steganography full report
#16
[attachment=9995]
Steganography
Steganography is the art and science of hiding information in plain sight.
• For hiding information we need three components:
 Cover Image
 Secret Data
 Stego Image
Embedding Methods in Steganography
• Some of the embedding methods are:
 LSB Method
 PVD Method
Disadvantages in LSB method:
 The No: of message bits embedded in each pixel is same.
 Visual degradation is possible if more amount of data embedded.
PVD Method
• In PVD method the secret data is inserted into every pixel of the image and decides the no: of insertion bits using the difference value between two pixels adjacent to the target pixel.
• Therefore, the no: of insertion bits in each pixel is dependent on whether the target pixel is included in edge area or in a smooth area.
• Embedding Procedure in PVD Method
For Eg:
 Lets consider Two Pixel Method:
• Binary Representation of the message is 1100.
• Consider an image with pixel values as follows
• Target pixel (g) =110
• Upper pixel (g1) = 101
• Left pixel (g2) =100
For d<3:
• Calculate difference value d between the upper pixel (g1) and the left pixel (g2) in a given target pixel (g) by
• d =| g1 - g 2|
• d=|101 -100| = 1
• Calculate n that is the number of the insertion bits in a target pixel P from d
• n= floor (log2 d), if d > 3 and d = odd;
• n= floor (log2 d) -1, if d > 3 and d = even.
• n= 1 , if d < 3
• Calculate a temporary value t from n
• t = b - (g mod 2 ) .
• Where, b is the decimal representation of secret messages as the n bits.
• b = 1, for n=1, therefore, t = 1 – (110 mod 2) -> t = 1
• To make the quality of the image higher, select the nearest value to the target pixel’s value of the cover image by
• t1 = t if [ - <= t <= ]
• t1 = t + 2 ^n if [-(2^n + 1) <= t < ( - )]
• t1 = t – 2^n if [ ((2^ n – 1)/2) <= t < 2^n]
• for n=1 the interval cases will be:
-1/2 to 1/2 , -1 to -1/2, 1/2 to 2
• t =1 lies in 3rd interval
• therefore t1= 1 – 2
t1 = -1,
• Finally, we can get the new pixel value g *
g* = g +t1;
g*= 110 -1
g*=109.
For d>3:
• Target pixel (g) =119
• Upper pixel (g1) = 109
• Left pixel (g2) = 96
• d =| g 1 - g 2 | d=|109 - 96| d= 13
• n = floor(log2 13)
n = 3
• b = 4 ( i.e message bits 100)
• t = 4 – (119 mod 2^3)
• t = -3
• for n = -3 the interval cases will be
• -7/2 to 7/2 , -7 to -7/2 , 7/2 to 8
• t=2 fall in 1st case
• Therefore, t1= - 3
• g*=119 - 3
• Therefore, New pixel value = 116
• Data Extraction:
For d<3:
• Target pixel (g) =109
• Upper pixel (g1) = 101
• Left pixel (g2) = 100
• d =| g 1 - g 2 | d=|101 - 100| =1
• here d=1,
• therefore n=1
• b = mod (g * , 2 ).
• i.e : b = mod (109 , 2)
• b = 1 -> message bit = 1.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: computerworld, interpreter define, lossy amull imge, how to hide, bits pilani, tos byte, uic cs 109,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: steganography full report - by seminar topics - 19-03-2010, 10:34 AM
RE: steganography full report - by soccer34 - 18-04-2010, 08:52 AM
RE: steganography full report - by projectsofme - 13-10-2010, 11:37 AM
RE: steganography full report - by shlok - 28-02-2011, 06:50 PM
RE: steganography full report - by rickytorson - 02-03-2011, 01:28 PM
RE: steganography full report - by seminar class - 02-03-2011, 03:22 PM
RE: steganography full report - by seminar class - 07-03-2011, 11:59 AM
RE: steganography full report - by seminar class - 09-03-2011, 10:19 AM
RE: steganography full report - by seminar class - 11-03-2011, 02:40 PM
RE: steganography full report - by seminar class - 31-03-2011, 11:21 AM
RE: steganography full report - by seminar class - 01-04-2011, 03:26 PM
RE: steganography full report - by seminar class - 02-04-2011, 12:43 PM
RE: steganography full report - by seminar class - 27-04-2011, 04:42 PM
RE: steganography full report - by seminar class - 12-05-2011, 05:01 PM
RE: steganography full report - by seminar addict - 19-01-2012, 10:04 AM
RE: steganography full report - by seminar paper - 13-02-2012, 05:02 PM
RE: steganography full report - by seminar paper - 25-02-2012, 09:48 AM
RE: steganography full report - by seminar paper - 08-03-2012, 02:51 PM
RE: steganography full report - by seminar paper - 13-03-2012, 12:57 PM
RE: steganography full report - by seminar paper - 13-03-2012, 02:41 PM
RE: steganography full report - by seminar paper - 15-03-2012, 05:06 PM
RE: steganography full report - by Guest - 06-07-2015, 10:27 PM
RE: steganography full report - by hadil - 07-07-2015, 12:45 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,780 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,939 08-01-2018, 02:33 PM
Last Post: RaymondGom
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,806 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,959 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,218 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  Employee Cubicle Management System full report computer science technology 4 5,148 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 26,134 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,318 29-11-2015, 02:37 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,231 10-11-2014, 09:15 PM
Last Post: Guest
  data mining full report project report tiger 25 171,345 07-10-2014, 09:10 PM
Last Post: ToPWA

Forum Jump: