Professional Documents
Culture Documents
FYP Presenatation Steganography
FYP Presenatation Steganography
2
Project Idea
To combine two security techniques
1. Cryptography
(For Encryption & Decryption) 2.
Steganography (For
Data hiding in a multimedia object)
3
COMBINATION OF STEGANOGRAPHY
AND CRYPTOGRAPHY
4
Some Historic wExamples:
9
IMAGE
WATERMARKING
10
IMAGE WATERMARKING:
VISIBLE
Viewable to the normal eye.
INVISIBLE
Not viewable by ordinary eye.
More secure and robust.
CHARACTERISTICS OF
IMAGE WATERMARKING
ROBUSTNESS
IMPERCEPTIBLITY
SECURITY
APPLICATION OF IMAGE
WATERMARKING
Copy prevention and control
ID card and security
Transaction tracking
Authentication of image content
APPLICATION OF IMAGE
WATERMARKING
Copy Prevention and Control
ID card and Security
APPLICATION OF IMAGE
WATERMARKING
Transaction Tracking
APPLICATION OF IMAGE
WATERMARKING
Authentication of Image Content
IMAGE WATERMARKING METHODS
Spatial Domain
Methods
LSB Method
Transform domain
Apply Discrete
Wavelet Encryption Encryption Key
Transform(DWT)
Embedding
Encoder
Apply Inverse
Discrete Wavelet
Transform(IDWT)
20
Stego Image
CONVERTING FROM RGB TO
YCBCR
• Red
• Green
• Blue
RGB
WAVELET TRANSFORM
Non
Orthogo
redunda
Slow nal
nt
reconstr wavelet
Continuous informat
uction of Dilation and Discrete s
translation
ion wavelet
the
transform
signal
CONTINOUS Rapid
Discrete
dilation
WAVELET signal
reconstr
and
translati
uction
TRANSFORM on
DWT can be
• 1- Dimensional
• 2-Dimensional
• 3- Dimensional
1-DIMENSIONAL DISCRETE
WAVELET TRANSFORM
Original Image
Row-wise DWT
LL1 HL1
Frequency Frequency
Details Details
LH1 HH1
Frequency Frequency
Details Details
LL2 HL2
HL1
LH2 HH2
LH1 HH1
2-DIMENSIONAL WAVELET
3- LEVEL 2-DIMENSIONAL
WAVELET
HL2
HL1
LH2 HH2
LH1 HH1
Haar-Wavelet Transform
xn ,i {10,13,25,26,29,21,7,15}
xn , 2i xn , 2i 1 xn , 2i xn , 2i 1
xn 1,i d n 1,i
2 2
Apply Discrete
Wavelet Encryption Encryption Key
Transform(DWT)
Embedding
Encoder
Apply Inverse
Discrete Wavelet
Transform(IDWT)
38
Stego Image
ENCRYPTION
• The process of obscuring information to
make it unreadable without special
knowledge.
• Done by using an encryption algorithm, a
formula used to turn plain text into cypher
text
39
WHY USE ENCRYPTION
• Authentication
• Privacy
• Integrity
40
FUNCTION FOR
ENCRYPTION
Use a two-character Hill cipher with arithmetic
modulo 97, a prime.
44
DEGREE OF INVISIBLITY
45
PEAK SIGNAL TO NOISE RATIO
Image Data in bits PSNR
Lena 480 43.3206
800 39.5925
1040 38.0499
1200 36.9236
1600 35.6237
Mandrill 480 37.4194
800 34.4062
1040 33.5
1200 32.0866
1600 30.24
Peppers 480 38.6451
800 37.156
1040 35.7352
1200 34.9357
1600 33.6473
PSNR VERSUS DATA IN BITS
PSNR Versus No of Data in Bits
47.5
42.5
37.5
32.5
27.5
22.5 Mandril
PSNR
Peppers
17.5 Lenna
12.5
7.5
2.5
No of Data in Bits
THE PROTOTYPE SOFTWARE
Features:
• Hiding Data
• Extracting Data
• Analysis of the images
48
Hiding data into the image Retrieving data from the image
Select image
Write The Message
Encrypt Data
Embedding Data
Analysis
Select Image
JOURNEY THROUGH THE PROJECT
Tasks Jan Feb March April May June July August Sept
Literature Review
Implementation Of
Data Embedding
Technique
Implementation Of
Data Extraction
Technique
Simulation using
graphical user
interface
Report Writing
65