component of next pixels by replacing it.
Step 7: Repeat step 6 till all the characters has been
embedded.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Data Extraction Algorithm
Step 1: Extract the pixels of the stego image.
Step 2: Now, start from first pixel and extract stego
key characters from first component of the
pixels. Follow Step3 up to terminating symbol,
otherwise follow step 4.
Step 4: If this extracted key matches with the key
entered by the receiver, then follow Step 5,
otherwise terminate the program.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Data Extraction Algorithm
Step 5: If the key is correct, then go to next pixels
and extract secret message characters from first
component of next pixels. Follow Step 5 till up to
terminating symbol, otherwise follow step 6.
Step 6: Extract secret message.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
 Example:
We can use images to hide things if we replace
the last bit of every color’s byte with a bit from
the message.
Message A-01000001
Image with 3 pixels
Pixel 1: 11111000 11001001 00000011
Pixel 2: 11111000 11001001 00000011
Pixel 3: 11111000 11001001 00000011
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
Now we hide our message in the image.
Message: 01000001
Pixel 1: 11111000 11001001 00000010
Pixel 2: 11111000 11001000 00000010
Pixel 3: 11111000 11001001 00000011
New image:
Introduction
Steganography
Image
Steganography
•LSB algorithm
Types of
Steganography
CONCLUSION
 Hiding a message with steganography methods reduces
the chance of a message being detected.
 In and of itself, steganography is not a good solution to
secrecy, but neither is simple substitution and short block
permutation for encryption. But if these methods are
combined, you have much stronger encryption routines.
 Like any tool, steganography is neither inherently good
nor evil, it is the manner in which it is used which will
determine whether it is a benefit or a detriment to our
society.
Introduction
Steganographic
layer
Image
Steganography
•LSB algorithm
Types of
Steganography
REFERENCES
 Implementation of LSB Steganography and its Evaluation for Various
File Formats. Int. J. Advanced Networking and Applications 868
 Introduction to image Steganography youtube video.
 Cryptography and network security by William Stallings 3rd edition.
Image Steganography using LSB
Image Steganography using LSB

More Related Content

What's hot

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 

What's hot (20)

AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography in imagesSteganography in images
Steganography in images
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 

Similar to Image Steganography using LSB

Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-SteganographySagar Kumar
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx9905234521
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based SteganpgraphyOmkar Rane
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis zaidsalfawzan
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
Stenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptxStenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptxRobertCarreonBula
 

Similar to Image Steganography using LSB (20)

Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Steganography.pptx
Steganography.pptxSteganography.pptx
Steganography.pptx
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Report
ReportReport
Report
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
K0815660
K0815660K0815660
K0815660
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Stenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptxStenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptx
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Image Steganography using LSB

  • 1.
  • 3.  Steganography is an art of hiding information inside information.  The main objective of Steganography is mainly concerned with the protection of contents of the hidden information.  Images are ideal for information hiding because of the large amount of redundant space is created in the storing of images. Introduction Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 4.  Steganography literally means “covered writing” Definition: It is an art and science of hiding information by embedding it in some other data. Goals: To hide a secret message within an object. Do it such a way that the presence of message is not visible. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography Steganography
  • 5. Introduction Steganography Image Steganography Dual layer security •LSB algorithm Types of Steganography An example of a message containing such a null cipher is German Spy in World War II: “Apparently neutral's protest is thoroughly discounted And ignored. Isman hard hit. Blockade issue affects Pretext for embargo on by products, ejecting suets and Vegetable oils. ” Taking the second letter in each word the following message emerges: Pershing sails from NY June 1.
  • 7. STEGANOGRAPHY Vs CRYPTOGRAPHY  Cryptography hides the contents of a secret message from a malicious people, whereas steganography even conceal the existence of the message.  In cryptography, the system is broken when the attacker can read the secret message.  Breaking a steganography system need the attacker to detect that steganography has been used. Introduction Steganography Image Steganography •LSB algorith Types of Steganography
  • 8.  Most attractive multimedia objects are Text steganography Image steganography Audio steganography Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography Types of steganography
  • 9.  Image steganography: Images are used as the message carriers.Images are the most popular cover objects used for steganography.  Textual steganography: Text steganography can be achieved by altering the text formatting, or by altering certain characteristics of textual elements (e.g., characters).  Audio steganography: In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. Introduction Steganography Image Steganography •LSB algorith Types of Steganography
  • 11. Image Steganography requires following elements to carry out the work:  Cover medium: It is an image that holds secret message.  The Secret message: it is message to be transmitted. It can be plain or encrypted text, images or any other data.  The Stego-key: it is key used to hide the message (May or may not be used). Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 12. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography IMAGE STEGANOGRAPHY CONTIUED…. The image compression techniques are extensively used in Steganography. Two type of compression techniques are  Lossy compression.  Lossless compression.
  • 13.  In Image steganography lossless compression is generally used.  The lossy compression may not maintain the original images integrity. But lossless compression maintains the data exactly.  The compression on lossless image has no effect on original image. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography IMAGE STEGANOGRAPHY CONTIUED….
  • 14. TECHNIQUES FOR USING IMAGE STEGANOGRAPHY By using LSB(Least Significant Bit algorithm) Masking and Filtering Algorithms and Transformation Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 15. The LSB algorithm  The most common and popular method of modern day steganography is to make use of LSB of picture’s pixel information.  This technique works best when the file is longer than the message file and if image is grayscale.  When applying LSB techniques to each byte of a 24 bit image,three bits can be encoded into each pixel. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 16.  If the LSB of the pixel value of cover image C(i,j) is equal to the message bit SM of secret massage to be embedded, C(i,j) remain unchanged; if not, set the LSB of C(i, j) to SM. message embedding Procedure is given below: S(i,j) = C(i,j) - 1, if LSB(C(i,j)) = 1 and SM = 0 S(i,j) = C(i,j) + 1, if LSB(C(i,j)) = 0 and SM = 1 S(I,j) = C(i,j), if LSB(C(i,j)) = SM Where LSB(C(i, j)) stands for the LSB of cover image C(i,j) and “SM” is the next message bit to be embedded. S(i,j) is the stego image. Introduction Steganographic layer Image Steganography •LSB algorith Types of Steganography
  • 17. Data Embedding Algorithm Step 1: Extract the pixels of the cover image. Step 2: Extract the characters of the text le. Step 3: Extract the characters from the Stego key. Step 4: Choose first pixel and pick characters of the Stego key and place it in first component of pixel. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 18. Data Embedding Algorithm Step 5: Place some terminating symbol to indicate end of the key. 0 has been used as a terminating symbol in this algorithm. Step 6: Insert characters of text le in each rst component of next pixels by replacing it. Step 7: Repeat step 6 till all the characters has been embedded. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 19. Data Extraction Algorithm Step 1: Extract the pixels of the stego image. Step 2: Now, start from first pixel and extract stego key characters from first component of the pixels. Follow Step3 up to terminating symbol, otherwise follow step 4. Step 4: If this extracted key matches with the key entered by the receiver, then follow Step 5, otherwise terminate the program. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 20. Data Extraction Algorithm Step 5: If the key is correct, then go to next pixels and extract secret message characters from first component of next pixels. Follow Step 5 till up to terminating symbol, otherwise follow step 6. Step 6: Extract secret message. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 21.  Example: We can use images to hide things if we replace the last bit of every color’s byte with a bit from the message. Message A-01000001 Image with 3 pixels Pixel 1: 11111000 11001001 00000011 Pixel 2: 11111000 11001001 00000011 Pixel 3: 11111000 11001001 00000011 Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 22. Now we hide our message in the image. Message: 01000001 Pixel 1: 11111000 11001001 00000010 Pixel 2: 11111000 11001000 00000010 Pixel 3: 11111000 11001001 00000011 New image: Introduction Steganography Image Steganography •LSB algorithm Types of Steganography
  • 23. CONCLUSION  Hiding a message with steganography methods reduces the chance of a message being detected.  In and of itself, steganography is not a good solution to secrecy, but neither is simple substitution and short block permutation for encryption. But if these methods are combined, you have much stronger encryption routines.  Like any tool, steganography is neither inherently good nor evil, it is the manner in which it is used which will determine whether it is a benefit or a detriment to our society. Introduction Steganographic layer Image Steganography •LSB algorithm Types of Steganography
  • 24. REFERENCES  Implementation of LSB Steganography and its Evaluation for Various File Formats. Int. J. Advanced Networking and Applications 868  Introduction to image Steganography youtube video.  Cryptography and network security by William Stallings 3rd edition.

Editor's Notes

  1. Types of steganography.