Professional Documents
Culture Documents
K. Suriya Prakash
K. Dilli Babu
OVERVIEW
Image Steganography
Abstract
Existing System Proposed System
Algorithm
Software Requirements Hardware Requirements Modules Diagrams Encryption & Decryption Process
Image Steganography
Steganography - Greek for covered writing
The art and science of writing hidden messages in
such a way that no one apart from the intended recipient even knows that a message has been sent.
Image Steganography is used to Hide Secret Message
inside an Image to maintain the privacy, confidentiality and accuracy of the data.
Abstract
Steganography is the art of hiding the fact that
communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points.
Abstract cont.
Different applications may require absolute invisibility
of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Existing System
In the Present system, a PNG image is given as the
cover image in which the alpha-channel value of each pixel is set to be 255 initially. That is, the cover image is a totally transparent color one at the beginning of the proposed data hiding process. The R, G, and B channels are untouched so that the original image appearance revealed by the color information of these three channels is kept.
Proposed System
The system is able to hide the data inside the image as
well as to retrieve the data from the image. Once the user has been login into the system, the user can use the information (data) together with the secret key to hide the data inside the chosen image. For retrieving the data, a secret key is required to retrieving back the data that have been embedded inside the image. Without the secret key, the data cannot be retrieved from the image.
Algorithm
LSB Algorithm LSB is the most popular Steganography technique. It hides the secret message in the RGB image based on it its binary coding.
Modules
Encrypt Encrypt the message into the Image File. Decrypt Decrypt the image file into text or message.
E-R Diagram
Encryption Secret Message Enc ryp ts Carrier (or) Image Passw ord Decryption Stego Image Dec ryp ts Carrier (or) Image Secret Message Passw ord Stego Image
Encryption Process
IMAGE FILE INFORMATION FILE
BMP FILE
Decryption Process
BMP FILE
INFORMATION FILE
IMAGE FILE
(Car rier)
Steps Completed
Requirement Analysis
Design
Steps to be Completed
Code Generation
Testing Implementation
Maintenance