INFORMATION HIDING USING DIGITAL STEGANOGRAPHY

 

TABLE OF MATERIALS

 

The first chapter

 

introduction to the research

 

1.1 The Study’s Background ————————————————–

 

1.2 Problem Statements ———————————————————————————————————————–

 

1.3 Research Problem ——————————————————–

 

1.4 Study Purpose ——————————————————————————————————————————–

 

1.5 Study Scope ———————————————————————————————————————————-

 

1.6 Importance of Study —————————————————————————————————————————

 

1.7 Study Limitation ——————————————————————————————————————————

 

1.8 Operational Terminology Definition ——————————————-

 

CHAPITRE TWO

 

REVIEW OF LITERATURE

 

2.1 Study Introduction ———————————————————————————————————————-

 

2.2 Review of Current Literature ————————————————

 

2.3 Review Theories That Are Relevant —————————————-

 

2.4 Chapter Summary ——————————————————————————————————————–

 

The third chapter

 

methodological investigation

 

3.1 Research Plan ————————————————————

 

3.1 System Evaluation ———————————————————–

 

3.2 System Development ————————————————————-

 

3.3 File Layout —————————————————————–

 

3.4 Design of Input/Output —————————————————-

 

3.4.1 Design of Input ————————————————————

 

3.4.2 Design of Output ———————————————————-

 

3.5 Instruments and Materials ———————————————-

 

3.5.1 Hardware Prerequisites ———————————————–

 

3.5.2 Software Needed ————————————————

 

the fourth chapter

 

program IMPLEMENTATION/DOCUMENTATION

 

4.0 Programming Language Selection ————————————–

 

4.1 Program Description —————————————————

 

4.1.1 Encryption Method —————————————————-

 

4.1.2 Decryption Method —————————————————-

 

4.2 Flowchart of the Program b—————————————————-

 

4.3 Input/Output Page Examples ——————————————-

 

4.3.1 Encrypted Sample Input Pages ———————————-

 

4.3.2 Decryption Sample Output Page ——————————–

 

CHAPITRE FIVE

 

RECOMMENDATION, CONCLUSION, AND SUMMARY

 

5.1 Executive Summary ————————————————————–

 

5.2 Final Thoughts ————————————————————

 

5.3 Suggestions —————————————————-

 

References —————————————————————–

 

Appendix ——————————————————————

 

ABSTRACT

 

Steganography is the art of concealing the fact that communication is occurring by concealing information within other information. There are numerous carrier file formats that can be utilized, but digital photos are the most common due to their prevalence on the internet. There are many steganography techniques for hiding hidden information in photographs, some more complex than others, and each has its own set of strengths and weaknesses. Depending on the application, perfect invisibility of the secret information may be required, while others may require a significant secret message to be hidden. This project report will provide an overview of image steganography, its applications, and methodology. It also aims to establish the requirements of a decent steganography algorithm and provides a brief recommendation on which stenographic techniques are better appropriate for specific applications.

 

The first chapter

 

Introduction

 

1.1 The Study’s Background

 

The digital information revolution is currently causing substantial changes in our society and daily lives. In keeping with the revolution, the Internet and wireless networks provide ubiquitous means for information delivery and exchange. As a result, public information exchange is safeguarded by employing an encryption technology that encrypts private data to prevent it from being captured. However, despite advances in information security technology, most Internet users are unaware that transmitting encrypted messages attracts unwanted attention from malevolent black hats such as crackers and hackers. This is due to the encrypted data appearing as a string of nonsensical data, which may raise suspicion. Furthermore, a hacker’s curiosity and inquisitiveness may lead to illicit exploitation efforts on the vulnerability of encrypted messages. As a result, secret data that has been encrypted could be illegally intercepted, interfered with, or even corrupted during data transmission.

 

To address the aforementioned issue, steganography is introduced as an alternative design to conceal a secret data into an unobtrusive cover-object so that it can be sent stealthily through a public communication channel without drawing the attention of black hats.

 

Steganography is rooted from Johannes Trithemus’ (1462-1516) discovery entitled Steganographia, which originates from the Greek terms (v-, -), steganos literally meaning “covered,” and graphia means “writing.” Finally, the complete

 

Covered writing is defined as (Petitcolas et al., 1999).

 

1.2 Problem formulations

 

Numerous steganography techniques that embed secret data into cover-objects like as images, audio, video, and so on have been devised and implemented throughout the years. However, there are various options in today’s image-based steganography technology.

 

issues develop as a result of

 

i. The distortion caused in a stego-image as a result of embedding hidden data.

 

Existing systems like Hide and Seek 4.1 and Hide in the Picture 2.1 produce a distorted stego-image after embedding a secret data. Because of this aspect, the stego-image formed can arouse suspicion and be easily identifiable by an assailant. As a result, studies on how to reduce distortion in the stego-image must be conducted.

 

ii. There is some downtime.

Leave a Comment