VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES
#1

Presented by:
AJAYA SIMHA K.J.

[attachment=11742]
VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES
BASIC OVERVIEW ON CRYPTOGRAPHY

 Cryptography- meaning “secret writing”
 Definition-practice and study of hiding information
 Encryption- To obtain a cipher
 Use- To secure information
The most commonly used techniques are:
 Joint key cryptography-Symmetric key cryptography
 Public key cryptography-Asymmetric key cryptography
 HYBRID CRYPTOSYSTEM-Combines both the features
Joint Key Cryptography (Symmetric Key)
 This technique uses a common key.
 This key is shared privately.
 Process
 But the key should also be shared securely.
Public Key Cryptography (Asymmetric Key)
 Uses two different keys
 Process
 There is no need to privately share a key
 More secure
STEGANOGRAPHY
 Steganography- meaning “concealed writing”
 Definition- security through obscurity
 Advantage of steganography
 Visual steganography- Secure, implemented in image files
THE RGB COLOR MODEL
 Image-pixel-pixel depth
 RGB COLOR MODEL- additive colour model
 Purpose- sensing, representation, and display of images in electronic systems
 Device dependent
 Digital representation- For 24 bit per pixel image, each colour is represented by 8 bits.
 Primary colours- R-red, G-green, B-blue
 Secondary colours- R+G=yellow, G+B=cyan,
B+R=magenta
 Zero intensity- Black and Full intensity- White
LSB insertion technique
 LSB insertion technique- A common technique in image steganography
 Grid of 3 pixels of a 24-bit image
(00101101 00011100 11011100)
(10100110 11000100 00001100)
(11010010 10101101 01100011)
 LSB is changed
 A number 200-binary equivalent 11001000
needs to be embedded
(00101101 00011101 11011100)
(10100110 11000101 00001100)
(11010010 10101100 01100011)
 Cryptography and steganography combined systems can be created
THE VISUAL CRYPTOGRAPHIC STEGANOGRAPHY SYSTEM
 Advanced system of encrypting data
 Visual steganography- Secure, implemented in image files
 Concept of multiple cryptography
 Only jpeg image will be used
SYSTEM FLOW CHART
THE REFERENCE DATABASE

 In order to provide higher security levels the algorithm is designed to use a reference database as shown in the figure.
Encryption Algorithm
 The message will first be encrypted
 The pixel values of the image are truncated
 Then a specific number which corresponds to the 3-D representation of the character in the cipher code sequence can be added to this number
 Only the edited message will be transmitted to the receiver
 In the first few lines of image properties, the attributes of the image will be encrypted and saved
 The edited image will be transmitted to the receiver
Decryption Algorithm
 The message can be decoded using the receiver’s private key.
 The receiver’s private key is used to identify the reference grid from the reference database.
 The x and y components can define the block that has been used to encrypt the message.
 RGB value-point to the data in the block
 The cipher is retrieved by obtaining the difference in the pixel value
 This cipher can now be decrypted using an inverse function of the DEA algorithm to get the message text
Applications of steganography
 Confidential communication and secret data storing
 Protection of data alteration
 Access control system for digital content distribution
 Media Database systems
Applications of cryptography
 Confidentiality
 Authentication
 Integrity
 Non-repudiation
Advantages of the technique
 It provides higher levels of security to the information being transmitted
 More secure than other systems
 The image bits are not used to store the message
Applications and future scope
 To increase security on web based applications
 A part of message can be sent in each image
Reply
#2
Hi sir.... I need advanced updates in this topic
Reply
#3
sir,
I want to know more about visual cryptographic steganography in images.

1. Why we use DES encryption algorithm for encryption and modified bit encoding for embedding instead of others?
2. Please give a detailed description about modified bit encoding scheme.
3. How to truncate the pixel values of image file?


With this query iam also include my ppt.
Reply
#4
To get more information about the topic "VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES " please refer the page link below
http://studentbank.in/report-visual-cryp...-in-images

http://studentbank.in/report-visual-cryp...ull-report

http://studentbank.in/report-steganograp...121?page=4

http://studentbank.in/report-steganography-full-report
Reply
#5
respected sir,
i want to know abt the reference grid.
and can we use this technique with any other imge file like bmp?
Reply
#6
To get more information about the topic "VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES " please refer the page link below
http://studentbank.in/report-visual-cryp...-in-images

http://studentbank.in/report-visual-cryp...ull-report

http://studentbank.in/report-steganograp...121?page=4

http://studentbank.in/report-steganography-full-report
Reply
#7
to get information about the topic Steganography In Images full report,ppt and related topic refer the page link bellow

http://studentbank.in/report-steganograp...ars-report

http://studentbank.in/report-steganograp...ort?page=3

http://studentbank.in/report-steganograp...ort?page=2

http://studentbank.in/report-visual-cryp...-in-images

http://studentbank.in/report-steganography-full-report

http://studentbank.in/report-image-steganography

http://studentbank.in/report-steganography-in-images

http://studentbank.in/report-an-overview...ganography

http://studentbank.in/report-steganography--10609

http://studentbank.in/report-edge-adapti...-revisited

http://studentbank.in/report-a-novel-tec...n-encoding

http://studentbank.in/report-image-stega...-transform
Reply
#8
THANKS FOR EVERY ONE FOR RPLYNG ND HELPNG IN SELETION OF SEMINAR TOPICS
Reply
#9

Hi sir.... I need advanced updates in this topic...
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: steganography in images ppt, cryptographic authentication, technical seminar on steganography in images, project report for visual cryptography of images, visual cryptographic steganography in images ppt, verification images for visual cryptography, overview of steganography of images,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Lightbulb Ditgital Steganography seminar projects crazy 3 3,150 23-09-2013, 11:34 AM
Last Post: computer topic
  Authentication Schemes for Session Passwords using Color and Images computer girl 2 2,356 20-09-2013, 10:52 AM
Last Post: computer topic
  digital visual interface full report project reporter 2 4,115 07-11-2012, 11:56 AM
Last Post: seminar details
Music Digital Visual Interface Computer Science Clay 1 1,718 07-11-2012, 11:55 AM
Last Post: seminar details
  Histogram Specification: A Fast and Flexible Method to Process Digital Images computer girl 2 1,548 20-10-2012, 01:27 PM
Last Post: seminar details
  HIGH CAPACITY AND SECURITY STEGANOGRAPHY USING DISCRETE WAVELET TRANSFORM computer girl 1 1,594 06-10-2012, 01:26 PM
Last Post: seminar details
  Image Steganography Technique Based on Wavelet Transform science projects buddy 2 3,062 06-10-2012, 01:25 PM
Last Post: seminar details
  Enhanced Text Steganography in SMS computer girl 0 1,256 07-06-2012, 12:22 PM
Last Post: computer girl
  information security using steganography seminar class 1 1,672 13-02-2012, 02:48 PM
Last Post: seminar paper
Music Steganography (Download Full Report And Abstract) computer science crazy 16 18,892 11-02-2012, 01:26 PM
Last Post: seminar addict

Forum Jump: