You are on page 1of 15

1|Page

A
Micro-Project Report on
“Image Stegnography”

By

1). Pathare Sandesh [2014660159]


2). Pimparkar Harshal [2014660121]
3). Kalamkar Onkar [2114660143]
4).Badhe Swapnil [2114660135]
Guided by
Prof.Darode.S.S

Shree Samarth Academy’s


Shree Samarth Polytechnic
Mhasane Phata, Ahmednagar
Maharashtra State Board of Technical Education
(2022-2023)
2|Page

Shree Samarth Academy`s


Shree Samarth Polytechnic
Department Of Computer Engineering

CERTIFICATE
This is to Certify that the Project work Entitled

“Image Stegnography”

Is
Submitted By
1) Pathare Sandesh [2014660159]

2) Pimparkar Harshal [2014660121]

3) Kalamkar Onkar [2114660143]

4) Badhe Swapnil [2114660135]

In the partial fulfillment of diploma in Computer Engineering Has been Satisfactory


carried out U During May guidance as per the requirement of Maharashtra State Board of
Technical Education, Mumbai During The Academic Year 2022-2023

Date:-
Place:-

GUID HOD. PRINCIPAL


(Prof. Darode.S.S) (Prof.Chaure.S.M). (Dr.Kulkarni.D.A)
3|Page

Acknowledgement

An endeavor over long period can be successful Only with advice and guidance
of may Well- wishers.
My sincere thanks to the management and Prof. Dr.Kulkarni. D. A Sir
principal of Shree Samarth Polytechnic, Mhasane Phata Ahmednagar for
providing me the Opportunity to conduct My project work.
I am highly indebted to Prof. Chaure.S.M Sir Head Of Department Of
Computer For his Assistance And Constant Source Of Encouragement. I wish to
Express My Profound And Deep Sense Of Gratitude Of
Prof.Darode.S.S Mam Project Coordinator For sparing Her Valuable Time To
Extent Help In Very Step Of My Project Work.
I Would Also Like To Thank The Staff Of Computer Department For The
Generous Guidance.
Last But Not The Least We Would Like To Thank Our Friends And For Their
Help In Every Way For The Success Of This Project Report.

Name Of Student. Signature.

1.Pathare Sandesh Ankush. .........................


2.Kalamkar Onkar Balasaheb .........................
3.Pimparkar Harshal Mandlik. ..........................
4)Badhe Swapnil Ravsaheb ..........................
4|Page

Micro project proposal


“Image Stegnography”

1.0 introduction
Steganography is the process of hiding a secret message within a larger one in
Such a way that someone cannot know the presence or contents of the hidden
message.Although related, Steganography is not to be confused with
Encryption, which is the Process of making a message unintelligible—
Steganography attempts to hide the Existence of communication. The main
advantage of steganography algorithm is because Of its simple security
mechanism. Because the steganographic message is integrated Invisibly and
covered inside other harmless sources, it is very difficult to detect the Message
without knowing the existence and the appropriate encoding scheme.
The objective of this project is to develop an Android Application that hide an
Secret message behind the image (Steganography).

2.0 Aim of the project


1. To analyze principle of Image Steganography.

2. To address importance of Android Language.

3. To study Android Language


.
4. To implement App for Image Steganography.

3.0 Course Outcomes Achieved


1. Interpret features of Android Operating System.
2. Develop rich user Interfaces by using layouts and controls.
3. Use User Interface components for android application development.
4. Publish Android Applications.
5|Page

4.0 Abstract

Steganography is the art of hiding the fact that communication is taking


place, by hiding information in other information. Many different carrier file
formats can be used, but digital images are the most popular because of their
frequency on the Internet. For hiding secret information in images, there exists a
large variety of stenographic techniques some are more complex than others and
all of them have respective strong and weak points. Different applications have
different requirements of the steganography technique used. For example, some
applications may require absolute invisibility of the secret information, while
others require a larger secret message to be hidden. This project intends to give
an overview of image steganography, its uses and techniques. It also supports
steganography in Audio files. For a more secure approach, the project encrypts
the message using secret key and then sends it to the receiver. The receiver then
decrypts the message to get the original one.

5.0 Action Plan:


Sr.No Detail of activity Start Date Finish Date Name of team
Member

1). Topic Search 05/03/2023 10/03/2023 All Members


2). Project prposal 10/03/2023 15/03/2023 All Members
Cration
3). Detail information 15/03/2023 25/03/2023 All Members
gathering for project
4). Select industry 25/03/2023 05/04/2023 All Members
5). Project correctness 05/04/2023 10/04/2023 All Members
6). Project report 10/04/2023 15/04/2023 All Members
correctness
7). Final presentation 15/04/2023 15/04/2023 All Members
6|Page

Micro project Report


“Image Stegnography”

1.0 Statement
The former consists of linguistic or language forms of hidden writing. The later, such as
invisible ink, try of hide messages physically. One disadvantage of linguistic steganography
is that users must equip themselves to have a good knowledge of linguistry. In recent years,
everything is trending toward digitization. And with the development of the internet
technology, digital media can be transmitted conveniently over the network. Therefore,
messages can be secretly carried by digital media by using the steganography techniques, and
then be transmitted through the internet rapidly Steganography is the art of hiding the fact
that communication is taking place, by hiding information in other information. Many
different carrier file formats can be used, but digital images are the most popular because of
their frequency on the internet. For hiding secret information in images, there exists a large
variety of steganography techniques some are more complex than others and all of them have
respective strong and weak points.So we prepare this application, to make the information
hiding more simple and user friendly.

1.2 Importance:-

It is possible to alter graphic or sound files slightly without losing their overall viability for
the viewer and listener. With audio, you can use bits of file that contain sound not audible to
the human ear. With graphic images, you can remove redundant bits of color from the image
and still produce a picture that looks intact to human eye and is difficult to discern from its
original.It is in those bits that stego hides its data. A stego program uses an algorithm, to
embed data in an image or sound file, and a password scheme to allow you to retrieve
information.

1.3 Procedure Followed:-

 Hiding the text message in an image file.


 Encryption of the same message, so as to
 Support more secure steganography. – The decoding of the message, decryption and
Source message retrieval are also supported.
7|Page

2. Objective

The goal of steganography is covert communication. So, a fundamental requirement of this


steganography system is that the hider message carried by stego-media should not be sensible
to human beings.
The other goal of steganography is to avoid drawing suspicion to the existence of a hidden
message. This approach of information hiding technique has recently became important in a
number of application area

2.1 This project has following objectives:


• To product security tool based on steganography techniques.

• To explore techniques of hiding data using encryption module of this project

• To extract techniques of getting secret data using Decryption module.

Steganography sometimes is used when encryption is not permitted. Or, more


commonly, steganography is used to supplement encryption. An encrypted file may still hide
information using steganography, so even if the encrypted file is deciphered, the hidden
message is not seen.
8|Page

3.Module Description

Home:

This page will have the home display of the software and it will have the link to other
modules also. Once the module is open it can then link to the database and retrieve the
settings from the database. This module is also responsible to apply the settings on the other
modules. This module will have only database reading capabilities and not writing.

Hide/Encrypt the data:

• Create a File using the Text editor: This module will be used to create a file
that will contain the Plaint text with no formatting. Also the file created under
this module will not be saved in the system and can and will only be saved as
a Encrypted (Visual encryption) or will be concealed under an image file.

• Import file: In this module we will be able to import a file from the computer
and that will be concealed under an image file.

Unhide / Decrypt the data:

• Import file: This module will have the ability to import file(s). It will be able to
decrypt, Unhide the file from the image file and it will also be able to retrieve the
message from the image files generated by the encryption module using the Visual
Cryptography.
9|Page

4.Interface Module Diagram:


10 | P a g e

4.1 Data flow Diagram


11 | P a g e

5. Implementation:

Technical Details:
• Using java.awt.Image, ImageIO

• The package contains all the necessary classes and methods along
with interfaces that are necessary for the Manipulation of the
images.

5.1 The Encoding Process:


• The steganography technique used is LSB coding.

• The offset of the image is retrieved from its header.

• That offset is left as it is to preserve the integrity of the

• Header, and from the next byte, we start our encoding process.

• For encoding, we first take the input carrier file i.e. an image

File and then direct the user to the selection of the text file.

Creation of User Space:


• User Space is created for preserving the original file, so
That all the modifications are done in the user space.
• In the object of Buffered Image, using ImageIO. Read method we
take the original image.
• Using create Graphics and drawRenderedImage method of
Graphics class, we create our user space in BufferedImage object.
• The text file is taken as input and separated in stream of bytes.
• Now, each bit of these bytes is encoded in the LSB of each next
pixel.
• And, finally we get the final image that contains the encoded
message and it is saved, at the specified path given by user, in
PNG format using ImageIO.write method.
12 | P a g e

5.2 The Decoding Process:

The offset of the image is retrieved from its header.

• Create the user space using the same process as in the Encoding.
• Using getRaster() and getDataBuffer() methods of Writable
Raster and DataBufferByte classes. The data of Image is taken into
byte array.
• Using above byte array, the bit stream of original text file, is
retrieved into the another byte array.

• And above byte array is written into the decoded text file, which
leads to the original message.
13 | P a g e

Teacher Evaluation Sheet

Name of the Student:. ..…………………………………………........................

Enrollment No:. ……………………..............……………...................

Name of Program. ............…………………………………......................

Semester:. ............................……………………………............

Course Title:. …………...............................…………..................

Code:. …….......................................…………………………

Title of the Micro-Project:. ...................……………………………………..............


14 | P a g e

Course Outcomes Achieved


Sr. No Characteristic to be Poor ( Average Good Marks( 6- Excellent Marks
assessed Marks 1-3) (Marks 4-5) 8) (9-10)

1 Relevance to the course

2 Literature survey/
Information Collection

3 Project Proposal

4 Completion of the
Target as per project
proposal
5 Analysis of Data &
Representation
6 Quality of Prototype/Model

7 Report Preparation

8 Presentation

9 Analysis of Data &

Process Assignment Product Assignment Total Marks

Part A- Project Part B-Project Individual


Project Methodology Report/Working Presentation/Viva
Proposal (2 mark) Model (2 (4 mark)
(2 Marks) marks)

Note: Every course teacher is expected to assign marks for group


evolution in first 3 columns & individual evaluation in 4thcolumns
for each group of students as per rubrics.
15 | P a g e

Comments/suggestions about team work/leadership/inter-


personal communication

……………………………………………………………………
……

Any Other Comment:

…………………………………………………………………

…………………………………………………………………

…………………………………………………………………

…………………………………………………………………
Name and designation of the faculty member

…………………………………………………………………
Signature………………………………………………………

You might also like