Professional Documents
Culture Documents
Project Members
JADDU SRISAI SEKHAR (173B5A0502)
VALLURI DEVI PRASANNA (163B1A05A7)
VAKADA MANOGNA (163B1A05A6)
SEELAM S S SAI ANUSHA (163B1A0596)
PEKETI SRIVIDYA (163B1A0583)
Contents
Abstract
Literature Survey
SRS Document
Methodology of Project
Conclusion
ABSTRACT
This decryption process can only be performed by an authenticated receiver using, Encryption of data on
images provides a safe and secure transmission of data between the sending and receiving party. The
data/text which the sender wants to transmit is selected first and then an image is chosen from the current
mobile device. The chosen text is then encrypted in the image such that the data is not visible to any third
party. After encryption is performed, the image is sent to receiving party and the receiver decrypts the data
using the key given by the sender this application.
Literature Survey
1. A Modified Filtering Approach of LSB Image Steganography Using Stream Builder along with AES Encryption
Sharmin Sultana1, Afrida Khanam1, Md. Rashedul Islam2, Adiba Mahjabin Nitu2, Md. Palash Uddin*2, Masud Ibn Afjal2 and Md. Fazle Rabbi2
FEB 2019
2. Review Paper on Image Steganography
1 Ashadeep Kaur*, 2Rakesh Kumar, 3Kamaljeet Kainth
JUNE 2016
3. Gray Code Based Data Hiding in an Image using LSB Embedding Technique
Karthikeyan B, Asha S, Poojasree B
MAY 2019
4. Implementation of Secure Steganography on Jpeg Image Using LSB Method
Danny Adiyan Z.1, Tito Waluyo Purboyo2 and Ratna Astuti Nugrahaeni3
AUG 2018
5. Data Security Using Cryptography and Steganography Techniques
Marwa E. Saleh Abdelmgeid A. Aly Fatma A. Omara
JUNE 2016
Literature Survey
6. Enhanced Security of Data using Image Steganography and AES Encryption Technique
Sandeep Panghal Sachin Kumar Naveen Kumar
JAN 2016
7. Enhanced Security with Steganography and Cryptography
Radha S. Phadte1, Rachel Dhanaraj2
NOV 2016
8. Image Steganography Using Mid Position Value Technique
Srilekha Mukherjeea,* , Subhajit Roya , Goutam Sanyala
FEB 2018
9. New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check
MUSTAFA CEM KASAPBAS¸I* and WISAM ELMASRY
APRIL 2018
10. Information Hiding in Images Using Steganography Techniques
Ramadhan Mstafa1, Christian Bach2
MARCH 2013
SRS Document
Project Title : Hidden Secrets Behind The Images
Project Scope : The scope of our project is presently specific. Both the sender and the receiver must have this software
installed on their systems to encrypt/decrypt and compress/decompress the files transmitted between them. This includes
all the users who want to interact electronically, whether it is through emails, ecommerce, etc. Through internet in order
to keep their private information confidential.
System Overview :Hiding information in text is historically the most important method of steganography. An obvious
method was to hide a secret message in every nth letter of every word of a text message. It is only since the beginning of
the Text Images Audio/ video Protocol Internet and all the different digital file formats that is has decreased in
importance.
SRS Document
Design Constraints:
System Constraints:
Team Size: 5
S.E Model: Waterfall Model
Methodology of Project
Model description:
The project that is used to perform secret data transmission by performing encryption of text on images. The
sender uses a key to perform encryption and the same key is given to the receiver to decrypt and obtain the data.
System Architecture
Processing Processing
(Hiding Mechanism) (Extracting Mechanism)
Output
Secret key
(Data)
Methodology of Project
Modularization:
Registration: In this registration module consists of various fields like User id,
Password, Confirm Password, Security Question, Answer.
Login: you can login into app by using User id and Password that are previously
registered.
Encryption: In this module Text Message, Secret Key, Browse file, Save Code, Send
Image fields to encrypt the data.
Decryption: This module consists of Browse file, Get Code, Get Text fields to decrypt
the encrypted message.
Methodology of Project
Services Description:
Encryption:
Encryption schemes transform a plaintext message (or stored data) into a cipher text in such a way that the
cipher text reveals little or no information about the original plaintext.
Decryption:
Decryption is generally the reverse process of encryption. It is the process of decoding the data which has
been encrypted into a secret format. An authorized user can only decrypt data because decryption requires a secret key
or password.
Features of project:
Alleged use by intelligence services
Distributed steganography
Online Challenge
Conclusion:
Steganography can protect data by hiding it but using it alone may not guarantee total protection. It is possible that
by using a steganocryption technique, enemy detects presence of text message in the image file and then he/she may
succeed in extracting information from the picture, which can be disastrous in real life situations. This is same for plain
encryption. In this case by seeing the meaningless appearing sequence of bits enemy can detect that some illegal message
is being sent (unless he/she is a fool), and we may land – up in a problematic situation. However, if one uses both
methods, this will lead to ‘security in depth’. The message should first be encoded using a strong encryption algorithm and