Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

titLe

IMAGE
STEGANOGRAPHY
FINAL YEAR PROJECT

NAME : SIVANISHANTH
CLASS : BSC COMPUTER SCIENCE
BATCH: “B”
SUB TITLES

• ABSTRACT
• INTRO
• SPECIFICATION
• OBJECTIVE OF THE PROJECT
• FLOWCHART
• SAMPLE INPUT&OUTPUT
• EXAMPLE
ABSTRACT :
Steganography is a form of security technique
through obscurity, the science, and art of hiding the existence of a
message between a sender and the intended recipient. Steganography has
been used to hide secret messages in various types of files, including
digital images, audio, and video. The three most important parameters for
audio steganography are imperceptibility, payload, and robustness.
Different applications have different requirements for the steganography
technique used. This paper intends to give an overview of image
steganography, its uses, and techniques.
INTRODUCTION :

• The process of hiding information which can be text, image


or video inside a cover image.

• Which has emerged as a powerful tool in various applications


including image steganography, has received increased attention
recently.

• The main goal of this project is to explore and discuss


various deep learning methods available in image
steganography field.
• Deep learning techniques used for image steganography can be
broadly divided into three categories - traditional methods,
Convolutional Neural Network-based and General Adversarial
Network-based methods.

•  A table summarizing all the details are also provided for


easy reference.

• This project aims to help the fellow researchers by compiling the


current trends, challenges and some future direction in this field.
SPECIFICATION

• Android studio
• Java
• Html
• Min 4GB RAM
OBJECTIVE OF THE PROJECT

The objective of steganography is to hide a secret message


within a cover media in such a way that others cannot discern
the presence of the hidden message. Technically in simple
words “steganography means hiding one piece of data within
another”.
FLOW CHART :
SENDER AND RECIVER
EXISTING SYSTEM PROPOSED SYSTEM

• Cannot provide more security • Is secure compare to them


• Audio file cannot be reusable. • Audio file cannot be reusable
• Cannot use all type of image file • Can use all type of image file
Encode the data :

• Every byte of data is converted to its 8-bit binary code using ASCII values.
Now pixels are read from left to right in a group of 3 containing a total of 9
values. The first 8-values are used to store binary data. The value is made
odd if 1 occurs and even if 0 occurs.
OREDER OF ENCODING
1. COMPRESSED
2. ENCRYPITED
3. ENCODED
Decode the data :

• To decode, three pixels are read at a time, till the last value is odd, which
means the message is over. Every 3-pixels contain a binary data, which can
be extracted by the same encoding logic. If the value if odd the binary bit is
1 else 0.
ORDER OF DECODING
1. DECODE
2. DECRYPT
3. COMPRESS
Input & Output image
Sample
Example

The given value will be related a 0 bit and 1 bit • R = RED


• G = GREEN
• B = BLUE
THANK YOU
BY
SIVANISHANTH J

You might also like