Вы находитесь на странице: 1из 21

By Project No : 6

Allauddin. I Maria Dass. G Sagishnu. N Saqib Baig. K Srikanth. D Zindha. K

K. Suriya Prakash

K. Dilli Babu

Image Steganography

Existing System Proposed System

Software Requirements Hardware Requirements Modules Diagrams Encryption & Decryption Process

Image Steganography
Steganography - Greek for covered writing
The art and science of writing hidden messages in

such a way that no one apart from the intended recipient even knows that a message has been sent.
Image Steganography is used to Hide Secret Message

inside an Image to maintain the privacy, confidentiality and accuracy of the data.

Steganography is the art of hiding the fact that

communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points.

Abstract cont.
Different applications may require absolute invisibility

of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

Existing System
In the Present system, a PNG image is given as the

cover image in which the alpha-channel value of each pixel is set to be 255 initially. That is, the cover image is a totally transparent color one at the beginning of the proposed data hiding process. The R, G, and B channels are untouched so that the original image appearance revealed by the color information of these three channels is kept.

Proposed System
The system is able to hide the data inside the image as

well as to retrieve the data from the image. Once the user has been login into the system, the user can use the information (data) together with the secret key to hide the data inside the chosen image. For retrieving the data, a secret key is required to retrieving back the data that have been embedded inside the image. Without the secret key, the data cannot be retrieved from the image.

LSB Algorithm LSB is the most popular Steganography technique. It hides the secret message in the RGB image based on it its binary coding.

.NET Framework 3.5

Processor : 1.8 GHz Hard Disk : 40GB Ram : 512MB

Encrypt Encrypt the message into the Image File. Decrypt Decrypt the image file into text or message.

E-R Diagram
Encryption Secret Message Enc ryp ts Carrier (or) Image Passw ord Decryption Stego Image Dec ryp ts Carrier (or) Image Secret Message Passw ord Stego Image

Data Flow Diagram

Encryption Process


Decryption Process



Working Process of Steganography

Stegokey Password

Stego-Media Cover Media (Carrier)

Message to Hide
Steganography Application

(Car rier)

Carrier with the Hidden message

Cover medium+ embedded message+stegokey== stego-medium

Steps Completed
Requirement Analysis

Steps to be Completed
Code Generation
Testing Implementation