Home / Computer Science / Information hiding using digital steganography

Information hiding using digital steganography

 

Table Of Contents


<p> </p><p><strong>introduction to the study</strong></p><p>1.1 &nbsp;Background to the Study &nbsp; ————————————————–</p><p>1.2 Statements of the Problem &nbsp; ————————————————–</p><p>1.3 &nbsp;Research Question &nbsp; ——————————————————–</p><p>1.4 &nbsp;Purpose of the Study ——————————————————–</p><p>1.5 &nbsp;Scope of the Study ———————————————————-</p><p>1.6 Significance of Study ———————————————————</p><p>1.7 Limitation of the Study ——————————————————</p><p>1.8 Operational Definition of Terms ——————————————-</p><p><strong>

Chapter TWO

</strong></p><p><strong>&nbsp;LITERATURE REVIEW</strong></p><p>2.1 Introduction to the Study ————————————————-</p><p>2.2 Current Literature Review ————————————————</p><p>2.3 Relevant Theories of the Review —————————————-</p><p>2.4 Summary of the Chapter ————————————————–</p><p><strong>Chapter</strong><strong>&nbsp;three</strong></p><p><strong>research</strong><strong>&nbsp;Methodology</strong></p><p>3.1 Research Design ————————————————————</p><p>3.1 System Analysis ———————————————————–</p><p>3.2 System Design ————————————————————-</p><p>3.3 File Design —————————————————————–</p><p>3.4 Input/Output Design —————————————————-</p><p>3.4.1 Input Design ————————————————————</p><p>3.4.2 Output Design ———————————————————-</p><p>3.5 Instrumentation/Materials ———————————————-</p><p>3.5.1 Hardware Requirement ———————————————–</p><p>3.5.2 Software Requirement ————————————————</p><p><strong>

Chapter FOUR

</strong></p><p><strong>program IMPLEMENTATION/DOCUMENTATION</strong></p><p>4.0 Choice of Programing Language ————————————–</p><p>4.1 Program Specification —————————————————</p><p>4.1.1 Encryption Process —————————————————-</p><p>4.1.2 Decryption Process —————————————————-</p><p>4.2 Program Flowchart b—————————————————-</p><p>4.3 Sample Input/Output Pages ——————————————-</p><p>4.3.1 Sample Input Pages(Encryption) ———————————-</p><p>4.3.2 Sample Output Page (Decryption) ——————————–</p><p><strong>

Chapter FIVE

</strong></p><p><strong>SUMMARY, CONCLUSION AND RECOMMENDATION</strong></p><p>5.1 Summary ————————————————————–</p><p>5.2 Conclusion ————————————————————</p><p>5.3 Recommendation —————————————————-</p><p>References —————————————————————–</p><p>Appendix ——————————————————————</p><p>&nbsp;ABSTRACT</p> <br><p></p>

Project Abstract

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly recommended on which stenographic technique are more suitable for which applications.

Project Overview

Introduction

1.1  Background to the study

Currently, the digital information revolution has brought significant changes in our society and daily routines. In line with the revolution, Internet and wireless network offer ubiquitous channels to deliver and exchange information.  Therefore, public information exchange is secured by using an encryption method where a secret data can be encrypted to prevent the content  from  being  intercepted.  However,  with  the technological  advancement  of  information  security,  most  Internet  users  are not  aware that  sending  encrypted  messages  will  draw  unnecessary  attention  to  malicious  black hats such as crackers and hackers. This is because the encrypted data appears as a string of gibberish data that might arouse suspicion. Moreover, there is a possibility of illegal exploitation attempts to the vulnerability of the encrypted messages due to curiosity and inquisitiveness of a hacker. As a result, the secret data which has been encrypted could be  illegally  intercepted,  unauthorized  tampered  or  even  damaged  during  data transmission.

In order to alleviate the issue mentioned above, steganography is introduced as an alternative design to conceal a secret data into an unsuspicious cover-object so that it can  be  sent  stealthily  through  a  public  communication  channel  without  drawing  any unnecessary attention of the black hats.

Steganography is derived from the findings of Johannes Trithemus (1462-1516) entitled  Steganographia  which  comes  from  the  Greek  words  (στεγανÏŒ-ς,  γραυ-ειν), steganos literally means “covered”; and graphia means “writing”. Eventually the entire

definition is defined as covered writing (Petitcolas et al., 1999).

 1.2 Statements of the problem

Over the years, numerous steganography techniques that embed secret data into cover-objects such as image, audio, video  etc. have been invented and implemented. However, in  the  current  image-based  steganography  technology,  there  are  several

problems arise due to              

i.       Distortion produced in a stego-image after embedding a secret data.

There are certain existing schemes such as Hide and Seek 4.1 and Hide in the Picture 2.1 result in a distorted stego-image after embedding a secret data. Due to  this  factor,  the  stego-image  produced  is  able  to  raise  suspicion  and  can  be clearly  distinguished  by  an  attacker.  Thus,  researches  on  alleviating  the distortion problem in the stego-image need to be carried out.

ii.     There  is  a  rest


Blazingprojects Mobile App

📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Software coding and Machine construction
🎓 Postgraduate/Undergraduate Research works
📥 Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Computer Science. 4 min read

Predicting Disease Outbreaks Using Machine Learning and Data Analysis...

The project topic, "Predicting Disease Outbreaks Using Machine Learning and Data Analysis," focuses on utilizing advanced computational techniques to ...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Implementation of a Real-Time Facial Recognition System using Deep Learning Techniqu...

The project on "Implementation of a Real-Time Facial Recognition System using Deep Learning Techniques" aims to develop a sophisticated system that ca...

BP
Blazingprojects
Read more →
Computer Science. 2 min read

Applying Machine Learning for Network Intrusion Detection...

The project topic "Applying Machine Learning for Network Intrusion Detection" focuses on utilizing machine learning algorithms to enhance the detectio...

BP
Blazingprojects
Read more →
Computer Science. 3 min read

Analyzing and Improving Machine Learning Model Performance Using Explainable AI Tech...

The project topic "Analyzing and Improving Machine Learning Model Performance Using Explainable AI Techniques" focuses on enhancing the effectiveness ...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Applying Machine Learning Algorithms for Predicting Stock Market Trends...

The project topic "Applying Machine Learning Algorithms for Predicting Stock Market Trends" revolves around the application of cutting-edge machine le...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems...

The project topic, "Application of Machine Learning for Predictive Maintenance in Industrial IoT Systems," focuses on the integration of machine learn...

BP
Blazingprojects
Read more →
Computer Science. 3 min read

Anomaly Detection in Internet of Things (IoT) Networks using Machine Learning Algori...

Anomaly detection in Internet of Things (IoT) networks using machine learning algorithms is a critical research area that aims to enhance the security and effic...

BP
Blazingprojects
Read more →
Computer Science. 4 min read

Anomaly Detection in Network Traffic Using Machine Learning Algorithms...

Anomaly detection in network traffic using machine learning algorithms is a crucial aspect of cybersecurity that aims to identify unusual patterns or behaviors ...

BP
Blazingprojects
Read more →
Computer Science. 2 min read

Predictive maintenance using machine learning algorithms...

Predictive maintenance is a proactive maintenance strategy that aims to predict equipment failures before they occur, thereby reducing downtime and maintenance ...

BP
Blazingprojects
Read more →
WhatsApp Click here to chat with us