Vous êtes sur la page 1sur 21

Implementation Of

STEGANOGRAPHY

Guided By
M. Ramana Reddy
Assistant Professor
ECE Dept. CBIT

Presented By
K. B. Aravind 160112735301
L. Anush 160112735303
M. Eshwar 160112735305

using Verilog on FPGA

CONTENTS

What is Steganography
History
Objective
Types
Techniques
Tools Used
Advantages & Disadvantages
Applications
Future Scope
References

WHAT IS STEGANOGRAPHY?

The word Steganography is derived from the Greek


words
Stegos and Graphia.
STEGOS = COVERED or SECRET
GRAPHIA = WRITING or DRAWING
Therefore, Steganography is the art of hiding secret
information.

HISTORY

In history, the message hiding procedure


was tattooing a shaved messengers head,
waited until it grew back and then sent him
out to deliver the message. Then the
recipient shaves his head again to retain
the information. It was historys first use of
steganography.

In
October
2001,
theNew
York
Timespublished an article claiming that alQaeda had used steganography to encode
messages
into
images,
and
then
transported these via e-mail and possibly
viaUSENETto prepare and execute the
September 11, 2001 terrorist attack.

OBJECTIVE

The objective of Steganography is hiding


messages in such a way that no one but only the
sender and the intended recipient knows about
the very existence of the message in any of the
cover media.

Block Diagram

TYPES OF STEGANOGRAPHY

Steganography mainly deals with hiding information


within cover
media like Text, Image, Audio.
Hiding in Text
By manipulating the lines and words, in HTML file

Hiding in Images
LSB replacement, LSB matching

Hiding in audio
Low bit encoding, Phase encoding, Echo data hiding

TECHNIQUES FOR IMAGE


STEGANOGRAPHY

LSB(Least Significant Bit) replacement:


It is the process of replacing the LSB of the pixels
of the carrier image with secret message bit.
It is a simple approach for embedding secret
message into the image.

TECHNIQUES FOR IMAGE


STEGANOGRAPHY

LSB Matching:
It is based data embedding involves the checking of
the four
conditions and finally the secret data signature hidden
in the
host content.
In this process two pixel pairs are selected. The four
cases for the embedding action is given below as
follows.
The cases below involving the formula is expressed as

TECHNIQUES FOR IMAGE


STEGANOGRAPHY

Case-1:
When LSB (p(i,j) )=s1 and F(p(i,j),p(i,j+1))=s2, the
pixel pair
doesnt need modification.
Case-2:
When LSB(p(i,j) )=s1 and F(p(i,j),p(i,j+1))=s2, the
pixel p(i,j)
doesnt change and p(i,j+1)=p(i,j+1)+1.
Case-3:
When LSB (p(i,j) ) =s1 and F(p(i,j),p(i,j+1)) =s2, the
pixel
p =p -1 and p
doesnt change.

TECHNIQUES FOR IMAGE


STEGANOGRAPHY

Case-4:
When LSB (p(i,j) ) # s1 and F(p(i,j),p(i,j+1)) # s2, p(i,j)=p(i,j)+1
and p(i,j+1) doesnt change.
The entire process of data hiding is explained here with
an example sample pair of pixels. Consider the pixel pairs
p(0,0)=49, p(0,1)=44 and confidential information as (10)2.
Here
LSB(49)=1 and F(49,44)=LSB(68)=0. Thus the case-1
conditions
are met and this results in modified pixels as p(0,0)=49 and
p(0,1)=44.

TOOLS USED

MATLAB
XILINX
FPGA
MATLAB is used to convert cover
image into Hex code using Image
File Operation functions available in
MATLAB directory.
Xilinx is to develop and dump verilog
program for LSB matching Algorithm
into FPGA.

FPGA

Field Programmable Gate Arrays (FPGAs) are


semiconductor devices that are based around a
matrix of configurable logic blocks (CLBs)
connected through programmable interconnects.
The basic architecture of FPGA consists of three
major components:
1. programmable logic blocks (PLB)
2. programmable routing (interconnects)
3. I/O blocks or I/O pads.
SRAM FPGAs can be reprogrammed for the user
desired logic.
Applications of FPGAs includeDigital signal
processing, software-defined radio, ASIC
prototyping, medicalImaging, computer
vision,speech recognition, cryptography,

FPGA

The CLB is the basic logic unit in a


FPGA. every CLB consists of a
configurable switch matrix with 4
or 6 inputs, some selection
circuitry (MUX, etc), and flip-flops.
The programmable routing in an
FPGA provides connections among
logic blocks and I/O blocks to
complete a user defined design.
The media required to interface
the logic blocks and routing
architectures to the wide range of
external components to FPGA
called as I/O pads or
programmable I/O.

STEG-ANALYSIS

It is used to detect the messages hidden using


Steganograpy.
It compares Stego image with Carrier image and
extracts the message.

ADVANTAGES & DISADVANTAGES

Advantages:
Difficult to detect and only receiver can detect
It can be done with larger number of softwares.
Provides better security in LAN,MAN and WAN.
Disadvantages:
The confidentiality of the information is
maintained by the algorithms and if algorithms
are known then this technique is of no use.
If this technique is gone into the wrong hands like
hackers then it can be very dangerous.

APPLICATIONS

Confidential communication and secret data


storing.
Protection of data alteration.
Access control system for digital content
distribution.
Media database systems
Usage in modern printers
Alleged use by terrorists
Alleged use by intelligent services

FUTURE SCOPE

Steganography is still a fairly new idea.


A hopeful advancement is the improved
sensitivity to small messages.
It is like finding a microscopic needle in the
ultimate haystack.
What is scary is that such a small file of only one
or two sentences may be all that is needed to
commence a terrorist attack.
In the future, it is hoped that the technique of
Steg-analysis will advance such that it will
become much easier to detect even small
messages within an image.

*
1.

2.

3.

4.

5.

6.

REFERENCES

A FPGA IMPLEMENTATION OF DATA HIDING USING LSB MATCHING


METHOD by S. Raveendra Reddy, Sakthivel S M,M. Tech (VLSI Design),
Department of Sense, VIT University, Chennai, India and Asst. Professor
(Sr.G), Department of Sense, VIT University, Chennai, India.
FPGA Hardware Architecture of the Steganographic ConText Technique
Edgar Gmez-Hernndez, Claudia Feregrino-Uribe, Rene Cumplido,
Nacional Institute for Astrophysics, Optics and Electronics.
An FPGA Implementation of Secured Steganography Communication
System by Dr. Ahlam Fadhil Mahmood, Nada Abdul Kanai Sana Sami
Mohmmad, Computer Engineering, University of Mosul.
A Review-FPGA Implementation of Different Steganographic Technique by
K.N.Pansare, Dr.A.K.Kureshi,Asst.Professor, Dept. of E&Tc, P.D.V.V.P.COE,
Pune, Ahmednagar, Maharashtra, India Professor, Dept. of E&Tc, V.A.COE,
Pune, Ahmednagar, Maharashtra, India.
Least Significant Bit algorithm for image steganography by Champakamala
.B.S, Padmini.K, Radhika .D. K Asst Professors, Department of TCE, Don
Bosco Institute of Technology,Bangalore, India.
Digital Watermarking and Steganography Fundamentals and Techniques by
Frank Y.shih.

Any
Queries

Vous aimerez peut-être aussi