You are on page 1of 5

ACKNOWLEDGEMENT:

I would like to express my gratitude to Dr. S S Injaganeri for providing us infrastructure to


carry out this seminar. I am extremely grateful and remain indebted to my guide Prof. P V
Kulkarni for being a source of inspiration and for her constant support in the information
gathering, preparation documents, editing and report making of this seminar. She has been
very co-operative throughout this seminar process. Through this column, it would be my at
most pleasure to express a warm thankfulness to her encouragement, co-operation, and
consent without which I might not be able to accomplish this seminar on the topic
"Steganography".

I would like thanking our beloved HOD Dr. Shobha R Patil for providing us an opportunity
to learn new technologies and Seminar Co-Ordinator Dr. S P Bangarashetti for all the
cooperation, instructions and guidance in making this seminar presentation smooth and
knowledgeable.

Lastly, I would extend my gratitude to everyone who has directly or indirectly been involved
in helping and guiding me to research and learn about this seminar and making it successful.
ABSTRACT:

Steganography comes from the Greek and literally means, "Covered or secret
writing". Although related to cryptography, they are not the same. Steganography’s intent is
to hide the existence of the message, while cryptography scrambles a message so that it
cannot be understood.

Steganography is one of various data hiding techniques, which aims at transmitting a


message on a channel where some other kind of information is already being transmitted.
This distinguishes Steganography from covert channel techniques, which instead of trying to
transmit data between two entities that were unconnected before.

The goal of Steganography is to hide messages inside other “harmless” messages in a


way that does not allow any “enemy” to even detect that there is a second secret message
present. The only missing information for the “enemy” is the short easily exchangeable
random number sequence, the secret key, without the secret key, the “enemy” should not have
the slightest chance of even becoming suspicious that on an observed communication
channel, hidden communication might take place.
LIST OF CONTENTS

CHAPTER NAME PAGE NO:


CERTIFICATE FROM COLLEGE I

ACKNOWLEDGEMENT II

ABSTRACT III

LIST OF CONTENTS IV

LIST OF FIGURE V

LIST OF TABLE VI
1. INRODUCTION ..........................................................................................................1
1.1 STEGANOGRAPHY .............................................................................................. 2
1.2 STEGANOGRAPHY V/S CRYPTOGRAPHY.....................................................4

2. DIGITAL IMAGE STEGANOGRAPHY ....................................................... 8

2.1. DIGITAL IMAGES ................................................................................................ 5


2.2. STEGANOGRPAHIC TECHNIQUES ............................................................... 6
3. DETAILED IMAGE STEGANOGRAPHY WORK BASED ON
LSB INSERTION………………………………...............................................14
3.1. ADVANTAGES OF LSB ALGORITHM.............................................................. ..15
3.2. DISADVANTAGES ..................................................................................................17
4. SCREENSHOTS ................................................................................................…….27

5. STEGANOGRAPHIC APPLICATION…......................................................31
5.1 CONFIDENTIAL COMMUNICATION AND SECRET DATA
STORING..........................…………………………………………………………………
……………………..32

5.2 PROTECTION OF DATA ALTERATION ..............................................................

5.3 ACCESS CONTROL SYSTEM FOR DIGITAL CONTENT


DISTRIBUTION...........................................................................................................

5.4 MEDIA DATABASE SYSTEM................................................................................


6. CONCLUSION...................................................................................... 35
7. SCOPE FOR THE FUTURE WORK.................................................. 38
8. REFERENCES ..................................................................................... 39
9. APPENDIX........................................................................................................................
List of Figures:
FIGURE NO. PAGE NO.

Figure 1 General scheme of steganography 3

Figure 2 Different steganography fields 7

Figure 3 Matrix and bits representation of an image file 8

Figure 4 Flow Diagram of PDS Steganography 15

Figure 5 Accessing bits of an image 16

Figure 6 Accessing the Bits of a Text File 16

Figure 7 Inserting the Text Bits into the Image 18

Figure 8 Extracting text from modified image 19

Figure 9 Fujitsu exploitation of steganography (BBC News, 35


2007) shows a sketch representing the concept

Figure 10 Displays the application of deployment into a 35

mobile phone

You might also like