STEGO- HUNTER: ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
#1

PRESENTED BY:
SUFYAN AHMED KHAN

[attachment=10067]
STEGO- HUNTER: ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
ABSTRACT

Steganography is the process of hiding secret information in a cover image. Our aim is to test a set of images for statistical artifacts due to message embedding in color images using LSB insertion method and to find out, which images out of them are likely to be stego. In a natural uncompressed image (i.e. 24bit BMP) each image is represented by three color channels (Red, Green and Blue), each of the channel is 8 bits wide. The ratio of number of unique colors to the total number of pixels in an image is approximately 1:6 .If any test image is already tampered with message, embedding it further with additional bit streams will not modify the R value significantly. Alternately, if the test image is untampered one, the ratio R decreases significantly when it is further tampered by additional bit streams. Our decision of deciding the image as stego or untampered using the threshold value. After LSB embedding in natural image ,which is equivalent of introducing noise, the randomness of LSB pattern will increase. This will increase the number of close color pairs. We have chosen a deciding factor, that determines the given image as stego image or untampered image. If Deciding factor is greater than 100,then the image you have is an untampered image. Otherwise If Deciding factor is less than 100,then the image you have is an tampered image.
Steganography
– from the Greek word steganos meaning “covered”
– and the Greek word graphie meaning “writing”
 Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination.
 Anyone else viewing the message will fail to know it contains hidden/encrypted data.
 Steganography is the process of hiding secret information in a cover image. This process allows user to hide large amount of information with an image are in audio files. In this process, first we have to encrypt the secret data and then hide it in an innocent data. The stego medium is obtained by the addition of cover medium , hidden data and stego key. The cover medium is the file in which we hide our secret data (hidden data).The cover medium is typically an image file or audio files. The stego medium is also the same type of file in the cover medium. The stego image should not contain any easily detectable information by the human eye.
HISTORY:
 Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank.
 Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated.
 Invisible Ink is also a form of steganography.
 Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.
 The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples of steganography in The Histories of Herodotus.[2] Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. Another ancient example is that of Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: technique for image steganography, hunter college film, net dct stego, where do i get hunter safety training in lakewood, hunter college course overload, hunter college course equivalency, lsb substitution,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Content-based image retrieval (CBIR) System project topics 15 13,798 13-05-2016, 02:30 PM
Last Post: dhanabhagya
  image processing projects ideas project topics 4 5,065 05-01-2016, 02:22 PM
Last Post: seminar report asees
  Image Processing - Noise Reduction project topics 3 3,779 26-08-2015, 02:55 PM
Last Post: dhivya srinivasan
  Developing a web application to transfer image and patient information project report maker 2 3,683 21-03-2014, 01:44 AM
Last Post: MichaelPn
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,904 22-07-2013, 09:37 PM
Last Post: Guest
  Image Transfer Protocol for Internt project topics 3 2,286 26-03-2013, 07:42 PM
Last Post: vvk chary
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,807 04-02-2013, 04:49 PM
Last Post: seminar details
  Efficient Graph-Based Image Segmentation seminar class 2 3,364 02-02-2013, 01:58 PM
Last Post: seminar details
  IMAGE SEGMENTATION full report seminar class 5 5,519 30-11-2012, 01:03 PM
Last Post: seminar details
  A ROBUST DIGITAL IMAGE WATERMARKING ALGORITHM USING DNA SEQUENCES smart paper boy 1 1,940 29-11-2012, 01:42 PM
Last Post: seminar details

Forum Jump: