Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.

Slides:



Advertisements
Similar presentations
Queen’s University, Kingston, Canada
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Grey Level Enhancement Contrast stretching Linear mapping Non-linear mapping Efficient implementation of mapping algorithms Design of classes to support.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
Steganography and Network Security
Multi video camera calibration and synchronization.
Overview of Digital Stenography
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Yinglei Wang, Wing-kei Yu, Sarah Q. Xu, Edwin Kan, and G. Edward Suh Cornell University Tuan Tran.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
7 Selecting Design and Color Section 7.1 Identify presentation design principles Use a custom template Add pages to a navigation structure Section 7.2.
MS Access: Database Concepts Instructor: Vicki Weidler.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Image Segmentation by Clustering using Moments by, Dhiraj Sakumalla.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Multimedia Databases (MMDB)
The Steganographic File System Ross Anderson, Roger Needlham, Adi Shamir Presented by: Pan Meng Presented by: Pan Meng.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL Presented by 2006/8.
D´ej`a Vu: A User Study Using Images for Authentication Rachna Dhamija,Adrian Perrig SIMS / CS, University of California Berkeley 報告人:張淯閎.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
An Implementation of the Median Filter and Its Effectiveness on Different Kinds of Images Kevin Liu Thomas Jefferson High School for Science.
Physical Database Design Purpose- translate the logical description of data into the technical specifications for storing and retrieving data Goal - create.
Digital Image Processing
Cryptographic Anonymity Project Alan Le
Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/11/16 1 Steganalysis of LSB matching based on statistical modeling of pixel difference distributions.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
Digital Image Processing CCS331 Relationships of Pixel 1.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Steganography Example
Fractal image compression
CS Principles U2L3 Encoding B&W Images.
Information and Network Security
Steganography.
Poster Title : font size
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Computer Vision Lecture 16: Texture II
Deep Learning Hierarchical Representations for Image Steganalysis
Indexing and Hashing Basic Concepts Ordered Indices
A Data Hiding Scheme Based Upon Block Truncation Coding
Hiding Data in a Color Palette Image with Hybrid Strategies
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Color Image Hiding Scheme Based on SMVQ and Modulo Operator
Information Hiding and Its Applications
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng

content Introduction Hybrid File Creation Container File Supporting File Embedded Algorithm Conclusion

Current image hiding technology Substitution Least Significant Bit Masking & Filtering Analyze image first Significant Area

A good information hidden system Capability Security Robust

motivation all of the above methods used for embedding data in an image work on the principle of one image file, that means: The message embedded in must be small enough. Sacrifice capability to cater to the security. There is no level in one image, that means under coercion, the user can’t just reveal parts of the information in the image.

Hybrid file creation This hybrid file basically consists of two files, namely Container file Supporting file

Container file As the name suggests this is a file where we can store the secret data. The basic property of this container file is such that even if we change the intensity of any pixel it should look like the original image. Appropriate candidate for this purpose are cartoon images, geographical images, background images of any picture or images in any chemical reaction and like others. In order to store the secret data in such a file, the size of the container file should be proportional to the size of the secret data.

Supporting file To make the image common, we need a supporting image file so that the new hybrid file looks like the original one. The selection of supporting file will depend on the feature of the container file to ensure the above characteristics.

Container file creation

Embedding Algorithm In contrast to the LSB scheme being used for hiding the data, our main purpose here is to consider the entire byte representing any particular pixel for storing the information. Consequently, by the process of replacing the entire byte for embedding information in the container image, only one pixel can be used to store three characters, whereas by LSB technique one need a minimum of nine pixels to store these three characters as three pixels are required to store a single character.

Embedding Algorithm(2) Assume: M*N: the size of the image (byte) Z: the amount of secret data to be sent through this image P: maximum space required for storing the secret data of size is Z. Case 1: When Z < P Case 2: When Z = P Case 3: When Z > P

Case 1: When Z < P When the size of secret data is less than the image space, consider the straight line formula defined as: y = ax + b Choose a suitable choice of a and b all bytes of the secret data can be mapped entirely into the container image, such as: y = 2x + 2 Here, if the value of x=1 then y will be 4, indicating that the first byte of secret data will be stored in the first byte place of second pixel. i.e. ( 8 – bit Red position). Similarly, x=2 will give y=6 so the second secret byte data will be stored in last byte of second pixel (i.e. 8-bit Blue position).

Case 2: When Z = P Case 3: When Z > P The message is bigger or equal than the image file, the image will change to a totally different one. It’s suggested to divide the message into different containers.

a) Container file before inserting the datab) Container file after inserting the data Fig.2 Creation of Container file

Hybrid File creation Fig. 3 Merging Container file to supporting file.

After replacing all pixel values of supporting image by the container image we get the resultant hybrid or mixed image (Fig. 4). a) Supporting File b) Hybrid Image File after merge

Multiple Container File From above, it is seen that the size of the information to be under lock and key relatively depends on the size of the container image. What happens if size of the message is larger than the size of the container image file or how can a number of users (receiver) be entertained with different but similar kind of information?

Fig. 5. Hybrid Image File with Multi Container File

Conclusion Security: Multi-level security Capability: larger than LSB Robust: less than LSB

Thanks!