Ijresm V2 I6 16
Ijresm V2 I6 16
Image Steganography
Juhi Aggarwal1, Shrey Upadhyay2, Vikas Swain3
1
Professor, Dept. of Computer Science and Engg., Babu Banarsi Das Institute of Technology, Ghaziabad, India
2,3
B.Tech. Student, Dept. of Computer Science and Engg., Babu Banarsi Das Inst. of Tech., Ghaziabad, India
Abstract: Steganography is the practice of concealing messages operations to communicate surreptitiously and safely.
in such a way that no one can know the presence or contents of the
hidden message. The purpose of Steganography is to maintain 3. Implementation
secret communication between two parties i.e., sender and
receiver. This project will express how Steganography is used in a There are presently three effective methods in applying
modern framework while providing a practical considerate of Image Steganography: LSB Substitution, Blocking, and Palette
what Steganography is and how to achieve it. Modification.
LSB (Least Significant Bit) Substitution is the
Keywords: Image Steganography
procedure of altering the least important bit of the
pixels of the carrier image. Blocking the whole thing
1. Introduction
by breaking up an image into “blocks” and using
Steganography is the process of concealing messages within Discrete Cosine Transforms (DCT). Each block is
a larger one in such a way that no one can know the presence or wrecked into 64 DCT factors that estimated luminance
contents of the secreted message. While related, Steganography and color—the values of which are modified for
is not to be muddled with Encryption, which is the process of walloping messages. Palette Modification replaces the
making a message inarticulate. Steganography attempts to hide idle colors inside an image’s color palette with colors
the presence of communiqué. The basic structure of that represent the hidden message.
Steganography is made up of three components: the “carrier”,
the message, and the key. The transporter can be a landscape, a 4. Recognition attacks
digital image, an mp3, even a TCP/IP package among other
things. It is the entity that will ‘carry’ the secreted message. A While the determination of Steganography is to fleece
key is used to decrypt /decipher /determine the hidden message. messages, it may not be very operative at doing so. There are
This can be whatever from a password, a pattern, a black-light, several attacks that one may implement to test for
or even lemon fluid. Under this venture we will emphasis on the Steganographic images they are: Visual Attacks, Enhanced
practice of Steganography inside alphanumeric images (BMP LSB Attacks, Chi-Square Analysis, and other statistical
and PNG) using LSB Substitution, although the chattels of scrutinizes. In execution a visual occurrence you must have the
Image Steganography may be substituted with audio mp3’s, zip original “virgin” image to compare it the Steganographic image
archives, and any other digital article format relatively and visually relate the two for artifacts. In the Enhanced LSB
effortlessly. Attack, you process the image for the least noteworthy bits and
if the LSB is equal to one, multiply it by 255 so that it becomes
its extreme value. Procedures and bit masking, somewhat that
2. Applications
we have never understood earlier. This project was enjoyable
Image Steganography has many applications, specifically in from the start and only got more interesting as we went on
today’s modern, high-tech biosphere. Confidentiality and emerging it. We became more attentive in the subject the more
concealment are a concern for maximum individuals on the we explored on it. We have learnt that while executing Image
internet. Image Steganography permits for two parties to Steganography, it is vital thinking of how to detect and attack it
communicate surreptitiously and covertly. It harmonies for and the methods to do so are far more complex than actually
some morally-conscious individuals to carefully whistle blow doing the Steganography itself. There is a lot of research that is
on internal actions; it allows for copyright protection on digital commencement to discover new ways to detect Steganography,
documents using the message as a cardinal watermark. One of most of which involves some disparity of statistical breakdown.
the other main uses for Image Steganography is for the
transference of high-level or top-secret documents between References
international governments. While Image Steganography has
[1] https://en.wikipedia.org/wiki/Steganography
many genuine uses, it can also be quite nefarious. It can be used [2] https://www.slideshare.net/sharafshaik/ppt-steganography
by hackers to refer viruses and trojans to negotiation machines, [3] https://dictionary.cambridge.org/dictionary/english/steganography
and also by terrorists and other organizations that rely on covert