You are on page 1of 20

Project Guide : Mr. M.

Suman

Team Members :

K. Sai Pranitha (07FE1A0419)


T. Ushasri (07FE1A0423)
M.V.R. Amaralingeswara Rao (08FE5A0417)
V. Kanaka Rao (08FE5A0418)

VIGNAN’S LARA INSTITUTE OF


TECHNOLOGY AND SCIENCE, VADLAMUDI
Image Based Steganography Using
LSB Insertion Technique
 Steganography
from the Greek word
◦ ‘steganos’ meaning “covered”
◦ ‘graphie’ meaning “writing”

 Steganography is the process of hiding of a secret


message within an ordinary message and
extracting it at its destination
 It includes numerous secret communication
methods that conceal the message’s very
existence.
 Anyone else viewing the message will fail to
know it contains hidden/encrypted data
Image Based Steganography Using
LSB Insertion Technique
 Apparently neutral’s protest is thoroughly
discounted and ignored. Isman hard hit.
Blockade issue affects pretext for embargo on
by-products, ejecting suets and vegetable oils.
 A message sent by a German spy in World WarII

Pershing sails from NY June 1

Image Based Steganography Using


LSB Insertion Technique
Pershing Sails from NY June 1

Rot 13

Crefuvat fnvyf sebz AL Whar 1

Image Based Steganography Using


LSB Insertion Technique
Cover - object

Stego
Message Stego -
System
Object
Encoder

Stego - key

Image Based Steganography Using


LSB Insertion Technique
Message File Message File

Cover File

Steganography Tool Steganography Tool

Steg File Steg File


(with hidden data) (with hidden data)

Hiding Images Extracting Images

Image Based Steganography Using


LSB Insertion Technique
 bmp
 jpeg
 gif
 wav
 mp3
 Amongst others…

Image Based Steganography Using


LSB Insertion Technique
Image Based Steganography Using
LSB Insertion Technique
Image Based Steganography Using
LSB Insertion Technique
 Common hiding techniques

◦ Appended to a file

◦ Hidden in the unused header portion of the file


near the beginning of the file contents

◦ An algorithm is used to disperse the hidden


message throughout the file
 Modification of LSB (Least Significant Bit)
 Other

Image Based Steganography Using


LSB Insertion Technique
 Messages are encoded in the least significant bit
of every byte in an image. By doing so, the value
of each pixel is changed slightly, but not
enough to make significant visual changes to
the image, even when compared to the original.
 Example: Inserting the word “bomb” using LSB techniques:

◦ b = 01100010
◦ o = 01101111
◦ m = 01101101
◦ b = 01100010
 Image bits:

Image Based Steganography Using


LSB Insertion Technique
 Enhancing the least significant bits alerts
investigators of possible embedding of
hidden data.
bliss.bmp

No Steganography
Detected

bliss_stego.bmp

Image Based Steganography Using


}} Steganography
Detected

LSB Insertion Technique


 Methods of detecting the use of Steganography

◦ Visual Detection (JPEG, BMP, GIF, etc.)

◦ Audible Detection (WAV, MPEG, etc.)

◦ Statistical Detection (changes in patterns of the pixels


or LSB – Least Significant Bit) or Histogram Analysis

◦ Structural Detection - View file properties/contents


 size difference
 date/time difference
 contents – modifications
 checksum

Image Based Steganography Using


LSB Insertion Technique
 Detecting Steganography by viewing it.
Original Image Steganograph Image

Image Based Steganography Using


LSB Insertion Technique
 Simplicity to embed the bits of message
directly into the LSB plane of cover
image.

 High perceptual transparency of LSB.

 Does not change the size of the file

Image Based Steganography Using


LSB Insertion Technique
 If the picture with hidden info is converted to
another format, then the hidden data ma be
lost

 If the message size is greater than cover


image size, then the bandwidth required to
transmit stego-image decreases

Image Based Steganography Using


LSB Insertion Technique
 Digital watermarking.

 Used in colour lasers to track the


originating printer.

 Confidential communication and secret


data storing

 Media database systems

Image Based Steganography Using


LSB Insertion Technique
1. www.ims.nus.edu.sg/Programs/imgsci/files/memon/sing_stego.pdf

2. www.ece.stevens-tech.edu/~mouli/lsbsteg.pdf

3. Chandramouli, R.;   Memon, N, Analysis of LSB based image steganography


techniques, Image Processing, 2001. Proceedings., Thessaloniki , Greece.

4. T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in


HS Venter, JHP Eloff, L Labuschagne and MM Eloff (eds), Proceedings of the
Fifth Annual Information Security South Africa Conference
(ISSA2005), Sandton, South Africa, June/July 2005 (Published electronically)

5. Kesslet, Gary C. An Overview of Steganography for the Computer


Forensics Examiner, Burlington, 2004.
6. en.wikipedia.org/wiki/Steganography

Image Based Steganography Using


LSB Insertion Technique
Image Based Steganography Using
LSB Insertion Technique
Image Based Steganography Using
LSB Insertion Technique

You might also like