Download presentation
Presentation is loading. Please wait.
Published byLouise Curtis Modified over 9 years ago
1
Group 6 Arthur Garza Lizeth Gonzalez Javier Guzman
2
Read the Cover Image Read the Message Break the Cover into 8x8 blocks of pixels Subtract 128 in each block of pixels (from left to right, top to bottom) Convert to YCrCb Apply DCT to each block Each block is Quantized Compare with message bit and determine the LSB of each DCT coefficient Replace with each bit of the secret message. Now you have your stego-image
3
Read the Cover Image Break the Cover into 8x8 blocks of pixels Subtract 128 in each block of pixels (from left to right, top to bottom) Convert to YCrCb Apply DCT to each block Each block is Quantized Extract the LSB of each DCT coefficient Retrieve and convert each 8-bit into character Write message to disk
4
Global Variables – Many functions modified the same variables – Increasingly difficult to track which methods are associated with the variables. Little Endian – The program was giving us little Endian. – Visual Studio’s int is Big Endian. – Solution: flip the bits
5
Interested in hiding in grayscale images. – 8-bit images instead of 24- bit images Flexibility with other image formats. –.png,.tif, etc. Consider using a high- capacity algorithm rather than high security.
6
768kb31.6kb Quality 50 (default) Secret Message 4kb
7
Secret Message 768kb 6.61kb 106kb Quality 70
8
Secret Message 768kb 292kb 37.6kb Quality 100
9
Secret Message 58.2kb 14.6kb 176kb
10
A quality above 50 is unperceivable. Lower than 50, the image gets darker and moderately pixilated. Histograms reveal something hidden if a low quality is used.
12
Koduri, Nani. Information Security Through Image Steganography “Using Least Significant Bit Algorithm” (n.d.): 1-63. Scribd. Nani Koduri, 14 Feb. 2011. Web.. Li Zhi; Sui Ai Fen; Yang Yi Xian;, "A LSB steganography detection algorithm," Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on, vol.3, no., pp. 2780- 2783 vol.3, 7-10 Sept. 2003 Muttoo, S.K, and Sushil Komar. "Data Hiding in JPEG Images." BVICAM’S International Journal of Information Technology (2008): 13-16. Print. Reddy, Lokeswara, Dr. A. Subramanyam, and Dr.P Chenna Reddy. "Implementation of LSB Steganography and Its Evaluation for Various File Formats." Int. J. Advanced Networking and Applications 2.5 (2011): 868-72. Print. Walia, Dr. Ekta, Payal Jain, and Navdeep. "An Analysis of LSB & DCT based Steganography." Global Journal of Computer Science and Technology, vol10.1 (2010): p. 8. Print.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.