Project Guide : Mr. M.

Suman Team Members :

K. Sai Pranitha (07FE1A0419) T. Ushasri (07FE1A0423) M.V.R. Amaralingeswara Rao (08FE5A0417) V. Kanaka Rao (08FE5A0418)

VIGNAN¶S LARA INSTITUTE OF TECHNOLOGY AND SCIENCE, VADLAMUDI
Image Based Steganography Using LSB Insertion Technique

`

Steganography
from the Greek word steganos meaning covered graphie meaning writing

`

`

`

Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination It includes numerous secret communication methods that conceal the message¶s very existence. Anyone else viewing the message will fail to know it contains hidden/encrypted data
Image Based Steganography Using LSB Insertion Technique

` Apparently neutral¶s protest is thoroughly discounted and ignored. Isman hard hit. ejecting suets and vegetable oils. A message sent by a German spy in World WarII ` Pershing sails from NY June 1 Image Based Steganography Using LSB Insertion Technique . Blockade issue affects pretext for embargo on by-products.

Pershing Sails from NY June 1 Rot 13 Crefuvat fnvyf sebz AL Whar 1 Image Based Steganography Using LSB Insertion Technique .

key Image Based Steganography Using LSB Insertion Technique .Cover .object Message Stego System Encoder Stego Object Stego .

Message File Message File Cover File Steganography Tool Steganography Tool Steg File (with hidden data) Steg File (with hidden data) Hiding Images Extracting Images Image Based Steganography Using LSB Insertion Technique .

` ` ` ` ` ` bmp jpeg gif wav mp3 Amongst others Image Based Steganography Using LSB Insertion Technique .

Image Based Steganography Using LSB Insertion Technique .

Image Based Steganography Using LSB Insertion Technique .

` Common hiding techniques Appended to a file Hidden in the unused header portion of the file near the beginning of the file contents An algorithm is used to disperse the hidden message throughout the file x Modification of LSB (Least Significant Bit) x Other Image Based Steganography Using LSB Insertion Technique .

` Messages are encoded in the least significant bit of every byte in an image. By doing so. even when compared to the original. Example: Inserting the word ³bomb´ using LSB techniques: b = 01100010 o = 01101111 m = 01101101 b = 01100010 `  Image bits: Image Based Steganography Using LSB Insertion Technique . but not enough to make significant visual changes to the image. the value of each pixel is changed slightly.

` Enhancing the least significant bits alerts investigators of possible embedding of hidden data. bliss.bmp No Steganography Detected bliss_stego.bmp } Image Based Steganography Using LSB Insertion Technique Steganography Detected .

GIF.` Methods of detecting the use of Steganography Visual Detection (JPEG. MPEG.) Audible Detection (WAV. BMP.) Statistical Detection (changes in patterns of the pixels or LSB Least Significant Bit) or Histogram Analysis Structural Detection .View file properties/contents x x x x size difference date/time difference contents modifications checksum Image Based Steganography Using LSB Insertion Technique . etc. etc.

` Detecting Steganography by viewing it. Original Image Steganograph Image Image Based Steganography Using LSB Insertion Technique .

High perceptual transparency of LSB. Does not change the size of the file ` ` Image Based Steganography Using LSB Insertion Technique .` Simplicity to embed the bits of message directly into the LSB plane of cover image.

then the bandwidth required to transmit stego-image decreases ` Image Based Steganography Using LSB Insertion Technique . then the hidden data ma be lost If the message size is greater than cover image size.` If the picture with hidden info is converted to another format.

` Digital watermarking. Used in colour lasers to track the originating printer. Confidential communication and secret data storing Media database systems ` ` ` Image Based Steganography Using LSB Insertion Technique .

en.ece. N. R. 2001. T Morkel. Gary C. Burlington. Sandton. 3. JHP Eloff.sg/Programs/imgsci/files/memon/sing_stego.pdf www. Greece. www.1.stevens-tech. "An Overview of Image Steganography. 4. L Labuschagne and MM Eloff (eds). JHP Eloff and MS Olivier. Kesslet. Memon. Analysis of LSB based image steganography techniques. An Overview of Steganography for the Computer Forensics Examiner.org/wiki/Steganography Image Based Steganography Using LSB Insertion Technique .wikipedia. 6. Proceedings. Thessaloniki . Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). June/July 2005 (Published electronically) 2. Image Processing.nus..pdf Chandramouli..ims.edu.edu/~mouli/lsbsteg." in HS Venter. South Africa. 2004. 5.

Image Based Steganography Using LSB Insertion Technique .

Image Based Steganography Using LSB Insertion Technique .