Unit 2 Steganography 2.0
Unit 2 Steganography 2.0
Unit 2 Steganography 2.0
Steganography
Tripti Misra
Steganography
• It is often combined with cryptography in communication.
• Steganography is still often used for uniqueness and validation purposes, such as
storing data without it being obvious the data is stored there.
• For example, almost all modern laser printers now print a series of barely visible
yellow dots on every page printed. These dots, when interpreted properly, contain a
variety of meta data about the print job, such as the date and time, printer model,
and serial numbers.
• Distortion Techniques: Distortion techniques need knowledge of the original cover image
during the decoding process where the decoder functions to check for differences
between the original cover image and the distorted cover image in order to restore the
secret message. The encoder adds a sequence of changes to the cover image. So,
information is described as being stored by signal distortion.
Least Significant Bit Algorithm
• The most common and popular method of modern day steganography is to make use
of LSB of picture’s pixel information.
• This technique works best when the file is longer than the message file and if image
is grayscale.
• When applying LSB techniques to each byte of a 24 bit image, three bits can be
encoded into each pixel.
LSB Algorithm
• If the LSB of the pixel value of cover image C(i,j) is equal to the message bit SM of secret
massage to be embedded, C(i,j) remain unchanged; if not, set the LSB of C(i, j) to SM.