0% found this document useful (0 votes)
11 views33 pages

Stegnography P

Uploaded by

srg4311
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views33 pages

Stegnography P

Uploaded by

srg4311
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

PAPER NAME AUTHOR

Final stegnography report (3).pdf lalit

WORD COUNT 3355 CHARACTER COUNT 18781


Words Characters

PAGE COUNT 29 FILE SIZE

Pages 1.1MB
SUBMISSION DATE REPORT DATE

Nov 29, 2023 1:29 PM GMT+5:30 Nov 29, 2023 1:30 PM GMT+5:30

The combined total of all matches, including overlapping sources, for each database.
11% Internet database10% Publications database
Crossref databaseCrossref Posted Content database
21% Submitted Works database

Excluded from Similarity Report


Manually excluded sources
Summary
Steganography - Hiding Message in an Image
A Mini Project- II report submitted 1 to

Dr. BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY


LONERE (M.S.), India

In partial fulfillment for


the award of the Degree
of
Bachelor of Technology
in
Electrical Engineering
by
Kedar Aniruddha Jawarkar 2154491293053
Lalit Bhatu Patil 2154491293037
Om Vinod Chandode 2254491293503

Under the Guidance of


Prof. Farha Naz

Department of Electrical Engineering


Shri Vile Parle Kelavani Mandal’s Institute of Technology
Dhule (M S)
Session: 2023 – 2024

13

DECLARATION BY THE CANDIDATES

We the undersigned solemnly declare that the report of the Mini Project-II work entitled
2
Steganography – Hiding Message in an image, is based on our own work carried out during the
course of our study under the supervision of Prof. Farha Naz
We assert that the statements made and conclusions drawn are an outcome of the Mini
Project-II work. We further declare that to the best of our knowledge and belief that the report
does not contain any part of any work which has been submitted for the award of any other
degree/diploma/certificate in this University / deemed University of India or any other country.
All helps received and citations used for the preparation of the Project phase-I report have been
duly acknowledged.

Kedar Aniruddha Jawarkar ________

Lalit Bhatu Patil ________

Om Vinod Chandode ________

18

CERTIFICATE OF THE GUIDE

This is to certify that the report of the Mini Project-II work entitled Steganography – Hiding
message in an image is a record of
27

bonafide work carried out by

Kedar Aniruddha Jawarkar (2154491293053)


Lalit Bhatu Patil (2154491293037)
Om Vinod Chandode (2254491293503)

under my guidance and supervision for the award of Degree of Bachelor of Technology in the 1
faculty of Electrical Engineering, of Dr. Babasaheb Ambedkar Technological University, Lonere
5

(M.S.) India.

To the best of my knowledge and belief the Mini Project-II report


• Embodies the work of the candidates,
• Has duly been completed,
• Fulfils the requirement of the Ordinance relating to the B.Tech. degree of the University
and
• Is up to the desired standard both in respect of contents and language for being referred to
the examiners.

Signature of the HoD Signature of the Guide


15
Dr. Vishal Moyal Prof. Farha Naz
Assistant Professor 16Assistant Professor
Department of Electrical Engineering, Department of Electrical Engineering,
Shri Vile Parle Kelavani Mandal’s Shri Vile Parle Kelavani Mandal’s
Institute of Technology, Dhule. Institute of Technology, Dhule.

Forwarded to Dr. Babasaheb Ambedkar Technological University, Lonere (M.S.) India. 1

Principal
22
Shri Vile Parle Kelavani Mandal’s Institute of Technology, Dhule
CERTIFICATE BY THE EXAMINERS

The Mini Project-II report entitled Steganography – Hiding message in an image


Submitted by

Kedar Aniruddha Jawarkar (2154491293053)


Lalit Bhatu Patil (2154491293037)
Om Vinod Chandode (2254491293503)
1

has been examined by the undersigned as a part of the examination and is hereby
recommended for the award of the degree of Bachelor of Technology in the faculty
of Electrical Engineering of Dr. Babasaheb Ambedkar Technological University,
Lonere (M.S.) India.

Internal Examiner External Examiner


Date: Date:

ACKNOWLEDGEMENT

Foremost, we would like to express our 19 sincere gratitude to our supervisor Prof. Farha Naz
for her continuous support and guidance. Her expertise and experience have helped us in all times of
our Mini Project-II work and writing thesis. She has been source of inspiration and motivation for
bringing an insight into the Mini Project-II work. 17
1
We would like to extend our sincere thanks to Dr. Vishal Moyal, Head of the Department,
1
Electrical Engineering, Shri Vile Parle Kelavani Mandal’s Institute of Technology, Dhule, for
extending the necessary help required for carrying out the Mini Project-II work. We extend our
21regards to Dr. Nilesh Salunke, Principal, Shri Vile Parle
Kelavani Mandal’s Institute of Technology, Dhule, who supported us in all respect during our Mini
Project-II work. We extend our gratitude towards the management, Shri Vile Parle Kelavani Mandal
for providing required infrastructural facilities. Last but not the least our unending gratefulness to our
faculty members, support staff, friends and family for their endless support throughout the work, thus
leading us to achieve our objective.

Kedar Aniruddha Jawarkar ________

Lalit Bhatu Patil ________

Om Vinod Chandode ________

1
SVKM’s Institute of Technology, Dhule
1

Table of Contents
Abstract i
List of Tables ii
List of Figures iii

Chapter Title Page.no

1. Introduction 1

2. Motivation 3

2.1 Purpose and Benefits of Using 4


Steganography.
2.2 Steganography model with 5
encryption.
3. Steganography Techniques. 7 3.1 Least

Significant Bit 8
30

4. Methodology 11
4.1 Data hiding steps 13

4.2 Data extraction steps 13

5. Result &Discussions 14

6. Conclusion & Future Developments 16

References 18
Abstract
Hiding data in images, also known as image steganography, is a technique used to conceal
32 sensitive or confidential information within digital images. The process involves
embedding the data within the pixels of an image, making it appear as a normal image to the
human eye.
The hidden data can be any form of digital information, such as text, files, or other
11 multimedia content. Various applications have various prerequisites of

the steganography strategy utilized.


As an example, a couple of applications may require outright imperceptibility of the
restricted data, while others require a much bigger mystery message to be covered up. During
this venture named "Image Steganography", we’ve zeroed in on least huge piece change
methods of spatial area. We’ve broke down and analyzed the variations of this calculation
regarding viability and concealing limit. Adequacy of the calculation is estimated by client
assessments deciding so, all things considered modification to the photographs got evident.

33
List of Tables

Table. No. Heading Page No.

1 Steganography Tools 13
List of Figure

Fig. No. Heading Page No.


1 Steganographic 2

2.2 Steganography model with encryption 3 3 Steganography in

Digital Images 8

3.1.1 Least Significance Bit Substitution 8

3.1.2 Least Significant Bit Substitution 9

3.1.3 Spiral Embedding 10

4 Data Hiding in Double Precision Image 12

4.2 Data extraction form Stego Image 13


4

Steganography - Hiding Message in an Image

Chapter – 1

Introduction

Chapter 1: Introduction

In an era characterized by unprecedented levels of digital communication and information exchange,


the need for secure and discreet transmission of sensitive information has never been more pressing.
Steganography, an ancient technique dating back to ancient Greece, offers a potent solution to this
challenge. Unlike cryptography, which focuses on rendering a message unintelligible through
1
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

encryption, steganography takes a different approach: it conceals the very existence of the message
itself. By embedding information within seemingly innocuous cover media, such as images,
steganography provides a covert channel through which confidential data can be transmitted
undetected. In this context, this paper aims to explore the intricate art of hiding messages within
digital images, a form of steganography that has gained prominence in the digital age. This
introduction sets the stage for a comprehensive examination of the principles, methodologies, and
applications of digital image steganography, shedding light on its historical evolution, underlying
concepts, and contemporary significance in information security. The objective is to elucidate the
principles, methodologies, and applications of this technique in modern information security.

The study begins by establishing a historical backdrop, tracing the evolution of steganography
from its ancient origins to its contemporary digital form. It then delves into the fundamental concepts
underlying digital image steganography, highlighting the importance of imperceptibility and capacity
in concealing information within the host image. The study explores the challenges and potential
vulnerabilities associated with steganographic techniques, discussing countermeasures and detection
strategies employed by adversaries.

Fig.1 Steganographic

2
SVKM’S Institute of Technology, Dhule
4

Steganography - Hiding Message in an Image

Chapter – 2

Motivation

Chapter 2: Motivation

The primary motivation behind steganography is to securely transmit sensitive information without
arousing suspicion. Unlike encryption, which secures information by making it unreadable,
steganography focuses on making the existence of the message itself unknown.

2.1 Purpose and Benefits of Using Steganography:


Steganography serves several important purposes in the realm of secure communication:
• Covert Communication: Steganography allows for the transmission of sensitive information
in a way that does not arouse suspicion. Unlike encryption, which might draw attention due
to the presence of scrambled or encoded text, steganographically hidden messages appear as
ordinary, innocuous data.

3
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

• Information Concealment: Steganography provides a means to hide the very existence of a


message. This is in contrast to encryption, which makes the content unintelligible but still
indicates the presence of protected information.

• Resistance to Detection: Steganographic techniques can be designed to be highly resistant to


detection. By subtly altering the carrier medium, it becomes extremely challenging for
unauthorized parties to identify the presence of hidden information.

• Dual Security Layers: When combined with encryption, steganography can provide an
additional layer of security. Even if an encrypted message is intercepted, the fact that it is
encrypted may still be apparent. However, when steganographically embedded within an
innocuous file, the existence of the message itself remains concealed.

• Avoidance of Suspicion: In situations where encryption might be illegal or draw unwanted


attention, steganography can be an alternative. It allows for covert communication without
raising suspicions, making it a valuable tool in contexts where privacy and confidentiality are
paramount.
2.2 Steganography model with encryption:
A steganography model with encryption is a sophisticated approach to secure communication that
26 incorporates both steganography and

encryption techniques. Steganography is the art of concealing information within a seemingly


innocuous carrier medium, while encryption involves converting plaintext into ciphertext using a
cryptographic algorithm and a key. By combining these two methods, a steganography model with
encryption offers a multi-layered approach to safeguarding sensitive data.

1. Encryption Algorithm:
The original message is encrypted using a secure encryption algorithm. This ensures that even if the
hidden message is discovered, it remains secure and unreadable without the decryption key.

4
SVKM’S Institute of Technology, Dhule
4

Steganography - Hiding Message in an Image

Fig.2.2 Steganography model with encryption

2. Steganographic Embedding:
The encrypted message is then embedded within a carrier medium, such as a digital image. This can
be done using techniques like LSB substitution, palette-based steganography, or other advanced
methods.

3. Key Management:
29
Both the encryption key (for decrypting the hidden message) and the steganography key (for
extracting the hidden message from the carrier medium) must be securely managed and shared only
with authorized parties.

5
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

4. Communication channel:
The steganographically modified image, which contains the encrypted message, can be transmitted
through standard channels, such as email or file sharing services. To anyone not privy to the keys,
the image appears as a regular, innocuous file.

5. Receiving and Extraction:


The recipient of the steganographically modified image uses the steganography key to extract the
encrypted message from the carrier medium. This results in an encrypted text.

6. Decryption Algorithm:
The recipient then uses the encryption key to decrypt the hidden message, revealing the original
plaintext message.

6
SVKM’S Institute of Technology, Dhule
4

Steganography - Hiding Message in an Image

Chapter – 3

Steganography

techniques

Chapter 3: Steganography in Digital Images

Steganography in digital images is a method of concealing information within the pixel data of an
image in such a way that it is not readily perceptible to the human eye. Various techniques are
employed to subtly alter the pixel values while preserving the overall visual integrity of the image.

7
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

Fig.3 Steganography in Digital Images

24
3.1 Least Significant Bit (LSB) Substitution:

Least Significant piece (LSB) addition is a typical, basic way to deal with cover picture is to insert
th
bit) of a few or the entirety 6 of the bytes inside a picture
data in to it. The less significant cycle (the 8
is changed with bit of the mysterious message. When utilizing a a day-cycle picture, a bit of every
6 one of the three color shading parts can utilized, since they each addressed
with byte. As such, 3 bits in each pixels can be stored. A 800 × 600 pixel picture, would thus be
able to store an aggregate sum 6
23 of 1,440,000 pieces or

180,000 bytes installed information. The binary bits of the message are sequentially embedded into
the least significant bit of each color channel in the selected pixels. The original LSB is replaced with
the corresponding message bit.

Fig.3.1.1 Least Significance Bit Substitution

8
SVKM’S Institute of Technology, Dhule
4

Steganography - Hiding Message in an Image

• Bit Plane:
It may be necessary to show the sacrifices expressed by the department. Instead of showing a dark
image. We believe that each pixel in the image will be 8. Imagine an image that contains eight 1-bit
fields. From flight number 1-0(LSB) to flight 7(MSB). For 8-bit bytes, field 0 contains all required
wavelengths in bytes. Including the pixels in the image, and field 7 contains all required wavelengths.
Sharing computer images with the touch screen helps determine the playback value of each image.
This determines the amount of image magnification used to count all the pixels and helps with image
compression

• Spiral Embedding:
This orders the picture elements of picture in winding example to keep the implanting from being
effectively decode. Spiral Embedding has 2 principle thoughts that permit it to being decoded
effectively and support obstruct visual assaults. This begins with metadata about the picture's
substance which are installed in known areas. This data made conceivable to decipher the stegno
protest and recover the mysterious message. Another the information is serialized and implanted in
an example that annihilates the capacity to translate the message in a visual attack. The Spiral
Embedding starts by building a vector containing all the information that will be installed into the
cover including the metadata and the message substance.

9
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

Fig.3.1.3 Spiral Embedding[A.Saxena,2021]

• Metadata Manipulation:
Metadata is fundamentally data about data. In the event that we think about a picture record as our
data, metadata would incorporate data, for example, the identified name, the title, measurements,
broadness , tallness, Video and sound documents contain similar sorts of information. Exif which is
known as Exchangeable image file design has standard utilization for recorded data about picture and
sound documents made with computerized camera. There are numerous information handle that must
be utilized to shroud data. If we right snap on a saved .jpg archive and select properties, we will see
a little subset of those fields.

• Altering Threshold:
Thresholding is the most uncomplex procedure for picture division. From a grayscale picture,
thresholding can be used to make binary pictures. The most effortless thresholding procedures replace
each pixel in an image with a dim pixel if the image power isn't by and large some fixed consistent
T or a white pixel if the image power is high essential than that steady.

SVKM’S Institute of Technology, Dhule


4

Steganography - Hiding Message in an Image

10

Chapter – 4

Methodology

11

SVKM’S Institute of Technology, Dhule


Steganography - Hiding Message in an Image

Chapter 4: Methodology

This technique is hiding method in time domain in double precision image. For the definition, cover
image is original image without any data in it and stego image which carries the data after data hiding
algorithm. Hiding algorithm must produce better performance parameters measured between cover
and stego image. Performance parameters deteriorate when user increases the capacity which
presents number of bit hidden in every pixel.

Fig.4 Data Hiding in Double Precision Image [J. Singh and M. Singla, 2021]

12 SVKM’S Institute of Technology, Dhule


4

Steganography - Hiding Message in an Image

4.1 Data hiding steps:


• Select cover image for Data Hiding
• Convert image into double precision type
• Decomposing pixel to constituent bits (64-bit format)
• According to Data size decide how many bits to be replaced

• Convert each 64-bit into floating point number

4.2 Data extraction steps:


• Select stego image for Data extraction
• Decomposing pixel to constituent bits
• Take data bits from each pix

Fig.4.2 Data extraction form Stego Image [J. Singh and M. Singla, 2021]

13
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

25

Chapter – 5

Result and

Discussion

Chapter 5: Result and Discussion

3
To encode the text into image:
14
SVKM’S Institute of Technology, Dhule
4

Steganography - Hiding Message in an Image

• Load an image and looks at each pixels in hexadecimal value.


• Converts secret text into bits and stores them in LSB of pixel bits
• A delimiter is added to the end of the edited pixel values To decode the text from
image:
• While retrieving all the 0’s and 1’s extracted until delimiter is found.
• Extracted bits are converted into string(secret message)

9
Python 3.7.2 (tags/v3.7.2:9a3ffc0492, Dec 23 2018, 22:20:52) [MSC v.1916 32 bit
(Intel)] on win32
Type "help", "copyright", "credits" or "license()" for more information.
>>>
========= RESTART: C:\Users\HP\Desktop\Steganography\stegofile.py
Enter secert message: Hello
Enter password: 1234
Enter passcode for Decryption1234
Decryption message Hello
>>>

15
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

28

Chapter – 6

Conclusion &

Future

developments

Chapter 6: Conclusion

The concept of Steganography is to hide the data and developments associated with it. There is a
significant difference between Steganography and Encryption; After all, they can be filled with
34 special requirements. They can be used together,
for example, you can hide information on the street. You need a medium-sized cover to cover
something (Like an image, sound, text or even a report) of the process. The average coverage is not
16
SVKM’S Institute of Technology, Dhule
4

Steganography - Hiding Message in an Image

too thick. Although the proposed data can be understood without problems, it is necessary to resolve
the potential means by continuing to store them. Delivering information, changes, adjustments,
releases, tension ns or difficulties is a process. It is also thought that the truth of the hidden
information may be difficult for other beneficiaries to understand. And security managers need to
have a strategy to differentiate that data. However, this fact. There hide the right to duplicate material
and other business data. The hidden information is known as a watermark. This is often
unrecognizable. There is a tendency to deliberately popularize it, as in the case of the rapid adoption
of programs.

Future developments:

• This application wants anyone trying to hide data to use it to capture redundant personal data
without delay.
• This item is in a better position than other data security systems because its function is a
closed image and there is not enough physical data support.
• Thanks to its easy-to-use interface, this application can be used properly by anyone who needs
to communicate and keep personal information confidential.
• The next step after this stemography is to hide the message in the video this method is knows
as cryptography

Reference:
10
H. Ge, M. Huang and Q. Wang, "Steganography and steganalysis based on digital image," 2011 4th
International Congress on Image and Signal Processing, Shanghai, China, 2011, pp. 252-255, doi:
10.1109/CISP.2011.6099953.

14

17
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image

A. Saxena and G. Maheshwari, "Digital Image Steganography," 2021 International Conference on


Simulation, Automation & Smart Manufacturing (SASM), Mathura, India, 2021, pp. 1-5, doi: 8

10.1109/SASM51857.2021.9841151.

J. Singh and M. Singla, "A Novel Method of high-Capacity Steganography Technique in Double
Precision Images," 2021 International Conference on Computational Performance Evaluation
(ComPE), Shillong, India, 2021, pp. 780-784, doi: 10.1109/ComPE53109.2021.9751905.

12
M. Niimi, H. Noda, E. Kawaguchi and R. O. Eason, "High capacity and secure digital steganography
20 to palette-

based images," Proceedings. International Conference on Image Processing, Rochester, NY, USA,
2002, pp. II-II, doi: 10.1109/ICIP.2002.1040101.

Website:
Digital -https://ieeexplore.ieee.org

18
SVKM’S Institute of Technology, Dhule
Similarity Report ID: oid:9832:47467477

21% Overall Similarity

TOP SOURCES
The sources with the highest number of matches within the submission. Overlapping sources will not be displayed.

Southern New Hampshire University - Continuing Education on 2019-0...


9 1%
Submitted works

Sources overview
Similarity Report ID: oid:9832:47467477

10 Muhammad Miftahul Amri, Mahamadaree Waeno, Muhammad Zain M...


1%
Crossref

11 National Institute of Technology, Raipur on 2021-11-08


<1%
Submitted works

12 preview-asp-eurasipjournals.springeropen.com
<1%
Internet

13 Engineers Australia on 2021-05-06


<1%
Submitted works

Kseniya Kurin, Oleksandr Yudin, Olha Suprun, Oleh Suprun, Oleksandr P...
14 <1%
Crossref

Vishal Moyal. "A Suggestive Low Power TIQ Comparator Architecture u...
15 <1%
Crossref

pdfs.semanticscholar.org
16 <1%
Internet

Institute of Technology, Nirma University on 2016-05-03


17 <1%
Submitted works

National Institute of Technology, Rourkela on 2021-11-15


18 <1%
Submitted works

livrepository.liverpool.ac.uk
19 <1%
Internet

Queen's University of Belfast on 2021-04-23


20 <1%
Submitted works

Sources overview
Similarity Report ID: oid:9832:47467477

tcetmumbai.in
21 <1%
Internet

iosrjournals.org
22 <1%
Internet

Higher Education Commission Pakistan on 2015-08-25


23 <1%
Submitted works

Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial, Brendan H...
24 <1%
Crossref

Sources overview
Similarity Report ID: oid:9832:47467477

25 es.scribd.com
<1%
Internet

26 Kingston University on 2012-12-15


<1%
Submitted works

27 docplayer.net
<1%
Internet

28 National Institute of Technology, Raipur on 2020-10-04


<1%
Submitted works

29 Sri Lanka Institute of Information Technology on 2021-05-30


<1%
Submitted works

30 University of Central Lancashire on 2023-11-24


<1%
Submitted works

31 University of Greenwich on 2017-02-01


<1%
Submitted works

University of the Pacific on 2022-12-10


32 <1%
Submitted works

idoc.tips
33 <1%
Internet

Sources overview
Similarity Report ID: oid:9832:47467477

Excluded from Similarity Report


Manually excluded sources

EXCLUDED SOURCES

National Institute of Technology, Kurukshetra on 2018-04-29


6%
Submitted works

Juhi Singh, Mukesh Singla. "A Novel Method of high-Capacity Steganography ...
5%
Crossref

Amity University on 2018-06-19


2%
Submitted works

medium.com
<1%
Internet

researchcommons.waikato.ac.nz
<1%
Internet

Excluded from Similarity Report

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy