Вы находитесь на странице: 1из 29

DRK

College of Engineering & Technology

DIGITAL IMAGE STEGANOGRAPHY


STUDENT NAME: C. DILIP KUMAR HALL TICKET NO : 08U51A1208 BRANCH : INFORMATION TECHNOLOGY

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

OUTLINE

Introduction Definition Watermarking and finger printing Steganography carriers Image steganography Image and transform domain. Image or spatial domain. Transform or frequency domain. Palette based images Algorithm requirements. Optimum pixel adjustment procedure Inverted pattern approach The proposed PVD method
TECHNICAL SEMINAR

DRK
College of Engineering & Technology

INTRODUCTION
One of the most important factors of IT has been the security of information. Two ways to achieve it. 1. cryptography sole operation is to keep the message secret. 2. steganography sole operation is to hide the existence of communicated information.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

DEFINITION
1. Steganography is art and science of invisible communication.
Greek word

Stegos
Greek word

cover

Grafia
Meaning

writing

steganography

Covered writing

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Watermarking and finger printing


In watermarking, all of the instances of an object are marked in the same way. In fingerprinting, different ,unique marks are embedded in distinct copies of carrier object that are supplied to different customers. In both, the fact that information is hidden inside the files may be public knowledge While in steganography, the imperceptability of the information is crucial.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Steganography carriers
The four main categories of file formats that can be used for steganography are., 1. 2. 3. 4. TEXT (nth letter) IMAGES (LSB) AUDIO / VIDEO (LSB) PROTOCOLS (HEADER OF TCP PACKET)

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Image steganography
images are most popular cover objects used for steganography. To a computer, an image is a collection of numbers that constitute different light intensities. The number of bits in color scheme is called bit depth. For ex, the smallest bit depth is 8, meaning that there are 8 bits used to describe the color.
TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Image and transform domain

Image steganography techniques can be divided to two groups. 1. Image or spatial-domain technique. 2. Transform or frequency domain.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Image or spatial domain

spatial domain embed messages directly in the pixels. Spatial domain encompass, bitwise methods. Most suitable formats are lossless . The techniques are dependent on image format.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Transform or frequency domain

Steganography in transform domain involves manipulation of algorithms and image transform. This method hides messages in MSB of image, making it robust. The techniques are independent of file formats. Embedded message may survive after conversion between lossy and lossless compression.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Image domain
LSB insertion is common approach to embed. In 24-bit image, a bit of each of red, green and blue color can be used to embed. Thus, one pixel can store 3 bits in each pixel. 800*600 image can store 180,000 bytes of data. pixels red color: 1100 0011 data to embed: 01111000 after embed: 1100 0010 Changes cannot be perceived by human eye. BMP images are common since they use lossless compression.
TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Palette based images

GIF images are popular palette based images used. A GIF image cannot have bit depth greater than 8. For GIF, the colors are stored in color lookup table. The 8bit information at a pixel is called the index for the color in LUT. The data is embedded in the CLUT.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Algorithm Requirments

Invisibility Payload capacity Robustness against attacks Robustness against image manipulation Independent of file format Unsuspicious files

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Optimum pixel adjustment procedure


1. A few LSB are substituted with the data to be hidden. 2. In the pixel, the bits before the hidden bits are adjusted as follows. a) Let n LSBs be substituted in each pixel. b) Let d=decimal value of pixel after substitution. c) D1= decimal value of last n bits of pixel. d) D2= decimal value of n bits hidden in that pixel.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Procedure for hiding


e. If (d1-d2)<=(2^n)/2 then no adjustment Is made. else if(d1<d2) d=d=2^n if(d1>d2) d=d+2^n.

This d is converted to binary and written back to pixel.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Retrieval and advantages


1. the retrieval follows the extraction of LSB. 2. Advantages are: a. Simple methodology b. Easy retrieval c. Improved stego image quality

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Inverted pattern Approach(IP)


-

It uses the idea of processing secret messages prior to embedding. In this method each section of secret image is determined to be inverted or not before it is embedded. The bits which are used record transformation are treated as secret keys.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Embedding procedure
Let embedded string is S. Replaced string is R. Let embedded string is divided to P parts. Let us consider n-bit LSB substitution algorithm to be made. Then S and R of n bits length. For i= 1 to P., a) If MSE(Si,Ri)<=MSE(Si , Ri) choose Si for embedding. mark key(i) as logic 0.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Embedding procedure
b. If MSE(Si, Ri)>=MSE(Si ,Ri) choose Si for embedding mark key(i) as logic 1. END WHERE S= data to be hidden S = data to hidden in inverted form.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Embedding procedure
MSE stands for MEAN SQUARE ERROR. It is the metric used to various image compression techniques. The MSE is the cumulative squared error between the compressed and the original image. The value of MSE is calculated as below

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Procedure for Retrieval


-

The stego image and key file are required at the retreival side. First, corresponding numbers of LSB are retrieved from stego image. If key is 0, then the retreived bits are kept same. If key is 1, then the bits are inverted.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

The proposed PVD method


- This method uses concept of hiding data using the difference between the pixel values. - This method gives stego images of better quality than previous methods.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Steps for embedding


Let W= pixel values of cover image. Let Y= data to be hidden in binary format. Step 1: leave the first row and column. Step 2: let the current pixel Is selected. Step 3: let D1= difference between the current pixel and its left. Step 4: let D2= difference between the current pixel and its top. Step 5: let I1 and I2 be lengths of D1 AND D2.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Steps for embedding

Step 6:extract data from Y of lengths I1-1,I1,I1+1,I2-1,I2,I2+1 and save them in same order in dif(i),where i= 1 to 6. Step 7: now find if the D1 and D2 is nearer to any one of the dif(i). whichever dif(i) that is nearer, let us name it as MIN.

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Steps for embedding

Step 8: if(MIN nearer to D1)&&((min-D1)<8) Then , adjust the current pixel value so that difference between the curreent pixel and the left pixel is the data that is fetched from Y. SAVE THE KEY AS 0
TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Steps for embedding

Step 9: if(MIN nearer to d2)&&((min-D2)<8) Then, adjust the current pixel so that the difference between the current pixel and the top pixel is the data that is fetched from Y. SAVE THE KEY AS 1
TECHNICAL SEMINAR

DRK
College of Engineering & Technology

Steps for embedding

Step 10: if (MIN-D1)>8 && (MIN-D2)>8 then skip the current pixel without embedding.
SAVE THE KEY AS

TECHNICAL SEMINAR

DRK
College of Engineering & Technology

RETRIEVING STEPS

1. 2. 3. 4.

Read the stego image and save the gray values in W. Read the key file and save the binary data in Y. Skip the first row and column. If (Y==0) Then,find the difference between the current pixel and the left pixel and save it in D. Also, find the number of bits stored from below pixel and save it in N. Convert D in to binary of N bits
TECHNICAL SEMINAR

DRK
College of Engineering & Technology

THANK YOU

TECHNICAL SEMINAR

Вам также может понравиться