Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

JIMS Engineering Management Technical Campus

Greater Noida
MAJOR PROJECT
PRESENTATION
(ETCS 460)
ON

DATA SECURITY USING


STEGNOSOLVER
GUIDE NAME STUDENT’S NAME
MR TWINKLE TYAGI AKSHITA
(ASSISTANT PROFESSOR) BHATNAGAR
(00925502720)
ANURAG TANWAR
(00125507221)
PROBLEM STATEMENT

• Nowadays, computer-based communications are at the threshold of making life easier for everyone in
the world; from sharing information, to communicating with each other

• information security is an essential factor, which must be taken into consideration to ensure secure
communications

• There are significant interests in security approaches that aim to protect information and digital data,
since the growing increase in uses of the internet and multimedia, have raised the interests in image
steganography in order to secure and protect them
PROJECT OBJECTIVE

• Presently all type of information is preserved in digital media. Internet is the medium where
information is moving from one user to another user

• The sender user and receiver user suppose that information is securely transferred

• But if the information is transferred over insecure medium, if somebody can get the ciphered
information and through applying cryptanalysis on it, the intruder or attacker can get the original
significance; the enemy can even change the information and pass to the receiver user
TECHNOLOGY USED

• Cybersecurity is a broader field that encompasses various technologies and


practices aimed at protecting digital systems, networks, and data from
unauthorized access, attacks, and damage.
• Steganography technology conceals information within digital media (e.g.,
images, audio, or text) by subtly altering the data to hide a secret message
• So we are using python programming language to make Stegnosolver
LITERATURE SURVEY

• Enhanced Data Security of Communication System Using Combined Encryption and


Steganograph

Author’s
• Haider Th. Salim ALRikabi
• Hussein Tuama Hazim

• Year of Publishing 2021-07-17


SUMMARY

• . In the paper(1), the author mainly rely on storing the basic image which should be protected in another
image after changing its formal to composites using the DWT wavelet transform

• The process of zeroing sites and storing their contents technique is used to carry the components of the main
image

• Then process them mathematically by using the exponential function. The result of this process is to obtain a
fully encrypted image

• The proposed system contains two algorithms.


• The first algorithm is used for encoding and hiding, but the second algorithm is designed for returning and
decoding the main image to its original state with very efficiently. The technology data is fully relying on web
services
THE PROPOSED SYSTEM
• Divided into three main parts
• First part is used to analyze the images by using DWT.
• The second part is used to hide (embed) the analytical combinations after the
zeroing process behind an image
• And the last part is encrypt the image by using a mathematical exponential
function.
DISCRETE WAVELET TRANSFORM (DWT)

• Mathematically it is represented as
LITERATURE SURVEY
• HIDEmarks: hiding multiple marks for robust medical data sharing using IWT ‑LSB

• Author’s
Om Prakash Singh
Kedar Nath Singh
Naman Baranwal
Amrit Kumar Agrawal
Amit Kumar Singh
Huiyu Zhou

Year of Publishing:28 Feb 2022


SUMMARY

• The paper(2) discusses the growing significance of data hiding in the healthcare sector for covert
communication and privacy protection

• To address this challenge, the study introduces "HIDEmarks," a data hiding technique that combines
the integer wavelet transform (IWT) and the least significant bit (LSB) approach

• In this technique, the IWT-LSB is employed to embed multiple marks into medical color images

• Cover images are transformed into three channels using IWT, and then multiple marks are hidden
within these channels using the LSB scheme
THE PROPOSED SYSTEM

In the first instance, they developed a high-capacity algorithm, HIDEmarks, for


improved robustness and invisibility
this was composed of three stages:
(1) encoding the secret image with soft compression
(2) embedding it with IWT and LSB
(3) extracting hidden marks.
WORKFLOW DIAGRAM
WORKFLOW DIAGRAM

• At the sender or transmission side, the embedding procedure embeds the secret data into the
cover medium or image using the secret key and generates a modified image with secret data
imperceptibly embedded in it.
• This modified form of the original cover image is known as a stego-image.
• This stego-image is shared through the potentially insecure channel.
• If someone is trying to eavesdrop on this secret communication, they would analyze the stego-
image using steganalysis methods to find potential signs of steganography. In addition, noise or
intentional attacks may corrupt the stego-image, and hence, the secret data embedded in it.

• On the receiver side, the extraction procedure uses the stego-image along with the secret key as
inputs and reconstructs the secret data.
REFERENCES

• Haider TH. Salim ALRikabi1(*), Hussein Tuama Hazim “Enhanced Data Security of Communication
System Using Combined Encryption and Steganography” iJIM ‒ Vol. 15, No. 16, 2021

• Om Prakash Singh1 · Kedar Nath Singh2 · Naman Baranwal3 · Amrit Kumar Agrawal4 · Amit Kumar
Singh5 · Huiyu Zhou6” HIDEmarks: hiding multiple marks for robust medical data sharing using
IWT‑LSB”

You might also like