Sie sind auf Seite 1von 4


(Steganography using mid position value technique)

Synopsis of
Term Paper - I

Submitted in partial fulfillment of the requirement for the degree of

Master of Technology
Under the Supervision of


Submitted By

Roll No: 00116405319

University School of Information, Communication & Technology

Guru Gobind Singh Indraprastha University
New Delhi 110078
August 2019
(Mid position value technique)

Steganography is the process of hiding a secret message within a larger one in such
a way that someone cannot know the presence or contents of the hidden message.
The purpose of Steganography is to maintain secret communication between two

Introduction –
Steganography is the technique of hiding secret data within an ordinary, non-secret,
file or message in order to avoid detection; the secret data is then extracted at its
destination. The use of steganography can be combined with encryption as an extra
step for hiding or protecting data.
Steganography can be used to conceal almost any type of digital content, including
text, image, video or audio content; the data to be hidden can be hidden inside almost
any other type of digital content. The content to be concealed through steganography
-- called hidden text -- is often encrypted before being incorporated into the
innocuous-seeming cover text file or data stream. If not encrypted, the hidden text is
commonly processed in some way in order to increase the difficulty of detecting the
secret content.

Aim and Objectives –

The Aim of Steganography is primarily concentrated on the data security issues
when sending the data over the network using steganographic techniques. The
requirement of the steganography system is that the hider message carried by stego-
media should not be sensible to human beings and to avoid drawing suspicion to the
existence of a hidden message.

Literature Review -
The stego-image quality has been improved by using bit-inversion technique. The
Advanced Encryption Standard (AES), also referred as Rijndael algorithm, is an
effective cryptographic methodology widely engagement to protect integrated
message. The design principle involved in AES is referred as substitution
permutation connecting. The AES hidden is an iterative process, with varying data
sizes (128, 192, and 256 bits). A performance analysis survey on different
methodologies like Data Encryption Standard (DES), AES, RSA combining with
LSB substitution methodology which serves well to draw conclusions on the three
hidden methodologies based on their performances in any effort. It has been
concluded from their work that AES hidden is better than other methodologies as it
accounts for less hidden, extraction times and also uses less buffer space.
Methodology –
There are currently three effective methods in applying Image Steganography in
spatial domain:

LSB (Least Significant Bit) Substitution is the process of modifying the least
significant bit of the pixels of the carrier image.
Blocking works by breaking up an image into “blocks” and using Discrete Cosine
Transforms (DCT). Each block is broken into 64 DCT coefficients that approximate
luminance and color—the values of which are modified for hiding messages.
Palette Modification replaces the unused colors within an image’s color palette
with colors that represent the hidden message

Framework for the proposed methodology

Schedule Plan –
1st Sept to 7th Sept: Introduction of tools

8th Sept till 1st Progress:

1st Progress to 2nd


2nd Progress to final

Conclusion –
In the past few years, Steganography has become an interested field of data hiding
techniques. As it becomes more widely used in computing, there are issues that need
to be resolved. There are a wide variety of different techniques with their own
advantages and disadvantages. Many currently used techniques are not robust
enough to prevent detection and removal of embedded data. With continuous
advancements in technology it is expected that in the near future more efficient and
advanced techniques in steganalysis will emerge that will help law enforcement
better detect illicit materials transmitted through the Internet.

Future Work –
There are constant advancement’s in the computer filed suggesting advancements in
the field of steganography.

a.) Detecting Steganography in Image files

b.) Steganography on the world wide web
c.) Steganography in printed media
d.) Anti-steganography measures.

References –
1.) N. F. Johnson, S. Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE
Computer vol. 31, issue 2, pp. 26-34, 1998.

2.) J. C. Judge, “Steganography: Past, Present, Future”, SANS Institute Publications,


3.) Artz D., “Digital Steganography: Hiding Data within Data”, Internet Computing IEEE,
vol. 5, issue 3, pp. 75-80, 2001.

4.) Jar no Mielikainen, “LSB Matching Revisited”, Signal Processing letters, IEEE, vol. 13,
issue 5, pp. 285-287, May 2006.

5.) L-C. Lin, “Hiding Data in Spatial Domain with Distortion Tolerance”, Computer
Standard & Interfaces 31, pp. 458-464, (2009).

6.) C-C. Chang, “Reversible Hiding in DCT based Compressed Images”, Information
Sciences 177, pp. 2768-2786, (2007).

7.) Anjali A. Shejul, Prof. U. L. Kulkarni, “A DWT based Approach for Steganography using
Biometric”, International Conference on Data Storage and Data Engineering, IEEE, pp.
39-43, 2010.