SlideShare a Scribd company logo
Guided by:
V. Sree lakshmi
(Snr Assistant Professor)
Submitted By :
N.S.Srimadhur(10B81A04A0)
D.Sri Hari Priya(10B81A0499)
D.Vishwa Teja(10B81A04D8)
 Steganography is the art of hiding the existence of data in
another transmission medium to achieve secret communication.
It does not replace cryptography but rather boosts the security
using its obscurity features.
 The word steganography is of Greek origin and means
"concealed writing" from the Greek words steganos meaning
"covered or protected", and graphein meaning "writing".
 “Steganography means hiding one piece of
data within another”.
 Steganography method used in this paper is based on
biometrics.
 Here secret data is embedded within skin region of image
that will provide an excellent secure location for data hiding.
 For this skin tone detection is performed using HSV (Hue,
Saturation and Value) color space.
 Additionally secret data embedding is performed using
frequency domain approach - DWT (Discrete Wavelet
Transform).
DWT based approach for steganography using biometrics
 Carrier or Cover File - A Original message or a file in
which hidden information will be stored inside of it .
 Stego-Medium - The medium in which the information is
hidden.
 Embedded or Payload - The information which is to be
hidden or concealed.
 Steganalysis - The process of detecting hidden information
inside a file.
Carrier Image Image to be embedded
DWT based approach for steganography using biometrics
 Proposed method introduces a new method of embedding secret
data within skin as it is not that much sensitive to HVS (Human
Visual System).
 This takes advantage of Biometrics features such as skin tone,
instead of embedding data anywhere in image, data will be
embedded in selected regions.
DWT based approach for steganography using biometrics
Types of morphological operations:
 Dilation
 Erosion
 Opening
 Closing
The structuring element taken here is disk structure of radius
r= 3
Neighborhood:
1 1 1 1 1
1 1 1 1 1
1 1 1 1 1
1 1 1 1 1
1 1 1 1 1
 It is typically applied to binary images,
but there are versions that work on gray
scale images.
 The erosion of A by the structuring
element B is defined by:
 The erosion of A by B is the set of all
displacements, z, such that and A if atleast
1 element coincides with background
value then that value sets to background
pixel.
Common Names: Erode,
Shrink, Reduce
 It is typically applied to binary images,
but there are versions that work on gray
scale images.
 The dilation of A by the structuring
element B is defined by:
 The dilation of A by B is the set of all
displacements, z, such that and A overlap
by at least 1 element Thus, Set B is
referred to as the structuring element in
dilation.
Common Names:
Dilate, Grow,
Expand
Opening:
smooth the contour of an object, break narrow isthmuses,
and eliminate thin protrusions.
The opening A by B is the erosion of A by B, followed by a
dilation of the result by B
Closing:
smooth sections of contours but it generally fuses narrow
breaks and long thing gulfs, eliminates small holes, and fills
gaps in the contour.
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
DWT splits component into numerous frequency bands called
sub bands known as
 LL – Horizontally and vertically low pass
 LH – Horizontally low pass and vertically high pass
 HL - Horizontally high pass and vertically low pass
 HH - Horizontally and vertically high pass.
 we hide secret message in other three parts without making
any alteration in LL sub band.
DWT used in this work is Haar-DWT, the simplest DWT.
Cropped
image
Perfor
m DWT
Embeddi
ng in B-
plane
Secret
logo
Perform
IDWT
Croppe
d stego
image
Merging
with
original
image
Stego
image
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
Load
stego
image
Perform
skin
detectio
n
Crop
the
image
Perform
DWT
retrievalSecret data
DWT based approach for steganography using biometrics
 The phrase peak signal-to-noise ratio, often abbreviated
PSNR, is an engineering term for the ratio between the
maximum possible power of a signal and the power of
corrupting noise that affects the fidelity of its representation.
The health care, and especially medical imaging systems,
may very much benefit from information hiding techniques.
It is used for DIGITAL SIGNATURE AUTHENTICATION
to prevent malicious tampering of private and confidential
documents. These documents include company memos,
Emails and letters.
It can also be implemented for identity proofs as personal
details can be embedded in face.
In this paper biometric steganography is presented that uses
skin region of images in DWT domain for embedding secret
data. By embedding data in only certain region (here skin
region) and not in whole image security is enhanced. Also
image cropping concept introduced, maintains security at
respectable level since no one can extract message without
having value of cropped region.
Any queries ?
DWT based approach for steganography using biometrics

More Related Content

PPTX
Skin tone based steganography
Girish Ram M
 
PPTX
Steganography in images
Aishwarya Korde
 
PPTX
Steganography and its techniques
Fatema Panvelwala
 
PPT
Steganography
Prashant D Superstud
 
PPTX
Cryptography and steganography
Jishnu Grandhi
 
PPTX
Image steganography and cryptography
Avinash Mishra
 
PPT
Info hiding
Muna AlKhayat
 
PPTX
STEGANOGRAPHY PRESENTATION SLIDES
Lovely Mnadal
 
Skin tone based steganography
Girish Ram M
 
Steganography in images
Aishwarya Korde
 
Steganography and its techniques
Fatema Panvelwala
 
Steganography
Prashant D Superstud
 
Cryptography and steganography
Jishnu Grandhi
 
Image steganography and cryptography
Avinash Mishra
 
Info hiding
Muna AlKhayat
 
STEGANOGRAPHY PRESENTATION SLIDES
Lovely Mnadal
 

What's hot (20)

PPTX
Steganography
Kirthan S Holla
 
PPTX
Steganography
Uttam Jain
 
PPTX
Technical seminar ppt
Tejas_srinivas
 
PPTX
Image Steganography
Ankit Gupta
 
PPTX
Image steganography
vaidya_sanyu
 
PPTX
Steganography
Daksh Verma
 
PPT
Steganography
Deepak Raj
 
PDF
A Survey of Image Steganography
Editor IJCATR
 
PPTX
Art of Steganography
Abdelhamid Limami
 
PPTX
Presentation i
nidhip216
 
PPT
Steganography
Prabakara Pandian
 
PDF
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Praneeta Dehare
 
DOCX
Audio Steganography synopsis
kartikeya upadhyay
 
PPTX
Steganography with RSA Algorithm
Ritu Agarwal
 
PPTX
Steganography
Jitendra Singh Deshwal
 
PPTX
Steganography
Saugata Palit
 
PDF
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
PPTX
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
PPTX
Modifications in lsb based steganography
Aslesha Niki
 
Steganography
Kirthan S Holla
 
Steganography
Uttam Jain
 
Technical seminar ppt
Tejas_srinivas
 
Image Steganography
Ankit Gupta
 
Image steganography
vaidya_sanyu
 
Steganography
Daksh Verma
 
Steganography
Deepak Raj
 
A Survey of Image Steganography
Editor IJCATR
 
Art of Steganography
Abdelhamid Limami
 
Presentation i
nidhip216
 
Steganography
Prabakara Pandian
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Praneeta Dehare
 
Audio Steganography synopsis
kartikeya upadhyay
 
Steganography with RSA Algorithm
Ritu Agarwal
 
Steganography
Jitendra Singh Deshwal
 
Steganography
Saugata Palit
 
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
Modifications in lsb based steganography
Aslesha Niki
 
Ad

Viewers also liked (20)

PPTX
discrete wavelet transform
piyush_11
 
PDF
528 439-449
idescitation
 
PPTX
Decoding QR codes
Maria Vassilopoulou
 
PPT
Wavelet
aiQUANT
 
PPTX
About Steganography
Sudhansh Gupta
 
PDF
2 classical cryptosystems
dmc5abdulla
 
PPT
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
n|u - The Open Security Community
 
PDF
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
 
PPTX
Steganography
Sonam M
 
PDF
Wavelet transform and its applications in data analysis and signal and image ...
Sourjya Dutta
 
PPTX
Wavelet
Amr Nasr
 
PPTX
Introduction to Wavelet Transform with Applications to DSP
Hicham Berkouk
 
PPT
Caesar cipher
Hossain Md Shakhawat
 
PPTX
Introduction to wavelet transform
Raj Endiran
 
PDF
Computer Security Lecture 2: Classical Encryption Techniques 1
Mohamed Loey
 
KEY
QR code
Noah Kim
 
PPTX
QR Codes PowerPoint Presentation
Zachary Moore
 
PPTX
Cryptography.ppt
kusum sharma
 
PPTX
PPT steganography
parvez Sharaf
 
PPTX
Wavelet based image compression technique
Priyanka Pachori
 
discrete wavelet transform
piyush_11
 
528 439-449
idescitation
 
Decoding QR codes
Maria Vassilopoulou
 
Wavelet
aiQUANT
 
About Steganography
Sudhansh Gupta
 
2 classical cryptosystems
dmc5abdulla
 
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
n|u - The Open Security Community
 
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY
acijjournal
 
Steganography
Sonam M
 
Wavelet transform and its applications in data analysis and signal and image ...
Sourjya Dutta
 
Wavelet
Amr Nasr
 
Introduction to Wavelet Transform with Applications to DSP
Hicham Berkouk
 
Caesar cipher
Hossain Md Shakhawat
 
Introduction to wavelet transform
Raj Endiran
 
Computer Security Lecture 2: Classical Encryption Techniques 1
Mohamed Loey
 
QR code
Noah Kim
 
QR Codes PowerPoint Presentation
Zachary Moore
 
Cryptography.ppt
kusum sharma
 
PPT steganography
parvez Sharaf
 
Wavelet based image compression technique
Priyanka Pachori
 
Ad

Similar to DWT based approach for steganography using biometrics (20)

PDF
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
AM Publications
 
PDF
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
PDF
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
IRJET Journal
 
PDF
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
International Journal of Technical Research & Application
 
PDF
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
TELKOMNIKA JOURNAL
 
PDF
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
PDF
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
PDF
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
PDF
98462-234458-1-PB
Dinesh Kannan
 
PDF
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Editor IJMTER
 
PDF
D010312230
IOSR Journals
 
PPSX
Steganography wavelet
Santu Chall
 
PPTX
Enhancing image based data hiding method using reduced difference expansion a...
MAURICE NTAHOBARI
 
PPTX
Visual Cryptography for biometric privacy
waseem ahmad
 
DOCX
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
PDF
High PSNR Based Image Steganography
rahulmonikasharma
 
PDF
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
PDF
Hybrid DCT-DWT Digital Image Steganography
IRJET Journal
 
PDF
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
PDF
Ijetcas14 527
Iasir Journals
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
AM Publications
 
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
IRJET Journal
 
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
International Journal of Technical Research & Application
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
TELKOMNIKA JOURNAL
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
ijcisjournal
 
98462-234458-1-PB
Dinesh Kannan
 
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Editor IJMTER
 
D010312230
IOSR Journals
 
Steganography wavelet
Santu Chall
 
Enhancing image based data hiding method using reduced difference expansion a...
MAURICE NTAHOBARI
 
Visual Cryptography for biometric privacy
waseem ahmad
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
High PSNR Based Image Steganography
rahulmonikasharma
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
CSCJournals
 
Hybrid DCT-DWT Digital Image Steganography
IRJET Journal
 
Significant Data Hiding through Discrete Wavelet Transformation Approach
Eswar Publications
 
Ijetcas14 527
Iasir Journals
 

Recently uploaded (20)

PDF
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
Review of Related Literature & Studies.pdf
Thelma Villaflores
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
How to Manage Leads in Odoo 18 CRM - Odoo Slides
Celine George
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Virus sequence retrieval from NCBI database
yamunaK13
 
CDH. pptx
AneetaSharma15
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 

DWT based approach for steganography using biometrics

  • 1. Guided by: V. Sree lakshmi (Snr Assistant Professor) Submitted By : N.S.Srimadhur(10B81A04A0) D.Sri Hari Priya(10B81A0499) D.Vishwa Teja(10B81A04D8)
  • 2.  Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features.  The word steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphein meaning "writing".  “Steganography means hiding one piece of data within another”.
  • 3.  Steganography method used in this paper is based on biometrics.  Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding.  For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space.  Additionally secret data embedding is performed using frequency domain approach - DWT (Discrete Wavelet Transform).
  • 5.  Carrier or Cover File - A Original message or a file in which hidden information will be stored inside of it .  Stego-Medium - The medium in which the information is hidden.  Embedded or Payload - The information which is to be hidden or concealed.  Steganalysis - The process of detecting hidden information inside a file.
  • 6. Carrier Image Image to be embedded
  • 8.  Proposed method introduces a new method of embedding secret data within skin as it is not that much sensitive to HVS (Human Visual System).  This takes advantage of Biometrics features such as skin tone, instead of embedding data anywhere in image, data will be embedded in selected regions.
  • 10. Types of morphological operations:  Dilation  Erosion  Opening  Closing
  • 11. The structuring element taken here is disk structure of radius r= 3 Neighborhood: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
  • 12.  It is typically applied to binary images, but there are versions that work on gray scale images.  The erosion of A by the structuring element B is defined by:  The erosion of A by B is the set of all displacements, z, such that and A if atleast 1 element coincides with background value then that value sets to background pixel. Common Names: Erode, Shrink, Reduce
  • 13.  It is typically applied to binary images, but there are versions that work on gray scale images.  The dilation of A by the structuring element B is defined by:  The dilation of A by B is the set of all displacements, z, such that and A overlap by at least 1 element Thus, Set B is referred to as the structuring element in dilation. Common Names: Dilate, Grow, Expand
  • 14. Opening: smooth the contour of an object, break narrow isthmuses, and eliminate thin protrusions. The opening A by B is the erosion of A by B, followed by a dilation of the result by B Closing: smooth sections of contours but it generally fuses narrow breaks and long thing gulfs, eliminates small holes, and fills gaps in the contour.
  • 20. DWT splits component into numerous frequency bands called sub bands known as  LL – Horizontally and vertically low pass  LH – Horizontally low pass and vertically high pass  HL - Horizontally high pass and vertically low pass  HH - Horizontally and vertically high pass.  we hide secret message in other three parts without making any alteration in LL sub band. DWT used in this work is Haar-DWT, the simplest DWT.
  • 21. Cropped image Perfor m DWT Embeddi ng in B- plane Secret logo Perform IDWT Croppe d stego image Merging with original image Stego image
  • 26.  The phrase peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation.
  • 27. The health care, and especially medical imaging systems, may very much benefit from information hiding techniques. It is used for DIGITAL SIGNATURE AUTHENTICATION to prevent malicious tampering of private and confidential documents. These documents include company memos, Emails and letters. It can also be implemented for identity proofs as personal details can be embedded in face.
  • 28. In this paper biometric steganography is presented that uses skin region of images in DWT domain for embedding secret data. By embedding data in only certain region (here skin region) and not in whole image security is enhanced. Also image cropping concept introduced, maintains security at respectable level since no one can extract message without having value of cropped region.