Topic > Essay on Steganography - 1901

Steganography is the art and science of communicating in a way that conceals the existence of the communication. Unlike cryptography, where the enemy can detect, intercept, modify messages without being able to violate some security assumptions guaranteed by a cryptographic system, the goal of the steganographic method is that no one can know if something is hidden in the image or not. To hide the secret message in images, there is a wide variety of steganographic techniques, some are more complex than others and all have respective strengths and weaknesses. Different applications have different requirements for the steganography technique used. According to the PSNR value of each image, the stego image has a higher PSNR value. The proposed algorithm is based on the fusion of the idea of ​​random pixel manipulation methods and the least significant matching (LSB) of steganography embedding and extraction method. Index Terms: Steganography, Image Stego, LSB Algorithm, Image steganography is hiding the message within a message without any modification visible to the real world. Digital image is the most common type of media used for steganography. A digital image is composed of a finite number of elements each of which has a particular position and value (grayscale). The processing of these digital images by means of a digital computer is called digital image processing. Images are used for steganography in the following ways. The message in encrypted form or in the original form is embedded as a secret message to be sent in a graphic file. This results in the production of what is called a stego image. Additional secret data may be needed in the cloaking process, such as a stegokey. The stego image...... in the center of the paper...... the message should be retrieved on the output side. It should be designed in such a way that the user is able to understand it easily. Compared with existing systems, the performance of our proposed algorithm should be better, that is, it should be robust, the capacity of the message that could be hidden in the image should be larger, and no one should be able to find any difference between the image stego and the original imageTo implement our algorithm in real words we use the Spartan Edk3 FPGA kit so that the transmission of the stego image is possible and the secrecy of the image remains compact only for the user. To implement this hardware we use Xilinx 10.1 software so we can transfer the programming to the kit and we would be able to run it. Here we use hyperterminals to see the retrieved message and Visual Basic dialog to retrieve the image by reading the pixel values.