0% found this document useful (0 votes)
112 views64 pages

Steganography Presentation

This document discusses combining cryptography and steganography for information security. It describes hiding secret messages in various formats throughout history. Digital steganography techniques include hiding data in DNA strands, digital media files like images, text documents, and unused computer memory. The document focuses on digital image steganography and watermarking. It explains spatial and transform domain methods for watermarking images. The document provides details on an algorithm for hiding information in images using the discrete wavelet transform, encryption, and imperceptible embedding before extracting the hidden data. It evaluates the quality of stego images based on cumulative error and peak signal-to-noise ratio compared to original images.

Uploaded by

Urooba Kasbati
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views64 pages

Steganography Presentation

This document discusses combining cryptography and steganography for information security. It describes hiding secret messages in various formats throughout history. Digital steganography techniques include hiding data in DNA strands, digital media files like images, text documents, and unused computer memory. The document focuses on digital image steganography and watermarking. It explains spatial and transform domain methods for watermarking images. The document provides details on an algorithm for hiding information in images using the discrete wavelet transform, encryption, and imperceptible embedding before extracting the hidden data. It evaluates the quality of stego images based on cumulative error and peak signal-to-noise ratio compared to original images.

Uploaded by

Urooba Kasbati
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 64

INFORMATION security

Project Idea
To combine two security techniques 1. Cryptography (For Encryption & Decryption) 2. Steganography (For Data hiding in a multimedia object)

COMBINATION OF STEGANOGRAPHY AND CRYPTOGRAPHY

Some Historic wExamples:


Messages written on shaved head of messengers and hidden by regrowth of hair.
Covering wood scraped with messages by wax. Microdots using invisible ink to wrtie in between lines of Writing in between lines of ordinary documents with invisible ink. Chinese silk balls

HOW STEGANOGRAPHY WORKS

Techniques of steganography
Steganography Techniques

Genome Steganography: hiding data in strands of DNA

Hiding secret data in digital media such as images.

Hiding in text Documents.

Hiding secret data in unused memory

WHAT IS DIGITAL STEGANOGRAPHY?

Images

Video

Audio

DIGITAL Steganography using image watermarking


REASONS: It can contain enough information to hide, while not appearing to be modified. It is common enough to not attract any attention.

IMAGE WATERMARKING

IMAGE WATERMARKING:
VISIBLE
Viewable to the normal eye.

INVISIBLE
Not viewable by ordinary eye. More secure and robust.

CHARACTERISTICS OF IMAGE WATERMARKING


ROBUSTNESS

IMPERCEPTIBLITY
SECURITY

APPLICATION OF IMAGE WATERMARKING


Copy prevention and control ID card and security Transaction tracking Authentication of image content

APPLICATION OF IMAGE WATERMARKING Copy Prevention and Control ID card and Security

APPLICATION OF IMAGE WATERMARKING

Transaction Tracking

APPLICATION OF IMAGE WATERMARKING


Authentication of Image Content

IMAGE WATERMARKING METHODS

Spatial Domain Methods

Transform Domain Methods

Hides data in pixels

Hides data in transformed image coefficients

APPROACHES TO
LSB Method Spatial domain Bit Plane Complexity Steganography

Transform domain

Discrete Cosine Transform

Discrete Wavelet Transform

WHICH METHOD TO PREFER


Spatial Domain Method Less complex. Not robust against attacks Transform Domain method Complexity increases More robust

Host Image

ALGORITHM TO HIDE INFORMATION


Information need to hide
Conversion into Bits

Convert RGB to YCbCr Selection of Y component

Apply Discrete Wavelet Transform(DWT)

Encryption

Encryption Key

Embedding Encoder
Transformed Y-Component
Apply Inverse Discrete Wavelet Transform(IDWT) Stego Image

Encrypted Information
19

CONVERTING FROM RGB TO YCBCR


converts
To separate out the luminance and color component

Red Green Blue

Y-Luminance Cb-ChrominanceBlue Cr: ChrominanceRed

RGB

YCbCr

WAVELET TRANSFORM
A versatile mathematical tool to analyze transient, time variant signals

TYPES OF WAVELET TRANSFORM

NonOrthogo nal

DISCRETE WAVELET TRANSFORM


Continuou s Dilation and translation

Large redunda ncy

Continuou s wavelet transform

Orthogo nal wavelets

CONTINOUS WAVELET TRANSFORM

Slow reconstr uction of the signal

Non redunda nt informati on

Discrete wavelet transform

Discrete dilation and translati on

Rapid signal reconstr uction

DWT can be
1- Dimensional 2-Dimensional 3- Dimensional

1-DIMENSIONAL DISCRETE WAVELET TRANSFORM

Original Image

Low Pass Filter

High Pass Filter

Downsampler

Downsampler

2-DIMENSIONAL DISCRETE WAVLET TRANSFORM

Original Image

Row-wise DWT

Low (L) Frequency Details Column-wise DWT

High (H) Frequency Details Column-wise DWT

LL1 Frequency Details

LH1 Frequency Details

HL1 Frequency Details

HH1 Frequency Details

Approximation Details

Vertical Details

LL1 Frequency Details

HL1 Frequency Details

LH1 Frequency Details


Horizontal Details

HH1 Frequency Details


Diagonal Details

2-DIMENSIONAL DISCRETE WAVELET TRANSFORM

2 LEVEL 2-DIMENSIONAL DISCRETE WAVELET TRANSFORM

2 LEVEL 2-DIMENSIONAL WAVELET TRANSFORM

3- LEVEL 2-DIMENSIONAL WAVELET

Haar-Wavelet Transform
xn ,i {10,13,25,26,29,21,7,15}
xn 1,i xn , 2i xn , 2i 1 2 d n 1,i xn , 2i xn , 2i 1 2

{xn 1,i , d n 1,i } {11.5,25.5,25,11,1.5,0.5,4,4}

Haar-Wavelet Transform
xn , 2i xn 1,i d n 1,i xn , 2i 1 xn 1,i d n 1,i

Inverse Discrete Wavelet Transform (IDWT) of the Haar-wavelet transform.

2D Haar-wavelet Transform

ALGORITHM FOR HIDING INFORMATION


Host Image

Information need to hide

Convert RGB to Ycbcr Selection of Y component Conversion into Bits

Apply Discrete Wavelet Transform(DWT)

Encryption

Encryption Key

Embedding Encoder
Apply Inverse Discrete Wavelet Transform(IDWT)
37

Stego Image

ENCRYPTION
The process of obscuring information to make it unreadable without special knowledge. Done by using an encryption algorithm, a formula used to turn plain text into cypher text

38

WHY USE ENCRYPTION


Authentication Privacy Integrity

39

FUNCTION FOR ENCRYPTION


Use a two-character Hill cipher with arithmetic modulo 97, a prime. Choose two characters above ASCII 128 to expand the size of the character set from 95 to 97.

Convert the character to numerical values to prepare for the matrix-vector product by forming a matrix with two rows and lots of columns.
Encode with matrix multiplication modulo p and reshape resulting matrix into a single row. If length(x) is odd, encode the last character. Finally covert the numbers back to characters to get encrypted message.

MEASURES TO DETERMINE THE QUALITY OF THE STEGO IMAGE


Cumulative squared error between the stego image and the original image

ALGORITHM FOR EXTRACTION OF INFORMATION

EXPERIMENT AND RESULTS

43

DEGREE OF INVISIBLITY
44

PEAK SIGNAL TO NOISE RATIO


Image Lena Data in bits 480 800 1040 1200 1600 Mandrill 480 800 1040 1200 1600 Peppers 480 800 1040 1200 1600 PSNR 43.3206 39.5925 38.0499 36.9236 35.6237 37.4194 34.4062 33.5 32.0866 30.24 38.6451 37.156 35.7352 34.9357 33.6473

PSNR VERSUS DATA IN BITS


PSNR Versus No of Data in Bits
50 45 40 35 30 PSNR 25 Mandril 20 15 10 5 0 Mandril Peppers Lenna Peppers Lenna

480 37.4194 38.6451 43.3206

800 34.4062 37.156 39.5925

1040 33.5 35.7352 38.0499 No of Data in Bits

1200 32.0866 34.9357 39.9236

1600 30.24 33.6473 35.6237

THE PROTOTYPE SOFTWARE


Features: Hiding Data Extracting Data Analysis of the images

47

Hiding data into the image

Retrieving data from the image

Select image

Write The Message

Encrypt Data

Embedding Data

Analysis

Select Image

JOURNEY THROUGH THE PROJECT


Tasks
Literature Review

Jan

Feb

March

April

May

June

July

August

Sept

Implementation Of

Data Embedding
Technique

Implementation Of Data Extraction Technique

Simulation using graphical user interface

Report Writing

64

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy