SlideShare a Scribd company logo
4
Most read
8
Most read
13
Most read
VISVESV
ARAYATECHNOLOGICALUNIVERSITY
BELAGAVI, KARNATAKA-570014
PROJECT PHASE 1:
“MULTI IMAGE STEGANOGRAPHY”
BHARATH M N
CHANNAKESHAVA B L
SAGAR B K
THARUN J M
4GK20CS005
4GK20CS010
4GK20CS027
4GK20CS038
UNDER THE GUIDANCE OF
Dr. NAVEEN T H
ASSISTANT PROFESSOR
DEPT OF COMPUTER SCIENCE &
ENGG, K K GECK
K R PETE KRISHNA GOVERNMENT ENGINEERING COLLEGE
Department of Computer Science and Engineering
HEAD OF THE DEPARTMENT
Dr.HAREESH K
ASSOCIATE PROFESSOR & HOD
DEPT OF COMPUTER SCIENCE
& ENGG, K K GECK
CONTENTS:
• Introduction
• Problem Statement
• Background work
• Approach
• Model Architecture
• Image Processing
• Aim Of The Project
• Literature survey
• Conclusion
• Reference
INTRODUCTION:
• The focus of this introduction is on the steganography of images, a widely explored domain within
the broader field of information security.
• Image steganography aims to embed secret information within image files in such a way that the
alteration is imperceptible to the human eye and difficult to detect through conventional means.
• The objective of steganography in multiple images is to distribute the payload of hidden information
across a collection of images, thus leveraging the combined capacity of the ensemble.
• This approach not only increases the overall data hiding capacity but also introduces a level of
redundancy and resilience.
EXISTING SYSTEM:
1. LSB Substitution: This method involves replacing the least significant bits of pixel values with
secret data bits. As the changes are minimal, they are often imperceptible to the human eye.
2. Spread Spectrum: It disperses the secret data across the entire image by slightly modifying the
pixel values in a way that doesn’t draw attention but allows for data retrieval.
3. Transform Domain Techniques: Using mathematical transformations like Discrete Cosine
Transform (DCT) or Discrete Fourier Transform (DFT) to embed data in the frequency domain.
This method is commonly used in JPEG steganography
4. Random LSB Embedding: Similar to LSB substitution, but instead of using a fixed pattern, it
embeds data in a randomized manner to make it harder to detect.
LITERATURE SURVEY:
NAME YEAR TECHNIQUES
Chin-Ling Chen 29 Jan 2022
Improved image quality
In steganography
Shumeet Baluja 2020
Single image
steganography using
Deep neural network
Felix Kreuk 2019
Deep neural network for
Speech steganography
Gutub and
shaarani
2020
Efficient Implementation of
image Secret Hiding Based on
LSB and DWT Steganography
Comparisons
LITERATURE SURVEY:
NAME YEAR TECHNIQUES
YC HU 2006 Multiple images
embedding scheme based
on moment preserving
block truncation codinG
ARUN KUMAR
RAVICHANDRAN K.S
2019 RIWT and QR factorization
based hybrid robust image
steganography using block
selection algorithm for IoT
devices
PROBLEM STATEMENT:
• We aim to hide multiple images (2 or more) in one not-so-secret cover
image.
• The embedded secret images must be retrievable with minimum loss.
• The encoded cover image must look like the original cover image.
Background Work:
Approach :
• Extend single image steganography to multi image steganography by combining
from both the papers.
• Extend the idea by creating multiple prep network for separate images in the
encoder and joining them with the cover image.
• Using multiple reveal networks or multiple decoders to retrieve separate secrete
messages from the container or encoded images.
• In this Project Tiny ImageNet Dataset is used.
Model Architecture
IMAGE PROCESSING
• Embedding Techniques:
Spatial Domain Techniques: Image pixels are directly manipulated to embed the secret information.
Common techniques include Least Significant Bit (LSB) substitution, where the least significant bit of each
pixel is replaced with the secret data.
Transform Domain Techniques: Embedding is performed in a transformed version of the image, often
using techniques like discrete cosine transform (DCT) or discrete wavelet transform (DWT).
• Payload Distribution Across Multiple Images:
The secret information is distributed across multiple images in a way that collectively maximizes the data-
hiding capacity. This may involve assigning different portions of the payload to different images within the
ensemble.
IMAGE PROCESSING
• Synchronization and Coherence:
Ensuring that the embedded information remains coherent and synchronized across the multiple images is crucial. Image
processing techniques are employed to manage the distribution of payload, maintaining a balance between data hiding
capacity and the visual quality of each image.
• Encryption and Security Measures:
Image processing may involve incorporating encryption techniques to enhance the security of the embedded information.
Encryption ensures that even if an unauthorized entity detects the presence of hidden data, deciphering its meaning
remains a formidable challenge
• Robustness Against Attacks:
Image processing techniques are implemented to enhance the robustness of the steganographic system against various
attacks. This includes resisting attempts to remove or alter the hidden information, as well as withstanding common image
processing operations that might be applied by attackers.
AIMS OF THE PROJECT :
• Increased Data Capacity
• Enhanced Security
• Improved Robustness
• Redundancy and Error Recovery
• Resistance to Steganalysis Tools
• Flexibility And Scalability
• Preservation of Visual Quality
• Adaptability to Diverse Environments
CONCLUSION:
• Image steganography serves as an effective method for securing sensitive information by
embedding it within the visual content of images. This covert communication allows for the
exchange of data without attracting unwanted attention.
• A fundamental aspect of image steganography is its emphasis on imperceptibility. Successful
steganographic techniques ensure that the visual integrity of the carrier image is maintained,
making it challenging for observers to detect the presence of hidden data with the naked eye.
• Image steganography finds applications across various domains, including secure
communication, data protection, digital watermarking, and copyright protection. Its versatility
makes it a valuable tool in different scenarios where the concealment of information is crucial.
REFERENCE:
• Baluja S. 2019: Hiding images within images. IEEE Transactions on Pattern Analysis
and Machine Intelligence 42(7):1685-169
• Elzeki OM, Elfattah MA, Salem H, Hassanien AE, Shams M. 2021: A novel
perceptual two layer image fusion using deep learning for imbalanced COVID-19
dataset. PeerJ Computer Science 7:e364
• Hu YC. 2006: Multiple images embedding scheme based on moment preserving
block truncation coding. Fundamenta Informaticae 73(3):373-387
• Hwang HJ, Kim S, Kim HJ. 2016: Reversible data hiding using least square predictor
via the LASSO. EURASIP Journal on Image and Video Processing 2016(1):42
REFERENCE:
• Al-Shaarani F, Gutub (2021)a: Increasing participants using counting-based secret sharing via
involving matrices and practical steganography. Arabian Journal for Science and
Engineering In Press
• Al-Shaarani F, Gutub(2021)b: Securing matrix counting-based secret-sharing involving crypto
steganography. Journal of King Saud University-Computer and Information Sciences In Press
• Arunkumar S, Subramaniyaswamy V, Ravichandran KS, Logesh R. 2019a: RIWT and QR
factorization based hybrid robust image steganography using block selection algorithm for
IoT devices. Journal of Intelligent & Fuzzy Systems 35(5):4265-4276
• Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R. 2019b. SVD-
based robust image steganographic scheme using RIWT and DCT for secure transmission of
medical images. Measurement 139:426-437
THANK
YOU

More Related Content

PDF
IMAGE STEGANOGRAPHY USING CNN
DOCX
Image encryption using aes key expansion
PDF
Image Steganography With Encryption
PDF
Image Steganography With Encryption
PDF
Batch 21 - Final project review -PPT.pdf
PPTX
mini project on some random bs lmao dont
PPTX
research review committe review paper for discussion
PPTX
research review committee review status new
IMAGE STEGANOGRAPHY USING CNN
Image encryption using aes key expansion
Image Steganography With Encryption
Image Steganography With Encryption
Batch 21 - Final project review -PPT.pdf
mini project on some random bs lmao dont
research review committe review paper for discussion
research review committee review status new

Similar to cse final year project of image encryption (20)

PDF
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
PPTX
Miniproject steganography.pptx
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
PDF
F1803063236
PDF
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
PDF
ELEVATING FILE SECURITY THROUGH ADVANCES MULTIPLE
PDF
ELEVATING FILE SECURITY THROUGH ADVANCES MULTIPLE IMAGE STEGANOGRAPHY
PDF
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
PDF
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
PDF
A coverless image steganography based on robust image wavelet hashing
PDF
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
PDF
Iaetsd design of image steganography using haar dwt
PDF
Unified Approach With Neural Network for Authentication, Security and Compres...
PDF
Review On Encrypting and Decrypting Message Via Image Slicing
PDF
MESSAGE TRANSFER USING STEGANOGRAPHY
PDF
encryption based lsb steganography technique for digital images and text data
PPTX
PVD BASED STEGNO.
PPTX
Visual cryptography for hybrid approach
PDF
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
Miniproject steganography.pptx
Survey on Different Image Encryption Techniques with Tabular Form
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
F1803063236
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
ELEVATING FILE SECURITY THROUGH ADVANCES MULTIPLE
ELEVATING FILE SECURITY THROUGH ADVANCES MULTIPLE IMAGE STEGANOGRAPHY
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
A coverless image steganography based on robust image wavelet hashing
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
Iaetsd design of image steganography using haar dwt
Unified Approach With Neural Network for Authentication, Security and Compres...
Review On Encrypting and Decrypting Message Via Image Slicing
MESSAGE TRANSFER USING STEGANOGRAPHY
encryption based lsb steganography technique for digital images and text data
PVD BASED STEGNO.
Visual cryptography for hybrid approach
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Ad

Recently uploaded (20)

PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
additive manufacturing of ss316l using mig welding
DOCX
573137875-Attendance-Management-System-original
PPTX
Construction Project Organization Group 2.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Mechanical Engineering MATERIALS Selection
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
Safety Seminar civil to be ensured for safe working.
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
R24 SURVEYING LAB MANUAL for civil enggi
additive manufacturing of ss316l using mig welding
573137875-Attendance-Management-System-original
Construction Project Organization Group 2.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Operating System & Kernel Study Guide-1 - converted.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
UNIT 4 Total Quality Management .pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Model Code of Practice - Construction Work - 21102022 .pdf
Mechanical Engineering MATERIALS Selection
Ad

cse final year project of image encryption

  • 1. VISVESV ARAYATECHNOLOGICALUNIVERSITY BELAGAVI, KARNATAKA-570014 PROJECT PHASE 1: “MULTI IMAGE STEGANOGRAPHY” BHARATH M N CHANNAKESHAVA B L SAGAR B K THARUN J M 4GK20CS005 4GK20CS010 4GK20CS027 4GK20CS038 UNDER THE GUIDANCE OF Dr. NAVEEN T H ASSISTANT PROFESSOR DEPT OF COMPUTER SCIENCE & ENGG, K K GECK K R PETE KRISHNA GOVERNMENT ENGINEERING COLLEGE Department of Computer Science and Engineering HEAD OF THE DEPARTMENT Dr.HAREESH K ASSOCIATE PROFESSOR & HOD DEPT OF COMPUTER SCIENCE & ENGG, K K GECK
  • 2. CONTENTS: • Introduction • Problem Statement • Background work • Approach • Model Architecture • Image Processing • Aim Of The Project • Literature survey • Conclusion • Reference
  • 3. INTRODUCTION: • The focus of this introduction is on the steganography of images, a widely explored domain within the broader field of information security. • Image steganography aims to embed secret information within image files in such a way that the alteration is imperceptible to the human eye and difficult to detect through conventional means. • The objective of steganography in multiple images is to distribute the payload of hidden information across a collection of images, thus leveraging the combined capacity of the ensemble. • This approach not only increases the overall data hiding capacity but also introduces a level of redundancy and resilience.
  • 4. EXISTING SYSTEM: 1. LSB Substitution: This method involves replacing the least significant bits of pixel values with secret data bits. As the changes are minimal, they are often imperceptible to the human eye. 2. Spread Spectrum: It disperses the secret data across the entire image by slightly modifying the pixel values in a way that doesn’t draw attention but allows for data retrieval. 3. Transform Domain Techniques: Using mathematical transformations like Discrete Cosine Transform (DCT) or Discrete Fourier Transform (DFT) to embed data in the frequency domain. This method is commonly used in JPEG steganography 4. Random LSB Embedding: Similar to LSB substitution, but instead of using a fixed pattern, it embeds data in a randomized manner to make it harder to detect.
  • 5. LITERATURE SURVEY: NAME YEAR TECHNIQUES Chin-Ling Chen 29 Jan 2022 Improved image quality In steganography Shumeet Baluja 2020 Single image steganography using Deep neural network Felix Kreuk 2019 Deep neural network for Speech steganography Gutub and shaarani 2020 Efficient Implementation of image Secret Hiding Based on LSB and DWT Steganography Comparisons
  • 6. LITERATURE SURVEY: NAME YEAR TECHNIQUES YC HU 2006 Multiple images embedding scheme based on moment preserving block truncation codinG ARUN KUMAR RAVICHANDRAN K.S 2019 RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices
  • 7. PROBLEM STATEMENT: • We aim to hide multiple images (2 or more) in one not-so-secret cover image. • The embedded secret images must be retrievable with minimum loss. • The encoded cover image must look like the original cover image.
  • 9. Approach : • Extend single image steganography to multi image steganography by combining from both the papers. • Extend the idea by creating multiple prep network for separate images in the encoder and joining them with the cover image. • Using multiple reveal networks or multiple decoders to retrieve separate secrete messages from the container or encoded images. • In this Project Tiny ImageNet Dataset is used.
  • 11. IMAGE PROCESSING • Embedding Techniques: Spatial Domain Techniques: Image pixels are directly manipulated to embed the secret information. Common techniques include Least Significant Bit (LSB) substitution, where the least significant bit of each pixel is replaced with the secret data. Transform Domain Techniques: Embedding is performed in a transformed version of the image, often using techniques like discrete cosine transform (DCT) or discrete wavelet transform (DWT). • Payload Distribution Across Multiple Images: The secret information is distributed across multiple images in a way that collectively maximizes the data- hiding capacity. This may involve assigning different portions of the payload to different images within the ensemble.
  • 12. IMAGE PROCESSING • Synchronization and Coherence: Ensuring that the embedded information remains coherent and synchronized across the multiple images is crucial. Image processing techniques are employed to manage the distribution of payload, maintaining a balance between data hiding capacity and the visual quality of each image. • Encryption and Security Measures: Image processing may involve incorporating encryption techniques to enhance the security of the embedded information. Encryption ensures that even if an unauthorized entity detects the presence of hidden data, deciphering its meaning remains a formidable challenge • Robustness Against Attacks: Image processing techniques are implemented to enhance the robustness of the steganographic system against various attacks. This includes resisting attempts to remove or alter the hidden information, as well as withstanding common image processing operations that might be applied by attackers.
  • 13. AIMS OF THE PROJECT : • Increased Data Capacity • Enhanced Security • Improved Robustness • Redundancy and Error Recovery • Resistance to Steganalysis Tools • Flexibility And Scalability • Preservation of Visual Quality • Adaptability to Diverse Environments
  • 14. CONCLUSION: • Image steganography serves as an effective method for securing sensitive information by embedding it within the visual content of images. This covert communication allows for the exchange of data without attracting unwanted attention. • A fundamental aspect of image steganography is its emphasis on imperceptibility. Successful steganographic techniques ensure that the visual integrity of the carrier image is maintained, making it challenging for observers to detect the presence of hidden data with the naked eye. • Image steganography finds applications across various domains, including secure communication, data protection, digital watermarking, and copyright protection. Its versatility makes it a valuable tool in different scenarios where the concealment of information is crucial.
  • 15. REFERENCE: • Baluja S. 2019: Hiding images within images. IEEE Transactions on Pattern Analysis and Machine Intelligence 42(7):1685-169 • Elzeki OM, Elfattah MA, Salem H, Hassanien AE, Shams M. 2021: A novel perceptual two layer image fusion using deep learning for imbalanced COVID-19 dataset. PeerJ Computer Science 7:e364 • Hu YC. 2006: Multiple images embedding scheme based on moment preserving block truncation coding. Fundamenta Informaticae 73(3):373-387 • Hwang HJ, Kim S, Kim HJ. 2016: Reversible data hiding using least square predictor via the LASSO. EURASIP Journal on Image and Video Processing 2016(1):42
  • 16. REFERENCE: • Al-Shaarani F, Gutub (2021)a: Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arabian Journal for Science and Engineering In Press • Al-Shaarani F, Gutub(2021)b: Securing matrix counting-based secret-sharing involving crypto steganography. Journal of King Saud University-Computer and Information Sciences In Press • Arunkumar S, Subramaniyaswamy V, Ravichandran KS, Logesh R. 2019a: RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices. Journal of Intelligent & Fuzzy Systems 35(5):4265-4276 • Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R. 2019b. SVD- based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426-437