Stegnography
Steganography
ABSTRACT:
The least-significant-bit (LSB)-based approach is a popular type of Steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudo random number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions. In this paper, we expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters.
PROJECT OUTPUT VIDEO:
EXISTING SYSTEM:
Least significant bit (LSB) is the simplest form of steganography. LSB is based on inserting data in the least significant bit of pixels, which lead to a slight change on the cover image that is not noticeable to human eye. Since this method can be easily cracked, it is more vulnerable to attacks.
DISADVANTAGES OF EXISTING SYSTEM:
- LSB method can be easily cracked.
- It is more vulnerable to attacks.
- We can possible to hide only one bit.
PROPOSED SYSTEM:
To increase the security and the size of stored data, a new adaptive lsb technique is used. Instead of storing the data in every least significant bit of the pixels, this technique tries to use more than one bit in a pixel in such a way that this change will not affect the visual appearance of the host image. It uses the side information of neighboring pixels to estimate the number of bit which can be carried in the pixels of the host-image to hide the secret data.
ADVANTAGES OF PROPOSED SYSTEM:
- User cannot find the original data.
- It is not easily cracked.
- To increase the Security.
- To increase the size of stored data.
- We can hide more than one bit.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
- System : Pentium i3 Processor
- Hard Disk : 500 GB..
- Monitor : 15’’ LED
- Input Devices : Keyboard, Mouse
- RAM : 4 GB.
SOFTWARE REQUIREMENTS:
- Operating system : Windows 10/11.
- Coding Language : C#.net.
- IDE Tool : VISUAL STUDIO.
- Database : SQL SERVER 2005.