You are on page 1of 14

HIDDEN SECRETS BEHIND THE IMAGES

Under the guidance of


Mrs. K.Padmavathi M.Tech.,

Project Members
JADDU SRISAI SEKHAR (173B5A0502)
VALLURI DEVI PRASANNA (163B1A05A7)
VAKADA MANOGNA (163B1A05A6)
SEELAM S S SAI ANUSHA (163B1A0596)
PEKETI SRIVIDYA (163B1A0583)
Contents
 Abstract
 Literature Survey
 SRS Document
 Methodology of Project
 Conclusion
ABSTRACT

This decryption process can only be performed by an authenticated receiver using, Encryption of data on
images provides a safe and secure transmission of data between the sending and receiving party. The
data/text which the sender wants to transmit is selected first and then an image is chosen from the current
mobile device. The chosen text is then encrypted in the image such that the data is not visible to any third
party. After encryption is performed, the image is sent to receiving party and the receiver decrypts the data
using the key given by the sender this application.
Literature Survey
1. A Modified Filtering Approach of LSB Image Steganography Using Stream Builder along with AES Encryption
Sharmin Sultana1, Afrida Khanam1, Md. Rashedul Islam2, Adiba Mahjabin Nitu2, Md. Palash Uddin*2, Masud Ibn Afjal2 and Md. Fazle Rabbi2
FEB 2019
2. Review Paper on Image Steganography
1 Ashadeep Kaur*, 2Rakesh Kumar, 3Kamaljeet Kainth
JUNE 2016
3. Gray Code Based Data Hiding in an Image using LSB Embedding Technique
Karthikeyan B, Asha S, Poojasree B
MAY 2019
4. Implementation of Secure Steganography on Jpeg Image Using LSB Method
Danny Adiyan Z.1, Tito Waluyo Purboyo2 and Ratna Astuti Nugrahaeni3
AUG 2018
5. Data Security Using Cryptography and Steganography Techniques
Marwa E. Saleh Abdelmgeid A. Aly Fatma A. Omara
JUNE 2016
Literature Survey
6. Enhanced Security of Data using Image Steganography and AES Encryption Technique
Sandeep Panghal Sachin Kumar Naveen Kumar
JAN 2016
7. Enhanced Security with Steganography and Cryptography
Radha S. Phadte1, Rachel Dhanaraj2
NOV 2016
8. Image Steganography Using Mid Position Value Technique
Srilekha Mukherjeea,* , Subhajit Roya , Goutam Sanyala
FEB 2018
9. New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check
MUSTAFA CEM KASAPBAS¸I* and WISAM ELMASRY
APRIL 2018
10. Information Hiding in Images Using Steganography Techniques
Ramadhan Mstafa1, Christian Bach2

MARCH 2013
SRS Document
Project Title : Hidden Secrets Behind The Images

Project Scope : The scope of our project is presently specific. Both the sender and the receiver must have this software
installed on their systems to encrypt/decrypt and compress/decompress the files transmitted between them. This includes
all the users who want to interact electronically, whether it is through emails, ecommerce, etc. Through internet in order
to keep their private information confidential.

System Overview :Hiding information in text is historically the most important method of steganography. An obvious
method was to hide a secret message in every nth letter of every word of a text message. It is only since the beginning of
the Text Images Audio/ video Protocol Internet and all the different digital file formats that is has decreased in
importance.
SRS Document
Design Constraints:

 Ability to get the pixels of the original image


 create a strong encryption image such that it cannot be hacked easily
 Faster encryption time such that encrypted image is transferred faster to the person.
 Perfection in the original image we obtain after decrypting it.

System Constraints:

 Define the goals of steganography application


 Select the application field
 Select the requirements for the application field
 Define specific requirements
 Define other requirements
 Develop the requirements specification
 Select algorithms according to requirements
SRS Document
FUNCTIONAL REQUIREMENTS:
• Descriptions of data to be entered into the system
• Descriptions of operations performed by each screen
• Descriptions of work-flows performed by the system
• Descriptions of system reports or other outputs
• Who can enter the data into the system
• How the system meets applicable regulatory requirements
NON- FUNCTIONAL REQUIREMENTS:
• uses simple language
• not ambiguous
• contains only one point
• specific to one type of user
• is qualified
• describes what and not how
SRS Document
SOFTWARE QUALITY ATTRIBUTES:
 Reliability
 Security
 Availability
 Maintainability

Team Size: 5
S.E Model: Waterfall Model
Methodology of Project
Model description:
The project that is used to perform secret data transmission by performing encryption of text on images. The
sender uses a key to perform encryption and the same key is given to the receiver to decrypt and obtain the data.

System Architecture

Sender Mobile Receiver Server

Input Netwo Stego Image Key


rk

Processing Processing
(Hiding Mechanism) (Extracting Mechanism)

Output
Secret key
(Data)
Methodology of Project
Modularization:

Registration: In this registration module consists of various fields like User id,
Password, Confirm Password, Security Question, Answer.

Login: you can login into app by using User id and Password that are previously
registered.

Encryption: In this module Text Message, Secret Key, Browse file, Save Code, Send
Image fields to encrypt the data.
Decryption: This module consists of Browse file, Get Code, Get Text fields to decrypt
the encrypted message.
Methodology of Project
Services Description:

Encryption:
Encryption schemes transform a plaintext message (or stored data) into a cipher text in such a way that the
cipher text reveals little or no information about the original plaintext.
Decryption:
Decryption is generally the reverse process of encryption. It is the process of decoding the data which has
been encrypted into a secret format. An authorized user can only decrypt data because decryption requires a secret key
or password.

Features of project:
 Alleged use by intelligence services
 Distributed steganography
 Online Challenge
Conclusion:
Steganography can protect data by hiding it but using it alone may not guarantee total protection. It is possible that

by using a steganocryption technique, enemy detects presence of text message in the image file and then he/she may

succeed in extracting information from the picture, which can be disastrous in real life situations. This is same for plain

encryption. In this case by seeing the meaningless appearing sequence of bits enemy can detect that some illegal message

is being sent (unless he/she is a fool), and we may land – up in a problematic situation. However, if one uses both

methods, this will lead to ‘security in depth’. The message should first be encoded using a strong encryption algorithm and

then embedded into a carrier.


Thank you

You might also like