Skip to content
Snippets Groups Projects
Project proposal.md 2.17 KiB
Newer Older
# Embedding information in images
Vipin Thomas's avatar
Vipin Thomas committed

> Team Member 1 (Majd Hafiri) ,Team Member 2 (Vipin Koshy Thomas)
Vipin Thomas's avatar
Vipin Thomas committed

## Overview
Majd Hafiri's avatar
Majd Hafiri committed
We want to create an IP which can curb Intelluctual property theft using Stegnography alogorithms(LSB - bit manipulation). By this, each image will be having a secret Identifier embedded in it which is not visible to human eyes, which can be used to check the ownership.
Vipin Thomas's avatar
Vipin Thomas committed

Vipin Thomas's avatar
Vipin Thomas committed
## Background
Majd Hafiri's avatar
Majd Hafiri committed
Since Intelluctual property theft is becoming a common act in current world scenario, companies or authorities can use this ip to embbed secret identifiers in their media productions. So that they can easily identify plagarized images by checking the byte data. Doing small changes to the values for some pixels of the image won't be possible for human eyes to see those modified pixels but It is possible to do it on a software and hardware. These modified pixels represent a message somehow.
Vipin Thomas's avatar
Vipin Thomas committed
## Implementation Strategy
Majd Hafiri's avatar
Majd Hafiri committed
once decided on the pixel positions for embedding information we can use the following bit manipulation technique:
![images_bg1](https://miro.medium.com/max/2006/0*JTnkzopCLv2cRLuY.jpg)
![images_bg2](https://miro.medium.com/max/875/0*XWlQVMlAQra2KHSB.jpg)


image credits: [wikimedia](https://en.wikipedia.org/wiki/Bit_numbering#mediaviewer/File:Least_significant_bit.svg) , [technicalfoundation](https://technical-foundation.blogspot.com/2017/11/steganography-hide-data-in-images-with.html)


Use Case 2: 
Majd Hafiri's avatar
Majd Hafiri committed
In order for both parties to agree on the secret, An algorithm must be implemented. This Algorithm accepts the user message and change some pixels values of an Image. Pixel values modification is based on a specific criteria (not decided yet). For example , If the sender wants to send the number "5" as a secret message , The algorithm could change 5 pixel values in the image which makes these 5 pixels have a unique value. and in the receiver part , the algorithm will calculate the number of modified pixels and identify the sender message.
Vipin Thomas's avatar
Vipin Thomas committed

Vipin Thomas's avatar
Vipin Thomas committed

## Tasks

1. Setting the pixel area for embedding the secret identifier through register map.
2. Sending the images bytes as stream
3. udpating or manipulating the pixels
Vipin Thomas's avatar
Vipin Thomas committed



## Resources
PYNQ-Z2 
Jupyter Notebook
Xlinix Documention