Beruflich Dokumente
Kultur Dokumente
Abstract This project discusses a simple and secure II. LITERATURE SURVEY
steganographic system involves reversible texture synthesis and
presents a design and implementation of weaving a the texture Literature survey is the most significant step in software
synthesis process into steganography to conceal the secret improvement process. Before developing the tool it is
message. Texture synthesis is the method of building a large
necessary to define the time factor economy and company
digital image from a small digital sample image by taking
advantage of its structural content. A typical steganographic power. Once these things are satisfied, then the next step is
application includes covert communication between two parties to define which operating system and semantic can be used
whose presence is anonymous to a probable attacker and whose for developing the tool. Once the programmers start
success depends on detecting the existence of this building the tool the programmer wanta lot of external
communication. We implement how to secure the support. This support can be achieved from senior
communication over the medium. We can implement patch based programmers, from book or from websites. Before
algorithm that may conceal source texture image and embeds constructing the system the above thoughts are taken into
secret message through the process of texture synthesis. account for developing the proposed system. IN
PAPER[1]A.E.Mustafa et al., presents a new Steganography
Keywords- Steganography, stego image, Secret key, Texture
Synthesis, Reversible texture Synthesis
technique based on the spatial domain for encoding
additional information in an picture by making small
I. INTRODUCTION alterations to its pixels. The proposed technique
concentrations on one specific popular technique, Least
A steganography can be defined as the art and science of Significant Bit (LSB) Embedding. In place of using the
indistinguishable communication. The word steganography LSB-1 of the cover for embedding the message, LSB-2 has
derives from the Greek steganos, implication covered or been used to increase the robustness. In paper [2] M.Zamani
secret, and graphy, implication writing or drawing. et al.,examines the opportunity of usage of Genetic
Therefore, steganography literally means that covered Algorithms (GA) for data hiding in digital images. Two
writing. Information and communication technology has spatial domain data hiding approaches are planned where
grown rapidly. Internet is the most general communication GA is used distinctly for (i) improvement in discovery and
standard nowadays. But message transmission over the (ii) optimum imperceptibility of secreted data in digital
internet is facing some difficulties such as files security, pictures respectively. In paper [3]G.S.Sarvanthi et al.,
copyright control etc. So we need secret communication discussed a new technique of information hiding in digital
methods. Steganography place an important role in picture in spatial domain. In this technique we use Plane Bit
information security. The origin of steganography is traced Substitution Method (PBSM) technique in which
back to ancient civilization. The oldenEgyptians Communication bits are embedded into the pixel value(s) of
communicated covertly using the hieroglyphic language, a an image.In paper [4] E.Levina et al., presents a
sequence of symbols representative a message. The message nonparametric algorithm for bootstrapping a stationary
appearances as if it is a sketch of a picture although it may unplanned ground and shows certain consistency
hold a hidden message. possessions of the algorithm for the case of mixing
unplanned grounds. In paper [5] Michael F.Cohen et al.,
discusses the usage of Wang Tiles for picture and texture
generation as initially accessible and creating large regions
of nonperiodic texture, point circulations or geometry can
be professionally done at runtime by assembling a tiling of
the plane using a minor set of Wang tiles. The technique
contains filling a minor set of Wang Tiles with texture,
Poisson point deliveries or geometry and non-periodically
roofing the horizontal to stochastically produce a continuous
Fig 1:Steganographic Technique representation.In paper [6] Hirofumi Otori et al., suggests a
new kind of image coding technique using texture image We have now to produce an index table and
synthesis. The textured code delivers the conservative bar composition image, and have pasted basis patches straight
code with an aesthetic demand and is used for tagging data into the workbench. We will embed our secret message
onto actual texture things, which can form a basis for through the message oriented texture synthesis to produce
abundant mobile data communications. the final stego synthetic.
REFERENCES