Preview

Steganalysis Lsb Insertion Method

Powerful Essays
Open Document
Open Document
2601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganalysis Lsb Insertion Method
The first step is that to STEGANALYSIS OF LSB INSERTION METHOD in Steganoraphypass both embedded IN UNCOMMPRESSED and hiding information is to the secret IMAGES USING MATLAB cover message into the encoder, message and the
Mohit Kr. Srivastava
Asst. Prof. Ph: 9935428632 Xsddddd mohit1003@yahoo.co.in

Sharad Kr. Gupta
Asst. Prof. Ph: 9839164608 sharad_mpec@rediffmail.com

Sushil Kushwaha
Asst. Prof. Ph: 9335891362 kushwahasushil@rediffmail.com

Brishket S. Tripathi
Lecturer Ph: 9236119790 brisheket@gmail.com

Department of Electronics Engineering , MPEC, Kothi Mandhana, Kanpur

ABSTRACT
In this paper we have explained a steganalytic tool to detect the presence of hidden message in LSB steganography. It is process of hiding secret information in a cover image. Here we have used LSB insertion method using discrete algorithms. Steganographic programs use the Least Significant Bit (LSB) embedding as the method of choice for message hiding 24-bit, 8-bit color images and grayscale images. It is commonly understood that changes to the LSB of color cannot be detected due to noise that is always presents in digital images. In this paper, we describe a new very accurate and reliable method that can detect LSB. Embedding in randomly scattered pixels in both 24-bit color images and 8bit grayscale or color images.

The first step is steganography is that to embed and hiding information is to pass both the secret message and the cover message in to the encoder, inside the encoder, one or several protocols will be implemented to embed the secret information into the cover message.

Secret text message of 1000 character

Encoder Cover image Stego Object

Keywords
Stegnography, Stegoimage, LSB Computer and Network Security insertion,
Secret Text

1. INTRODUCTION
Steganography brings science to the art of hiding information. The purpose of steganography is to convey a message inside of a conduit of misinterpretation such that the existence of the message



References: [1] J. Fridrich and M. Goljan, “Stegnalysis of LSB Embedding in color and Grayscale image”, in preparation for the special issue on security in Magazine IEEE Multimedia. [2] R. J. Anderson and Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications. [3] Curran, K. and Bailey, K. “An evaluation of image based steganography method”.International Journal of Digital Evidence, Fall2003. [4] Jakson, J.T.,Gregg, H., Gunsch, Claypoole, R.L., and Lamont, G.B. “Blind Steganography detection using a computational immune system: A Work in progress”. International Journal of DigitalEvidence. [5] Digital Image Processing using MATLAB by Gonzale Woods. [6] N. Provos and P. Honeyman,”Hide and seek: An introduction to Steganography”.

You May Also Find These Documents Helpful

  • Better Essays

    Along with this new approach to spying, a new approach to the system of passing messages was introduced as well. The punishment for accused spies, especially spies with evidence, was unavoidable. Suspected spies were hung without question, spies with evidence were walking death traps. New measures needed to be taken in order to protect the spies. Advances in anything from coded messages and fake identities to invisible ink were now being utilized to insure the spy’s safety.…

    • 1287 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 7 Vocab Answers

    • 4516 Words
    • 19 Pages

    Steganography is task of hiding information by putting messages within one another. Whereas, cryptography is when you change information into an illegible layout. this format is called cipher text.…

    • 4516 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Message Encoding involves converting the information the host wishes to send into the appropriate medium for transmission. Messages sent across networks are converted down into bits by the sending host and then encoded into a pattern of sounds, light waves, or electrical impulses, depending on the network medium over which the bits are being transmitted.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    References: Hinde, Stephen. "Spyware: The Spy In The Computer." Computer Fraud & Security 2004.12 (2004): 15-16. Academic Search Premier. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    com worksheet

    • 544 Words
    • 3 Pages

    Explains the process that people use to manage the relationship between concealing and revealing private information…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The communication process begins with the sender (or transmitter) formulating a message they wish to transmit. The sender ‘encodes’ the message ie decides what they are going to say and how they will say it. The message is next transmitted via the most appropriate means to be successfully received. Once…

    • 2645 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Dystopian Novel

    • 1604 Words
    • 7 Pages

    Cited: Akers, Becky. “Whole-Body Imaging: Intrusion Without Security.” Freeman Vol. 60, No. 4 May 2010: n. pag. SIRS Issues Researcher. Web. 5 Dec. 2011. .…

    • 1604 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    How did it work: The enigma machine was a very complicated device. On the inside of the machine there were three rotors that contained all 26 letters of the alphabet. What would happen was that when someone would press a letter on the keyboard, a different letter would pop up on the paper, such as A for E, D for G, F for Z, and so on. These substitutions occur because of the positions of the rotors on the inside of the machine. The rotors are first situated at any random letter in the alphabet and when the button is pressed, the letter that is at the beginning of the rotor is put onto the paper. Then if the same letter were to be pressed again, a different letter would appear because the rotor will have changed position. The fully typed and encoded message would be printed out and mailed to the person it was designated to and then that person would put in that code into their enigma machine and that machine would decipher the encoded message.…

    • 3634 Words
    • 15 Pages
    Better Essays
  • Good Essays

    Deception

    • 804 Words
    • 4 Pages

    Concealments: omitting information that is important or relevant to the given context, or engaging in behavior that helps hide relevant information.…

    • 804 Words
    • 4 Pages
    Good Essays
  • Good Essays

    2.1.2 Cryptography Facts

    • 665 Words
    • 3 Pages

    A cipher or algorithm is the process or formula used to convert a message or otherwise hide its meaning. Examples of algorithms include:…

    • 665 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Stereochemistry may seem like a trivial subject because differences between stereoisomers are usually subtle. In nature, however, and most importantly, in biological systems such as the human body, these subtle differences have sweeping implications. Most drugs for example, are often composed of a single stereoisomer of a compound, and while one stereoisomer may have positive effects on the body, another stereoisomer may be toxic. Because of this, a great deal of work done by synthetic organic chemists today is in devising methods to synthesize compounds that are purely one stereoisomer.Accordingly, examples of bioequivalence studies based on stereospecific assays have started to appear in the literature. Fortunately, facile stereospecific assays have become available in the last several years for many drugs. Consequently, regulatory agencies have started to take the issue of stereochemistry into consideration in the assessment of bioequivalence, particularly from the standpoint of generic substitution. Amino acids, Lactic acid and Carbohydrates are discussed with reference to their configurations. The importance of the different properties in isomeric forms of some common pharmaceuticals are also examined…

    • 2419 Words
    • 10 Pages
    Good Essays