Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 65

DIGITAL STEGANOGRAPHY;

HIDING DATA WITHIN DATA


USING IMAGE
WATERMARKING
Group Members: Internal Advisor:
Ms. Uzma Parveen
Maham Ali EE-075 External:
Madiha Iqbal EE-079
Dr. Ghazanfar Monir
Sana Wajid EE-091
Saima Zaib EE-099
INFORMATION security

2
Project Idea
To combine two security techniques
1. Cryptography
(For Encryption & Decryption) 2.
Steganography (For
Data hiding in a multimedia object)

3
COMBINATION OF STEGANOGRAPHY
AND CRYPTOGRAPHY

4
Some Historic wExamples:

• Messages written on shaved head of messengers and


hidden by regrowth of hair.

• Covering wood scraped with messages by wax.


• Microdots using invisible ink to wrtie in between lines of
• Writing in between lines of ordinary
documents with invisible ink.
• Chinese silk balls
HOW STEGANOGRAPHY WORKS
Techniques of steganography
WHAT IS DIGITAL
STEGANOGRAPHY?

Images Video Audio


DIGITAL Steganography using image
watermarking
 REASONS:
• It can contain enough information to hide,
while not appearing to be modified.
• It is common enough to not attract any
attention.

9
IMAGE
WATERMARKING

10
IMAGE WATERMARKING:
VISIBLE
Viewable to the normal eye.

INVISIBLE
Not viewable by ordinary eye.
More secure and robust.
CHARACTERISTICS OF
IMAGE WATERMARKING
ROBUSTNESS

IMPERCEPTIBLITY

SECURITY
APPLICATION OF IMAGE
WATERMARKING
Copy prevention and control
ID card and security
Transaction tracking
Authentication of image content
APPLICATION OF IMAGE
WATERMARKING
Copy Prevention and Control
ID card and Security
APPLICATION OF IMAGE
WATERMARKING
Transaction Tracking
APPLICATION OF IMAGE
WATERMARKING
Authentication of Image Content
IMAGE WATERMARKING METHODS

Spatial Domain
Methods

Hides data in pixels Hides data in


transformed image
coefficients
APPROACHES TO
Spatial domain

LSB Method

Bit Plane Complexity Steganography

Transform domain

Discrete Cosine Transform

Discrete Wavelet Transform


WHICH METHOD TO PREFER
Spatial Domain Method Transform Domain method

• Less complex. • Complexity increases


• Not robust against • More robust
attacks
ALGORITHM TO HIDE INFORMATION

Host Image Information need


to hide
Convert RGB to
YCbCr

Selection of Y Conversion into


component Bits

Apply Discrete
Wavelet Encryption Encryption Key
Transform(DWT)

Embedding
Encoder
Apply Inverse
Discrete Wavelet
Transform(IDWT)
20
Stego Image
CONVERTING FROM RGB TO
YCBCR

• Red
• Green
• Blue

RGB
WAVELET TRANSFORM

A versatile mathematical tool to


analyze transient, time variant
signals
TYPES OF WAVELET
TRANSFORM
DISCRETE
WAVELET
Large Non- TRANSFORM
redunda Orthogo
ncy Continuous
nal
wavelet
transform

Non
Orthogo
redunda
Slow nal
nt
reconstr wavelet
Continuous informat
uction of Dilation and Discrete s
translation
ion wavelet
the
transform
signal

CONTINOUS Rapid
Discrete
dilation
WAVELET signal
reconstr
and
translati
uction
TRANSFORM on
DWT can be
• 1- Dimensional
• 2-Dimensional
• 3- Dimensional
1-DIMENSIONAL DISCRETE
WAVELET TRANSFORM
Original Image

Low Pass Filter High Pass Filter


2-DIMENSIONAL DISCRETE
WAVLET TRANSFORM
Original Image

Row-wise DWT

Low (L) Frequency Details High (H) Frequency Details

LL1 LH1 HL1 HH1


Frequency Frequency Frequency Frequency
Column-wise DWT Column-wise DWT
Details Details Details Details
• Approximation
• Vertical Details
Details

LL1 HL1
Frequency Frequency
Details Details

LH1 HH1
Frequency Frequency
Details Details

• Horizontal Details • Diagonal Details


2-DIMENSIONAL DISCRETE
WAVELET TRANSFORM
2-DIMENSIONAL DISCRETE
WAVELET TRANSFORM

LL2 HL2
HL1
LH2 HH2

LH1 HH1
2-DIMENSIONAL WAVELET
3- LEVEL 2-DIMENSIONAL
WAVELET
HL2
HL1
LH2 HH2

LH1 HH1
Haar-Wavelet Transform

xn ,i  {10,13,25,26,29,21,7,15}
xn , 2i  xn , 2i 1 xn , 2i  xn , 2i 1
xn 1,i  d n 1,i 
2 2

{xn 1,i , d n 1,i }  {11 .5,25.5,25,11,1.5,0.5,4,4}


Haar-Wavelet Transform

xn , 2i  xn 1,i  d n 1,i xn , 2i 1  xn 1,i  d n 1,i

Inverse Discrete Wavelet Transform (IDWT) of the Haar-wavelet


transform.
2D Haar-wavelet Transform
ALGORITHM FOR HIDING INFORMATION
Host Image Information need
to hide
Convert RGB to
Ycbcr

Selection of Y Conversion into


component Bits

Apply Discrete
Wavelet Encryption Encryption Key
Transform(DWT)

Embedding
Encoder
Apply Inverse
Discrete Wavelet
Transform(IDWT)
38
Stego Image
ENCRYPTION
• The process of obscuring information to
make it unreadable without special
knowledge.
• Done by using an encryption algorithm, a
formula used to turn plain text into cypher
text

39
WHY USE ENCRYPTION
• Authentication
• Privacy
• Integrity

40
FUNCTION FOR
ENCRYPTION
Use a two-character Hill cipher with arithmetic
modulo 97, a prime.

Choose two characters above ASCII 128 to


expand the size of the character set from 95 to
97.

Convert the character to numerical values to


prepare for the matrix-vector product by forming a
matrix with two rows and lots of columns.

Encode with matrix multiplication modulo p and


reshape resulting matrix into a single row.

If length(x) is odd, encode the last character.


Finally covert the numbers back to characters to
get encrypted message.
MEASURES TO DETERMINE
THE QUALITY OF THE
STEGO IMAGE
• Mean Square Error
Cumulative squared error between
the stego image and the original image
•Peak Signal To Noise Ratio
Performance measurement for image
distortion
ALGORITHM FOR EXTRACTION OF
INFORMATION
EXPERIMENT AND RESULTS

44
DEGREE OF INVISIBLITY
45
PEAK SIGNAL TO NOISE RATIO
Image Data in bits PSNR
Lena 480 43.3206
800 39.5925
1040 38.0499
1200 36.9236
1600 35.6237
Mandrill 480 37.4194
800 34.4062
1040 33.5
1200 32.0866
1600 30.24
Peppers 480 38.6451
800 37.156
1040 35.7352
1200 34.9357
1600 33.6473
PSNR VERSUS DATA IN BITS
PSNR Versus No of Data in Bits
47.5

42.5

37.5

32.5

27.5

22.5 Mandril
PSNR

Peppers
17.5 Lenna

12.5

7.5

2.5

480 800 1040 1200 1600


Mandril 37.4194 34.4062 33.5 32.0866 30.24
Peppers 38.6451 37.156 35.7352 34.9357 33.6473
Lenna 43.3206 39.5925 38.0499 39.9236 35.6237

No of Data in Bits
THE PROTOTYPE SOFTWARE
Features:
• Hiding Data
• Extracting Data
• Analysis of the images

48
Hiding data into the image Retrieving data from the image
Select image
Write The Message
Encrypt Data
Embedding Data
Analysis
Select Image
JOURNEY THROUGH THE PROJECT
Tasks Jan Feb March April May June July August Sept

Literature Review

Implementation Of
Data Embedding
Technique

Implementation Of
Data Extraction
Technique

Simulation using
graphical user
interface

Report Writing

65

You might also like