SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Himanshu	Moliya
Steganoid
A	Tool	for	Image	–	Audio	Steganography
Outline
! Overview
! Seven Phase of this Application
! System Model
! Features
! Core concept
! User interface
! Implementation
! Future Scope
Overview : Steganography
• The word steganography comes from the Greek name
“steganos” (hidden or secret) and “graphy” (writing or drawing)
and literally means hidden writing.
• Steganography uses techniques to communicate
information in a way that is hidden.
• Steganography hides the existence of a message by
transmitting information through various carriers. Its goal is to
prevent the detection of a secret message.
• The most common use of steganography is hiding information
from one file within the information of another file.
Cover medium + Hidden information + Stegokey = Stego-medium
Two layer of security
• This application provides two level of security.
1. Steganography
2. AES encryption
Why this?
• This two layer provide high level of security to
prevent attack on stegano image and stegano
audio.
Seven Phase of this Application
1. Image Steganography : User can hide any file inside
the image. It may be Cipher file / Text file Image file,
PDF file,… etc.
2. Audio Steganography : User can hide cipher data
inside the audio.
3. AES Encryption : This application use advanced
Encryption standards internally.
4. Change format: Data must be consistent after
change format of image (e.g. : BMP to PNG)
5. Data minimization: Store data with in same size
image.
6. Attack testing: AES encryption provide security to
prevent visual attack.
7. Digital water marking: This application also use as
Digital water marking application.
Seven Phase of this Application
System Model :
AES Encryption :
Reference: http://www.lightwaveonline.com/articles/2016/01/the-evolution-and-implementation-of-
encryption-across-layer-1-networks.html
Features : Steganoid
1. Image Steganography
2. Audio Steganography
3. Use AES Encryption (Advanced Encryption Standard)
4. Use Symmetric Cryptography / Symmetric key use
5. Data consistently after changing format
6. Data Minimization
7. Test attack : safe data in visual attack
8. Use as Digital water marking Tool.
Security over visual Attack
What is visual attack?
Visual Attacks are simplest form of
steganalysis that involves examining the
stego-image with the naked eye to identify any
kind of degradation.
Visual
Security over visual Attack
• This application also provide security against visual
attack.
How ?
• If someone detect text from the image and
extract it from the image.
• They can’t read it because of encrypted text
(Need to break AES algorithm to read that
data)(i.e very difficult)
Core concept Implementation
Encoding Schema (LSB) : Image
Visual
Decoding Schema (LSB) : Image
Reverse process of encoding : decode text from each pixel.
Encoding Schema (LSB) : Audio
Decoding Schema (LSB) : Audio
User interface :
User interface Guidelines :
• Status Console :
• Provide information how much data you can hide in that
image / audio ? Also provide details of total pixel / sample.
• Display Cipher text.
• Display success message, processing message.
• Password :
• Password for cipher text is used as 2nd layer of
security.
(i.e. can’t easily breakup because it used as key for
AES algorithm.)
• Show password button use to see password text
for user.
File size comparison
Change format :
Data must be safe after changing file format.
Task:
• I have one Setgo image in BMP format with hidden file
ABC.
• now I change format of file to PNG.
Observation :
• Hidden file must be safe after changing format.
• We can easily extract data from PNG file.
• It’s fail in some cases.
(i.e. BMP to JPG or PNG to JPG because of JPG
generate compressed image)
Format Conversion Possibility
BMP BMP YES
PNG
JPEG NO (Due to lossy
algo)
PNG BMP YES
PNG
JPEG NO (Due to lossy
algo)
JPEG BMP YES
PNG
Data consistency : after converting to other format
Data minimization:
Let’s assume we have one user data and it’s contains:
1. 800x600 image with 8bit depth have at most 600 KB size.
2. And all other data (Name, Address, Father name, birthdate(DOB),
Finger print data, etc…) Let’s assume this all have 424 KB (size of all
Another data)
Now,
Total data of this user = Image + Another data = 600 + 424 = 1024 KB
= 1MB.
One user has 1MB data.
But using this model, we can store this 424 KB taxable
data within 600 KB image.
So, we require only 600KB to store one user information
(i.e. image size) instead of 1MB.
Concept: After performing Steganography on BMP file
New file size is same as Old file size.
Data minimization:
Now, try to think this model with 125 crore users,
Before:
To store 125 crore user information 125x107 MB
required (i.e. 1250 TB).
After Applying this model:
We require only 125crore x 600KB, (i.e. 750TB).
Benefits:
As per seen above example we can say we save 500 TB
data. (500 TB = High cost)
User can hide data more than image size:
Implementation
Successfully implemented…
• Language : C#
• Platform : Tested with all windows version(7, 8, 8.1,
10).
• Tools : Microsoft Visual Studio 2015, Microsoft Paint.
DEMO
Youtube Link:
https://www.youtube.com/watch?v=P9obmA9ws2I
Software link (Download and try):
https://github.com/HimanshuMoliya/Steganoid/blob/
master/Steganoid%20-%201.0.exe
Future Scope and real life Application
In, future we add video steganography feature.
• Use as secret message transmission from one
country to another country.
E.g. Indian embassy Pakistan to India.
• Use in Military, CBI, RAW communication.
• Use in business communication and real life
communication.
• As data minimization tool, As digital watermarking
tool.
Thank	You!
Himanshu Moliya
himanshu.moliya@iet.ahduni.edu.in
School of Engineering and Applied
Science
Ahmedabad University

Weitere ähnliche Inhalte

Was ist angesagt?

Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
Kaushik Chakraborty
 

Was ist angesagt? (20)

Steganography
SteganographySteganography
Steganography
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
C010511420
C010511420C010511420
C010511420
 
analysis on concealing information within non secret data
analysis on concealing information within non secret dataanalysis on concealing information within non secret data
analysis on concealing information within non secret data
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Rsa cryptography &steganography
Rsa cryptography &steganographyRsa cryptography &steganography
Rsa cryptography &steganography
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Secure reversible image data hiding over encrypted domain via key modulation
Secure reversible image data hiding over encrypted domain via key modulationSecure reversible image data hiding over encrypted domain via key modulation
Secure reversible image data hiding over encrypted domain via key modulation
 
Stegnography
StegnographyStegnography
Stegnography
 

Ähnlich wie Steganoid - A tool for steganography

Ähnlich wie Steganoid - A tool for steganography (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Image Based Steganpgraphy
Image Based SteganpgraphyImage Based Steganpgraphy
Image Based Steganpgraphy
 
S4501105108
S4501105108S4501105108
S4501105108
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
C3 s
C3 sC3 s
C3 s
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
1.pdf
1.pdf1.pdf
1.pdf
 
BMP Secrets.PPT
BMP Secrets.PPTBMP Secrets.PPT
BMP Secrets.PPT
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
BLIND RECOVERY OF DATA
BLIND RECOVERY OF DATABLIND RECOVERY OF DATA
BLIND RECOVERY OF DATA
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
A04020107
A04020107A04020107
A04020107
 

Mehr von MrMoliya (6)

ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
 ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video... ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
ANOMALY DETECTION IN INTELLIGENT TRANSPORTATION SYSTEM using real-time video...
 
Load balancing in cloud computing.pdf
Load balancing in cloud computing.pdfLoad balancing in cloud computing.pdf
Load balancing in cloud computing.pdf
 
Ford Fulkerson Algorithm
Ford Fulkerson AlgorithmFord Fulkerson Algorithm
Ford Fulkerson Algorithm
 
Knowledge based Chatbots A mathematical roadmap
Knowledge based Chatbots A mathematical roadmapKnowledge based Chatbots A mathematical roadmap
Knowledge based Chatbots A mathematical roadmap
 
Artificial intelligence and Machine learning Applications
 Artificial intelligence and Machine learning Applications Artificial intelligence and Machine learning Applications
Artificial intelligence and Machine learning Applications
 
Data science : R Basics Harvard University
Data science : R Basics Harvard UniversityData science : R Basics Harvard University
Data science : R Basics Harvard University
 

Kürzlich hochgeladen

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Kürzlich hochgeladen (20)

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Steganoid - A tool for steganography

  • 2. Outline ! Overview ! Seven Phase of this Application ! System Model ! Features ! Core concept ! User interface ! Implementation ! Future Scope
  • 3. Overview : Steganography • The word steganography comes from the Greek name “steganos” (hidden or secret) and “graphy” (writing or drawing) and literally means hidden writing. • Steganography uses techniques to communicate information in a way that is hidden. • Steganography hides the existence of a message by transmitting information through various carriers. Its goal is to prevent the detection of a secret message. • The most common use of steganography is hiding information from one file within the information of another file. Cover medium + Hidden information + Stegokey = Stego-medium
  • 4. Two layer of security • This application provides two level of security. 1. Steganography 2. AES encryption Why this? • This two layer provide high level of security to prevent attack on stegano image and stegano audio.
  • 5. Seven Phase of this Application 1. Image Steganography : User can hide any file inside the image. It may be Cipher file / Text file Image file, PDF file,… etc. 2. Audio Steganography : User can hide cipher data inside the audio. 3. AES Encryption : This application use advanced Encryption standards internally.
  • 6. 4. Change format: Data must be consistent after change format of image (e.g. : BMP to PNG) 5. Data minimization: Store data with in same size image. 6. Attack testing: AES encryption provide security to prevent visual attack. 7. Digital water marking: This application also use as Digital water marking application. Seven Phase of this Application
  • 8. AES Encryption : Reference: http://www.lightwaveonline.com/articles/2016/01/the-evolution-and-implementation-of- encryption-across-layer-1-networks.html
  • 9. Features : Steganoid 1. Image Steganography 2. Audio Steganography 3. Use AES Encryption (Advanced Encryption Standard) 4. Use Symmetric Cryptography / Symmetric key use 5. Data consistently after changing format 6. Data Minimization 7. Test attack : safe data in visual attack 8. Use as Digital water marking Tool.
  • 10. Security over visual Attack What is visual attack? Visual Attacks are simplest form of steganalysis that involves examining the stego-image with the naked eye to identify any kind of degradation.
  • 12. Security over visual Attack • This application also provide security against visual attack. How ? • If someone detect text from the image and extract it from the image. • They can’t read it because of encrypted text (Need to break AES algorithm to read that data)(i.e very difficult)
  • 14. Encoding Schema (LSB) : Image Visual
  • 15. Decoding Schema (LSB) : Image Reverse process of encoding : decode text from each pixel.
  • 19. User interface Guidelines : • Status Console : • Provide information how much data you can hide in that image / audio ? Also provide details of total pixel / sample. • Display Cipher text. • Display success message, processing message. • Password : • Password for cipher text is used as 2nd layer of security. (i.e. can’t easily breakup because it used as key for AES algorithm.) • Show password button use to see password text for user.
  • 21. Change format : Data must be safe after changing file format. Task: • I have one Setgo image in BMP format with hidden file ABC. • now I change format of file to PNG. Observation : • Hidden file must be safe after changing format. • We can easily extract data from PNG file. • It’s fail in some cases. (i.e. BMP to JPG or PNG to JPG because of JPG generate compressed image)
  • 22. Format Conversion Possibility BMP BMP YES PNG JPEG NO (Due to lossy algo) PNG BMP YES PNG JPEG NO (Due to lossy algo) JPEG BMP YES PNG Data consistency : after converting to other format
  • 23. Data minimization: Let’s assume we have one user data and it’s contains: 1. 800x600 image with 8bit depth have at most 600 KB size. 2. And all other data (Name, Address, Father name, birthdate(DOB), Finger print data, etc…) Let’s assume this all have 424 KB (size of all Another data) Now, Total data of this user = Image + Another data = 600 + 424 = 1024 KB = 1MB. One user has 1MB data. But using this model, we can store this 424 KB taxable data within 600 KB image. So, we require only 600KB to store one user information (i.e. image size) instead of 1MB. Concept: After performing Steganography on BMP file New file size is same as Old file size.
  • 24. Data minimization: Now, try to think this model with 125 crore users, Before: To store 125 crore user information 125x107 MB required (i.e. 1250 TB). After Applying this model: We require only 125crore x 600KB, (i.e. 750TB). Benefits: As per seen above example we can say we save 500 TB data. (500 TB = High cost)
  • 25. User can hide data more than image size:
  • 26. Implementation Successfully implemented… • Language : C# • Platform : Tested with all windows version(7, 8, 8.1, 10). • Tools : Microsoft Visual Studio 2015, Microsoft Paint.
  • 27. DEMO Youtube Link: https://www.youtube.com/watch?v=P9obmA9ws2I Software link (Download and try): https://github.com/HimanshuMoliya/Steganoid/blob/ master/Steganoid%20-%201.0.exe
  • 28. Future Scope and real life Application In, future we add video steganography feature. • Use as secret message transmission from one country to another country. E.g. Indian embassy Pakistan to India. • Use in Military, CBI, RAW communication. • Use in business communication and real life communication. • As data minimization tool, As digital watermarking tool.
  • 29. Thank You! Himanshu Moliya himanshu.moliya@iet.ahduni.edu.in School of Engineering and Applied Science Ahmedabad University