You are on page 1of 7

Image Steganography

(Synopsis)

Introduction Abstract
This system is used to send the message in the unknown format. There are chances to miss the confidential or important information, when sent in the normal format. These problems can be avoided by making use of this system. The concept of steganography will be very helpful to the management, whose prime requirement is to send confidential information in a secure manner. This software lets you embed important or private messages or files into uncompressed format files like .bmp (bitmap image files) or sound files. There is no loss to the quality of the images as it uses the least significant bits (LS ) of the file, which are not used by the !mage "iewer or #udio $layer. The sender hide the message in the image file and send it to the receiver. The authori%ed receiver receives the image and then retrieves the message using this software. So there is no way to find out the message embedded in the image. This mechanism is known as Steganography. #ny color pi&el is made up of a combination of '()*+'((,* L-( ('+ ) wherein each '+ component consists of . bits. !f the characters in #S/!! are to be represented within the color pi&els, the rightmost digit called the LS can be altered. #ny variation in the value of this bit leads to minimal variation in color. !f we want to hide the word 0)!+1 in the image, we take the LS of every color and hide each bit of the word in its '+ combination. This is very secure. The message is encrypted first and then converted into bytes. This method uses double authentication, where the user must enter the encryption key as well as validation code to e&tract the secret message. The encryption key is the combination of how the encryption format should be. Think encryption keys as passwords to the real te&t. ut they are not real passwords. 2or e&ample, for each encryption key

there will be different encryption format, you are actually mentioning the format and not passwords. "alidation code is not actually a code, but the byte position from which hidden message begins in the image file. #part from hiding the message, a detailed log file is created containing the following details. The name of the system from which this file was sent, the name of the image or sound file containing this secret message, the email*id of the sender and the receiver, the date of dispatch and the si%e of the source file and the output file.

Thus this mechanism will be very useful to bury the information in a secure way without any loss of data. The confidential or important information, which sent with normal format, there might, may be a chance of happening misuse cases. These can be avoided by making use of this system. The mechanism, which is used to hide the message in the image files, is known as ST(+#,3+'#$45.

MODULES:

#uthentication (mbedding a message in a picture file (mbedding a file in a picture file 'etrieving the embedded message from the picture file 'etrieving the embedded file from the picture file

SYS EM S UDY

E!isting System

/reating software is important thing but providing security is most important thing .The software or data may get corrupted or the intruders may change even the content of data. To avoid these entire things proper security to the software must be provided. /ommonly everyone provide security by means of providing password but this method does not provide proper security. #ny one can guess the password or break the password and see the actual content. 6ostly the intruders corrupt the messages during the message transferring. Therefore, here proper security has been provided during data transition itself" $rotection of the document is done using the technique of cryptography. !n which the original te&t is encrypted using some ut if intruders corrupt the key then key values and can be decrypted also the te&t using the mentioned key, to see the original te&t back. issues must be followed. whole can be traced they will trace content. Therefore proper security

#roposed System

The security is needed during the data transmission because during transmission intruders may take the content. To provide proper security to content concept of Steganography has been used. The whole content is hidden in the image file and transferred to the destination as image. 4ere the intruder cannot able to see the information or they may not know that the message is hidden in the image file. This will provide proper security to the message. This software lets to embed important or private messages or files right into uncompressed format files like . 6$ itmap images, 6$7 files etc. There is no loss to the quality of the images or 6$7 files as it uses the least significant bits of the file, which are not used by the !mage viewer. Security can be provided by the encryption and decryption method, content ere the viewers can easily determine that the content is encrypted that why they can break the protection. hidden in the image file so it will provide better protection. ut incase of steganography the outsider1s does not know that the is

Stri$ing %eatures: /onfidential information in a secure manner. ,o loss to the quality of the images.

3nly the authori%ed receive can view 8receive the message. )etailed log file is maintaining details. !nformation is buried secure manner without any loss of data.

#rob&em De'inition The confidential or important information, which sent with normal format, there might, may be a chance of happening misuse cases. These can be avoided by making use of this system. The mechanism, which is used to hide the message in the image files, is known as ST(+#,3+'#$45. This will be very helpful to the management, which wants to send some confidential information in a secure manner. This software lets you embed important or private messages or files right into uncompressed format files like .bmp,.gif,.9peg etc. There is no loss to the quality of the images or6p7 files as it uses least significant bits of the file, which are not used by the !mage viewer or audio players. This system is used to send the message in the unknown format. There are chances to miss the confidential or important information, when sent in the normal format. These problems can be avoided by making use of this system.

SYS EM A(ALYSIS
)esource )e*uired +ard,are )e*uirements $rocessor 6ain 6emory 4ard )isk 6onitor Aeyboard 6ouse : : : : $entium !" ;.<+4% : =;. 6 '#6

Segate >? + Samtron =<@ /olor 6onitor Samsung !nternet Aeyboard : Logitech ; utton Scroll $S8;

So't,are Speci'ication 3perating System platform : : Cava Bindows8;???8,T