0% found this document useful (0 votes)
3 views11 pages

Steganography Hiding Information in The Image

The document discusses a project on steganography, specifically focusing on hiding information within digital images using the Least Significant Bit (LSB) method. It outlines the objectives, tools, and technologies used, as well as the encoding and decoding functions implemented in Python. The project highlights the effectiveness of LSB for secure communication while acknowledging its limitations and suggesting future enhancements.

Uploaded by

aimanbot303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views11 pages

Steganography Hiding Information in The Image

The document discusses a project on steganography, specifically focusing on hiding information within digital images using the Least Significant Bit (LSB) method. It outlines the objectives, tools, and technologies used, as well as the encoding and decoding functions implemented in Python. The project highlights the effectiveness of LSB for secure communication while acknowledging its limitations and suggesting future enhancements.

Uploaded by

aimanbot303
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Steganography – Hiding

Information in the Image


A Project on Digital Image-based
Data Hiding
Introduction
• Steganography is the technique of hiding
information within other non-secret data.
• In this project, we hide messages inside digital
images using the Least Significant Bit (LSB)
method.
• Unlike cryptography, steganography hides the
existence of the message itself.
Objectives
• - Understand steganography and its
importance
• - Implement image-based steganography in
Python
• - Hide and retrieve messages in image files
• - Evaluate LSB method's effectiveness
• - Maintain image quality after data embedding
Tools & Technologies
• - Language: Python
• - Libraries: PIL, NumPy
• - Optional GUI: Tkinter
• - Image Format: PNG (lossless)
• - IDEs: Jupyter Notebook, VS Code, or
PyCharm
LSB Method Overview
• Each image pixel contains RGB values (0-255).
• We modify the least significant bit of each
color channel to store the message.
• This method is visually lossless and efficient
for hiding short texts.
Encoding Function (Python)
• def encode_message(image_path, message,
output_path):
• img = Image.open(image_path)
• binary = ''.join(format(ord(c), '08b') for c in
message) + '11111110'
• pixels = img.load()
• idx = 0
• for y in range(img.height):
• for x in range(img.width):
Decoding Function (Python)
• def decode_message(image_path):
• img = Image.open(image_path)
• pixels = img.load()
• bits = ''
• for y in range(img.height):
• for x in range(img.width):
• r, g, b = pixels[x, y]
• bits += str(r & 1)
• chars = [bits[i:i+8] for i in range(0, len(bits),
Applications
• - Secure communication
• - Watermarking
• - Metadata embedding
• - Digital forensics and investigations
Limitations
• - LSB is vulnerable to compression
• - Message capacity is limited by image size
• - Not secure against advanced steganalysis
Future Scope
• - Audio/Video steganography
• - Combine with encryption
• - Build GUI tools
• - Explore DCT/DWT-based methods
Conclusion
• We successfully implemented LSB-based
steganography.
• Messages were embedded and retrieved from
images without visible distortion.
• It is a simple yet powerful method of secure
communication.
• Future developments can enhance its
robustness and usability.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy