[go: up one dir, main page]

0% found this document useful (0 votes)
12 views6 pages

Synopsis - CSE I 50

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 6

IMAGE STEGANOGRAPHY

MAJOR PROJECT SYNOPSIS

BACHELOR OF TECHNOLOGY
in

COMPUTER SCIENCE & ENGINEERING


by
DHRUV GOEL AKHILSH PARTAP
SINGH
Enrollment No: Enrollment
44114802717 No:44514802717

Guided by

Ms. NEELAM SHARMA

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


MAHARAJA AGRASEN INSTITUTE OF TECHNOLOGY
(AFFILIATED TO GURU GOBIND SINGH INDRAPRASTHA )
1.INTRODUCTION
Data hiding is of importance in many applications. For hobbyists, secretive data transmission, for
privacy of users etc. the basic methods are Steganography and Cryptography.
Steganography is a simple security method. Generally there are three different methods used for
hiding information: steganography, cryptography, watermarking.
In cryptography, the information to be hidden is encoded using certain techniques; this information
is generally understood to be coded as the data appears nonsensical.
Steganography is hiding information; this generally cannot be identified because the coded
information doesn’t appear to be abnormal i.e. its presence is undetectable by sight.
Detection of steganography is called Steganalysis.
Steganography is of different types:
1. Text steganography
2. Image steganography
3. Audio steganography
4. Video steganography
In all of these methods, the basic principle of steganography is that a secret message is to be
embedded in another cover object which may not be of any significance in such a way that the
encrypted data would finally display only the cover data. So it cannot be detected easily to be
containing hidden information unless proper decryption is used.

Figure. 1

As the above explanation goes, every steganography consists of three components:


1. Cover object
2. Message object
3. Resulting Stenographic object

In this project LSB, substitution method is implemented and DCT method is discussed for image
steganography. MATLAB is used for coding.

1.1 MATLAB

The name MATLAB stands for MATrix LABoratory. MATLAB was written originally to provide
easy access to matrix software developed by the LINPACK (linear system package) and EISPACK
(Eigen system package) projects. MATLAB is a high-performance language for technical computing.
It integrates computation, visualization, and programming environment. MATLAB has many
advantages compared to conventional computer languages (e.g., C, FORTRAN) for solving
technical problems. MATLAB is an interactive system whose basic data element is an array that
does not require dimensioning. Specific applications are collected in packages referred to as
toolbox. There are toolboxes for signal processing, symbolic computation, control theory,
simulation, optimization, and several other fields of applied science and engineering.

2.OBJECTIVE OF THE SYSTEM

This project will serve the following objectives: -

 Primarily concentrate on the data security issues when sending the data over the network
using stenographic techniques.
 to provide security tool based on steganography techniques to hide messages carried by
stego-media which should not be sensible to human beings
 avoid drawing suspicion to the existence of hidden message

3. FEASILBILITY STUDY

3.1 Technical Feasibility


Image Steganography is mainly a data security application that allows a user to hide data
(documents or text files) in an image. The user friendly interface requires no technical skills and is
easy to operate on. MATLAB is used for the design and coding purposes.

3.2 Economic Feasibility


The project is economic and highly beneficial project as far as the cost of development is
Considered. No extra costs were incurred apart from the software used.

3.3 Operational Feasibility


The project is operationally very feasible as it is user-friendly, the user doesn’t need any
Kind of knowledge about the software used in the project. The project is also really
Helpful as the user can use it to send encrypted data at any moment of time.

3.4 Need and Significance of Project


In today’s digital world where data protection, security and privacy are a big concern and Supreme
Court of India declaring Right to Privacy as a Fundamental Right under Article 21 of the Indian
Constitution, steganography and cryptography applications have become very important even when
these applications does not guarantee data protection but these can certainly reduce the risk of data
theft considerably.
Steganographic applications can also help in the defense of country where there has to be
maintained secrecy to protect the security of the country.

4. METHODOLOGY
In this project we will be using least significant bit (LSB) technique for image steganography
wherein we identifies the least significant bits of information in the carrier image and substitutes it
with their secret message.

Figure 2

5. DESIGN OF THE SYSTEM

5.1 Software Requirements

Platform: platform independent

Tool: Matlab

5.2Hardware Requirements

Processor: intel Pentium III 800MHz

RAM: minimum 512MB

Graphics: Integrated graphics card

Hard Disk: minimum 500MB


BENEFITS OF THE PROJECT FOR SOCIETY
• Confidential communication

• Media

• Defense sector

• Protection of data alteration

• E-commerce

You might also like