You are on page 1of 7

INTRODUCTION MATLAB is a numerical computing environment and programming language. Created by The MathWorks,.

Matlab is a commercial "Matrix Laboratory" package which operates as an interactive programming environment. Matlab (short for MATrix LABoratory) is a language for technical computing,provides a single platform for computation, visualization, programming and software development. All problems and solutions in Matlab are expressed in notation used in linear algebra and essentially involve operations using matrices and vectors MATLAB allows easy matrix manipulation, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs in other languages. Matlab is used to solve problems in
o o o o o

Circuits Communication systems Digital signal processing Control systems Probability and statistics

In addition, you can use Matlab to build Graphical User Interfaces (GUIs) so that you can develop user-friendly custom software. Although it is numeric only, an optional toolbox uses the MuPAD symbolic engine, allowing access to computer algebra capabilities. An additional package, Simulink, adds graphical multidomain simulation and Model-Based Design for dynamic and embedded systems.The Matlab software environment has a core module (called Matlab) and associated with that are a set of "Toolboxes" that perform specialized computations

MATLAB is available for a broad diversity of environments: MS-Windows, Linux, Sun Solaris, Apollo, VAX, HP workstations, Gould, Apple Macintosh, and several parallel machines. The range of functionality, relative performance, rate of updates, etc., may vary a little for the different platforms but, in general, the support and documentation are maintained at a very good level and in an user-friendly interactive form. 1. Numerical accuracy :Matlab is an interpreted language for numerical computation. It allows one to perform numerical calculations, and visualize the results without the need for complicated and time consuming programming. Matlab allows its users to accurately solve problems, produce graphics easily and produce code effeciently.It allows one to ensure maximal numerical precision in the final result. 2. Recording of the processing used : MATLAB is a general purpose programming language. When it is used to process images one generally writes function files, or script files to perform the operations. These files form a formal record of the processing used and ensures that the final results can be tested and replicated by others should the need arise.

Steganography Steganography is the art of hiding something in plain sight. This something could be a signal, a sound file,A picture, or an image or any other object that may be useful to hide data.An image is nothing more than strings and strings of bytes, each byte representing a different color. The last few bits in a color byte, however, do not hold as much significance as the first few. This is to say that two bytes that only differ in the last few bits can represent two colors that are virtually indistinguishable to the human eye. For example, 00100110 and 00100111 can be two different shades of red, but since it is only the last bit that differs between the two, it is impossible to see the color difference. LSB steganography, then, alters these last bits by hiding a message within them. One way of doing this is as follows. Say I wished to hide the first letter of my first name in a small section of an image. This letter is ?I,? and the ASCII for I is 01001001. As seen from the illustration, the last bit of every byte is replaced with the corresponding bit from the letter I. The bits that have been altered are underlined.The new image now contains the desired text of the ?I? without degrading the quality of the image since only the least significant bits were altered

Project Name: Stegnanograhy Using Mat Lab {image Cryptography } This project includes processing of image Data hiding, it means you are now able to hide your data in pixels of image. As it is known to all of persons that has already gone through some of basic image processing that your image has its color part as a combination of Red, Green and Blue values and also your brightness factor is related to it. We can use any of these available values, as in our case we gone through the blue part, we hide our data in byte values of pixels values for color, As by using imread function you can get any image in matrix form and that matrix will contain three different arrays, First array will be of Red, second of Green and third of Blue respectively. So to save our data like if you have to save Hello in an image you will firstly read it in matrix form and than read last or you can say third matrix and after reading third matrix its dimensions will depends on the image size, as per according to images height and width The matrix will contains values i.e. result of imread like shown below { 122, 122, 144,123,205,55,35,88,22,225,125,223,}, for red { 142, 182, 104,193,105,255,035,188,22,25,15,33,}, for green { 22, 12, 44,13,05,54,135,188,122,25,125,223,}, for blue Use blue one { 22, 12, 44,13,05,54,135,188,122,25,125,223,}, for blue Hello = {72 101 108 108 111} So new value for blue one is { 5,72, 101, 108,108,111,54,188,122,25,125,223,}, for blue Stego key = 5

Stego key is useful for decoding time. In our case it tells us how many values has to read during decoding time.

For all above process we divide it I to steps and named it as hider and decoder. Hider file is a GUI which contain a user friendly environment for the user to hide its data in image which should be select by the user too by load image button than there is Pre Analysis which gives results as how many bytes can be hide in selected image, After that you have to load text file by pressing load text button, this will load text file and after pressing hide button this will add text file to your image, Right side status of your adding process will be shown to you. Status will show processing, Not Done or Done. After getting Done your hider can exit, now copy your image file with named as code_image.png or bys selecting path of your code_image by browser after pressing load image same as you did in hider .

Main Hider Figure

STEGANOGRAPHIC METHODS The following formula provides a very generic description of the pieces of the steganographic process: cover_medium + hidden_data + stego_key = stego_medium In this context, the cover_medium is the file in which we will hide the hidden_data, which may also be encrypted using the stego_key. The resultant file is the stego_medium (which will, of course. be the same type of file as the cover_medium). The cover_medium (and, thus, the stego_medium) are typically image or audio files. In this article, I will focus on image files and will, therefore, refer to the cover_image and stego_image. Before discussing how information is hidden in an image file, it is worth a fast review of how images are stored in the first place. An image file is merely a binary file containing a binary

representation of the color or light intensity of each picture element (pixel) comprising the image. Images typically use either 8-bit or 24-bit color. When using 8-bit color, there is a definition of up to 256 colors forming a palette for this image, each color denoted by an 8-bit value. A 24-bit color scheme, as the term suggests, uses 24 bits per pixel and provides a much better set of colors. In this case, each pix is represented by three bytes, each byte representing the intensity of the three primary colors red, green, and blue (RGB), respectively. The Hypertext Markup Language (HTML) format for indicating colors in a Web page often uses a 24-bit format employing six hexadecimal digits, each pair representing the amount of red, blue, and green, respectively. The color orange, for example, would be displayed with red set to 100% (decimal 255, hex FF), green set to 50% (decimal 127, hex 7F), and no blue (0), so we would use "#FF7F00" in the HTML code. The size of an image file, then, is directly related to the number of pixels and the granularity of the color definition. A typical 640x480 pix image using a palette of 256 colors would require a file about 307 KB in size (640 480 bytes), whereas a 1024x768 pix high-resolution 24-bit color image would result in a 2.36 MB file (1024 768 3 bytes). To avoid sending files of this enormous size, a number of compression schemes have been developed over time, notably Bitmap (BMP), Graphic Interchange Format (GIF), and Joint Photographic Experts Group (JPEG) file types. Not all are equally suited to steganography, however. GIF and 8-bit BMP files employ what is known as lossless compression, a scheme that allows the software to exactly reconstruct the original image. JPEG, on the other hand, uses lossy compression, which means that the expanded image is very nearly the same as the original but not an exact duplicate. While both methods allow computers to save storage space, lossless compression is much better suited to applications where the integrity of the original information must be maintained, such as steganography. While JPEG can be used for stego applications, it is more common to embed data in GIF or BMP files. The simplest approach to hiding data within an image file is called least significant bit (LSB) insertion. In this method, we can take the binary representation of the hidden_data and overwrite the LSB of each byte within the cover_image. If we are using 24-bit color, the amount of change will be minimal and indiscernible to the human eye. As an example, suppose that we have three adjacent pixels (nine bytes) with the following RGB encoding:
10010101 10010110 10011111 00001101 00001111 00010000 11001001 11001010 11001011

Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually compressed prior to being hidden): 101101101. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed):

10010101 10010111 10011111

00001100 00001110 00010000

11001001 11001011 11001011

Note that we have successfully hidden 9 bits but at a cost of only changing 4, or roughly 50%, of the LSBs. This description is meant only as a high-level overview. Similar methods can be applied to 8-bit color but the changes, as the reader might imagine, are more dramatic. Gray-scale images, too, are very useful for steganographic purposes. One potential problem with any of these methods is that they can be found by an adversary who is looking. In addition, there are other methods besides LSB insertion with which to insert hidden information. Without going into any detail, it is worth mentioning steganalysis, the art of detecting and breaking steganography. One form of this analysis is to examine the color palette of a graphical image. In most images, there will be a unique binary encoding of each individual color. If the image contains hidden data, however, many colors in the palette will have duplicate binary encodings since, for all practical purposes, we can't count the LSB. If the analysis of the color palette of a given file yields many duplicates, we might safely conclude that the file has hidden information. But what files would you analyze? Suppose I decide to post a hidden message by hiding it in an image file that I post at an auction site on the Internet. The item I am auctioning is real so a lot of people may access the site and download the file; only a few people know that the image has special information that only they can read. And we haven't even discussed hidden data inside audio files! Indeed, the quantity of potential cover files makes steganal

BLOCK DIAGRAM

Encoding

Path

Browser

Image

Text

Process

Exit

Png

Image

Browse

Process

Exit

Text

You might also like