You are on page 1of 12

LSB IMAGE

STEGANOGRAPHY
SHAIKH IBRAHIM NAZEERUDDIN
Emertxe
Bengaluru
CONTENTS.
Introduction
Steganography

4/29/17
Types of Steganography
LSB Image Steganography
Block Diagram
Algorithm
Result
Conclusion

2
Introduction
Steganography is an art of hiding information inside
information.

4/29/17
The main objective of Steganography is mainly
concerned with the protection of contents of the
hidden information.

Images are ideal for information hiding because of the


large amount of redundant space is created in the 3
storing of images.
Steganography
Steganography literally means
covered writing

4/29/17
Definition:
It is an art and science of hiding information by
embedding it in some other data.
Goals:
To hide a secret message within an object.
Do it such a way that the presence of message
is
not visible.

4
Types of Steganography
Image steganography: Images are used as the message
carrier. Images are the most popular cover objects used for

4/29/17
steganography.
Textual steganography: Text steganography can be
achieved by altering the text formatting, or by altering
certain characteristics of textual elements (e.g.,
characters).
Audio steganography: In audio steganography, secret
message is embedded into digitized audio signal which
result slight altering of binary sequence of the 5
corresponding audio file.
LSB Image
Steganography
The most common and popular method of modern
day steganography is to make use of LSB of
pictures pixel information.

4/29/17
This technique works best when the file is longer
than the message file and if image is color.

When applying LSB techniques to each byte of a


24 bit image, three bits can be encoded into each
pixel.

6
Block Diagram

Magic String Magic string

4/29/17
New Image
Encoding Decoding
Image
Process process

Secret text Secret Text

7
Algorithm
ENCODING
STEP 1: Copy header that is 54 bytes of .bmp image file
into new .bmp image file.
STEP 2: Find out the size of Secret text file

4/29/17
STEP 3: Find out the size of Magic string and Extract the
character from magic string.
STEP 4: Take 1st character from secret file which have
some ASCII value and convert it into binary.
STEP 5: Take 1st channel of image R and it contain some
pixel value ,convert it into binary.
STEP 6: Take MSB bit of character from secret file and
put this MSB into LSB bit of image channel and save
into new .bmp image
STEP 7: Repeat STEP 4 , STEP 5 , STEP 6 up to the EOF. 8
STEP 8: Copy remaining data of image into new image
DECODING
STEP 1: Tell user to enter magic string
STEP 2: Extract the magic string , if magic string is
correct then decode the text from image.
STEP 3: Now consider each pixel from encoded

4/29/17
image file and take LSB bit of each pixel and store
it into text bits.
STEP 4: Repeat up to the size of secret file.

9
Result
Encoding
All the data from secret file are successfully added
into image file. Human eye cannot detect the minor

4/29/17
change in the image

Decoding
Text from encoded file is successfully recovered.

10
Conclusion
Hiding a message with steganography methods
reduces the chance of a message being detected.

4/29/17
In and of itself, steganography is not a good
solution to secrecy, but neither is simple
substitution and short block permutation for
encryption. But if these methods are combined,
you have much stronger encryption routines.

11
4/29/17
THANK YOU

12