Steganography Project Report by www.programmer2programmer.net
STEGANOGRAPHY (A new technique to hide information within image file) Page 2/59 Steganography Project Report by www.programmer2programmer.net STEGANOGRAPHY (A new technique to hide information within image file) A PROE!T REPORT Su"mitted "# Mr. Atanu Maity in $artial fulfillment for the award of the degree of
%!A (%a&ter of !om$uter A$$lication) IN MUMBAI XXX Engineering College XXXXXX Univerity ! XXXXX " #$$$$% Page 3/59 Steganography Project Report by www.programmer2programmer.net October - !"! S&'(AN)(RAP*+ # A new technique to hide information within image file A PROE!T REPORT Submitted by %r' ATAN( %A)TY in $artial fulfillment for the award of the degree of Ma$ter of Com%uter A%%lication XXX ENGINEERING COLLEGE, XXXXX MUMBAI UNI,'RSI&+!! MUMBAI #$$$$% Page 4/59 Steganography Project Report by www.programmer2programmer.net O!TO*ER +,-, XXXXXX UNI,'RSI&+! XXXXXX #$$ $$% &O'A()*E CE+,)()CA,E -erti.ie/ that thi project report -..../teganogra%hy .......0 i the bona.i/e wor0 o. 1..........Mr. A,A'1 MA),2....0 who carrie/ o2t the project wor0 2n/er my 2perviion. 33Signat2re o. the *ea/ o. the 4epartment55 33Signat2re o. the S2pervior55 /)3'A,1+E /)3'A,1+E 33Name55 33Name55 4EA* O( ,4E *EPA+,ME', /1PE+5)/O+ 33Aca/emic 4eignation55 334epartment55 334epartment55 336277 a//re o. the 4ept 8 -o77ege 55 336277 a//re o. the 4ept 8 -o77ege 55 Page 5/59 Steganography Project Report by www.programmer2programmer.net Page 6/59 Steganography Project Report by www.programmer2programmer.net ,able of Content$ %. Abtract 2. )ntro/2ction 9. /ynopi #. Prob7em /tatement :. Objective ;. Overview <. /teganography ,echni=2e >. /teganography v Cryptography ?. /teganography v 6atermar0ing %$. /ytem Ana7yi an/ *eign %%. 1er Man2a7 %2. /2mmary
Page 7/59 Steganography Project Report by www.programmer2programmer.net A&/,+AC, Steganography i the art o. hi/ing the .act that comm2nication i ta0ing p7ace@ by hi/ing in.ormation in other in.ormation. Many /i..erent carrier .i7e .ormat can be 2e/@ b2t /igita7 image are the mot pop27ar beca2e o. their .re=2ency on the internet. 6or hi/ing ecret in.ormation in image@ there eAit a 7arge variety o. teganography techni=2e ome are more comp7eA than other an/ a77 o. them have repective trong an/ wea0 point. 4i..erent app7ication may re=2ire abo72te inviibi7ity o. the ecret in.ormation@ whi7e other re=2ire a 7arge ecret meage to be hi//en. &hi project report inten/ to give an overview o. image teganography@ it 2e an/ techni=2e. It a7o attempt to i/enti.y the re=2irement o. a goo/ teganography a7gorithm an/ brie.7y re.7ect on which teganographic techni=2e are more 2itab7e .or which app7ication. Page 8/59 Steganography Project Report by www.programmer2programmer.net )',+O*1C,)O' )ne o. the reaon that intr2/er can be 2cce.27 i the mot o. the in.ormation they ac=2ire .rom a ytem i in a .orm that they can rea/ an/ comprehen/. Intr2/er may revea7 the in.ormation to other@ mo/i.y it to mirepreent an in/ivi/2a7 or organiBation@ or 2e it to 7a2nch an attac0. )ne o72tion to thi prob7em i@ thro2gh the 2e o. teganography. Steganography i a techni=2e o. hi/ing in.ormation in /igita7 me/ia. In contrat to cryptography@ it i not to 0eep other .rom 0nowing the hi//en in.ormation b2t it i to 0eep other .rom thin0ing that the in.ormation even eAit. Steganography become more important a more peop7e join the cyberpace revo72tion. Steganography i the art o. concea7ing in.ormation in way that prevent the /etection o. hi//en meage. Stegranography inc72/e an array o. ecret comm2nication metho/ that hi/e the meage .rom being een or /icovere/. 42e to a/vance in I-&@ mot o. in.ormation i 0ept e7ectronica77y. -one=2ent7y@ the ec2rity o. in.ormation ha become a .2n/amenta7 i2e. Bei/e cryptography@ treganography can be emp7oye/ to ec2re in.ormation. In cryptography@ the meage or encrypte/ meage i embe//e/ in a /igita7 hot be.ore paing it thro2gh the networ0@ th2 the eAitence o. the meage i 2n0nown. Bei/e hi/ing /ata .or con.i/entia7ity@ thi approach o. in.ormation hi/ing can be eAten/e/ to copyright protection .or /igita7 me/ia! a2/io@ vi/eo an/ image. &he growing poibi7itie o. mo/ern comm2nication nee/ the pecia7 mean o. ec2rity epecia77y on comp2ter networ0. &he networ0 ec2rity i becoming more important a the n2mber o. /ata being eAchange/ on the internet increae. &here.ore@ the con.i/entia7ity an/ /ata integrity are re=2ire to protect againt 2na2thoriBe/ acce an/ 2e. &hi ha re27te/ in an eAp7oive growth o. the .ie7/ o. in.ormation hi/ing In.ormation hi/ing i an emerging reearch area@ which encompae app7ication 2ch a copyright protection .or /igita7 me/ia@ watermar0ing@ .ingerprinting@ an/ teganography. Page 9/59 Steganography Project Report by www.programmer2programmer.net In watermar0ing app7ication@ the meage contain in.ormation 2ch a owner i/enti.ication an/ a /igita7 time tamp@ which 22a77y app7ie/ .or copyright protection. 6ingerprint@ the owner o. the /ata et embe/ a eria7 n2mber that 2ni=2e7y i/enti.ie the 2er o. the /ata et. &hi a// to copyright in.ormation to ma0e it poib7e to trace any 2na2thoriBe/ 2e/ o. the /ata et bac0 to the 2er. Steganography hi/e the ecrete meage within the hot /ata et an/ preence imperceptib7e an/ i to be re7iab7y comm2nicate/ to a receiver. &he hot /ata et i p2rpoe7y corr2pte/@ b2t in a covert way@ /eigne/ to be inviib7e to an in.ormation ana7yi.
Page 10/59 Steganography Project Report by www.programmer2programmer.net /2'OP/)/ Pro7ect 'ame8 /,E3A'O3+AP42 Pro7ect Member$8 &hi project i /one in a gro2p o. two peop7e. Project member are. %. Atan2 Maity 2. Prabha -ho2/hary Page 11/59 Steganography Project Report by www.programmer2programmer.net 6hat i$ /teganogra%hy9 Steganography i the practice o. hi/ing private or enitive in.ormation within omething that appear to be nothing o2t to the 22a7. Steganography i o.ten con.2e/ with crypto7ogy beca2e the two are imi7ar in the way that they both are 2e/ to protect important in.ormation. &he /i..erence between two i that teganography invo7ve hi/ing in.ormation o it appear that no in.ormation i hi//en at a77. I. a peron or peron view the object that the in.ormation i hi//en ini/e o. he or he wi77 have no i/ea that there i any hi//en in.ormation@ there.ore the peron wi77 not attempt to /ecrypt the in.ormation. Chat teganography eentia77y /oe i eAp7oit h2man perception@ h2man ene are not traine/ to 7oo0 .or .i7e that have in.ormation ini/e o. them@ a7tho2gh thi o.tware i avai7ab7e that can /o what i ca77e/ Steganography. &he mot common 2e o. teganography i to hi/e a .i7e ini/e another .i7e. Page 12/59 Steganography Project Report by www.programmer2programmer.net 4i$tory of /teganogra%hy8 &hro2gh o2t hitory Steganography ha been 2e/ to ecret7y comm2nicate in.ormation between peop7e. Some eAamp7e o. 2e o. Steganography i pat time are! %. 42ring Cor7/ Car 2 inviib7e in0 wa 2e/ to write in.ormation on piece o. paper o that the paper appeare/ to the average peron a j2t being b7an0 piece o. paper. Di=2i/ 2ch a mi70@ vinegar an/ .r2it j2ice were 2e/@ beca2e when each one o. thee 2btance are heate/ they /ar0en an/ become viib7e to the h2man eye. 2. In Ancient (reece they 2e/ to e7ect meenger an/ have their hea/@ they wo27/ then write a meage on their hea/. )nce the meage ha/ been written the hair wa a77owe/ to grow bac0. A.ter the hair grew bac0 the meenger wa ent to /e7iver the meage@ the recipient wo27/ have o.. the meenger hair to ee the ecrete meage. 9. Another metho/ 2e/ in (reece wa where omeone wo27/ pee7 waA o.. a tab7et that wa Page 13/59 Steganography Project Report by www.programmer2programmer.net 6hy ,hi$ /teganogra%hy9 &hi techni=2e i choen@ beca2e thi ytem inc72/e not on7y imperceptibi7ity b2t a7o 2n" /e7ectabi7ity by any tegano7yi too7. Pro7ect /co%e8 &hi project i /eve7ope/ .or hi/ing in.ormation in any image .i7e. &he cope o. the project i imp7ementation o. teganography too7 .or hi/ing in.ormation inc72/e any type o. in.ormation .i7e an/ image .i7e an/ the path where the 2er want to ave Image an/ eAtr2/e/ .i7e. Methodology8 Uer nee/ to r2n the app7ication. &he 2er ha two tab option encrypt an/ /ecrypt. I. 2er e7ect encrypt@ app7ication give the creen to e7ect image .i7e@ in.ormation .i7e an/ option to ave the image .i7e. I. 2er e7ect /ecrypt@ app7ication give the creen to e7ect on7y image .i7e an/ a0 path where 2er want to ave the ecrete .i7e. &hi project ha two metho/ 'ncrypt an/ 4ecrypt. In encryption the ecrete in.ormation i hi/ing in with any type o. image .i7e. 4ecryption i getting the ecrete in.ormation .rom image .i7e. Page 14/59 Steganography Project Report by www.programmer2programmer.net /oftware +equirement$8 .'E, (ramewor: ;.< 4ardware +equirement$8 Proce$$or8 Preferably ".! 34= or 3reater. +AM 8 <" M& or 3reater. >imitation$ of the /oftware8 &hi project ha an a2mption that i both the en/er an/ receiver m2t have hare/ ome ecret in.ormation be.ore imprionment. P2re teganography mean that there i none prior in.ormation hare/ by two comm2nication partie. Page 15/59 Steganography Project Report by www.programmer2programmer.net *etecting /teganogra%hy8 &he art o. /etecting Steganography i re.erre/ to a /teganaly$i$. &o p2t i imp7y Stegana7yi invo7ve /etecting the 2e o. Steganography ini/e o. a .i7e. Stegana7yi /oe not /ea7 with trying to /ecrypt the hi//en in.ormation ini/e o. a .i7e@ j2t /icovering it. &here are many metho/ that can be 2e/ to /etect Steganography 2ch a! 1,iewing the .i7e an/ comparing it to another copy o. the .i7e .o2n/ on the Internet EPict2re .i7eF. &here are 22a77y m27tip7e copie o. image on the internet@ o yo2 may want to 7oo0 .or evera7 o. them an/ try an/ compare the 2pect .i7e to them. 6or eAamp7e i. yo2 /own7oa/ a GP'4 an/ yo2r 2pect .i7e i a7o a GP'4 an/ the two .i7e 7oo0 a7mot i/entica7 apart .rom the .act that one i 7arger than the other@ it i mot probab7e yo2 2pect .i7e ha hi//en in.ormation ini/e o. it. (uture Enhancement$8 &o ma0e it p2re teganography app7ication. Page 16/59 Steganography Project Report by www.programmer2programmer.net Problem /tatement: &he .ormer conit o. 7ing2itic or 7ang2age .orm o. hi//en writing. &he 7ater@ 2ch a inviib7e in0@ try o. hi/e meage phyica77y. )ne /ia/vantage o. 7ing2itic teganography i that 2er m2t e=2ip theme7ve to have a goo/ 0now7e/ge o. 7ing2itry. In recent year@ everything i tren/ing towar/ /igitiBation. An/ with the /eve7opment o. the internet techno7ogy@ /igita7 me/ia can be tranmitte/ convenient7y over the networ0. &here.ore@ meage can be ecret7y carrie/ by /igita7 me/ia by 2ing the teganography techni=2e@ an/ then be tranmitte/ thro2gh the internet rapi/7y Steganography i the art o. hi/ing the .act that comm2nication i ta0ing p7ace@ by hi/ing in.ormation in other in.ormation. Many /i..erent carrier .i7e .ormat can be 2e/@ b2t /igita7 image are the mot pop27ar beca2e o. their .re=2ency on the internet. 6or hi/ing ecret in.ormation in image@ there eAit a 7arge variety o. teganography techni=2e ome are more comp7eA than other an/ a77 o. them have repective trong an/ wea0 point. So we prepare thi app7ication@ to ma0e the in.ormation hi/ing more imp7e an/ 2er .rien/7y. Page 17/59 Steganography Project Report by www.programmer2programmer.net Ob7ecti?e &he goa7 o. teganography i covert comm2nication. So@ a .2n/amenta7 re=2irement o. thi teganography ytem i that the hi/er meage carrie/ by tego"me/ia ho27/ not be enib7e to h2man being. &he other goa/ o. teganography i to avoi/ /rawing 2picion to the eAitence o. a hi//en meage. &hi approach o. in.ormation hi/ing techni=2e ha recent7y became important in a n2mber o. app7ication area &hi project ha .o77owing objective! &o pro/2ct ec2rity too7 bae/ on teganography techni=2e. &o eAp7ore techni=2e o. hi/ing /ata 2ing encryption mo/27e o. thi project &o eAtract techni=2e o. getting ecret /ata 2ing /ecryption mo/27e. Steganography ometime i 2e/ when encryption i not permitte/. )r@ more common7y@ teganography i 2e/ to 2pp7ement encryption. An encrypte/ .i7e may ti77 hi/e in.ormation 2ing teganography@ o even i. the encrypte/ .i7e i /eciphere/@ the hi//en meage i not een Page 18/59 Steganography Project Report by www.programmer2programmer.net O?er?iew &he wor/ teganography come .rom the (ree0 1SeganoH@ which mean covere/ or ecret an/ 1graphyH mean writing or /rawing. &here.ore@ teganography mean@ 7itera77y@ covere/ writing. It i the art an/ cience o. hi/ing in.ormation 2ch it preence cannot be /etecte/ an/ a comm2nication i happening. A ecrete in.ormation i enco/ing in a manner 2ch that the very eAitence o. the in.ormation i concea7e/. Paire/ with eAiting comm2nication metho/@ teganography can be 2e/ to carry o2t hi//en eAchange. &he main goa7 o. thi project it to comm2nicate ec2re7y in a comp7ete7y 2n/etectab7e manner an/ to avoi/ /rawing 2picion to the tranmiion o. a hi/er /ata. &here ha been a rapi/ growth o. interet in teganography .or two reaon! &he p2b7ihing an/ broa/cating in/2trie have become interete/ in techni=2e .or hi/ing encrypte/ copyright mar0 an/ eria7 n2mber in /igita7 .i7m@ a2/io recor/ing@ boo0 an/ m27time/ia pro/2ct Move by vario2 government to retrict the avai7abi7ity o. encryption ervice have motivate/ peop7e to t2/y metho/ by which private meage can be embe//e/ in eeming7y innoc2o2 cover meage. &he baic mo/e7 o. teganography conit o. -arrier@ Meage an/ pawor/. -arrier i a7o 0nown a cover"object@ which the meage i embe//e/ an/ erve to hi/e the preence o. the meage. Page 19/59 Steganography Project Report by www.programmer2programmer.net Baica77y@ the mo/e7 .or teganography i hown on .o77owing .ig2re! Meage i the /ata that the en/er wihe to remain it con.i/entia7. It can be p7ain teAt@ cipherteAt@ other image@ or anything that can be embe//e/ in a bit tream 2ch a a copyright mar0@ a covert comm2nication@ or a eria7 n2mber. Pawor/ i 0nown a stego-key@ which en2re that on7y recipient who 0now the correpon/ing /eco/ing 0ey wi77 be ab7e to eAtract the meage .rom a o!e"-ob#et. &he o!e"-ob#et with the ecret7y embe//e/ meage i then ca77e/ the Stego-ob#et. Recovering meage .rom a stego-ob#et re=2ire the o!e"-ob#et ite7t an/ a correpon/ing /eco/ing 0ey i. a stego-key wa 2e/ /2ring the enco/ing proce. &he origina7 image may or may not be re=2ire/ in mot app7ication to eAtract the meage. &here are evera7 2itab7e carrier be7ow to be the o!e"-ob#et: Networ0 protoco7 2ch a &-P@ IP an/ U4P A2/io that 2ing /igita7 a2/io .ormat 2ch a wav@ mi/i@ avi@ mpeg@ mpi an/ voc 6i7e an/ 4i0 that can hi/e an/ appen/ .i7e by 2ing the 7ac0 pace -over"object@ - Meage@ M Stego"0ey@ I ((X@M@A) Stego )bject@ J Page 20/59 Steganography Project Report by www.programmer2programmer.net &eAt 2ch a n277 character@ j2t a7i0e more co/e inc72/ing htm7 an/ java Image .i7e 2ch a bmp@ gi. an/ jpg@ where they can be both co7or an/ gray"ca7e. In genera7@ the in.ormation hi/ing proce eAtract re/2n/ant bit .rom o!e"-ob#et$ &he proce conit o. two tep! I/enti.ication o. re/2n/ant bit in a o!e"-ob#et$ Re/2n/ant bit are thoe bit that can be mo/i.ie/ witho2t corr2pting the =2a7ity or /etroying the integrity o. the o!e"-ob#et$ 'mbe//ing proce then e7ect the 2bet o. the re/2n/ant bit to be rep7ace/ with /ata .rom a ecret meage. &he stego-ob#et i create/ by rep7acing the e7ecte/ re/2n/ant bit with meage bit Page 21/59 Steganography Project Report by www.programmer2programmer.net /teganogra%hy ?$ Cry%togra%hy8 Baica77y@ the p2rpoe o. cryptography an/ teganography i to provi/e ecret comm2nication. *owever@ teganography i not the ame a cryptography. -ryptography hi/e the content o. a ecrete meage .rom a ma7icio2 peop7e@ wherea teganography even concea7 the eAitence o. the meage. In cryptography@ the ytem i bro0en when the attac0er can rea/ the ecret meage. Brea0ing a teganography ytem nee/ the attac0er to /etect that teganography ha been 2e/. It i poib7e to combine the techni=2e by encrypting meage 2ing cryptography an/ then hi/ing the encrypte/ meage 2ing teganography. &he re27ting tego"image can be tranmitte/ witho2t revea7ing that ecret in.ormation i being eAchange/. Page 22/59 Steganography Project Report by www.programmer2programmer.net /teganogra%hy ?$ 6atermar:ing8 Steganography pay attention to the /egree o. Inviibi7ity whi7e watermar0ing pay mot o. it attrib2te to the rob2tne o. the meage an/ it abi7ity to withtan/ attac0 o. remova7@ 2ch a image operationErotation@ cropping@ .i7teringF@ a2/io operationErerecor/ing@ .i7teringFin the cae o. image an/ a2/io .i7e being watermar0e/ repective7y. It i a non"=2etionab7e .act that /e7ectabi7ity o. a vee7 with an intro/2ce/ /ata Eteganographic meage or a watermar0F i a .2nction o. the changeabi7ity .2nction o. the a7gorithm over the vee7. &hat i the way the a7gorithm change the vee7 an/ the everity o. 2ch an operation /etermine with no /o2bt the /e7ectabi7ity o. the meage@ ince /e7ectabi7ity i a .2nction o. .i7e characteritic /eviation .rom the norm@ embe//ing operation attit2/e an/ change everity o. 2ch change /eci/e vee7 .i7e /e7ectabi7ity. A typica7 triang7e o. con.7ict i meage Inviibi7ity@ Rob2tne@ an/ Sec2rity. Inviibi7ity i a mea2re o. the in notabi7ity o. the content o. the meage within the vee7. Sec2rity i inomino2 to the cryptographic i/ea to meage ec2rity@ meaning inabi7ity o. recontr2ction o. the meage witho2t the proper ecret 0ey materia7 hare/. Inviibi7ity Rob2tne Sec2rity Page 23/59 Steganography Project Report by www.programmer2programmer.net Rob2tne re.er to the en/2rance capabi7ity o. the meage to 2rvive /itortion or remova7 attac0 intact. It i o.ten 2e/ in the watermar0ing .ie7/ ince watermar0ing ee0 the peritence o. the watermar0 over attac0@ teganographic meage on the other han/ ten/ to be o. high enitivity to 2ch attac0. &he more inviib7e the meage i the 7e ec2re it i Ecryptography nee/ paceF an/ the 7e rob2t it i Eno error chec0ingKrecovery intro/2ce/F.&he more rob2t the meage i embe//e/ the more iBe it re=2ire an/ the more viib7e it i. Page 24/59 Steganography Project Report by www.programmer2programmer.net /teganogra%hy ,echnique$8 )ver the pat .ew year@ n2mero2 teganography techni=2e that embe/ hi//en meage in m27time/ia object have been propoe/. &here have been many techni=2e .or hi/ing in.ormation or meage in image in 2ch a manner that a7teration ma/e to the image i percept2a77y in/icernib7e. -ommon7y approache are inc72/e DSB@ Ma0ing an/ .i7tering an/ &ran.orm techni=2e. Deat igni.icant bit EDSBF inertion i a imp7e approach to embe//ing in.ormation in image .i7e. &he imp7et teganography techni=2e embe/ the bit o. the meage /irect7y into 7eat igni.icant bit p7ane o. the cover"image in a /eterminitic e=2ence. Mo/27ating the 7eat igni.icant bit /oe not re27t in h2man perceptib7e /i..erence beca2e the amp7it2/e o. the change i ma77. In thi techni=2e@ the embe//ing capacity can be increae/ by 2ing two or more 7eat igni.icant bit. At the ame time@ not on7y the ri0 o. ma0ing the embe//e/ meage tatitica77y /etectab7e increae b2t a7o the image .i/e7ity /egra/e. *ence a variab7e iBe DSB embe//ing chema i preente/@ in which the n2mber o. DSB 2e/ .or meage embe//ingKeAtracting /epen/ on the 7oca7 characteritic o. the piAe7. &he a/vantage o. DSB"bae/ metho/ i eay to imp7ement an/ high meage pay" 7oa/. A7tho2gh DSB hi/e the meage in 2ch way that the h2man /o not perceive it@ it i ti77 poib7e .or the opponent to retrieve the meage /2e to the imp7icity o. the techni=2e. &here.ore@ ma7icio2 peop7e can eai7y try to eAtract the meage .rom the beginning o. the image i. they are 2picio2 that there eAit ecret in.ormation that wa embe//e/ in the image. &here.ore@ a ytem name/ Sec2re In.ormation *i/ing Sytem ESI*SF i propoe/ to improve the DSB cheme. It overcome the e=2ence"mapping prob7em by embe//ing the maage into a et o. ran/om piAe7@ which are cattere/ on the cover"image. Ma0ing an/ .i7tering techni=2e@ 22a77y retricte/ to 2# bit an/ gray ca7e image@ hi/e in.ormation by mar0ing an image@ in a manner imi7ar to paper watermar0. &he techni=2e Page 25/59 Steganography Project Report by www.programmer2programmer.net per.orm ana7yi o. the image@ th2 embe/ the in.ormation in igni.icant area o that the hi//en meage i more integra7 to cover image than j2t hi/ing it in the noie 7eve7. &ran.orm techni=2e embe/ the meage by mo/27ating coe..icient in a tran.orm /omain@ 2ch a the 4icrete 6o2rier &ran.orm@ or Cave7et &ran.orm. &hee metho/ hi/e meage in igni.icant area o. the cover image@ which ma0e them more rob2t to attac0. &ran.ormation can be app7ie/ over the entire image@ to b7oc0 thro2gho2t the image@ or other variant. Page 26/59 Steganography Project Report by www.programmer2programmer.net )mage /teganogra%hy and bitma% %icture$8 Uing bitmap pict2re .or hi/ing ecret in.ormation i one o. mot pop27ar choice .or Steganography. Many type o. o.tware b2i7t .or thi p2rpoe@ ome o. thee o.tware 2e pawor/ protection to encrypting in.ormation on pict2re. &o 2e thee o.tware yo2 m2t have a LBMPM .ormat o. a pict2re to 2e it@ b2t 2ing other type o. pict2re 7i0e 1GP'(H@ 1(I6H or any other type i rather or never 2e/@ beca2e o. a7gorithm o. 1BMPH pict2re .or Steganography i imp7e. A7o we 0now that in the web mot pop27ar o. image type are 1GP'(H an/ other type not 1BPMH@ o we ho27/ have a o72tion .or thi prob7em. &hi o.tware provi/e the o72tion o. thi prob7em@ it can accept any type o. image to hi/e in.ormation .i7e@ b2t .ina77y it give the on7y 1BMPH image a an o2tp2t that ha hi//en .i7e ini/e it. Page 27/59 Steganography Project Report by www.programmer2programmer.net &itma% /teganogra%hy8 Bitmap type i the imp7et type o. pict2re beca2e that it /oenMt have any techno7ogy .or /ecreaing .i7e iBe. Str2ct2re o. thee .i7e i that a bitmap image create/ .rom piAe7 that any piAe7 create/ .rom three co7or E re/@ green an/ b72e ai/ R(BF each co7or o. a piAe7 i one byte in.ormation that how the /enity o. that co7or. Merging thee three co7or ma0e every co7or that we ee in thee pict2re. Ce 0now that every byte in comp2ter cience i create/ .rom > bit that .irt bit i Mot"Signi.icant"Bit EMSBF an/ 7at bit Deat"Signi.icant"Bit EDSBF@ the i/ea o. 2ing Steganography cience i in thi p7aceN we 2e DSB bit .or writing o2r ec2rity in.ormation ini/e BMP pict2re. So i. we j2t 2e 7at 7ayer E>t 7ayarF o. in.ormation@ we ho27/ change the 7at bit o. piAe7@ in other han/ we have 9 bit in each piAe7 o we have 9OhightOwi/th bit memory to write o2r in.ormation. B2t be.ore writing o2r /ata we m2t write name o. /ataE.i7eF@ iBe o. name o. /ata 8 iBe o. /ata. Ce can /o thi by aigning ome .irt bit o. memory E>t 7ayerF. (!!"!""!" !!!"""!" ""!"""!!) ("!"!!""! ""!!!"!" !!!!""!!) (""!"!!"! "!"!""!! !""!!!"") Uing each 9 piAe7 o. pict2re to ave a byte o. /ata Page 28/59 Steganography Project Report by www.programmer2programmer.net /y$tem Analy$i$ B *e$ign Steganography ytem re=2ire any type o. image .i7e an/ the in.ormation or meage that i to be hi//en. It ha two mo/27e encrypt an/ /ecrypt. Microo.t .Net .ramewor0 prepare a h2ge amo2nt o. too7 an/ option .or programmer that they imp7e programming. )ne o. .Net too7 .or pict2re an/ image i a2to"converting mot type o. pict2re to BMP .ormat. I 2e/ thi too7 in thi o.tware ca77e/ 1SteganographyH that i written in -P.Net 7ang2age an/ yo2 can 2e thi o.tware to hi/e yo2r in.ormation in any type o. pict2re witho2t any converting it .ormat to BMP Eo.tware convert ini/e itF. &he a7gorithm 2e/ .or 'ncryption an/ 4ecryption in thi app7ication provi/e 2ing evera7 7ayer 7ie2 o. 2ing on7y DSB 7ayer o. image. Criting /ata tart .rom 7at 7ayer E>t or DSB 7ayerFN beca2e igni.icant o. thi 7ayer i 7eat an/ every 2pper 7ayer ha /o2b7e/ igni.icant .rom it /own 7ayer. So every tep we go to 2pper 7ayer image =2a7ity /ecreae an/ image reto2ching tranpire. &he encrypt mo/27e i 2e/ to hi/e in.ormation into the imageN no one can ee that in.ormation or .i7e. &hi mo/27e re=2ire any type o. image an/ meage an/ give the on7y one image .i7e in /etination. &he /ecrypt mo/27e i 2e/ to get the hi//en in.ormation in an image .i7e. It ta0e the image .i7e a an o2tp2t@ an/ give two .i7e at /etination .o7/er@ one i the ame image .i7e an/ another i the meage .i7e that i hi//en it that. Be.ore encrypting .i7e ini/e image we m2t ave name an/ iBe o. .i7e in a /e.inite p7ace o. image. Ce co27/ ave .i7e name be.ore .i7e in.ormation in DSB 7ayer an/ ave .i7e iBe an/ .i7e name iBe in mot right"/own piAe7 o. image. Criting thi in.ormation i nee/e/ to retrieve .i7e .rom encrypte/ image in /ecryption tate. &he graphica7 repreentation o. thi ytem i a .o77ow! Page 29/59 Steganography Project Report by www.programmer2programmer.net
Page 32/59 Steganography Project Report by www.programmer2programmer.net Code Analy$i$ using System; using System.Drawing; using System.Windows.Forms; using System.IO; namespace Text2Image { public partial class FrmSteganograpy ! Form { public FrmSteganograpy"# { Initiali$e%omponent"#; & ''public (alues! string loadedTrueImage)at* loadedFile)at* sa(eToImage*D+oadImage)at*DSa(eFile)at; int eigt* widt; long ,ileSi$e* ,ile-ameSi$e; Image loadedTrueImage* DecryptedImage *.,ter/ncryption; 0itmap loadedTrue0itmap* Decrypted0itmap; 1ectangle pre(iewImage 2 new 1ectangle"23*453*673*683#; bool can)aint 2 ,alse* /ncriptionDone 2 ,alse; byte9: ,ile%ontainer; pri(ate (oid /nImage0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e# { i, "openFileDialog4.SowDialog"# 22 Dialog1esult.O># { loadedTrueImage)at 2 openFileDialog4.File-ame; /nImage;tbx.Text 2 loadedTrueImage)at; loadedTrueImage 2 Image.FromFile"loadedTrueImage)at#; eigt 2 loadedTrueImage.?eigt; widt 2 loadedTrueImage.Widt; loadedTrue0itmap 2 new 0itmap"loadedTrueImage#; FileIn,o imgin, 2 new FileIn,o"loadedTrueImage)at#; ,loat ,s 2 ",loat#imgin,.+engt ' 4326; ImageSi$e;lbl.Text 2 smalldecimal",s.ToString"#* 2# @ A >0A; Image?eigt;lbl.Text 2 loadedTrueImage.?eigt.ToString"# @ A )ixelA; ImageWidt;lbl.Text 2 loadedTrueImage.Widt.ToString"# @ A )ixelA; double cansa(e 2 "B.3 C ""eigt C "widt ' D# C D# ' D E 4## ' 4326; %anSa(e;lbl.Text 2 smalldecimal"cansa(e.ToString"#* 2# @ A >0A; can)aint 2 true; tis.In(alidate"#; & Page 33/59 Steganography Project Report by www.programmer2programmer.net & pri(ate string smalldecimal"string inp* int dec# { int i; ,or "i 2 inp.+engt E 4; i F 3; iEE# i, "inp9i: 22 G.G# brea<; try { return inp.Substring"3* i @ dec @ 4#; & catc { return inp; & & pri(ate (oid /nFile0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e# { i, "openFileDialog2.SowDialog"# 22 Dialog1esult.O># { loadedFile)at 2 openFileDialog2.File-ame; /nFile;tbx.Text 2 loadedFile)at; FileIn,o ,in,o 2 new FileIn,o"loadedFile)at#; ,ileSi$e 2 ,in,o.+engt; ,ile-ameSi$e 2 =ustF-ame"loadedFile)at#.+engt; & & pri(ate (oid /ncrypt;btn;%lic<"ob=ect sender* /(ent.rgs e# { i, "sa(eFileDialog4.SowDialog"# 22 Dialog1esult.O># { sa(eToImage 2 sa(eFileDialog4.File-ame; & else return; i, "/nImage;tbx.Text 22 String./mpty HH /nFile;tbx.Text 22 String./mpty# { Iessage0ox.Sow"A/ncrypton in,ormation is incompleteJKn)lease complete tem ,rist.A* A/rrorA* Iessage0ox0uttons.O>* Iessage0oxIcon./rror#; & i, "BC""eigt C "widt'D#CD#'D E 4# L ,ileSi$e @ ,ile-ameSi$e# { Iessage0ox.Sow"AFile si$e is too largeJKn)lease use a larger image to ide tis ,ile.A* A/rrorA* Iessage0ox0uttons.O>* Iessage0oxIcon./rror#; return; & ,ile%ontainer 2 File.1ead.ll0ytes"loadedFile)at#; /ncrypt+ayer"#; & Page 34/59 Steganography Project Report by www.programmer2programmer.net pri(ate (oid /ncrypt+ayer"# { toolStripStatus+abel4.Text 2A/ncrypting... )lease waitA; .pplication.Do/(ents"#; long FSi$e 2 ,ileSi$e; 0itmap canged0itmap 2 /ncrypt+ayer"B* loadedTrue0itmap* 3* "eigt C "widt'D#CD# ' D E ,ile-ameSi$e E 4* true#; FSi$e E2 "eigt C "widt ' D# C D# ' D E ,ile-ameSi$e E 4; i,"FSi$e F 3# { ,or "int i 2 8; i F2 3 MM FSi$e F 3; iEE# { canged0itmap 2 /ncrypt+ayer"i* canged0itmap* """B E i# C eigt C "widt ' D# C D# ' D E ,ile-ameSi$e E "B E i##* """7 E i# C eigt C "widt ' D# C D# ' D E ,ile-ameSi$e E "7 E i##* ,alse#; FSi$e E2 "eigt C "widt ' D# C D# ' D E 4; & & canged0itmap.Sa(e"sa(eToImage#; toolStripStatus+abel4.Text 2 A/ncrypted image as been success,ully sa(ed.A; /ncriptionDone 2 true; .,ter/ncryption 2 Image.FromFile"sa(eToImage#; tis.In(alidate"#; & pri(ate 0itmap /ncrypt+ayer"int layer* 0itmap input0itmap* long start)osition* long end)osition* bool writeFile-ame# { 0itmap output0itmap 2 input0itmap; layerEE; int i 2 3* = 2 3; long F-Si$e 2 3; bool9: t 2 new bool9B:; bool9: rb 2 new bool9B:; bool9: gb 2 new bool9B:; bool9: bb 2 new bool9B:; %olor pixel 2 new %olor"#; byte r* g* b; i, "writeFile-ame# { F-Si$e 2 ,ile-ameSi$e; string ,ile-ame 2 =ustF-ame"loadedFile)at#; ''write ,ile-ame! ,or "i 2 3; i L eigt MM i C "eigt ' D# L ,ile-ameSi$e; i@ @# ,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D# L ,ile-ameSi$e; =@@# { Page 35/59 Steganography Project Report by www.programmer2programmer.net byte2bool""byte#,ile-ame9i C "eigt ' D# @ = ' D:* re, t#; pixel 2 input0itmap.Net)ixel"=* i#; r 2 pixel.1; g 2 pixel.N; b 2 pixel.0; byte2bool"r* re, rb#; byte2bool"g* re, gb#; byte2bool"b* re, bb#; i, "= O D 22 3# { rb98: 2 t93:; gb98: 2 t94:; bb98: 2 t92:; & else i, "= O D 22 4# { rb98: 2 t9D:; gb98: 2 t96:; bb98: 2 t9P:; & else { rb98: 2 t95:; gb98: 2 t98:; & %olor result 2 %olor.From.rgb""int#bool2byte"rb#* "int#bool2byte"gb#* "int#bool2byte"bb##; output0itmap.Set)ixel"=* i* result#; & iEE; & ''write ,ile "a,ter ,ile name#! int temp= 2 =; ,or "; i L eigt MM i C "eigt ' D# L end)osition E start)osition @ F-Si$e MM start)osition @ i C "eigt ' D# L ,ileSi$e @ F-Si$e; i@@# ,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D# L end)osition E start)osition @ F-Si$e MM start)osition @ i C "eigt ' D# @ "= ' D# L ,ileSi$e @ F-Si$e; =@@# { i, "temp= J2 3# { = 2 temp=; temp= 2 3; & byte2bool""byte#,ile%ontainer9start)osition @ i C "eigt ' D# @ = ' D E F-Si$e:* re, t#; pixel 2 input0itmap.Net)ixel"=* i#; r 2 pixel.1; g 2 pixel.N; b 2 pixel.0; byte2bool"r* re, rb#; Page 36/59 Steganography Project Report by www.programmer2programmer.net byte2bool"g* re, gb#; byte2bool"b* re, bb#; i, "= O D 22 3# { rb9layer: 2 t93:; gb9layer: 2 t94:; bb9layer: 2 t92:; & else i, "= O D 22 4# { rb9layer: 2 t9D:; gb9layer: 2 t96:; bb9layer: 2 t9P:; & else { rb9layer: 2 t95:; gb9layer: 2 t98:; & %olor result 2 %olor.From.rgb""int#bool2byte"rb#* "int#bool2byte"gb#* "int#bool2byte"bb##; output0itmap.Set)ixel"=* i* result#; & long tempFS 2 ,ileSi$e* tempF-S 2 ,ile-ameSi$e; r 2 "byte#"tempFS O 433#; tempFS '2 433; g 2 "byte#"tempFS O 433#; tempFS '2 433; b 2 "byte#"tempFS O 433#; %olor ,len%olor 2 %olor.From.rgb"r*g*b#; output0itmap.Set)ixel"widt E 4* eigt E 4* ,len%olor#; r 2 "byte#"tempF-S O 433#; tempF-S '2 433; g 2 "byte#"tempF-S O 433#; tempF-S '2 433; b 2 "byte#"tempF-S O 433#; %olor ,nlen%olor 2 %olor.From.rgb"r*g*b#; output0itmap.Set)ixel"widt E 2* eigt E 4* ,nlen%olor#; return output0itmap; & pri(ate (oid Decrypt+ayer"# { toolStripStatus+abel4.Text 2 ADecrypting... )lease waitA; .pplication.Do/(ents"#; int i* = 2 3; bool9: t 2 new bool9B:; bool9: rb 2 new bool9B:; bool9: gb 2 new bool9B:; bool9: bb 2 new bool9B:; Page 37/59 Steganography Project Report by www.programmer2programmer.net %olor pixel 2 new %olor"#; byte r* g* b; pixel 2 Decrypted0itmap.Net)ixel"widt E 4* eigt E 4#; long ,Si$e 2 pixel.1 @ pixel.N C 433 @ pixel.0 C 43333; pixel 2 Decrypted0itmap.Net)ixel"widt E 2* eigt E 4#; long ,-ameSi$e 2 pixel.1 @ pixel.N C 433 @ pixel.0 C 43333; byte9: res 2 new byte9,Si$e:; string resF-ame 2 AA; byte temp; ''1ead ,ile name! ,or "i 2 3; i L eigt MM i C "eigt ' D# L ,-ameSi$e; i@@# ,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D# L ,-ameSi$e; =@@# { pixel 2 Decrypted0itmap.Net)ixel"=* i#; r 2 pixel.1; g 2 pixel.N; b 2 pixel.0; byte2bool"r* re, rb#; byte2bool"g* re, gb#; byte2bool"b* re, bb#; i, "= O D 22 3# { t93: 2 rb98:; t94: 2 gb98:; t92: 2 bb98:; & else i, "= O D 22 4# { t9D: 2 rb98:; t96: 2 gb98:; t9P: 2 bb98:; & else { t95: 2 rb98:; t98: 2 gb98:; temp 2 bool2byte"t#; resF-ame @2 "car#temp; & & ''1ead ,ile on layer B "a,ter ,ile name#! int temp= 2 =; iEE; ,or "; i L eigt MM i C "eigt ' D# L ,Si$e @ ,-ameSi$e; i@@# ,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D# L "eigt C "widt ' D# C D# ' D E 4 MM i C "eigt ' D# @ "= ' D# L ,Si$e @ ,-ameSi$e; =@@# { i, "temp= J2 3# { Page 38/59 Steganography Project Report by www.programmer2programmer.net = 2 temp=; temp= 2 3; & pixel 2 Decrypted0itmap.Net)ixel"=* i#; r 2 pixel.1; g 2 pixel.N; b 2 pixel.0; byte2bool"r* re, rb#; byte2bool"g* re, gb#; byte2bool"b* re, bb#; i, "= O D 22 3# { t93: 2 rb98:; t94: 2 gb98:; t92: 2 bb98:; & else i, "= O D 22 4# { t9D: 2 rb98:; t96: 2 gb98:; t9P: 2 bb98:; & else { t95: 2 rb98:; t98: 2 gb98:; temp 2 bool2byte"t#; res9i C "eigt ' D# @ = ' D E ,-ameSi$e: 2 temp; & & ''1ead ,ile on oter layers! long readedOn+B 2 "eigt C "widt'D#CD# 'D E ,-ameSi$e E 4; ,or "int layer 2 5; layer F2 3 MM readedOn+B @ "5 E layer# C ""eigt C "widt ' D# C D# ' D E 4# L ,Si$e; layerEE# ,or "i 2 3; i L eigt MM i C "eigt ' D# @ readedOn+B @ "5 E layer# C ""eigt C "widt ' D# C D# ' D E 4# L ,Si$e; i@@# ,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D# @ readedOn+B @ "5 E layer# C ""eigt C "widt ' D# C D# ' D E 4# L ,Si$e; =@@# { pixel 2 Decrypted0itmap.Net)ixel"=* i#; r 2 pixel.1; g 2 pixel.N; b 2 pixel.0; byte2bool"r* re, rb#; byte2bool"g* re, gb#; byte2bool"b* re, bb#; i, "= O D 22 3# { t93: 2 rb9layer:; t94: 2 gb9layer:; t92: 2 bb9layer:; Page 39/59 Steganography Project Report by www.programmer2programmer.net & else i, "= O D 22 4# { t9D: 2 rb9layer:; t96: 2 gb9layer:; t9P: 2 bb9layer:; & else { t95: 2 rb9layer:; t98: 2 gb9layer:; temp 2 bool2byte"t#; res9i C "eigt ' D# @ = ' D @ "5 E layer# C ""eigt C "widt ' D# C D# ' D E 4# @ readedOn+B: 2 temp; & & i, "File./xists"DSa(eFile)at @ AKKA @ resF-ame## { Iessage0ox.Sow"AFile KAA @ resF-ame @ AKA already exist please coose anoter pat to sa(e ,ileA* A/rrorA*Iessage0ox0uttons.O>*Iessage0oxIcon./rror#; return; & else File.Write.ll0ytes"DSa(eFile)at @ AKKA @ resF-ame* res#; toolStripStatus+abel4.Text 2 ADecrypted ,ile as been success,ully sa(ed.A; .pplication.Do/(ents"#; & pri(ate (oid byte2bool"byte inp* re, bool9: outp# { i,"inpF23 MM inpL22PP# ,or "sort i 2 8; i F2 3; iEE# { i, "inp O 2 22 4# outp9i: 2 true; else outp9i: 2 ,alse; inp '2 2; & else trow new /xception"AInput number is illegal.A#; & pri(ate byte bool2byte"bool9: inp# { byte outp 2 3; ,or "sort i 2 8; i F2 3; iEE# { i, "inp9i:# outp @2 "byte#Iat.)ow"2.3* "double#"8Ei##; & Page 40/59 Steganography Project Report by www.programmer2programmer.net return outp; & pri(ate (oid Decrypt;btn;%lic<"ob=ect sender* /(ent.rgs e# { i, "DeSa(eFile;tbx.Text 22 String./mpty HH De+oadImage;tbx.Text 22 String./mpty# { Iessage0ox.Sow"AText boxes must not be emptyJA* A/rrorA* Iessage0ox0uttons.O>* Iessage0oxIcon./rror#;
return; & i, "System.IO.File./xists"De+oadImage;tbx.Text# 22 ,alse# { Iessage0ox.Sow"ASelect image ,ile.A* A/rrorA* Iessage0ox0uttons.O>* Iessage0oxIcon./xclamation#; De+oadImage;tbx.Focus"#; return; & Decrypt+ayer"#; & pri(ate (oid De+oadImage0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e# { i, "openFileDialogD.SowDialog"# 22 Dialog1esult.O># { D+oadImage)at 2 openFileDialogD.File-ame; De+oadImage;tbx.Text 2 D+oadImage)at; DecryptedImage 2 Image.FromFile"D+oadImage)at#; eigt 2 DecryptedImage.?eigt; widt 2 DecryptedImage.Widt; Decrypted0itmap 2 new 0itmap"DecryptedImage#; FileIn,o imgin, 2 new FileIn,o"D+oadImage)at#; ,loat ,s 2 ",loat#imgin,.+engt ' 4326; ImageSi$e;lbl.Text 2 smalldecimal",s.ToString"#* 2# @ A >0A; Image?eigt;lbl.Text 2 DecryptedImage.?eigt.ToString"# @ A )ixelA; ImageWidt;lbl.Text 2 DecryptedImage.Widt.ToString"# @ A )ixelA; double cansa(e 2 "B.3 C ""eigt C "widt ' D# C D# ' D E 4## ' 4326; %anSa(e;lbl.Text 2 smalldecimal"cansa(e.ToString"#* 2# @ A >0A; can)aint 2 true; tis.In(alidate"#; Page 41/59 Steganography Project Report by www.programmer2programmer.net & & pri(ate (oid DeSa(eFile0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e# { i, ",older0rowserDialog4.SowDialog"# 22 Dialog1esult.O># { DSa(eFile)at 2 ,older0rowserDialog4.Selected)at; DeSa(eFile;tbx.Text 2 DSa(eFile)at; & & pri(ate (oid Form4;)aint"ob=ect sender* )aint/(ent.rgs e# { i,"can)aint# try { i, "J/ncriptionDone# e.Nrapics.DrawImage"loadedTrueImage* pre(iewImage#; else e.Nrapics.DrawImage".,ter/ncryption* pre(iewImage#; & catc { e.Nrapics.DrawImage"DecryptedImage* pre(iewImage#; & & pri(ate string =ustF-ame"string pat# { string output; int i; i, "pat.+engt 22 D# '' i.e! A%!KKA return pat.Substring"3* 4#; ,or "i 2 pat.+engt E 4; i F 3; iEE# i, "pat9i: 22 GKKG# brea<; output 2 pat.Substring"i @ 4#; return output; & pri(ate string =ust/x"string ,-ame# { string output; int i; ,or "i 2 ,-ame.+engt E 4; i F 3; iEE# i, ",-ame9i: 22 G.G# brea<; output 2 ,-ame.Substring"i @ 4#; return output; & pri(ate (oid %lose;btn;%lic<"ob=ect sender* /(ent.rgs e# Page 42/59 Steganography Project Report by www.programmer2programmer.net { tis.%lose"#; & pri(ate (oid lin<+abel4;+in<%lic<ed"ob=ect sender* +in<+abel+in<%lic<ed/(ent.rgs e# {
System.Diagnostics.)rocess.Start"Attp!KKKKwww.programmer2programmer.netA#; & & & Page 43/59 Steganography Project Report by www.programmer2programmer.net 1$er Manual &hi i the .irt creen which ha two tab option one i 'ncrypt Image .or encryption an/ another i 4ecrypt image .or /ecryption. In right top pane7 i /ip7ay the in.ormation abo2t the image 2ch a iBe@ height an/ wi/th. Page 44/59 Steganography Project Report by www.programmer2programmer.net Encry%tion %. 6or 'ncryption e7ect 'ncrypt Image tab option. Page 45/59 Steganography Project Report by www.programmer2programmer.net 2. 6or 7oa/ image c7ic0 on b2tton 1BroweH that i neAt to the Doa/ Image teAtboA. &he .i7e open /ia7og boA wi77 /ip7ay a .o77ow@ e7ect the Image .i7e@ which yo2 want to 2e hi/e in.ormation an/ c7ic0 on )pen b2tton. Page 46/59 Steganography Project Report by www.programmer2programmer.net Page 47/59 Steganography Project Report by www.programmer2programmer.net 9. &he image .i7e wi77 opene/ an/ i /ip7ay a .o77ow. NeAt@ c7ic0 on 1BroweH b2tton that i neAt to the Doa/ 6i7e teAtboA. Page 48/59 Steganography Project Report by www.programmer2programmer.net #. Again the .i7e open /ia7og boA wi77 appear@ e7ect any type o. .i7e whatever yo2 want to hi/e with the image an/ c7ic0 on o0 b2tton. Page 49/59 Steganography Project Report by www.programmer2programmer.net :. &he neAt tep i to encrypt the .i7e. Now c7ic0 on 1'ncryptH b2tton@ it wi77 open the ave /ia7og boA which a0 yo2 to e7ect the path to ave the New image .i7e an/ the Image .i7e name. &he /e.a27t .ormat o. image .i7e i BMP. Page 50/59 Steganography Project Report by www.programmer2programmer.net Page 51/59 Steganography Project Report by www.programmer2programmer.net *ecry%tion %. Se7ect the 4ecryption Image tab option. Page 52/59 Steganography Project Report by www.programmer2programmer.net Page 53/59 Steganography Project Report by www.programmer2programmer.net 2. NeAt c7ic0 on the 1BroweH b2tton@ which open the )pen .i7e /ia7og boA@ here yo2 have to e7ect the image which i 'ncrypte/ an/ ha hi//en in.ormation .i7e. Se7ect the image .i7e an/ c7ic0 on )pen b2tton. Page 54/59 Steganography Project Report by www.programmer2programmer.net 9. &he image .i7e /ip7aye/ a .o77ow! Page 55/59 Steganography Project Report by www.programmer2programmer.net #. Now c7ic0 on 1BroweH b2tton which i neAt to 1Save .i7e toH teAtboA. It wi77 open a /ia7og boA that i 1Browe .or .o7/erH. It a0 yo2 to e7ect the path or .o7/er@ where yo2 want to eAtract the hi//en .i7e. Se7ect the .o7/er an/ c7ic0 on )0 b2tton.
:. Now c7ic0 on 4ecrypt b2tton@ it wi77 /ecrypt the image@ the hi//en .i7e an/ image .i7e i ave/ into e7ecte/ .o7/er. &he meage .or 2cce.27 /ecryption i /ip7aye/ on the tat2 bar which i p7ace at bottom o. the creen. Page 56/59 Steganography Project Report by www.programmer2programmer.net Page 57/59 Steganography Project Report by www.programmer2programmer.net /ummary Steganography i a rea77y intereting 2bject an/ o2ti/e o. the maintream cryptography an/ ytem a/minitration that mot o. 2 /ea7 with /ay a.ter /ay. Steganography can be 2e/ .or hi//en comm2nication. Ce have eAp7ore/ the 7imit o. teganography theory an/ practice. Ce printe/ o2t the enhancement o. the image teganography ytem 2ing DSB approach to provi/e a mean o. ec2re comm2nication. A tego"0ey ha been app7ie/ to the ytem /2ring embe/ment o. the meage into the cover image. &hi teganography app7ication o.tware provi/e/ .or the p2rpoe to how to 2e any type o. image .ormat to hi/ing any type o. .i7e ini/e their. &he mater wor0 o. thi app7ication i in 2pporting any type o. pict2re witho2t nee/ to convert to bitmap@ an/ 7ower 7imitation on .i7e iBe to hi/e@ beca2e o. 2ing maAim2m memory pace in pict2re to hi/e the .i7e. Since ancient time@ man ha .o2n/ a /eire in the abi7ity to comm2nicate covert7y. &he recent eAp7oion o. reearch in watermar0ing to protect inte77ect2a7 property i evi/ence that teganography i not j2t 7imite/ to mi7itary or epionage app7ication. Steganography@ 7i0e cryptography@ wi77 p7ay an increaing ro7e in the .2t2re o. ec2re comm2nication in the 1/igita7 wor7/H. Page 58/59 Steganography Project Report by www.programmer2programmer.net &ibliogra%hy .e"&ite& 6o77owing webite are re.erring to create thi project report. http!KKwww.goog7e.com http!KKwww.microo.t.com http!KKwww.programmer2programmer.net http!KKwww.co/eproject.com http!KKwww.ap.net http!KKwww.ap%29.com http!KKwww.wi0ipe/ia.org *oo/& 6o77owing boo0 an/ eboo0 are 2e/ to comp7ete thi project report. Matering -P EPaperbac0F SQD Server Bib7e EPaperbac0F .N'& B7ac0 Boo0 EPaperbac0F Pro.eiona7 -P@ 2n/ '/ition EPaperbac0F Pro.eiona7 ASP.N'& EPaperbac0F M-A4KM-S4 Se7."Pace/ &raining Iit! 4eve7oping Ceb App7ication with Microo.tR ,i2a7 BaicR .N'& an/ Microo.t ,i2a7 -PR .N'&@ Secon/ '/ition M-A4KM-S'KM-4BA Se7."Pace/ &raining Iit! Microo.t SQD Server 2$$$ 4atabae 4eign an/ Imp7ementation@ 'Aam <$"22?@ Secon/ '/ition Page 59/59 Steganography Project Report by www.programmer2programmer.net
Description of Knowledge, Attitude and Action of Mother on Care Diarrhea in Under-Five Children After Getting Educational Information Communication (KIE) with Integrated Media in Posyandu Merpati Working Area of Tanjung Pinang Public Health Centre Jambi City in 2019