SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 103
Understanding Image Steganography with Practical Approach
Gautam Juvarajiya
Student, Department of Information Technology, Thakur College of Engineering and Technology, Mumbai,
Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - As internet usage increases, we must be mindful
to send and receive sensitive information securely.
Steganography and Cryptography aretwotechniquesused for
secured data transfer and user privacy. In cryptography, the
message is changed using an encryption key that is only
known to the sender and the recipient. No one else can read
the message without the encryption key. Steganography
increases the anonymity of datacommunicationbyconcealing
the existence of data such that no one can identifyitspresence.
Key Words: internet, privacy, encryption, steganography,
cryptography
1.INTRODUCTION
The Greek words steganos (covered) and graptos (writing)
are the origin of the word steganography (meaning covered
or hidden writing)[1]. In the modern world, everyoneshares
data and information with oneanother.Aselectronic devices
for sharing data and information have developed and
become more widely used, the need for data security has
become critical[2]. With so many publicly available
technologies capable of exploitingtheprivacy,data integrity,
and security of the data being communicated, malicious
threats, eavesdropping, and other malicious actions have
become commonplace. Various techniques, including
Steganography, Cryptography, etc have been made
accessible for the security of this information and data[3,4].
Although the goals of steganography and cryptography are
identical, there is a little distinction or there is a thin line of
difference between these two. In Cryptography, plaintext or
original data is first converted into Cipher text in encryption
while conversion of cipher text to original text is known as
Decryption. The cipher text can be seen by human eyes, but
encryption renders the data unbreakable and unreadable.
While in Steganography the data or the secret message is
concealed in such a way in some form but the hidden data or
secret message here is not visible to anyofthepartyunlessit
is decrypted properly[3].
Fig -1.1: Security Techniques [5]
Steganography and watermarking are two examples of
information-hiding domains; both are employed to conceal
the hidden message[3]. These two approaches are closely
related to one another, although they each have different
goals. While steganography refers to the act of concealing
information by hiding the secret message in a public cover
media without any indication of its existence, watermarking
aims to maintain the integrity of the secret data by
preventing outsiders from knowing the existence of the
communication[3,5].
Steganography techniquesconceal sensitiveinformationora
secret message in unassuming cover material to prevent
attracting the attention of attackers. Words can be inserted
inside of images, audio files, video files, etc. Contrarily, the
study of mathematical techniques related to information
security components like secrecy, data integrity, entity
authentication, and data origin authentication is referred to
as cryptography[3]. There are numerous varieties of
steganography, including those for images, text, audio, and
video.
2. TYPES OF STEGANOGRAPHY
Few types ofsteganographytechniquetoencryptorhidedata
which are common: Image Steganography, Video
Steganography, Audio Steganography, Video Steganography,
etc.[1,5,6,7].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 104
Fig -2.1: Types of Steganography
2.1 Image Steganography
The secret image is hidden inside the cover image in a way
that makes the secret data or secret message disappear and
the main picture appear to be the original. By changing the
pixels in the primary image, the secret messageisconcealed.
FIG -2.1.1: Image Steganography
2.2 Audio Steganography
Audio steganography is the process of usingdigitalsound
files to obscurely alter a sound file's binary sequence,
which can be used to conceal messages. It supports various
audio files like wave, mpeg, mp3, etc. to conceal the data in it.
2.3 Video Steganography
The digital video formats that are utilized for video
steganography allow for the concealment of any type of
information. Video files can include a sizeable quantity of
sensitive information because they are a moving stream of
images and sounds. MP4, AVI, and other video formats are
used in video steganography.
2.4 Text Steganography
In its simplest form, text steganography describes the
information that isconcealedintextfiles.Textsteganography
can be used to generate legible messages by altering context,
modifying words withinthetext,constructingandgenerating
random sequences, and more.
3. IMAGE STEGANOGRAPHY WORKING
Firstly, user needs to select whether to encode the image or
decode the image. If a user wants to encodes, he/she needs
to select the image from their system and enter the secret
message then click on “Encode” button and save it on the
system. To decode the hidden text from the image, user
needs to select the encoded image and click on “Decode”
button and the output Hidden message will be displayed.
FIG -3.1: Flow Chart for Image Steganography
3.1 Algorithm :
STEP 1 : Start
STEP 2 : Select Encode/Decode
STEP 3 : If Encode,
Select image & write text to be encoded &
save at particular directory
STEP 4 : If Decode,
Select encode image &hiddenmessagewill
be displayed
STEP 5 : Stop
4. RESULTS AND ANALYSIS
The initial screen, or the default homepage, thattheusersees
when the application is launched asks whether they wish to
encrypt or decrypt the image. The application's home page
features two buttons, Encode and Decode. The secret
message is encoded using the original image and decoded
using the encoded image using the Encode and Decode
buttons, respectively.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 105
FIG -4.1: Home-Page of Application
4.1 Encode Page
The user is then taken to this screen after clicking the
"Encode" button on the homepage, where they must choose
an image from their system or computer.
FIG -4.1.1: Encode Page
The user is then taken to this screen after clicking the
"Encode" button on the homepage, where they must choose
an image from their system or computer.
FIG -4.1.2: Selecting Image and Entering Hidden Message
for Encoding image
4.2 Decode Page
The user must select the encoded image from the
computer system and click the "Decode" button in order to
decode the secret message or data from the image.
FIG -4.2.1: Selecting image for Decoding Secret Message
from Encoded image
After selecting the "Decode" Button, the chosen (encoded)
image's hidden message is displayed on the screen.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 106
FIG -4.2.2: Successful Decryption
4.3 Observations
According to the project, the size of the image before
hidden message or secret message encoding was smaller
than the size of the image after encoding.
FIG -4.3.1: Image Size Before Encoding
The size of the image was 40KB before the secret message
was encoded, and it was 44KB after the hidden or secret
message is encoded in it.
FIG -4.3.2: Image Size After Encoding
Following encoding and decoding procedures, the 4KB
difference was noticed.
5. CONCLUSIONS
Each of the main formats has a unique way of encoding
messages, eachwithdifferentadvantagesanddisadvantages.
Where one strategy falls short in one area,theotherdoes too
in another. The strategy presented in this research makes
use of image steganography, a well-known method of
steganography. The personal informationiscontainedinside
the cover file image that the application creates as a stegno
image. Steganography is different from cryptography, but
combining the two can increase the security of the data that
is being safeguarded and keep the covert communication
from being discovered. The main advantages of
implementing steganography to mask data over encryption
is that it makes it harder to detect if private information is
hidden within a file or other piece of content. In contrast,
anyone may see the cipher text in cryptography.
ACKNOWLEDGEMENT
This paper was prepared with the help of a number of
research papers on steganography techniques and their
overview, and I want to express my gratitude to the authors
for their commitment and hard work.
REFERENCES
[1] International Refereed Journal of Engineering and
Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-
1821 Volume 6, Issue 1 (January 2017), PP.68-71,
Survey Paper on Steganography Namrata Singh
Computer Science and engineering ABES Engineering
College, Ghaziabad A.K.T.U.
[2] International Journal of Engineering and Advanced
Technology (IJEAT) ISSN: 2249 – 8958 (Online),
Volume-9 Issue-4, April, 2020 1549 Published By: Blue
Eyes Intelligence Engineering & Sciences Publication ©
Copyright: All rights reserved. Retrieval Number:
D8760049420/2020©BEIESPDOI:10.35940/ijeat.D876
0.049420 Journal Website: www.ijeat.org Information
Hiding using Steganography Ritu Sindhu, Pragati Singh.
[3] International Journal of Scientific & Engineering
Research, Volume 6, Issue6,June-20151580ISSN 2229-
5518, Review Paper On Image Based Steganography By
Indu Nehra, Rakesh Sharma.
[4] SteganoGAN: High Capacity Image Steganography with
GANs Kevin A. Zhang,1 Alfredo Cuesta-Infante,2LeiXu,1
Kalyan Veeramachaneni1 1 MIT, Cambridge, MA -
02139, USA kevz,leix,kalyanv@mit.edu 2 Univ. ReyJuan
Carlos, SpainK. Elissa.
[5] Journal of Theoretical and Applied Information
Technology 15th March 2022. Vol.100. No 5 2022 Little
Lion Scientific A LITERATURE REVIEW OF VARIOUS
STEGANOGRAPHY METHODS RANA SAMIHAMEED,2,3
ABD RAHIM BIN HJ AHMAD, 1MUSTAFA MUNEEB
TAHER, 1 SITI SALASIAH MOKRI 2CollegeofComputing
Science & InformationTechnology,UniversityofTenaga,
Malaysia 1 Faculty of Engineering & Built Environment,
Universiti Kebangsaan Malaysia 2 College of Law and
Political Science, University of Kirkuk Iraq.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 107
[6] JARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319-
5940 International Journal of Advanced Research in
Computer and Communication Engineering Vol.7,Issue
9, September 2018, Image Steganography Techniques -
A Review Paper Mohammed A. Saleh College of Sciences
and Arts in Ar Rass, Qassim University, Kingdom of
Saudi Arabia.
[7] International Journal of Innovative Research in
Computer and Communication Engineering Vol.4,Issue
1, January 2016,A Survey Paper on Steganography
Techniques Dr. Rajkumar L Biradar1, Ambika
Umashetty2 Associate Professor, Dept. of Electronics
and Telematics, G. Narayanamma Institute of
Technology & Science, Hyderabad, India1 Dept. of
Computer Science & Engineering, Appa Institute of
Engineering & Technology, Kalaburagi.

More Related Content

Similar to Understanding Image Steganography with Practical Approach

IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital WatermarkingIRJET Journal
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
IRJET- Image Processing using Steganography
IRJET-  	  Image Processing using SteganographyIRJET-  	  Image Processing using Steganography
IRJET- Image Processing using SteganographyIRJET Journal
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
IRJET- Efficient Data Embedding and Data Encryption in Video Stream
IRJET- Efficient Data Embedding and Data Encryption in Video StreamIRJET- Efficient Data Embedding and Data Encryption in Video Stream
IRJET- Efficient Data Embedding and Data Encryption in Video StreamIRJET Journal
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video SteganographyIRJET Journal
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...AM Publications,India
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODSSTEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODSIRJET Journal
 

Similar to Understanding Image Steganography with Practical Approach (20)

IRJET - Information Hiding in H.264/AVC using Digital Watermarking
IRJET -  	  Information Hiding in H.264/AVC using Digital WatermarkingIRJET -  	  Information Hiding in H.264/AVC using Digital Watermarking
IRJET - Information Hiding in H.264/AVC using Digital Watermarking
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
It3116411644
It3116411644It3116411644
It3116411644
 
B018131117
B018131117B018131117
B018131117
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
S4501105108
S4501105108S4501105108
S4501105108
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
IRJET- Image Processing using Steganography
IRJET-  	  Image Processing using SteganographyIRJET-  	  Image Processing using Steganography
IRJET- Image Processing using Steganography
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
IRJET- Efficient Data Embedding and Data Encryption in Video Stream
IRJET- Efficient Data Embedding and Data Encryption in Video StreamIRJET- Efficient Data Embedding and Data Encryption in Video Stream
IRJET- Efficient Data Embedding and Data Encryption in Video Stream
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video Steganography
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODSSTEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
STEGANOGRAPHY: COMPLETE OVERVIEW OF RELEVANT TECHNIQUES AND METHODS
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Understanding Image Steganography with Practical Approach

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 103 Understanding Image Steganography with Practical Approach Gautam Juvarajiya Student, Department of Information Technology, Thakur College of Engineering and Technology, Mumbai, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - As internet usage increases, we must be mindful to send and receive sensitive information securely. Steganography and Cryptography aretwotechniquesused for secured data transfer and user privacy. In cryptography, the message is changed using an encryption key that is only known to the sender and the recipient. No one else can read the message without the encryption key. Steganography increases the anonymity of datacommunicationbyconcealing the existence of data such that no one can identifyitspresence. Key Words: internet, privacy, encryption, steganography, cryptography 1.INTRODUCTION The Greek words steganos (covered) and graptos (writing) are the origin of the word steganography (meaning covered or hidden writing)[1]. In the modern world, everyoneshares data and information with oneanother.Aselectronic devices for sharing data and information have developed and become more widely used, the need for data security has become critical[2]. With so many publicly available technologies capable of exploitingtheprivacy,data integrity, and security of the data being communicated, malicious threats, eavesdropping, and other malicious actions have become commonplace. Various techniques, including Steganography, Cryptography, etc have been made accessible for the security of this information and data[3,4]. Although the goals of steganography and cryptography are identical, there is a little distinction or there is a thin line of difference between these two. In Cryptography, plaintext or original data is first converted into Cipher text in encryption while conversion of cipher text to original text is known as Decryption. The cipher text can be seen by human eyes, but encryption renders the data unbreakable and unreadable. While in Steganography the data or the secret message is concealed in such a way in some form but the hidden data or secret message here is not visible to anyofthepartyunlessit is decrypted properly[3]. Fig -1.1: Security Techniques [5] Steganography and watermarking are two examples of information-hiding domains; both are employed to conceal the hidden message[3]. These two approaches are closely related to one another, although they each have different goals. While steganography refers to the act of concealing information by hiding the secret message in a public cover media without any indication of its existence, watermarking aims to maintain the integrity of the secret data by preventing outsiders from knowing the existence of the communication[3,5]. Steganography techniquesconceal sensitiveinformationora secret message in unassuming cover material to prevent attracting the attention of attackers. Words can be inserted inside of images, audio files, video files, etc. Contrarily, the study of mathematical techniques related to information security components like secrecy, data integrity, entity authentication, and data origin authentication is referred to as cryptography[3]. There are numerous varieties of steganography, including those for images, text, audio, and video. 2. TYPES OF STEGANOGRAPHY Few types ofsteganographytechniquetoencryptorhidedata which are common: Image Steganography, Video Steganography, Audio Steganography, Video Steganography, etc.[1,5,6,7].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 104 Fig -2.1: Types of Steganography 2.1 Image Steganography The secret image is hidden inside the cover image in a way that makes the secret data or secret message disappear and the main picture appear to be the original. By changing the pixels in the primary image, the secret messageisconcealed. FIG -2.1.1: Image Steganography 2.2 Audio Steganography Audio steganography is the process of usingdigitalsound files to obscurely alter a sound file's binary sequence, which can be used to conceal messages. It supports various audio files like wave, mpeg, mp3, etc. to conceal the data in it. 2.3 Video Steganography The digital video formats that are utilized for video steganography allow for the concealment of any type of information. Video files can include a sizeable quantity of sensitive information because they are a moving stream of images and sounds. MP4, AVI, and other video formats are used in video steganography. 2.4 Text Steganography In its simplest form, text steganography describes the information that isconcealedintextfiles.Textsteganography can be used to generate legible messages by altering context, modifying words withinthetext,constructingandgenerating random sequences, and more. 3. IMAGE STEGANOGRAPHY WORKING Firstly, user needs to select whether to encode the image or decode the image. If a user wants to encodes, he/she needs to select the image from their system and enter the secret message then click on “Encode” button and save it on the system. To decode the hidden text from the image, user needs to select the encoded image and click on “Decode” button and the output Hidden message will be displayed. FIG -3.1: Flow Chart for Image Steganography 3.1 Algorithm : STEP 1 : Start STEP 2 : Select Encode/Decode STEP 3 : If Encode, Select image & write text to be encoded & save at particular directory STEP 4 : If Decode, Select encode image &hiddenmessagewill be displayed STEP 5 : Stop 4. RESULTS AND ANALYSIS The initial screen, or the default homepage, thattheusersees when the application is launched asks whether they wish to encrypt or decrypt the image. The application's home page features two buttons, Encode and Decode. The secret message is encoded using the original image and decoded using the encoded image using the Encode and Decode buttons, respectively.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 105 FIG -4.1: Home-Page of Application 4.1 Encode Page The user is then taken to this screen after clicking the "Encode" button on the homepage, where they must choose an image from their system or computer. FIG -4.1.1: Encode Page The user is then taken to this screen after clicking the "Encode" button on the homepage, where they must choose an image from their system or computer. FIG -4.1.2: Selecting Image and Entering Hidden Message for Encoding image 4.2 Decode Page The user must select the encoded image from the computer system and click the "Decode" button in order to decode the secret message or data from the image. FIG -4.2.1: Selecting image for Decoding Secret Message from Encoded image After selecting the "Decode" Button, the chosen (encoded) image's hidden message is displayed on the screen.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 106 FIG -4.2.2: Successful Decryption 4.3 Observations According to the project, the size of the image before hidden message or secret message encoding was smaller than the size of the image after encoding. FIG -4.3.1: Image Size Before Encoding The size of the image was 40KB before the secret message was encoded, and it was 44KB after the hidden or secret message is encoded in it. FIG -4.3.2: Image Size After Encoding Following encoding and decoding procedures, the 4KB difference was noticed. 5. CONCLUSIONS Each of the main formats has a unique way of encoding messages, eachwithdifferentadvantagesanddisadvantages. Where one strategy falls short in one area,theotherdoes too in another. The strategy presented in this research makes use of image steganography, a well-known method of steganography. The personal informationiscontainedinside the cover file image that the application creates as a stegno image. Steganography is different from cryptography, but combining the two can increase the security of the data that is being safeguarded and keep the covert communication from being discovered. The main advantages of implementing steganography to mask data over encryption is that it makes it harder to detect if private information is hidden within a file or other piece of content. In contrast, anyone may see the cipher text in cryptography. ACKNOWLEDGEMENT This paper was prepared with the help of a number of research papers on steganography techniques and their overview, and I want to express my gratitude to the authors for their commitment and hard work. REFERENCES [1] International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319- 1821 Volume 6, Issue 1 (January 2017), PP.68-71, Survey Paper on Steganography Namrata Singh Computer Science and engineering ABES Engineering College, Ghaziabad A.K.T.U. [2] International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958 (Online), Volume-9 Issue-4, April, 2020 1549 Published By: Blue Eyes Intelligence Engineering & Sciences Publication © Copyright: All rights reserved. Retrieval Number: D8760049420/2020©BEIESPDOI:10.35940/ijeat.D876 0.049420 Journal Website: www.ijeat.org Information Hiding using Steganography Ritu Sindhu, Pragati Singh. [3] International Journal of Scientific & Engineering Research, Volume 6, Issue6,June-20151580ISSN 2229- 5518, Review Paper On Image Based Steganography By Indu Nehra, Rakesh Sharma. [4] SteganoGAN: High Capacity Image Steganography with GANs Kevin A. Zhang,1 Alfredo Cuesta-Infante,2LeiXu,1 Kalyan Veeramachaneni1 1 MIT, Cambridge, MA - 02139, USA kevz,leix,kalyanv@mit.edu 2 Univ. ReyJuan Carlos, SpainK. Elissa. [5] Journal of Theoretical and Applied Information Technology 15th March 2022. Vol.100. No 5 2022 Little Lion Scientific A LITERATURE REVIEW OF VARIOUS STEGANOGRAPHY METHODS RANA SAMIHAMEED,2,3 ABD RAHIM BIN HJ AHMAD, 1MUSTAFA MUNEEB TAHER, 1 SITI SALASIAH MOKRI 2CollegeofComputing Science & InformationTechnology,UniversityofTenaga, Malaysia 1 Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia 2 College of Law and Political Science, University of Kirkuk Iraq.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 09 | Sep 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 107 [6] JARCCE ISSN (Online) 2278-1021 ISSN (Print) 2319- 5940 International Journal of Advanced Research in Computer and Communication Engineering Vol.7,Issue 9, September 2018, Image Steganography Techniques - A Review Paper Mohammed A. Saleh College of Sciences and Arts in Ar Rass, Qassim University, Kingdom of Saudi Arabia. [7] International Journal of Innovative Research in Computer and Communication Engineering Vol.4,Issue 1, January 2016,A Survey Paper on Steganography Techniques Dr. Rajkumar L Biradar1, Ambika Umashetty2 Associate Professor, Dept. of Electronics and Telematics, G. Narayanamma Institute of Technology & Science, Hyderabad, India1 Dept. of Computer Science & Engineering, Appa Institute of Engineering & Technology, Kalaburagi.