An Introduction To Image Steganography Techniques
An Introduction To Image Steganography Techniques
An Introduction To Image Steganography Techniques
STEGANOGRAPHY TECHNIQUES
WHAT IS IMAGE?
COMPONENTS OF A PIXEL
I.E a pixel
is a smallest
element which
R G B
is used to
represent the
smallest
possible part Each pixel represented as 3
in an image. bytes.
R-RED :(Decimal rep :255,0,0)
G-GREEN :(Decimal rep :0,255,0)
B-BLUE :(Decimal rep :0,0,255)
PROBLEM STATEMENT
MESSAGE BYTE
MESSAGE BITS
IMAGE PIXEL BYTE
PROS AND CONS OF STEGANOGRAPHY
CONS:
PROS:
Unfortunately most uses of
Hiding Information: -
steganography and research
Steganography can also be used
around the topic of
to protect identities and
steganography centre around
valuable data from theft,
the illegitimate purposes. The
unauthorized viewing, or
three biggest areas of
potential sabotage by
illegitimate steganography
concealing the message within
evolve around terrorism,
a unsuspicious image.
pornography and data theft.
DIFF. B/N CRYPTOGRAPHY AND
STEGANOGRAPHY
Cryptography:
Steganography:
• Known message passing
• Unknown message passing • Common technology
• Little known technology • Most algorithms known to
• Technology still being government departments
developed for certain • Strong algorithm are
formats currently resistant to brute
force attack Large expensive
• Once detected message is computing power required for
known cracking Technology increase
reduces strength
CONCLUSION