VISUAL CREPTOGRAPHIC STEGNOGRAPHY IN IMAGES
#1

VISUAL CREPTOGRAPHIC STEGNOGRAPHY IN IMAGES


.docx   VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES report.docx (Size: 99.38 KB / Downloads: 0)

INTRODUCTION

Now a days, various modes of communication like LAN, WAN and INTERNET are widely used for communicating information from one place to another around the globe. Such communication networks are open which any one can access easily. They are regularly monitored and an intercepted.
Steganography, from the Greek, means covered, or secret writing, and is a long-practised form of hiding information. Although related to cryptography, they are not the same. Steganography's intent is to hide the existence of the message, while cryptography scrambles a message so that it cannot be understood. More precisely,
'The goal of steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present."
Steganography includes a vast array of techniques for hiding messages in a variety of media. Among these methods are invisible inks, microdots, digital signatures, covert channels and spread-spectrum communications. A message is embedded in a cover media in an invisible manner so that one could not suspect about its existence.
In this paper we present a substitution based information protection method where we combine cryptographic, steganographic and signal processing concepts together for achieving security. The method is known as Steganography Based Information Protection method. In this method we substitute the information bit in randomly selected pixels at random places within LSB region.

STEGANOGRAPHY TECHNIQUE

Steganography is the art and science of communicating in a way which hides the the existence of the secret message communication. It aims to hide information /covered writing. Information to be protected is hidden in another data known as cover or carrier. Data containing hidden message are called as Steganos or Stegos. Steganos look like cover data and it is difficult to differentiate between them. Steganography based communication over easily accessible platforms to prevent leakage of information.


Kerck Off Principle:

In cryptography, this principle states that "the security of the system has to be based on the assumption that the enemy has full knowledge of the design and implementation details of the steganographic system". The only missing information for the enemy is a short, easily exchangeable random number sequence, the secret key.

STEGANOGRAPHY METHODS;


According to modification in covers, the methods can be categorized as
❖ Substitution
❖ Transform domain
❖ Spread spectrum
❖ Statistical
❖ Distortion
❖ Cover generation


Substitution Method:

It is commonly used simple method in which we can put information bits in LSB sequentially at fixed place, randomly at fixed place or randomly at random places in cover pixels. The message to be protected passes through scanning, coding, encryption process to form an embedded message.
Scanning, coding, encryption steps make the information unintelligible so that one cannot extract plain message.
Embedding make the message invisible so that one cannot detect it.
Reshaping spreads the message so that embedded message can be detected from distorted steganos by authorized receivers.
Cover processing makes detection of embedded message more difficult since the distortion is either due to noise addition or due to message embedding .
This would increases the robustness and security. Many attacks on such steganographic systems are suggested. Some attacks that can be applied are given below:
❖ Stego-Only Attack
❖ Message-Stego Attack
❖ Cover-Stego Attack
❖ Message-Cover-Stego Attack

Proposed Method:

The framework of proposed Steganography Based Information Protection method is shown in Fig 1. Its description is presented in the following steps. FRAME WORK OF SBIPM


Visual Perception:

For any steganography based secure system, the perception of steganos should be as cover image itself so that one cannot differentiate them and detect the existence of embedded message.

Difference Analysis:

The "difference-images"obtained by taking the difference between cover, processed cover and stego images are not visible. For making the difference visible in "difference-images" for visual interpretation, we first increase differences by multiplication of weight factor and then revert the values to get the strengthened
STEGANOGRAPHY
"difference-images".From analysis of these "difference-images ", on could not say that the changes are either due to cover processing or message embedding and hence we can say that the method is safe from known cover-stego attack.

Distortion Analysis:

Distortion analysis of stego images is carried out by studying distortion / similarity messages statistically. There are many methods for measuring distortion that can be used for distortion analysis. Distortion between two different images is measured by considering Mean Square Error (MSE), Mean Absolute Error (MAE) or Histogram Similarity (HS).
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: downlod seminar topic on stegnography, stegnography technique used some projects, stegnography ppt, what is main difference between visual cryptography and stegnography, stegnography projects, stegnography using contorlet transform, projects in android stegnography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,853 29-07-2015, 02:27 PM
Last Post: Guest
  Microsoft’s Visual Studio.NET seminar details 0 847 11-06-2012, 05:26 PM
Last Post: seminar details
  Evaluating Existing Audio CAPTCHAs and an Interface Optimized for Non-Visual Use seminar details 0 913 08-06-2012, 06:00 PM
Last Post: seminar details
  Visual Basic Programming seminar details 0 946 05-06-2012, 01:52 PM
Last Post: seminar details
  VECTOR MEDIAN FILTER APPLICATION OVER COLOR IMAGES seminar paper 0 655 09-03-2012, 04:49 PM
Last Post: seminar paper
  STEGANALYSIS OF LSB INSERTION METHOD IN UNCOMMPRESSED IMAGES USING MATLAB seminar paper 0 470 09-03-2012, 02:49 PM
Last Post: seminar paper
  Crystal Reports For Visual Studio .NET seminar paper 0 759 05-03-2012, 04:43 PM
Last Post: seminar paper
  A DCT Domain VisibleWatermarking Technique for Images seminar paper 0 710 05-03-2012, 04:21 PM
Last Post: seminar paper
  Tutorial: Programming in Visual Basic 6.0 seminar paper 0 884 03-03-2012, 02:27 PM
Last Post: seminar paper
  An Adept Edge Detection Algorithm for Human Knee Osteoarthritis Images project uploader 0 772 03-03-2012, 12:32 PM
Last Post: project uploader

Forum Jump: