0% found this document useful (0 votes)
47 views23 pages

DSP Implementation of Efficient Steganography Algorithm: Interim Progress Report Review Ii

The interim progress report summarizes the work done so far on implementing an efficient steganography algorithm using DSP. The objectives are to develop a steganographic algorithm for image encryption and to ensure the hidden message is imperceptible to humans. The proposed method uses still image steganography and the LSB technique in MATLAB. Literature on thermal image steganography and LSB-based methods are reviewed. The algorithm overlays hidden data bits onto the LSB of image pixel bytes. The progress review outlines work completed and expected milestones like obtaining pixel matrices and presenting final results. Applications include confidential communication and secret data storage. Preliminary results run in MATLAB are presented.

Uploaded by

Prudhvi Nakkina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views23 pages

DSP Implementation of Efficient Steganography Algorithm: Interim Progress Report Review Ii

The interim progress report summarizes the work done so far on implementing an efficient steganography algorithm using DSP. The objectives are to develop a steganographic algorithm for image encryption and to ensure the hidden message is imperceptible to humans. The proposed method uses still image steganography and the LSB technique in MATLAB. Literature on thermal image steganography and LSB-based methods are reviewed. The algorithm overlays hidden data bits onto the LSB of image pixel bytes. The progress review outlines work completed and expected milestones like obtaining pixel matrices and presenting final results. Applications include confidential communication and secret data storage. Preliminary results run in MATLAB are presented.

Uploaded by

Prudhvi Nakkina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

INTERIM PROGRESS REPORT

REVIEW II
on

DSP IMPLEMENTATION OF EFFICIENT STEGANOGRAPHY ALGORITHM

Submitted by
SAI SARATH KUMAR (RA1511004010428)
PRUDHVI NAKKINA (RA1511004010198)
KPNVS MAHENDRAV (RA1511004010204)
PRASADA REDDY (RA1511004010806)
Under the supervision of
Mr. S.VIJAY ANANTH
Department of ECE

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


Faculty of Engineering and Technology ,SRM Institute of Science and Technology
1
SRM Nagar, Kattankulathur – 603203, Kancheepuram District, Tamil Nadu
INDEX
● ABSTRACT
● OBJECTIVES
● PROBLEM STATEMENT
● PROPOSED AND EXISTING METHOD
● LITERATURE SURVEY
● NOVELTY
● SYSTEM DESIGN
● LSB ALGORITHM
● FLOWCHART
● HARDWARE SPECIFICATIONS
● SOFTWARE SPECIFICATIONS
● REVIEW PROGRESS
● APPLICATIONS
● RESULT
● REFERENCES
2
ABSTRACT
The fast growth of the electronic era has led to all documentations,audio
and video being digitized. This has increased the requirement for ensuring
the safety and reliability of any document, audio and video to maintain
privacy, and to prevent piracy and mass reproduction.
Steganography is the art of invisible communication to keep secret
information inside other information.

Steganography algorithm can be used for image encryption

3
PROBLEM STATEMENT
The importance of data hiding techniques comes from the fact
the there is no reliability over the medium through which the
information is send, in other words the medium is not secured.

How can we send a message secretly to the destination?


Using steganography, information can be hidden in carriers such
as images, audio files, text files, videos and data transmissions.

4
OBJECTIVES
In a steganography system the hidden message carried by stego media
should not be sensible to human beings.

In our project the main objective is to analyse, enhance and to


develop a steganographic algorithm for image encryption.

5
EXISTING AND PROPOSED METHOD

Existing method :
1. Plain text steganography
2. Use of selected characters to cover text
3. Use of extra white space characters of cover text
Proposed method :
1. Still image steganography
2. LSB technique implementation using MATLAB
6
LITERATURE SURVEY
1. “Steganography on Thermal Images Using Generation Technique” by
Mr.S.Vijayananth and Dany Thomas, IEEE 2014

• In this paper, thermal image which contains only red, green, blue colours is been
hidden by processing with the key image there by generates the cover image thus
the technique used is known as the generation technique in Steganography.

2. “LSB Layer Independent Robust Steganography using Binary Addition” by


Mr.Biswajitha datta and MR. Samir kumar, CMS 2016.
• The technique discussed in this paper meets three challenges of steganography
efficiently. It meets imperceptibility issue by ensuring that the maximum
number of changes in intensity value is independent of number of LSB layer
chosen for binary addition 7
LITERATURE SURVEY
3. “An Introduction to Image Steganography Techniques” by
Shahrin bin Sahib and Mazdak Zamani, ACSAT 2012

• This paper deals with basics of steganography, different types of steganography


and different measurement criteria of steganography

8
NOVELTY

Early steganographic techniques used LSB algorithm for hiding message.


Whereas our system utilized LSB algorithm along with thermal image for
better security.

9
LSB ALGORITHM
In this method, we can take the binary representation of the hidden_data
and overwrite the LSB of each byte within the cover_image. If we are using
24-bit color, the amount of change will be minimal and indiscernible to the
human eye. As an example, suppose that we have three adjacent pixels

10010101 00001101 11001001


10010110 00001111 11001010
10011111 00010000 11001011

10
LSB ALGORITHM
Now suppose we want to "hide" the following 9 bits of data 101101101. If
we overlay these 9 bits over the LSB of the 9 bytes above, we get the
following
10010101 00001100 11001001
10010111 00001110 11001011
10011111 00010000 11001011

11
FLOWCHART
Algorithm for creating a stego
image and extracting the message
image

12
FLOWCHART
Algorithm for calculation of MSE and
PSNR
SOFTWARE SPECIFICATIONS
SOFTWARE SPECIFICATION
1. MATLAB R2010a

14
REVIEW PROGRESS
REVIEW WORK EXPECTED DATE
TO BE DONE
REVIEW 1 CONVERSION OF RGB 23.01.2019
IMAGE TO GREY SCALE
AND OBTAINING PIXEL
MATRIX
REVIEW 2 SUCCEESFULLY LAST WEEK OF
IMPLEMENTING FEBRUARY 2019
STEGANOGRAPHY
ALGORITHM IN MATLAB

REVIEW 3 IMPLEMENTING M-LSB LAST WEEK OF MARCH


ALGORITHM IN THERMAL / 2019
NORMAL IMAGE AND
PRESENTING THE
FINAL RESULT 15
APPLICATION
● Confidential communication

● Secret data storing


● Protection from data alteration

16
PROGRAM

17
RESULT
RESULTS AFTER RUNNING THE PROGRAM IN MATLAB

18
RESULT

19
REFERENCES
1. “An Introduction to Image Steganography Techniques” by
Shahrin bin Sahib and Mazdak Zamani, ACSAT 2012
https://ieeexplore.ieee.org/document/6516338

2. “Steganography on Thermal Images Using Generation Technique” by


Mr.S.Vijayananth and Dany Thomas, IEEE 2014
https://ieeexplore.ieee.org/document/7019432/metrics#metrics
[

3. “LSB Layer Independent Robust Steganography using Binary Addition” by


Mr.Biswajitha datta and MR. Samir kumar, CMS 2016

20
THANK YOU

21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy