MESSAGE CONCEALMENT TECHNIQUES USING IMAGE BASED STEGANOGRAPHY by Farhan Khan (G260214) - PowerPoint PPT Presentation

About This Presentation
Title:

MESSAGE CONCEALMENT TECHNIQUES USING IMAGE BASED STEGANOGRAPHY by Farhan Khan (G260214)

Description:

When combined, the cover image and the embedded message ... You, yet may spy the fawn; at play, The hare; upon the green, But, the sweet face of Lucy Gray; ... – PowerPoint PPT presentation

Number of Views:405
Avg rating:3.0/5.0
Slides: 13
Provided by: farha
Category:

less

Transcript and Presenter's Notes

Title: MESSAGE CONCEALMENT TECHNIQUES USING IMAGE BASED STEGANOGRAPHY by Farhan Khan (G260214)


1
MESSAGE CONCEALMENT TECHNIQUES USING IMAGE BASED
STEGANOGRAPHYby Farhan Khan (G260214)
2
Outline
  • Image based Steganography
  • Previous Work
  • Message Concealment Techniques
  • Using Punctuation Marks
  • Using modified Scytale Cipher
  • S-Tools Software Package
  • Conclusion

3
Image based Steganography
  • Embedding a message into an image requires two
    files.
  • cover image
  • Message to be hidden
  • When combined, the cover image and the embedded
    message make a stegoimage.
  • A stego-key (a type of password) may also be used
    to hide then later decode the message.

4
Previous Work
  • Several techniques are proposed by researchers
  • LSB insertion
  • Masking and Filtering
  • Algorithmic Transformations
  • Redundant Pattern Encoding
  • Encrypt and Scatter..

5
Message Concealment Technique (1)
  • Use of Punctuation Marks
  • The idea behind this technique is to utilize the
    presence of punctuation marks like , etc.
    in the text for encoding a secret messge.
  • Encode the given secret message using punctuation
    marks into the embedded message
  • Embed the message in a cover image to create a
    stego-image using some transformation
  • Extract the embedded message using the reverse
    transformation
  • Decode the secret message from the embedded
    message

6
Example
  • Message Pershing sails from NY June 1
  • Encoded using ASCII code where comma stands for 0
    and semicolon for 1
  • OFT, I had heard of Lucy Gray
  • And, when I crossed the wild
  • I chanced, to see, at break of day,
  • The solitary child,
  •  
  • No mate, no comrade Lucy knew,
  • She dwelt, on a wide moor,
  • The sweetest thing that ever grew,
  • Beside a human door
  • You, yet may spy the fawn at play,
  • The hare upon the green,
  • But, the sweet face of Lucy Gray
  • Will never more be seen,
  • ..

7
Example Original Image Stego Image
8
Message Concealment Technique (2)
  • Use of modified Scytale Cipher
  • Arrange a message on a rectangular array of some
    size e.g., 4x16
  • Fill the remaining cells of the grid with
    arbitrary letters or numbers and note down the
    row number and column number of the secret
    message.
  • Embed this data array linearly in a cover image
    file.

9
Example
  • Embedded Message
  • 4145494D515559534131353964686C7042464A4E52565A657
    232366165696D714347B4F5357306E6D333762666A6E724448
    4C505458316479343863676B6F73
  • When arranged on a grid of same size (4x16) will
    reveal the secret message Send Army at (row ,
    column) (1,8)

10
Example
Original Image Stego Image
11
S-Tools Software Package
  • S-Tools for Windows Version 4 is used.
  • It allows processing of GIF and BMP images and
    audio WAV files.
  • S-Tools applies the LSB method for image and
    audio files and also includes encryption
    routines.
  • The message to be embedded is first compressed.
  • The compressed output is then encrypted using
    IDEA using a stego-key and inserted into the
    low-order bits of each color value.

12
Conclusion
  • The two presented technique are based on the
    simple idea of adding an additional layer of
    confusion in order to make the message revealment
    difficult against steganalysis.
  • They have less capacity in comparison with other
    methods.
Write a Comment
User Comments (0)
About PowerShow.com