Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 13

LCET KATANI KALAN ________________________________________________________

Synopsis on Image Steganography


SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR project at LCET, Katani-kalan

SUBMITTED BY RAMANJIT SINGH Electronics and communication engineering 6711 100496880602

Electronics and communication Department LUDHIANA COLLEGE OF ENGINEERING & TECHNOLOGY KATANI-KALAN, LUDHIANA. Guided by -: Prof. Jagdev Singh Submitted to-: Prof. R. K. Aggarwal H.O.D (ECE Dept.)

LCET KATANI KALAN ________________________________________________________

ACKNOWLEDGEMENT

I am highly grateful to Dr. J. S. Sohal, Director, Ludhiana College of Engineering & Technology Katani-kalan, for providing this opportunity to carry out my project at this college. I am thankful to my teachers for their help and assistance. I want to thank Prof.R.K.Aggarwal(HOD-ECE Dept.), Prof.Jagdev singh for their innovative ideas and help.

I expresses gratitude to other faculty members of Electronics and Communication Department of LCET Katani-kalan for their intellectual support throughout the course of this work.

Project objective

This project includes processing of image Data hiding, it means you are now able to hide your data in pixels of image. It is simply art of hiding information in ways that prevent detection of hidden messages. In Greek steganography means covered writing

The goal of the project is to construct an introductory tutorial on the subject of steganography, mainly focused on embedding text data in digital images. The primary reason for selecting steganography among the list of possible project topics was due to the unfamiliarity of the word that twigged an interest in the subject.

Theoretical information in brief Steganography is the art of hiding something in plain sight. This something could be a signal, a sound file, A picture, or an image or any other object that may be useful to hide data. An image is nothing more than strings and strings of bytes, each byte representing a different color. The last few bits in a color byte, however, do not hold as much significance as the first few. This is to say that two bytes that only differ in the last few bits can represent two colors that are virtually indistinguishable to the human eye. For example, 00100110 and 00100111 can be two different shades of red, but since it is only the last bit that differs between the two, it is impossible to see the color difference. LSB steganography, then, alters these last bits by hiding a message within them. One way of doing this is as follows. Say I wished to hide the first letter of my first name in a small section of an image. This letter is ?I,? and the ASCII for I is 01001001. As seen from the illustration, the last bit of every byte is replaced with the corresponding bit from the letter I. The bits that have been altered are underlined.The new image now contains the desired text of the ?I? without degrading the quality of the image since only the least significant bits were altered. As it is known to all of persons that has already gone through some of basic image processing that your image has its color part as a combination of Red, Green and Blue values and also your brightness factor is related to it. We can use any of these available values, as in our case we gone through the blue part, we hide our data in byte values of pixels values for color, As by using imread function you can get any image in matrix form and that matrix will contain three different arrays, First array will be of Red, second of Green and third of Blue respectively. So to save our data like if you have to save Hello in an image you will firstly read it in matrix form and than read last or you can say third matrix and after reading third matrix its dimensions will depends on the image size, as per according to images height and width.

The matrix will contains values i.e. result of imread like shown below { 122, 122, 144,123,205,55,35,88,22,225,125,223,}, for red { 142, 182, 104,193,105,255,035,188,22,25,15,33,}, for green { 22, 12, 44,13,05,54,135,188,122,25,125,223,}, for blue Use blue one { 22, 12, 44,13,05,54,135,188,122,25,125,223,}, for blue Hello = {72 101 108 108 111} So new value for blue one is { 5,72, 101, 108,108,111,54,188,122,25,125,223,}, for blue Stego key = 5 Stego key is useful for decoding time. In our case it tells us how many values has to read during decoding time. For all above process we divide it in to steps and named it as hider and decoder. Hider file is a GUI which contain a user friendly environment for the user to hide its data in image which should be select by the user too by load image button than there is Pre Analysis which gives results as how many bytes can be hide in selected image, After that you have to load text file by pressing load text button, this will load text file and after pressing hide button this will add text file to your image, Right side status of your adding process will be shown to you. Status will show processing, Not Done or Done. After getting Done your hider can exit, now copy your image file with named as code_image.png or bys selecting path of your code_image by browser after pressing load image same as you did in hider .

Steganography Methods:The different types of steganographic techniques available are: 1. Pure Steganography 2. Public key Steganography 3. Secret key Steganography
(1) Pure Steganography: Pure Steganography is the process of embedding

the data into the object without using any private keys. This type of Steganography entirely depends upon the secrecy. This type of Steganography uses a cover image in which data is to be embedded, personal information to be transmitted, and encryption decryption algorithms to embed the message into image. These types of steganography cant provide the better security because it is easy for extracting the message if the unauthorised person knows the embedding method. It has one advantage that it reduces the difficulty in key sharing.

Figure 7. Pure Steganography process (2) Secret key Steganography: Secret key Steganography is another process

of Steganography which uses the same procedure other than using secure keys. It uses the individual key for embedding the data into the object which is similar to symmetric key. For decryption it uses the same key which is used for encryption. This type of Steganography provides better security compared to pure Steganography. The main problem of using this type of steganographic system is sharing the secret key. If the attacker knows the key it will be easier to decrypt and access original information.

Figure 8. Secret key Steganography Process

(3) Public key Steganography: Public key Steganography uses two types of

keys: one for encryption and another for decryption. The key used for encryption is a private key and for decryption, it is a public key and is stored in a public database

Figure 9. Public key Steganography Process

User Case Diagram

Block diagram.

Hider figure or diagram

Step by step work in detail with hours Scheduling According to the requirement, every project will be well scheduled. So on that basis I had tried to schedule my project Perfectly.
Task Estimated Hours 20 15 10 3 5 2 55

Gather Requirements. Design Tutorial. Project implementation. Test Example Programs. Writing final report Test & Assess Tutorial. Total Number of Hrs:

Applications of project 1. Confidential communication and secret data storing 2. Protection of data alteration. 3. Access control system for digital content distribution 4. Media Database systems

You might also like