Synopsis
Synopsis
PROJECT SYNOPSIS
Submitted by:-
Name:-Prashu Vimal
Roll:-20BCA010
INTRODUCTION
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in
order to avoid detection; the secret data is then extracted at its destination. The art and science of
hiding information by embedding messages within other, seemingly harmless messages. Steganography
works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text,
HTML, or even floppy disks) with bits of different, invisible information. This hidden information can be
plain text, cipher text, or even images.
There exist two types of materials in steganography: message and carrier. Message is the secret data
that should be hidden and carrier is the material that takes the message in it.
STEGANOGRAPHY
TEXT
VIDEO
IMAGE AUDIO
Fig:-Types Of Steaganography
IMAGE STEGANOGRAPHY
Hiding information inside images is a popular technique nowadays. An image with a secret message
inside can easily be spread over the World Wide Web or in newsgroups. To hide a message inside an
image without changing its visible properties, the cover source can be altered in ”noisy” areas with many
color variations, so less attention will be drawn to the modifications. The most common methods to make
these alterations involve the usage of the least-significant bit or LSB, masking, filtering and
transformations on the cover image. These techniques can be used with varying degrees of success on
different types of image files.
LEAST SIGNIFICANT BIT
A simple approach for embedding information in cover image is using Least Significant Bits (LSB). The
simplest steganography techniques embed the bits of the message directly into least significant bit plane
of the cover image in a deterministic sequence.
Modulating the least significant bit does not result in human-perceptible difference because the amplitude
of the change is small. To hide a secret message inside an image, a proper cover image is needed. Because
this method uses bits of each pixel in the image, it is necessary to use a lossless compression format,
otherwise the hidden information will get lost in the transformations of a lossy compression algorithm.
When using a 24-bit color image, a bit of each of the red, green and blue color components can be used,
so a total of 3 bits can be stored in each pixel.
1.) PROBLEM STATEMENT
The former consists of linguistic or language forms of hidden writing. The later, such as
invisible ink, try of hide messages physically. One disadvantage of linguistic steganography
is that users must equip themselves to have a good knowledge of linguistry. In recent years,
everything is trending toward digitization. And with the development of the internet
technology, digital media can be transmitted conveniently over the network. Therefore,
messages can be secretly carried by digital media by using the steganography techniques, and
then be transmitted through the internet rapidly. Steganography is the art of hiding the fact that
communication is taking place, by hiding information in other information. Many different carrier file
formats can be used, but digital images are the most popular because of their frequency on the
internet. For hiding secret information in images, there exists a large variety of steganography
techniques some are more complex than others and all of them have respective strong and weak points.
So we prepare this application, to make the information hiding more simple and user friendly.
2.)Methodology
Steganography system requires any type of image file and the information or message that is to be hidden.
User needs to run the application. The user has two tab options – encrypt and decrypt. If user select
encrypt, application give the screen to select image file, information file and option to save the image file.
If user select decrypt, application gives the screen to select only image file and ask path where user want
to save the secrete file.This project has two methods – Encrypt and Decrypt. In encryption the secrete
information is hiding in with any type of image file. Decryption is getting the secrete information from
image file.
Encryption Process:
The algorithm used for Encryption and Decryption in this application provides using several layers lieu of
using only LSB layer of image.
Decryption Process:
The decrypt module is used to get the hidden information in an image file. It take the image file as an
output, and give two file at destination folder, one is the same image file and another is the message file
that is hidden it that.
Protected
User Interface Message
Steganography
Model
Block Diagram
3.)Technical Specification:
Software:
NetBeans
Java (jdk 1.4.1 and above)
CONCLUSION
Digital image steganography and its derivatives are growing in use and application. In areas where
cryptography and strong encryption are being outlawed, citizens are looking at steganography to
circumvent such policies and pass messages covertly. As with the other great innovations of the digital
age: the battle between cryptographers and cryptanalysis, security experts and hackers, record companies
and pirates, steganography and Steganalysis will continually develop new techniques to counter each
other.
REFERENCES
1.)https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/an-easy-
introduction-to-steganography/
2.) https://www.technoarete.org/common_abstract/pdf/IJERCSE/v3/i3/96.pdf
3.) https://ieeexplore.ieee.org/document/9335027
4.) https://www.coursehero.com/file/63401371/SYNOPSISpdf/