Professional Documents
Culture Documents
This decryption process can only be performed by an authenticated receiver using, Encryption of
data on images provides a safe and secure transmission of data between the sending and receiving party.
The data/text which the sender wants to transmit is selected first and then an image is chosen from the
current mobile device. The chosen text is then encrypted in the image such that the data is not visible to
any third party. After encryption is performed, the image is sent to receiving party and the receiver
decrypts the data using the key given by the sender this application.
Literature Survey
1. A Modified Filtering Approach of LSB Image Steganography Using
Stream Builder along with AES Encryption
Sharmin Sultana1, Afrida Khanam1, Md. Rashedul Islam2, Adiba
Mahjabin Nitu2, Md. Palash Uddin*2, Masud Ibn Afjal2 and Md. Fazle Rabbi2
FEB 2019
2. Review Paper on Image Steganography
1 Ashadeep Kaur*, 2Rakesh Kumar, 3Kamaljeet Kainth
JUNE 2016
3. Gray Code Based Data Hiding in an Image using LSB Embedding
Technique
Karthikeyan B, Asha S, Poojasree B
MAY 2019
4. Implementation of Secure Steganography on Jpeg Image Using LSB
Method
Danny Adiyan Z.1, Tito Waluyo Purboyo2 and Ratna Astuti
Nugrahaeni3
AUG 2018
5. Data Security Using Cryptography and Steganography Techniques
Marwa E. Saleh Abdelmgeid A. Aly Fatma A. Omara
JUNE 2016
6. Enhanced Security of Data using Image Steganography and AES
Encryption Technique
Sandeep Panghal Sachin Kumar Naveen Kumar
JAN 2016
7. Enhanced Security with Steganography and Cryptography
Radha S. Phadte1, Rachel Dhanaraj2
NOV 2016
8. Image Steganography Using Mid Position Value Technique
Srilekha Mukherjeea,* , Subhajit Roya , Goutam Sanyala
FEB 2018
9. New LSB-based colour image steganography method to enhance the
efficiency in payload capacity, security and integrity check
mustafa cem kasapbas¸i* and wisam elmasry
APRIL
2018
10. Information Hiding in Images Using Steganography Techniques
Ramadhan Mstafa1, Christian Bach2
MARCH 2013
SRS Document
Project Title Hidden Secrets Behind The Images
Reliability
Security
Software Quality Attributes Availability
Maintainability
Team Size 5
Services Description:
Encryption:
Encryption schemes transform a plaintext message (or
stored data) into a cipher text in such a way that the cipher
text reveals little or no information about the original
plaintext.
Decryption:
Decryption is generally the reverse process of
encryption. It is the process of decoding the data which has been
encrypted into a secret format. An authorized user can
only decrypt data because decryption requires a secret key or
password.
Features of project:
Alleged use by intelligence services
Distributed steganography
Online Challenge
Conclusion:
Steganography can protect data by hiding it but using it alone may
not guarantee total protection. It is possible that by using a
steganocryption technique, enemy detects presence of text message in
the image file and then he/she may succeed in extracting information
from the picture, which can be disastrous in real life situations. This is
same for plain encryption. In this case by seeing the meaningless
appearing sequence of bits enemy can detect that some illegal message is
being sent (unless he/she is a fool), and we may land – up in a
problematic situation. However, if one uses both methods, this will lead
to ‘security in depth’. The message should first be encoded using a
strong encryption algorithm and then embedded into a carrier.