Steganography Presentation
Steganography Presentation
Project Idea
To combine two security techniques 1. Cryptography (For Encryption & Decryption) 2. Steganography (For Data hiding in a multimedia object)
Techniques of steganography
Steganography Techniques
Images
Video
Audio
IMAGE WATERMARKING
IMAGE WATERMARKING:
VISIBLE
Viewable to the normal eye.
INVISIBLE
Not viewable by ordinary eye. More secure and robust.
IMPERCEPTIBLITY
SECURITY
APPLICATION OF IMAGE WATERMARKING Copy Prevention and Control ID card and Security
Transaction Tracking
APPROACHES TO
LSB Method Spatial domain Bit Plane Complexity Steganography
Transform domain
Host Image
Encryption
Encryption Key
Embedding Encoder
Transformed Y-Component
Apply Inverse Discrete Wavelet Transform(IDWT) Stego Image
Encrypted Information
19
RGB
YCbCr
WAVELET TRANSFORM
A versatile mathematical tool to analyze transient, time variant signals
NonOrthogo nal
DWT can be
1- Dimensional 2-Dimensional 3- Dimensional
Original Image
Downsampler
Downsampler
Original Image
Row-wise DWT
Approximation Details
Vertical Details
Haar-Wavelet Transform
xn ,i {10,13,25,26,29,21,7,15}
xn 1,i xn , 2i xn , 2i 1 2 d n 1,i xn , 2i xn , 2i 1 2
Haar-Wavelet Transform
xn , 2i xn 1,i d n 1,i xn , 2i 1 xn 1,i d n 1,i
2D Haar-wavelet Transform
Encryption
Encryption Key
Embedding Encoder
Apply Inverse Discrete Wavelet Transform(IDWT)
37
Stego Image
ENCRYPTION
The process of obscuring information to make it unreadable without special knowledge. Done by using an encryption algorithm, a formula used to turn plain text into cypher text
38
39
Convert the character to numerical values to prepare for the matrix-vector product by forming a matrix with two rows and lots of columns.
Encode with matrix multiplication modulo p and reshape resulting matrix into a single row. If length(x) is odd, encode the last character. Finally covert the numbers back to characters to get encrypted message.
43
DEGREE OF INVISIBLITY
44
47
Select image
Encrypt Data
Embedding Data
Analysis
Select Image
Jan
Feb
March
April
May
June
July
August
Sept
Implementation Of
Data Embedding
Technique
Report Writing
64