Professional Documents
Culture Documents
ENGINEERING
HOSUR
PAPER PRESENTATION
ON
REPLCEMENT TECHNIQUE
Presented By….
Ilakkiya.T(solai_lucky@yahoo.co.i
n)
mathangi.p(jeykrish.mathu@gmail.com)
SYNOPSIS
In this age of universal electronic connectivity, of viruses and hackers,
of electronic eavesdropping and electronic fraud, there is indeed no time at
which security of information does not matter. The explosive growth of
computer systems and their interconnections via networks has increased the
dependency on the information stored and communication using these
systems. Thus the field of cryptography has got more attention nowadays.
More and more complex techniques for encrypting the information are
proposed every now and then. Some advanced encryption algorithms like
RSA, DES, AES etc. which are extremely hard to crack have been developed.
But, as usual, when a small step is made to improve the security, more work
is done in the opposite direction by the hackers to break it. Thus they are
able to attack most of these algorithms and that too, successfully. Even
complex algorithms like RSA are no exception to this.
STEGANOGRAPHY DEFINITION :
STEGANOGRAPHY IN IMAGES
Technique’ in which the original bits are masked with data bits and the
‘Filtering Technique’ in which certain transformations are done on the
image to hide data. The last two techniques hide data by marking an image
in a manner similar to paper watermarks But, there are some drawbacks with
these methods which hinders their use.
THE ALGORITHM
Encoding
The Algorithm used for encoding in this technique can be described with the
following steps:
search the surrounding pixels and find a pixel value closer to all of
them
replace the current pixel and the reference pixel with this value
Decoding
FLOW DIAGRAM
Encoding Decoding
IMPLEMENTATION
With the algorithm described in brief, let us describe the pixel
replacement technique in detail. First, we shall see how the original message
and the password are hidden into the image and then we’ll discuss how to
retrieve message for the authorized person who knows the correct password.
First, the original message and the password are got from the user.
Then, they are encrypted using any of the encryption algorithms like RSA,
DES etc.This encryption step is an additional safety feature added to the
technique to ensure maximum safety.Then, this encrypted message is fed as
the input to the next step.
For example, the position of the character ‘R’ can be chosen as:
Once a position is chosen, the values of all the pixels surrounding the
pixel in that position are found. Since this position is usually not near the
edge of the image, there will be 8 pixels surrounding it. A pixel value, i.e., a
colour, is chosen so that it does not differ much from those of the 8 pixels.
This is the most difficult step in the whole process. The value will differ only
by a small value. Such a small change in the colour will be indiscernible to
the users.
Now, with the colour to be replaced being found, it’s time to replace
the pixels with the new colour. A position near to the left side of the row is
fixed as the reference position for the odd numbered character i.e., the 1st,
3rd ,5th character and so on. Similarly, for the even numbered characters, a
position close to the right side of the row is selected as the reference
position. These reference positions are the same for all the characters. When
the reference position is chosen, the pixel in that position is replaced
with the new colour . Then, the pixel in the already found position for the
character ( in our eg., this is 32) is also replaced with the new colour.
Example
Let us consider a sample image whose pixels are replaced in this way.
This can be explained by the following figure:
For the sake of explanation, the pixels are shown clearly in this figure. But, in
real situations, these will not be visible at all because the colour chosen for
replacing is so close to the original colour that cannot be found by the human
eye but still can be found out by the computer.The above mentioned steps of
finding a suitable colour and replacing the pixels is continued for all the
characters in the encrypted message.
Setting a Threshold
The same steps of chosing the colour, replacing the pixels and setting
a threshold are repeated for hiding the password but the only difference is
that the image is scanned row – wise from the last row instead of from the
first row.
32 + 50 = 82,
Similarly, the other characters are found till the threshold is reached and all
of them are concatenated to get the original password. Now, the given
password and the original are checked and if they match, then further
processes are done, otherwise, an error message is diaplayed.
If the password matches, then the image is scanned from the top and
the starting row from where the data hiding started is reached. The same
steps of finding the reference pixel and the position of the other pixel are
repeated again till the threshold . Then, all the characters are joined and the
original message is displayed.
PRACTICAL IMPLEMENTATION
Here the results are promising. Let us see one of the results here which uses
a BMP image
As seen from this example, there are no big changes visible between
the actual image and the one in which data is hidden. Thus, our proposed
technique can be an useful one for hiding messages in images.
Wrapping Up ..
REFERENCES