Professional Documents
Culture Documents
Paper 25 Stegnography
Paper 25 Stegnography
Presented by
Tuaha Nomani (nomani@cae.nust.edu.pk)
Department of Avionics Engineering, College of Aeronautical Engineering
National University of Sciences and Technology, Islamabad
Sequence
• Introduction
• Cryptography
• Steganography
• Image Steganography
• Applications
• Literature Survey
• Different Techniques
• Conclusion
• Q&A Session
2/42
Introduction
3/42
Cryptography
[1] F. A. P. Peticolas,, “Information hiding-a survey”, Proceedings of the IEEE, Vol. 87, pp. 1062-1078, 1999 4/42
Steganography
• An ability to hide the information
for security purposes.
• It helps in achieving the good
information security.
• To hide the communicated
information in any other
information like
[2] N. Chen, C. Su, C. Shih and Y. Chen, “Reversible watermarking for medical images using histogram shifting with
location map reduction,” 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, 2016, pp. 792-797 5/42
Flow of Steganography
7/42
Image Steganography
• The technique of hiding data within an image file.
• That prevents the unintended user from the detection of
hidden messages or data.
8/42
Applications of Image
Steganography
• Secure private files and documents.
• Hide passwords and Encryption keys.
• Transport Highly private documents between
international Governments.
• Transmit message/data without revealing the existence
of available message.
9/42
Least Significant Bit
[3] Musa EP, Philip S. “Secret communication using image steganography, African Journal of Computing and ICT, Vol 8.
No. 3, pp. 1-8, Sep 2015. 10/42
LSB Matching
[4] W. Luo, F. Huang and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” in IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, June 2010. 12/42
LSB Matching
[4] W. Luo, F. Huang and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” in IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, June 2010. 13/42
LSB Matching
14/42
Modified Signed Digit (MSD)
[5] W. C. Kuo, C. C. Wang, H. C. Hou, “Signed digit data hiding scheme”, Information Processing Letters, vol. 116, no. 2,
pp. 183-191, February 2016. 15/42
Modified Signed Digit (MSD)
17/42
Data Encryption Standard (DES)
[6] Manoj Kumar Ramaiya, N. Hemrajani and A. K. Saxena, “Security improvisation in image steganography using DES,”
2013 3rd IEEE InternationalAdvanceComputingConference(IACC),Ghaziabad,2013, pp. 1094-1099. 18/42
Data Encryption Standard (DES)
19/42
Gabor Filter
[7] Z. Z. Kermani and M. Jamzad, “A robust steganography algorithm based on texture similarity using Gabor filter,”
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005., Athens,
2005, pp. 578-582. 20/42
Steganography using Secret
Keys
• Using 2 private keys to randomize the embedding
process.
• Improve the security level of the hidden information.
• It used a pixels R, G, B values and performed a few
mathematical calculations.
• Data to be hidden is inserted randomly.
• For evaluation PSNR was used that helped to assess
the quality.
• Concluded more efficient than others.
[8] S. Dagar, “Highly randomized image steganography using secret keys,” International Conference on Recent
Advances and Innovations in Engineering (ICRAIE-2014), Jaipur, 2014, pp. 1-5. 21/42
Steganography using Secret
Keys
Cover Image
Secret Information
22/42
Steganography using Secret
Keys
Lena 49.2668
Baboon 48.8766
Peppers 47.9887
23/42
Discrete Wavelet Transform
[9] P. B. Kutade, P. S. Arora Bhalotra, “A Survey on Various Approaches of Image Steganography”, International Journal
of Computer Applications (0975 8887), vol. 109, no. 3, 2015. 24/42
RGB Based Steganography
[10] G. Swain, S. K. Lenka, “A novel approach to RGB channel based image steganography technique”, International
Arab Journal of e-Technology, vol. 2, no. 4, pp. 181-186, 2012. 25/42
RGB Based Steganography
Cover Image PSNR (in dB)
Lena 49.67
Garden-Home 50.26
Road 50.79
Player 50.31
26/42
Encryption through RSA
(Rivest-Shamir-Adleman)
• RSA is use to encrypt the data from different attacks by
using two keys
• Public key
• Private key
• In RSA algorithm, anyone can encrypt the data but no
one can decrypt it except some authorized receiver.
• Here, it is use for encoding and decoding the brain
images by using both keys in pairs.
[11] B. J. S. Kumar, V. K. R. Raj, and A. Nair, “Comparative study on AES and RSA algorithm for medical images,” in
2017 International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 0501-0504. 27/42
Encryption through AES
(Advance Encryption Standard)
• AES based on Substitution Permutation Network.
• AES is use for data encryption and decryption by using
same private key.
• It can keep their digital images safe.
• AES encompasses three block ciphers,
• AES-128
• AES-192
• AES-256
• AES is more efficient in both encryption and decryption.
[11] B. J. S. Kumar, V. K. R. Raj, and A. Nair, “Comparative study on AES and RSA algorithm for medical images,” in
2017 International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 0501-0504. 28/42
HAAR Discrete Wavelet
Transform
• Haar wavelet is the simplest discrete wavelet transform.
• Through this method a steganographic algorithm is
capable of hiding the secret data.
• By applying Haar Wavelet on an image, we get
• Approximation coefficients LL , LH
• Detailed coefficients HL , HH
• In this research the proposed approach includes 2 main
process
• Embedding process
• Extracting process
[12] E. H. Houssein, M. A. S. Ali and A. E. Hassanien, “An image steganography algorithm using Haar Discrete Wavelet
Transform with Advanced Encryption System,”2016 Federated Conferenceon Computer Science and Information
Systems (FedCSIS), Gdansk, 2016, pp. 641644. 29/42
HAAR Discrete Wavelet
Transform
30/42
HAAR Discrete Wavelet
Transform
31/42
HAAR Discrete Wavelet
Transform
32/42
Conclusion
33/42
References
• F. A. P. Peticolas,, “Information hiding-a survey”, Proceedings of the IEEE, Vol. 87, pp. 1062-1078, 1999
• N. Chen, C. Su, C. Shih and Y. Chen, “Reversible watermarking for medical images using histogram shifting with location
map reduction,” 2016 IEEE International Conference on Industrial Technology (ICIT), Taipei, 2016, pp. 792-797
• Musa EP, Philip S. “Secret communication using image steganography, African Journal of Computing and ICT, Vol 8. No.
3, pp. 1-8, Sep 2015.
• W. Luo, F. Huang and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” in IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, June 2010.
• W. C. Kuo, C. C. Wang, H. C. Hou, “Signed digit data hiding scheme”, Information Processing Letters, vol. 116, no. 2,
pp. 183-191, February 2016.
• Manoj Kumar Ramaiya, N. Hemrajani and A. K. Saxena, “Security improvisation in image steganography using DES,”
2013 3rd IEEE InternationalAdvanceComputingConference(IACC),Ghaziabad,2013, pp. 1094-1099.
• Z. Z. Kermani and M. Jamzad, “A robust steganography algorithm based on texture similarity using Gabor filter,”
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.,
Athens, 2005, pp. 578-582
• S. Dagar, “Highly randomized image steganography using secret keys,” International Conference on Recent Advances
and Innovations in Engineering (ICRAIE-2014), Jaipur, 2014, pp. 1-5.
• P. B. Kutade, P. S. Arora Bhalotra, “A Survey on Various Approaches of Image Steganography”, International Journal of
Computer Applications (0975 8887), vol. 109, no. 3, 2015.
• G. Swain, S. K. Lenka, “A novel approach to RGB channel based image steganography technique”, International Arab
Journal of e-Technology, vol. 2, no. 4, pp. 181-186, 2012..
34/42
References
• B. J. S. Kumar, V. K. R. Raj, and A. Nair, “Comparative study on AES and RSA algorithm for medical images,” in 2017
International Conference on Communication and Signal Processing (ICCSP), 2017, pp. 0501-0504.
• E. H. Houssein, M. A. S. Ali and A. E. Hassanien, “An image steganography algorithm using Haar Discrete Wavelet
Transform with AdvancedEncryptionSystem,”2016FederatedConferenceonComputer Science and Information Systems
(FedCSIS), Gdansk, 2016, pp. 641644.
• D.L.Vasoya,V.M.Vekariya and P.P.Kotak, “Novel approach forimage steganography using classification algorithm,” 2018
2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, 2018, pp. 1079-1082.
• M. Douglas, K. Bailey, M. Leeney, K. Curran, “Using SVD and DWT Based Steganography to Enhance the Security of
Watermarked Fingerprint Images”,Telkomnika, vol. 13, June 2015.
• M.S. Subhedar, V.H. Mankar, “Image steganography using redundant discrete wavelet transform and qr factorization”,
Computers & Electrical Engineering, vol. 54, pp. 406-422, 2016.
• R. M. Chao, H. C. Wu, C. C. Lee, Y. P. Chu, “A novel image data hiding scheme with diamond encoding”, EURASIP J.
Inf. Security, vol. 2009, 2009.
• N. M. Surse and P. Vinayakray-Jani, “A comparative study on recent image steganography techniques based on DWT,”
2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai,
2017, pp. 1308-1314.
• R. Sreejith and S. Senthil, “A novel tree based method for data hiding and integrity in medical images,
”2017IEEEInternationalConferenceon Electrical, Instrumentation and Communication Engineering (ICEICE), Karur,
2017, pp. 1-4.
35/42
Questions
36/42
PSNR
37/42