Académique Documents
Professionnel Documents
Culture Documents
STEGANOGRAPHY
Guided By
M. Ramana Reddy
Assistant Professor
ECE Dept. CBIT
Presented By
K. B. Aravind 160112735301
L. Anush 160112735303
M. Eshwar 160112735305
CONTENTS
What is Steganography
History
Objective
Types
Techniques
Tools Used
Advantages & Disadvantages
Applications
Future Scope
References
WHAT IS STEGANOGRAPHY?
HISTORY
In
October
2001,
theNew
York
Timespublished an article claiming that alQaeda had used steganography to encode
messages
into
images,
and
then
transported these via e-mail and possibly
viaUSENETto prepare and execute the
September 11, 2001 terrorist attack.
OBJECTIVE
Block Diagram
TYPES OF STEGANOGRAPHY
Hiding in Images
LSB replacement, LSB matching
Hiding in audio
Low bit encoding, Phase encoding, Echo data hiding
LSB Matching:
It is based data embedding involves the checking of
the four
conditions and finally the secret data signature hidden
in the
host content.
In this process two pixel pairs are selected. The four
cases for the embedding action is given below as
follows.
The cases below involving the formula is expressed as
Case-1:
When LSB (p(i,j) )=s1 and F(p(i,j),p(i,j+1))=s2, the
pixel pair
doesnt need modification.
Case-2:
When LSB(p(i,j) )=s1 and F(p(i,j),p(i,j+1))=s2, the
pixel p(i,j)
doesnt change and p(i,j+1)=p(i,j+1)+1.
Case-3:
When LSB (p(i,j) ) =s1 and F(p(i,j),p(i,j+1)) =s2, the
pixel
p =p -1 and p
doesnt change.
Case-4:
When LSB (p(i,j) ) # s1 and F(p(i,j),p(i,j+1)) # s2, p(i,j)=p(i,j)+1
and p(i,j+1) doesnt change.
The entire process of data hiding is explained here with
an example sample pair of pixels. Consider the pixel pairs
p(0,0)=49, p(0,1)=44 and confidential information as (10)2.
Here
LSB(49)=1 and F(49,44)=LSB(68)=0. Thus the case-1
conditions
are met and this results in modified pixels as p(0,0)=49 and
p(0,1)=44.
TOOLS USED
MATLAB
XILINX
FPGA
MATLAB is used to convert cover
image into Hex code using Image
File Operation functions available in
MATLAB directory.
Xilinx is to develop and dump verilog
program for LSB matching Algorithm
into FPGA.
FPGA
FPGA
STEG-ANALYSIS
Advantages:
Difficult to detect and only receiver can detect
It can be done with larger number of softwares.
Provides better security in LAN,MAN and WAN.
Disadvantages:
The confidentiality of the information is
maintained by the algorithms and if algorithms
are known then this technique is of no use.
If this technique is gone into the wrong hands like
hackers then it can be very dangerous.
APPLICATIONS
FUTURE SCOPE
*
1.
2.
3.
4.
5.
6.
REFERENCES
Any
Queries