You are on page 1of 12

STEGANOGRAPHY

Prepared by: Vikram Verma (08N41A0599) D. Srivani (08N41A0587) K. Vishal (08N41A05A0) Internal Guide: Mr. Ram Babu

Objective:
The purpose of steganography is covert communication-to hide the existence of a message from a third party.

Scope:
Steganography techniques can be used to hide data within digital image with little or no visible change in the appearance of the image and can be exploited to export sensitive information.

State of art:
Steganography provides some very useful and commercially important functions in the digital world, most notably digital watermarking.

Existing System Developed for any one Operating System. Supports any one either command mode or graphical mode only. Is applicable for specific kind of Image Size for Steganography. Proposed System Steganography is supposed to run with Java runtime environments version 1.4 and higher. This has the advantage of working under most operating systems in use today. Write the code to execute as Command mode and Graphical Interface Provide interactive interface through which user can interact with different types of Images, Image Sizes and Text Messages.

Software Requirements Specifications

Steganography involves two modules :


STEG MODULE UNSTEG MODULE

STEG MODULE
y Steg module performs encryption steps for hiding text into image. y The first step here is to insert the secret message and the image in which text is to be encrypted. y Secondly the encryption is performed.

UNSTEG MODULE
y UnSteg module performs decryption steps for revealing the hidden text from image. y The first step here is to choose encrypted image. y Secondly the decryption is performed over the image and secret message is revealed.

Software & Hardware Requirements


Software Requirements OS :: Windows/LINUX/MAC Tool:: Java 2 standard edition Java swings

Hard Ware Requirements Processor:: Pentium-III (or) Higher Ram:: 64MB (or) Higher Hard disk:: 10GB (or) Higher

Software Design Document


Class Diagram

UseUse-case Diagram

Sequence Diagram

Conclusion
Steganography is used in conjunction with cryptography so that the information is doubly protected i.e. the secret is encoded in another message in a manner such that, to the casual observer it is unseen. Thus the fact that the secret is being transmitted is also a secret.

You might also like