Preview

Steganalysis Lsb Insertion Method

Powerful Essays
Open Document
Open Document
2601 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Steganalysis Lsb Insertion Method
The first step is that to STEGANALYSIS OF LSB INSERTION METHOD in Steganoraphypass both embedded IN UNCOMMPRESSED and hiding information is to the secret IMAGES USING MATLAB cover message into the encoder, message and the
Mohit Kr. Srivastava
Asst. Prof. Ph: 9935428632 Xsddddd mohit1003@yahoo.co.in

Sharad Kr. Gupta
Asst. Prof. Ph: 9839164608 sharad_mpec@rediffmail.com

Sushil Kushwaha
Asst. Prof. Ph: 9335891362 kushwahasushil@rediffmail.com

Brishket S. Tripathi
Lecturer Ph: 9236119790 brisheket@gmail.com

Department of Electronics Engineering , MPEC, Kothi Mandhana, Kanpur

ABSTRACT
In this paper we have explained a steganalytic tool to detect the presence of hidden message in LSB steganography. It is process of hiding secret information in a cover image. Here we have used LSB insertion method using discrete algorithms. Steganographic programs use the Least Significant Bit (LSB) embedding as the method of choice for message hiding 24-bit, 8-bit color images and grayscale images. It is commonly understood that changes to the LSB of color cannot be detected due to noise that is always presents in digital images. In this paper, we describe a new very accurate and reliable method that can detect LSB. Embedding in randomly scattered pixels in both 24-bit color images and 8bit grayscale or color images.

The first step is steganography is that to embed and hiding information is to pass both the secret message and the cover message in to the encoder, inside the encoder, one or several protocols will be implemented to embed the secret information into the cover message.

Secret text message of 1000 character

Encoder Cover image Stego Object

Keywords
Stegnography, Stegoimage, LSB Computer and Network Security insertion,
Secret Text

1. INTRODUCTION
Steganography brings science to the art of hiding information. The purpose of steganography is to convey a message inside of a conduit of misinterpretation such that the existence of the message



References: [1] J. Fridrich and M. Goljan, “Stegnalysis of LSB Embedding in color and Grayscale image”, in preparation for the special issue on security in Magazine IEEE Multimedia. [2] R. J. Anderson and Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications. [3] Curran, K. and Bailey, K. “An evaluation of image based steganography method”.International Journal of Digital Evidence, Fall2003. [4] Jakson, J.T.,Gregg, H., Gunsch, Claypoole, R.L., and Lamont, G.B. “Blind Steganography detection using a computational immune system: A Work in progress”. International Journal of DigitalEvidence. [5] Digital Image Processing using MATLAB by Gonzale Woods. [6] N. Provos and P. Honeyman,”Hide and seek: An introduction to Steganography”.

You May Also Find These Documents Helpful

  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    com worksheet

    • 544 Words
    • 3 Pages

    Explains the process that people use to manage the relationship between concealing and revealing private information…

    • 544 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Final Exam

    • 3599 Words
    • 15 Pages

    b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)…

    • 3599 Words
    • 15 Pages
    Good Essays
  • Better Essays

    Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64–S73.…

    • 1084 Words
    • 5 Pages
    Better Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Computer forensics has become an important of litigation. Computers have become an important part of your lives. This does not exclude criminals who have the technical “know how” of hacking into computer network systems. Electronic evidence has played a role in court but obtaining can be difficult.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Digital Forensics

    • 1977 Words
    • 8 Pages

    Digital forensics is known as evidence being collected for court cases, corporate investigations or personal uses. The collected information is extremely sensitive to alteration and therefore must be handled very carefully. Much of the work to date in digital forensics has focused on data extraction.…

    • 1977 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.…

    • 287 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Again, you are all aware of the procedure. Briefly stated: participants are deceived into taking part in a study on visual perception. They are seated at a desk with others that they believe to be fellow participants but who in reality are in league with the researchers (stooges or confederates). Lines are presented on a screen and participants simply have to say which line (out of 3 possibilities, is the same length as the target line). The stooges get the right answer on the first two trials but then start to make deliberate mistakes.…

    • 492 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Since the term anti-forensics appeared, a number of related methods have been proposed. Peron and Legary proposed a four categories anti-forensics approach saying that a criminal or a suspect could use data wiping, data hiding, manipulating or preventing the creation of evidence. Dr Rogers also proposed four categories that are data hiding, artifact wiping, trail obfuscation and attacks against the process/tools.…

    • 128 Words
    • 1 Page
    Good Essays
  • Good Essays

    The success of the digital investigation is dependent on the availability and maintaining the quality of the data being collected. Because the digital evidence that is collected must be presented in its original form to the court for the proof against the crime. In this project one of the methods of digital forensic investigation is discussed which is memory imaging analysis. The analysis of volatile memory image is chosen over…

    • 646 Words
    • 3 Pages
    Good Essays
  • Better Essays

    How did it work: The enigma machine was a very complicated device. On the inside of the machine there were three rotors that contained all 26 letters of the alphabet. What would happen was that when someone would press a letter on the keyboard, a different letter would pop up on the paper, such as A for E, D for G, F for Z, and so on. These substitutions occur because of the positions of the rotors on the inside of the machine. The rotors are first situated at any random letter in the alphabet and when the button is pressed, the letter that is at the beginning of the rotor is put onto the paper. Then if the same letter were to be pressed again, a different letter would appear because the rotor will have changed position. The fully typed and encoded message would be printed out and mailed to the person it was designated to and then that person would put in that code into their enigma machine and that machine would decipher the encoded message.…

    • 3634 Words
    • 15 Pages
    Better Essays
  • Powerful Essays

    Police is using advance technology in various ways to bring lawbreakers to justice; for instance the scouring of a hard disc of a computer or a searching a broken vase deeply to find the invisible fingerprints and identifications at a crime scene helps identify the suspects of a crime. Not only forensic is limited to laboratory and to searching of such evidences like guns, fingerprints, blood spots, DNA reports, but also, with the help of forensic artistic unidentified face could be reconstructed which helps in the identification of dead body and other prospective. One…

    • 1725 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    2.1.2 Cryptography Facts

    • 665 Words
    • 3 Pages

    A cipher or algorithm is the process or formula used to convert a message or otherwise hide its meaning. Examples of algorithms include:…

    • 665 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Dystopian Novel

    • 1604 Words
    • 7 Pages

    Cited: Akers, Becky. “Whole-Body Imaging: Intrusion Without Security.” Freeman Vol. 60, No. 4 May 2010: n. pag. SIRS Issues Researcher. Web. 5 Dec. 2011. .…

    • 1604 Words
    • 7 Pages
    Powerful Essays