Professional Documents
Culture Documents
STEGANOGRAPHY
Mr. Jala Prasadarao 1 T v n v k s swaroop 2 Shaik Asha Parveen 3
Assistant Professor Student Student
Department of Computer Science and Engineering Department of CSE Department of CSE
Godavari Institute of Engineering and Technology (A) GIET (A) GIET (A)
prasadarao@giet.ac.in saiswaroopt514@gmail.com ashaparveenshaik786@gmail.com
Abstract: Data is becoming increasingly important in the modern sender wants to remain private is known as the message, and it
days since information depends on raw data. Sharing resources will be included in the cover object using a stego system
among distributed users who may be geographically separated encoder.
requires the sharing of information. Users should safeguard their
privacy and confidentiality while sharing data. This digitally II. CRYPTOGRAPHY VS. STEGANOGRAPHY
exchanged information should be translated into an unreadable
format that cannot be altered by outsiders. Data must be sent or The main aim of steganography and cryptography is to
transmitted securely to prevent corruption by outsiders. promote secret communication. Steganography and
Steganography is a method that can be utilised to satisfy these cryptography are not the same things, though. Steganography
conditions. The technique of least significant bit (LSB) and a conceals the information's very existence, whereas
symmetric key between the sender and receiver are used in this cryptography protects the information's contents from hostile
research to hide data from the image. Additionally, it makes an individuals. Consequently, several techniques are employed to
effort to pinpoint what qualities a strong steganography undermine the system.[2]
algorithm should possess and makes a quick assessment of
different steganographic methods that are better suited for
specific uses. The primary drawback of cryptographic algorithms is that
the cipher text can be seen but not read, and the plaintext may
be determined. Steganography prevents the intruder from
Keywords: Cryptography, Steganography, Encryption, Decryption,
LSB. knowing if any confidential information is there. This method
is used to improve the security of data transmitted through
I. INTRODUCTION computer networks.
Steganography translates to "covered in concealed III. STEGANOGRAPHY PROCESS
writing." The goal of steganography is to deliver a message
through an innocent carrier to a recipient while hiding the fact The entire process of steganography is carried out in two
that the information is being sent to everyone from others. phases. They are Encryption and Decryption. The Encryption
Changes can be applied to the carriers, such as images or any operation is performed at the side of sender whereas the
other media, using computer-based steganography.[1] Decryption operation is performed on the same image in
which the actual message was hidden by the sender. This
Information can be concealed in carriers including photos, means both encryption and decryption are performed at two
audio, text, video files, and data transmissions via different ends.
steganography. When the message is concealed within the A secret Message refers to the information that is
carrier, a stego carrier known as a stego-image, is created. The needed to be inserted inside the media. The medium used in
human senses should be able to discern it as closely as the Steganography procedure is considered the cover media.
feasible to the actual bearer or cover image. Stego-Media is the product of media that has been altered and
has had additional information hidden from view compared to
The different forms of media that can be used as cover the original media.
objects are Image, Audio and Video. The information that the
The secret message bits are concealed using patterns in this
zigzag scanning. Only the sender and receiver will be aware
of this pattern. The recipient can get his secret message back
by following this pattern.
(b) . PSNR:
Peak Signal Noise Ratio, or PSNR, is a simple
calculation. It is employed to evaluate the calibre of
compressed pictures and movies. The resolution of the image
will be reduced if the PSNR is high.
IV. METHODOLOGY
Fig 1. Process of Steganography The technique of least significant bit (LSB) and a
symmetric key between the sender and receiver are used in
this research to hide data from the image. We shall also see
IV. LEAST SIGNIFICANT BIT (LSB) how encryption and decryption are carried through in this. It is
necessary to retrieve the last two bits of each pixel, where the
The LSB is the most widely used steganography technique. LSB position is 0 and the bit immediately before the LSB is 1.
Additionally, the current steganographic standard uses the
LSB of a picture's pixel data. (a) . STEGANOGRAPHY USING LSB:
One section of the LSB makes use of this investigation. In this framework, we must use zigzag scanning with
Every pixel in the first image receives one piece of each size=R*S*8 to convert the picture pixels into binary
double content piece that is inserted. A 24-bit grayscale image characteristics, where R represents how many lines there are
can have three bits encrypted into each pixel when employing in the image, 8 bits make up each pixel, and S represents the
LSB techniques, as long as the record is longer than the number of sections. Transform the secret riddle message into
message document.[3] Example: Images can be used to coordinated qualities that are about 1*N in size, where N is
protect the data if the final bit of each color's byte is swapped the number of bits in the mystery message, as you use this
out for one from the message. procedure. We will just encourage the two double bits of the
secret message with the two LSB bits when it comes to
replacing the picture pixels and secret message.[4]
FIG 3. Ecrypted Message A This is the core stego-key of this framework. This key is
known as a dynamic symmetric key because it changes
(a) . ZIGZAG SCANNING: depending on the image.
We used the Steganography-based Zigzag scanning We use it similarly to how the size of the secret
approach for the goal of increasing security. By turning the message affects how it changes. We can demonstrate the
secret message into bits, the approach described here uses encryption and decryption procedures using this model.
image pixels to conceal the hidden message.
(b) . ENCODING PROCESS: V. ENCODING
Vi. DECODING
• In the process of decoding, the receiver or the user [8] M. Wegmuller, J. P. von der Weid, P. Oberson, and N.
who is performing the decoding operation is Gisin, “High resolution fiber distributed measurements
supposed to select the received stego-image from the with coherent OFDR,” in Proc. ECOC’00, 2000, paper
open button which is present on the decryption 11.3.4, p. 109
window.
• The encrypted image is displayed on the interface [9] R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-
which is absolutely identical to the original image speed digital-to-RF converter,” U.S. Patent 5 668 842,
that is used for the encryption process. Sept. 16, 1997.
• The user of the decoding window can view the
embedded original message by selecting the decode [10] M.Shell.(2002) IEEEtran homepage on CTAN.
button. [Online].Available:http://www.ctan.org/tex-
• Using this method, only the sender and the receiver archive/macros/latex/contrib/supported/IEEEtran/
will be able to read the confidential message.
[11] A. Karnik, “Performance of TCP congestion control with
rate feedback: TCP/ABR and rate adaptive TCP/IP,” M.
Vii. CONCLUSION Eng. thesis, Indian Institute of Science, Bangalore, India,
Jan. 1999.
The method for properly encoding data in an 8-bit
colour image is described in this paper. The development of [12] J. Padhye, V. Firoiu, and D. Towsley, “A stochastic
various steganographic techniques as well as support for file model of TCP Reno congestion avoidance and control,”
types other than bitmap are further features that could be Univ. of Massachusetts, Amherst, MA, CMPSCI Tech.
added to this project. However, anyone who desires to learn Rep. 99-02, 1999.
more about steganography can get started by using this
research and software package. [13] Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specification, IEEE Std. 802.11,
Viii. REFERENCES 1997.
[1] J. Fridrich and M. Goljan, “Digital image steganography [14] (2002) The IEEE website. [Online]. Available:
Using stochastic modulation”, SPIE Symposium on http://www.ieee.org/
Electronic Imaging, San Jose, CA, 2023.
[15] FLEXChip Signal Processor (MC68175/D), Motorola,
[2] Johnson, N.F. & Jajodia, S., ―Exploring Steganography: 1996.
Seeing the Unseen‖, Computer Journal, February 1998.