You are on page 1of 59

Page 1/59

Steganography Project Report by www.programmer2programmer.net


STEGANOGRAPHY
(A new technique to hide information within image file)
Page 2/59
Steganography Project Report by www.programmer2programmer.net
STEGANOGRAPHY
(A new technique to hide information within image file)
A PROE!T REPORT
Su"mitted "#
Mr. Atanu Maity
in $artial fulfillment for the award of the degree
of

%!A (%a&ter of !om$uter A$$lication)
IN
MUMBAI
XXX Engineering College
XXXXXX Univerity ! XXXXX " #$$$$%
Page 3/59
Steganography Project Report by www.programmer2programmer.net
October - !"!
S&'(AN)(RAP*+ # A new technique to hide information
within image file
A PROE!T REPORT
Submitted by
%r' ATAN( %A)TY
in $artial fulfillment for the award of the degree
of
Ma$ter of Com%uter A%%lication
XXX ENGINEERING COLLEGE, XXXXX
MUMBAI UNI,'RSI&+!! MUMBAI #$$$$%
Page 4/59
Steganography Project Report by www.programmer2programmer.net
O!TO*ER +,-,
XXXXXX UNI,'RSI&+! XXXXXX #$$ $$%
&O'A()*E CE+,)()CA,E
-erti.ie/ that thi project report -..../teganogra%hy .......0
i the bona.i/e wor0 o. 1..........Mr. A,A'1 MA),2....0
who carrie/ o2t the project wor0 2n/er my 2perviion.
33Signat2re o. the *ea/ o. the 4epartment55 33Signat2re o. the S2pervior55
/)3'A,1+E /)3'A,1+E
33Name55 33Name55
4EA* O( ,4E *EPA+,ME', /1PE+5)/O+
33Aca/emic 4eignation55
334epartment55 334epartment55
336277 a//re o. the 4ept 8 -o77ege 55 336277 a//re o. the 4ept 8 -o77ege 55
Page 5/59
Steganography Project Report by www.programmer2programmer.net
Page 6/59
Steganography Project Report by www.programmer2programmer.net
,able of Content$
%. Abtract
2. )ntro/2ction
9. /ynopi
#. Prob7em /tatement
:. Objective
;. Overview
<. /teganography ,echni=2e
>. /teganography v Cryptography
?. /teganography v 6atermar0ing
%$. /ytem Ana7yi an/ *eign
%%. 1er Man2a7
%2. /2mmary

Page 7/59
Steganography Project Report by www.programmer2programmer.net
A&/,+AC,
Steganography i the art o. hi/ing the .act that comm2nication i ta0ing p7ace@ by hi/ing
in.ormation in other in.ormation. Many /i..erent carrier .i7e .ormat can be 2e/@ b2t /igita7
image are the mot pop27ar beca2e o. their .re=2ency on the internet. 6or hi/ing ecret
in.ormation in image@ there eAit a 7arge variety o. teganography techni=2e ome are more
comp7eA than other an/ a77 o. them have repective trong an/ wea0 point. 4i..erent
app7ication may re=2ire abo72te inviibi7ity o. the ecret in.ormation@ whi7e other re=2ire a
7arge ecret meage to be hi//en. &hi project report inten/ to give an overview o. image
teganography@ it 2e an/ techni=2e. It a7o attempt to i/enti.y the re=2irement o. a goo/
teganography a7gorithm an/ brie.7y re.7ect on which teganographic techni=2e are more
2itab7e .or which app7ication.
Page 8/59
Steganography Project Report by www.programmer2programmer.net
)',+O*1C,)O'
)ne o. the reaon that intr2/er can be 2cce.27 i the mot o. the in.ormation they ac=2ire
.rom a ytem i in a .orm that they can rea/ an/ comprehen/. Intr2/er may revea7 the
in.ormation to other@ mo/i.y it to mirepreent an in/ivi/2a7 or organiBation@ or 2e it to 7a2nch
an attac0. )ne o72tion to thi prob7em i@ thro2gh the 2e o. teganography. Steganography i a
techni=2e o. hi/ing in.ormation in /igita7 me/ia. In contrat to cryptography@ it i not to 0eep
other .rom 0nowing the hi//en in.ormation b2t it i to 0eep other .rom thin0ing that the
in.ormation even eAit.
Steganography become more important a more peop7e join the cyberpace revo72tion.
Steganography i the art o. concea7ing in.ormation in way that prevent the /etection o. hi//en
meage. Stegranography inc72/e an array o. ecret comm2nication metho/ that hi/e the
meage .rom being een or /icovere/.
42e to a/vance in I-&@ mot o. in.ormation i 0ept e7ectronica77y. -one=2ent7y@ the ec2rity o.
in.ormation ha become a .2n/amenta7 i2e. Bei/e cryptography@ treganography can be
emp7oye/ to ec2re in.ormation. In cryptography@ the meage or encrypte/ meage i
embe//e/ in a /igita7 hot be.ore paing it thro2gh the networ0@ th2 the eAitence o. the
meage i 2n0nown. Bei/e hi/ing /ata .or con.i/entia7ity@ thi approach o. in.ormation hi/ing
can be eAten/e/ to copyright protection .or /igita7 me/ia! a2/io@ vi/eo an/ image.
&he growing poibi7itie o. mo/ern comm2nication nee/ the pecia7 mean o. ec2rity
epecia77y on comp2ter networ0. &he networ0 ec2rity i becoming more important a the
n2mber o. /ata being eAchange/ on the internet increae. &here.ore@ the con.i/entia7ity an/
/ata integrity are re=2ire to protect againt 2na2thoriBe/ acce an/ 2e. &hi ha re27te/ in an
eAp7oive growth o. the .ie7/ o. in.ormation hi/ing
In.ormation hi/ing i an emerging reearch area@ which encompae app7ication 2ch a
copyright protection .or /igita7 me/ia@ watermar0ing@ .ingerprinting@ an/ teganography.
Page 9/59
Steganography Project Report by www.programmer2programmer.net
In watermar0ing app7ication@ the meage contain in.ormation 2ch a owner
i/enti.ication an/ a /igita7 time tamp@ which 22a77y app7ie/ .or copyright protection.
6ingerprint@ the owner o. the /ata et embe/ a eria7 n2mber that 2ni=2e7y i/enti.ie the
2er o. the /ata et. &hi a// to copyright in.ormation to ma0e it poib7e to trace any
2na2thoriBe/ 2e/ o. the /ata et bac0 to the 2er.
Steganography hi/e the ecrete meage within the hot /ata et an/ preence
imperceptib7e an/ i to be re7iab7y comm2nicate/ to a receiver. &he hot /ata et i p2rpoe7y
corr2pte/@ b2t in a covert way@ /eigne/ to be inviib7e to an in.ormation ana7yi.

Page 10/59
Steganography Project Report by www.programmer2programmer.net
/2'OP/)/
Pro7ect 'ame8 /,E3A'O3+AP42
Pro7ect Member$8
&hi project i /one in a gro2p o. two peop7e. Project member are.
%. Atan2 Maity
2. Prabha -ho2/hary
Page 11/59
Steganography Project Report by www.programmer2programmer.net
6hat i$ /teganogra%hy9
Steganography i the practice o. hi/ing private or enitive in.ormation within omething that
appear to be nothing o2t to the 22a7. Steganography i o.ten con.2e/ with crypto7ogy beca2e
the two are imi7ar in the way that they both are 2e/ to protect important in.ormation. &he
/i..erence between two i that teganography invo7ve hi/ing in.ormation o it appear that no
in.ormation i hi//en at a77. I. a peron or peron view the object that the in.ormation i hi//en
ini/e o. he or he wi77 have no i/ea that there i any hi//en in.ormation@ there.ore the peron
wi77 not attempt to /ecrypt the in.ormation.
Chat teganography eentia77y /oe i eAp7oit h2man perception@ h2man ene are not traine/
to 7oo0 .or .i7e that have in.ormation ini/e o. them@ a7tho2gh thi o.tware i avai7ab7e that can
/o what i ca77e/ Steganography. &he mot common 2e o. teganography i to hi/e a .i7e ini/e
another .i7e.
Page 12/59
Steganography Project Report by www.programmer2programmer.net
4i$tory of /teganogra%hy8
&hro2gh o2t hitory Steganography ha been 2e/ to ecret7y comm2nicate in.ormation between
peop7e.
Some eAamp7e o. 2e o. Steganography i pat time are!
%. 42ring Cor7/ Car 2 inviib7e in0 wa 2e/ to write in.ormation on piece o. paper o
that the paper appeare/ to the average peron a j2t being b7an0 piece o. paper. Di=2i/
2ch a mi70@ vinegar an/ .r2it j2ice were 2e/@ beca2e when each one o. thee
2btance are heate/ they /ar0en an/ become viib7e to the h2man eye.
2. In Ancient (reece they 2e/ to e7ect meenger an/ have their hea/@ they wo27/ then
write a meage on their hea/. )nce the meage ha/ been written the hair wa a77owe/
to grow bac0. A.ter the hair grew bac0 the meenger wa ent to /e7iver the meage@
the recipient wo27/ have o.. the meenger hair to ee the ecrete meage.
9. Another metho/ 2e/ in (reece wa where omeone wo27/ pee7 waA o.. a tab7et that wa
Page 13/59
Steganography Project Report by www.programmer2programmer.net
6hy ,hi$ /teganogra%hy9
&hi techni=2e i choen@ beca2e thi ytem inc72/e not on7y imperceptibi7ity b2t a7o 2n"
/e7ectabi7ity by any tegano7yi too7.
Pro7ect /co%e8
&hi project i /eve7ope/ .or hi/ing in.ormation in any image .i7e. &he cope o. the project i
imp7ementation o. teganography too7 .or hi/ing in.ormation inc72/e any type o. in.ormation
.i7e an/ image .i7e an/ the path where the 2er want to ave Image an/ eAtr2/e/ .i7e.
Methodology8
Uer nee/ to r2n the app7ication. &he 2er ha two tab option encrypt an/ /ecrypt. I. 2er
e7ect encrypt@ app7ication give the creen to e7ect image .i7e@ in.ormation .i7e an/ option to ave
the image .i7e. I. 2er e7ect /ecrypt@ app7ication give the creen to e7ect on7y image .i7e an/
a0 path where 2er want to ave the ecrete .i7e.
&hi project ha two metho/ 'ncrypt an/ 4ecrypt.
In encryption the ecrete in.ormation i hi/ing in with any type o. image .i7e.
4ecryption i getting the ecrete in.ormation .rom image .i7e.
Page 14/59
Steganography Project Report by www.programmer2programmer.net
/oftware +equirement$8
.'E, (ramewor: ;.<
4ardware +equirement$8
Proce$$or8 Preferably ".! 34= or 3reater.
+AM 8 <" M& or 3reater.
>imitation$ of the /oftware8
&hi project ha an a2mption that i both the en/er an/ receiver m2t have hare/ ome ecret
in.ormation be.ore imprionment. P2re teganography mean that there i none prior in.ormation
hare/ by two comm2nication partie.
Page 15/59
Steganography Project Report by www.programmer2programmer.net
*etecting /teganogra%hy8
&he art o. /etecting Steganography i re.erre/ to a /teganaly$i$.
&o p2t i imp7y Stegana7yi invo7ve /etecting the 2e o. Steganography ini/e o. a .i7e.
Stegana7yi /oe not /ea7 with trying to /ecrypt the hi//en in.ormation ini/e o. a .i7e@ j2t
/icovering it.
&here are many metho/ that can be 2e/ to /etect Steganography 2ch a!
1,iewing the .i7e an/ comparing it to another copy o. the .i7e .o2n/ on the Internet EPict2re .i7eF.
&here are 22a77y m27tip7e copie o. image on the internet@ o yo2 may want to 7oo0 .or evera7
o. them an/ try an/ compare the 2pect .i7e to them. 6or eAamp7e i. yo2 /own7oa/ a GP'4 an/
yo2r 2pect .i7e i a7o a GP'4 an/ the two .i7e 7oo0 a7mot i/entica7 apart .rom the .act that
one i 7arger than the other@ it i mot probab7e yo2 2pect .i7e ha hi//en in.ormation ini/e o.
it.
(uture Enhancement$8
&o ma0e it p2re teganography app7ication.
Page 16/59
Steganography Project Report by www.programmer2programmer.net
Problem /tatement:
&he .ormer conit o. 7ing2itic or 7ang2age .orm o. hi//en writing. &he 7ater@ 2ch a inviib7e
in0@ try o. hi/e meage phyica77y. )ne /ia/vantage o. 7ing2itic teganography i that 2er
m2t e=2ip theme7ve to have a goo/ 0now7e/ge o. 7ing2itry. In recent year@ everything i
tren/ing towar/ /igitiBation. An/ with the /eve7opment o. the internet techno7ogy@ /igita7 me/ia
can be tranmitte/ convenient7y over the networ0. &here.ore@ meage can be ecret7y carrie/ by
/igita7 me/ia by 2ing the teganography techni=2e@ an/ then be tranmitte/ thro2gh the
internet rapi/7y
Steganography i the art o. hi/ing the .act that comm2nication i ta0ing p7ace@ by hi/ing
in.ormation in other in.ormation. Many /i..erent carrier .i7e .ormat can be 2e/@ b2t /igita7
image are the mot pop27ar beca2e o. their .re=2ency on the internet. 6or hi/ing ecret
in.ormation in image@ there eAit a 7arge variety o. teganography techni=2e ome are more
comp7eA than other an/ a77 o. them have repective trong an/ wea0 point.
So we prepare thi app7ication@ to ma0e the in.ormation hi/ing more imp7e an/ 2er .rien/7y.
Page 17/59
Steganography Project Report by www.programmer2programmer.net
Ob7ecti?e
&he goa7 o. teganography i covert comm2nication. So@ a .2n/amenta7 re=2irement o. thi
teganography ytem i that the hi/er meage carrie/ by tego"me/ia ho27/ not be enib7e to
h2man being.
&he other goa/ o. teganography i to avoi/ /rawing 2picion to the eAitence o. a hi//en
meage. &hi approach o. in.ormation hi/ing techni=2e ha recent7y became important in a
n2mber o. app7ication area
&hi project ha .o77owing objective!
&o pro/2ct ec2rity too7 bae/ on teganography techni=2e.
&o eAp7ore techni=2e o. hi/ing /ata 2ing encryption mo/27e o. thi project
&o eAtract techni=2e o. getting ecret /ata 2ing /ecryption mo/27e.
Steganography ometime i 2e/ when encryption i not permitte/. )r@ more common7y@
teganography i 2e/ to 2pp7ement encryption. An encrypte/ .i7e may ti77 hi/e in.ormation
2ing teganography@ o even i. the encrypte/ .i7e i /eciphere/@ the hi//en meage i not een
Page 18/59
Steganography Project Report by www.programmer2programmer.net
O?er?iew
&he wor/ teganography come .rom the (ree0 1SeganoH@ which mean covere/ or ecret an/
1graphyH mean writing or /rawing. &here.ore@ teganography mean@ 7itera77y@ covere/ writing. It
i the art an/ cience o. hi/ing in.ormation 2ch it preence cannot be /etecte/ an/ a
comm2nication i happening. A ecrete in.ormation i enco/ing in a manner 2ch that the very
eAitence o. the in.ormation i concea7e/. Paire/ with eAiting comm2nication metho/@
teganography can be 2e/ to carry o2t hi//en eAchange.
&he main goa7 o. thi project it to comm2nicate ec2re7y in a comp7ete7y 2n/etectab7e manner
an/ to avoi/ /rawing 2picion to the tranmiion o. a hi/er /ata. &here ha been a rapi/ growth
o. interet in teganography .or two reaon!
&he p2b7ihing an/ broa/cating in/2trie have become interete/ in techni=2e .or hi/ing
encrypte/ copyright mar0 an/ eria7 n2mber in /igita7 .i7m@ a2/io recor/ing@ boo0 an/
m27time/ia pro/2ct
Move by vario2 government to retrict the avai7abi7ity o. encryption ervice have motivate/
peop7e to t2/y metho/ by which private meage can be embe//e/ in eeming7y innoc2o2
cover meage.
&he baic mo/e7 o. teganography conit o. -arrier@ Meage an/ pawor/. -arrier i a7o
0nown a cover"object@ which the meage i embe//e/ an/ erve to hi/e the preence o. the
meage.
Page 19/59
Steganography Project Report by www.programmer2programmer.net
Baica77y@ the mo/e7 .or teganography i hown on .o77owing .ig2re!
Meage i the /ata that the en/er wihe to remain it con.i/entia7. It can be p7ain teAt@
cipherteAt@ other image@ or anything that can be embe//e/ in a bit tream 2ch a a copyright
mar0@ a covert comm2nication@ or a eria7 n2mber. Pawor/ i 0nown a stego-key@ which
en2re that on7y recipient who 0now the correpon/ing /eco/ing 0ey wi77 be ab7e to eAtract the
meage .rom a o!e"-ob#et. &he o!e"-ob#et with the ecret7y embe//e/ meage i then
ca77e/ the Stego-ob#et.
Recovering meage .rom a stego-ob#et re=2ire the o!e"-ob#et ite7t an/ a correpon/ing
/eco/ing 0ey i. a stego-key wa 2e/ /2ring the enco/ing proce. &he origina7 image may or
may not be re=2ire/ in mot app7ication to eAtract the meage.
&here are evera7 2itab7e carrier be7ow to be the o!e"-ob#et:
Networ0 protoco7 2ch a &-P@ IP an/ U4P
A2/io that 2ing /igita7 a2/io .ormat 2ch a wav@ mi/i@ avi@ mpeg@ mpi an/ voc
6i7e an/ 4i0 that can hi/e an/ appen/ .i7e by 2ing the 7ac0 pace
-over"object@
-
Meage@ M
Stego"0ey@ I
((X@M@A)
Stego )bject@ J
Page 20/59
Steganography Project Report by www.programmer2programmer.net
&eAt 2ch a n277 character@ j2t a7i0e more co/e inc72/ing htm7 an/ java
Image .i7e 2ch a bmp@ gi. an/ jpg@ where they can be both co7or an/ gray"ca7e.
In genera7@ the in.ormation hi/ing proce eAtract re/2n/ant bit .rom o!e"-ob#et$ &he proce
conit o. two tep!
I/enti.ication o. re/2n/ant bit in a o!e"-ob#et$ Re/2n/ant bit are thoe bit
that can be mo/i.ie/ witho2t corr2pting the =2a7ity or /etroying the integrity o.
the o!e"-ob#et$
'mbe//ing proce then e7ect the 2bet o. the re/2n/ant bit to be rep7ace/
with /ata .rom a ecret meage. &he stego-ob#et i create/ by rep7acing the
e7ecte/ re/2n/ant bit with meage bit
Page 21/59
Steganography Project Report by www.programmer2programmer.net
/teganogra%hy ?$ Cry%togra%hy8
Baica77y@ the p2rpoe o. cryptography an/ teganography i to provi/e ecret comm2nication.
*owever@ teganography i not the ame a cryptography. -ryptography hi/e the content o. a
ecrete meage .rom a ma7icio2 peop7e@ wherea teganography even concea7 the eAitence o.
the meage. In cryptography@ the ytem i bro0en when the attac0er can rea/ the ecret
meage. Brea0ing a teganography ytem nee/ the attac0er to /etect that teganography ha
been 2e/.
It i poib7e to combine the techni=2e by encrypting meage 2ing cryptography an/ then
hi/ing the encrypte/ meage 2ing teganography. &he re27ting tego"image can be tranmitte/
witho2t revea7ing that ecret in.ormation i being eAchange/.
Page 22/59
Steganography Project Report by www.programmer2programmer.net
/teganogra%hy ?$ 6atermar:ing8
Steganography pay attention to the /egree o. Inviibi7ity whi7e watermar0ing pay mot o. it
attrib2te to the rob2tne o. the meage an/ it abi7ity to withtan/ attac0 o. remova7@ 2ch a
image operationErotation@ cropping@ .i7teringF@ a2/io operationErerecor/ing@ .i7teringFin the cae
o. image an/ a2/io .i7e being watermar0e/ repective7y.
It i a non"=2etionab7e .act that /e7ectabi7ity o. a vee7 with an intro/2ce/ /ata Eteganographic
meage or a watermar0F i a .2nction o. the changeabi7ity .2nction o. the a7gorithm over the
vee7.
&hat i the way the a7gorithm change the vee7 an/ the everity o. 2ch an operation
/etermine with no /o2bt the /e7ectabi7ity o. the meage@ ince /e7ectabi7ity i a .2nction o. .i7e
characteritic /eviation .rom the norm@ embe//ing operation attit2/e an/ change everity o.
2ch change /eci/e vee7 .i7e /e7ectabi7ity.
A typica7 triang7e o. con.7ict i meage Inviibi7ity@ Rob2tne@ an/ Sec2rity. Inviibi7ity i a
mea2re o. the in notabi7ity o. the content o. the meage within the vee7.
Sec2rity i inomino2 to the cryptographic i/ea to meage ec2rity@ meaning inabi7ity o.
recontr2ction o. the meage witho2t the proper ecret 0ey materia7 hare/.
Inviibi7ity
Rob2tne
Sec2rity
Page 23/59
Steganography Project Report by www.programmer2programmer.net
Rob2tne re.er to the en/2rance capabi7ity o. the meage to 2rvive /itortion or remova7
attac0 intact. It i o.ten 2e/ in the watermar0ing .ie7/ ince watermar0ing ee0 the peritence
o. the watermar0 over attac0@ teganographic meage on the other han/ ten/ to be o. high
enitivity to 2ch attac0. &he more inviib7e the meage i the 7e ec2re it i Ecryptography
nee/ paceF an/ the 7e rob2t it i Eno error chec0ingKrecovery intro/2ce/F.&he more rob2t
the meage i embe//e/ the more iBe it re=2ire an/ the more viib7e it i.
Page 24/59
Steganography Project Report by www.programmer2programmer.net
/teganogra%hy ,echnique$8
)ver the pat .ew year@ n2mero2 teganography techni=2e that embe/ hi//en meage in
m27time/ia object have been propoe/. &here have been many techni=2e .or hi/ing
in.ormation or meage in image in 2ch a manner that a7teration ma/e to the image i
percept2a77y in/icernib7e. -ommon7y approache are inc72/e DSB@ Ma0ing an/ .i7tering an/
&ran.orm techni=2e.
Deat igni.icant bit EDSBF inertion i a imp7e approach to embe//ing in.ormation in image
.i7e. &he imp7et teganography techni=2e embe/ the bit o. the meage /irect7y into 7eat
igni.icant bit p7ane o. the cover"image in a
/eterminitic e=2ence. Mo/27ating the 7eat igni.icant bit /oe not re27t in h2man perceptib7e
/i..erence beca2e the amp7it2/e o. the change i ma77. In thi techni=2e@ the embe//ing
capacity can be increae/ by 2ing two or more 7eat igni.icant bit. At the ame time@ not on7y
the ri0 o. ma0ing the embe//e/ meage tatitica77y /etectab7e increae b2t a7o the image
.i/e7ity /egra/e. *ence a variab7e iBe DSB embe//ing chema i preente/@ in which the
n2mber o. DSB 2e/ .or meage embe//ingKeAtracting /epen/ on the 7oca7 characteritic o.
the piAe7. &he a/vantage o. DSB"bae/ metho/ i eay to imp7ement an/ high meage pay"
7oa/.
A7tho2gh DSB hi/e the meage in 2ch way that the h2man /o not perceive it@ it i ti77
poib7e .or the opponent to retrieve the meage /2e to the imp7icity o. the techni=2e.
&here.ore@ ma7icio2 peop7e can eai7y try to eAtract the meage .rom the beginning o. the
image i. they are 2picio2 that there eAit ecret in.ormation that wa embe//e/ in the image.
&here.ore@ a ytem name/ Sec2re In.ormation *i/ing Sytem ESI*SF i propoe/ to improve
the DSB cheme. It overcome the e=2ence"mapping prob7em by embe//ing the maage into a
et o. ran/om piAe7@ which are cattere/ on the cover"image.
Ma0ing an/ .i7tering techni=2e@ 22a77y retricte/ to 2# bit an/ gray ca7e image@ hi/e
in.ormation by mar0ing an image@ in a manner imi7ar to paper watermar0. &he techni=2e
Page 25/59
Steganography Project Report by www.programmer2programmer.net
per.orm ana7yi o. the image@ th2 embe/ the in.ormation in igni.icant area o that the hi//en
meage i more integra7 to cover image than j2t hi/ing it in the noie 7eve7.
&ran.orm techni=2e embe/ the meage by mo/27ating coe..icient in a tran.orm /omain@ 2ch
a the 4icrete 6o2rier &ran.orm@ or Cave7et &ran.orm. &hee metho/ hi/e meage in
igni.icant area o. the cover image@ which ma0e them more rob2t to attac0. &ran.ormation
can be app7ie/ over the entire image@ to b7oc0 thro2gho2t the image@ or other variant.
Page 26/59
Steganography Project Report by www.programmer2programmer.net
)mage /teganogra%hy and bitma% %icture$8
Uing bitmap pict2re .or hi/ing ecret in.ormation i one o. mot pop27ar choice .or
Steganography. Many type o. o.tware b2i7t .or thi p2rpoe@ ome o. thee o.tware 2e
pawor/ protection to encrypting in.ormation on pict2re. &o 2e thee o.tware yo2 m2t have a
LBMPM .ormat o. a pict2re to 2e it@ b2t 2ing other type o. pict2re 7i0e 1GP'(H@ 1(I6H or any
other type i rather or never 2e/@ beca2e o. a7gorithm o. 1BMPH pict2re .or Steganography i
imp7e. A7o we 0now that in the web mot pop27ar o. image type are 1GP'(H an/ other type
not 1BPMH@ o we ho27/ have a o72tion .or thi prob7em.
&hi o.tware provi/e the o72tion o. thi prob7em@ it can accept any type o. image to hi/e
in.ormation .i7e@ b2t .ina77y it give the on7y 1BMPH image a an o2tp2t that ha hi//en .i7e ini/e
it.
Page 27/59
Steganography Project Report by www.programmer2programmer.net
&itma% /teganogra%hy8
Bitmap type i the imp7et type o. pict2re beca2e that it /oenMt have any techno7ogy .or
/ecreaing .i7e iBe. Str2ct2re o. thee .i7e i that a bitmap image create/ .rom piAe7 that any
piAe7 create/ .rom three co7or E re/@ green an/ b72e ai/ R(BF each co7or o. a piAe7 i one byte
in.ormation that how the /enity o. that co7or. Merging thee three co7or ma0e every co7or
that we ee in thee pict2re. Ce 0now that every byte in comp2ter cience i create/ .rom > bit
that .irt bit i Mot"Signi.icant"Bit EMSBF an/ 7at bit Deat"Signi.icant"Bit EDSBF@ the i/ea o.
2ing Steganography cience i in thi p7aceN we 2e DSB bit .or writing o2r ec2rity in.ormation
ini/e BMP pict2re. So i. we j2t 2e 7at 7ayer E>t 7ayarF o. in.ormation@ we ho27/ change the
7at bit o. piAe7@ in other han/ we have 9 bit in each piAe7 o we have 9OhightOwi/th bit
memory to write o2r in.ormation. B2t be.ore writing o2r /ata we m2t write name o. /ataE.i7eF@
iBe o. name o. /ata 8 iBe o. /ata. Ce can /o thi by aigning ome .irt bit o. memory E>t
7ayerF.
(!!"!""!" !!!"""!" ""!"""!!)
("!"!!""! ""!!!"!" !!!!""!!)
(""!"!!"! "!"!""!! !""!!!"")
Uing each 9 piAe7 o. pict2re to ave a byte o. /ata
Page 28/59
Steganography Project Report by www.programmer2programmer.net
/y$tem Analy$i$ B *e$ign
Steganography ytem re=2ire any type o. image .i7e an/ the in.ormation or meage that i to
be hi//en. It ha two mo/27e encrypt an/ /ecrypt.
Microo.t .Net .ramewor0 prepare a h2ge amo2nt o. too7 an/ option .or programmer that they
imp7e programming. )ne o. .Net too7 .or pict2re an/ image i a2to"converting mot type o.
pict2re to BMP .ormat. I 2e/ thi too7 in thi o.tware ca77e/ 1SteganographyH that i written in
-P.Net 7ang2age an/ yo2 can 2e thi o.tware to hi/e yo2r in.ormation in any type o. pict2re
witho2t any converting it .ormat to BMP Eo.tware convert ini/e itF.
&he a7gorithm 2e/ .or 'ncryption an/ 4ecryption in thi app7ication provi/e 2ing evera7
7ayer 7ie2 o. 2ing on7y DSB 7ayer o. image. Criting /ata tart .rom 7at 7ayer E>t or DSB
7ayerFN beca2e igni.icant o. thi 7ayer i 7eat an/ every 2pper 7ayer ha /o2b7e/ igni.icant
.rom it /own 7ayer. So every tep we go to 2pper 7ayer image =2a7ity /ecreae an/ image
reto2ching tranpire.
&he encrypt mo/27e i 2e/ to hi/e in.ormation into the imageN no one can ee that in.ormation
or .i7e. &hi mo/27e re=2ire any type o. image an/ meage an/ give the on7y one image .i7e in
/etination.
&he /ecrypt mo/27e i 2e/ to get the hi//en in.ormation in an image .i7e. It ta0e the image .i7e
a an o2tp2t@ an/ give two .i7e at /etination .o7/er@ one i the ame image .i7e an/ another i the
meage .i7e that i hi//en it that.
Be.ore encrypting .i7e ini/e image we m2t ave name an/ iBe o. .i7e in a /e.inite p7ace o.
image. Ce co27/ ave .i7e name be.ore .i7e in.ormation in DSB 7ayer an/ ave .i7e iBe an/ .i7e
name iBe in mot right"/own piAe7 o. image. Criting thi in.ormation i nee/e/ to retrieve .i7e
.rom encrypte/ image in /ecryption tate.
&he graphica7 repreentation o. thi ytem i a .o77ow!
Page 29/59
Steganography Project Report by www.programmer2programmer.net

/tart A%%lication
'ncryption
4ecryption
Image .i7e
BMP image .i7e
Image Meage .i7e

Page 30/59
Steganography Project Report by www.programmer2programmer.net
Encry%tion Proce$$
)MA3E ()>E )'(O+MA,)O' ()>E


&MP ()>E

Page 31/59
Steganography Project Report by www.programmer2programmer.net
*ecry%tion Proce$$
&MP ()>E

)'(O+MA,)O' ()>E )MA3E ()>E

Page 32/59
Steganography Project Report by www.programmer2programmer.net
Code Analy$i$
using System;
using System.Drawing;
using System.Windows.Forms;
using System.IO;
namespace Text2Image
{
public partial class FrmSteganograpy ! Form
{
public FrmSteganograpy"#
{
Initiali$e%omponent"#;
&
''public (alues!
string loadedTrueImage)at* loadedFile)at*
sa(eToImage*D+oadImage)at*DSa(eFile)at;
int eigt* widt;
long ,ileSi$e* ,ile-ameSi$e;
Image loadedTrueImage* DecryptedImage *.,ter/ncryption;
0itmap loadedTrue0itmap* Decrypted0itmap;
1ectangle pre(iewImage 2 new 1ectangle"23*453*673*683#;
bool can)aint 2 ,alse* /ncriptionDone 2 ,alse;
byte9: ,ile%ontainer;
pri(ate (oid /nImage0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e#
{
i, "openFileDialog4.SowDialog"# 22 Dialog1esult.O>#
{
loadedTrueImage)at 2 openFileDialog4.File-ame;
/nImage;tbx.Text 2 loadedTrueImage)at;
loadedTrueImage 2 Image.FromFile"loadedTrueImage)at#;
eigt 2 loadedTrueImage.?eigt;
widt 2 loadedTrueImage.Widt;
loadedTrue0itmap 2 new 0itmap"loadedTrueImage#;
FileIn,o imgin, 2 new FileIn,o"loadedTrueImage)at#;
,loat ,s 2 ",loat#imgin,.+engt ' 4326;
ImageSi$e;lbl.Text 2 smalldecimal",s.ToString"#* 2# @ A >0A;
Image?eigt;lbl.Text 2 loadedTrueImage.?eigt.ToString"# @ A
)ixelA;
ImageWidt;lbl.Text 2 loadedTrueImage.Widt.ToString"# @ A
)ixelA;
double cansa(e 2 "B.3 C ""eigt C "widt ' D# C D# ' D E 4##
' 4326;
%anSa(e;lbl.Text 2 smalldecimal"cansa(e.ToString"#* 2# @ A
>0A;
can)aint 2 true;
tis.In(alidate"#;
&
Page 33/59
Steganography Project Report by www.programmer2programmer.net
&
pri(ate string smalldecimal"string inp* int dec#
{
int i;
,or "i 2 inp.+engt E 4; i F 3; iEE#
i, "inp9i: 22 G.G#
brea<;
try
{
return inp.Substring"3* i @ dec @ 4#;
&
catc
{
return inp;
&
&
pri(ate (oid /nFile0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e#
{
i, "openFileDialog2.SowDialog"# 22 Dialog1esult.O>#
{
loadedFile)at 2 openFileDialog2.File-ame;
/nFile;tbx.Text 2 loadedFile)at;
FileIn,o ,in,o 2 new FileIn,o"loadedFile)at#;
,ileSi$e 2 ,in,o.+engt;
,ile-ameSi$e 2 =ustF-ame"loadedFile)at#.+engt;
&
&
pri(ate (oid /ncrypt;btn;%lic<"ob=ect sender* /(ent.rgs e#
{
i, "sa(eFileDialog4.SowDialog"# 22 Dialog1esult.O>#
{
sa(eToImage 2 sa(eFileDialog4.File-ame;
&
else
return;
i, "/nImage;tbx.Text 22 String./mpty HH /nFile;tbx.Text 22
String./mpty#
{
Iessage0ox.Sow"A/ncrypton in,ormation is incompleteJKn)lease
complete tem ,rist.A* A/rrorA* Iessage0ox0uttons.O>* Iessage0oxIcon./rror#;
&
i, "BC""eigt C "widt'D#CD#'D E 4# L ,ileSi$e @ ,ile-ameSi$e#
{
Iessage0ox.Sow"AFile si$e is too largeJKn)lease use a larger
image to ide tis ,ile.A* A/rrorA* Iessage0ox0uttons.O>*
Iessage0oxIcon./rror#;
return;
&
,ile%ontainer 2 File.1ead.ll0ytes"loadedFile)at#;
/ncrypt+ayer"#;
&
Page 34/59
Steganography Project Report by www.programmer2programmer.net
pri(ate (oid /ncrypt+ayer"#
{
toolStripStatus+abel4.Text 2A/ncrypting... )lease waitA;
.pplication.Do/(ents"#;
long FSi$e 2 ,ileSi$e;
0itmap canged0itmap 2 /ncrypt+ayer"B* loadedTrue0itmap* 3*
"eigt C "widt'D#CD# ' D E ,ile-ameSi$e E 4* true#;
FSi$e E2 "eigt C "widt ' D# C D# ' D E ,ile-ameSi$e E 4;
i,"FSi$e F 3#
{
,or "int i 2 8; i F2 3 MM FSi$e F 3; iEE#
{
canged0itmap 2 /ncrypt+ayer"i* canged0itmap* """B E i#
C eigt C "widt ' D# C D# ' D E ,ile-ameSi$e E "B E i##* """7 E i# C eigt
C "widt ' D# C D# ' D E ,ile-ameSi$e E "7 E i##* ,alse#;
FSi$e E2 "eigt C "widt ' D# C D# ' D E 4;
&
&
canged0itmap.Sa(e"sa(eToImage#;
toolStripStatus+abel4.Text 2 A/ncrypted image as been
success,ully sa(ed.A;
/ncriptionDone 2 true;
.,ter/ncryption 2 Image.FromFile"sa(eToImage#;
tis.In(alidate"#;
&
pri(ate 0itmap /ncrypt+ayer"int layer* 0itmap input0itmap* long
start)osition* long end)osition* bool writeFile-ame#
{
0itmap output0itmap 2 input0itmap;
layerEE;
int i 2 3* = 2 3;
long F-Si$e 2 3;
bool9: t 2 new bool9B:;
bool9: rb 2 new bool9B:;
bool9: gb 2 new bool9B:;
bool9: bb 2 new bool9B:;
%olor pixel 2 new %olor"#;
byte r* g* b;
i, "writeFile-ame#
{
F-Si$e 2 ,ile-ameSi$e;
string ,ile-ame 2 =ustF-ame"loadedFile)at#;
''write ,ile-ame!
,or "i 2 3; i L eigt MM i C "eigt ' D# L ,ile-ameSi$e; i@
@#
,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @
"= ' D# L ,ile-ameSi$e; =@@#
{
Page 35/59
Steganography Project Report by www.programmer2programmer.net
byte2bool""byte#,ile-ame9i C "eigt ' D# @ = ' D:*
re, t#;
pixel 2 input0itmap.Net)ixel"=* i#;
r 2 pixel.1;
g 2 pixel.N;
b 2 pixel.0;
byte2bool"r* re, rb#;
byte2bool"g* re, gb#;
byte2bool"b* re, bb#;
i, "= O D 22 3#
{
rb98: 2 t93:;
gb98: 2 t94:;
bb98: 2 t92:;
&
else i, "= O D 22 4#
{
rb98: 2 t9D:;
gb98: 2 t96:;
bb98: 2 t9P:;
&
else
{
rb98: 2 t95:;
gb98: 2 t98:;
&
%olor result 2 %olor.From.rgb""int#bool2byte"rb#*
"int#bool2byte"gb#* "int#bool2byte"bb##;
output0itmap.Set)ixel"=* i* result#;
&
iEE;
&
''write ,ile "a,ter ,ile name#!
int temp= 2 =;
,or "; i L eigt MM i C "eigt ' D# L end)osition E
start)osition @ F-Si$e MM start)osition @ i C "eigt ' D# L ,ileSi$e @
F-Si$e; i@@#
,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D#
L end)osition E start)osition @ F-Si$e MM start)osition @ i C "eigt ' D# @
"= ' D# L ,ileSi$e @ F-Si$e; =@@#
{
i, "temp= J2 3#
{
= 2 temp=;
temp= 2 3;
&
byte2bool""byte#,ile%ontainer9start)osition @ i C "eigt
' D# @ = ' D E F-Si$e:* re, t#;
pixel 2 input0itmap.Net)ixel"=* i#;
r 2 pixel.1;
g 2 pixel.N;
b 2 pixel.0;
byte2bool"r* re, rb#;
Page 36/59
Steganography Project Report by www.programmer2programmer.net
byte2bool"g* re, gb#;
byte2bool"b* re, bb#;
i, "= O D 22 3#
{
rb9layer: 2 t93:;
gb9layer: 2 t94:;
bb9layer: 2 t92:;
&
else i, "= O D 22 4#
{
rb9layer: 2 t9D:;
gb9layer: 2 t96:;
bb9layer: 2 t9P:;
&
else
{
rb9layer: 2 t95:;
gb9layer: 2 t98:;
&
%olor result 2 %olor.From.rgb""int#bool2byte"rb#*
"int#bool2byte"gb#* "int#bool2byte"bb##;
output0itmap.Set)ixel"=* i* result#;
&
long tempFS 2 ,ileSi$e* tempF-S 2 ,ile-ameSi$e;
r 2 "byte#"tempFS O 433#;
tempFS '2 433;
g 2 "byte#"tempFS O 433#;
tempFS '2 433;
b 2 "byte#"tempFS O 433#;
%olor ,len%olor 2 %olor.From.rgb"r*g*b#;
output0itmap.Set)ixel"widt E 4* eigt E 4* ,len%olor#;
r 2 "byte#"tempF-S O 433#;
tempF-S '2 433;
g 2 "byte#"tempF-S O 433#;
tempF-S '2 433;
b 2 "byte#"tempF-S O 433#;
%olor ,nlen%olor 2 %olor.From.rgb"r*g*b#;
output0itmap.Set)ixel"widt E 2* eigt E 4* ,nlen%olor#;
return output0itmap;
&
pri(ate (oid Decrypt+ayer"#
{
toolStripStatus+abel4.Text 2 ADecrypting... )lease waitA;
.pplication.Do/(ents"#;
int i* = 2 3;
bool9: t 2 new bool9B:;
bool9: rb 2 new bool9B:;
bool9: gb 2 new bool9B:;
bool9: bb 2 new bool9B:;
Page 37/59
Steganography Project Report by www.programmer2programmer.net
%olor pixel 2 new %olor"#;
byte r* g* b;
pixel 2 Decrypted0itmap.Net)ixel"widt E 4* eigt E 4#;
long ,Si$e 2 pixel.1 @ pixel.N C 433 @ pixel.0 C 43333;
pixel 2 Decrypted0itmap.Net)ixel"widt E 2* eigt E 4#;
long ,-ameSi$e 2 pixel.1 @ pixel.N C 433 @ pixel.0 C 43333;
byte9: res 2 new byte9,Si$e:;
string resF-ame 2 AA;
byte temp;
''1ead ,ile name!
,or "i 2 3; i L eigt MM i C "eigt ' D# L ,-ameSi$e; i@@#
,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D#
L ,-ameSi$e; =@@#
{
pixel 2 Decrypted0itmap.Net)ixel"=* i#;
r 2 pixel.1;
g 2 pixel.N;
b 2 pixel.0;
byte2bool"r* re, rb#;
byte2bool"g* re, gb#;
byte2bool"b* re, bb#;
i, "= O D 22 3#
{
t93: 2 rb98:;
t94: 2 gb98:;
t92: 2 bb98:;
&
else i, "= O D 22 4#
{
t9D: 2 rb98:;
t96: 2 gb98:;
t9P: 2 bb98:;
&
else
{
t95: 2 rb98:;
t98: 2 gb98:;
temp 2 bool2byte"t#;
resF-ame @2 "car#temp;
&
&
''1ead ,ile on layer B "a,ter ,ile name#!
int temp= 2 =;
iEE;
,or "; i L eigt MM i C "eigt ' D# L ,Si$e @ ,-ameSi$e; i@@#
,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @ "= ' D#
L "eigt C "widt ' D# C D# ' D E 4 MM i C "eigt ' D# @ "= ' D# L ,Si$e @
,-ameSi$e; =@@#
{
i, "temp= J2 3#
{
Page 38/59
Steganography Project Report by www.programmer2programmer.net
= 2 temp=;
temp= 2 3;
&
pixel 2 Decrypted0itmap.Net)ixel"=* i#;
r 2 pixel.1;
g 2 pixel.N;
b 2 pixel.0;
byte2bool"r* re, rb#;
byte2bool"g* re, gb#;
byte2bool"b* re, bb#;
i, "= O D 22 3#
{
t93: 2 rb98:;
t94: 2 gb98:;
t92: 2 bb98:;
&
else i, "= O D 22 4#
{
t9D: 2 rb98:;
t96: 2 gb98:;
t9P: 2 bb98:;
&
else
{
t95: 2 rb98:;
t98: 2 gb98:;
temp 2 bool2byte"t#;
res9i C "eigt ' D# @ = ' D E ,-ameSi$e: 2 temp;
&
&
''1ead ,ile on oter layers!
long readedOn+B 2 "eigt C "widt'D#CD# 'D E ,-ameSi$e E 4;
,or "int layer 2 5; layer F2 3 MM readedOn+B @ "5 E layer# C
""eigt C "widt ' D# C D# ' D E 4# L ,Si$e; layerEE#
,or "i 2 3; i L eigt MM i C "eigt ' D# @ readedOn+B @ "5
E layer# C ""eigt C "widt ' D# C D# ' D E 4# L ,Si$e; i@@#
,or "= 2 3; = L "widt ' D# C D MM i C "eigt ' D# @
"= ' D# @ readedOn+B @ "5 E layer# C ""eigt C "widt ' D# C D# ' D E 4# L
,Si$e; =@@#
{
pixel 2 Decrypted0itmap.Net)ixel"=* i#;
r 2 pixel.1;
g 2 pixel.N;
b 2 pixel.0;
byte2bool"r* re, rb#;
byte2bool"g* re, gb#;
byte2bool"b* re, bb#;
i, "= O D 22 3#
{
t93: 2 rb9layer:;
t94: 2 gb9layer:;
t92: 2 bb9layer:;
Page 39/59
Steganography Project Report by www.programmer2programmer.net
&
else i, "= O D 22 4#
{
t9D: 2 rb9layer:;
t96: 2 gb9layer:;
t9P: 2 bb9layer:;
&
else
{
t95: 2 rb9layer:;
t98: 2 gb9layer:;
temp 2 bool2byte"t#;
res9i C "eigt ' D# @ = ' D @ "5 E layer# C
""eigt C "widt ' D# C D# ' D E 4# @ readedOn+B: 2 temp;
&
&
i, "File./xists"DSa(eFile)at @ AKKA @ resF-ame##
{
Iessage0ox.Sow"AFile KAA @ resF-ame @ AKA already exist
please coose anoter pat to sa(e ,ileA*
A/rrorA*Iessage0ox0uttons.O>*Iessage0oxIcon./rror#;
return;
&
else
File.Write.ll0ytes"DSa(eFile)at @ AKKA @ resF-ame* res#;
toolStripStatus+abel4.Text 2 ADecrypted ,ile as been
success,ully sa(ed.A;
.pplication.Do/(ents"#;
&
pri(ate (oid byte2bool"byte inp* re, bool9: outp#
{
i,"inpF23 MM inpL22PP#
,or "sort i 2 8; i F2 3; iEE#
{
i, "inp O 2 22 4#
outp9i: 2 true;
else
outp9i: 2 ,alse;
inp '2 2;
&
else
trow new /xception"AInput number is illegal.A#;
&
pri(ate byte bool2byte"bool9: inp#
{
byte outp 2 3;
,or "sort i 2 8; i F2 3; iEE#
{
i, "inp9i:#
outp @2 "byte#Iat.)ow"2.3* "double#"8Ei##;
&
Page 40/59
Steganography Project Report by www.programmer2programmer.net
return outp;
&
pri(ate (oid Decrypt;btn;%lic<"ob=ect sender* /(ent.rgs e#
{
i, "DeSa(eFile;tbx.Text 22 String./mpty HH De+oadImage;tbx.Text
22 String./mpty#
{
Iessage0ox.Sow"AText boxes must not be emptyJA* A/rrorA*
Iessage0ox0uttons.O>* Iessage0oxIcon./rror#;

return;
&
i, "System.IO.File./xists"De+oadImage;tbx.Text# 22 ,alse#
{
Iessage0ox.Sow"ASelect image ,ile.A* A/rrorA*
Iessage0ox0uttons.O>* Iessage0oxIcon./xclamation#;
De+oadImage;tbx.Focus"#;
return;
&
Decrypt+ayer"#;
&
pri(ate (oid De+oadImage0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e#
{
i, "openFileDialogD.SowDialog"# 22 Dialog1esult.O>#
{
D+oadImage)at 2 openFileDialogD.File-ame;
De+oadImage;tbx.Text 2 D+oadImage)at;
DecryptedImage 2 Image.FromFile"D+oadImage)at#;
eigt 2 DecryptedImage.?eigt;
widt 2 DecryptedImage.Widt;
Decrypted0itmap 2 new 0itmap"DecryptedImage#;
FileIn,o imgin, 2 new FileIn,o"D+oadImage)at#;
,loat ,s 2 ",loat#imgin,.+engt ' 4326;
ImageSi$e;lbl.Text 2 smalldecimal",s.ToString"#* 2# @ A >0A;
Image?eigt;lbl.Text 2 DecryptedImage.?eigt.ToString"# @ A
)ixelA;
ImageWidt;lbl.Text 2 DecryptedImage.Widt.ToString"# @ A
)ixelA;
double cansa(e 2 "B.3 C ""eigt C "widt ' D# C D# ' D E 4##
' 4326;
%anSa(e;lbl.Text 2 smalldecimal"cansa(e.ToString"#* 2# @ A
>0A;
can)aint 2 true;
tis.In(alidate"#;
Page 41/59
Steganography Project Report by www.programmer2programmer.net
&
&
pri(ate (oid DeSa(eFile0rowse;btn;%lic<"ob=ect sender* /(ent.rgs e#
{
i, ",older0rowserDialog4.SowDialog"# 22 Dialog1esult.O>#
{
DSa(eFile)at 2 ,older0rowserDialog4.Selected)at;
DeSa(eFile;tbx.Text 2 DSa(eFile)at;
&
&
pri(ate (oid Form4;)aint"ob=ect sender* )aint/(ent.rgs e#
{
i,"can)aint#
try
{
i, "J/ncriptionDone#
e.Nrapics.DrawImage"loadedTrueImage* pre(iewImage#;
else
e.Nrapics.DrawImage".,ter/ncryption* pre(iewImage#;
&
catc
{
e.Nrapics.DrawImage"DecryptedImage* pre(iewImage#;
&
&
pri(ate string =ustF-ame"string pat#
{
string output;
int i;
i, "pat.+engt 22 D# '' i.e! A%!KKA
return pat.Substring"3* 4#;
,or "i 2 pat.+engt E 4; i F 3; iEE#
i, "pat9i: 22 GKKG#
brea<;
output 2 pat.Substring"i @ 4#;
return output;
&
pri(ate string =ust/x"string ,-ame#
{
string output;
int i;
,or "i 2 ,-ame.+engt E 4; i F 3; iEE#
i, ",-ame9i: 22 G.G#
brea<;
output 2 ,-ame.Substring"i @ 4#;
return output;
&
pri(ate (oid %lose;btn;%lic<"ob=ect sender* /(ent.rgs e#
Page 42/59
Steganography Project Report by www.programmer2programmer.net
{
tis.%lose"#;
&
pri(ate (oid lin<+abel4;+in<%lic<ed"ob=ect sender*
+in<+abel+in<%lic<ed/(ent.rgs e#
{

System.Diagnostics.)rocess.Start"Attp!KKKKwww.programmer2programmer.netA#;
&
&
&
Page 43/59
Steganography Project Report by www.programmer2programmer.net
1$er Manual
&hi i the .irt creen which ha two tab option one i 'ncrypt Image .or encryption
an/ another i 4ecrypt image .or /ecryption. In right top pane7 i /ip7ay the
in.ormation abo2t the image 2ch a iBe@ height an/ wi/th.
Page 44/59
Steganography Project Report by www.programmer2programmer.net
Encry%tion
%. 6or 'ncryption e7ect 'ncrypt Image tab option.
Page 45/59
Steganography Project Report by www.programmer2programmer.net
2. 6or 7oa/ image c7ic0 on b2tton 1BroweH that i neAt to the Doa/ Image teAtboA. &he
.i7e open /ia7og boA wi77 /ip7ay a .o77ow@ e7ect the Image .i7e@ which yo2 want to 2e
hi/e in.ormation an/ c7ic0 on )pen b2tton.
Page 46/59
Steganography Project Report by www.programmer2programmer.net
Page 47/59
Steganography Project Report by www.programmer2programmer.net
9. &he image .i7e wi77 opene/ an/ i /ip7ay a .o77ow. NeAt@ c7ic0 on 1BroweH
b2tton that i neAt to the Doa/ 6i7e teAtboA.
Page 48/59
Steganography Project Report by www.programmer2programmer.net
#. Again the .i7e open /ia7og boA wi77 appear@ e7ect any type o. .i7e whatever yo2
want to hi/e with the image an/ c7ic0 on o0 b2tton.
Page 49/59
Steganography Project Report by www.programmer2programmer.net
:. &he neAt tep i to encrypt the .i7e. Now c7ic0 on 1'ncryptH b2tton@ it wi77 open
the ave /ia7og boA which a0 yo2 to e7ect the path to ave the New image .i7e
an/ the Image .i7e name. &he /e.a27t .ormat o. image .i7e i BMP.
Page 50/59
Steganography Project Report by www.programmer2programmer.net
Page 51/59
Steganography Project Report by www.programmer2programmer.net
*ecry%tion
%. Se7ect the 4ecryption Image tab option.
Page 52/59
Steganography Project Report by www.programmer2programmer.net
Page 53/59
Steganography Project Report by www.programmer2programmer.net
2. NeAt c7ic0 on the 1BroweH b2tton@ which open the )pen .i7e /ia7og boA@ here yo2 have
to e7ect the image which i 'ncrypte/ an/ ha hi//en in.ormation .i7e. Se7ect the image
.i7e an/ c7ic0 on )pen b2tton.
Page 54/59
Steganography Project Report by www.programmer2programmer.net
9. &he image .i7e /ip7aye/ a .o77ow!
Page 55/59
Steganography Project Report by www.programmer2programmer.net
#. Now c7ic0 on 1BroweH b2tton which i neAt to 1Save .i7e toH teAtboA. It wi77 open a
/ia7og boA that i 1Browe .or .o7/erH. It a0 yo2 to e7ect the path or .o7/er@ where yo2
want to eAtract the hi//en .i7e. Se7ect the .o7/er an/ c7ic0 on )0 b2tton.

:. Now c7ic0 on 4ecrypt b2tton@ it wi77 /ecrypt the image@ the hi//en .i7e an/ image .i7e i
ave/ into e7ecte/ .o7/er. &he meage .or 2cce.27 /ecryption i /ip7aye/ on the
tat2 bar which i p7ace at bottom o. the creen.
Page 56/59
Steganography Project Report by www.programmer2programmer.net
Page 57/59
Steganography Project Report by www.programmer2programmer.net
/ummary
Steganography i a rea77y intereting 2bject an/ o2ti/e o. the maintream cryptography an/
ytem a/minitration that mot o. 2 /ea7 with /ay a.ter /ay.
Steganography can be 2e/ .or hi//en comm2nication. Ce have eAp7ore/ the 7imit o.
teganography theory an/ practice. Ce printe/ o2t the enhancement o. the image teganography
ytem 2ing DSB approach to provi/e a mean o. ec2re comm2nication. A tego"0ey ha been
app7ie/ to the ytem /2ring embe/ment o. the meage into the cover image.
&hi teganography app7ication o.tware provi/e/ .or the p2rpoe to how to 2e any type o.
image .ormat to hi/ing any type o. .i7e ini/e their. &he mater wor0 o. thi app7ication i in
2pporting any type o. pict2re witho2t nee/ to convert to bitmap@ an/ 7ower 7imitation on .i7e
iBe to hi/e@ beca2e o. 2ing maAim2m memory pace in pict2re to hi/e the .i7e.
Since ancient time@ man ha .o2n/ a /eire in the abi7ity to comm2nicate covert7y. &he recent
eAp7oion o. reearch in watermar0ing to protect inte77ect2a7 property i evi/ence that
teganography i not j2t 7imite/ to mi7itary or epionage app7ication. Steganography@ 7i0e
cryptography@ wi77 p7ay an increaing ro7e in the .2t2re o. ec2re comm2nication in the 1/igita7
wor7/H.
Page 58/59
Steganography Project Report by www.programmer2programmer.net
&ibliogra%hy
.e"&ite&
6o77owing webite are re.erring to create thi project report.
http!KKwww.goog7e.com
http!KKwww.microo.t.com
http!KKwww.programmer2programmer.net
http!KKwww.co/eproject.com
http!KKwww.ap.net
http!KKwww.ap%29.com
http!KKwww.wi0ipe/ia.org
*oo/&
6o77owing boo0 an/ eboo0 are 2e/ to comp7ete thi project report.
Matering -P EPaperbac0F
SQD Server Bib7e EPaperbac0F
.N'& B7ac0 Boo0 EPaperbac0F
Pro.eiona7 -P@ 2n/ '/ition EPaperbac0F
Pro.eiona7 ASP.N'& EPaperbac0F
M-A4KM-S4 Se7."Pace/ &raining Iit! 4eve7oping Ceb App7ication with Microo.tR ,i2a7
BaicR .N'& an/ Microo.t ,i2a7 -PR .N'&@ Secon/ '/ition
M-A4KM-S'KM-4BA Se7."Pace/ &raining Iit! Microo.t SQD Server 2$$$ 4atabae 4eign
an/ Imp7ementation@ 'Aam <$"22?@ Secon/ '/ition
Page 59/59
Steganography Project Report by www.programmer2programmer.net

You might also like