Beruflich Dokumente
Kultur Dokumente
Submitted By Iti Sri 1KS09CS033 Kumari Pallavi 1KS09CS057 Manan Bakshi 1KS09CS034
2/26/2013
Table of Contents
Introduction to Steganography Review of Literature Motivation Problem Definition Objectives System Requirements References
Department of Computer Science & Engineering,KSIT,Bangalore 2
2/26/2013
What is Steganography?
Greek Words: STEGANOS Covered GRAPHIE Writing Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieve by concealing the existence of information within seemingly harmless carriers or cover Carrier: image, video, audio, etc.
Department of Computer Science & Engineering,KSIT,Bangalore
2/26/2013
Goal of watermarking
Intruder cannot remove or replace the message Primarily 1:many communication
2/26/2013
2/26/2013
Cryptography:
Doesnt conceal the communication. Scrambles the data to prevent eavesdroppers understanding the content. Cryptography involves various methods and implementations. May be considered complementary and orthogonal (unrelated). Once the presence of hidden information is revealed or even suspected, the purpose of steganography is defeated.
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 6
2/26/2013
we can hide the message by substituting the LSB of each pixel with information bits in 24 bpp RGB image. 24 bpp RGB image is a 24 bit depth colour image using RGB colour model. 24 bit refers to 8 bit for each RGB colour channel, i.e. 8 bits for red, 8 bits for green and 8 bits for blue.
2/26/2013
This implies that we can store three bits of information per pixel at the LSB of RGB. By changing the LSB of RGB values of each pixel, we may get maximum 2X2X2=8 different shades. This change in the pixel bits will be indiscernible to the human eye
2/26/2013
Literature Review
M. M Amin, M. Salleh, S . Ibrahim, M.R.K Atmin, and M.Z.I. Shamsuddin, Information hiding using steganography, IEEE 4th National Conference on Telecommunication Technology Proceedings, Shah Alam, Malaysia, pp. 21-25, January 2003. Deshpande Neeta, Kamalapur Snehal and Daisy Jacobs, Implementation of LSB steganography and its evaluation for various bits, IEEE 1st International Conference on Digital Information Management, India, pp. 173-178, December 2006.
S .K. Moon and R.S. Kawitkar, Data security using data hiding, IEEE International Conference on Computational Intelligence and Multimedia Applications, India, pp. 247-251, January 2007
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 10
V. Lokeswara Reddy, Dr. A. Subramanyam and Dr.P. Chenna Reddy, Implementation of LSB steganography and its evaluation for various file formats, Int. J. Advanced Networking and Applications, vol. 2, pp.868-872, 2011.
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 11
Motivation
Steganography received little attention in computing
2/26/2013
12
Problem Definition
Conventional LSB technique uses the least significant bit of consecutive pixels for embedding the message which draws suspicion to transmission of a hidden message. If the suspicion is raised, then the goal of steganography is defeated.
2/26/2013
13
Objectives
Increase The robustness of Algorithm by using keyless steganography Propose a novel technique to hide information in a 24 bpp RGB image using modified LSB substitution method. Security Enhancement in Comparison with Conventional Algorithms To Increase Capacity of storing information per pixel.
2/26/2013 Department of Computer Science & Engineering,KSIT,Bangalore 14
Software Requirements
Application Used for Development: Language:- Java (jdk6)
2/26/2013
15
Hardware Requirements
2/26/2013
16
References
Petitcolas, F.A.P., Anderson, R., Kuhn, M.G., "Information Hiding - A Survey", July1999, URL: http://www.cl.cam.ac.uk/~fapp2/publications/ieee99-infohiding.pdf (11/26/0117:00) Farid, Hany, Detecting Steganographic Messages in Digital Images Department of Computer Science, Dartmouth College, Hanover NH 03755 Moby Words II, Copyright (c) 1988-93, Grady Ward. All Rights Reserved. Lyu, Siwei and Farid, Hany, Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines, Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA Farid, Hany, Detecting Hidden Messages Using Higher Order Statistical Models Department of Computer Science, Dartmouth College, Hanover NH 03755
2/26/2013
17
Wikipedia Exploring Steganography: Seeing the Unseen N. Johnson & S. Jajodia www.jjtc.com/stegdoc/steg1995.html Information Hiding: Techniques for Steganography and Digital Watermarking S. Katzenbeisser, F. Petitcolas Digital Watermarking H. Bergel, L. OGorman
2/26/2013
18
Thank You !
2/26/2013
19