Escolar Documentos
Profissional Documentos
Cultura Documentos
STEGANOGRAPHY
SHAIKH IBRAHIM NAZEERUDDIN
Emertxe
Bengaluru
CONTENTS.
Introduction
Steganography
4/29/17
Types of Steganography
LSB Image Steganography
Block Diagram
Algorithm
Result
Conclusion
2
Introduction
Steganography is an art of hiding information inside
information.
4/29/17
The main objective of Steganography is mainly
concerned with the protection of contents of the
hidden information.
4/29/17
Definition:
It is an art and science of hiding information by
embedding it in some other data.
Goals:
To hide a secret message within an object.
Do it such a way that the presence of message
is
not visible.
4
Types of Steganography
Image steganography: Images are used as the message
carrier. Images are the most popular cover objects used for
4/29/17
steganography.
Textual steganography: Text steganography can be
achieved by altering the text formatting, or by altering
certain characteristics of textual elements (e.g.,
characters).
Audio steganography: In audio steganography, secret
message is embedded into digitized audio signal which
result slight altering of binary sequence of the 5
corresponding audio file.
LSB Image
Steganography
The most common and popular method of modern
day steganography is to make use of LSB of
pictures pixel information.
4/29/17
This technique works best when the file is longer
than the message file and if image is color.
6
Block Diagram
4/29/17
New Image
Encoding Decoding
Image
Process process
7
Algorithm
ENCODING
STEP 1: Copy header that is 54 bytes of .bmp image file
into new .bmp image file.
STEP 2: Find out the size of Secret text file
4/29/17
STEP 3: Find out the size of Magic string and Extract the
character from magic string.
STEP 4: Take 1st character from secret file which have
some ASCII value and convert it into binary.
STEP 5: Take 1st channel of image R and it contain some
pixel value ,convert it into binary.
STEP 6: Take MSB bit of character from secret file and
put this MSB into LSB bit of image channel and save
into new .bmp image
STEP 7: Repeat STEP 4 , STEP 5 , STEP 6 up to the EOF. 8
STEP 8: Copy remaining data of image into new image
DECODING
STEP 1: Tell user to enter magic string
STEP 2: Extract the magic string , if magic string is
correct then decode the text from image.
STEP 3: Now consider each pixel from encoded
4/29/17
image file and take LSB bit of each pixel and store
it into text bits.
STEP 4: Repeat up to the size of secret file.
9
Result
Encoding
All the data from secret file are successfully added
into image file. Human eye cannot detect the minor
4/29/17
change in the image
Decoding
Text from encoded file is successfully recovered.
10
Conclusion
Hiding a message with steganography methods
reduces the chance of a message being detected.
4/29/17
In and of itself, steganography is not a good
solution to secrecy, but neither is simple
substitution and short block permutation for
encryption. But if these methods are combined,
you have much stronger encryption routines.
11
4/29/17
THANK YOU
12