SlideShare a Scribd company logo
Real time application in Digital
Signal Processing
Topic: Image based steganography
Group members:
Nikhil Patil-17
Omkar Rane-18
Chaitanya Deshpande-19
Kaustubh Wankhade-31
What is steganography?
➢ Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or
video. The word steganography combines the Greek words steganos , meaning "covered, concealed, or protected",
and graphein meaning "writing".
➢ The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on
cryptography and steganography.
➢ As the name suggests, Image Steganography refers to the process of hiding data within an image file. The image
selected for this purpose is called the cover-image and the image obtained after steganography is called the stego-
image.
➢ Steganography is the method of hiding secret data inside any form of digital media. The main idea behind
steganography is to hide the existence of a data in any medium like audio, video, image etc. When we talk about
image steganography, the idea is quite simple. Images are made up of pixels which usually refer to the color of that
particular pixel. In a greyscale (black and white) image, these pixel values range from 0-255, 0 being black and 255
being white.
HOW IT IS DONE?
➢ An image is represented as an N*M (in case of greyscale images) or N*M*3 (in case of colour images) matrix
in memory, with each entry representing the intensity value of a pixel.
➢ In image steganography, a message is embedded into an image by altering the values of some pixels, which are
chosen by an encryption algorithm.
➢ The recipient of the image must be aware of the same algorithm in order to known which pixels he or she must
select to extract the message.
ALGORITHM FOR LSB BASED DATA
EMBEDDING
1) Convert the image to greyscale
2) Resize the image if needed
3) Convert the message to its binary format
4) Initialize output image same as input image
5) Traverse through each pixel of the image and do the following:
▪ Convert the pixel value to binary
▪ Get the next bit of the message to be embedded
▪ Create a variable temp
▪ If the message bit and the LSB of the pixel are same, set temp = 0
▪ If the message bit and the LSB of the pixel are different, set temp = 1
▪ This setting of temp can be done by taking XOR of message bit and the LSB of the pixel
▪ Update the pixel of output image to input image pixel value + temp
▪Keep updating the output image till all the bits in the message are embedded
▪Finally, write the input as well as the output image to local system.
TEXT EXTRACTION FROM LSB BASED
STEGANOGRAPHY
Extraction Process:
The extraction process is simple. We need to first calculate how many pixels is the text stored in. For example,
the text “Kaustubhs Dog” has 13 characters. Each character is represented in 8 bits. So, the number of pixels in
which the text is stored will be 13 * 8 = 104. Now after knowing this, we need to traverse through the image, one
pixel at a time. We store the Least Significant Bit (LSB) of each pixel in an array extracted_bits. After extracting
the LSBs of the required pixels, we need to take every 8 bits from extracted_bits and convert it to the
corresponding character. In this way, the text stored in the stego image can be extracted.
In this article, we take the pixel values of the image obtained in the prerequisite article. The values are stored
in xlsx format. The message embedded in the image is “Kaustubhs Dog”.
OUTPUT
data.jpg stegoimage.jpg
output_img.xls
Image Based Steganpgraphy
Image Based Steganpgraphy
ADVANTAGES & DISADVANTAGES
Advantages:
•This method is very fast and easy to implement in comparison to other methods of image
Steganography.
•The output image has very slight difference to the input image.
•Instead of embedding the message in only the LSB, we can embed the message in last two LSBs,
thus embedding even large messages.
•This method forms the basics of many other complex algorithms
•Instead of embedding the message in only the LSB, we can embed the message in last two LSBs,
thus embedding even large messages.
Disadvantages:
•This type of encoding the data is weak since it can be easily decoded by taking the LSBs of the
image and getting the message in binary format.
•This is method is too old because it was used long ago when other encoding methods were not yet
developed.
•When embedding the message in more than one LSB, the image quality may reduce depending on
how many pixels are changed.
APPLICATIONS OF STEGANOGRAPHY
1)Cyber Forensics.
2)Intelligence Services.
3) Copyright and to avoid piracy of intellectual rights.
4)Secure Highly confidential files and data.
5)Protect original Data from alteration from unknown
sources.
REFERENCES
1] https://www.geeksforgeeks.org/lsb-based-image-steganography-using-matlab/
2] https://in.mathworks.com/matlabcentral/answers/65679-image-steganography-using-lsb
3] https://en.wikipedia.org/wiki/Steganography
4] https://www.youtube.com/watch?v=VBKtCCsqAtM
5] https://github.com/qrzbing/LSB-Steganography
THANK YOU

More Related Content

PPTX
Steganography and its techniques
PPTX
Image steganography
PPTX
Steganography in images
PPTX
Image Steganography using LSB
PDF
Steganography
PPT
Steganography
PPTX
Steganography
PPTX
Steganography
Steganography and its techniques
Image steganography
Steganography in images
Image Steganography using LSB
Steganography
Steganography
Steganography
Steganography

What's hot (20)

PPTX
Steganography Project
PPTX
Steganography
PPTX
Image Steganography
PPT
Steganography
PPT
Steganography - The art of hiding data
PPT
Steganography presentation
PPT
Stegnography
PPTX
PPT steganography
PPT
Segmentation
PPTX
Steganography
PPTX
Steganography
PPTX
SEMINAR ON staganography
PPT
Data Redundacy
PDF
Presentation On Steganography
PPTX
Steganography
PPTX
Steganography in images
PPTX
Multimedia_image recognition steps
PPTX
steganography
PDF
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Steganography Project
Steganography
Image Steganography
Steganography
Steganography - The art of hiding data
Steganography presentation
Stegnography
PPT steganography
Segmentation
Steganography
Steganography
SEMINAR ON staganography
Data Redundacy
Presentation On Steganography
Steganography
Steganography in images
Multimedia_image recognition steps
steganography
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Ad

Similar to Image Based Steganpgraphy (20)

PDF
Image Steganography using MATLAB
PPTX
Steganography with RSA Algorithm
PDF
Steganoid - A tool for steganography
PDF
Secure Image Hiding Algorithm using Cryptography and Steganography
PDF
Using SBR Algorithm To Hide The Data Into The JPEG Image
PPTX
Video Stegnography
PDF
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
An LSB Method Of Image Steganographic Techniques
PDF
An Infallible Method to Transfer Confidential Data using Delta Steganography
PDF
Steganography using visual cryptography
PPTX
BLIND RECOVERY OF DATA
PDF
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
PPTX
Steganography by Satyajit Debnath
PPTX
Stegnography
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
PPTX
Rsa cryptography &steganography
PDF
Cecimg an ste cryptographic approach for data security in image
PDF
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
Image Steganography using MATLAB
Steganography with RSA Algorithm
Steganoid - A tool for steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
Using SBR Algorithm To Hide The Data Into The JPEG Image
Video Stegnography
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
International Journal of Computational Engineering Research(IJCER)
An LSB Method Of Image Steganographic Techniques
An Infallible Method to Transfer Confidential Data using Delta Steganography
Steganography using visual cryptography
BLIND RECOVERY OF DATA
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
Steganography by Satyajit Debnath
Stegnography
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Rsa cryptography &steganography
Cecimg an ste cryptographic approach for data security in image
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
Ad

More from Omkar Rane (20)

PDF
Enabling SSL Elasticsearch on server
PDF
Anti lock braking (ABS) Model based Design in MATLAB-Simulink
PPTX
Autosar fundamental
PPTX
Stress Management
PPTX
Bootloaders (U-Boot)
PPTX
Concept of Diversity & Fading (wireless communication)
PPTX
Tata Motors GDC .LTD Internship
PDF
Machine Learning Model for M.S admissions
PDF
Timer 0 programming on LPC 1768
PDF
ADC (Analog to Digital conversion) using LPC 1768
PDF
PWM based motor speed control using LPC 1768
PDF
UART interfacing on LPC1768 (Cortex M3 micro controller)
PDF
LED Blinking logic on LPC1768
PDF
CAN interfacing on LPC1768 (ARM Cortex M3 based Micro controller)
PPTX
Vlisi Course project presentation:Keypad Scanner
PDF
VlSI course project report : Keypad Scanner
PPTX
LPC 1768 A study on Real Time clock features
PDF
Nexys4ddr rm FPGA board Datasheet
PDF
Linear Regression (Machine Learning)
DOCX
transmission gate based design for 2:1 Multiplexer in micro-wind
Enabling SSL Elasticsearch on server
Anti lock braking (ABS) Model based Design in MATLAB-Simulink
Autosar fundamental
Stress Management
Bootloaders (U-Boot)
Concept of Diversity & Fading (wireless communication)
Tata Motors GDC .LTD Internship
Machine Learning Model for M.S admissions
Timer 0 programming on LPC 1768
ADC (Analog to Digital conversion) using LPC 1768
PWM based motor speed control using LPC 1768
UART interfacing on LPC1768 (Cortex M3 micro controller)
LED Blinking logic on LPC1768
CAN interfacing on LPC1768 (ARM Cortex M3 based Micro controller)
Vlisi Course project presentation:Keypad Scanner
VlSI course project report : Keypad Scanner
LPC 1768 A study on Real Time clock features
Nexys4ddr rm FPGA board Datasheet
Linear Regression (Machine Learning)
transmission gate based design for 2:1 Multiplexer in micro-wind

Recently uploaded (20)

PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
DOCX
573137875-Attendance-Management-System-original
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Artificial Intelligence
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Well-logging-methods_new................
PPTX
Construction Project Organization Group 2.pptx
PDF
PPT on Performance Review to get promotions
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Foundation to blockchain - A guide to Blockchain Tech
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
573137875-Attendance-Management-System-original
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Fundamentals of Mechanical Engineering.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Sustainable Sites - Green Building Construction
Artificial Intelligence
R24 SURVEYING LAB MANUAL for civil enggi
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Well-logging-methods_new................
Construction Project Organization Group 2.pptx
PPT on Performance Review to get promotions
Categorization of Factors Affecting Classification Algorithms Selection
Mechanical Engineering MATERIALS Selection
Foundation to blockchain - A guide to Blockchain Tech

Image Based Steganpgraphy

  • 1. Real time application in Digital Signal Processing Topic: Image based steganography Group members: Nikhil Patil-17 Omkar Rane-18 Chaitanya Deshpande-19 Kaustubh Wankhade-31
  • 2. What is steganography? ➢ Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos , meaning "covered, concealed, or protected", and graphein meaning "writing". ➢ The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography. ➢ As the name suggests, Image Steganography refers to the process of hiding data within an image file. The image selected for this purpose is called the cover-image and the image obtained after steganography is called the stego- image. ➢ Steganography is the method of hiding secret data inside any form of digital media. The main idea behind steganography is to hide the existence of a data in any medium like audio, video, image etc. When we talk about image steganography, the idea is quite simple. Images are made up of pixels which usually refer to the color of that particular pixel. In a greyscale (black and white) image, these pixel values range from 0-255, 0 being black and 255 being white.
  • 3. HOW IT IS DONE? ➢ An image is represented as an N*M (in case of greyscale images) or N*M*3 (in case of colour images) matrix in memory, with each entry representing the intensity value of a pixel. ➢ In image steganography, a message is embedded into an image by altering the values of some pixels, which are chosen by an encryption algorithm. ➢ The recipient of the image must be aware of the same algorithm in order to known which pixels he or she must select to extract the message.
  • 4. ALGORITHM FOR LSB BASED DATA EMBEDDING 1) Convert the image to greyscale 2) Resize the image if needed 3) Convert the message to its binary format 4) Initialize output image same as input image 5) Traverse through each pixel of the image and do the following: ▪ Convert the pixel value to binary ▪ Get the next bit of the message to be embedded ▪ Create a variable temp ▪ If the message bit and the LSB of the pixel are same, set temp = 0 ▪ If the message bit and the LSB of the pixel are different, set temp = 1 ▪ This setting of temp can be done by taking XOR of message bit and the LSB of the pixel ▪ Update the pixel of output image to input image pixel value + temp ▪Keep updating the output image till all the bits in the message are embedded ▪Finally, write the input as well as the output image to local system.
  • 5. TEXT EXTRACTION FROM LSB BASED STEGANOGRAPHY Extraction Process: The extraction process is simple. We need to first calculate how many pixels is the text stored in. For example, the text “Kaustubhs Dog” has 13 characters. Each character is represented in 8 bits. So, the number of pixels in which the text is stored will be 13 * 8 = 104. Now after knowing this, we need to traverse through the image, one pixel at a time. We store the Least Significant Bit (LSB) of each pixel in an array extracted_bits. After extracting the LSBs of the required pixels, we need to take every 8 bits from extracted_bits and convert it to the corresponding character. In this way, the text stored in the stego image can be extracted. In this article, we take the pixel values of the image obtained in the prerequisite article. The values are stored in xlsx format. The message embedded in the image is “Kaustubhs Dog”.
  • 9. ADVANTAGES & DISADVANTAGES Advantages: •This method is very fast and easy to implement in comparison to other methods of image Steganography. •The output image has very slight difference to the input image. •Instead of embedding the message in only the LSB, we can embed the message in last two LSBs, thus embedding even large messages. •This method forms the basics of many other complex algorithms •Instead of embedding the message in only the LSB, we can embed the message in last two LSBs, thus embedding even large messages. Disadvantages: •This type of encoding the data is weak since it can be easily decoded by taking the LSBs of the image and getting the message in binary format. •This is method is too old because it was used long ago when other encoding methods were not yet developed. •When embedding the message in more than one LSB, the image quality may reduce depending on how many pixels are changed.
  • 10. APPLICATIONS OF STEGANOGRAPHY 1)Cyber Forensics. 2)Intelligence Services. 3) Copyright and to avoid piracy of intellectual rights. 4)Secure Highly confidential files and data. 5)Protect original Data from alteration from unknown sources.
  • 11. REFERENCES 1] https://www.geeksforgeeks.org/lsb-based-image-steganography-using-matlab/ 2] https://in.mathworks.com/matlabcentral/answers/65679-image-steganography-using-lsb 3] https://en.wikipedia.org/wiki/Steganography 4] https://www.youtube.com/watch?v=VBKtCCsqAtM 5] https://github.com/qrzbing/LSB-Steganography