lsb 1 bit algorithm implementation java source code
#1

hello, I need your code for my project. thank you.
Reply
#2
LEAST SIGNIFICANT BIT EMBEDDINGS: IMPLEMENTATION AND DETECTION

INTRODUCTION


Steganography is a method of hiding digital information so that it will escape detection that has been used by al-Qaeda, drug cartels, and others. Properly-executed steganography allows for large quantities of information to be hidden inside a file, while making no perceivable changes to that file's contents. Steganography can be applied to many types of data, including audio, video, and images and can hide any kind of digital information. Steganography provides a significant challenge to security as it hides the act of communication; if illicit communication is not discovered it cannot be prevented or decoded. Unlike encryption, which secures the content of a message, steganography hides the message’s existence. The term “steganography” derives from the Greek for “covered writing” [9], which is a good representation of the central idea of steganography. The end goal of steganography is to hide data in a digital object so that it cannot be detected through observation (or even complex analysis). Least Significant Bit Embeddings (LSB) are a general steganographic technique that may be employed to embed data into a variety of digital media, but one of the most studied applications is using LSB embedding to hide one image inside another.

RELATED WORK


A significant amount of work in steganography has been published since the late 1990s. Vision of the Unseen provides a survey of the current work in steganography and other topics in digital forensics [6]. Steganography has been evolving over the last decade, as designers of embedding algorithms have developed more complex embedding strategies and others try to detect and decode them [8]. In LSB embedding with images, work has been done to naively detect embedding in images with a variety of embedding strategies [1, 2, 5, 9]. Steganographic tools for embedding and decoding have been made freely available online as published and proprietary techniques for both embedding are implemented [4, 7].

THE COVER

Steganography requires two pieces of data: the cover, and the data to be hidden. The cover is the medium into which we will embed the data. Choosing an appropriate cover is an important decision, as it is a large part of what determines the effectiveness of the steganographic technique. Steganography’s reliance on ‘hiding’ the data behind the cover prevents it from being considered secure, unlike encryption. Once embedding is suspected it may be trivial to retrieve the embedded data. The cover will also be the container for the given message. If the cover itself raises suspicion, it could result in detection. A Brazilian drug trafficker had messages hidden with steganographic algorithms hidden on his computer inside images of a cartoon character [6]. Perhaps if the cover image were more innocuous the messages would have escaped detection. While any image can serve as a cover, the images which make the best covers have several properties that make it possible for more of the image's data to be replaced without creating any visually detectable distortion. The most important characteristic of a potential cover is that the image should have a large variety of colors. Images with few colors will make the embedding easier to detect. If, for example, the image is a single color there will be two colors after embedding. These colors will be very similar, but not the same. In Fig. 1, there are two grays that would be produced by a least significant bit embedding. The left side has the gray value 125, and the right 124.

STEGANOGRAPHY


Steganography is a technique for transmitting information without detection. It has been used in drug cartels and other organizations to avoid detection of their illicit communication [6]. Steganography relies on the fact that it is difficult to detect in order to remain secure. It uses parts of an image that do not strongly influence the colors shown to embed data. Where embedding is most practical varies with different image formats, but one technique that works well across formats is least significant bit embedding. Other algorithms, such as Jsteg, exploit the design of a specific image file format to embed without detection. The general principle of steganography is that perturbing a particular value in an image using a value from the data will create a small difference in the original image. The image created by this process is a stego object. The stego object contains data from the cover and information about the data that was used to perturb the cover image. The stego object can then be decoded by the intended recipient(s) and the hidden message retrieved. Because the values in the original image are only changed slightly, an observer will struggle to visually detect that an embedding has taken place. Through this series of minor perturbations based on the message’s contents the data is hidden in the cover image. A third party will have to analyze the image in order to determine if an embedding has taken place. The development of different analyses has led to an arms race between those developing steganographic algorithms and those trying to detect embeddings. From this point forward, it is assumed that the cover and data to hide are both images.
Reply
#3

Introduction
Steganography is the art and science of hiding information by embedding messages within others. Steganography works by replacing bits of useless or unused data in regular computer files with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images [*] .

I've implemented two main methods for that purpose: embedText and extractText. You can find the full and documented code with a running example attached to this tip.

Part 1 - Security

Write your answers to the following questions in a file called lab1.txt. State why you feel your answer is correct.
Which security services are guaranteed by the post office when using Certified mail?
Which type of security attack is being used when a student breaks into a professor's office to obtain a copy of the next day's test?
Which security mechanism is provided when a bank requires the customer's signature for a withdrawl?
Is it cryptography or steganography when a student writes the answers to a test on a small piece of paper, rolls up the paper, inserts it in a ball-point pen, and passes the pen to another student?
Part 2 - Least Significant Bit

Implement the algorithm discussed on page 11 of the textbook for encoding and decoding messages in the least significant bit of an image file.
Download the following files:

LSB.java
Picture.java
They will provide a skeleton for your code. You may write whatever additional methods you feel are necessary to complete this lab, be sure to fully document your code. You should not have to change anything in Picture.java, only LSB.java.
To decode a message from a picture, the command will be

java LSB image.png D
and to encode a message, the command will be

java LSB image.jpg E "My Message Here" image.png
You will need to add code to LSB.java in three places:

Message Conversion
When encoding, the message must be translated into binary numbers. When decoding, you will need to translate binary numbers back into text.

Message Decoding
Start with the first pixel in the upper-left corner, you will need to extract the message from the image. Each pixel should be examined in order of Red, Green, Blue. If the number is odd, record a 1, if the number is even, record a 0.

Message Encoding
To encode a message, again start in the upper-left corner of the image. In each pixel, proceed through the colors in order Red, Green, Blue. If the value is odd for that color, but should be even according to the current binary digit, subtract 1. If the value is even for that color, but should be odd according to the current binary digit, add 1.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: bit stuffing using java with tcp, omr source code in java to implementation, bully algorithm implementation in java source code, sdes algorithm using 8 bit program in c, lsb source code for steganography using java, source code for implementation of the fp growth algorithm, source code for encoding the image using lsb 1 bit in java,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  simple java rmi chat application source code 2 11,573 20-07-2018, 12:08 PM
Last Post: Guest
  authentication schemes for session passwords using color and images project source code 2 1,946 03-02-2018, 09:35 AM
Last Post: Nischithnash
  free download source code for online movie ticket booking in java 2 11,308 15-08-2017, 03:21 PM
Last Post: Morshed
  source code for rsa encryption and decryption in java 2 5,281 29-05-2017, 04:21 PM
Last Post: Meghna Jadhav
  image encryption and decryption using rsa algorithm in matlab 2 5,196 29-05-2017, 04:17 PM
Last Post: Priyanka Bidikar
  download liver tumor ct scan image in matlab with source code 4 5,293 21-05-2017, 09:54 PM
Last Post: abdulrahmanmashaal
  online cab booking source code in asp net 3 5,209 11-05-2017, 10:39 AM
Last Post: jaseela123d
Thumbs Up online catering management system on php with report and source code and ppt 4 5,998 29-04-2017, 10:59 AM
Last Post: jaseela123d
  source code for task scheduling using genetic algorithm using java 2 5,677 11-04-2017, 08:31 PM
Last Post: Guest
  automatic timetable generator source code vb 1 4,884 07-04-2017, 12:31 PM
Last Post: jaseela123d

Forum Jump: