130 likes | 259 Views
Hiding in the LSB of the DCT Coefficients of a jpg file. Group 6 Arthur Garza Lizeth Gonzalez Javier Guzman. The Hiding Algorithm. The Extracting Algorithm. Technical Difficulties. Global Variables Many functions modified the same variables
E N D
Hiding in the LSB of the DCT Coefficients of a jpg file Group 6 Arthur Garza Lizeth Gonzalez Javier Guzman
Technical Difficulties • Global Variables • Many functions modified the same variables • Increasingly difficult to track which methods are associated with the variables. • Little Endian • The program was giving us little Endian. • Visual Studio’s int is Big Endian. • Solution: flip the bits
Future Modifications • Interested in hiding in grayscale images. • 8-bit images instead of 24-bit images • Flexibility with other image formats. • .png, .tif, etc. • Consider using a high-capacity algorithm rather than high security.
Examples Quality 50 (default) Cover File Result Secret Message 4kb 768kb 31.6kb
Examples Quality 70 Result Cover File Secret Message 6.61kb 106kb 768kb
Examples Quality 100 Result Cover File Secret Message 37.6kb 292kb 768kb
Examples Result Cover File Secret Message 58.2kb 14.6kb 176kb
Statistical Analysis • A quality above 50 is unperceivable. • Lower than 50, the image gets darker and moderately pixilated. • Histograms reveal something hidden if a low quality is used.
Bibliography Koduri, Nani. Information Security Through Image Steganography “Using Least Significant Bit Algorithm”(n.d.): 1-63. Scribd. NaniKoduri, 14 Feb. 2011. Web. <http://www.scribd.com/doc/48764974/Steganography-Data-hiding-using-LSB-algorithm>. Li Zhi; Sui Ai Fen; Yang Yi Xian; , "A LSB steganography detection algorithm," Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th IEEE Proceedings on , vol.3, no., pp. 2780- 2783 vol.3, 7-10 Sept. 2003 Muttoo, S.K, and SushilKomar. "Data Hiding in JPEG Images." BVICAM’S International Journal of Information Technology (2008): 13-16. Print. Reddy, Lokeswara, Dr. A. Subramanyam, and Dr.PChenna Reddy. "Implementation of LSB Steganography and Its Evaluation for Various File Formats." Int. J. Advanced Networking and Applications 2.5 (2011): 868-72. Print. Walia, Dr. Ekta, Payal Jain, and Navdeep. "An Analysis of LSB & DCT based Steganography." Global Journal of Computer Science and Technology, vol10.1 (2010): p. 8. Print.