Code Monkey home page Code Monkey logo

yash8005 / image-steganography-analysis-comparison Goto Github PK

View Code? Open in Web Editor NEW
0.0 2.0 0.0 6.39 MB

In the following project we are concentrating on least significant bit of the image and modifying it in spatial domain. We have broken down and concluded about the variations of this algorithm as far as efficiency and hiding capacity of an image. Viability of the algorithm is estimated by client assessments deciding so, all things considered change to the pictures wound up evident. Steganography is the craftsmanship and investigation of imparting in a way which shrouds the presence of the correspondence. As opposed to Cryptography, where the foe is permitted to identify, block and adjust messages without having the capacity to damage certain security premises ensured by the spread message with the inserted cryptosystem. The objective of Steganography is to conceal messages inside different innocuous messages in a way that does not enable any foe to try and identify that there is a second message present.

Java 100.00%
image-steganography bit-plane bit-plane-slicing encrypt encryption-decryption significant-digits least-significant-bit least-significant-bit-substitution

image-steganography-analysis-comparison's Introduction

Image-Stegano

Steganography is the craft of concealing the way that correspondence is occurring, by concealing data in other data. A wide range of transporter document arrangements can be utilized, however advanced pictures are the most prevalent on account of their recurrence on the Internet. For concealing mystery data in pictures, there exists a vast assortment of steganographic methods some are more unpredictable than others and every one of them have separate solid and feeble focuses. Diverse applications have distinctive necessities of the steganography method utilized. For instance, a few applications may require outright intangibility of the mystery data, while others require a bigger mystery message to be covered up.

In the following project we are concentrating on least significant bit of the image and modifying it in spatial domain. We have broken down and concluded about the variations of this algorithm as far as efficiency and hiding capacity of an image. Viability of the algorithm is estimated by client assessments deciding so, all things considered change to the pictures wound up evident.

Application of Image Steganography

Steganography is employed in various useful applications, e.g. secret communication among agencies / people, copyright control of materials, enhancing robustness of image search engines and smart IDs (identity cards) where individuals’ details are embedded in their photographs. Other applications are video-audio synchronization, companies’ safe circulation of secret data, TV broadcasting, TCP/IP packets (for instance a unique ID can be embedded into an image to analyze the network traffic of particular users). In steganography many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.

Scope of the Tool:

Image-Stegano implements following steganographic methods-

  1. 1 bit, 2 bits, 3 bits and 4 bits LSB (hiding as well as extraction)
  2. 24 bits plane (Red, Green, Blue) and 32 bits plane (Red, Green, Blue, Alpha) analysis of image
  3. Bitwise XOR Implementation between LSB and payload
  4. Steganography Based on File Format

This tool also provides following additional options-

  1. Analysis of image using inversion and different colour maps
  2. Grayscale analysis of image
  3. Altering threshold of image (Histogram)
  4. Providing metadata about the image
  5. Chunks analysis of .png images
  6. Extraction of appended Data (.PNG and .BMP files)

Working Demo of Bit Plane Steganography and Colour Map

  1. Choose an image to open: Opening Image
  2. Original Image: Selected Image
  3. 6th bit plane (RGB) All Plane 6th bit
  4. Hidden image in 0th bit plane Hidden Image
  5. Hidden Flag visible when color model is changed Hidden Flag

GUI Screenshots

  1. Hide Image: Hide Image
  2. Altering Threshold: Altering Threshold
  3. Extracting Metadata: Extracting Metadata
  4. Hidden Data in PNG chunk: PNG Check

image-steganography-analysis-comparison's People

Contributors

yash8005 avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.