You are on page 1of 29

Wavelet Transform Color

Image Steganography
Abstract

 Steganography is the art of hiding information and an effort to conceal the existence of the
embedded information. It serves as a better way of securing message than cryptography
which only conceals the content of the message not the existence of the message.
 Original message is being hidden with a carrier are not observable. In this paper we will
discuss how digital images can be used as a carrier to hide messages. This paper also
analyses the performance of some of the steganography tools. Steganography is a useful
that allows convert transmission of information over an over the communication channel.
Motivation Behind The Seminar Topic

 Steganography has developed a lot in recent years, because digital techniques allow new
ways of hiding information in a lot of situations. The first to employ hidden
communications techniques –with radio transmission- were the armies, because of the
strategic importance of secure communication and the need to conceal the source as much
as possible
 Nowadays , new constraints in using strong encryption for messages are added by
international laws, so if two peers want to use it, they can resort in hiding the
communication into casual looking data. This problem has become more and more
important just in these days.
Introduction

 Steganography is the art and science of writing hidden messages in such a way
that no one, apart from the sender and intended recipient, suspects the existence
of the message.
 The word message ‘Steganography, is of Greek origin and means concealed
writing’ from the Greek words ‘stegan-x graf-ein’.
HISTORY

 In 1449 Johannes Trithemius, from Wuzzburg, wrote 3 books “Steganographia”.


 In 1518 Trithemius printed 6 books, 540 pages, and so on cryptography and steganography.
Books’ tittle Polygraphiae.
 In 1665 Gaspari Schotti published the book “Steganographia”, 400 pages.(New
presentation of Trithemius.)
HISTORY

 Ancient Chinese wrote messages on fine silk, which was then crunched into tiny ball and
covered in wax. The messenger then swallowed the ball of wax.
 During Second World War a technique was developed to shrink photographically a page of
text into dot less than one millimeter in diameter, and ten hide this microdot in an
apparently innocuous letter.(The first microdot has been spotted by FBI in 1941.)
GENERAL STEGANOGRAPHIC MODEL
WAVELET

 Wavelets are functions that wave above and below the x axis , have
 1. Varying frequency
 2. Limited duration
 3. An average value of zero
What are Wavelets?

There are many different wavelets:


Haar Morlet Daubechies
Properties of wavelets

 Simultaneous localization in time and scale


 The location of the wavelet allows to explicitly represent the location of events in
time.
 The shape of the wavelet allows to represent different details or resolutions.
Properties of wavelets

Sparsity: for functions typically found in practice, many of the coefficients in a


wavelet representation are either zero or very small.

Linear time complexity: many wavelet transformations ca be accomplished in O(N)


time.
Properties of Wavelets

 Adaptability: wavelets can be adapted to represent a wide variety of


functions(e.g., functions with discontinuities, functions defined on bounded
domains etc.).
 -Well suited to problems involving images, open or closed curves, and surfaces of
just about any variety.
 -Can represent functions with discontinuous or corners more efficiently (i.e.,
some have sharp corners themselves).
Advantages

 It can be used for safeguarding data, such as in the field of media where
copywriting ensures authenticity.
 It can be used by intelligence agencies for sending their secret data.
Disadvantages

 Huge number of data, huge file size, so someone can suspect about it.
 If this technique is gone in the wrong hands like hackers, terrorists, criminals then this can
be very much dangerous for all.
Wavelets Transforms

 Continuous Wavelet Transform(CWT)


 Discrete Wavelet Transform(DWT)
CWT: Main Steps

1. Take a wavelet and compare it to a section at the start of the original signal.
2. Calculate a number c, that represents how closely correlated the wavelet is with
this section of the signal. The higher c is, the more the similarity.
CWT: Mains Steps

3. Shift the wavelet to the right and repeat steps 1 and 2 until you’ve covered the
whole signal.
CWT(Main Steps)

4. Scale and wavelet and repeat steps 1 and 3.

5. Repeat steps 1 through 4 for all scales.


Discrete Wavelet Transform(DWT)

 A discrete wavelet transform (DWT) is a transform thar decomposes a given signal into a
number of sets, where each set is a time series of coefficients describing the time evolution
of the signal in the corresponding frequency band.
Discrete wavelet transform(DWT)
Use of Steganography

 There are various ways to conceal information using steganography. The most common
method is by embedding information into digital images say, a JPEG image, contains
several megabytes of data in form of pixels.
 This allows some room to embed information within the digital image. With use of
steganography applications, one can alters the least significant bits of the data file and
embeds a malicious code into the image. Once the targeted user opens the image file in
their computer , the malware is activated.
 Depending on its programming, the malware can now open a leeway for the attacker to
gain control over the user’s device or network.
Least Significant Bit Embedding

 In this method, the attacker identifies the least significant bits of information in the carrier
image and substitutes it with their secret message, in this case, malicious code.
 When the target downloads the carrier image, they introduce the malware into their
computer which allows the attacker access to this device and the hack begins.
 LSB embedding can be divided into two categories: fixed size insertion method and
variable size insertion methods. Fixed size methods use a fixed number of LSBs to embed
the secret message in each byte of the cover image .
 Variable size insertion method uses a variable number of LSBs from each byte of cover
image according to each pixel’s sustainability for embedding,
Weaknesses to LSB embedding

 There are, however, weakness to the algorithm, mainly that the embedded information is
easy to detect should an attacker be aware of the technique used.
 LSB embedding is also sensitive to image manipulation attacks, such as image cropping,
resizing, color space conversion or resampling. LSB embedding is thus not robust against
image manipulations attacks.
 LSB embedding is also not resistant to statistical attacks, since the embedded information
is easy to detect. A fairly simple statistical attack, called a histogram attack, can be used to
detect the presence of embedded information by studying the histogram of a stego image.
Steganalysis

 The art of detecting steganography is referred to as Steganolysis. It is a process of


identifying steganography by inspecting various parameter of a stego object. The primary
step of this process is to identify a suspected stego media. After that steganolysis process
determines whether that media contains hidden message or not and then try to recover the
message from it.
 The suspected media may or may not with the hidden message. The steganolysis process
starts with set of suspected information streams, Then set is reduced with help of advance
statistical techniques.
Implementation And Results

 All of the approaches to steganography have one thing in common that they hide the secret
message in the physical object which is sent. The steganography process of the cover
image being passed into the embedding function with the message to encode resulting in a
steganographic image containing the hidden message.
 The key is usually a password, so the key is also used to encrypt and decrypt the message
before and after the embedding. The most important property of a cover source is the
amount of data that can be stored inside it, without changing the noticeable properties of
the cover.
Conclusion

 Steganography is a fascinating and effective method of hiding data that has been used
throughout history. Methods that can be employed to uncover such device tactics, but the
first step are awareness that such methods exist.
 There are many good reasons as well to use this type of data hiding, including
watermarking or a more secure central storage system for such things as passwords, or
keypasswords, Regardless, this technology is easy to use and difficult to detect. As
Steganography becomes more mature it will be implemented as a standrd security tool the
way firewalls, virus detection software and intrusion detection programs currently are.
Future

 In today’s world, we often listen a popular term “Hacking”. Hacking is nothing but an
unauthorized access of data which can be collected at the time of data transmission. With
respect to steganography this problem is often taken as steganolysis.
 Steganolysis is a process in which a steganwlyzer cracks the cover object to get the hidden
data. So whatever be the technique will be developed in future, degree of security related
with has to be kept in mind. It is hoped that dual steganography, Steganography with along
with cryptography may be some of the future solution for the mentioned problem.
THANK YOU

You might also like