phase 1 ppt

Upload: manan-bakshi

Post on 04-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Phase 1 PPT

    1/19

    Project Seminar on Steganography

    Using LSB Substitution Method

    Submitted By -

    Iti Sri

    1KS09CS033

    Kumari Pallavi

    1KS09CS057

    Manan Bakshi

    1KS09CS034

    2/26/2013 1Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    2/19

    Table of Contents

    Introduction to Steganography

    Review of Literature

    Motivation Problem Definition

    Objectives

    System Requirements References

    2/26/2013 2Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    3/19

    What is Steganography?

    Greek Words:STEGANOSCovered

    GRAPHIEWriting

    Steganography is the art and science

    of writing hidden messages in such a

    way that no one apart from the

    intended recipient knows of the

    existence of the message.

    This can be achieve by concealing the

    existence ofinformation withinseemingly harmless carriers or cover

    Carrier: image, video, audio, etc.

    2/26/2013 3Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    4/19

    Watermarking vs. Steganography

    Goal of steganography

    Intruder cannot detect a message

    Primarily 1:1 communication

    Goal of watermarking

    Intruder cannot remove or replace the message Primarily 1:many communication

    2/26/2013 4Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    5/19

    Steganography, Cryptography, and Watermarking

    There are two major branches of information hiding,Steganography and Watermarking

    Watermarking: Communication in watermarking is the host signal, with

    the embedded data providing copyright protection.

    The existence of a watermark is often declared openly.

    Any attempt to remove or invalidate the embeddedcontent renders the host useless.

    2/26/2013 5Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    6/19

    Cryptography:

    Doesnt conceal the communication. Scrambles the data to prevent eavesdroppers

    understanding the content. Cryptography involves various methods and

    implementations. May be considered complementary and

    orthogonal (unrelated).

    Once the presence of hidden information is revealedor even suspected, the purpose of steganographyis defeated.

    2/26/2013 6Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    7/19

    2/26/2013 7Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    8/19

    we can hide the message by substituting the

    LSB of each pixel with information bits in 24bpp RGB image. 24 bpp RGB image is a 24 bit

    depth colour image using RGB colour model.

    24 bit refers to 8 bit for each RGB colourchannel, i.e. 8 bits for red, 8 bits for green and

    8 bits for blue.

    2/26/2013 8Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    9/19

    This implies that we can store three bits of

    information per pixel at the LSB of RGB. By

    changing the LSB of RGB values of each pixel,

    we may get maximum 2X2X2=8 different

    shades. This change in the pixel bits will be

    indiscernible to the human eye

    2/26/2013 9Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    10/19

    Literature Review

    M. M Amin, M. Salleh, S . Ibrahim, M.R.K Atmin, and M.Z.I.

    Shamsuddin, Information hiding using steganography, IEEE 4th National

    Conference on Telecommunication Technology Proceedings, Shah Alam,

    Malaysia, pp. 21-25, January 2003.

    Deshpande Neeta, Kamalapur Snehal and Daisy Jacobs, Implementation

    of LSB steganography and its evaluation for various bits, IEEE 1st

    International Conference on Digital Information Management, India, pp.

    173-178, December 2006.

    S .K. Moon and R.S. Kawitkar, Data security using data hiding, IEEE

    International Conference on Computational Intelligence and Multimedia

    Applications, India, pp. 247-251, January 2007

    2/26/2013 10Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    11/19

    Literature Review Contd

    A Vadivel, A.K.Majumdar and Shamik Sural, Performance comparison of

    distance matrices in context-based image retrieval applications, IITkharagpur research work.

    Beenish Mehboob and Rashid Aziz Faruqui, A steganographyimplementation, IEEE-International symposium on Biometrics & securitytechnologies, ISBAST, Islamabad, April 2008.

    Gandharba Swain and Saroj Kumar Lenka, A hybrid approach tosteganography embedding at darkest and brightest pixels, Proceedings ofthe International Conference on Communication and ComputationalIntelligence ,Kongu Engineering College, Perundurai, Erode, T.N., India,pp.529-534, December 2010.

    V. Lokeswara Reddy, Dr. A. Subramanyam and Dr.P. Chenna Reddy,Implementation of LSB steganography and its evaluation for various fileformats, Int. J. Advanced Networking and Applications, vol. 2, pp.868-872,2011.

    2/26/2013 11Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    12/19

    Motivation

    Steganography received little attention in computing

    Renewed interest because of industry desire to protect

    copyrighted digital work

    audio images

    video

    Text

    Detect counterfeiter, unauthorized presentation, embed key,

    embed author ID

    2/26/2013 12Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    13/19

    Problem Definition

    Conventional LSB technique uses the least significant

    bit of consecutive pixels for embedding the message

    which draws suspicion to transmission of a hidden

    message. If the suspicion is raised, then the goal ofsteganography is defeated.

    2/26/2013 13Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    14/19

    Objectives

    Increase The robustness of Algorithm by

    using keyless steganography

    Propose a novel technique to hide

    information in a 24 bpp RGB image usingmodified LSB substitution method.

    Security Enhancement in Comparison with

    Conventional AlgorithmsTo Increase Capacity of storing information

    per pixel.

    2/26/2013 14Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    15/19

    Software Requirements

    Application Used for Development:-

    Language:- Java (jdk6)

    Development Tool:-Eclipse, Notepad

    Platform:-Cross Platform

    Essential Software:-Java Runtime Environment

    2/26/2013 15Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    16/19

    Hardware Requirements

    1 Mega Byte disc space.

    Minimum 512 MB RAM.

    Pentium 3 or above processor.

    700 MHz processor speed.

    2/26/2013 16Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    17/19

    References

    Petitcolas, F.A.P., Anderson, R., Kuhn, M.G., "Information Hiding - ASurvey", July1999, URL:http://www.cl.cam.ac.uk/~fapp2/publications/ieee99-infohiding.pdf(11/26/0117:00)

    Farid, Hany, Detecting Steganographic Messages in Digital Images

    Department of Computer Science, Dartmouth College, Hanover NH 03755 Moby Words II, Copyright (c) 1988-93, Grady Ward. All Rights Reserved.

    Lyu, Siwei and Farid, Hany, Steganalysis Using Color Wavelet Statistics andOne-Class Support Vector Machines, Department of Computer Science,Dartmouth College, Hanover, NH 03755, USA

    Farid, Hany, Detecting Hidden Messages Using Higher Order StatisticalModels Department of Computer Science, Dartmouth College, HanoverNH 03755

    2/26/2013 17Department of Computer Science &Engineering,KSIT,Bangalore

  • 7/29/2019 Phase 1 PPT

    18/19

    Wikipedia

    Exploring Steganography: Seeing the Unseen

    N. Johnson & S. Jajodia

    www.jjtc.com/stegdoc/steg1995.html

    Information Hiding: Techniques for

    Steganography and Digital Watermarking S.Katzenbeisser, F. Petitcolas

    Digital Watermarking H. Bergel, L.

    OGorman

    2/26/2013 18Department of Computer Science &Engineering,KSIT,Bangalore

    http://en.wikipedia.org/wiki/Steganographyhttp://en.wikipedia.org/wiki/Steganography
  • 7/29/2019 Phase 1 PPT

    19/19

    Thank You !

    2/26/2013 19Department of Computer Science &Engineering,KSIT,Bangalore