Project Presentation on:
Image Based
Steganography
“to hide information within image file”
PRESENTED BY:
SHYAM PRABHAT TIRKEY
1
Talk Flow / Content
I. What is Steganography?
II. Steganography Vs Cryptography
III. Project Scope
IV. Methodology
V. Terminology
VI. Encryption Process
VII. Decryption Process
VIII. Data Flow Diagram
IX. Requirements
X. Layout & coding (another ppt)
XI. Advantages
XII. Disadvantages
2
What is Steganography?
• Steganography is the practice of hiding private or sensitive
information within something that appears to be nothing
out to the usual.
• Steganography is the art of concealing the existence of
information within seemingly innocuous carriers.
I
3
Steganography Vs
Cryptography
• Cryptographic techniques "scramble" messages so if
intercepted, the messages cannot be understood.
• Steganography involves hiding information so it appears
that no information is hidden at all.
II
4
Project Scope
o This project is going to be develop for hiding information
in any image file.
o The scope of the project is implementation of
steganography tools for hiding information includes any
type of information file and image files and the path
where the user wants to save Image and extruded file.
III
5
Methodology
• User needs to run the application. The user
has two options – encrypt and decrypt.
• In encrypt, application give the screen to
select image file, information file and option
to save the image file.
• In decrypt, application gives the screen to
select only image file and ask path where
user want to display secret message and/or
save the secrete file.
IV
6
Methodology (cont.)
• This project has two methods – Encrypt
and Decrypt.
• In encryption the secrete information is
hiding in with any type of image file.
• Decryption is getting the secrete
information from image file.
7
Terminology
oCover-Image: An image in which the secret
information is going to be hidden. The term
"cover" is used to describe the original,
innocent message, data, document.
• Payload: The information which is to be
concealed. The information to be hidden in
the cover data is known as the "embedded"
data.
V
8
Terminology (Cont.)
oStego-Image: The medium in which the
information is hidden. The "stego" data is the
data containing both the cover image and
the "embedded" information.
oSecret/Stego key: This is the key used as a
password to encrypt and decrypt the cover
and stego respectively in order to extract the
hidden message.
9
Embedding/Encryption Process
VI
10
IMAGE FILE (COVER-IMAGE) INFORMATION FILE/PAYLOAD
IMAGE FILE (STAGO-IMAGE)
Embedding/Encryption Block
Diagram
11
Decryption ProcessVII
12
IMAGE FILE (STAGO-IMAGE)
INFORMATION FILE/PAYLOAD
Extracting/Decryption Block
Diagram
13
Data Flow Diagram
• Context Free Diagram
• Level 0 DFD
• Level 1 DFD
• Level 2 DFD
14
Context Diagram
15
Stego
(System)User
Cover-Image & message
Stago-Image
Stago-Image
Hiddenmessage
Level 0 DFD
16
0
Level 1 DFD (Encryption)
17
User Hide
Message
Image and message selection
Confirmation
1.
Level 2 DFD(Encryption)
18
User
Select/
Type
Select
image
Hide
Save
Image
Text/text
file
Stego
Image
1.1
1.2
1.3
1.4
Level 1 DFD (Decryption)
19
User Extract
Message
Stego Image
Confirmation
1.
Level 2 DFD(Decryption)
20
User
Select
image
Extract
Save
Stego Image
Text/text File
1.1
1.2
1.3
Requirements
• Software Requirements:
Microsoft Visual Studio (.NET Framework, C#)
• Hardware Requirements:
OS: Windows 7 or Above
Processor: Preferably 1.0 GHz or Greater.
RAM: 512 MB or Greater.
VIII
21
Advantages
o It can be used for safeguarding data, such as in
the field of media where copywriting ensures
authenticity.
o It can be used by intelligence agencies for
sending their secret data.
IX
22
Disadvantages
• Anti-Humanist activities have been carried out
cloaked under this technique.
X
23

Encryption