Presentation is loading. Please wait.

Presentation is loading. Please wait.

By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY.

Similar presentations


Presentation on theme: "By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY."— Presentation transcript:

1 By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY

2

3 INTRODUCTION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

4

5

6 Image Steganography is the technique of hiding the data within the image in such a way that prevents the unintended user from the detection of the hidden messages or data.

7 Original imageStego Image Image sources: https://www.pushpraj.com/photos/cool- scenery

8

9 3 bytes RedGreenBlue Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes – one for Red, one for Green and one for Blue integer number Each byte is interpreted as an integer number, which is how much of that color is used to make the final color of the pixel = Orange Color

10 human eye The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eye. So we can change the least significant (last) bit in a byte, we either add or subtract one or more values from the value it represents. This means we can overwrite the last bit in a byte without affecting the colors it appears to be. human eye The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eye. So we can change the least significant (last) bit in a byte, we either add or subtract one or more values from the value it represents. This means we can overwrite the last bit in a byte without affecting the colors it appears to be.

11 Least Significant Bit (LSB) Substitution A common approach of hiding data within an image file is Least Significant Bit (LSB) Substitution. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image. Least Significant Bit (LSB) Substitution A common approach of hiding data within an image file is Least Significant Bit (LSB) Substitution. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image.

12 Suppose we have the following binary representation for the Cover Image Suppose we want to "hide" the following 4 bits of data: 1011, we get the following, Where the each data bits are accommodated in the least significant bits of each byte of the image.

13 Least Significant Bit Substitution results in a very minor distortion of the image which is very much negligible for the human eyes. Original Image Stego Image Image source: vibrant-flowers/

14 one of the channels other two channels This method uses the least two significant bits of one of the channels to indicate existence of data in the other two channels.

15 o The SCC technique uses the RGB images to hide the data in different channels. o It keeps cycling the hidden data between the Red, Green and Blue channels, utilizing one channel at a cycle time.

16 intensity random pixel selection This method measures the intensity of the pixel and then hides data by random pixel selection with a goal to hide maximum data in each pixel. This method is divided into three parts: Encryption Image Intensity Calculation Steganography.

17 Intense Pixels Original Image Grayscale Image All Black colored pixels are considered as Intense pixels Image source:

18 Pixel Value Differencing (PVD) is able to provide a high quality stego image in spite of the high capacity of the concealed information. That is, the number of insertion bits is dependent on whether the pixel is an edge area or smooth area. In edge area the difference between the adjacent pixels is more, whereas in smooth area it is less. While human perception is less sensitive to subtle changes in edge areas of a pixel, it is more sensitive to changes in the smooth areas Smooth Area Edge Area

19 Secure Private Files and Documents. Hide Passwords and Encryption Keys. Transport Highly Private Documents between International Governments. Transmit message/data without revealing the existence of available message. Applications of Image Steganography

20

21

22


Download ppt "By Sravya Nagaraju STEGANOGRAPHY AND NETWORK SECURITY."

Similar presentations


Ads by Google