0% found this document useful (0 votes)
54 views8 pages

Image Steganography With GUI in Matlab: Isna Ahsan Muhammad Bilal

This document describes an image steganography program with a graphical user interface (GUI) developed in MATLAB. It discusses how the program allows hiding secret messages within cover images using the least significant bit (LSB) steganography method. The program allows users to import a cover image and multiple secret message images, encrypt the messages into the cover image to create a steganographic image, and decrypt the steganographic image to extract the hidden messages. The GUI provides an easy-to-use interface for non-technical users to perform image steganography tasks without needing MATLAB expertise.

Uploaded by

ted gcgd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views8 pages

Image Steganography With GUI in Matlab: Isna Ahsan Muhammad Bilal

This document describes an image steganography program with a graphical user interface (GUI) developed in MATLAB. It discusses how the program allows hiding secret messages within cover images using the least significant bit (LSB) steganography method. The program allows users to import a cover image and multiple secret message images, encrypt the messages into the cover image to create a steganographic image, and decrypt the steganographic image to extract the hidden messages. The GUI provides an easy-to-use interface for non-technical users to perform image steganography tasks without needing MATLAB expertise.

Uploaded by

ted gcgd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 8

Image Steganography With GUI in Matlab

Isna Ahsan Muhammad Bilal


Faculty of Electrical Faculty of Electrical
Engineering Ghulam Ishaq Engineering Ghulam Ishaq
Khan Institute Topi, Swabi, Khan Institute Topi, Swabi,
Pakistan Pakistan
u2018169@giki.edu.pk u2018250@giki.edu.pk
Abstract—This project deals with learning about the developers have conjointly been found to use steganography
various types of steganography available. Image steganography to obscure the transmission of malicious code.
is performed for images and the concerning data is also
decrypted to retrieve the message image. Since this can be done
in several ways, image steganography is studied and one of the
methods is used to demonstrate it. Image steganography refers
to hiding information i.e., text, images or audio files in another
image or video files. The current project aims to use
steganography for an image with another image using spatial
domain technique. This hidden information can be retrieved
only through proper decoding technique. This encryption and
decryption of the images is done using MATLAB codes.

Keywords—image processing, steganography, data


encryption,

I. INTRODUCTION
Internet has emerged because the most convenient and
economical medium for communication. Through web,
messages are often transferred in a very quick and low cost
means in varied fields like government offices, personal
sector, military, and medical areas. Many times,
Fig. 1. Process of Image Steganography
confidentiality of the transferred message must be
maintained. to confirm that the message is transferred firmly
and safely over the network, an appropriate methodology is
required. Steganography proves as a trustable methodology III. GUI
for achieving this aim. In steganography, the info square A GUI (graphical user interface) is a system of
measure hidden within the cowl media. the duvet medium interactive visual components for computer software. A GUI
are often within the variety of image file, text file, video file, displays objects that convey information and represent
or audio file. Steganography is outlined as a science or art of actions that can be taken by the user. The objects change
concealment the message within some cowl medium. The color, size, or visibility when the user interacts with them.
conception of steganography isn't new; its usage are often GUI objects include icons, cursors, and buttons. These
seen within the past conjointly. Historical records depict that graphical elements are sometimes enhanced with sounds, or
around 440 B.C., historiographer sent secret messages visual effects like transparency and drop shadows.
exploitation the conception of steganography. In precedent
days, Greeks conjointly wrote messages on wood and lined
them with wax. The conception of invisible ink was IV. GUI FOR STEGANOGRAPHY
conjointly used throughout the amount of warfare II. in step
with Greek history, secret messages were written on the bald The MATLAB file of this program is converted into .exe
scalp of the slaves, and once the expansion of hair on their format so it can be used in any computer without MATLAB.
heads, they were sent as messengers. Graphical user interface is designed for image
steganography so the non-technical user can use this
program. For image steganography save an image having
II. STEGANOGRAPHY
name “cover” of .bmp format and save hidden message
Steganography is that the technique of hiding secret image by name of “message1”, “message2”, “message3”
information among a normal, non-secret, file, or message to and “message4” of .bmp format in the same folder
avoid detection; the key information is then extracted at its where .exe file is stored. After opening of .exe file the
destination. The employment of steganography may be window is displayed. Click on “import” to read the images.
combined with coding as an additional step for activity or Click on “Encrypt” to encrypt the hidden message a
protective information. The word steganography comes “Steganographic” image of .bmp format will be produced.
from the Greek words steganos (meaning hidden or covered) For decryption, click on “Decrypt” to decrypt the
and the Greek root graph (meaning to write). Steganography steganographic image and the hidden message will be
may be accustomed conceal virtually any form of digital extracted from the steganographic image. Click on reset to
content, together with text, image, video, or audio content; reset the current process and click on exit to end the
the info to be hidden within virtually the other form of program.
digital content. The content to be hid through steganography
-- known as hidden text -- is commonly encrypted before
being incorporated into the innocuous-seeming cowl
computer file or information stream. If not encrypted, the
hidden text is often processed in a way to make the key
content undetectable. Steganography is practiced by those
who desire to convey a secret message or code, whereas
there are several legitimate uses for steganography. Malware
Fig. 3. Cover image

Fig. 2. GUI (Graphical User Interface)

V. WORKING PRINCIPLE
In this project Spatial Domain technique is used for
image steganography. In this method least significant bit
(LSB) modification is used. As every image consists of
pisels and each pixel have an eight(8) bit data when they are
in grey scale. In RGB format each pixel have 24 bits i.e 8-
bits fo each layer. As most dignificant bits (MSBs) contain
the vital data of an image and least significant bit (LSBs) Fig. 4. Hidden Message Images
have least effect on the visuals of an image. The LSBs of the
cover image is modified and the MSBs of hidden message
are stored in it. By this method it is vulnerealble to cropping
and noises and it cause loss of data in both cover image and
hidden message. After modification of cover image it will
still be undetectable to the human visual system (HVS).
Following steps are taken for image encryption:
1. The cover image is read by program and it is
resized to 1024x1024 pixels.
2. The four hidden message images are also read
by program and they are converted to 512x512
because by resizing it to 512 pixels we can hide
four images in a single cover image.
3. The cover image and hidden message images
are converted to greyscale.
4. The last 4 LSBs of each pixel of cover images Fig. 5. Steganographic Image
are modified and replaced with 0’s.
5. The first 4 MSBs of each pixel of hidden
images are copied and replaced with last 4 REFERENCES
LSB’s of cover image.
6. The resultand image is similar to the cover [1] Image Steganography in Cryptography, accessed 16 January 2021,
image and the hidden images can not be <https://www.geeksforgeeks.org/image-steganography-in-
detected by human visual system. cryptography/ >
[2] How LSB technique works?, accessed 16 January 2021,
Following steps are taken for decryption: <https://towardsdatascience.com/hiding-data-in-an-image-image-
steganography-using-python-e491b68b1372>
1. The cover image is read by program and the [3] Image Steganography, accessed 16 January 2021,
last 4 LSBs are extracted. <https://www.scribd.com/document/442028580/EE7150-finalproject-
Finalreport-Savitha-Bhallamudi-pdf>
2. Now the four images are extracted from single
[4] Steganography, accessed 16 January 2021,
image by dividing it in four equal parts of https://searchsecurity.techtarget.com/definition/steganography#:~:text
512x512 pixels. =Steganography%20is%20the%20technique%20of,for%20hiding
%20or%20protecting%20data.
3. Each hidden image is saved individually so it
[5] SAVITHA BHALLAMUDI. Image Steganography Final project.
can be readable. accessed 16 January 2021,
https://www.scribd.com/document/442028580/EE7150-finalproject- https://www.researchgate.net/publication/306358034_EMBEDDING
Finalreport-Savitha-Bhallamudi-pdf _MULTIPLE_IMAGES_IN_A_SINGLE_IMAGE_USING_BIT_PL
[6] G. R. MANJULA and AJIT DANTI. EMBEDDING MULTIPLE ANE_COMPLEXITY_SEGMENTATION_BPCS_STEGANOGRAP
IMAGES IN A SINGLE IMAGE USING BIT PLANE HY
COMPLEXITY SEGMENTATION (BPCS) STEGANOGRAPHY.
accessed 16 January 2021,

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy