SlideShare a Scribd company logo
1 of 37
Guided by,
Dr. Jyoti Pareek
Department of Computer Science
Rollwala Computer Center
Gujarat University
Ahmedabad

Hushen Savani (24)
Vikas Kantiya (10)
MCA-V
What is Steganography?
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Framework
Categories
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Steganography is the
art and science of writing
hidden messages in such a
way that no one, apart from
the sender and intended
recipient, suspects the
existence of the message.
Steganography Framework
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Framework
Categories
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics
Categories of Steganography
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Framework
Categories
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics
What is Image Steganography?
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Image Steganography is the technique
of hiding the data within the image in such a
way that prevents the unintended user from
the detection of the hidden messages or
data.
For example,

Cover Image

Data / Message

Stego Image
Applications of Image Steganography
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Secure Private Files and

Documents.
Hide Passwords and Encryption
Keys.
Transport Highly Private
Documents between International
Governments.
Transmit message/data without
revealing the existence of available
message.
Image Domain
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

What Images are made up of?:Images are made up of lots of little dots called
pixels. Each pixel is represented as 3 bytes –
one for Red, one for Green and one for Blue.
Red
Blue
11111000 11001001 00000011
248

201

3

Each byte is interpreted as an integer
number, which is how much of that color is
number
used to make the final color of the pixel.
248 + 201 + 3 = Orange Color
Image Domain
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

The difference between two colors

that differ by one bit in either one red,
green or blue value is impossible
detect for a human eye.
eye
So we can change the least significant
(last) bit in a byte, we either add or
subtract one or more values from the
value it represents.
This means we can overwrite the last
bit in a byte without affecting the
colors it appears to be.
Image Domain
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

A common approach of
hiding data within an image file
is Least Significant Bit (LSB)
Substitution.
Substitution
In this method, we can take
the binary representation of
the hidden data and overwrite
the LSB of each byte within the
cover image.
Least Significant Bit Substitution
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Suppose we have the following binary
representation for the Cover Image.
10010101 00001101
10010110 00001111

Suppose we want to "hide" the following 4 bits of
data: 1011,
we get the following,
10010101 00001101
10010110 00001111

Where the each data bits are accommodated in
the least significant bits of each byte of the image.
Least Significant Bit Substitution
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Least Significant Bit Substitution

results in a very minor distortion of
the image which is very much
negligible for the human eyes.

Cover Image

Stego Image
Substitution Levels
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

4-bits

5-bits

6-bits

7-bits
Pixel Indicator
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This method uses the least two

significant bits of one of the
channels to indicate existence of
data in the other two channels.
channels
Pixel Indicator
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Example,
R

G

B

Initial Pixel Bytes: 10101101 11011010 11100101
Data to be Embedded: 1101
Channel R: 10101111
Channel G: 11011001
Channel B: 11100111
Indicating Channel

Pixel Indicator Bits

Channels in
which Data is
Embedded
Stego Color Cycle
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

The SCC technique uses the

RGB images to hide the data
in different channels.
It keeps cycling the hidden
data between the Red,
Green and Blue channels,
utilizing one channel at a
cycle time.
Triple-A
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Triple-A technique uses the same principle

of LSB, where the secret is hidden in the
least significant bits of the pixels, with
more randomization in selection of the
number of bits used and the color
channels that are used.
• Two Seeds:
• To determine the used channels
• To determine the number of bits used
This randomization is expected to increase
the security of the system.
Max-bit
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This method measures the intensity of

the pixel and then hides data by
random pixel selection with a goal to
hide maximum data in each pixel.

This method is divided into three

parts:

Encryption
Image Intensity Calculation
Steganography.
Max-bit
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Original Image
Max-bit
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Grayscale Image
* All Black colored pixels are considered as Intense pixels.

Intense Pixels*
Statistics
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Triple-A

SCC

Max-bit

Bits/pixel

3.428

3

6.281

Capacity
Ratio

3.43/24 =>
14.28%

3/24 =>
12.5%

6.28/24 =>
26.1%
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Optimal Pixel adjustment

Procedure (OPAP) reduces the
distortion caused by the LSB
substitution method.
 In OPAP method the pixel value
is adjusted after the hiding of the
secret data.
This done to improve the quality
of the stego image without
disturbing the data hidden.
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

First a few least significant bits are substituted

with the data to be hidden.

Then in the pixel, the bits before the hidden

bits are adjusted suitably if necessary to give
less error.

Let n LSBs be substituted in each pixel.
Let d= decimal value of the pixel after the

substitution.
d1 = decimal value of last n bits of the pixel.
d2 = decimal value of n bits hidden in that
pixel.
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

If(d1~d2)<=(2^n)/2
then no adjustment is made
in that pixel.
Else
If(d1<d2)
d = d – 2^n .
If(d1>d2)
d = d + 2^n .

Where,
d is converted to binary and
written back to pixel
Optimum Pixel Adjustment Procedure
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Retrieval Process of Data:
Data
The retrieval follows

the extraction of the
least significant
bits(LSB) as hiding is
done using simple LSB
substitution.
Inverted Pattern
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This inverted pattern (IP) LSB

substitution approach uses the idea of
processing secret messages prior to
embedding.
In this method each section of secret
images is determined to be inverted or
not inverted before it is embedded.
In addition, the bits which are used to
record the transformation are treated
as secret keys or extra data to be reembedded.
Inverted Pattern
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

 The embedded string is S, the replaced string is R,

and the embedded bit string to divided to P parts.
 Let us consider n-bit LSB substitution to be made.
Then S and R are of n-bits length.
For P part in i = 1 to P
If MSE(Si,Ri) ≤ MSE(S’i,Ri)
Choose Si for embedding
Mark key(i) as logic ‘0’
If MSE(Si,Ri) ≥ MSE( S‘i,Ri)
Choose S‘ i for embedding
Mark key(i) as logic ‘1’
End For

Where,
MSE = Mean Squared Error
S is the data to be hidden
S‘ is the data to be hidden in inverted form.
Inverted Pattern
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Retrieval Process of Data:
Data
The stego-image and the key file are

required at the retrieval side.
First corresponding numbers of LSB
bits are retrieved from the stego-image.
If the key is ‘0’, then the retrieved bits
are kept as such.
Else if the key is ‘1’, then the bits are
inverted.
The bits retrieved in this manner from
every pixel of the stego-image gives the
data hidden.
IP Method Using Relative Entropy
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Relative entropy measures the

information discrepancy between
two different sources with an
optimal threshold obtained by
minimizing relative entropy.
In this method, instead of finding
the mean square error for inverted
pattern approach, the relative
entropy is calculated to decide
whether S or S‘ suites the pixel.
IP Method Using Relative Entropy
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Divide the cover image into P blocks of

same size, the embedding string is S,
and the replaced string is R.
For P part in i =1 to P
If rel.entropy(Si,Ri) ≤ rel.entropy (S‘i,Ri)
Choose Si for embedding
Mark key(i) as logic ‘0’
If rel.entropy (Si,Ri) ≥ rel.entropy (S‘i,Ri)
Choose S‘i for embedding
Mark key(i) as logic ‘1’
End For

Where,
S is the data to be hidden
S‘ is the data to be hidden in inverted form.
Decision Factors
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

 Peak Signal to Noise Ratio (PSNR): The PSNR is calculated using the equation,

 where Imax is the intensity value of each pixel which is

equal to 255 for 8 bit gray scale images.

 Mean Square Error (MSE): The MSE is calculated using the equation,

 where M and N denote the total number of pixels in

the horizontal and the vertical dimensions of the image
Xi, j represents the pixels in the original image and Yi,
j, represents the pixels of the stego image.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Pixel Value Differencing (PVD) is able to

provide a high quality stego image in
spite of the high capacity of the concealed
information.
That is, the number of insertion bits is
dependent on whether the pixel is an
edge area or smooth area.
In edge area the difference between the
adjacent pixels is more, whereas in
smooth area it is less.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Smooth Area

Edge Area

• While human perception is less sensitive to subtle

changes in edge areas of a pixel, it is more
sensitive to changes in the smooth areas.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

This method hides the data in the

target pixel by finding the
characteristics of four pixels
surrounding it, indicated in the table
below:
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Select the maximum and the minimum

values(g) among the three pixel values that
have already finished the embedding process.
Consider upper pixel (g1), left pixel (g2) and
the upper left pixel (g3) in a given target pixel
g(x,y)
Calculate d using following:
d= [max (g1, g2, g3) – min (g1, g2, g3)]
 Using d , we get an idea as to whether the

target pixel is included in an edge area or in
smooth area.
Pixel Value Differencing
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

Calculation of n: the number

of the insertion bits in a target
pixel Px,y is calculated, using
the following formula:
Statistics
•
•
•
•
•
•
•
•
•
•
•
•
•
•

•

Steganography
Categories
Framework
Image Steganography
Applications
Image Domain
-- Methods -LSB
PI
SCC
Triple-A
Max-bit
•
Statistics
OPAP
Inverted Pattern
•
MSE based
•
Entropy based
PVD
•
Statistics

OPAP

IP

PVD

Size of secret
data

25 kb

24.5 kb

22 kb

Image Size

242 kb

242 kb

242kb

MSE

0.1503

0.2635

12.4715

PSNR

56.71

51.86

37.87

Time (s)

7.65

7.96

8.6
Image Steganography

More Related Content

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Steganography
Steganography Steganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
SteganographySteganography
Steganography
 

Similar to Image Steganography

Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Muqeed Hussain
 
2019 cvpr paper_overview
2019 cvpr paper_overview2019 cvpr paper_overview
2019 cvpr paper_overviewLEE HOSEONG
 
2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong Lee2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong LeeMoazzem Hossain
 
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by MadhuAN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by MadhuMadhu Rock
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyAly Arman
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis zaidsalfawzan
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learningpratik pratyay
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Camera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IICamera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IIYu Huang
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingStuart Hinchliff
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingStuart Hinchliff
 
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892Vadim Purinson
 
Deep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite ImageryDeep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite Imageryrlewis48
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...eSAT Publishing House
 

Similar to Image Steganography (20)

Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
 
2019 cvpr paper_overview
2019 cvpr paper_overview2019 cvpr paper_overview
2019 cvpr paper_overview
 
2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong Lee2019 cvpr paper overview by Ho Seong Lee
2019 cvpr paper overview by Ho Seong Lee
 
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by MadhuAN INTEGRATED APPROACH TO CONTENT BASED IMAGERETRIEVAL by Madhu
AN INTEGRATED APPROACH TO CONTENT BASED IMAGE RETRIEVAL by Madhu
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
slide-171212080528.pptx
slide-171212080528.pptxslide-171212080528.pptx
slide-171212080528.pptx
 
Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis Stegnaogarphy and stegnalysis
Stegnaogarphy and stegnalysis
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
OpenCV.pdf
OpenCV.pdfOpenCV.pdf
OpenCV.pdf
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Camera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning IICamera-Based Road Lane Detection by Deep Learning II
Camera-Based Road Lane Detection by Deep Learning II
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
 
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imagingRapid phenotyping of prawn biochemical attributes using hyperspectral imaging
Rapid phenotyping of prawn biochemical attributes using hyperspectral imaging
 
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
 
Deep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite ImageryDeep Learning Applications to Satellite Imagery
Deep Learning Applications to Satellite Imagery
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...A secure method for hiding secret data on cubism image using hybrid feature d...
A secure method for hiding secret data on cubism image using hybrid feature d...
 

Recently uploaded

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Image Steganography