STEGO- HUNTER: ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
#1

PRESENTED BY:
SUFYAN AHMED KHAN

[attachment=10067]
STEGO- HUNTER: ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
ABSTRACT

Steganography is the process of hiding secret information in a cover image. Our aim is to test a set of images for statistical artifacts due to message embedding in color images using LSB insertion method and to find out, which images out of them are likely to be stego. In a natural uncompressed image (i.e. 24bit BMP) each image is represented by three color channels (Red, Green and Blue), each of the channel is 8 bits wide. The ratio of number of unique colors to the total number of pixels in an image is approximately 1:6 .If any test image is already tampered with message, embedding it further with additional bit streams will not modify the R value significantly. Alternately, if the test image is untampered one, the ratio R decreases significantly when it is further tampered by additional bit streams. Our decision of deciding the image as stego or untampered using the threshold value. After LSB embedding in natural image ,which is equivalent of introducing noise, the randomness of LSB pattern will increase. This will increase the number of close color pairs. We have chosen a deciding factor, that determines the given image as stego image or untampered image. If Deciding factor is greater than 100,then the image you have is an untampered image. Otherwise If Deciding factor is less than 100,then the image you have is an tampered image.
Steganography
– from the Greek word steganos meaning “covered”
– and the Greek word graphie meaning “writing”
 Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination.
 Anyone else viewing the message will fail to know it contains hidden/encrypted data.
 Steganography is the process of hiding secret information in a cover image. This process allows user to hide large amount of information with an image are in audio files. In this process, first we have to encrypt the secret data and then hide it in an innocent data. The stego medium is obtained by the addition of cover medium , hidden data and stego key. The cover medium is the file in which we hide our secret data (hidden data).The cover medium is typically an image file or audio files. The stego medium is also the same type of file in the cover medium. The stego image should not contain any easily detectable information by the human eye.
HISTORY:
 Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank.
 Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated.
 Invisible Ink is also a form of steganography.
 Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.
 The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in The Histories of Herodotus.[2] Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: greek orthodox seminary, latest changes in steganographic algorithms, secured data transmission using cryptographic steganographic techniques, hunter college social work calendar, lsb matching** trees, hunter college official web site, counter attacking robot with laser gun activation images,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Content-based image retrieval (CBIR) System project topics 15 13,775 13-05-2016, 02:30 PM
Last Post: dhanabhagya
  image processing projects ideas project topics 4 5,047 05-01-2016, 02:22 PM
Last Post: seminar report asees
  Image Processing - Noise Reduction project topics 3 3,774 26-08-2015, 02:55 PM
Last Post: dhivya srinivasan
  Developing a web application to transfer image and patient information project report maker 2 3,672 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,885 22-07-2013, 09:37 PM
Last Post: Guest
  Image Transfer Protocol for Internt project topics 3 2,282 26-03-2013, 07:42 PM
Last Post: vvk chary
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,797 04-02-2013, 04:49 PM
Last Post: seminar details
  Efficient Graph-Based Image Segmentation seminar class 2 3,359 02-02-2013, 01:58 PM
Last Post: seminar details
  IMAGE SEGMENTATION full report seminar class 5 5,513 30-11-2012, 01:03 PM
Last Post: seminar details
  A ROBUST DIGITAL IMAGE WATERMARKING ALGORITHM USING DNA SEQUENCES smart paper boy 1 1,939 29-11-2012, 01:42 PM
Last Post: seminar details

Forum Jump: