0% found this document useful (0 votes)
73 views28 pages

Final Seminar Report

This document is a seminar report on image steganography submitted by U. Venugopal to partial fulfillment of the requirements for a Bachelor of Technology degree. The report includes a title page, certificate page signed by the faculty guide and department head, candidate's declaration, preface, abstract, table of contents, and initial chapters on the introduction and history of image steganography. The report provides an overview of image steganography techniques for hiding secret information in digital images.

Uploaded by

Akshayasree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views28 pages

Final Seminar Report

This document is a seminar report on image steganography submitted by U. Venugopal to partial fulfillment of the requirements for a Bachelor of Technology degree. The report includes a title page, certificate page signed by the faculty guide and department head, candidate's declaration, preface, abstract, table of contents, and initial chapters on the introduction and history of image steganography. The report provides an overview of image steganography techniques for hiding secret information in digital images.

Uploaded by

Akshayasree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

A Seminar Report

on

Image Steganography
Submitted in partial fulfillment of requirements
for the award of the degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING

Submitted by:
U. Venugopal 21095A0516

Under the Guidance of


Ms. S. Rubia Parveen M. Tech.,
Assistant Professor, Dept. of CSE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


RAJEEV GANDHI MEMORIAL COLLEGE OF ENGINEERING & TECHNOLOGY
(AUTONOMOUS)
Affiliated to JNTUA Anantapuramu, APPROVED BY A.I.C.T.E., NEW DELHI,
ACCREDITED BY NAAC of UGC, NEWDELHI with “A+” grade,
ACCREDITED BY N.B.A, NEWDELHI,
NANDYAL-518501, (Estd-1995)

YEAR: 2023-2024
Rajeev Gandhi Memorial College of Engineering &Technology
(AUTONOMOUS)
APPROVED BY A.I.C.T.E., NEW DELHI, Affiliated to JNTUA, Anantapuramu,
ACCREDITED BY NAAC of UGC, NEWDELHI with 'A+' Grade,
ACCREDITED BY NBA of AICTE, NEWDELHI
NANDYAL-518501

(ESTD – 1995)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE
This is to certify that the report entitled “IMAGE STEGANOGRAPHY” is a bona fide
record of the technical seminar done by UMMADISETTY VENUGOPAL (21095A0516) in
partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in
Computer Science & Engineering from R.G.M. College of Engineering & Technology,
Nandyal during the academic year 2023-24.

Ms. S. Rubia Praveen M. Tech.,


Assistant Professor, Dept. of CSE

Dr. K. Subba Reddy M.Tech, Ph.D.


Professor and HOD, Dept. of CSE

Place: Nandyal
Date:
Candidate’s Declaration

I hereby declare that the technical seminar entitled “Image Steganography” was carried out
and written by me under the guidance of Ms. S. Rubia Praveen, Assistant Professor, Dept. of
Computer Science & Engineering, R.G.M. College of Engineering & Technology, and this
technical seminar report is submitted in the partial fulfillment of the requirements for the award of
the degree of “Bachelor of Technology” in Computer Science & Engineering. I have not
submitted the matter presented in this report anywhere for the award of any other Degree.

(U. VENUGOPAL)

Place: Nandyal Roll No.: 21095A0516


Date: IV B. Tech II Sem, CSE,
RGMCET.
Preface
I have made this report file on the topic IMAGE STEGNOGRAPHY, I have tried my
best to elucidate all the relevant detail to the topic to be included in the report. While in the
beginning I have tried to give a general view about this topic.
My efforts and wholehearted cooperation of each and every one has ended on a
successful note. I express my sincere gratitude to Ms. S. Rubia Praveen who assisting me
throughout the preparation of this topic. I thank her for providing me the reinforcement,
confidence and most importantly the track for the topic whenever I needed it.

U. VENUGOPAL

(21095A0516)

ii
ABSTRACT

The word steganography means" covered in hidden writing". The object of steganography
is to send a message through some innocuous carrier (to a receiver while preventing anyone else
fromknowing that a message is being sent to all). Computer based steganography allows changes
to bemade to what are known as digital carriers such as images or sounds.

Image steganography is the technique of hiding secret data within an imagefile, such that
the existence of the data is not noticeable to the human eye. It is different from cryptography,
which makes the data unreadable or hides the meaning of the data. Image steganography can be
used for various purposes, such as secure communication, digital watermarking, authentication,
and covert channels. The recipient extractor extracts the message from the carrier image.

The message can only be extracted if there is a shared secret between the sender and the
recipient.This could be the algorithm for extraction or a special parameter such as stegokey. A
stegano-analystor attacker may try to intercept the stegano image.
CONTENTS

Chapter No TITLE Page no.


Abstract
List of Abbreviations v
List of Figures vi

1 INTRODUCTION 1
2 HISTORY
2.1 Evolution of Image Steganography 2-3
3 WORKING PRINCIPLES
3.1 How Image Steganography work 4

3.2 Working Process of Image Steganography 5


3.3 Steganography vs. cryptography 6
3.4 How to detect image Steganography 6-7
3.5 Installation of Steghide 8-14

4 FEATURES
4.1 Key Features 15
5 ADVANTAGES AND DISADVANTAGES
5.1 Advantages 16

5.2 Disadvantages 17
18
6 FUTURE WORK
6.1 Scope of Future Application
6.2 Scope of Improvement
7 CONCLUSION 19
8 REFERENCES 20
LIST OF ABBREVIATIONS

• Steghide – Program Name


• Embed – this is the command
• -cf – This flag is for the cover file (the file used to embed the data)
• filename – this is the name of the cover file
• -ef – This flag is for the embed file (the file that will be embedded)
• Filename – This is the name of the embedded file

v
LIST OF FIGURES
FIGNO. FIGURE NAME PAGENO

Fig. 1. a Image Steganography Process-Flow and Phases 5

Fig 1.b Working process of Image Steganography 5

vi
Image Steganography

CHAPTER 1
INTRODUCTION
Image steganography is a fascinating and intricate field within the broader realm of information
security. It involves the practice of concealing or embedding secret information within an image
without altering the image's perceptual quality. The primary goal of steganography is to hide the
existence of the embedded data, making it challenging for unintended recipients to detect or
recognize the presence of covert information.

In essence, the process of image steganography revolves around manipulating the pixel values or
metadata of an image to embed additional data discreetly. This hidden information could be text,
images, audio, or any other type of file, depending on the steganographic technique employed.
Various methods are employed in image steganography, each with its unique advantages and
limitations. Common approaches include least significant bit (LSB) embedding, frequency domain
techniques, and spatial domain techniques. LSB embedding involves replacing the least significant
bits of the pixel values with the secret data, resulting in minimal visual changes that are
imperceptible to the human eye. Frequency domain techniques exploit the transformation of an
image into frequency components, such as using discrete cosine transform (DCT) in JPEG
compression, to embed information in specific frequency coefficients.

Image steganography is a technique used to hide information, messages, or data within digital
images without altering their perceptible appearance. Derived from the Greek words "steganos"
(meaning covered or hidden) and "graphy" (meaning writing), steganography allows users to
embed covert information within the pixels of an image, making it an inconspicuous vessel for
secret communication.

Dept of CSE,RGMCET Page 1


Image Steganography
CHAPTER 2
HISTORY
Steganography, the ancient practice of concealing information within seemingly innocuous
carriers, has traversed the annals of human history. Dating back to ancient civilizations, methods
ranged from hidden messages beneath layers of wax in ancient Greece to invisible inks and
microdots during World Wars. The medieval era witnessed Johannes Trithemius' exploration of
steganography in his work "Steganography." With the advent of radio broadcasting in the 20th
century, coded messages became a clandestine tool. However, it was the digital revolution that
propelled steganography into the modern age, finding a home in the hidden layers of digital files.
Techniques like LSB substitution in binary data emerged, allowing for covert communication
within images, audio, and video. As technology continues to advance, steganography remains an
ever-evolving field, integral to both security and secrecy in the digital realm.

2.1 Evolution

The evolution of image steganography has closely mirrored the advancements in digital technology
and the widespread use of digital media. In the early stages, steganographic techniques primarily
focused on concealing information in various forms, but it was not until the digital age that image
steganography took a prominent role. Here is a chronological overview of its evolution:

1. Analog Era:
• In the analog era, steganography involved techniques like invisible inks and
microdots, but it was not extensively applied to images.
2. Early Digital Techniques (1970s-1980s):
• With the advent of personal computers, researchers started exploring steganography
in the digital domain. Basic methods involved embedding information in the least
significant bits (LSBs) of binary data, including text and simple messages.
3. Introduction of Digital Images (1990s):

Dept of CSE,RGMCET Page 2


Image Steganography
• As digital images became prevalent with the rise of digital cameras and the internet,
steganography’s adapted their techniques to conceal information within these visual
carriers.
• LSB Substitution: The technique gained popularity, allowing for the hiding of data
in the least significant bits of pixel values without significantly altering the image's
visual appearance.
4. Advancements in Algorithms (1990s-2000s):
• Researchers developed more sophisticated algorithms and methods for image
steganography. Frequency domain techniques, such as discrete cosine transform
(DCT), were explored to embed data in the frequency components of an image.
5. Multimedia Steganography (2000s-Present):
• Steganography expanded beyond images to include audio and video files.
Techniques evolved to accommodate the unique characteristics of different
multimedia formats.
• Adaptive Steganography: Methods that dynamically adjust to the content of the
carrier image, making detection more challenging.
6. Steganalysis Challenges (2000s-Present):
• As steganography advanced, so did steganalysis techniques aimed at detecting
hidden information. The field became a cat-and-mouse game between those
concealing and those seeking to unveil covert messages.
7. Modern Techniques and Applications (Present):
• Advanced Embedding Strategies: Modern steganography employs more advanced
techniques, such as matrix encoding, transform domain embedding, and spatial
domain methods, to enhance security and minimize detectability.

Dept of CSE,RGMCET Page 3


Image Steganography

CHAPTER 3
WORKING PRINCIPLES
3.1 How Image Steganography Work

Image steganography operates on the principle of concealing information within an image in a way
that is imperceptible to the human eye. The process involves embedding data into the pixels of an
image while striving to maintain the visual quality of the original image. Here is a breakdown of
the working principle:
1. Cover Image Selection: A cover image is chosen as the carrier for hidden information.
This image should be a common or inconspicuous one, helping to avoid suspicion.
2. Data Embedding: The secret data, which could be text, another image, or any file, is
encoded and embedded into the cover image. One common method is the Least Significant
Bit (LSB) substitution, where the least significant bits of pixel values are replaced with bits
of the secret data. This subtly alters the pixel values without significantly changing the
visual appearance.
3. Encoding Techniques: Various encoding techniques are employed, depending on the
steganographic algorithm used. Some methods modify the color values of pixels, while
others may use frequency domain transformations like discrete cosine transform (DCT) to
embed information.
4. Encryption (Optional): For added security, the hidden data can be encrypted before
embedding. This ensures that even if the steganographic content is discovered, it remains
unreadable without the decryption key.
5. Stego Image Creation: The resulting image, now containing the embedded data, is
referred to as the stego image. Ideally, to the human eye, the stego image should appear
indistinguishable from the original cover image.
6. Transmission or Storage: The stego image can be transmitted over networks or stored
without arousing suspicion. Since the changes made during embedding are subtle, the stego
image seems normal.
7. Extraction of Hidden Data: The recipient or an authorized party uses a steganography
tool to extract and decode the hidden information from the stego image. This involves

Dept of CSE,RGMCET Page 4


Image Steganography

reversing the process used for embedding.

Fig 1.a : Image Steganography Process-Flow and Phases

3.2 Working Process of Image Steganography

Fig 1.b : Working Process of Image Steganography

Dept of CSE,RGMCET Page 5


Image Steganography

3.3 Steganography vs. cryptography

Steganography and cryptography share the same goal – which is to protect a message or information
from third parties – but they use different mechanisms to achieve it. Cryptography changes the
information to ciphertext which can only be understood with a decryption key. This means that if
someone intercepted this encrypted message, they could easily see that some form of encryption has
been applied. By contrast, steganography doesn’t change the format of the information but instead
conceals the existence of the message.

3.4 How to detect image steganography


1. Visual Inspection:
• Abnormal Patterns: Look for unusual patterns or irregularities in the image, such as
variations in color or texture that may indicate the presence of hidden data.
• Histogram Analysis: Analyze the histogram of the image to identify any anomalies or
unexpected spikes, which may suggest the presence of hidden information.
2. File Size Analysis:
• Compare Sizes: Compare the file size of the suspected image with similar non-suspect
images. If there is a significant difference, it might indicate the presence of hidden data.
3. Metadata Examination:
• Exif Data: Check the image's Exif data for any unusual or hidden information. Some
steganographic tools may embed data in the metadata.
4. Frequency Domain Analysis:
• Fourier Transform: Apply Fourier transform to analyze the frequency domain of the image.
Steganographic techniques may alter the frequency components, revealing hidden patterns.
5. Noise Analysis:
• Statistical Analysis: Perform statistical analysis on the noise in the image. Hidden data may
introduce subtle changes that can be detected through careful analysis.

Dept of CSE,RGMCET Page 6


Image Steganography

6. Steganalysis Tools:
• Steg detect and StegdetectGUI: These tools are designed to detect steganography in images.
They use predefined signatures and statistical analysis to identify hidden data.
• Outguess and Steghide: These are steganography tools, but they can also be used in reverse to
detect hidden data if you suspect a specific algorithm was used.
7. Watermark Analysis:
• Check for Watermarks: Examine the image for visible or invisible watermarks, as they can
sometimes indicate the presence of hidden information.
8. Randomness Analysis:
• Chi-Square Test: Apply statistical tests, such as the chi-square test, to evaluate the
randomness of pixel values. Deviations from expected randomness may indicate
steganographic content.
9. Hexadecimal Analysis:
• Visual Inspection of Hex Dumps: Analyze the hexadecimal representation of the image for
irregularities or patterns that may indicate the presence of hidden data.
10.Deep Learning Techniques:
• Neural Networks: Train neural networks to recognize patterns associated with steganography.
Deep learning approaches can be effective in detecting subtle changes introduced by
steganographic techniques.

Dept of CSE,RGMCET Page 7


Image Steganography

3.5 Introduction to Steghide:


Steghide is a command-line tool that enables users to hide sensitive information or files within
other files, known as carriers, without altering the visual or audible quality of the carrier. This
process is a part of a broader field known as steganography, which is the practice of concealing one
piece of information within another.

Steghide is a steganography program capable of hiding data in a various variety of image and audio
files. The color and sample frequencies are not changed sequentially, making the embedding
resistant against first-order statistical tests.

Steghide plays an important role in modern attacks in several ways. Most of the experts and
attackers use steganography in malware which can be divided into two categories, concealing the
actual malware contents and concealing the command-and-control communications (C2) channel.

Steghide can be a steganography tool that allows you to cover confidential records inside a picture
or sound record with a passphrase. Bolsters BMP and JPEG picture group, AU, and WAV sound
group. This device has its advantages and disadvantages. One upside is that it is much better at
covering and can extend a lot without any type of document. It does this by using a propelled
calculation to shroud it inside a picture (or sound) record without changing the form (or sound) of
the document. This is additionally without using Steghide (or if there is not the same scientific
method as Steghide) then it is difficult to remove the hidden documents from the picture.

Dept of CSE,RGMCET Page 8


Image Steganography

Installation:
Let’s start with the installation of Steghide. In Linux, you must first install Steghide. You can run
the following command to see if you have Steghide installed.

If nothing is returned then you must run the following command to install the Steghide.

The Steghide must now be installed. Run the following command to verify.

Dept of CSE,RGMCET Page 9


Image Steganography

Find a picture:
Steghide supports JPEG and BMP image file types. Once you have an image, make sure that it is
available on your black machine. In this example, we will use the first JPEG image located in this
article. Feel free to grab that image or any other JPEG or BMP file.

In this example, the file name would be “luv.jpeg”.

Your secret text file is ready:


We are going to create a text file called “luv.txt” which we will use to embed in the image. You
can use any text editor of your choice or quickly run the following command to create a text file.

Dept of CSE,RGMCET Page 10


Image Steganography

Then, click (ctrl + o), (enter), and then click (ctrl + x).
You can check to see if the text file is created and the contents by running the following command.

Now that you have your image and text, we are ready to proceed to embed the text in the image.

Embedding data in the image:


We hide the data in the image using the Steghide so that only the person who accepts it can read it.
Therefore, we created a text file named “luv.txt”, in which we wrote our confidential data and
images. JPEG is the file in which we are embedding our data.
To achieve this, Run the following command to embed “luv.txt” in an image named “luv.jpeg”.

Dept of CSE,RGMCET Page 11


Image Steganography

Here, ef and cf are termed as embedded files and cover files, respectively.
Let us see what this command is doing:
• Steghide – Program Name
• Embed – this is the command
• -cf – This flag is for the cover file (the file used to embed the data)
• filename – this is the name of the cover file
• -ef – This flag is for the embed file (the file that will be embedded)
• Filename – This is the name of the embedded file
You will be prompted to enter a passphrase(luv123). This passphrase will be necessary for anyone
trying to extract data from the image. The passphrase is not required. However, anyone trying to
extract data will be able to do so.

Extraction of Data from Image Via Steghide:


Using Steghide adds an extra layer of security by allowing us to use a password for it. As long as
you know the passphrase, it is quite easy to extract data from the image.
Now, use the following command to remove the hidden data:

Then enter the passphrase(luv123) to extract the file. Here, sf is a secret file. The embedded text
file will be extracted and written to your current directory.

Dept of CSE,RGMCET Page 12


Image Steganography

Password Protect Files:


Now, we can also extract files using the following command. This command is different in that it
specifies a password in the command itself, therefore, we do not need to specify it separately.

Retrieve Information of Embedded File:


If we have an image in which the data is suspected to be hidden and if so, what algorithm is used to
encrypt the data in the file? Then we will use the following command:

Dept of CSE,RGMCET Page 13


Image Steganography

Verbose Mode:
To obtain every information of a file during extraction, we can use verbose mode. The verbose
mode gives you detailed information. We can use action mode by executing the following
command:

Dept of CSE,RGMCET Page 14


Image Steganography
CHAPTER 4
FEATURES

❖ Imperceptibility: Ensures hidden data remains visually undetectable, preserving the cover
image's natural appearance.
❖ Capacity: Dictates the volume of data that can be concealed within an image without
noticeable alteration.
❖ Security: Involves encrypting hidden data to safeguard its confidentiality, even if the stego
image is discovered.
❖ Robustness: Measures the ability to withstand unintentional alterations or attacks without
compromising hidden information.
❖ Payload Type: Supports various data types (text, images) as payloads for diverse
steganographic applications.
❖ Embedding Techniques: Utilizes methods like LSB substitution or frequency domain
transformations for concealing information within pixels.
❖ Detectability: Strives to make alterations statistically indistinguishable from natural
variations to avoid detection.
❖ Complexity: Balances the intricacy of methods to ensure practical usability without
sacrificing security.
❖ Ease of Use: Prioritizes user-friendly tools for seamless embedding and extraction of
hidden information.

Dept of CSE,RGMCET Page 15


Image Steganography

CHAPTER 5

Advantages:

❖ Covert Communication: Enables secure transmission of sensitive information


within seemingly innocuous images.

❖ Data Hiding: Facilitates concealing data within images, offering a method of


confidential information storage.

❖ Cryptography Integration: Enhances security by combining steganography with


encryption for double-layered protection.

❖ Inconspicuous Communication: Allows for discreet exchange of information without


arousing suspicion.

❖ Multimedia Payloads: Supports embedding diverse data types, expanding applications


beyond text to include images or files.

Dept of CSE,RGMCET Page 16


Image Steganography

Disadvantages:

❖ Increased File Size: Embedding data within images can lead to a significant increase in file
size, affecting storage and transmission.
❖ Detection Challenges: Steganographic techniques might be susceptible to advanced
detection methods, compromising the hidden data.
❖ Potential Loss of Image Quality: Aggressive steganographic methods may cause
degradation in image quality, impacting visual fidelity.
❖ Limited Payload Capacity: Depending on the chosen technique, there's a restriction on the
amount of data that can be effectively concealed.
❖ Security Risks: If the steganographic key or method is compromised, the hidden
information becomes vulnerable to unauthorized access.
❖ Complexity in Extraction: Extracting hidden data requires knowledge of the
steganographic method used, posing a challenge for unintended recipients.

Dept of CSE,RGMCET Page 17


Image Steganography

CHAPTER 6

FUTURE WORK

6.1 Scope of Future Application

Future studies in image steganography offer promising directions for improvement. As technology
advances, the need for reliable and secure solutions grows. Future research could focus on
combining artificial intelligence and machine learning to create adaptable algorithms for new
detection tactics. Steganography's use in virtual or augmented reality settings presents new
opportunities. Hybrid methods combining steganography and cryptography could ensure data
encryption and disguise it. Another area for development is boosting payload capacity without
compromising image quality.

6.2 Scope of Improvement

Image steganography has vast potential for improvement due to technological advancements and
the need for secure communication. Advanced algorithms can resist detection methods, and
researchers can optimize payload capacity and image quality. Exploring new applications in IoT
and edge computing could expand covert communication. Collaboration with signal processing,
artificial intelligence, and cryptography can create hybrid models for robust security. Ethical
considerations and potential misuse of steganography are crucial for responsible use and preventing
malicious activities. Overall, improving image steganography involves refining existing
techniques, exploring new applications, and incorporating ethical considerations into its
development.

Dept of CSE,RGMCET Page 18


Image Steganography

CHAPTER 7
CONCLUSION
In Conclusion, Image steganography is a dynamic field that plays a crucial role in information
security by securing sensitive data and ensuring covert communication. Despite facing challenges
like detection methods, ethical considerations, and potential misuse, the field's growing demand for
secure communication channels and integration of steganographic techniques indicates a promising
future. Researchers and practitioners must work together to address limitations, develop robust
algorithms, and ensure responsible use. The future of image steganography requires a delicate
balance between technological innovation, ethical considerations, and the pursuit of secure
communication solutions.

Dept of CSE,RGMCET Page 19


Image Steganography

CHAPTER 8
REFERENCES
[1] Author(s): Johnson, N. F., & Jajodia, S.
Title: "Exploring steganography: Seeing the unseen."
Journal: IEEE Transactions on Computer Graphics and Applications.
Year: 1998.
DOI: 10.1109/38.708562

[2] Author(s): Fridrich, J.


Title: "Image watermarking for tamper detection."
Journal: Proceedings of the 1999 IEEE International Conference on Image Processing.
Year: 1999.
DOI: 10.1109/ICIP.1999.821196

[3] Author(s): Katzenbeisser, S., & Petitcolas, F. A.


Title: "Information hiding techniques for steganography and digital watermarking."
Journal: Artech House.
Year: 2000.

[4] Author(s): Singh, J., & Oberoi, G.


Title: "A comprehensive study of image steganography techniques."
Journal: Procedia Computer Science.
Year: 2015.
DOI: 10.1016/j.procs.2015.08.155

Dept of CSE,RGMCET Page 20

You might also like