Sie sind auf Seite 1von 19

Project Seminar on Steganography Using LSB Substitution Method

Submitted By Iti Sri 1KS09CS033 Kumari Pallavi 1KS09CS057 Manan Bakshi 1KS09CS034

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

Table of Contents
Introduction to Steganography Review of Literature Motivation Problem Definition Objectives System Requirements References
Department of Computer Science & Engineering,KSIT,Bangalore 2

2/26/2013

What is Steganography?
Greek Words: STEGANOS Covered GRAPHIE Writing Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieve by concealing the existence of information within seemingly harmless carriers or cover Carrier: image, video, audio, etc.
Department of Computer Science & Engineering,KSIT,Bangalore

2/26/2013

Watermarking vs. Steganography


Goal of steganography
Intruder cannot detect a message Primarily 1:1 communication

Goal of watermarking
Intruder cannot remove or replace the message Primarily 1:many communication

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

Steganography, Cryptography, and Watermarking


There are two major branches of information hiding, Steganography and Watermarking Watermarking: Communication in watermarking is the host signal, with the embedded data providing copyright protection. The existence of a watermark is often declared openly. Any attempt to remove or invalidate the embedded content renders the host useless.

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

Cryptography:
Doesnt conceal the communication. Scrambles the data to prevent eavesdroppers understanding the content. Cryptography involves various methods and implementations. May be considered complementary and orthogonal (unrelated). Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated.
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 6

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

we can hide the message by substituting the LSB of each pixel with information bits in 24 bpp RGB image. 24 bpp RGB image is a 24 bit depth colour image using RGB colour model. 24 bit refers to 8 bit for each RGB colour channel, i.e. 8 bits for red, 8 bits for green and 8 bits for blue.

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

This implies that we can store three bits of information per pixel at the LSB of RGB. By changing the LSB of RGB values of each pixel, we may get maximum 2X2X2=8 different shades. This change in the pixel bits will be indiscernible to the human eye

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

Literature Review
M. M Amin, M. Salleh, S . Ibrahim, M.R.K Atmin, and M.Z.I. Shamsuddin, Information hiding using steganography, IEEE 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, pp. 21-25, January 2003. Deshpande Neeta, Kamalapur Snehal and Daisy Jacobs, Implementation of LSB steganography and its evaluation for various bits, IEEE 1st International Conference on Digital Information Management, India, pp. 173-178, December 2006.

S .K. Moon and R.S. Kawitkar, Data security using data hiding, IEEE International Conference on Computational Intelligence and Multimedia Applications, India, pp. 247-251, January 2007
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 10

Literature Review Contd


A Vadivel, A.K.Majumdar and Shamik Sural, Performance comparison of distance matrices in context-based image retrieval applications, IIT kharagpur research work. Beenish Mehboob and Rashid Aziz Faruqui, A steganography implementation, IEEE-International symposium on Biometrics & security technologies, ISBAST, Islamabad, April 2008. Gandharba Swain and Saroj Kumar Lenka, A hybrid approach to steganography embedding at darkest and brightest pixels, Proceedings of the International Conference on Communication and Computational Intelligence ,Kongu Engineering College, Perundurai, Erode, T.N., India, pp.529-534, December 2010.

V. Lokeswara Reddy, Dr. A. Subramanyam and Dr.P. Chenna Reddy, Implementation of LSB steganography and its evaluation for various file formats, Int. J. Advanced Networking and Applications, vol. 2, pp.868-872, 2011.
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 11

Motivation
Steganography received little attention in computing

Renewed interest because of industry desire to protect copyrighted digital work


audio images video Text

Detect counterfeiter, unauthorized presentation, embed key, embed author ID

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

12

Problem Definition
Conventional LSB technique uses the least significant bit of consecutive pixels for embedding the message which draws suspicion to transmission of a hidden message. If the suspicion is raised, then the goal of steganography is defeated.

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

13

Objectives
Increase The robustness of Algorithm by using keyless steganography Propose a novel technique to hide information in a 24 bpp RGB image using modified LSB substitution method. Security Enhancement in Comparison with Conventional Algorithms To Increase Capacity of storing information per pixel.
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 14

Software Requirements
Application Used for Development: Language:- Java (jdk6)

Development Tool:-Eclipse, Notepad


Platform:-Cross Platform Essential Software:-Java Runtime Environment

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

15

Hardware Requirements

1 Mega Byte disc space.


Minimum 512 MB RAM. Pentium 3 or above processor. 700 MHz processor speed.

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

16

References
Petitcolas, F.A.P., Anderson, R., Kuhn, M.G., "Information Hiding - A Survey", July1999, URL: http://www.cl.cam.ac.uk/~fapp2/publications/ieee99-infohiding.pdf (11/26/0117:00) Farid, Hany, Detecting Steganographic Messages in Digital Images Department of Computer Science, Dartmouth College, Hanover NH 03755 Moby Words II, Copyright (c) 1988-93, Grady Ward. All Rights Reserved. Lyu, Siwei and Farid, Hany, Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines, Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA Farid, Hany, Detecting Hidden Messages Using Higher Order Statistical Models Department of Computer Science, Dartmouth College, Hanover NH 03755

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

17

Wikipedia Exploring Steganography: Seeing the Unseen N. Johnson & S. Jajodia www.jjtc.com/stegdoc/steg1995.html Information Hiding: Techniques for Steganography and Digital Watermarking S. Katzenbeisser, F. Petitcolas Digital Watermarking H. Bergel, L. OGorman

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

18

Thank You !

2/26/2013

Department of Computer Science & Engineering,KSIT,Bangalore

19

Das könnte Ihnen auch gefallen