Professional Documents
Culture Documents
Progress Report CSE-1-50
Progress Report CSE-1-50
Progress Report CSE-1-50
Progress Report
BACHELOR OF TECHNOLOGY
in
Guided by
The growing use of Internet needs to take attention while we send and receive
personal information in a secured manner. For this, there are many approaches
that can transfer the data into different forms so that their resultant data can be
understood if it can be returned back into its original form. This technique is
known as encryption. However, a major disadvantage of this method is that the
existence of data is not hidden. If someone gives enough time then the
unreadable encrypted data may be converted into its original form.
A solution to this problem has already been achieved by using a “steganography”
technique to hide data in a cover media so that other cannot notice it. The
characteristics of the cover media depends on the amount of data that can be
hidden, the perceptibility of the message and its robustness.
2.PROBLEM STATEMENT
This project addresses the security problem of transmitting the data over internet
network, the main idea coming when we start asking that how can we send a
message secretly to the destination? The science of steganography answers this
question. Using steganography, information can be hidden in carriers such as
images, audio files, text files, videos and data transmissions.
In this document, we proposed some methods and algorithms of an image
steganography system to hide a digital text of a secret message.
3.PROJECT SCOPE
Our project scope is developed for hiding information in any image file to ensure
the safety of exchange the data between different parties and provide better
security during message transmission.
The scope of the project is implementation of steganography tools for hiding
information includes any type of information file and image files and the path
where the user wants to save image and extruded file. We will use LSB
technique; the proposed approach is to use the suitable algorithm for embedding
the data in an image files; we will show a brief of this algorithm that we used to
hiding data.
4.TECHNOLOGY STACK
MATLAB
DATA ACQUISITION TOOLBOX
IMAGE PROCESSING TOOLBOX
IMAGE ACQUISITION TOOLBOX
5.ARCHITECTURE
For our project we have worked on image steganography out of all the 4 types.
Image is broken into 8×8 pixel blocks and transforms these pixel blocks
into 64 DCT. Working from left to right, up to down, the DCT is applied
to each block. Through quantization table each block is compressed to
scale the DCT coefficients and message is embedded in DCT
coefficients. The array of compressed blocks that constitute the image is
stored in drastically reduced the amount of space. When desired, image
is reconstructed through decompression, a process that uses the Inverse
discrete cosine transform i.e., IDCT is applied.
6.2.6.2 RESULTS
7. NEXT TARGET
Applying LSB for hiding text in image using MATLAB.
Try to mix 2 techniques of LSB and DWT for more secure communication
8. CONCLUSIONS
Although only some of the main image steganographic techniques were
discussed in this document, one can see that there exists a large selection of
approaches to hiding information in images. All the major image file formats
have different methods of hiding messages, with different strong and weak
points respectively. Where one technique lacks in payload capacity, the other
lacks in robustness. For example, the patchwork approach has a very high level
of robustness against most type of attacks, but can hide only a very small amount
of information. The proposed approach in this project uses a new steganographic
approach called image steganography. The application creates a stego image in
which the personal data is embedded inside the cover file image. The Least
Significant Bit algorithm in this project for developing the application which is
faster and reliable and compression ratio is moderate compared to other
algorithms.
REFERENCES
1. G. Kaur and A. Kochhar, “A Steganography Implementation based on LSB & DCT,” vol. 4, no.
1, pp. 35–41, (2012)
2. P. Chen and H. Lin, “A DWT Based Approach for Image Steganography,” Int. J. of Applied
Sci. Eng., vol. 4, no. 3, pp. 275–290, (2006)
3. J. Gupta, “A Review on Steganography techniques and methods,” vol. 1, no. 1, pp. 1–4, (2015)
4. H. Kaur and J. Rani, “A Survey on Different Techniques of Steganography,” MATEC Web of
Conferences, ICAET, (2016)
5. A. Fkirin, G. Attiya and A. El-Sayed, “Steganography Literature Survey, Classification and
Comparative Study,” vol. 5, no. 10, pp. 1-10, (2016)
6. T. Bhattacharya, N. Dey, and S. R. B. Chaudhuri, “A Session based Multiple Image Hiding
Technique using DWT and DCT,” International Journal of Computer Applications, vol. 38, no.
5, pp. 18–21, (2012)
7. M. S. Subhedar and V. H. Mankar, “Current status and key issues in image steganography: A
survey,” Computer Science Review, vol. 13–14, pp. 95–113, (2014)
8. D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing,”
Pattern Recognition Letters, vol. 24, no. 9–10, pp. 1613–1626, (2003)
9. E. E. A. Elgabar and H. A. A. Alamin, “Comparison of LSB Steganography in GIF and BMP
Images,” International Journal of Soft Computing and Engineering (IJSCE), vol. 3, no. 4, pp.
79–83, (2013)
10. L. K. Saini and V. Shrivastava, “A New Hybrid DWT-DCT Algorithm for Digital Image
Watermarking,” International Journal of Advance Engineering and Research Development
(IJAERD), vol. 1, no. 5, pp. 1–8, (2014)
11. Dipti Kapoor Sarmah and Neha Bajpai, “Proposed System for Data Hiding using Cryptography
and Steganography”, International Journal of Computer Applications, Vol. 8, No. 9, pp. 640-
647, (2010)
12. Hemang A. Prajapati and Nehal G. Chitaliya, “Secured and Robust Dual Image Steganography:
A Survey”, International Journal of Innovative Research in Computer and Communication
Engineering, Vol. 3, No. 1, pp. 534- 542, (2015)