1. Project Presentation on:
Image Based
Steganography
“to hide information within image file”
PRESENTED BY:
SHYAM PRABHAT TIRKEY
1
2. Talk Flow / Content
I. What is Steganography?
II. Steganography Vs Cryptography
III. Project Scope
IV. Methodology
V. Terminology
VI. Encryption Process
VII. Decryption Process
VIII. Data Flow Diagram
IX. Requirements
X. Layout & coding (another ppt)
XI. Advantages
XII. Disadvantages
2
3. What is Steganography?
• Steganography is the practice of hiding private or sensitive
information within something that appears to be nothing
out to the usual.
• Steganography is the art of concealing the existence of
information within seemingly innocuous carriers.
I
3
4. Steganography Vs
Cryptography
• Cryptographic techniques "scramble" messages so if
intercepted, the messages cannot be understood.
• Steganography involves hiding information so it appears
that no information is hidden at all.
II
4
5. Project Scope
o This project is going to be develop for hiding information
in any image file.
o The scope of the project is implementation of
steganography tools for hiding information includes any
type of information file and image files and the path
where the user wants to save Image and extruded file.
III
5
6. Methodology
• User needs to run the application. The user
has two options – encrypt and decrypt.
• In encrypt, application give the screen to
select image file, information file and option
to save the image file.
• In decrypt, application gives the screen to
select only image file and ask path where
user want to display secret message and/or
save the secrete file.
IV
6
7. Methodology (cont.)
• This project has two methods – Encrypt
and Decrypt.
• In encryption the secrete information is
hiding in with any type of image file.
• Decryption is getting the secrete
information from image file.
7
8. Terminology
oCover-Image: An image in which the secret
information is going to be hidden. The term
"cover" is used to describe the original,
innocent message, data, document.
• Payload: The information which is to be
concealed. The information to be hidden in
the cover data is known as the "embedded"
data.
V
8
9. Terminology (Cont.)
oStego-Image: The medium in which the
information is hidden. The "stego" data is the
data containing both the cover image and
the "embedded" information.
oSecret/Stego key: This is the key used as a
password to encrypt and decrypt the cover
and stego respectively in order to extract the
hidden message.
9
21. Requirements
• Software Requirements:
Microsoft Visual Studio (.NET Framework, C#)
• Hardware Requirements:
OS: Windows 7 or Above
Processor: Preferably 1.0 GHz or Greater.
RAM: 512 MB or Greater.
VIII
21
22. Advantages
o It can be used for safeguarding data, such as in
the field of media where copywriting ensures
authenticity.
o It can be used by intelligence agencies for
sending their secret data.
IX
22