blog




  • Essay / Steganography Essay - 1901

    Steganography is the art and science of communicating in a way that hides the existence of the communication. Unlike cryptography, where the enemy is authorized to detect, intercept, modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of the steganographic method is that no one can know if something is hidden in the message. image or not. To hide secret messages in images, there are a wide variety of steganographic techniques, some more complex than others and all have respective strengths and weaknesses. Different applications have different requirements for the steganography technique used. Based on the PSNR value of each image, the stego image has a higher PSNR value. The proposed algorithm is based on the fusion between the idea of ​​random pixel manipulation methods and least significance matching (LSB) of steganography embedding and extraction method. Index Terms: Steganography, Image Stego, LSB Algorithm, Image steganography involves hiding the message within a message without any visible modification from the real world. Digital image is the most commonly used media type for steganography. A digital image is made up of a finite number of elements, each of which has a particular location and value (gray scale). The processing of these digital images using a digital computer is called digital image processing. Images are used for steganography in the following ways. The message in encrypted form or in original form is embedded as a secret message to be sent in a graphic file. This results in the production of what is called a stego-image. Additional secret data may be required in the masking process, for example a stego key. The stego-imag...... middle of paper ...... message should be retrieved from the output side. It should be designed in such a way that the user can understand it easily. Compared to existing systems, the performance of the proposed algorithm should be better, that is, it should be robust, the capacity of message that can be hidden in the image should be larger, and no one should be able to find a difference between the stego image and the original image. imageTo implement our algorithm in real word, we use the Spartan Edk3 FPGA kit so that the transmission of the stegoimage is possible and the secret of the image remains compact for the user only. To implement this hardware we use Xilinx 10.1 software so we can transfer the programming to the kit and we could run it. Here we use hyperterminals to see the retrieved message and a Visual Basic dialog to retrieve the image by reading the pixel values..