Stegnography P
Stegnography P
Pages 1.1MB
SUBMISSION DATE REPORT DATE
Nov 29, 2023 1:29 PM GMT+5:30 Nov 29, 2023 1:30 PM GMT+5:30
The combined total of all matches, including overlapping sources, for each database.
11% Internet database10% Publications database
Crossref databaseCrossref Posted Content database
21% Submitted Works database
13
We the undersigned solemnly declare that the report of the Mini Project-II work entitled
2
Steganography – Hiding Message in an image, is based on our own work carried out during the
course of our study under the supervision of Prof. Farha Naz
We assert that the statements made and conclusions drawn are an outcome of the Mini
Project-II work. We further declare that to the best of our knowledge and belief that the report
does not contain any part of any work which has been submitted for the award of any other
degree/diploma/certificate in this University / deemed University of India or any other country.
All helps received and citations used for the preparation of the Project phase-I report have been
duly acknowledged.
18
This is to certify that the report of the Mini Project-II work entitled Steganography – Hiding
message in an image is a record of
27
under my guidance and supervision for the award of Degree of Bachelor of Technology in the 1
faculty of Electrical Engineering, of Dr. Babasaheb Ambedkar Technological University, Lonere
5
(M.S.) India.
Principal
22
Shri Vile Parle Kelavani Mandal’s Institute of Technology, Dhule
CERTIFICATE BY THE EXAMINERS
has been examined by the undersigned as a part of the examination and is hereby
recommended for the award of the degree of Bachelor of Technology in the faculty
of Electrical Engineering of Dr. Babasaheb Ambedkar Technological University,
Lonere (M.S.) India.
ACKNOWLEDGEMENT
Foremost, we would like to express our 19 sincere gratitude to our supervisor Prof. Farha Naz
for her continuous support and guidance. Her expertise and experience have helped us in all times of
our Mini Project-II work and writing thesis. She has been source of inspiration and motivation for
bringing an insight into the Mini Project-II work. 17
1
We would like to extend our sincere thanks to Dr. Vishal Moyal, Head of the Department,
1
Electrical Engineering, Shri Vile Parle Kelavani Mandal’s Institute of Technology, Dhule, for
extending the necessary help required for carrying out the Mini Project-II work. We extend our
21regards to Dr. Nilesh Salunke, Principal, Shri Vile Parle
Kelavani Mandal’s Institute of Technology, Dhule, who supported us in all respect during our Mini
Project-II work. We extend our gratitude towards the management, Shri Vile Parle Kelavani Mandal
for providing required infrastructural facilities. Last but not the least our unending gratefulness to our
faculty members, support staff, friends and family for their endless support throughout the work, thus
leading us to achieve our objective.
1
SVKM’s Institute of Technology, Dhule
1
Table of Contents
Abstract i
List of Tables ii
List of Figures iii
1. Introduction 1
2. Motivation 3
Significant Bit 8
30
4. Methodology 11
4.1 Data hiding steps 13
5. Result &Discussions 14
References 18
Abstract
Hiding data in images, also known as image steganography, is a technique used to conceal
32 sensitive or confidential information within digital images. The process involves
embedding the data within the pixels of an image, making it appear as a normal image to the
human eye.
The hidden data can be any form of digital information, such as text, files, or other
11 multimedia content. Various applications have various prerequisites of
33
List of Tables
1 Steganography Tools 13
List of Figure
Digital Images 8
Chapter – 1
Introduction
Chapter 1: Introduction
encryption, steganography takes a different approach: it conceals the very existence of the message
itself. By embedding information within seemingly innocuous cover media, such as images,
steganography provides a covert channel through which confidential data can be transmitted
undetected. In this context, this paper aims to explore the intricate art of hiding messages within
digital images, a form of steganography that has gained prominence in the digital age. This
introduction sets the stage for a comprehensive examination of the principles, methodologies, and
applications of digital image steganography, shedding light on its historical evolution, underlying
concepts, and contemporary significance in information security. The objective is to elucidate the
principles, methodologies, and applications of this technique in modern information security.
The study begins by establishing a historical backdrop, tracing the evolution of steganography
from its ancient origins to its contemporary digital form. It then delves into the fundamental concepts
underlying digital image steganography, highlighting the importance of imperceptibility and capacity
in concealing information within the host image. The study explores the challenges and potential
vulnerabilities associated with steganographic techniques, discussing countermeasures and detection
strategies employed by adversaries.
Fig.1 Steganographic
2
SVKM’S Institute of Technology, Dhule
4
Chapter – 2
Motivation
Chapter 2: Motivation
The primary motivation behind steganography is to securely transmit sensitive information without
arousing suspicion. Unlike encryption, which secures information by making it unreadable,
steganography focuses on making the existence of the message itself unknown.
3
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image
• Dual Security Layers: When combined with encryption, steganography can provide an
additional layer of security. Even if an encrypted message is intercepted, the fact that it is
encrypted may still be apparent. However, when steganographically embedded within an
innocuous file, the existence of the message itself remains concealed.
1. Encryption Algorithm:
The original message is encrypted using a secure encryption algorithm. This ensures that even if the
hidden message is discovered, it remains secure and unreadable without the decryption key.
4
SVKM’S Institute of Technology, Dhule
4
2. Steganographic Embedding:
The encrypted message is then embedded within a carrier medium, such as a digital image. This can
be done using techniques like LSB substitution, palette-based steganography, or other advanced
methods.
3. Key Management:
29
Both the encryption key (for decrypting the hidden message) and the steganography key (for
extracting the hidden message from the carrier medium) must be securely managed and shared only
with authorized parties.
5
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image
4. Communication channel:
The steganographically modified image, which contains the encrypted message, can be transmitted
through standard channels, such as email or file sharing services. To anyone not privy to the keys,
the image appears as a regular, innocuous file.
6. Decryption Algorithm:
The recipient then uses the encryption key to decrypt the hidden message, revealing the original
plaintext message.
6
SVKM’S Institute of Technology, Dhule
4
Chapter – 3
Steganography
techniques
Steganography in digital images is a method of concealing information within the pixel data of an
image in such a way that it is not readily perceptible to the human eye. Various techniques are
employed to subtly alter the pixel values while preserving the overall visual integrity of the image.
7
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image
24
3.1 Least Significant Bit (LSB) Substitution:
Least Significant piece (LSB) addition is a typical, basic way to deal with cover picture is to insert
th
bit) of a few or the entirety 6 of the bytes inside a picture
data in to it. The less significant cycle (the 8
is changed with bit of the mysterious message. When utilizing a a day-cycle picture, a bit of every
6 one of the three color shading parts can utilized, since they each addressed
with byte. As such, 3 bits in each pixels can be stored. A 800 × 600 pixel picture, would thus be
able to store an aggregate sum 6
23 of 1,440,000 pieces or
180,000 bytes installed information. The binary bits of the message are sequentially embedded into
the least significant bit of each color channel in the selected pixels. The original LSB is replaced with
the corresponding message bit.
8
SVKM’S Institute of Technology, Dhule
4
• Bit Plane:
It may be necessary to show the sacrifices expressed by the department. Instead of showing a dark
image. We believe that each pixel in the image will be 8. Imagine an image that contains eight 1-bit
fields. From flight number 1-0(LSB) to flight 7(MSB). For 8-bit bytes, field 0 contains all required
wavelengths in bytes. Including the pixels in the image, and field 7 contains all required wavelengths.
Sharing computer images with the touch screen helps determine the playback value of each image.
This determines the amount of image magnification used to count all the pixels and helps with image
compression
• Spiral Embedding:
This orders the picture elements of picture in winding example to keep the implanting from being
effectively decode. Spiral Embedding has 2 principle thoughts that permit it to being decoded
effectively and support obstruct visual assaults. This begins with metadata about the picture's
substance which are installed in known areas. This data made conceivable to decipher the stegno
protest and recover the mysterious message. Another the information is serialized and implanted in
an example that annihilates the capacity to translate the message in a visual attack. The Spiral
Embedding starts by building a vector containing all the information that will be installed into the
cover including the metadata and the message substance.
9
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image
• Metadata Manipulation:
Metadata is fundamentally data about data. In the event that we think about a picture record as our
data, metadata would incorporate data, for example, the identified name, the title, measurements,
broadness , tallness, Video and sound documents contain similar sorts of information. Exif which is
known as Exchangeable image file design has standard utilization for recorded data about picture and
sound documents made with computerized camera. There are numerous information handle that must
be utilized to shroud data. If we right snap on a saved .jpg archive and select properties, we will see
a little subset of those fields.
• Altering Threshold:
Thresholding is the most uncomplex procedure for picture division. From a grayscale picture,
thresholding can be used to make binary pictures. The most effortless thresholding procedures replace
each pixel in an image with a dim pixel if the image power isn't by and large some fixed consistent
T or a white pixel if the image power is high essential than that steady.
10
Chapter – 4
Methodology
11
Chapter 4: Methodology
This technique is hiding method in time domain in double precision image. For the definition, cover
image is original image without any data in it and stego image which carries the data after data hiding
algorithm. Hiding algorithm must produce better performance parameters measured between cover
and stego image. Performance parameters deteriorate when user increases the capacity which
presents number of bit hidden in every pixel.
Fig.4 Data Hiding in Double Precision Image [J. Singh and M. Singla, 2021]
Fig.4.2 Data extraction form Stego Image [J. Singh and M. Singla, 2021]
13
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image
25
Chapter – 5
Result and
Discussion
3
To encode the text into image:
14
SVKM’S Institute of Technology, Dhule
4
9
Python 3.7.2 (tags/v3.7.2:9a3ffc0492, Dec 23 2018, 22:20:52) [MSC v.1916 32 bit
(Intel)] on win32
Type "help", "copyright", "credits" or "license()" for more information.
>>>
========= RESTART: C:\Users\HP\Desktop\Steganography\stegofile.py
Enter secert message: Hello
Enter password: 1234
Enter passcode for Decryption1234
Decryption message Hello
>>>
15
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image
28
Chapter – 6
Conclusion &
Future
developments
Chapter 6: Conclusion
The concept of Steganography is to hide the data and developments associated with it. There is a
significant difference between Steganography and Encryption; After all, they can be filled with
34 special requirements. They can be used together,
for example, you can hide information on the street. You need a medium-sized cover to cover
something (Like an image, sound, text or even a report) of the process. The average coverage is not
16
SVKM’S Institute of Technology, Dhule
4
too thick. Although the proposed data can be understood without problems, it is necessary to resolve
the potential means by continuing to store them. Delivering information, changes, adjustments,
releases, tension ns or difficulties is a process. It is also thought that the truth of the hidden
information may be difficult for other beneficiaries to understand. And security managers need to
have a strategy to differentiate that data. However, this fact. There hide the right to duplicate material
and other business data. The hidden information is known as a watermark. This is often
unrecognizable. There is a tendency to deliberately popularize it, as in the case of the rapid adoption
of programs.
Future developments:
• This application wants anyone trying to hide data to use it to capture redundant personal data
without delay.
• This item is in a better position than other data security systems because its function is a
closed image and there is not enough physical data support.
• Thanks to its easy-to-use interface, this application can be used properly by anyone who needs
to communicate and keep personal information confidential.
• The next step after this stemography is to hide the message in the video this method is knows
as cryptography
Reference:
10
H. Ge, M. Huang and Q. Wang, "Steganography and steganalysis based on digital image," 2011 4th
International Congress on Image and Signal Processing, Shanghai, China, 2011, pp. 252-255, doi:
10.1109/CISP.2011.6099953.
14
17
SVKM’S Institute of Technology, Dhule
Steganography - Hiding Message in an Image
10.1109/SASM51857.2021.9841151.
J. Singh and M. Singla, "A Novel Method of high-Capacity Steganography Technique in Double
Precision Images," 2021 International Conference on Computational Performance Evaluation
(ComPE), Shillong, India, 2021, pp. 780-784, doi: 10.1109/ComPE53109.2021.9751905.
12
M. Niimi, H. Noda, E. Kawaguchi and R. O. Eason, "High capacity and secure digital steganography
20 to palette-
based images," Proceedings. International Conference on Image Processing, Rochester, NY, USA,
2002, pp. II-II, doi: 10.1109/ICIP.2002.1040101.
Website:
Digital -https://ieeexplore.ieee.org
18
SVKM’S Institute of Technology, Dhule
Similarity Report ID: oid:9832:47467477
TOP SOURCES
The sources with the highest number of matches within the submission. Overlapping sources will not be displayed.
Sources overview
Similarity Report ID: oid:9832:47467477
12 preview-asp-eurasipjournals.springeropen.com
<1%
Internet
Kseniya Kurin, Oleksandr Yudin, Olha Suprun, Oleh Suprun, Oleksandr P...
14 <1%
Crossref
Vishal Moyal. "A Suggestive Low Power TIQ Comparator Architecture u...
15 <1%
Crossref
pdfs.semanticscholar.org
16 <1%
Internet
livrepository.liverpool.ac.uk
19 <1%
Internet
Sources overview
Similarity Report ID: oid:9832:47467477
tcetmumbai.in
21 <1%
Internet
iosrjournals.org
22 <1%
Internet
Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial, Brendan H...
24 <1%
Crossref
Sources overview
Similarity Report ID: oid:9832:47467477
25 es.scribd.com
<1%
Internet
27 docplayer.net
<1%
Internet
idoc.tips
33 <1%
Internet
Sources overview
Similarity Report ID: oid:9832:47467477
EXCLUDED SOURCES
Juhi Singh, Mukesh Singla. "A Novel Method of high-Capacity Steganography ...
5%
Crossref
medium.com
<1%
Internet
researchcommons.waikato.ac.nz
<1%
Internet