We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11
Image steganography
EE7150 – Digital Image Processing – Fall 2015
Savitha Bhallamudi Information Hiding -Introduction Purpose: Hiding sensitive information vital for security purposes Securing private files and documents Hiding information - 3methods - Cryptography, Steganography, Watermarking. Cryptography - Data to be hidden is coded several techniques ; sophisticated visually obvious to be encrypted; appears non-sensical Watermarking Applies a copyright label ; prevents illegal use of content Improper removal causes degradation of original information Steganography -hiding information by using another information as a cover. Elements: cover component, message component, stego component. Steganography -Introduction Types: Text steganography Image steganography Video steganography Audio steganography Image steganography is widely used. Images contain redundant information. Easy to manipulate few pixels without affecting visual data observably Slight changes in RGB values undetected by human eye (HVS) - Psychovisual redundancy. Types: Text in image ; image in image Image steganography Initially used in images sent through emails. Presence detected by huge size of the stego-images. Various techniques available: LSB substitution method Blocking method Palette modification method LSB technique can be used for BMP(bitmap) images. Blocking method – DCT and DWT – used for JPEG images Palette based method – used for GIF images. Methods: LSB substitution method: Deals with substituting LSB bits of corresponding pixels in image to store the text message or another image as a message. Block method: blocks of the image are considered and DCT (discrete cosine transform) is done in order to break them. Each block is then subdivided into 64 parts (DCT coefficients). These coefficients are modified i.e. the color gets modified a little by storing some text or another image in it. Palette modification: Every image uses a set of color values. Palette Modification replaces the unused colors within an image’s color palette with colors that represent the hidden message. LSB substitution method -Algorithm: In the current project, emphasis is given to this method. Simplicity Mostly Imperceivable One of the channels among RGB can be chosen, and LSB of its pixels altered or all the channels could be used. Example: (a) binary form of message to be hidden (b) few pixel values on cover image (c) LSB altered Algorithm: 1. Input the message to be hidden. (either image or text) 2. Check the maximum number of bits that can be accepted by the cover image 3. Replace the LSB bits of the pixels in cover image with the binary representation of the message. => we obtain Stego image Either color image (RGB) or grayscale image can be used as a cover image. In case of color image, 24bit image i.e. 8bits are present for each for RGB so more number information pixels can be stored. Modification can be done to either just the last 1 bit or 2,4 or more bits depending on requirement. In the above example, image1 represents cover image and image2 is to be hidden. As stated earlier, using too many or too less bits causes the cover image to be distorted too much, making the steganography obvious. Generally ideal to replace only about half of the pixels with the message in order to keep the stego image visually good.
4.To retrieve the original image,
Number of bits used to store the secret image should be known. The host image is scanned, to pick out the least significant bits according the number used These are then used to create a new image such that the LSB bits extracted now become the most significant bits in the retrieved image. References: 1. Johnson, Neil F. "Steganography." Http://www.jjtc.com/pub/tr_95_11_nfj/sec101.html. N.p., Nov. 1995. Web. 2. Shikha, and Vidhu Kiran Dutt. "International Journal of Advanced Research in Computer Science and Software Engineering." Http://www.ijarcsse.com/. N.p., Sept. 2014. Web. 3. Niels Provos, and Peter Honeyman. “Hide and Seek: An Introduction to Steganography.” 4. IEEE Security & Privacy Magazine, May-June 2013. Web. 5. Nick Nabavian. “Image steganography” Nov. 28, 2007. http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageStegano graphy.pdf 6. Matlab help. THANK YOU