Adnan Gutub Mahmoud Ankeer Muhammad AbuGhalioun

Slides:



Advertisements
Similar presentations
Queen’s University, Kingston, Canada
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Data Representation. Units & Prefixes Review kilo, mega, and giga are different in binary! bit (b) – binary digit Byte (B) – 8 binary digits KiloByte.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Introduction to compositing. What is compositing?  The combination of two images to produce a single image  Many ways we can do this, especially in.
Data Representation COE 202 Digital Logic Design Dr. Aiman El-Maleh
Mohammed Aabed Sameh Awaideh Abdul-Rahman Elshafei.
Steganography and Network Security
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on.
ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.
Data Representation COE 205
1 ICS102: Introduction To Computing King Fahd University of Petroleum & Minerals College of Computer Science & Engineering Information & Computer Science.
Overview of Digital Stenography
A Hybrid Test Compression Technique for Efficient Testing of Systems-on-a-Chip Aiman El-Maleh King Fahd University of Petroleum & Minerals, Dept. of Computer.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions By : Fahd Al-Haidari Adnan Gutub Khalid Al-Kahsah Jamil Hamodi.
Using Multiple Diacritics in Arabic Scripts for Steganography By Yousef Salem Elarian Aleem Khalid Alvi 1.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Digital Colour Theory. What is colour theory? It is the theory behind colour mixing and colour combination.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
KING FAHD UNIVERSITY OF PETROLEUM & MINERALS DHAHRAN, SAUDI ARABIA ARE-512 Life Cycle Costing – Cost Data Bank For By G. C. SOFAT S.K. TYAGI Presented.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Compsci 06/101, Fall Steganography l Hide text in image (or hide information in image)  Why might we do this?  Difference: watermarking v steganography.
Data Hiding in binary images using block parity Group ID -17 Guided by Mr. Pramod Ganjewar By – Sipendra Sinha Deepak Kumar Rohit Singh Amol Gaikwad Snehal.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Digital Media Lecture 4.1: Image Encoding Practice Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
Group 6 Arthur Garza Lizeth Gonzalez Javier Guzman.
King Fahd University of Petroleum and Minerals King Fahd University of Petroleum and Minerals Computer Engineering Department Computer Engineering Department.
1 Computer Vision & Image Processing G. Andy Chang Department of Mathematics & Statistics Youngstown State University Youngstown, Ohio.
MULTIPLEXING Habib Youssef, Ph.D Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi.
BINARY Toby Wilson. LEARNING OBJECTIVES  Be able to convert binary to denary  Be able to convert denary into binary  Be able to explain how computers.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Digital Media Lecture 4.2: Image Encoding Practice Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
MOSFET Current-Voltage Characteristics COE 360 Principles of VLSI Design Dr. Aiman El-Maleh Computer Engineering Department King Fahd University of Petroleum.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
影像偽裝術 Dr. Chin-Chen Chang
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Welcome
Measures for Classification and Detection
Steganography Example
Error Correcting Code.
Adnan Abdul-Aziz Gutub* and Ahmed Ali Al-Nazer
Digital Media Lecture 4.1: Image Encoding Practice
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
- orange white green - cyan - red - blue Example 1 24 bit RGB
Steganography Techniques and their use in Anonymity
A Study of Digital Image Coding and Retrieving Techniques
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Sequential Design Example
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Data hiding based Hamming code
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Source: IEICE-Transactions on Info and Systems
- orange white green - cyan - red - blue Example 1 24 bit RGB
Information Hiding Techniques Using Magic Matrix
LSB matching revisited
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Presentation transcript:

PIXEL INDICATOR HIGH CAPACITY TECHNIQUE FOR RGB IMAGE BASED STEGANOGRAPHY Adnan Gutub Mahmoud Ankeer Muhammad AbuGhalioun Abdulrahman Shaheen Aleem Alvi Computer Engineering Department King Fahd University of Petroleum & Minerals Dhahran, Saudi Arabia

Pixel Indicator Technique RGB images are of 24-bits per pixels. Use of LSB bits of one of the channels as indicator for data existence in the other two channels. The 2 LSB of indicator are based on Image nature. First indicator is chosen based on image length value property Steganography sequence: -RGB-RBG-GBR-GRB-BRG-BGR- Type of length (N) of secret message I Level Selection Select indicator channel, first element of sequence II Level Selection Binary N parity-bit Odd Parity Even Parity Even R GB BG Prime B RG GR Else G RB BR

Pixel Indicator Technique Process

Testing And Results Image size = 512 X 384 = 196608 pixels Secret text =11,733 characters length = 93,864 bits The test performed hiding data using 1 bit, 2 bits, 3 bits, 4 bits, 5bits. Histogram for each channel in each run was drawn. The number of pixels required each time was recorded.

Testing And Results (2bits) Using 2 bits as hidden data: Original (Cover)+ secret = Stega.obj.

Testing And Results (3bits) Using 3 bits as hidden data: Original (Cover)+ secret = Stega.obj.

Testing And Results (4bits) Using 4 bits as hidden data: Original (Cover)+ secret = Stega.obj.

Testing And Results (5bits) Using 5 bits as hidden data: Original (Cover)+ secret = Stega.obj.

Testing And Results (Red Channel) Original image, 2-bits, 4-bits and 5-bits:

Testing And Results (Blue Channel) Original image, 2-bits, 4-bits and 5-bits):

Testing And Results (Green Channel) Original image, 2-bits, 4-bits and 5-bits:

PIT Capacity: (Testing & Results) Secret data = 93,864 bits

Pixel indicator technique Remarks Histograms of the pixel indicator: Some channels will have data and some are not No difference in histogram (for data/indecator) More difficult to distinguish between data and indicator. With huge number of pixels in RGB and multi-bits per channel  high capacity.