Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

Jyothy Charitable Trust®

Jyothy Institute of Technology


Tataguni, off Kanakapura road, Bengaluru-560082
Approved by The All India Council for Technical Education (AICTE) - New
Delhi;
Affiliated to VisvesvarayaTechnological University (VTU), Belagavi;

Department of Artificial Intelligence and Machine


Learning
2023-2024

A Mini Project Report on

“IMAGE STEGANOGRAPHY”
Submitted in partial fulfilment for the award of the degree of

BACHELOR OF TECH NOLO G Y


ARTI FI CI AL INTELLIGENCE AND MACHINE LEARNING

SUBMITTED BY

R Santhosh Babu
1JT20AI031

Venkatesh S
1JT20AI051

Under the guidance of

Dr. Madhu B R
Professor and HOD
Department of Artificial Intelligence and Machine Learning

Prof. Soumya K N
Assistant Professor
Department of Artificial Intelligence and Machine Learning
Jyothy Charitable Trust®
Jyothy Institute of Technology
Tataguni, off Kanakapura road, Bengaluru-560082
Approved by The All India Council for Technical Education (AICTE) - New
Delhi;
Affiliated to Visvesvaraya Technological University (VTU), Belagavi;

Department of Artificial Intelligence and Machine


Learning

CERTIFICATE

This is to certify that the project work titled “IMAGE STEGANOGRAPHY” is carried out by R
Santhosh Babu (1JT20AI031), Venkatesh S (1JT20AI051), a Bonafede students of
Bachelor of Technology at the Jyothy Institute of Technology, Bangalore in partial
fulfillment for the award of degree in Bachelor of Technology in Artificial Intelligence and
Machine Learning, during the year 2023-2024.

Prof. Soumya K N Dr. Madhu B R


Assistant Professor Professor
Dept. of AIML, Dept. of AIML,
JIT, VTU, JIT, VTU,
Bangalore Bangalore
Date: Date:

Name of the Examiner Signature of Examiner

1.

2.
DECLARATION

We, R Santhosh Babu (1JT20AI031), Venkatesh S (1JT20AI051), are students of sixth


semester B.Tech in Artificial Intelligence and Machine Learning at Jyothy Institute of
Technology, VTU, hereby declare that the project titled “Image Steganography” has
been carried out by us and submitted in partial fulfilment for the award of degree in
Bachelor of Technology in Artificial Intelligence and Machine Learning during the
academic year 2023-2024. Further, the matter presented in the project has not been
submitted previously by anybody for the award of any degree or any diploma to any other
University, to the best of our knowledge and faith.

Signature
Name: R Santhosh Babu
USN:1JT20AI031
Name: Venkatesh S
USN: 1JT20AI051

Place : Bangalore
Date :
ACKNOWLEDGEMENT

It is a great pleasure for us to acknowledge the assistance and support of a large


number of individuals who have been responsible for the successful completion of this
project work.
First, we take this opportunity to express our sincere gratitude to Jyothy Institute of
Technology, VTU for providing us with a great opportunity to pursue our Bachelor’s Degree
in this institution.
In particular we would like to thank Dr. Gopalkrishnan, Principal, Jyothy Institute
of Technology, VTU for their constant encouragement and expert advice.
It is a matter of immense pleasure to express our sincere thanks to Dr. Madhu B
R , Head of the department, Artificial Intelligence and Machine Learning,VTU, for
providing right academic guidance that made our task possible.

We would like to thank our guide Prof. Soumya K N Assistant Professor, Dept. of
Artificial Intelligence and Machine Learning, for sparing his/her valuable time to extend
help in every step of our project work, which paved the way for smooth progress and fruitful
culmination of the project.

We would like to thank our Project Coordinator Prof. Soumya K N and all the staff
members AIML for their support.
We are also grateful to our family and friends who provided us with every
requirement throughout the course.
We would like to thank one and all who directly or indirectly helped us in completing
the Project work successfully.

Signature of Students
ABSTRACT

Steganography is the science of invisible communication. Apart from the sender and
intended recipient no one suspects the existence of the message. Using Steganography,
information can be hidden in various mediums known as carriers. The carriers can be
images, audio, video, and text files. Image Steganography is a technique of using an image
file as a carrier. Cryptography protects the information by applying encryption and
decryption techniques so that the secret message can be understood only by the right person.
This project proposes a method combining the techniques of Steganography and
cryptography to hide secret data in an image. In the first phase, the sender will embed the
secret data in an image by using the Least Significant Bit (LSB) technique. The embedded
image will be encrypted by using an encryption algorithm. At final, the encrypted image
will be decrypted and the hidden data will be retrieved by supplying the valid secret key by
the receiver. The process includes the phases of Data embedding, Image Encryption, and
recovery of both the original image and secret data from the encrypted image.
TABLE OF CONTENTS

Page No

Chapter 1
1. INTRODUCTION…………………………………………………………………. 01

Chapter 2
2. Literature Survey………………………………….............................................. 05

Chapter 3
3. Objective and Methodology……………………………………………………. 08
3.1 Objective
3.2 Methodology

Chapter 4
4. System Design………………………………………………………………... 10
4.1 System Architecture
4.2 Use Case diagram
4.3 Sequence diagram
4.4 Algorithms used

Chapter 5
5. Implementation and Design…………………………………………………….. 16
5.1 Implementation of LSB
5.2 Results

Chapter 6
6. Hardware and Software requirement…………………………………………… 23

6.1 Hardware requirement


6.2 Software requirement
Conclusion
References
Image Steganography

Chapter 1
Introduction
1.1Steganography
The word stegano mean cover and graphical mean write. Thus Stegano and graph both combine
together to make the process in which we hide the important information inside the image using
some encoding technique. This process not only hides the data it also hides the communication
which means others will not know whether the communication is taking place or not.
Steganography is the secret process of which nobody can know of except the one who is
encoding the secret message inside the image(i.e. Sender) and the other for whom the message
is being encoded(i.e. receiver). In other words, it is also known as the study of unperceivable
communication. Steganography is the process in which the image is input by the user and after
encoding it with the secret data a STEGO-image is generated. Which is slightly changed from
the original image but the difference is unnoticeable. In the current time, Steganography is used
in many places and one of the important examples is Army duty stations. This is the place
where steganography is the only safe medium to use because they don’t want their secret
information to be shared with the ones across the border. Similar of this process can be seen
back in ancient times when the king use to bald his commander’s head so that he can write
some information on it and hide it with something that doesn‟t generate any suspects.

Fig 1.1 Steganography Process

Department of AI&ML 1
Image Steganography

The above pictured diagram can be summed up to image steganography. The secret message
is the important information which user wants to hide. Cover is the image which will be used
to hide the data. The algorithm used will combine these two and will generate a secret key
without which nobody can access the information not even the receiver.

Applications of steganography

1. Confidential communication.

2. Protection of data alteration.

3. E-commerce.

4. Media

5. Database system.

6. Digital watermarking.

1.2 Steganography principle


Secret message is covered into the cover of the object by a secret hiding algorithm and are sent
to a receiver end. Then receiver applies the reverse acting process on the cover image and
reveals the secret info. The secret message is then covered into the cover image using the
steganographic algo in a way that do not changes the actual image. The results are now into a
new image, the stego-image, which is not different from the original image. From the third
party view, but there exist a secret msg. The purpose of using image is of not important, it
present only as a carrier for hidden msg. The secret message is embedded into the cover object
by steganographic algorithm and are sent to a receiver ends. The receiver then performs the
reverse action on the cover image by doing so it can achieve the secret data. The Suitable image,
known the cover or carrier, are chosen. The secret message is then embedded inside the cover
by using the steganographic algorithm, in a particular way that do not changes the original
image info in any human visible way. The results are now in new image, the stegoimage, that
are not viewed different from the original info. Almost any file type can be used for this
process, but the type that is more convienent are those having redundancy very large. The
redundant bits of an target is those bit that could be altered without the visible changes. Image
and audio files especially comply with this need. Since, images are quite famous cover or
carrier target used for steganography. In the range of digital images many other image file

Department of AI&ML 2
Image Steganography

format exist, For those different image file format, other steganographic algorithm exist The
secret message is embedded into the cover object by steganographic algorithm and are sent to
a receiver side. The receiver then performs the reverse action on the stego image and reveals
the secret info. The embedding, i.e. steganography algorithms, tries to save the perceptive type
of the original images. The Suitable image, known the cover or carrier, are chosen. The secret
message is then embedded inside the cover by using the steganographic algorithm, in a
particular way that do not changes the original image info in any human perceptible way. The
results are new images, the stego-image, that are not viewed different from the original info.
From an observer’s view, the being of a secret message are (visibly) out of sight. The purpose
of using image is of not importance, it serve only and only as a carrier for out of sight message.

Fig 1.2 Flow of Image Steganography

Summary: The first task is to open the software. In our case this software asks for
authentication so every user have to enter there username and passwords for the security
purpose. If the id-pass matches. Four options get available in-front of user as :

1. Input the message.

2. Input the cover-image.

3. Generate a stego-image.

4. Generate a secret key.

Department of AI&ML 3
Image Steganography

5. Send image to the receiver.

6. Abort.

7. Help.

A use case diagram helps the developer to know how the user will interact with the software.
First user enters the secret message that he/she wants to share anonymously. After this he/she
inputs the picture and after validating the image size and data size information gets covered up
inside the picture and a stego image is generated. At the other end(i.e. receiver’s end), the
receiver gets the stego-image(i.e. generated image) and applies the reverse formula it. After
that only the secret content could be achieved.

Department of AI&ML 4
Image Steganography

Chapter 2

Literature survey

1. How to Share a Secret – “Adi Shamir Massachusetts Institute of

Technology”,(1979)
This paper presents a technique for dividing data into pieces that can be easily reconstructed
from any k pieces while ensuring that even complete knowledge of k-1 pieces reveals no
information about the data. This technique is useful for constructing robust key
management schemes for cryptographic systems. The paper discusses the limitations of
traditional key management schemes and proposes a solution to overcome these limitations.
The proposed technique enables secure and reliable key management in cryptographic
systems even in the face of misfortunes and security breaches.

2. “A Comparative Study of Recent Steganography Techniques for Multiple

Image Formats” Arshiya Sajid Ansari, Mohammad Sajid Mohammadi,


MohammadTanvirParvez(2019)
The paper focuses on steganalysis and applications of Steganography. It explores various
image file formats such as JPEG, BMP, PNG, and TIFF, as well as different color models
like CMYK, RGB, HSL, HSV, NCS, and DCT for image formats. The evaluation reveals
that JPEG (DCT/DWT) algorithms provide high resistance to steganalysis. BMP spatial
domain techniques have higher capacity but are easily susceptible to steganography
Whereas PNG palette techniques are more reliable and suitable for small-size data
implementation.

3. “Steganography Algorithm to Hide Secret Message inside an Image”,


Rosziati Ibrahim and Teoh Suk Kuan, (2011)
In this paper, the authors propose a new algorithm to hide data inside image using
steganography technique. The proposed algorithm uses binary codes and pixels inside an
image. By applying the proposed algorithm, a system called Steganography Imaging
System (SIS) is developed.Based on the PSNR value of each images, the stego image has

Department of AI&ML 5
Image Steganography

a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the
data inside the image.SIS can be used by various users who want to hide the data inside the
image without revealing the data to other parties SIS maintains privacy, confidentiality and
accuracy of the data.
4. “A Comparative Study of Recent Steganography Techniques for Multiple
Image Formats” Arshiya Sajid Ansari, Mohammad Sajid Mohammadi,
Mohammad Tanvir Parvez(2019)
The paper focuses on steganalysis and applications of Steganography. It explores various
image file formats such as JPEG, BMP, PNG, and TIFF, as well as different color models
like CMYK, RGB, HSL, HSV, NCS, and DCT for image formats. The evaluation reveals
that JPEG (DCT/DWT) algorithms provide high resistance to steganalysis. BMP spatial
domain techniques have higher capacity but are easily susceptible to
steganographyWhereas PNG palette techniques are more reliable and suitable for small-
size data implementation.

5. “Security Improvement of Cloud Data Using Hybrid Cryptography and


Steganography”, Mustafa S. Abbas, Suadad S. Mahdi and Shahad A.Hussien,
(2020)
The paper addresses the security concerns of data storage in cloud environments. The
proposed algorithm begins by compressing the data using the LZW algorithm, reducing its
size .Hybrid encryption is then applied, utilizing both the AES symmetric and RSA
asymmetric algorithms to enhance security. The encrypted data is concealed using the LSB
technique, embedding it within the cover image. Additionally, a hashing algorithm is
employed for further protection. The analysis of the algorithm's performance is conducted
using metrics such as PSNR (Peak Signal-to-Noise Ratio) and SSIM (Structural Similarity
Index Measure).The results indicate that the PSNR values of the stego image are higher for
the compressed data when compared to non-compressed data, suggesting improved image
quality after compression.

6. “An Efficient Algorithm for Confidentiality, Integrity and Authentication


Using Hybrid Cryptography and Steganography”, Chitra Biswas, Udayan
Das Gupta, Md. MokammelHaque, (2019)

Department of AI&ML 6
Image Steganography

The paper explores the intersections of cryptography and steganography. It introduces three
key principles for steganography algorithms: Security, Capacity, and Robustness. The
proposed algorithm combines steganography and hybrid cryptography techniques. Initially,
the message is encrypted using the AES algorithm, and the symmetric key is further
encrypted using the public key of RSA, enhancing security. A digital signature is generated
using the RSA public key to create a hash value of the message, ensuring integrity. At the
receiver's end, the digital signature is used to verify the integrity of the message. The
message is embedded using the LSB technique, maintaining confidentiality.The
experiment's results demonstrate that the histograms of both the cover image and stego
image are identical, providing confidentiality, integrity, and authentication.

7. “An improved security and message capacity using AES and Huffman
coding on image steganography”, Christy Atika Sari, Giovani Ardiansyah,
De Rosal Ignatius Moses Setiadi, Eko Hari Rachmawanto, (2019)
Cryptography and steganography are commonly used methods in the field of information
security to ensure data security. The paper focuses on techniques such as Discrete Wavelet
Transform (DWT), AES, and Huffman coding. The proposed method combines AES,
Huffman coding, and DWT to reduce the total number of bits in the message. The
experiment evaluates the method using metrics such as PSNR (Peak Signal-to-Noise Ratio)
and MSE (Mean Squared Error). The conclusion drawn from the proposed method is that
it achieves a high-quality stego image with a significant reduction in the total number of
bits in the message, up to 22.319% compared to the original message. The quality of the
stego image is confirmed by obtaining a median PSNR result of more than 40dB,
specifically 46.1788.

8. “Image Steganography using LSB and encrypted message with AES,RSA,

DES, 3DES, and Blowfish”, Masumeh Damrudi, Kamal Jadidy Aval, (2019)
The paper evaluates cryptographic techniques such as AES, RSA, DES, 3DES, and
Blowfish, along with the steganography algorithm LSB. The cryptographic algorithms are
implemented as Java programs and imported into the MATLAB environment for analysis.
A comparative investigation is conducted on these algorithms within the same environment
to assess factors like encryption and decryption time. The goal is to achieve high security

Department of AI&ML 7
Image Steganography

by combining cryptography and steganography. The data is first encrypted using the
mentioned algorithms, followed by the embedding of a secret message using the LSB
algorithm. The results of the investigation indicate that the execution time of RSA is longer
compared to the other algorithms considered.

9. “Hiding data in images using steganography techniques with compression


algorithms” Osama F. Abdel-Wahab, Aziza I. Hussein, Hesham F. A. Hamed,
Hamdy M. Kelash, Ashraf A.M. Khalaf, and Hanafy M. Ali , (2019)
The paper examines steganographic techniques in conjunction with a compression
algorithm. It provides an explanation of the embedding and extracting algorithms involved
in the process. A comparison is conducted between two different techniques. The first
technique involves using the LSB algorithm without encryption and compression. In the
second technique, the secret message is encrypted, and the LSB algorithm is applied
alongside the DCT algorithm to transform the image into the frequency domain. The
experiment's findings indicate the importance of hiding secret data while minimizing its
size to enhance security. MSE and PSNR are utilized to evaluate the performance of the
two approaches. The results demonstrate that the combined use of LSB and DCT
effectively reduces the number of bytes in the file, resulting in faster transmission and
requiring less disk space.

10.“Image Steganography: A Review of the Recent Advances”, Nandhini


Subramanian, Omar Elharrouss, Somaya Al-Maadeed and Ahmed Bouridane,
(2021)
The paper provides an overview of recent advances in image steganography. It discusses
traditional methods such as LSB, PVD, DCT, and EMD, highlighting their limitation of
introducing distortion due to high capacity requirements that burden the cover image with
additional pixels for hiding the secret message. The paper explores CNN-based image
steganography techniques and GAN steganography. An inspection is conducted,
comparing the PSNR values, and it reveals that the cycle GAN achieves the highest PSNR
value of 64.7, indicating its effectiveness in maintaining image quality. GAN-based
methods are found to enhance security and hidden capacity in image steganography.

Department of AI&ML 8
Image Steganography

Chapter 3

Objective and Methodology

3.1 Objective

 To conduct an in-depth review of existing image steganography techniques and identify


their strengths and weaknesses.

 To analyze the security of the proposed technique against various steganalysis attacks
and measure its resistance to detection.

 To develop a user-friendly interface for the proposed technique that allows users to
embed and extract hidden information easily.

 To conduct a user study to assess the usability and user satisfaction of the proposed
technique.

3.2 Methodology

Image steganography is a technique used to hide information or data within an image while
maintaining the image's visual appearance. The goal is to embed the secret message in a way
that is imperceptible to the human eye and difficult to detect without the knowledge of a secret
key.

The methodology for image steganography with a secret key typically involves the following
steps:

1. Secret Key Generation: A secret key is generated using a cryptographic algorithm. The key
should be strong and kept confidential, as it is required for both embedding and extracting the
secret message.

Department of AI&ML 9
Image Steganography

2. Message Encryption: The secret message or data that needs to be hidden is encrypted using
a symmetric or asymmetric encryption algorithm along with the secret key. This step ensures
that even if the steganographic image is intercepted, the hidden message remains secure.

3. Image Selection: An appropriate cover image is selected as the carrier for the secret
message. The cover image should be chosen carefully to blend well with the hidden data and
avoid suspicion.

4. Embedding Process: The secret message bits are inserted into the cover image by modifying
the least significant bits (LSBs) of the image pixels. The LSBs are typically altered because
human eyes are less sensitive to minor changes in these bits, allowing the hidden message to
remain visually undetectable.

5. Key-based Embedding: The secret key is utilized during the embedding process to
determine the exact locations and order in which the secret message bits should be inserted.
The key ensures that only individuals with knowledge of the key can successfully extract the
hidden message.

6. Reversible Embedding: To ensure the possibility of retrieving the original message,


reversible embedding techniques may be employed. This means that the embedding process is
designed to be reversible, allowing the extraction of the hidden message without any loss or
corruption.

7. Extraction Process: To retrieve the hidden message from the steganographic image, the
extraction process is performed using the same secret key. The LSBs of the image pixels are
examined according to the key, and the embedded message bits are extracted.

8. Message Decryption: Once the hidden message bits are extracted, they are decrypted using
the secret key and the corresponding decryption algorithm. This step is necessary to retrieve
the original message or data.

9. Verification and Validation: The extracted message is compared with the original message
to ensure its integrity and accuracy. The secret key is used to confirm the correctness of the
extraction process.

Department of AI&ML 10
Image Steganography

Chapter 4

System Design

4.1 System Architecture


1. User Interface Layer:
 Activities and Fragments: Android activities and fragments are responsible for
presenting the user interface (UI) to the user. They interact with the user, gather input,
and display relevant information.
 UI Components: This layer includes various UI components such as buttons, text fields,
image views, etc., which allow users to interact with the app and provide necessary
input.

2. Image Processing Layer:


 Image Selection: This component allows the user to select an image from the device's
gallery or capture a new image using the device's camera.
 Image Steganography: The core functionality of hiding and extracting the secret
message from the selected image resides in this component. It includes algorithms and
methods for embedding and extracting data within the image pixels while preserving
the image's visual quality.
 Encryption and Decryption: This component handles the encryption and decryption of
the secret message using cryptographic algorithms. It ensures that the message remains
secure and can only be accessed with the appropriate key.

3. Integration Layer:
 Data Communication: This layer handles the exchange of data between the user
interface layer and the image processing layer. It ensures that user input, selected
images, and hidden/extracted messages are passed between the relevant components.
 Key Management: This component is responsible for generating and managing secret
keys. It allows users to input or generate keys, which are then used during the
embedding and extraction processes.
 Error Handling: This component handles various error scenarios, such as incorrect key
input, unsupported image formats, or failures during the embedding/extraction

Department of AI&ML 11
Image Steganography

processes. It provides appropriate feedback to the user and ensures smooth operation of
the app.

4. Storage and Persistence Layer:


 Image and Message Storage: This layer is responsible for storing and retrieving images
and hidden messages. It may utilize device storage, a local database, or cloud storage
services.
 Caching: This component handles caching of images or processed data to optimize
performance and reduce the need for repeated image selection or processing.

5. External Libraries and APIs:


 Android APIs: The app may utilize various Android APIs for functionalities such as
image selection, camera access, UI components, and data storage.
 External Libraries: Additional libraries for image processing, encryption, and
decryption may be integrated into the app to enhance its capabilities and ensure efficient
implementation.

4.2 Use Case Diagram

Fig 4.2.1 Use Case Diagram

Department of AI&ML 12
Image Steganography

4.3 Sequence Diagram

Fig 4.3.1 Sequency Diagram

4.4 Algorithm Used

The Least Significant Bit (LSB) algorithm is a commonly used technique in image
steganography to embed secret data within the least significant bits of an image's pixel values.
The LSB algorithm takes advantage of the fact that small changes in the least significant bits
are less noticeable to the human eye and can be used to hide information without significantly
affecting the image's visual appearance.

1. Image Representation:

 Digital Images: Images are represented in a digital format as a grid of pixels, where
each pixel corresponds to a specific location and contains color information.

Department of AI&ML 13
Image Steganography

 Pixel Structure: Each pixel consists of colour channels, typically represented as Red,
Green, and Blue (RGB) values. Each colour channel is represented by a binary value
ranging from 0 to 255 (8 bits).

2. Secret Message:

 Binary Representation: The secret message or data that needs to be hidden is converted
into its binary representation.
 Bit Stream: The binary representation of the secret message forms a sequential bit
stream, consisting of 0s and 1s.

3. Embedding Process:

 Least Significant Bit Modification: The LSB algorithm focuses on modifying the least
significant bits of the pixel values while keeping the most significant bits unchanged.
 Pixel Modification: Each bit of the secret message is sequentially embedded into the
least significant bit of the corresponding pixel's color channel.
 Pixel Modification Example: Let's consider embedding a bit '0' into the least significant
bit of an 8-bit pixel value '11001111'. The resulting modified pixel value would be
'11001110'.

4. Embedding Rules:

 Capacity Limitation: The amount of secret data that can be embedded in an image
depends on the number of available pixels and the number of bits used for embedding
in each pixel.
 Pixel Selection: Pixels for embedding can be selected using different strategies, such as
a predetermined order or random selection, to distribute the hidden data across the
image.
 Sequential Embedding: The secret message bits are sequentially embedded into the
least significant bits of the pixels following a specific order, such as row by row or
column by column.

5. Extraction Process:

 Reverse Algorithm: The extraction process involves applying the reverse of the
embedding algorithm.

Department of AI&ML 14
Image Steganography

 Pixel Examination: The LSBs of the pixels are examined, and the embedded secret
message bits are extracted.
 Sequential Extraction: The extraction process follows the same order as the embedding
process, examining pixels in the same predetermined order.

6. Limitations and Considerations:

 Image Format: The LSB algorithm is typically suitable for lossless image formats
where no compression or data loss occurs during storage or transmission.
 Image Size: The amount of secret data that can be hidden is limited by the image's size
and the number of pixels available for embedding.
 Sensitivity to Alterations: While small modifications to the LSBs are less perceptible
to the human eye, careful consideration should be given to avoid significant changes
that might result in noticeable artifacts or visual distortion.

Department of AI&ML 15
Image Steganography

Chapter 5
Implementation and Results
5.1 Implementation of LSB Steganography

1. Load the cover image and the secret message: The cover image is the image in which we
want to hide the secret message. The secret message can be any form of data (text, image,
audio, etc.) that we want to conceal.

2. Convert the secret message into binary: Each character or data element in the secret
message is represented by a sequence of binary bits.

3. Embed the secret message in the cover image: The LSB substitution technique involves
replacing the least significant bits of the pixel values in the cover image with the bits from the
secret message. This is done in a sequential manner, where each bit of the secret message is
embedded into the corresponding pixel of the cover image.

4. Save the stego image: After embedding the secret message, save the modified cover image
as the stego image.

5. Extract the secret message from the stego image: To retrieve the secret message, the LSBs
of the pixel values in the stego image are extracted and concatenated to form the binary
representation of the secret message. This binary message is then converted back into its
original format.

Department of AI&ML 16
Image Steganography

Fig 5.1.1 Encoding Process

Department of AI&ML 17
Image Steganography

Fig 5.1.2 String to binary and binary to string conversion

Department of AI&ML 18
Image Steganography

Fig 5.1.3 Decoding Process

5.2 Results
Image steganography is a technique that allows for the concealment of secret information
within an image without perceptible changes to the image itself. In this project, the Least
Significant Bit (LSB) technique was employed for the purpose of embedding and extracting
hidden data.
The LSB technique operates by replacing the least significant bit of each pixel in the carrier
image with a bit from the secret message. Since the change in the LSB has minimal impact on

Department of AI&ML 19
Image Steganography

the overall visual appearance of the image, it ensures the stealthy nature of the steganographic
process.
To achieve this, the project utilized a combination of image processing and cryptography
algorithms. The carrier image was first loaded into the system, along with the secret message
that needed to be embedded. The secret message was encrypted using a secure encryption
algorithm to enhance its confidentiality.
Next, the LSB of each pixel in the carrier image was overwritten with the corresponding bit
from the encrypted message. This process was repeated for all pixels in the image until the
entire message was embedded. The resulting stego-image appeared identical to the original
image to the naked eye.
To extract the hidden message, the stego-image was processed using the reverse procedure.
The LSB of each pixel was extracted and decrypted to reveal the embedded secret message.
This allowed for the retrieval of the original information without any noticeable degradation in
image quality.

Fig 5.2.1: Home Page

Department of AI&ML 20
Image Steganography

Fig 5.2.2: Encode

Department of AI&ML 21
Image Steganography

Fig 5.5.3: Decode

Department of AI&ML 22
Image Steganography

Chapter 6
Hardware and Software requirements
The ways in which the system works:

• Secret information: In this process, the sender has two options whether it could upload the
secret data file or it could write it.

• Cover image: cover image is the image that is chosen for the process, in this the secret
message will get hidden.

• Sender: The person who wants to send secret information to someone with the help of a
steganographic system.

• Receiver: The receiver receives the stego image and after the system validates the
authenticity it opens the option for decrypting the image to get the hidden text inside that stego-
image.

6.1 Non-Functional Requirements

• Safety requirements: For the safety purpose the sender and receiver should have the same
software to encrypt an decrypt the message and the secret key generated by the algorithm
should not be shared with other than the receiver.

• Security requirements: As the software hides the secret information so it should not get into
the wrong hands.

• Software quality attributes: The quality of the software is a very important issue which
maintained in such a way that communication can only take place with the help of image
between sender and receiver.

6.2 System Requirements

6.2.1 SOFTWARE REQUIREMENTS

•Android Studio.

Department of AI&ML 23
Image Steganography

• OS: Windows 10 /11.

6.2.2 HARDWARE REQUIREMENTS

• Minimum hardware requirements: Pentium 3166 HZ or Higher 128 mb RAM

• Intell I7 4.80 GHZ 8GB Ram

Department of AI&ML 24
Image Steganography

Conclusion.
The image steganography deployed in Android Studio offers a versatile and practical solution
for hiding sensitive information within images. By leveraging the LSB algorithm and
integrating it into an Android app, users can securely exchange hidden messages while
maintaining the image's visual integrity.

1. Secure Communication: Image steganography provides a means of secure communication


by hiding sensitive information within the image itself. The hidden message remains concealed
and can only be accessed by individuals with knowledge of the secret key.

2. User-Friendly Interface: Deploying image steganography in Android Studio allows for the
creation of a user-friendly interface. Users can easily select images, embed secret messages,
and extract hidden data using familiar interactions on their Android devices.

3. Imperceptible Modification: The LSB algorithm used in image steganography ensures that
the modifications made to the image are imperceptible to the human eye. By altering the least
significant bits of pixel values, the visual appearance of the image remains intact, reducing the
likelihood of detection.

4. Key-Based Security: The inclusion of a secret key adds an additional layer of security to
the steganographic process. Only users with the correct key can successfully extract the hidden
message, ensuring confidentiality and preventing unauthorized access.

5. Integration with Android Capabilities: Android Studio offers access to a wide range of
built-in features and APIs that can be leveraged to enhance the functionality of the
steganography app. This includes image selection from the gallery, camera access, and efficient
data storage

6. Practical Use Cases: Image steganography deployed in Android Studio can find
applications in various scenarios. It can be used for secure communication in sensitive
environments, data exchange in covert operations, or embedding metadata within images for
copyright protection or verification purposes.

In conclusion, deploying image steganography in Android Studio empowers users to exchange


hidden messages within images, offering a practical and user-friendly approach to secure

Department of AI&ML 25
Image Steganography

communication. By leveraging the LSB algorithm and integrating key-based security, it


ensures the confidentiality of the hidden information. However, it's essential to remain
cognizant of the limitations and continuously assess the security requirements based on the
specific use case.

Department of AI&ML 26
Image Steganography

References
[1] How to Share a Secret – “Adi Shamir Massachusetts Institute of Technology”, (1979)

[2] “A Comparative Study of Recent Steganography Techniques for Multiple Image


Formats” Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir
Parvez(2019)

[3] “Steganography Algorithm to Hide Secret Message inside an Image”, Rosziati Ibrahim
and Teoh Suk Kuan, (2011).

[4] “A Comparative Study of Recent Steganography Techniques for Multiple Image


Formats” Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir
Parvez(2019)

[5] “Security Improvement of Cloud Data Using Hybrid Cryptography and


Steganography”, Mustafa S. Abbas, Suadad S. Mahdi and Shahad A.Hussien, (2020)

[6] “An Efficient Algorithm for Confidentiality, Integrity and Authentication Using
Hybrid Cryptography and Steganography”, Chitra Biswas, Udayan Das Gupta, Md.
MokammelHaque, (2019)

[7] “An improved security and message capacity using AES and Huffman coding
on image steganography”, Christy Atika Sari, Giovani Ardiansyah, De Rosal Ignatius Moses
Setiadi, Eko Hari Rachmawanto, (2019)

Department of AI&ML 27

You might also like