INFORMATION HIDING USING DIGITAL STEGANOGRAPHY

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0350
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 56 Pages
  • Methodology: Nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 893
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly recommended on which stenographic technique are more suitable for which applications.

TABLE OF CONTENTS

Chapter one

introduction to the study

1.1   Background to the Study   --------------------------------------------------

1.2 Statements of the Problem   --------------------------------------------------

1.3   Research Question    --------------------------------------------------------

1.4   Purpose of the Study --------------------------------------------------------

1.5   Scope of the Study ----------------------------------------------------------

1.6 Significance of Study ---------------------------------------------------------

1.7 Limitation of the Study ------------------------------------------------------

1.8 Operational Definition of Terms -------------------------------------------

CHAPTER TWO

 LITERATURE REVIEW

2.1 Introduction to the Study -------------------------------------------------

2.2 Current Literature Review ------------------------------------------------

2.3 Relevant Theories of the Review ----------------------------------------

2.4 Summary of the Chapter --------------------------------------------------

Chapter three

research Methodology

3.1 Research Design ------------------------------------------------------------

3.1 System Analysis -----------------------------------------------------------

3.2 System Design -------------------------------------------------------------

3.3 File Design -----------------------------------------------------------------

3.4 Input/Output Design ----------------------------------------------------

3.4.1 Input Design ------------------------------------------------------------

3.4.2 Output Design ----------------------------------------------------------

3.5 Instrumentation/Materials ----------------------------------------------

3.5.1 Hardware Requirement -----------------------------------------------

3.5.2 Software Requirement ------------------------------------------------

Chapter four

program IMPLEMENTATION/DOCUMENTATION

4.0 Choice of Programing Language --------------------------------------

4.1 Program Specification ---------------------------------------------------

4.1.1 Encryption Process ----------------------------------------------------

4.1.2 Decryption Process ----------------------------------------------------

4.2 Program Flowchart b----------------------------------------------------

4.3 Sample Input/Output Pages -------------------------------------------

4.3.1 Sample Input Pages(Encryption) ----------------------------------

4.3.2 Sample Output Page (Decryption) --------------------------------

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 Summary --------------------------------------------------------------

5.2 Conclusion ------------------------------------------------------------

5.3 Recommendation ----------------------------------------------------

References -----------------------------------------------------------------

Appendix ------------------------------------------------------------------

 Chapter one

Introduction

1.1   Background to the study

Currently, the digital information revolution has brought significant changes in our society and daily routines. In line with the revolution, Internet and wireless network offer ubiquitous channels to deliver and exchange information.  Therefore, public information exchange is secured by using an encryption method where a secret data can be encrypted to prevent the content  from  being  intercepted.  However,  with  the technological  advancement  of  information  security,  most  Internet  users  are not  aware that  sending  encrypted  messages  will  draw  unnecessary  attention  to  malicious  black hats such as crackers and hackers. This is because the encrypted data appears as a string of gibberish data that might arouse suspicion. Moreover, there is a possibility of illegal exploitation attempts to the vulnerability of the encrypted messages due to curiosity and inquisitiveness of a hacker. As a result, the secret data which has been encrypted could be   illegally   intercepted,   unauthorized   tampered   or   even   damaged   during   data transmission.

In order to alleviate the issue mentioned above, steganography is introduced as an alternative design to conceal a secret data into an unsuspicious cover-object so that it can  be  sent  stealthily  through  a  public  communication  channel  without  drawing  any unnecessary attention of the black hats.

Steganography is derived from the findings of Johannes Trithemus (1462-1516) entitled  Steganographia  which  comes  from  the  Greek  words  (στεγανό-ς,  γραυ-ειν), steganos literally means “covered”; and graphia means “writing”. Eventually the entire

definition is defined as covered writing (Petitcolas et al., 1999).

 1.2 Statements of the problem

Over the years, numerous steganography techniques that embed secret data into cover-objects such as image, audio, video  etc. have been invented and implemented. However, in  the  current  image-based  steganography  technology,  there  are  several

problems arise due to               

i.        Distortion produced in a stego-image after embedding a secret data.

There are certain existing schemes such as Hide and Seek 4.1 and Hide in the Picture 2.1 result in a distorted stego-image after embedding a secret data. Due to  this  factor,  the  stego-image  produced  is  able  to  raise  suspicion  and  can  be clearly   distinguished   by   an   attacker.   Thus,   researches   on   alleviating   the distortion problem in the stego-image need to be carried out.

ii.      There  is  a  rest

INFORMATION HIDING USING DIGITAL STEGANOGRAPHY
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0350
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 56 Pages
  • Methodology: Nil
  • Reference: YES
  • Format: Microsoft Word
  • Views: 893
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0350
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 56 Pages
    Methodology Nil
    Reference YES
    Format Microsoft Word

    Related Works

    ABSTRACT Text encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your... Continue Reading
    ABSTRACT Text encryption software to hide and encrypt data within an video undetectable to others! This software allows you to hide text messages within an video! You can use this software to store personal information, financial details and so forth embedded within an video, and password protect! So you could even give someone a copy of your... Continue Reading
    ABSTRACT Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently... Continue Reading
    ABSTRACT Steganography is the art of inconspicuously hiding data within data. Steganography's goal in general is to hide data well enough that unintended recipients do not suspect the steganographic medium of containing hidden data. The software and links mentioned in this article are just a sample of the steganography tools currently available.... Continue Reading
    ABSTRACT Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company... Continue Reading
    ABSTRACT Encryption/decryption is especially important in wireless communications. This is because wireless circuits are easier to tap than their hard-wired counterparts. Nevertheless, encryption/decryption is a good idea when carrying out any kind of sensitive transaction, such as a credit-card purchase online, or the discussion of a company... Continue Reading
    The advances in the data capturing, storage, and connnunication technologies have made vast amounts of video data available to consumer and enterprise applications. However, interacting with multimedia data, and video in particular, requires more than connecting with data banks and delivering data via networks to customers' homes or offices.... Continue Reading
    ABSTRACT Text encryption software to hide and encrypt data within a picture undetectable to others! This software allows you to hide text messages within a picture! You can use this software to store personal information, financial details and so forth embedded within a picture, and password protect! So you could even give someone a copy of your... Continue Reading
    ABSTRACT Text encryption software to hide and encrypt data within a picture undetectable to others! This software allows you to hide text messages within a picture! You can use this software to store personal information, financial details and so forth embedded within a picture, and password protect! So you could even give someone a copy of your... Continue Reading
    ABSTRACT Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image’s bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In... Continue Reading
    Call Us
    Get this work
    whatsappWhatsApp Us