Image Steganography Abstract

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Image Steganography

ABSTRACT:
The word steganography means covered in hidden writing. The object of
steganography is to send a message through some innocuous carrier (to a
receiver while preventing anyone else from knowing that a message is being sent
to all. Computer based steganography allows changes to be made to what are
known as digital carriers such as images or sounds.

The changes represent the hidden message, but result if successful in no


discernible change to the carrier. The information may be nothing to do with the
carrier sound or image or it might be information about the carrier such as the
author or a digital watermarking or fingerprint.

In steganography information can be hidden in carriers such as images,


audio files, text files, and video and data transmissions. When message is hidden
in the carrier a stego carrier is formed for example a stego-image. Hopefully it will
be perceived to be as close as possible to the original carrier or cover image by
the human senses.

Images are the most widespread carrier medium. The are used for
steganography in the following way. The message may firstly be encrypted. They
are used for steganography in the following way. The message may firstly be
encrypted. The sender embeds the secret message to be sent into a graphic file.
This results in the production of what is called stego-image. Additional secret data
may be needed in the hiding process e.g. a stegokey etc. This stego-image is then
transmitted to the recipient.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
The recipient extractor extracts the message from the carrier image. The
message can only be extracted if there is a shared secret between the sender and
the recipient. This could be the algorithm for extraction or a special parameter
such as stegokey. A stegoanalyst or attacker may try to intercept the stego image.

What is Steganography Used for?

Like many security tools, steganography can be used for a variety of


reasons, some good, some not so good.
Legitimate purposes can include things like watermarking images for
reasons such as copyright protection. Digital watermarks (also known as
fingerprinting, significant especially in copyrighting material) are similar to
steganography in that they are overlaid in files, which appear to be part of
the original file and are thus not easily detectable by the average person.
Steganography can also be used as a way to make a substitute for a one-
way hash value (where you take a variable length input and create a static
length output string to verify that no changes have been made to the
original variable length input).
Steganography can be used to tag notes to online images (like post-it notes
attached to paper files).
Steganography can be used to maintain the confidentiality of valuable
information, to protect the data from possible sabotage, theft, or
unauthorized viewing.
Steganography can also be used for illegitimate reasons.
If someone was trying to steal data, they could conceal it in another file or
files and send it out in an innocent looking email or file transfer.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
LIMITATIONS

There are limitations on the use of steganography. As with encryption, if Alice


wants to communicate secretly with Bob they must first agree on the method
being used. Demeratus, a Greek at the Persian court, sent a warning to Sparta
about an imminent invasion by Xerxes by removing the wax from a writing
tablet, writing the message on the wood and then covering it in wax again.
The tablet appeared to be blank and fooled the customs men but almost
fooled the recipient too since he was unaware that the message was being
hidden.

With encryption, Bob can be reasonably sure that he has received a secret
message when a seemingly meaningless file arrives. It has either been
corrupted or is encrypted. It is not so clear with hidden data, Bob simply
receives an image, for example, and needs to know that there is a hidden
message and how to locate it.

Another limitation is due to the size of the medium being used to hide the
data. In order for steganography to be useful the message should be hidden
without any major changes to the object it is being embedded in. This leaves
limited room to embed a message without noticeably changing the original
object. This is most obvious in compressed files where many of the obvious
candidates for embedding data are lost. What is left is likely to be the most
perceptually significant portions of the file and although hiding data is still
possible it may be difficult to avoid changing the file.

Simple spread spectrum techniques are able to survive amplitude distortion


and noise addition but are vulnerable to timing errors. Synchronization of the
chip signal is required in order for the technique to work so adjusting the
synchronization can cause the embedded data to be lost.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
NEED OF PROPOSED SYSTEM

The previously had many drawbacks such as more manual processing of data
which resulted in a time consuming process. Besides this cost of maintaining a
manually was more as compared to the computerized process. Besides this there
were complexities but not the least there was minimal amount of data security.

USERS
Sender
Sender who make a stegano image. Sender is an authorized person
who sends important information with the help of an image to receiver.

Receiver
Receiver is an authorized person who extracts important
information from image in a secure way. Receiver receives information
from sender.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
SCOPE OF STEGANOGRAPHY
Encryption

The object file which is supposed to be proceeding will be encrypted in


some binary codes. This binary code depends on the nature of the object file. This
encryption is different for different files. As, example the encryption is made of
text file which is absolutely different from any audio file or image files.

Data Chucking

In this process the encrypted file is chunked in various parts and then this
file is to Be proceed for the further streganography. The aim of this step is to
reduce the stenography time and increase the effectiveness of this procedure.

Steganography

In this process the steganography is done on the chunked encrypted files.


In this Process the binary codes of the encrypted files are to be changed by any of
the method as mentioned below. Specific method changes the specific binary
numbers.

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
Sending the chunked files

In this process this chunked files are supposed to be sent to the receiver
and this Files will be in the hidden form. This all files are received by the receiver
and then are proceed to get the original data.

File recombination

In this process the chunked files are supposed to be recombined to get the
whole File and this procedure are done on the receiver end, so the receiver must
have the stego-key or any secret information from the sender so that the receiver
can get the original file.

SYSTEM REQUIREMENT

Software Requirement

Microsoft windows 2000, XP, Vista, Windows 7 etc


Java Development Kit (jdk):1.4, 1.5

Hardware Requirements

Pc/AT 533 and above with MMX


64 MB RAM and above
Mouse or Pointing Devices
Minimum of 80 MB Hard Disk Space

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455
P-II, P-III, P-IV, Dual Core Processor

CreativeSoft (Corporate Office)


# 412, Annpurna Block,Aditya Enclave,Ameerpet,Hyderabad
500016 Tel : +91-40-40159158Mobile : 91-9247249455

You might also like