04-10-2012, 02:05 PM
Implementation of LSB Steganography and its Evaluation for Various File Formats
Implementation of LSB.doc (Size: 30 KB / Downloads: 31)
Abstract
Steganography is derived from the Greek word steganos which literally means “Covered” and graphy means “Writing”, i.e. covered writing. Steganography refers to the science of “invisible” communication. For hiding secret information in various file formats, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale
EXISTING SYSTEM
Image compression techniques are extensively used in steganography. Among the two types of image compressions, lossy compression and loss less compression; lossless compression formats offer more promises. Lossy compression compression may not maintain the original image’s integrity. Lossless compression maintains the original image data exactly, hence it is prefered. Example of Lossy compression format is JPEG format files. Examples of Lossless compression formats are GIF[3] and BMP formats.
PROPOSED SYSTEM
The “Data Hiding in Audio Files” mainly developed to embed or extract the messages into audio files. This project basically deals with two important network security concepts namely steganography and encryption. For encryption AES algorithm is used. The plaintext is given as input. The plaintext is encrypted using AES algorithm. The ciphertext is given as output. The output ciphertext is hidden into the audio files using Seganography. For steganography LSB algorithm is used. The audio file is in the wave format is the chosen medium to conceal and transmit the secret information. Since the audio file is in ASCII format, the contents of the text file are also converted to the bit stream. The encrypted file is now embedded behind the audio file by mixing the contents together using LSB algorithm. At the other end, the encrypted file is separated from audio file. The encrypted file is then decrypted and the original text file contents are then viewed.