Académique Documents
Professionnel Documents
Culture Documents
By: Antarip Pal Kaushik Mal Amit Kumar Supervised By: Pratal Mondal
Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday.
Taking the third letter in each word the following message emerges:
INTRODUCTION
What is Image steganography?
The word Steganography comes from the Greek steganos (covered or secret) and graphy (writing or drawing) and thus means,
Steganography came under focus while CIA was investigating this tragedy. Al-Qaeda used image steganography 12 yrs back now its become a major concern for investigating agencies all over the world.
H I D I N G
E X T R A C T I N G
CRYPTOGRAPHY
Known message passing. Encryption prevents an unauthorized party from understanding the contents of a communication. Larger expensive computing power is required for cracking. Cryptography alter the structure of message.
STEP 1
Count the number of character in the file : Convert entire message into binary and store it a temporary file:
0 1 0 0 1 0 0 0
0 1 0 0 0 1 0 1
. .
STEP 2
Read bmp_header of source image : Include character count in reserved space and write updated header on disk :
Read Header
Update
Updated Header
STEP 3
Read palette data of source Image :
Pixel of image
LSB
1 0 0 1 1 1 0 0
LSB
B
Cover image
1 0 1 1 0 0 1 1 R LSB
G
1 0 1 0 1 1 1 0
STEP 4
Replace the least significant bit by one bit of data to be hidden :
01001000
1 0 0 1 1 1 0 0 0 1 0 0 1 1 1 0 0
1 0 1 0 1 1 1 0 1 1 0 1 0 1 1 1 1
New pixel data of Image
10110011 0 10110010
STEP 5
Write updated palette data to output image :
Pixel s with updated data
1 0 0 1 1 1 0 0 B
1 0 1 1 0 0 1 1 R
Steganographed image
1 0 1 0 1 1 1 0
STEP 1
Read reserved field from bmp_header to get the number of hidden character : Read pixel data of steganographed Image :
Pixel of image
1 0 0 1 1 1 0 0
B
Steganographed image
1 0 1 1 0 0 1 1 R
1 0 1 0 1 1 1 0 G
STEP 2
Extracting least significant bit from pixel data binary:
10011100
10101110
10110011
. .
01001000
STEP 3
Conversion of binary into message data :
01001000
0 1 0 0 0 1 0 1
. .
Conclusion
The LSB technique described in this project helps to successfully hide the
secret data into the cover file with minimum distortion made to the cover file. As presented, LSB Embedding has the advantage that it is simple to implement. But LSB Embedding is relatively insecure, at least in its primitive form. However, due to its
advantages, it is useful for applications where security is desired, but not necessary. It is also a good foundation to build more secure steganography techniques.
THANK YOU
Any Question?