Information Hiding Using Digital Steganography

 

Table Of Contents

 

Chapter one

 

preface to the study

 

Background to the Study————————————————–

 

Statements of the Problem————————————————–

 

exploration Question——————————————————–

 

Purpose of the Study——————————————————–

 

compass of the Study———————————————————-

 

Significance of Study———————————————————

 

Limitation of the Study——————————————————

 

functional description of Terms——————————————-

 

CHAPTER TWO

 

LITERATURE REVIEW

 

preface to the Study————————————————-

 

Current Literature Review————————————————

 

Applicable propositions of the Review—————————————-

 

Summary of the Chapter————————————————–

 

Chapter three

 

exploration Methodology

 

Research Design————————————————————

 

System Analysis———————————————————–

 

System Design————————————————————-

 

train Design—————————————————————–

 

Input/ Affair Design—————————————————-

 

Input Design————————————————————

 

Affair Design———————————————————-

 

Instrumentation/ Accoutrements———————————————-

 

tackle demand———————————————–

 

Software Requirement————————————————

 

Chapter four

 

program perpetration/ Attestation

 

Choice of Programing Language————————————–

 

Program Specification—————————————————

 

Encryption Process—————————————————-

 

Decryption Process—————————————————-

 

Program Flowchart b—————————————————-

 

Sample Input/ Affair runners——————————————-

 

Sample Input runners( Encryption)———————————-

 

Sample Affair runner( Decryption)——————————–

 

CHAPTER FIVE

 

SUMMARY, CONCLUSION AND RECOMMENDATION

 

Summary————————————————————–

 

Conclusion————————————————————

 

Recommendation—————————————————-

 

References—————————————————————–

 

excursus——————————————————————

 

ABSTRACT

 

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. numerous different carrier train formats can be used, but digital images are the most popular because of their frequence on the internet. For hiding secret information in images, there exists a large variety of steganography ways some are more complex than others and all of them have separate strong and weak points. Different operations may bear absolute invisibility of the secret information, while others bear a large secret communication to be hidden. This design report intends to give an overview of image steganography, its uses and ways. It also attempts to identify the conditions of a good steganography algorithm and briefly recommended on which stenographic fashion are more suitable for which operations.

 

Chapter one

 

preface

 

Background to the study

 

presently, the digital information revolution has brought significant changes in our society and diurnal routines. In line with the revolution, Internet and wireless network offer ubiquitous channels to deliver and change information. thus, public information exchange is secured by using an encryption system where a secret data can be translated to help the content from being interdicted. still, with the technological advancement of information security, utmost Internet druggies aren’t apprehensive that transferring translated dispatches will draw gratuitous attention to vicious black headdresses similar as crackers and hackers. This is because the translated data appears as a string of gibberish data that might arouse dubitation . also, there’s a possibility of illegal exploitation attempts to the vulnerability of the translated dispatches due to curiosity and curiousness of a hacker. As a result, the secret data which has been translated could be immorally interdicted, unauthorized tampered or indeed damaged during data transmission.

 

In order to palliate the issue mentioned over, steganography is introduced as an indispensable design to conceal a secret data into an innocent cover- object so that it can be transferred stealthily through a public communication channel without drawing any gratuitous attention of the black headdresses.

 

Steganography is deduced from the findings of Johannes Trithemus( 1462- 1516) entitled Steganographia which comes from the Greek words( στεγανό- ς, γραυ- ειν), steganos literally means “ covered ”; and graphia means “ jotting ”. ultimately the entire

 

description is defined as covered jotting( Petitcolas etal., 1999).

 

Statements of the problem

 

Over the times, multitudinous steganography ways that bed secret data into cover- objects similar as image, audio, videotapeetc. have been constructed and enforced. still, in the current image- grounded steganography technology, there are several

 

problems arise due to

 

deformation produced in a stego- image after bedding a secret data.

 

There are certain being schemes similar as Hide and Seek4.1 and Hide in the Picture2.1 result in a distorted stego- image after bedding a secret data. Due to this factor, the stego- image produced is suitable to raise dubitation and can be easily distinguished by an bushwhacker. therefore, researches on easing the deformation problem in the stego- image need to be carried out.

 

ii. There is a rest

 

Leave a Comment