Beruflich Dokumente
Kultur Dokumente
1, Amit Aher
2, Akshay Bakliwal
3, Pandurang Sadgir
4, Suraj Zankar
Abstract
In today's world steganography is very important due to
the confidential communication between computer users
over the internet. Steganography is known as the study
of invisible i.e. hidden communication that usually
carried
out
by
hiding
the
existence
of
the
communication. Generally data embedding is achieved in
communication, image, text, voice or any multimedia
content
for
military
communication,
copyright,
authentication and many other government sectors and
general
purpose.
In
Steganography,
secret
communication is done by embedding a message into
cover media a.k.a. carrier and generate a stego-image
i.e. output image which consist a hidden secret message.
The quality degradation of resultant stego-image is
handled by an efficient pixel adjustment method with the
use of fuzzy neural networks.
2
Literature Survey
Problem Definition
To
S/W
Any web browser that supports JavaScript
Any mobile phone having browser
System architecture
Chi Square
Probability
&
Euclidian
norm
Cover
Image
LSB
Algorithm
For
Embedding
AES
Stego
Key
Features
of StegoImage
Free Bits
H
F
N
N
StegoImage
Secret Data
Encryption
Modified
Free Bits
Features
of
Cover
Image
New
Features
of Stego
BPL
No
Is
Matche
d
?
Yes
Improved
StegoImage
System architecture
(contd.)
provided
as
input
Embedding phase
to
LSB
System architecture
(contd.)
the image.
The Least Significant Bit insertion varies
10
11
C(i,j)
m is the next message bit to be embedded.
project
titleis the stego image .
S(i,j)
KBT COE, Nashik
LSB Encryption
Input: Cover Image, Secret message
Output: Stego Image
PROCEDURE:
Step 1: Extract pixels of cover message.
Step 2: Extract the characters of the text file. Convert that
12
project title
KBT COE, Nashik
System architecture
(contd.)
13
System architecture
(contd.)
is extracted as statistical
feature which is based on expected and observed
frequencies of the image pixels
The formula for chi square probability is given by
Where
o=observed frequency
14
Use of Hybrid
Fuzzy Neural
Network for Advanced
e=expected
frequency
Steganography
KBT COE, Nashik
System architecture
(contd.)
Euclidian
image.
15
System architecture
(contd.)
16
System architecture
(contd.)
5.
17
System architecture
(CONTD.)
AES
Decryption
Stego-Key
18
Secret Data
Cover
Image
System architecture
(CONTD.)
System architecture
(CONTD.)
project title
KBT COE, Nashik
System architecture
(CONTD.)
project title
KBT COE, Nashik
System architecture
(CONTD.)
22
Advantages
Payload capacity
High imperceptibility
Better security
Robustness
High quality stego-image
23
Disadvantages
May use for illegitimate purpose like
terrorism
Secret key leakage may occur and it leads
Steganography
KBT COE, Nashik
Limitations
Supports JPG, BMP, GIF image formats
Requires knowledge of computer programs
No quality improvement blur images
Accept only one input at the time
25
Applications
Government sectors
Copyright
Authentication
Trade secrets
26
Conclusion
Steganography is fascinating and effective
method of hiding data that has been used
throughout history. This technology is easy to
use and difficult to detect.
This system provides an overview of
steganography cover media types, specific
techniques. Where standard cryptography
and encryption is outlawed, steganography
can be used. Formerly, just an interest of the
government
sectors
is
now
gaining
popularities among the masses.
27
References
[1] Saleema A., Dr. T. Amarunnishad, A New Steganography Algorithm Using Hybrid
Fuzzy Neural Networks, International Conference on Emerging Trends in
Engineering, Science and Technology (ICETEST), ScienceDirect, 2016.
[2] Akhtar, N., Johri, P., Khan, S., Enhancing the Security and Quality of LSB Based
Image Steganography, Computational Intelligence and Communication Networks
(CICN), 2013 5th International Conference on, vol., no., pp.385, 390, 27-29 Sept.
2013.
[3] Vipula Madhukar Wajgade , Dr. Suresh Kumar, SGT Institute of Technology And
Management, Gurgaon, Haryana, India, Enhancing Data Security Using Video
Steganography, International Journal of Emerging Technology and Advanced
Engineering, Volume 3, Issue 4, April 2013.
[4] Christy.A.Stanley, Fachinger, J., Pairs of Values and Chi Square Attack,
Department of Mathematics, Iowa State University, Behavior of HTR Fuel Elements
in Aquatic Phases of Repository Host Rock Formations. Nuclear Engineering &
Design 236, 54, May 1, 2005
[5] Westfeld, A., Pfitzmann, A., Attacks on Steganographic Systems, 3rd
International Workshop, Lecture Notes in Computer Science, 2000.
vol. 1768. Springer-Verlag, Berlin, Heidelberg, New York.
28
References
(Contd.)
[7] Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing, Third Edition.
[8] Petticolas, F.A.P. Anderson, R. J. Kuhn, M. G. , Information Hiding-A survey,
Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia
content 87, 1062-1078, 1999.
[9] El-Emam, N., Embedded a large amount of information using high secure neural
based steganography algorithm", International Journal of Information and
Communication Engineering 4 (2), 95106, 2008.
[10] S Sivanandam , S Sumathi, Introduction to neural networks using matlab 6.0.
[11] Jinsa K., and Gunavathi K., "Lung cancer classi_cation using neural networks for
CT images", Elsevier, computer methods and programs in biomedicine, pp. 202 209,
2014.
[12] Liu Li, Huo Liqing, Lu Hongru, Zhang Feng, Zheng Chongxun, Shami Pokhrel,
and Zhang Jie1, The Use of Fuzzy Back Propagation Neural Networks for the Early
Diagnosis of Hypoxic Ischemic Encephalopathy in Newborns, Hindawi Publishing
Corporation, Journal of Biomedicine and Biotechnology Volume 2011, Article ID
349490, 5 pages , doi:10.1155/2011/349490, 2011``
29