Image Steganography. Image Steganography. Image Steganography

monicaturnercolumbia 32 views 3 slides Dec 21, 2023
Slide 1
Slide 1 of 3
Slide 1
1
Slide 2
2
Slide 3
3

About This Presentation

Image Steganography


Slide Content

International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.177
Volume 7 Issue XI, Nov 2019- Available at www.ijraset.com

408
© IJRASET: All Rights are Reserved

Image Steganography
Srishti Rajvanshi
1
, Shrikrishna Sawant
2
, Vedant Tiwari
3
, Anurag Waghmare
4
, Manjiri Gogate
5

1, 2, 3, .4, 5
Electronics Department,

Mumbai University.
Abstract: Images are used because the widespread cowl objects for steganography. A message is embedded in a very digital
image through an embedding algorithmic program, exploitation the key. During this method image is split into totally
different regions for the detection of least vital bits out there in numerous pictures. The no. of bits which will be used for image
enhancement depend on the element intensity the low intensity element utilizes less no. of bits and element having a high
intensity used most bits within the method of concealing the image. The difficulty during this is security for hindrance image
from stegnalysis attack and therefore the secret knowledge is out there in such a fashion because it transmitted. In this paper a
review on various approaches are done that has been used for embedding of secret data behind the quilt object.
Keywords: Steganography, Encryption, Stegnalysis, Steganocryption, Pixel.
I. INTRODUCTION
Images are used because the widespread hidden objects for steganography. A message is embedded in a digital image
through an embedding algorithmic rule, by making use of the secret key. In this method image is split into totally
different regions for the detection of least important bits accessible in several pictures. The no. of bits that can be utilized for
image enhancement rely on the constituent intensity the low intensity constituent utilizes less no. of bits and pixel having a high
intensity used most bits within the method of concealment the image. The issue in this is security for prevention image from
stegnalysis attack and the secret data is available in such a manner as it transmitted. In this paper are view on various
approaches have been done that has been used for embedding of secret information behind the cover object.
II. STEGANOGRAPHY TECHNIQUES
In fashionable digital steganography, knowledge is first encrypted or obfuscated in another approach then inserted, employing
a special rule, into knowledge that's a part of a selected file format like a JPEG image, audio or video file. The key message is
often embedded into standard knowledge files in many alternative ways in which. One technique is to cover knowledge in bits that
represent similar colour pixels continual during a row in a picture file. By applying the encrypted knowledge to the
current redundant knowledge in some invisible approach, the result are a picture file that seems a dead ringer for the
initial image however that has "noise" patterns of standard, unencrypted knowledge.
The follow of adding a watermark–a trademark or alternative characteristic knowledge hidden in transmission or alternative content
files -- is one common use of steganography. Watermarking could be a technique typically utilized by on-line publishers to
spot the supply of media files that are found being shared while not permission. While there square measure many alternative uses
of steganography, together with embedding sensitive data into file sorts, one amongst the foremost common techniques is
to enter a document into a picture file. Once this can be done, anyone viewing the image file shouldn't be able to see
a distinction between the initial image file and therefore the encrypted file; this can be accomplished by storing the message
with minor bites within the file. This method is often completed manually or with the employment of a steganography tool.

III. IMAGE STEGANOGRAPHY
Images are used as the popular cover objects for steganography. A message is embedded during a exceedingly in a very} digital
image through an embedding rule, victimization the key.
The resulting stego image is send to the receiver. On the opposite aspect, it is processed by the extraction algorithm using the
same key. During the transmission of steno image unauthenticated persons can only notice the transmission of an
image however can’t guess the existence of the hidden message

IV. STEGANOGRAPHY PACKAGE
Steganography package is employed to perform a range of functions so as to cover knowledge, together with cryptography the
info so as to arrange it to be hidden within another file, keeping track of that bits of the duvet document contain hidden knowledge,
encrypting {the knowledge the info the information} to be hidden and extracting hidden data by its supposed recipient.

International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.177
Volume 7 Issue XI, Nov 2019- Available at www.ijraset.com

409
© IJRASET: All Rights are Reserved

V. WORKING
An image is delineated as associate N*M (in case of greyscale images) or N*M*3 (in case of colour images) matrix in memory,
with every entry representing the intensity price of a component. In image steganography, a message is embedded into a
picture by sterilization the values of some pixels, that area unit chosen by associate coding formula. The recipient of the
image should bear in mind of constant formula so as to legendary that pixels he or she should choose to extract the message.
Detection of the message among the cover-image is finished by the method of steganalysis. This will be done through comparison
with the quilt image, bar chart plotting, or by noise detection. Whereas efforts area unit being invested with in developing new
algorithms with a bigger degree of immunity against such attacks, efforts also are being devoted towards up existing algorithms for
steganalysis, to find exchange of secret data between terrorists or criminal parts.


VI. LEAST VITAL BIT ALGORITHM
To a laptop, animates a set of numbers that represent completely different light-weight intensities in numerous areas of the image.
All color variations for the pixels of a 24-bit image area unit derived from 3 primary colors: red, inexperienced and blue,
and every primary color are diagrammatical by eight bits. In one given element, there is 256 completely different quantities of
red, inexperienced and blue, adding up to additional than 16-million combos, ensuing in additional than 16-million colors.
Not amazingly the larger quantity of colors that will be displayed, the larger the file size. Least vital bit (LSB) insertion is a
typical, easy approach to embedding info in a cowl image. The least vital bit (in alternative words, the eighth bit) of some or all of
the bytes within a picture is modified to a bit of the secret message. For example a grid for three pixels of a 24-bit image is as
follows:
(0010110100011100 11011100)
(10100110 11000100 00001100)
(11010010 10101101 01100011)
Once the range two hundred, that binary illustration is 11001000, is embedded into the smallest amount vital bits of this a part of the
image, the ensuing grid is as follows:
(0010110100011101 11011100)
(10100110 1100010100001100)
(11010010 10101100 01100011)

International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.177
Volume 7 Issue XI, Nov 2019- Available at www.ijraset.com

410
© IJRASET: All Rights are Reserved

VII. MSB (MOST SIGNIFICANT BIT)
MSB(Most vital bit) Most significant bit (MSB, conjointly referred to as the high-order bit) is that the bit position during
a binary variety having the greatest worth. The savings bank is typically brought up because the left-most bit because of the
convention in point notation of writing additional vital digits more to the left. The savings bank can even correspond to the sign little
bit of a signed binary variety in one's or two's complement notation, "1" which means negative and "0" which means
positive. It’s common to assign every bit a grip variety, starting from zero to N-1, wherever N is that the
number of bits within the binary illustration used. Normally, this is often merely the exponent for the corresponding bit weight in
base-2 though a couple of hardware makers assign bit numbers the alternative manner the savings bank unambiguously remains the
foremost vital bit. this could be one among the reasons why the term savings bank is commonly used rather than a
touch variety, though the first reason is maybe that totally different completely different} variety representations use different
numbers of bits.
VIII. CONCLUSION
Steganography will defend knowledge by concealment it however victimization it alone might not guarantee total
protection. It’s doable that by employing a steganocryption technique, enemy detects presence of text message in the image
file so he/she might reach extracting data from the image, which will be fateful in real life things. This is same for
plain cryptography. In this case by seeing the unmeaning showing sequence of bits enemy will observe that some criminal message
is being sent and we have a tendency to might land –up in a problematic scenario. However, if one uses each ways, this may lead to
‘security in depth’. The message ought to initial be encoded victimization a powerful cryptography rule and then embedded into a
carrier.

REFERENCES
[1] Brij Mohan Kumar
1
, Prof. Y. S. Thakur
2
“An Introduction to Steganography Techniques in the Field of Digital Image Processing” proceedings of IJESC
Volume 7 Issue No.6.
[2] C. Cachin, “An Information-Theoretic Model for Steganography”, Proceedings of 2nd Workshop on Information Hiding, MIT Laboratory for Computer
Science, May 1998.