Professional Documents
Culture Documents
Image Steganography Scope
Image Steganography Scope
Project Proposal
(SCOPE DOCUMENT)
For
By
M. Faraz Haider CIIT/SP18-BCS-103/ISB
M. Farhan Shaukat CIIT/SP18-BCS-104/ISB
Supervisor
Mr. Tehseen Riaz Abbasi
Supervisor Signature
Date:
Scope Document for < Image Steganography With 3 Way Encryption >
Table of Contents
1 Introduction ............................................................................................................................. 4
2 Problem Statement ................................................................................................................... 5
3 Problem Solution for Proposed System ................................................................................... 6
4 Related System Analysis/Literature Review ........................................................................... 6
5 Advantages/Benefit of Proposed System ................................................................................ 7
6 Scope ....................................................................................................................................... 7
7 Modules ................................................................................................................................... 7
7.1 Module 1: Registration ..................................................................................................... 7
7.2 Module 2: Login ............................................................................................................... 7
7.3 Module 3: Encryption....................................................................................................... 7
7.4 Module 4: Decryption ...................................................................................................... 7
7.5 Module 5: Sharing ............................................................................................................ 7
8 System Limitation/Constraints ................................................................................................ 8
9 Software Process Methodology ............................................................................................... 8
10 Design Methodology............................................................................................................ 8
11 Tool and Technologies ......................................................................................................... 8
12 Project Stake Holders and Roles .......................................................................................... 9
13 Team Members Individual Tasks/Work Division................................................................ 9
14 Data Gathering Approach .................................................................................................... 9
15 Concepts ............................................................................................................................... 9
15.1 Android Development ...................................................................................................... 9
15.2 Web Development .......................................................................................................... 10
15.3 Desktop Application development ................................................................................. 10
16 Gantt chart .......................................................................................................................... 10
17 Mockups ............................................................................................................................. 10
18 Conclusion ......................................................................................................................... 13
19 References .......................................................................................................................... 13
3
Scope Document for < Image Steganography With 3 Way Encryption >
Project Category:
Abstract
Steganography is the process of hiding the fact that communication is taking place, by hiding
information in other information. Many different types of carrier file formats can be used, but
digital images are most widely used because of their frequency on the internet. For the purpose
of hiding secret information in digital images, there are a number of steganography techniques
some are more complex than others and all of them have respective strong and weak points.
Different applications would need absolute invisibility of the secret information, while others
require a large secret message to be hidden.
This scope document intends to give an overview of image steganography, its uses and
techniques to be used in the system. This document also tries to find out the requirements of a
good steganography algorithm and also briefly reflects about steganographic techniques which
are more suitable for which applications.
1 Introduction
Steganography has become more important as more and more people have joined the
cyberspace revolution. Steganography is the process of hiding information in ways that
prevent the detection of hidden messages. Steganography includes a sequence of secret
communication methods that hide the message from being seen or discovered.
4
Scope Document for < Image Steganography With 3 Way Encryption >
2 Problem Statement
One of the reasons that hackers can be successful is that the most of the information they
acquire from a system is in a form that they can read and contemplate. Intruders can reveal
the information to others, change it to misrepresent an individual or organization, or use it to
launch an attack.
5
Scope Document for < Image Steganography With 3 Way Encryption >
One solution to the problem is that through the use of Image steganography. Steganography
is a process of hiding information in digital media. The system will use image files as digital
media. As compared to cryptography, it is not used to keep others from knowing the secret
information but it is used to keep others from believing that the hidden information doesn’t
even exists. The objective of image steganography is secret communication. So, a main
requirement of this steganography system is that the secret message carried by stego-media
should not be visible to human beings.
This project has following objectives:
To product security tool based on image steganography techniques.
To explore different techniques of hiding data using encryption module of this
system.
To extract techniques of getting secret data using decryption module of this system.
6
Scope Document for < Image Steganography With 3 Way Encryption >
6 Scope
This system will be developed for hiding covert information in any image file. The scope of
this project is an implementation of steganography techniques for hiding information which
includes any type of image files and the path where the user wants to save Image and the
decrypted file.
7 Modules
The system consists of five modules:
Module 1: Registration
To access the core system, the user will first need to register themselves by providing
required details. The user will set his user name and provide a password and confirm
password for successful registration.
Module 2: Login
After registration, the user can log in to the system. For login, the user will provide his/her
username and password.
Module 3: Encryption
In this module the user will encrypt the secret message into an image file. First, the user
will select the algorithm such as DES (Data Encryption Standard), AES (Advanced
Encryption Standard) or LSB (Least Significant Bit) for encrypting data into the image
file. Then, the user selects an image for sending a secret message which will be encrypted
into the file.
Module 4: Decryption
In this module, the user will decrypt the given image file using a given code to access the
shared message. The user will first enter the transaction id, then the type of encryption and
at last the encryption key to decode the message.
Module 5: Sharing
After hiding the text with the encryption module, the user saves the image and then sends
it to the other party i.e. Receiver, who will be able to decrypt the message using the
7
Scope Document for < Image Steganography With 3 Way Encryption >
decryption module of the system. The user will first enter the encryption key, then the
message to be encrypted and at last the user id of the person to share with.
8 System Limitation/Constraints
The proposed system has a presumption that both the sender and receiver must have shared
some secret information before imprisonment. A pure steganography technique means that
there is no prior information shared by two communication parties.
10 Design Methodology
Object oriented design methodology is used in the development of the system because object
oriented design will be easier to manage for this system. The code created with this method
will easier to use and can be reused as well.
8
Scope Document for < Image Steganography With 3 Way Encryption >
15 Concepts
Following are the concepts that we will learn from the project:
Android Development
An android application will be built of this system which will be made in Android studio.
9
Scope Document for < Image Steganography With 3 Way Encryption >
Web Development
This system will also be implemented on web level using react.js at frontend level and java
at the backend level.
16 Gantt chart
17 Mockups
10
Scope Document for < Image Steganography With 3 Way Encryption >
11
Scope Document for < Image Steganography With 3 Way Encryption >
12
Scope Document for < Image Steganography With 3 Way Encryption >
18 Conclusion
Steganography is a really interesting subject and outside of the mainstream cryptography and
system administration that most of us deal with day after day. Steganography can be used for
hidden communication. We have explored the limits of steganography theory and practice. We
printed out the enhancement of the image steganography system using LSB approach to
provide a means of secure communication. A stego-key has been applied to the system during
embedment of the message into the cover image. This steganography application software
provided for the purpose to how to use any type of image formats to hiding any type of files
inside their. The master work of this application is in supporting any type of pictures without
need to convert to bitmap, and lower limitation on file size to hide, because of using maximum
memory space in pictures to hide the file. Since ancient times, man has found a desire in the
ability to communicate covertly. The recent explosion of research in watermarking to protect
intellectual property is evidence that steganography is not just limited to military or espionage
applications. Steganography, like cryptography, will play an increasing role in the future of
secure communication in the “digital world”.
19 References
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6850714&newsearch=true&qu
eryText=image%20steganography
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7226122&newsearch=true&qu
eryText=image%20steganography
http://www.google.com
http://www.wikipedia.org
13