Professional Documents
Culture Documents
A
Micro-Project Report on
“Image Stegnography”
By
CERTIFICATE
This is to Certify that the Project work Entitled
“Image Stegnography”
Is
Submitted By
1) Pathare Sandesh [2014660159]
Date:-
Place:-
Acknowledgement
An endeavor over long period can be successful Only with advice and guidance
of may Well- wishers.
My sincere thanks to the management and Prof. Dr.Kulkarni. D. A Sir
principal of Shree Samarth Polytechnic, Mhasane Phata Ahmednagar for
providing me the Opportunity to conduct My project work.
I am highly indebted to Prof. Chaure.S.M Sir Head Of Department Of
Computer For his Assistance And Constant Source Of Encouragement. I wish to
Express My Profound And Deep Sense Of Gratitude Of
Prof.Darode.S.S Mam Project Coordinator For sparing Her Valuable Time To
Extent Help In Very Step Of My Project Work.
I Would Also Like To Thank The Staff Of Computer Department For The
Generous Guidance.
Last But Not The Least We Would Like To Thank Our Friends And For Their
Help In Every Way For The Success Of This Project Report.
1.0 introduction
Steganography is the process of hiding a secret message within a larger one in
Such a way that someone cannot know the presence or contents of the hidden
message.Although related, Steganography is not to be confused with
Encryption, which is the Process of making a message unintelligible—
Steganography attempts to hide the Existence of communication. The main
advantage of steganography algorithm is because Of its simple security
mechanism. Because the steganographic message is integrated Invisibly and
covered inside other harmless sources, it is very difficult to detect the Message
without knowing the existence and the appropriate encoding scheme.
The objective of this project is to develop an Android Application that hide an
Secret message behind the image (Steganography).
4.0 Abstract
1.0 Statement
The former consists of linguistic or language forms of hidden writing. The later, such as
invisible ink, try of hide messages physically. One disadvantage of linguistic steganography
is that users must equip themselves to have a good knowledge of linguistry. In recent years,
everything is trending toward digitization. And with the development of the internet
technology, digital media can be transmitted conveniently over the network. Therefore,
messages can be secretly carried by digital media by using the steganography techniques, and
then be transmitted through the internet rapidly Steganography is the art of hiding the fact
that communication is taking place, by hiding information in other information. Many
different carrier file formats can be used, but digital images are the most popular because of
their frequency on the internet. For hiding secret information in images, there exists a large
variety of steganography techniques some are more complex than others and all of them have
respective strong and weak points.So we prepare this application, to make the information
hiding more simple and user friendly.
1.2 Importance:-
It is possible to alter graphic or sound files slightly without losing their overall viability for
the viewer and listener. With audio, you can use bits of file that contain sound not audible to
the human ear. With graphic images, you can remove redundant bits of color from the image
and still produce a picture that looks intact to human eye and is difficult to discern from its
original.It is in those bits that stego hides its data. A stego program uses an algorithm, to
embed data in an image or sound file, and a password scheme to allow you to retrieve
information.
2. Objective
3.Module Description
Home:
This page will have the home display of the software and it will have the link to other
modules also. Once the module is open it can then link to the database and retrieve the
settings from the database. This module is also responsible to apply the settings on the other
modules. This module will have only database reading capabilities and not writing.
• Create a File using the Text editor: This module will be used to create a file
that will contain the Plaint text with no formatting. Also the file created under
this module will not be saved in the system and can and will only be saved as
a Encrypted (Visual encryption) or will be concealed under an image file.
• Import file: In this module we will be able to import a file from the computer
and that will be concealed under an image file.
• Import file: This module will have the ability to import file(s). It will be able to
decrypt, Unhide the file from the image file and it will also be able to retrieve the
message from the image files generated by the encryption module using the Visual
Cryptography.
9|Page
5. Implementation:
Technical Details:
• Using java.awt.Image, ImageIO
• The package contains all the necessary classes and methods along
with interfaces that are necessary for the Manipulation of the
images.
• Header, and from the next byte, we start our encoding process.
• For encoding, we first take the input carrier file i.e. an image
File and then direct the user to the selection of the text file.
• Create the user space using the same process as in the Encoding.
• Using getRaster() and getDataBuffer() methods of Writable
Raster and DataBufferByte classes. The data of Image is taken into
byte array.
• Using above byte array, the bit stream of original text file, is
retrieved into the another byte array.
• And above byte array is written into the decoded text file, which
leads to the original message.
13 | P a g e
Semester:. ............................……………………………............
Code:. …….......................................…………………………
2 Literature survey/
Information Collection
3 Project Proposal
4 Completion of the
Target as per project
proposal
5 Analysis of Data &
Representation
6 Quality of Prototype/Model
7 Report Preparation
8 Presentation
……………………………………………………………………
……
…………………………………………………………………
…………………………………………………………………
…………………………………………………………………
…………………………………………………………………
Name and designation of the faculty member
…………………………………………………………………
Signature………………………………………………………