A Hybrid Approach For Image Steganography With Compression T0 Enhance Security and Accuracy

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

A HYBRID APPROACH FOR IMAGE

STEGANOGRAPHY WITH COMPRESSION


T0 ENHANCE SECURITY AND ACCURACY

GUIDED BY
R.ANBARASAN,M.E.,
DEPTMENT OF CSE
SUBMITTED BY
A.KALAIMATHI
510516405003
M.E- CSE
CONTENT
 INTRODUCTION
 WHAT IS STEGANOGRAPHY???
 CATEGORIES
 AUDIO STEGANOGRAPHY
 WHAT IS IMAGESTEGANOGRAPHY???
 EXISTING SYSTEM
 PROPOSED SYSTEM
 GENRAL DIAGRAM
 LITERATURE SURVEY
 ARCHITECTURE
 MODULUES
 USECASE DIAGRAM
 DATA FLOW DIAGRAM
 SCREEN SHORT
 CONCLUSION
 REFERENCES
INTRODUCTION

 Steganography is the art and science of


invisible communication.
 This is a complished through hiding in
formation in other information ,thus hiding the
existence of the communicated in formation.
 The word steganography is derived from the
Greek words“ stegos” meaning “cover”.
 In image steganography the information is
hidden exclusively in images.
WHAT IS STEGANOGRAPHY???

 Steganography is defined as the art of


hiding messages inside media files.
 It is the way in which we can hide any
message inside any file This helps people
to make sure that only those who know
about the presence of the message can
obtain it.
 There are many different methods of
performing steganography.
CATEGORIES

 Four kinds of steganography

 TEXT
 IMAGES
 AUDIO
 VIDEO
AUDIO STEGANOGRAPHY

 To embeded data secretly onto digital audio


file there are few techniques
LSB CODING
PHASE CODING
PARTY CODING
SPREAD SPECTRUM
WHAT IS IMAGE STEGANOGRAPHY???

 If the message is encrypted, the encryption of


that information is called the stego-key.
 The second component is the carrier/cover
image. The cover image is the image that is
used to hide the information contained in the
message.
 Finally, the stego-image is the combination of
the cover/carrier image and the message.
EXISTING SYSTEM

 This technique is chosen, because this system


includes not only imperceptibility but also un-
delectability by any steganoanalysis tool.
 This project is developed for hiding information
in any image file.
 The scope of the project is implementation of
steganography tools for hiding information
includes any type of information file and image
files and the path where the user wants to save
Image and extruded file.
PROPOSED SYSTEM

 In proposed technique, First pre-processing is applied


on cover image.
 In pre-processing we applied resize of image. Then
applied 2-level DWT transforms.
 Then added secret message using LSB embedding
techniques. Then converted stego image and applied
EZW compression and Chaos based encryption and
converted advance stego image. Then extracting
process take advance stego image applied decryption
using secret key and decompress and decryption
techniques.
GENRAL DIAGRAM
LITERATURE SURVEY

1. “Designing Secured Data Using a Comination of LZW


Compression”.
 Author:LedyaNovamizanti, GelarBudiman,
IwutTritoasmoro.
 Year: Nov 2015
 Description: The algorithm hides a secret image in another
cover image by converting them into sequence using the
nucleotide to the binary transformation table. On the sender
side, the embedding method includes three steps. First, it
converts the values of a pixel of both the cover image and
secret image to their respective triplet value utilizing
characters to the triplet conversion.
CONTINUE….
2. "Image Security using Chaos and EZW Compression.”
 Author: T. VenkataSainath Gupta, Ch. Naveen, V. R.
Satpute, A. S. Gandhi
 Year:May 2014
 Description:In , the authors presented a new
technique called multi-level secret data hiding which
integrates two different methods of encryption,
namely: visual cryptography and steganography. The
first step of this method is to use a method called half
toning, which is used to reduce the pixels and simplify
the processing. After that visual cryptography is
performed
ARCHITECTURE
MODULUES

 Discrete Wavelet Transformer .


 LSB Substitution
 Chaotic Encryption Method
 Integer wavelet transform
LSB SUBSTITUTION

 This is the steganographic method used for


embeddeding secret images in video in order
to provide security for it.
 Here LSB bits of video i.e., Video is sequence
of images so the LSB bits of each image are
replaced by secret image bits.
 This provides less distortion of video as only
LSB bits are replaced.
USE CASE DIAGRAM
DFD DIAGRAM
SCREEN SHORT
CONCLUSION

 Information security and transmission is a key


factor in image processing.
 According to literature review and paper
analysis to balance security with
steganography and compression of data is
primary limitation of existing system.
REFERENCE

[1] FaiqGmira, Said Hraoui, AbderrahimSaaidi,


AbderrahmaneJarrarOulidi, Khali Satori. "Securing the
Architecture of the JPEG Compression by an Dynamic
Encryption." IEEE Intelligent Systems and Computer Vision
(ISCV), Morocco,25-26 March 2015, DOI
10.1109/ISACV.2015.7106192 Print ISBN: 978-1-4799- 7511-2.

[2] ShubhamLavania, PalashSushilMatey, Thanikaiselvan V. "Real-


Time Implementation of Steganography in Medical Images using
Integer Wavelet Transform.” IEEE International Conference on
Computational Intelligence and Computing Research
(ICCIC),TamilNadu, 18-20 Dec. 2014, DOI
10.1109/ICCIC.2014.7238344 Print ISBN: 978-1-4799-3975-6.
CONTINUE….

[3] Rina Mishra, Atish Mishra, Praveen Bhanodiya. “An Edge Based
Image Steganography with Compression and Encryption." IEEE
International conference on Computer, Communication and
Control (IC4-2015), Indore, 10-12 Sept. 2015, DOI
10.1109/IC4.2015.7375510 Print ISBN: 978-1-4799-8165-6.

[4] Nathaniel D. Amsden, Lei Chen. "Analysis of Facebook


Steganographic Capabilities." 2015 International Conference on
Computing, Networking and Communications, Communications
and Information Security Symposium, Huntsville, 16-19 Feb.
2015, DOI 10.1109/ICCNC.2015.7069317 Print ISBN: 978-1-
4799-6959- 3, pp. 67-71.
THANK U

You might also like