You are on page 1of 15

Presentation on

STEGANOGRAPHY USING LSB TECHNIQUE BY


UNIQUE FRAME SELECTION METHOD TO INCREASE

THE SECURITY  
GROUP MEMBERS

Under the Guidance of

EC
EC INTRODUCTION

STEGANOGRAPHY :

Steganography is the method of hiding a secret message within an ordinary message and
extraction of it ,at its destination.

STEGAN-O-GRAPHY

COVERED WRITING
EC

STEGANALYSIS :
Steganalysis is the scientific technology to decide if a medium carries some hidden messages or
not and, if possible, to determine what the hidden messages are. In addition to preventing secret
communication among terrorists, steganalysis serves a way to judge the security performance of
steganography techniques.
STEGANOGRAPHY UNDER VARIOUS MEDIA
Steganography in “TEXT”
Steganography in “IMAGES”
Steganography in “AUDIO”
EC VIDEO STEGANOGRAPHY

 Video steganography is a technique used to transmit hidden


information by modifying an video signal in an imperceptible manner.
It is the science of hiding some secret text which is dual encrypted
information in a host message. The host message before steganography
and stegomessage after steganography have the same characteristics.
 Embedding secret messages in digital video is more difficult process.
Varieties of techniques for embedding information in digital video have
been established.
Literature Survey
Year Title of the paper Author Explanation Advantages Disadvantages
Literature survey
2020 Reversible Data Hiding Suhad Fakrie Reversible Data To compare the PSNR ratio
Based Bit-Plan Permutation AH Radie Hiding Based Bit- accuracy of the performance is not
and Absolute Moment Block Plan Permutation transmitted data, safe very much good and
and secure image data not effective for
Truncation Coding and Absolute
transformation and to standard datasets.
Moment Block authenticate the
Truncation Coding sender SDS is
efficiently
incorporated

2021 Image Steganography Using Lalit , Lokesh Helps in detecting any Prevent Memory required for
Steg with AES and LSB issue with rider . transformation of implementation
secrete file from third should be as small as
party access, possible.
Increased data security
level and Keys of
decryption process is
protected from the
hackers.
Year Title of the paper Author Explanation Advantages Disadvantages
Literature survey
2019 RSA Secured Web Based R K Agarwal , ishitha Paper propose an algorithm
which combines the
Steganography is Secrete message can’t
Steganography Employing techniques of cryptography achieved easily by be extracted and High
HTML Space Codes And and steganography which aids HTML as HTML is time complexity of the
in securing the data by hiding rich in code and very algorithm
Compression Technique it behind the source code of
the HTML web pages. RSA less chance to check
encryption is used for its source code and
encrypting the secret message easily communicated
through internet.

2019 A 3DES Double–Layer Maggy Mashaley In this work, a well-secured


algorithm is implemented
In presented paper, Small modification to
Based Message Security through integrating the two high level of security an S-Box could
Scheme layers, the cryptography layer is provided and significantly weaken
and the steganography layer. variation in two LSB DES.
In cryptography we applied
the 3-DES technique. In of each pixel will not
steganography we embedded affect the cover image
the secret message in an quality.
image using an enhanced
least signicant bit (LSB)
technique.
Year Title of the paper Author Explanation Advantages Disadvantages
Literature survey
2022 Improving the Robustness Zimin jhang In this paper, the ability
against JPEG recompression
All strong and weak Not able to detect the
of JPEG Steganography of robust steganography is points are mentioned secret message. .
With Robustness Cost further improved by very clearly and by
introducing a robustness cost analyzing steganalysis
function. For calculating the
robustness cost, a robustness techniques a better
model based on the spatial steganography
domain calculated from DCT techniques can be
coefficients is firstly
proposed. developed.

2019 LSB Steganography Using Krishnakanth Tiwari , This method scatters the data
to be infused into the image
Effective in all cases Technique only
Pixel Locator Sequence sahil by randomly picking up the such as random applies to synthetic
with AES pixels and changing their embedding with LSB images with a small
LSB value accordingly. This replacement and number of distinct
random distribution makes it
difficult for unknowns to look random embedding colours such as logos
for the data for sequential for LSB and flags and it is not
matching. effective for big sizes
images.
EC Proposed Block Diagram

Secret Stego Secret


message Key message

Embedding Stego Extraction


Algorithm File Algorithm

Cover Stego
File Key
EC
Detailed Methodology
Algorithm of image embedding:

 ❖ Step 1: read the text and image file


 ❖ Step 2: resize that image into the size of the cover video.
 ❖ Step 3: divided the images into bit-slicing method[9]
 ❖ Step 4: input the cover video
 ❖ Step 5: split that video into frames
 ❖ Step 6: select 8 frames where a bit sliced image will be embedded.
 ❖ Step 7: find that LSB bit of the cover frames.
 ❖ Step 8: embed those bit planes into that image frames and return those frames into its
previous position.
 ❖ Step 9: regenerate video frames.
Algorithm of Extraction
 ❖ Step 1: input the stego video
 ❖ Step 2: extract frames from the video
 ❖ Step 3: find those frames by the specified key
 ❖ Step 4: find LSB of those frames.
 ❖ Step 5: extract those bits from those stego frames.
 ❖ Step 6:merge those bits to form the final image.
 ❖ Step 7:Extract the Dual Encrypted Text from Image
EC ADVANTAGES OF AUDIO STEGANOGRAPHY

 Potential capability to hide the existence of confidential data

 Hardness of detecting the hidden (i.e., embedded) data

 Strengthening of the secrecy of the encrypted data


EC SCHEDULE REPRESENTATION
EC

THANK YOU

You might also like