If you were implementing, testing, and debugging this code, breaking it into small pieces like this would be helpful. 10 minute read Published: 1 Feb, 2018. Steganography Toolkit. * Decode secret messages out of encoded images * Take pictures with camera, or pick them using a gallery app * Transmit images This app was developed as a first semester project of the Software Development bachelor, at the Copenhagen School of Design and Technology. A simple flowchart of Printable Steganography in action is as follow: 1 Prepare the image file to embed the data. Definition of STEGANOGRAPHY. The app will hide your file inside the picture of your choice in easy steps. Transform domain i. Steganography means the covered or hidden writing. This is not true for the JPEG format. Publisher's description File details Check SHA1 and MD5 for confirmation. Steganography challenge - The Book of Secrets. Pixel positions of edges in conjunction with Chaotic Cat Mapping [10] are used for the steganography technique. In this article, we will discuss three methods through which you can encrypt your confidential files into images, both through the Ubuntu UI and the command line. that worked motivation for our research. Check scanners and image capture solutions for for remote deposit capture, teller capture, and branch capture banking environments. This project is a Docker image useful for solving Steganography challenges as those you can find at CTF platforms like hackthebox. It's important to check your image resolution before you print to ensure your project looks as amazing on paper as it does on your computer screen. the recipient will know to check it for the secret message. Since the arrival of digital files for image and sound, steganography has known an enormous revival. Steganography: The art of hiding stuff in stuff so others don't find your stuff. For more information see arXiv. In gray level images, each pixel is described by one number corresponding to its brightness. We've compiled a pretty useful list of multi functional steganography tools that will help you easily transmit your messages in a safe and secure way. In the context of CTFs steganography usually involves finding the hints or flags that have been hidden with steganography. Here we have used an image to hide some message in side it. Publisher's description File details Check SHA1 and MD5 for confirmation. You can even order a CD containing the software on the website!. Introduction to Steganography. Steganography can be defined as the technique of hiding secret data within an ordinary, non-secret, file or message to avoid detection. Project 4: Cryptography and Steganography CSCE 315: Programming Studio Spring 2015 ourY team has been hired by Munchkin Incorporated (Munchkin) to design and develop a set of infor-mation assurance tools. Step 5: Decode the image- to extract data from the image. A texture synthesis process is of. This paper focuses on the adaptive steganography for JPEG images resisting JPEG compression and detection. Think back at all of those pictures you're in and are connected with. Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Porn and much porn. Watermarking is technically a form of steganography as a "message" (the watermark) is embedded in the medium (the image) to convey information (whatever the watermark conveys, maybe ownership or legal information). Steganography (/ ˌ s t ɛ ɡ ə ˈ n ɒ ɡ r ə f i / STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. Steganography challenge - The Book of Secrets. And in this particular case, that image is the one on the banner ad. LSB and MSB in BMP ii. View Homework Help - Assignment2 (2). Image guided cryoablation of cancer destroys tumor tissue and can activate tumor-specific T cells by increasing the presentation of tumor antigens and causing the release of “Danger signals” to stimulate the immune system. You will be prompted to set a passphrase. No of LSB bit you have to subsitute is 1 to 4. This logic forms the basis for steganography, itself an ancient historical practice of concealing information within images. There are multiple methods of steganography, ranging from simply embedding direct code within a file following the end-of-image file marker all the way to altering the image's pixel values in a. Steganography is the art. Detecting PNG Steganography First of all- I don't have any experience at the field of steganography, so if I make mistake (wrong terms / assumptions, anything else. White text on a black background works well, and it helps to have a small image without too much empty space. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography IMAGE STEGANOGRAPHY 10. I have recently finished a project on stenography on P3 images and just wanted some advice if there was any improvements I could make on my code. Steganalysis is the reasonable method to detect whether the transmitted media content contains secret messages (e. I have been asked by a few folks what tools I use for CTF’s. Linguistic Steganography. On the outside the JPG image is a normal JPG image; it even opens and is viewable like a JPG. Due to their widespread use and. This attack can defeat web crawlers which download pictures from the Internet and check them for the presence of a client’s watermark. Audio Steganography. Check images and videos thoroughly. Image steganography has following types: a. The program checks the hexadecimal values of a JPG file to see if there is extra data after 0xFFD9, and for PNG files, it checks for data after 0x426082. This is where steganography fits right in. Algorithm for steganography encoding process Step 1: Select the Image from Image Database. The idea behind image-based Steganography is very simple. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless images or other types of media. Please do not assume that this can’t be broken by any security experts. It can be used to detect unauthorized file copying. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Let's say you want to send a short private message to your friend, but don't want grandma to snoop around and find it. In this drawing, you can clearly see a man’s face. IMAGE B AS ED STEGANOGRAPHY In image based steganography, we use image as the cover of secret mess age. Steganography is the hiding of information in innocent looking objects and is a part of cryptography. I'm sure some of those you'd like to distance yourself from. A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method Firas A. We can hide nearly 2500 characters inside an image of 100 X 100 pixels. That’s true even for denied credit. Using an image you found off the internet without modifying it significantly makes it easy to detect that an image has hidden information. Paris poses as a legendary and colorful revolutionary leader to get close to two conspirators planning an invasion and takeover of the democratic nation of San Cristobal and turn them against each other. After all, if an intruder is searching for valuable information, surely the last place he would check is right under his own nose, right? A Little Get to Know. Using statistical anal-ysis, a subset of images likely to contain steganographic content is identified. Steganography the Easy Way: The procedures require minimal skill to execute. Information Hiding: Steganography and Steganalysis Zoran Duric, Michael Jacobs, Sushil Jajodia Center for Secure Information Systems George Mason University Fairfax, VA 22030 Abstract The goal of steganography is to insert a message into a carrier signal so that it can-not be detected by unintended recipients. txt or any file can be merged inside another file. You will be prompted to set a passphrase. 35 Best Free Steganography Software For Windows Here are 35 best free steganography software. It's located in Alberta, Canada. This includes techniques like Steganophony (hiding a message in Voice-over-IP conversations) and WLAN Steganography (methods for transmitting Steganograms in Wireless Local Area Networks). A Review on Image Steganography. Pixel positions of edges in conjunction with Chaotic Cat Mapping [10] are used for the steganography technique. The etymology of the word “steganography” comes from the Greek language and is translated as steganos-, or “covered”, and –graphie, or “writing”. The ATM detail security using image Steganography is an application through which the confidential information related to the details of the ATM is maintained. The LSB based image steganography algorithm consists of two phases; the embedding phase and the extracting phase. Steganography is the hiding of information within a more obvious kind of communication. Steps to Hide files behind image. One can hide information in any kind of file. You can hide text message or files inside an image file. How to use Steghide and StegoSuite Steganography Tools in Kali Linux July 20, 2017 H4ck0 Comment(0) Well Steganography is one of the oldest technique used to hide data in a image, hide image into image and hide data in a video/audio etc. Create an image you want to encode. Singh et al. One was image enhancement and the other was image steganography based on DFT. Methods of steganography. The image was then separated into 16 tiles, each of which was then. We will use every possible methods to make our message hidden from any third person. For example, a micro-dot hidden beneath a postage stamp, or a. How to: Read Image Metadata. In a simple way i shall teach you a way for hiding a text inside a picture file. Hence we call it as an image steganography by using reversible texture synthesis. The technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims. The unfortunately named MuslimCrypt uses steganography to pass discreet messages through images online. This constellation is printed in yellow (or variants of green and orange) is most visible in the blue-channel of any of the color images. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. Steganography (/ ˌ s t ɛ ɡ ə ˈ n ɒ ɡ r ə f i / STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. An image is composed of pixels. JHide is a small software application designed to hide sensitive files within custom images. Create an image you want to encode. Well the file size before and after steganography wont be the same. From its humble origins that involved physically hiding communications and using invisible inks, it has now moved into the digital realm, allowing people to slip critical information into seemingly mundane files. Steganography challenges as those you can find at CTF platforms like hackthebox. Let's say you want to send a short private message to your friend, but don't want grandma to snoop around and find it. Steganography is ever-changing the digital media in such a way that only the. Video Steganography - Video Steganography is a technique to hide any kind of files or information into digital video format. ) The Stegosploit technique hides malicious code within the pixels in a digital image. Furthermore, Network Steganography is used in telecommunication networks. The encode and decode work well when i run directly. For example, the sender of a message can change every 100 th pixel color of a photo to correspond with a letter in the alphabet of a predetermined chart. Classical steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Compare this method to simply sending someone an encrypted piece of text. A more fun way to use steganography was also demonstrated by a security researcher called David Buchanan, who uploaded the complete works of Shakespeare to Twitter, hidden in a JPEG image. This is where steganography fits right in. The resulting image should look pretty much the same as the original as we show here. The goal of this test image is to test the capabilities of automated tools that search for JPEG images. This article describes the basics of steganography and explains a simple program that hides text within an image. ), India ABSTRACT Steganography is an important technique for information hiding in any digital object. Ever wondered to know how to hide secret data in image, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. The editing tools can help them identify whether an image is being embedded with any malware or not. By Maya Jordan, Fort Meade Soundoff September 19, 2019. Remember, the more text you want to hide, the larger the image has to be. On 3 June, FBI agents arrived at the house of government contractor Reality Leigh Winner in. The changes made by Steganography. The etymology of the word "steganography" comes from the Greek language and is translated as steganos-, or "covered", and -graphie, or "writing". Best Practices for Check Image Capture Copyright © 2012 All My Papers Page 2 SHADOWS AND LIGHTING Uneven illumination can cause parts of a check image to be unreadable. There are a lot of ways to hide information inside an image. Featured on 28 minutes ago. Intro: Steganography is the process of hiding information within an image file in such a way that it is nearly indetectable. jpg to get a report for this JPG file). This is a great way to send a secret message to a friend without drawing attention to it. This post would cover Steganography in Kali Linux – Hiding data in image. With editing tools available, organizations should take a look at every image that comes in for steganographic codes. The image Steganographic Decoder tool allows you to extract data from Steganographic image. but I have a problem in implementation in matlab. bmp image files. Compare this method to simply sending someone an encrypted piece of text. If you wish to encrypt a binary file (for example, an image or an audio file), use a utility like Base64 to encode it as text before encryption. Yes, the first nine caches in the PS101 Series have been archived. Image Steganography. Place the zip file and the image in a folder, I am placing it on the desktop. There exits many steganography model such as image, audio, video or text. Neither the image nor the message you hide will be at any moment transmitted over the web, all the magic happens within your. Image combiner added, allows the image to be combined with another in a variety of ways 4. Abstract: Nowadays image steganography has major role in confidential medical image communication. Among them, this system focuses on a combining of text and image steganography in order to produce more secured system. Note: This all done without affecting the quality of the original image. Introduction Steganography is defined as the art and science of writing hidden messages in such a way that no one else, apart from the intended recepient knows the existence of the message. No of LSB bit you have to subsitute is 1 to 4. pixels in the image without the need to painstakingly form a plausible-looking cover letter. By using this extended hill cipher (a new block cipher) which uses a 128 bit key, we encrypt the secret message. This is not true for the JPEG format. This project is about Steganography. Luca Caviglione participated in many Research Projects funded by the EU, by ESA, and by Siemens COM AG. In gray level images, each pixel is described by one number corresponding to its brightness. Learning tools outside the classroom - 780th MI hosts free, educational hackathon. It is also known as GOZI, in fact, it is a fork of the original Gozi-ISFB banking Trojan that got its source code leaked in 2014 updating and evolving Gozi features over the years. Definition of STEGANOGRAPHY. All Systems Operational Check out our status page for more details. The goal of this test image is to test the capabilities of automated tools that search for JPEG images. This works both ways as well. A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method Firas A. Step 4: Check both the images (with and without hidden data file) and see if there is any visible changes. To check this, try a reverse Google Image search to make sure the original isn’t floating around somewhere. For each bit in our secret message, the program selects a pseudo-random pixel and color component (red, green, or blue). The image on the right half is a picture from the “unsolved” #Cicada3301 Liber Primus puzzle of 2014. We expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. Steganography is a vast topic. The image Steganographic Decoder tool allows you to extract data from Steganographic image. Before an image is used, it must be loaded with the loadImage() function. The use of video files as a carrier medium for steganography is more eligible as compared to other techniques, because of its size and memory requirements [9] [2]. Generic form of Image Steganography I. The main issue is that the secret message will not be unnoticed. jpg to get a report for this JPG file). It then sets the least significant bit of the color component on that pixel to the message bit. The galaxies in Leo and Ursa Major were unbelievable! Next, I plan to check out some nebulas and then prepare to take a few snapshots of the new comet. The ATM detail security using image Steganography is an application through which the confidential information related to the details of the ATM is maintained. ), India ABSTRACT Steganography is an important technique for information hiding in any digital object. to check back since it is a goal of. Welcome to the homepage of OpenStego, the free steganography solution. Background: Image Steganography. These types of files are a perfect disguise for sensitive information. Luca Caviglione participated in many Research Projects funded by the EU, by ESA, and by Siemens COM AG. This replace the bits of unused data in computer files with bits of information. Steganography is the science of hiding information within other information. The original image is called a cover image in steganography, and the message-embedded image is. This will make the image appear identical to the. It is known that security of image steganography is mainly evaluated using undetectability of stego image when steganalyzer examines it in order to detect the presence of hidden secret information. The image is written to the ImageOutputStream starting at the current stream pointer, overwriting existing stream data from that point forward, if present. ShareX ShareX is a lightweight free and open source program that allows you to capture or record any area o. In the following tutorial we go over some general concepts and ideas that apply to steganography and steganalysis. What is the advantage of steganography over cryptography? The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. 1 released shetzl - 2003-10-15 04:53 - steghide Steghide is a steganography program that is able to hide data in various kinds of image and audio files. OpenStego provides two main functionalities: Data Hiding: It can hide any data within a cover file (e. I tried a few of the first. steganography in matlab. Check your account mix » Know How Many Inquiries You Have. The reason this works is because when an image file is read it has starting and ending bytes dictating the size of the image. Think of it as 21st century disappearing ink. value, the Stego image has higher PSNR value as compared to other method. As you read, focus on the history of steganography and the benefits and harm that steganography has for society. Introduction to Steganography. White text on a black background works well, and it helps to have a small image without too much empty space. The method described here is very basic, so even an intermediate security professional can. Using an image you found off the internet without modifying it significantly makes it easy to detect that an image has hidden information. Image steganography is the art of hiding messages in an image. This logic forms the basis for steganography, itself an ancient historical practice of concealing information within images. This can make malicious intent difficult to uncover. I need to scan this picture for steganography as the meta-data suggest there is some concealment. Let, c F 2 n is the vector extracted from the cover medium or the image and m F 2 n-k is the data to be hidden. jpg" broadcast by ABC news contanis a secret image of B-52 bombers. This is a great way to send a secret message to a friend without drawing attention to it. The signal strength meter is available only for images containing a Digimarc Barcode that you yourself have applied. doc from COMPUTER S DFSC 6312 at Sam Houston State University. Of course, this is only a design concept, which, however, is already useful. The technique lets hackers hide malicious code inside the pixels of an image, hiding a malware exploit in plain sight to infect target victims. The watermark is a secret message embedded, for instance, in an image file so if the. I need to scan this picture for steganography as the meta-data suggest there is some concealment. Detection Of steganography On image And Extract Informations On File Text. Code Crackers, can You Find the Hidden Message?. The word steganography is of Greek origin and means "covered writing" or "concealed writing". In this lab we will do the following:. With Peter Graves, Leonard Nimoy, Greg Morris, Peter Lupus. Steganography is also being used by terrorist organisations to communicate securely with each other by sending messages to image and video files, due to which NSA officials are forced to watch Porn and much porn. You will implement a simple, but very effective form of image. It is commonly believed that changes to the LSBs of colors cannot be detected due to noise that is always present in digital images. For example, if you often compress watermarked images for inclusion in a website, check the meter before posting the images. Steganography is the ancient art of the information concealment. How To : The Complete Guide to Flashing Factory Images on Android Using Fastboot If your phone has an unlocked bootloader, you can use Fastboot commands to flash factory images. See the complete profile on LinkedIn and discover Khaerul’s connections and jobs at similar companies. INTRODUCTION. Intro: Steganography is the process of hiding information within an image file in such a way that it is nearly indetectable. Steganography, to hide information into the lower bits of a digital image, has been in use for more than 30 years. Therefore, the digital images steganography algorithms applied to mobile terminals have to ensure not only the strong detection resistant capability of stego images but also the robustness of the embedded messages to the image compression. More discussion of image based steganography, and specifically the use of JPEGs, will come in later subsections (specifically 3. This demo shows how you can create a COM component from a MATLAB code using MATLAB COM Builder. And now let me introduce you to Stegosploit. The reason this works is because when an image file is read it has starting and ending bytes dictating the size of the image. This form decodes the payload that was hidden in a JPEG image or a WAV or AU audio file using the encoder form. Think of it as 21st century disappearing ink. Introduction Steganography Image Steganography •LSB algorithm Types of Steganography IMAGE STEGANOGRAPHY 10. Cryptography & Steganography. image steganography objectives. Hence the proposed Steganography technique is very efficient to hide the secret information inside an image. doc from COMPUTER S DFSC 6312 at Sam Houston State University. Online steganography service, hide message or file inside an image : Steganography is the practice of hiding secret information inside a cover file (such as a picture) where nobody would suspect it contains hidden information inside of it. cryptography image processing. It originally implemented a RESTful steganography web service. The image was then separated into 16 tiles, each of which was then. The encode and decode work well when i run directly. Try to check image Steganography using. Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. There are numerous techniques to conceal data in different digital file types like Text documents, images, audio and video files. Python program based on stegonographical methods to hide files in images using the Least Significant Bit technique. Amidst Amidst or Advanced Minecraft Interface and Data/Structure Tracking is a tool to display an overview. There exits many steganography model such as image, audio, video or text. he posted the images he downloaded on a "mega" link. During the embedding phase, the algorithm reads the cover image and embed the secret text in it in such a way that it. Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message is clear, but the meaning is obscured. org WATERMARKING E-PRINTS - arXiv. This means that employee A needs to find a way for cheating these tools. A stego-key is used to control the hiding process so as to restrict detection and/or recovery of the embedded data to parties who know it [7],[8]. This is a presentation I was working on for the malware class I"m enrolled in. The file will open normally as an image but will also hold hidden files inside, commonly zip, text, and even other image files. Methods of steganography. Zoloft Image Low Prices, 24/7 online support, available with World Wide Delivery. By Maya Jordan, Fort Meade Soundoff September 19, 2019. It can be used to detect unauthorized file copying. When you submit, you will be asked to save the resulting payload file to disk. A stego-key is used to control the hiding process so as to restrict detection and/or recovery of the embedded data to parties who know it [7],[8]. In the first two entries of this series, we explored. Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The mechanics of steganography: Hiding data, or, more appropriately, the art of hiding information within other messages or images, is basically achieved by replacing unused bits of a file with bits of hidden messages. Scan images for steganography and remove this data? - posted in All Other Applications: Hi, i recently read a Malwarebytes article on steganography, and Im wondering if there is any program out. Most commonly a media file or a image file will be given as a task with no further instructions, and the participants have to be able to uncover the hidden message that has been encoded in […]. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless images or other types of media. This is a client-side Javascript tool to steganographically hide images inside the. Check out our program website for specific program and course related details. Jassim Management Information Systems Department, Faculty of Administrative Sciences, Irbid National University, Irbid 2600, Jordan ABSTRACT The needs for steganographic techniques for hiding secret message inside images have been arise. This paper will discuss wavelet-based techniques for steganography and watermarking in. It then sets the least significant bit of the color component on that pixel to the message bit. 6th International Conference On Advances In Computing & Communications, ICACC 2016, 6-8 September 2016, Cochin, India Image Steganography Based on Complemented Message and Inverted bit LSB Substitution Rupali Bhardwaj*a, Vaishali Sharmab aAP, CSED, Thapar University, Patiala,Punjab,India 147004 bM. The sheer size of the Internet and its vast amounts of data is what accomplishes this fete, and for this reason, it can be a very effective method of securing data transfer. 3 Print out the processed image with the hidden data and dispatch it as posters, flyers, business card or other printed media. The Secret message: it is message to be transmitted. Steganography is the stealth technique of hiding text or images within image files. CDT Timezone – 8:00am – 4:00pm. See the complete profile on LinkedIn and discover Khaerul’s connections and jobs at similar companies. One of the most common steganography tricks is to hide a file inside of an image. To produce security tool based on Steganography techniques Steganography, Public key The project has various objectives such as: To enhance techniques of hiding data using encryption. Recently, we came across a malware sample that has been traversing the Internet disguised as an image of a woman. Separately, a few malware strains (e. It's located in Florida, United States. Audio-based steganography; Image-based. The app will hide your file inside the picture of your choice in easy steps. Steganography is the process of hiding information. This will make the image appear identical to the. Steganography is ever-changing the digital media in such a way that only the. Java Art Chapter 6. With editing tools available, organizations should take a look at every image that comes in for steganographic codes. This article describes the basics of steganography and explains a simple program that hides text within an image. There are a lot of ways to hide information inside an image. For example, Adobe Acrobat allows you to create password-protected PDF files, if Office’s PDF encryption isn’t your style. Off the shelf, there will be very few, if any software that does real steganography. Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless images or other types of media. Ursa Major were unbelievable! Next, I plan to check out some nebulas and then prepare to take a few snapshots of the new comet. The image, available software, and their knowledge of steganography are the constraints. The encode and decode work well when i run directly. No of LSB bit you have to subsitute is 1 to 4. You can see a similar set of hex embedded into the Cicada image. For example, you can hide a Word file inside an JPG image. check image exchange between financial institutions; all financial values in this standard are assumed to represent U. This project wants to warn about the insecurity of several steganographic tools and steganographic algorithms available in Internet. stage 3: Stegosploit - steganography image containing PowerShell script. I have been asked by a few folks what tools I use for CTF’s. Let, c F 2 n is the vector extracted from the cover medium or the image and m F 2 n-k is the data to be hidden. We've compiled a pretty useful list of multi functional steganography tools that will help you easily transmit your messages in a safe and secure way. No statistical test rden) a (w can detect. Although I am satis ed with the telescope, I think I need to purchase light pollution lters to block the xenon lights from a nearby highway to improve the quality of my pictures. ru reports, “The so-called payload VeryMal penetrates computers through ad image files saturated with steganography-based payload. A simple flowchart of Printable Steganography in action is as follow: 1 Prepare the image file to embed the data. Steganography (/ ˌ s t ɛ ɡ ə ˈ n ɒ ɡ r ə f i / STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. Usually image, video and audio files are used to hide plain text message or image message. OpenStego provides two main functionalities: Data Hiding: It can hide any data within a cover file (e. You can do this in two different ways: either collapse images and GIFs through your settings (longer method) or collapse images and GIFs using Slack commands (shorter method). 1 Download Mirrors. Hence the proposed Steganography technique is very efficient to hide the secret information inside an image. The stego image represents an effective decoy, with information subtly encoded within something that is seemingly innocuous. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice. Ambikadevi Amma T2, Shijoe Jose3 PG Student, Department of Computer Science and Engineering, JCET, Palakkad, Kerala, India1 HOD, Department of Computer Science and Engineering, JCET, Palakkad, Kerala, India2.