SYNOPSIS
ABSTRACT
IMAGE HIDING
MERITS
DEMERITS
PROGRAM
RESULT
ABSTRACT
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other
information. Many different carrier file formats can be used, but digital images are the most popular because of
their frequency on the internet. For hiding secret information in images, there exists a large variety of
steganography techniques some are more complex than others and all of them have respective strong and
weak points. Different applications may require absolute invisibility of the secret information, while others
require a large secret message to be hidden. This project report intends to give an overview of image
steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography
algorithm and briefly reflects on which steganographic techniques are more suitable for which applications..
Steganography is the practice of hiding private or sensitive information within something that appears to be
nothing out to the usual. Steganography is often confused with cryptology because the two are similar in the
way that they both are used to protect important information. The difference between two is that
steganography involves hiding information so it appears that no information is hidden at all. If a person or
persons views the object that the information is hidden inside of he or she will have no idea that there is any
hidden information, therefore the person will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not trained to look for
files that have information inside of them, although this software is available that can do what is called
Steganography. The most common use of steganography is to hide a file inside another file..
NTERNET has become more popular and common nowa-days. Sending the important data
through the net has become a serious threat. Moreover routing the data in an encrypted format
is very common and embedding the secret message in an image is a challenge. To safeguard
the images from the illegal hindrance or interception, techniques such as watermarking,
image hiding is used for the safe transmission of images. This paper focuses on such
techniques and ideas. A watermark is a signal or a pattern that is embedded into an image. It
is usually done for content authentication. Watermarking methods are divided into: fragile
watermarking methods and robust watermarking methods. In robust watermarking methods,
the secret information will always be robust against any changes or malfunctions. They are
usually used for protecting copyrights. On the other hand, fragile watermarking methods are
usually designed so that they can easily get broken. Therefore it is applicable for tamper
detection and authentication. Chandramouli & Nasir Memon (2001) has used the
watermarking technique with public key verification for watermark insertion and extraction
procedure. This can be used for fingerprinting, ownership assertion and for ID-card security
purpose. Image authentication against the quantization attack has been proposed by Hongtao
Lu et al., (2003). In watermarking, the size of the symbol should be usually small, ranging
from one bit to thousands of bits to represent the symbol. The goal of watermarking focuses
on the existence of the symbol which is usually small after undergoing certain manipulations
and by degrading operations such as filtering, resampling, lossy compression, etc. But in
Image Hiding, it is mainly used to transmit important and confidential images, whose size
tends to be very large. Many image hiding methods have been proposed by Thien & Lin
(2003), Chan & Cheng (2004), Li Zhi & Sui Ai Fen (2004), Wang & Tsai (2007), Wang &
Moulin (2007) and many more. Most of these methods does not consider about the
compressing of cover image. But Chung et al., (2001) proposed the usage of singular value
decomposition and vector quantization for compressing the cover image. The goal of the
image hiding technique is to hide the secret image in such a way that it is invisible to the
viewers.The Least Significant Bit substitution method and Optimal Pixel Adjustment process
are the two image hiding techniques in which the LSB method is used for embedding the
secret image and the OPAP method is used for enhancing the final image so that the presence
of the secret image is not visible. Wang et al., (2001) proposed a method called the
Moderately Significant Bit (MSB) where the fourth bit is taken into account for image hiding.
This paper deals with all the facts used for the procedure of hiding the image and making the
secret message invisible to the grabbers. This paper is organized as follows. The section
STEGANOGRAPHY
message, image, or video within another file, message, image, or video. The
word steganography combines the Greek words steganos (στεγανός), meaning "covered,
concealed, or protected", and graphein (γράφειν) meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a
treatise on cryptography and steganography, disguised as a book on magic. Generally, the
hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or
some other cover text. For example, the hidden message may be in invisible ink between the
visible lines of a private letter. Some implementations of steganography that lack a shared
secret are forms of security through obscurity, whereas key-dependent steganographic schemes
adhere to Kerckhoffs's principle.[1]
The advantage of steganography over cryptography alone is that the intended secret message
does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—
no matter how unbreakable—arouse interest, and may in themselves be incriminating in
countries where encryption is illegal.[2] Thus, whereas cryptography is the practice of protecting
the contents of a message alone, steganography is concerned with concealing the fact that a
secret message is being sent, as well as concealing the contents of the message.
Graphical Representation
The graphical representation of Steganography system is as follows:
System Analysis & Design
Steganography system requires any type of image file and the information or message that is to be hidden. It
has two modules encrypt and decrypt. Microsoft .Net framework prepares a huge amount of tool and options
for programmers that they simples programming. One of .Net tools for pictures and images is auto-converting
most types of pictures to BMP format. I used this tool in this software called “Steganography” that is written in
C#.Net language and you can use this software to hide your information in any type of pictures without any
converting its format to BMP (software converts inside it).
The algorithm used for Encryption and Decryption in this application provides using several layers lieu of using
only LSB layer of image. Writing data starts from last layer (8st or LSB layer); because significant of this layer
is least and every upper layer has doubled significant from its down layer. So every step we go to upper layer
image quality decreases and image retouching transpires.
The encrypt module is used to hide information into the image; no one can see that information or file. This
module requires any type of image and message and gives the only one image file in destination.
The decrypt module is used to get the hidden information in an image file. It take the image file as an
output, and give two file at destination folder, one is the same image file and another is the message file that
is hidden it that.
PROGRAM:
%*****************************************************
% algorithm
% the fist image is resize to double its original size
% shown below
% |-------------|
% |d7,d6 |d3,d2 |
% |-------------|
% |d1,d0 |d5,d4 |
% |____________|
% ****************program********************
disp(' ');
disp(' ');
disp('_________________________________________________________');
% select task
if isempty(task)
task=1;
end
if task == 1
x = imread(input(' welcome to encoder\n enter the first image file name: ','s'));
% check compatibility
sx = size(x);
sy = size(y);
x=imresize(x,[2*sy(1),2*sy(2)]);
% end
%sy=2*sy;
% clearing ist files last two lsb bits & moving iind files msb bits to lsb bits
x1 = bitand(x,uint8(252));
y1 = bitshift(y,-4);
y1_= bitand(y1,12);
y_lsb1 = bitshift(bitand(y,12),-2);
y_lsb2 = bitand(y,3);
z=x1;
for k=1:3
% iind quadrent
% iv th quadrent
% i st quadrent
end
end
end
figure(1)
image(x);
figure(2);
image(y);
figure(3);
image(z);
% saving file
if isempty(sav)
sav='y';
end
if sav == 'y'
if isempty(sav)
name='encoded_temp';
end
name=[name,'.bmp']; % concatination
imwrite(z,name,'bmp');
end
else
clear;
% shifting z by 4 bits
xo=bitand(z,uint8(252));
for k=1:3
zout1(i,j,k) = bitshift(bitand(z(i,j,k),uint8(3)),2);
zout3(i,j,k) = bitshift(bitand(z(i+sy(1),j,k),uint8(3)),2);
zout4(i,j,k) = bitand(z(i,j+sy(2),k),uint8(3));
end
end
end
zout = bitshift((zout1+zout2),4)+zout3+zout4;
yo = zout;
figure(4);
image(xo);
figure(5);
image(yo);
% saving file
if isempty(sav)
sav='y';
end
if sav == 'y'
if isempty(name1)
name1 = 'ist_temp';
end
if isempty(name2)
name2 = 'iind_temp';
end
name1 = [name1,'.bmp'];
name2 = [name2,'.bmp'];
imwrite(xo,name1,'bmp');
imwrite(yo,name2,'bmp');
end
end
RESULT:
COMMAND WINDOW:
_________________________________________________________
---encode :- 1
---decode :- 2
welcome to encoder
>>
PLOTS:
FIGURE 1
50
100
150
200
250
300
20
40
60
80
100
120
140
160
50
100
150
200
250
300