You are on page 1of 7

ABSTRACT

This decryption process can only be performed by an authenticated receiver using, Encryption of

data on images provides a safe and secure transmission of data between the sending and receiving party.

The data/text which the sender wants to transmit is selected first and then an image is chosen from the

current mobile device. The chosen text is then encrypted in the image such that the data is not visible to

any third party. After encryption is performed, the image is sent to receiving party and the receiver

decrypts the data using the key given by the sender this application.

Literature Survey
1. A Modified Filtering Approach of LSB Image Steganography Using
Stream Builder along with AES Encryption
Sharmin Sultana1, Afrida Khanam1, Md. Rashedul Islam2, Adiba
Mahjabin Nitu2, Md. Palash Uddin*2, Masud Ibn Afjal2 and Md. Fazle Rabbi2
FEB 2019
2. Review Paper on Image Steganography
1 Ashadeep Kaur*, 2Rakesh Kumar, 3Kamaljeet Kainth
JUNE 2016
3. Gray Code Based Data Hiding in an Image using LSB Embedding
Technique
Karthikeyan B, Asha S, Poojasree B
MAY 2019
4. Implementation of Secure Steganography on Jpeg Image Using LSB
Method
Danny Adiyan Z.1, Tito Waluyo Purboyo2 and Ratna Astuti
Nugrahaeni3
AUG 2018
5. Data Security Using Cryptography and Steganography Techniques
Marwa E. Saleh Abdelmgeid A. Aly Fatma A. Omara
JUNE 2016
6. Enhanced Security of Data using Image Steganography and AES
Encryption Technique
Sandeep Panghal Sachin Kumar Naveen Kumar
JAN 2016
7. Enhanced Security with Steganography and Cryptography
Radha S. Phadte1, Rachel Dhanaraj2
NOV 2016
8. Image Steganography Using Mid Position Value Technique
Srilekha Mukherjeea,* , Subhajit Roya , Goutam Sanyala
FEB 2018
9. New LSB-based colour image steganography method to enhance the
efficiency in payload capacity, security and integrity check
mustafa cem kasapbas¸i* and wisam elmasry
APRIL
2018
10. Information Hiding in Images Using Steganography Techniques
Ramadhan Mstafa1, Christian Bach2

MARCH 2013
SRS Document
Project Title Hidden Secrets Behind The Images

The scope of our project is presently


specific. Both the sender and the receiver
must have this software installed on their
systems to encrypt/decrypt and
Project Scope compress/decompress the files transmitted
between them. This includes all the users
who want to interact electronically,
whether it is through emails, ecommerce,
etc. Through internet in order to keep their
private information confidential.

Hiding information in text is historically


the most important method of
steganography. An obvious method was to
hide a secret message in every nth letter of
System Overview every word of a text message. It is only
since the beginning of the Text Images
Audio/ video Protocol Internet and all the
different digital file formats that is has
decreased in importance.
 Ability to get the pixels of the
original image
 create a strong encryption image
such that it cannot be hacked easily
 Faster encryption time such that
Design Constraints encrypted image is transferred faster
to the person.
 Perfection in the original image we
obtain after decrypting it.

 Define the goals of steganography


application
 Select the application field
 Select the requirements for the
application field
System Constraints  Define specific requirements
 Define other requirements
 Develop the requirements
specification
 Select algorithms according to
requirements

Descriptions of data to be entered into


the system
Functional Requirements Descriptions of operations performed
by each screen
Descriptions of work-flows performed
by the system
Descriptions of system reports or other
outputs
Who can enter the data into the system
 uses simple language
 not ambiguous
 contains only one point
Non- Functional Requirements  specific to one type of user
 is qualified
 describes what and not how

 Reliability
 Security
Software Quality Attributes  Availability
 Maintainability

Team Size 5

S.E Model Waterfall Model


Methodology of Project
Model description:
The project that is used to perform secret data transmission by
performing encryption of text on images. The sender uses a key to
perform encryption and the same key is given to the receiver
to decrypt and obtain the data.
Modularization:
Registration: In this registration module consists of
various fields like User id, Password, Confirm Password,
Security Question, Answer.
Login: you can login into app by using User id and
Password that are previously registered.
Encryption: In this module Text Message, Secret Key,
Browse file, Save Code, Send Image fields to encrypt the data.
Decryption: This module consists of Browse file, Get
Code, Get Text fields to decrypt the encrypted message.

Services Description:
Encryption:
Encryption schemes transform a plaintext message (or
stored data) into a cipher text in such a way that the cipher
text reveals little or no information about the original
plaintext.
Decryption:
Decryption is generally the reverse process of
encryption. It is the process of decoding the data which has been
encrypted into a secret format. An authorized user can
only decrypt data because decryption requires a secret key or
password.
Features of project:
 Alleged use by intelligence services
 Distributed steganography
 Online Challenge
Conclusion:
Steganography can protect data by hiding it but using it alone may
not guarantee total protection. It is possible that by using a
steganocryption technique, enemy detects presence of text message in
the image file and then he/she may succeed in extracting information
from the picture, which can be disastrous in real life situations. This is
same for plain encryption. In this case by seeing the meaningless
appearing sequence of bits enemy can detect that some illegal message is
being sent (unless he/she is a fool), and we may land – up in a
problematic situation. However, if one uses both methods, this will lead
to ‘security in depth’. The message should first be encoded using a
strong encryption algorithm and then embedded into a carrier.

You might also like