Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Presented by:
AJAYA SIMHA K.J.

[attachment=11742]
VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES
BASIC OVERVIEW ON CRYPTOGRAPHY

 Cryptography- meaning “secret writing”
 Definition-practice and study of hiding information
 Encryption- To obtain a cipher
 Use- To secure information
The most commonly used techniques are:
 Joint key cryptography-Symmetric key cryptography
 Public key cryptography-Asymmetric key cryptography
 HYBRID CRYPTOSYSTEM-Combines both the features
Joint Key Cryptography (Symmetric Key)
 This technique uses a common key.
 This key is shared privately.
 Process
 But the key should also be shared securely.
Public Key Cryptography (Asymmetric Key)
 Uses two different keys
 Process
 There is no need to privately share a key
 More secure
STEGANOGRAPHY
 Steganography- meaning “concealed writing”
 Definition- security through obscurity
 Advantage of steganography
 Visual steganography- Secure, implemented in image files
THE RGB COLOR MODEL
 Image-pixel-pixel depth
 RGB COLOR MODEL- additive colour model
 Purpose- sensing, representation, and display of images in electronic systems
 Device dependent
 Digital representation- For 24 bit per pixel image, each colour is represented by 8 bits.
 Primary colours- R-red, G-green, B-blue
 Secondary colours- R+G=yellow, G+B=cyan,
B+R=magenta
 Zero intensity- Black and Full intensity- White
LSB insertion technique
 LSB insertion technique- A common technique in image steganography
 Grid of 3 pixels of a 24-bit image
(00101101 00011100 11011100)
(10100110 11000100 00001100)
(11010010 10101101 01100011)
 LSB is changed
 A number 200-binary equivalent 11001000
needs to be embedded
(00101101 00011101 11011100)
(10100110 11000101 00001100)
(11010010 10101100 01100011)
 Cryptography and steganography combined systems can be created
THE VISUAL CRYPTOGRAPHIC STEGANOGRAPHY SYSTEM
 Advanced system of encrypting data
 Visual steganography- Secure, implemented in image files
 Concept of multiple cryptography
 Only jpeg image will be used
SYSTEM FLOW CHART
THE REFERENCE DATABASE

 In order to provide higher security levels the algorithm is designed to use a reference database as shown in the figure.
Encryption Algorithm
 The message will first be encrypted
 The pixel values of the image are truncated
 Then a specific number which corresponds to the 3-D representation of the character in the cipher code sequence can be added to this number
 Only the edited message will be transmitted to the receiver
 In the first few lines of image properties, the attributes of the image will be encrypted and saved
 The edited image will be transmitted to the receiver
Decryption Algorithm
 The message can be decoded using the receiver’s private key.
 The receiver’s private key is used to identify the reference grid from the reference database.
 The x and y components can define the block that has been used to encrypt the message.
 RGB value-point to the data in the block
 The cipher is retrieved by obtaining the difference in the pixel value
 This cipher can now be decrypted using an inverse function of the DEA algorithm to get the message text
Applications of steganography
 Confidential communication and secret data storing
 Protection of data alteration
 Access control system for digital content distribution
 Media Database systems
Applications of cryptography
 Confidentiality
 Authentication
 Integrity
 Non-repudiation
Advantages of the technique
 It provides higher levels of security to the information being transmitted
 More secure than other systems
 The image bits are not used to store the message
Applications and future scope
 To increase security on web based applications
 A part of message can be sent in each image
Hi sir.. I need advanced updates in this topic
sir,
I want to know more about visual cryptographic steganography in images.

1. Why we use DES encryption algorithm for encryption and modified bit encoding for embedding instead of others?
2. Please give a detailed description about modified bit encoding scheme.
3. How to truncate the pixel values of image file?


With this query iam also include my ppt.
respected sir,
i want to know abt the reference grid.
and can we use this technique with any other imge file like bmp?
THANKS FOR EVERY ONE FOR RPLYNG ND HELPNG IN SELETION OF SEMINAR TOPICS