Vous êtes sur la page 1sur 24

Guided by Ms.

HEMALATHA
Assistant

Professor Department of Information Technology


By, PRASANNA.A DINESH KUMAR.R VINOTH KUMAR.D

Introduction Literature Survey Problem Definiton Proposed System Module implementation Conclusion

Steganography:
Hiding one piece of data within another

Steganoanalysis:
Identifying steganography by inspecting various parameter of a stego media.

Steganography used in
Audio Video Image Text

Technique Used ICT IWT RDH HBC

S.NO

AUTHOR AND YEAR

CONTRIBUTIONS

ADVANTAGE

DISADVANTAGE

Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, A Secure And High Capacity Image Steganography Technique

Integer Wavelet Transform (IWT)

Peak Signal to Noise spatial

domain

Ratio is good. High techniques are used to Quality Image can be hide the key. Security obtained information hidden even is the Level is less to when other

get compared

technique. The image size get increased

Dilip Vishwakarma, Satyam Maheshwari, Deepak Chopra Novel Steganography Technique For Information Hiding.

Least Significant Bit (LSB)

The image quality is The Hidden data can be maintained. The hidden easily detected . The message is maintained size is increased. The in a way that it is as the transformation domain original Image. technique in not

efficiently used 3 Xiaozhong Pan, BoTao Yan, Multiclass Detect of Current Steganographic Methods for JPEG Format Based Re-stegnography trains SVM(support vector machine) multiclassifiers to classify all kinds of stego Hidden image can be The hidden data can be easily detected. High easily hacked by the Performance in unauthorized person as

detecting

the

hidden the detecting techniques


familiar. Stegno

data. Image quality is are maintained

Image size not as same the original image size

Gandharba Swain , Saroj Kumar Lanka Security Issues in Computer Networks and Stegnography

horizontal difference The security level of the Its hard to implement. (HD), vertical hidden data is get The efficiency is less. difference (VD) and increased. Image quality Further improvement in region size (RS) algorithm is required to is maintained. The increase the efficiency image size is minimized when compared to other technique

Kede Ma, Weiming Zhang, Xianfeng Zhao, Member, IEEE, Nenghai Yu, and Fenghua Li Reversible Data Hiding In Encrypted Images By Reserving Room Before Encryption

Reversible Data Hiding The security level of the Its hard to implement. (RDH) hidden data is get The efficiency is less. increased. Image quality Further improvement in is algorithm is required to

maintained. increase the efficiency The image size is minimized when compared to other technique
Reversible Data Hiding (RDH) The security level of the Its hard to implement. hidden data is get The efficiency is less.

Xinpeng Zhang Separable Reversible Data Hiding in Encrypted Image

increased. Image quality Further improvement in is maintained. algorithm is required to The image size is increase the efficiency minimized when compared to other technique

Siwei Lyu, Student Member, IEEE, and Hany Farid, Member, IEEE Steganalysis Using Higher-Order Image Statistics Kathryn Hempstalk University of Waikato Department of Computer Science Hamilton, New Zealan Hiding Behind Corners

LSB

The different types of The size of the stegno algorithm is used image is not same as the

The quality of image is original image. The hidden data size is maintained small Hiding Behind Corners (HBC) The data get hidden in The size of the stegno edges. image is not same as the

The quality of image is original image. maintained The hidden data size is small

Singh, K.M. ; DOEACC LSB Centre, Imphal ; Singh,


L.S. ; Singh, A.B. ; Devi,

The

data

hidden

in The size of the stegno image is not same as the

corners.

The quality of image is original image.

Kh.S. Hiding Secret

maintained

The hidden data size is


small

Message In Edges Of The Image

10

pixel-value differencing The data (PVD) and LSB Yang ; Dept. of Comput. corners Cheng-Hsing Sci., Nat. Pingtung Univ. of Educ., Pingtung ; Chi-Yao
Weng ; Shiuh-Jeng Wang ; Hung-Min Sun

hidden

in The size of the stegno

image is not same as the

The quality of image is original image. maintained The hidden data size is small

Adaptive Data Hiding In Edge Areas Of Images With Spatial Lsb 11 Domain Systems Yildiray Yalman Data Hiding Method Based On Interpolation Technique Interpolation Technique (IT) The data hidden using in

corners ethod.The

RDH of

quality

image is maintained The size of the stegno image is not same as the original image. The

hidden data size is small

The steganography system used the DCT and DWT for the security of the image which has the hidden data. The PSNR value is normal. The stegno image is not same as the size of the original image.

The Hidden Behind Corner is used to hide the secret key in the image. The decryption technique is used to decrpyt the hidden keys in the image. Then the secert key is used to retrive the original image.

HBC
Dx = D5 (D1 + D2 + D3 + D4 + D6 + D7 + D8 )

Advantage
The PSNR value can be increased
The security level of the hidden data is increased.

The size of the original is maintained.

The distortion in the image can be reduced using the ICT and IWT. The RDH and HBC methods used to secure the hidden data.

In future the protection for image from cropping when the data is hidden in image.

Vous aimerez peut-être aussi