SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 96
MESSAGE TRANSFER USING STEGANOGRAPHY
Hrushikesh Kale1, Meera Keshattiwar2, Mrunal Patil3, Aakanksha Shinde 4
1Hrushikesh Kale
2Meera Keshattiwar
5Professor P.P.Mahale, Dept. of Information Technology, Aissms IOIT Pune, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Steganography is used to hide information like
text, images, videos in other media files like images, videos,
music. We can use steganography to transfer messagesfrom
one host to another securely. Nowadays we cannot trust the
server side to encrypt our messages end to end as the server
side knows the keys of both the sender and receiver. Using
steganography, we can make sure that the server does not
decrypt and store our messages in plain text. We can secure
our messages from server side and intruders also. In
steganography we store our secret data into the least
significant bits of the pixels. Storing data into the least
significant bits does not affect the image that much as the
values of the pixels change slightly. We can use different
techniques to cipher data into images like sequential, prime
and equations ciphering. To decipher such an image the
intruder has to check for all thecombinationsofpixelswhich
increases the time complexity of this task to exponential.
Using this technique we can protect our messages not just
from intruders but also server side proxy attacks. In this
method the sender and receiver mutually decide some keys
which will be used to cipher and decipher data from images.
The user only needs to remember two keys, the starting
point and the method used to cipher data into the image.
Key Words: Data Hiding. Steganography, Cyber
Security, Cryptography, Data Security
1. INTRODUCTION
In the present situation, secret messages may be conveyed
by concealing them in a picture or text so that only the
sender and the recipient can read or see them. Data
concealing and revealing is referred to as steganography.
Because it conceals the secretmessage,thepicturethathides
the data in steganography is known as thecoverimage.After
the data has been hidden, the image is known as the stego-
image. For embedding data in a cover file, LSB insertion is a
highly well-liked and oftenusedtechniqueinsteganography.
According to the LSB embedding approach, data can be
concealed in the LSBs of the cover file so that even the
human eye cannot detect the concealed information. It is an
approach in the spatial domain. Steganography is a way of
hiding text in pictures such that if an intruder finds the
secret message, it cannot be read by the intruder. So, using
steganography will add an extra degree of protection.Image
compression is used to minimise the size of a message so
that it may be easily hidden. Image compression is a critical
application in the field of Digital Image Processing.. We can
secure our messages from server side and intruders also. In
steganography we store our secret data into the least
significant bits of the pixels. Storing data into the least
significant bits does not affect the image that much as the
values of the pixels change slightly. We can use different
techniques to cipher data into images like sequential, prime
and equations ciphering. This is one of the safest way to
share confidential information.
1.1 Need of the Topic
It is one of various data hiding techniques, which aims at
transmitting a message on a channel where some other kind
of information is already being transmitted. This
distinguishessteganographyfromcovertchanneltechniques,
which instead of trying to transmit data betweentwoentities
that were unconnected before. Steganography is defined by
Markus Kahn as follows, “Steganography is the art and
science of writing hidden messages insuchawaythatnoone,
apart from the sender and intended recipient, suspects the
existence of the message, a form of security through
obscurity”. The goal of Steganography is to hide messages
inside other harmless messages in a way that does not allow
any enemy to even detect that there is a second message
present”.
2. LITERATURE SURVEY
[1]. Osama Fouad Abdel Wahab, Ashraf A. M. Khalaf, Aziza I.
Hussein, Hesham F. A. Hamed,“Hiding Data Using Efficient
Combination of RSA Cryptography and Compression
Steganography Techniques”, IEEE Issue:2021,
Image compression is a useful technology that helps save
memory space and time while transferring images over a
network. This helps to increase storage capacity as well as
transfer speed.
[2]. Nandhini Subramanian ,Omar Elharrouss , Somaya Al-
Maadeed, Ahmed Bouridane , “Image Steganography: A
Review of the Recent Advances” , IEEE , Issue:2021.
Image steganography is the method used in transmitting
secret information by hiding it in plain sight inside a cover
image. Deep learning methods are widely used in every field
and has been used in the research of steganography. Review
of all the related works led to categorizing them into three
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 97
groups vastly. Most of the traditional based steganography
methods use the LSB substitution and some of its variants.
[3]. Asha Durafe, Rutika Desai, “Steganography for Public
Security”, IEEE , Issue:2020,
In a nutshell, secure transmission of data is the rising
concern with the advancements in technology.
Steganography has its own pros and cons but is a better
choice for sending secret information from one point to
another without getting detected.
3. METHODOLOGY
By exchanging private keys, the two clients may begin
communicating with one another. The clients will be able to
decode the incoming messages using the key. A client
encrypts the private key into an image using a predefined
location and ciphering algorithm in order to transfer the
privatekey. The other clientmay extracttheprivatekeyfrom
the picture and use it to decode messages using the known
location and scheme. Therefore, our technique uses
steganography to implement a key exchange. The technique
for encoding data into pictures is based on changing a pixel's
bits. Alpha, red, green, and blue bytes each contain at least
two significant bits, which together make up one byte of
information per pixel. One significant drawback of changing
only the pixels that contain data is that there will likely be
differences in the neighboring pixels, which may make it
simpler to analyze the image. A user's private key may be
made public due to this flaw, which could lead to message
interception. In order to get around this issue, we will also
change the random and nearby pixels in images to make
steganalysis challenging.For an image to be decoded,aclient
needs to know the location of the first pixel and theciphering
technique that was used to encrypt the data. Voice messages,
hints, or other tangible media can be used to communicate
this information between individuals. The benefit of this
strategy over the exchange of lengthy, complex keys is that
there is less, simpler information to remember.
We use bitwise operators like &, —, and! to modify a pixel's
bits using bit-wise operations. As a result, the bits in the
required positioncan be changed to match the bit inthedata.
We may simplify this process by generating a stream of bits
from the secret data, which we can then use to determine
which bit in the cover pictureneeds to change next. We use a
queue-like data structure to store the pieces of secret data,
thus this operation has some overhead. Additionally, large
files increase the amount of time needed to distort an image
before encrypting it. High security is provided, but at the
expense of computing power. The image in the above image
has a total of w*h pixels, where w is the image's width and h
is its height. With a slight modification to the n-queens
solution, we may attempt to decode the image using the
information from the n-queens issue. We may choose any of
the remaining pixels to be the next data point because this is
not a pursuit.
3.1 ALGORITH USED
[1] Data Cipher: The least significant bit algorithmisbeing
used to encrypt data into graphics. In this process, data
is transformed into a queue of bits, which are then
inserted into the picture at the proper places. The
location of the pixel and the chosen scheme dictate the
order of the bits where data is ciphered. The user has
previously communicated these two things via a vocal
channel.
[2] Camouflage Data: There is a chance that someone will
be able to detect a change in the adjacent pixels of a
picture when we alter its pixels.The key may be taken
out of the image using this information. We get around
this issue by making random modifications to picture
pixels such that the read change blends in with other
changes.
[3] Data Decipher: Using the initial pixel'slocationandthe
scheme, the information contained in the least
significant bits is decoded. Depending on the ciphering
system employed, the data are stored in a certain
sequence. A 16 bit integer is put at the beginning of the
data to indicate the length of the data. In the initial
stage, we take the image's first 16 bits and transform
them to an integer. The content's length, as ciphered in
the picture, is this. We begin to extract the real
information from data after extracting the content
length. The ciphering algorithm employed determines
exactly where the bits and pixels should be placed.
[4] Key Exchange Algorithm: A key exchange algorithm
based on steganography is used between two clients
to exchange keys. A user creates a public key and a
private key, and then sends the public key to another
user. Data is encrypted by one user using the public
key of another user, who subsequently receives the
encrypted data.
Symmetric key cryptography is another tool we may
utilise to speed up communication. But compared to
symmetric key cryptography, asymmetric key
cryptography provides greater security.
Figure 1 How pixel is represented as an integer
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 98
4. ARCHITECTURE OF STEGANOGRAPHY
Figure 2. Architecture of web application
The figure above illustrates the processes of encodingsecret
text as a picture and extracting secret data from theimage.It
contains the cover picture, the secret data, and the key
required for both ciphering and deciphering the data from
the image. The architecture of the steganography process
may be used to get an overview of the process of encrypting
data into images. We first want a cover picture that will
conceal data. The size of the cover picture utilised
determines how effective the algorithm is. The process of
decoding will be extremely difficult and time-consuming if
the image is vast since there will be several waystointerpret
it. Once data has been concealed in a picture, the imagemust
be sent to the other end over a channel, which may or may
not be secure. The message is unaffected by the channel's
security since the data is concealed inside the cover picture,
making it unclear to attackers whether a message is being
sent or not. The user has to know the initial pixel fromwhich
the ciphering process began and the technique that was
employed to encrypt the data into the image in order to
decrypt the image. The attacker is free to test any potential
pairing of the message's decoding sites and techniques. To
grasp what the text means, this step must be done manually
or with the aid of a deep learning neural network. However,
in practise this task is all but impossiblebecausethereare an
infinite number of combinations of places and methods that
may be used. An picture with a width and height of 7 pixels,
for instance, has 823543 potential permutations. However,
in practise, we may utilise photos that are considerably
larger. If we use a picture with dimensionsof100by100,the
number of deciphering combinations is about 1, with 30000
zeroes after that. As was said before, the size of the picture
has a significant impact on how strong the algorithm is; as
image size rises, algorithm strength increases exponentially.
5. CONCLUSIONS
The Steganography can be used in various applications for
securing the identity of data. One way is to use
steganographyinsecuremessagingapplicationsin whichthe
keys are transferred using steganography. By using our
proposed model for exchanging data we can transfer data
secretly not just from external intruders but also server side
decryptions. In most messaging applications the server side
can easily decrypt messages usingdecryptionkeys.Using the
system we have proposed any intruder or attacker will have
to check all the combinations of keys from the image. The
time complexity of deciphering the keys from the image is
exponential. Also while deciphering the image the attacker
needs to check if his/her decipher is successful or not
manually or using some kind of intelligent algorithm. The
time complexity of such an operation is quite high. Using
very little information from clients we can share large data
from one client to another and vice versa . If the size of the
image is n*m then the time required for deciphering is
exponential to the number of pixels in the image.
REFERENCES
[1] Osama Fouad Abdel Wahab, Ashraf A. M. Khalaf, Aziza I.
Hussein, Hesham F. A. Hamed, “Hiding Data Using
Efficient Combination of RSA Cryptography and
Compression Steganography Techniques”, IEEE,
Issue:2021.
[2] Nandhini Subramanian, Omar Elharrouss, Somaya Al-
Maadeed, Ahmed Bouridan e , “Image Steganography: A
Review of the Recent Advances” , IEEE , Issue:2021
[3] Asha Durafe, Rutika Desai, “Steganography for Public
Security” , IEEE , Issue:2020.
[4] Ali Salem Ali, Mohammed Sabbih Hamoud Al-Tamimi,
Alaa Ahmed Abbood, “Secure Image Steganography
Through Multilevel Security”, International Journal of
Innovation , Creativity and Change, IJICC , Issue:2020.
[5] manshu Arora, Cheshta Bansal, Sunny
Dagar,”Comparative study of image steganography
techniques” , International Conference on Advances in
Computing, Communication Control and Networking,
Issue : 2018
[6] Ammad Ul Islam1 , Faiza Khalid2 , Mohsin Shah2 , Zakir
Khan2 , Toqeer Mahmood3 , Adnan Khan2 , UsmanAli2,
Muhammad Naeem4 , “An Improved Image
Steganography Technique based on MSB using Bit
Differencing” , The Sixth International conference on
Innovative computing technology,Issue : 2016
[7] Ravi K Sheth,Rashmi M. Tank , “Image Steganography
Technique”, Academia , Issue:2015
[8] Manveer Kaur , Gagandeep Kaur, “Review of Various
Steganalysis Techniques”,IJCSIT, Issue:2014
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 99
[9] AbdalbasitMohammed,NurhayatVarol,”AReview Paper
on Cryptography ”, Research Gate , Issue: 2019
BIOGRAPHIES
Hrushikesh Kale
BE-IT
AISSMS IOIT,Pune
Meera Keshattiwar
BE-IT
AISSMS IOIT,Pune
Mrunal Patil
BE-IT
AISSMS IOIT,Pune
Aakanksha Shinde
BE-IT
AISSMS IOIT,Pune
Prof. Pragati Mahale
Department of Information
Technology
AISSMS IOIT,Pune

More Related Content

Similar to MESSAGE TRANSFER USING STEGANOGRAPHY

P017329498
P017329498P017329498
P017329498
IOSR Journals
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
IRJET Journal
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
eSAT Publishing House
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
R04405103106
R04405103106R04405103106
R04405103106
IJERA Editor
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 

Similar to MESSAGE TRANSFER USING STEGANOGRAPHY (20)

P017329498
P017329498P017329498
P017329498
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
It3116411644
It3116411644It3116411644
It3116411644
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
R04405103106
R04405103106R04405103106
R04405103106
 
H43064650
H43064650H43064650
H43064650
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 

Recently uploaded (20)

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 

MESSAGE TRANSFER USING STEGANOGRAPHY

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 96 MESSAGE TRANSFER USING STEGANOGRAPHY Hrushikesh Kale1, Meera Keshattiwar2, Mrunal Patil3, Aakanksha Shinde 4 1Hrushikesh Kale 2Meera Keshattiwar 5Professor P.P.Mahale, Dept. of Information Technology, Aissms IOIT Pune, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Steganography is used to hide information like text, images, videos in other media files like images, videos, music. We can use steganography to transfer messagesfrom one host to another securely. Nowadays we cannot trust the server side to encrypt our messages end to end as the server side knows the keys of both the sender and receiver. Using steganography, we can make sure that the server does not decrypt and store our messages in plain text. We can secure our messages from server side and intruders also. In steganography we store our secret data into the least significant bits of the pixels. Storing data into the least significant bits does not affect the image that much as the values of the pixels change slightly. We can use different techniques to cipher data into images like sequential, prime and equations ciphering. To decipher such an image the intruder has to check for all thecombinationsofpixelswhich increases the time complexity of this task to exponential. Using this technique we can protect our messages not just from intruders but also server side proxy attacks. In this method the sender and receiver mutually decide some keys which will be used to cipher and decipher data from images. The user only needs to remember two keys, the starting point and the method used to cipher data into the image. Key Words: Data Hiding. Steganography, Cyber Security, Cryptography, Data Security 1. INTRODUCTION In the present situation, secret messages may be conveyed by concealing them in a picture or text so that only the sender and the recipient can read or see them. Data concealing and revealing is referred to as steganography. Because it conceals the secretmessage,thepicturethathides the data in steganography is known as thecoverimage.After the data has been hidden, the image is known as the stego- image. For embedding data in a cover file, LSB insertion is a highly well-liked and oftenusedtechniqueinsteganography. According to the LSB embedding approach, data can be concealed in the LSBs of the cover file so that even the human eye cannot detect the concealed information. It is an approach in the spatial domain. Steganography is a way of hiding text in pictures such that if an intruder finds the secret message, it cannot be read by the intruder. So, using steganography will add an extra degree of protection.Image compression is used to minimise the size of a message so that it may be easily hidden. Image compression is a critical application in the field of Digital Image Processing.. We can secure our messages from server side and intruders also. In steganography we store our secret data into the least significant bits of the pixels. Storing data into the least significant bits does not affect the image that much as the values of the pixels change slightly. We can use different techniques to cipher data into images like sequential, prime and equations ciphering. This is one of the safest way to share confidential information. 1.1 Need of the Topic It is one of various data hiding techniques, which aims at transmitting a message on a channel where some other kind of information is already being transmitted. This distinguishessteganographyfromcovertchanneltechniques, which instead of trying to transmit data betweentwoentities that were unconnected before. Steganography is defined by Markus Kahn as follows, “Steganography is the art and science of writing hidden messages insuchawaythatnoone, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity”. The goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second message present”. 2. LITERATURE SURVEY [1]. Osama Fouad Abdel Wahab, Ashraf A. M. Khalaf, Aziza I. Hussein, Hesham F. A. Hamed,“Hiding Data Using Efficient Combination of RSA Cryptography and Compression Steganography Techniques”, IEEE Issue:2021, Image compression is a useful technology that helps save memory space and time while transferring images over a network. This helps to increase storage capacity as well as transfer speed. [2]. Nandhini Subramanian ,Omar Elharrouss , Somaya Al- Maadeed, Ahmed Bouridane , “Image Steganography: A Review of the Recent Advances” , IEEE , Issue:2021. Image steganography is the method used in transmitting secret information by hiding it in plain sight inside a cover image. Deep learning methods are widely used in every field and has been used in the research of steganography. Review of all the related works led to categorizing them into three
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 97 groups vastly. Most of the traditional based steganography methods use the LSB substitution and some of its variants. [3]. Asha Durafe, Rutika Desai, “Steganography for Public Security”, IEEE , Issue:2020, In a nutshell, secure transmission of data is the rising concern with the advancements in technology. Steganography has its own pros and cons but is a better choice for sending secret information from one point to another without getting detected. 3. METHODOLOGY By exchanging private keys, the two clients may begin communicating with one another. The clients will be able to decode the incoming messages using the key. A client encrypts the private key into an image using a predefined location and ciphering algorithm in order to transfer the privatekey. The other clientmay extracttheprivatekeyfrom the picture and use it to decode messages using the known location and scheme. Therefore, our technique uses steganography to implement a key exchange. The technique for encoding data into pictures is based on changing a pixel's bits. Alpha, red, green, and blue bytes each contain at least two significant bits, which together make up one byte of information per pixel. One significant drawback of changing only the pixels that contain data is that there will likely be differences in the neighboring pixels, which may make it simpler to analyze the image. A user's private key may be made public due to this flaw, which could lead to message interception. In order to get around this issue, we will also change the random and nearby pixels in images to make steganalysis challenging.For an image to be decoded,aclient needs to know the location of the first pixel and theciphering technique that was used to encrypt the data. Voice messages, hints, or other tangible media can be used to communicate this information between individuals. The benefit of this strategy over the exchange of lengthy, complex keys is that there is less, simpler information to remember. We use bitwise operators like &, —, and! to modify a pixel's bits using bit-wise operations. As a result, the bits in the required positioncan be changed to match the bit inthedata. We may simplify this process by generating a stream of bits from the secret data, which we can then use to determine which bit in the cover pictureneeds to change next. We use a queue-like data structure to store the pieces of secret data, thus this operation has some overhead. Additionally, large files increase the amount of time needed to distort an image before encrypting it. High security is provided, but at the expense of computing power. The image in the above image has a total of w*h pixels, where w is the image's width and h is its height. With a slight modification to the n-queens solution, we may attempt to decode the image using the information from the n-queens issue. We may choose any of the remaining pixels to be the next data point because this is not a pursuit. 3.1 ALGORITH USED [1] Data Cipher: The least significant bit algorithmisbeing used to encrypt data into graphics. In this process, data is transformed into a queue of bits, which are then inserted into the picture at the proper places. The location of the pixel and the chosen scheme dictate the order of the bits where data is ciphered. The user has previously communicated these two things via a vocal channel. [2] Camouflage Data: There is a chance that someone will be able to detect a change in the adjacent pixels of a picture when we alter its pixels.The key may be taken out of the image using this information. We get around this issue by making random modifications to picture pixels such that the read change blends in with other changes. [3] Data Decipher: Using the initial pixel'slocationandthe scheme, the information contained in the least significant bits is decoded. Depending on the ciphering system employed, the data are stored in a certain sequence. A 16 bit integer is put at the beginning of the data to indicate the length of the data. In the initial stage, we take the image's first 16 bits and transform them to an integer. The content's length, as ciphered in the picture, is this. We begin to extract the real information from data after extracting the content length. The ciphering algorithm employed determines exactly where the bits and pixels should be placed. [4] Key Exchange Algorithm: A key exchange algorithm based on steganography is used between two clients to exchange keys. A user creates a public key and a private key, and then sends the public key to another user. Data is encrypted by one user using the public key of another user, who subsequently receives the encrypted data. Symmetric key cryptography is another tool we may utilise to speed up communication. But compared to symmetric key cryptography, asymmetric key cryptography provides greater security. Figure 1 How pixel is represented as an integer
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 98 4. ARCHITECTURE OF STEGANOGRAPHY Figure 2. Architecture of web application The figure above illustrates the processes of encodingsecret text as a picture and extracting secret data from theimage.It contains the cover picture, the secret data, and the key required for both ciphering and deciphering the data from the image. The architecture of the steganography process may be used to get an overview of the process of encrypting data into images. We first want a cover picture that will conceal data. The size of the cover picture utilised determines how effective the algorithm is. The process of decoding will be extremely difficult and time-consuming if the image is vast since there will be several waystointerpret it. Once data has been concealed in a picture, the imagemust be sent to the other end over a channel, which may or may not be secure. The message is unaffected by the channel's security since the data is concealed inside the cover picture, making it unclear to attackers whether a message is being sent or not. The user has to know the initial pixel fromwhich the ciphering process began and the technique that was employed to encrypt the data into the image in order to decrypt the image. The attacker is free to test any potential pairing of the message's decoding sites and techniques. To grasp what the text means, this step must be done manually or with the aid of a deep learning neural network. However, in practise this task is all but impossiblebecausethereare an infinite number of combinations of places and methods that may be used. An picture with a width and height of 7 pixels, for instance, has 823543 potential permutations. However, in practise, we may utilise photos that are considerably larger. If we use a picture with dimensionsof100by100,the number of deciphering combinations is about 1, with 30000 zeroes after that. As was said before, the size of the picture has a significant impact on how strong the algorithm is; as image size rises, algorithm strength increases exponentially. 5. CONCLUSIONS The Steganography can be used in various applications for securing the identity of data. One way is to use steganographyinsecuremessagingapplicationsin whichthe keys are transferred using steganography. By using our proposed model for exchanging data we can transfer data secretly not just from external intruders but also server side decryptions. In most messaging applications the server side can easily decrypt messages usingdecryptionkeys.Using the system we have proposed any intruder or attacker will have to check all the combinations of keys from the image. The time complexity of deciphering the keys from the image is exponential. Also while deciphering the image the attacker needs to check if his/her decipher is successful or not manually or using some kind of intelligent algorithm. The time complexity of such an operation is quite high. Using very little information from clients we can share large data from one client to another and vice versa . If the size of the image is n*m then the time required for deciphering is exponential to the number of pixels in the image. REFERENCES [1] Osama Fouad Abdel Wahab, Ashraf A. M. Khalaf, Aziza I. Hussein, Hesham F. A. Hamed, “Hiding Data Using Efficient Combination of RSA Cryptography and Compression Steganography Techniques”, IEEE, Issue:2021. [2] Nandhini Subramanian, Omar Elharrouss, Somaya Al- Maadeed, Ahmed Bouridan e , “Image Steganography: A Review of the Recent Advances” , IEEE , Issue:2021 [3] Asha Durafe, Rutika Desai, “Steganography for Public Security” , IEEE , Issue:2020. [4] Ali Salem Ali, Mohammed Sabbih Hamoud Al-Tamimi, Alaa Ahmed Abbood, “Secure Image Steganography Through Multilevel Security”, International Journal of Innovation , Creativity and Change, IJICC , Issue:2020. [5] manshu Arora, Cheshta Bansal, Sunny Dagar,”Comparative study of image steganography techniques” , International Conference on Advances in Computing, Communication Control and Networking, Issue : 2018 [6] Ammad Ul Islam1 , Faiza Khalid2 , Mohsin Shah2 , Zakir Khan2 , Toqeer Mahmood3 , Adnan Khan2 , UsmanAli2, Muhammad Naeem4 , “An Improved Image Steganography Technique based on MSB using Bit Differencing” , The Sixth International conference on Innovative computing technology,Issue : 2016 [7] Ravi K Sheth,Rashmi M. Tank , “Image Steganography Technique”, Academia , Issue:2015 [8] Manveer Kaur , Gagandeep Kaur, “Review of Various Steganalysis Techniques”,IJCSIT, Issue:2014
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 12 | Dec 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 99 [9] AbdalbasitMohammed,NurhayatVarol,”AReview Paper on Cryptography ”, Research Gate , Issue: 2019 BIOGRAPHIES Hrushikesh Kale BE-IT AISSMS IOIT,Pune Meera Keshattiwar BE-IT AISSMS IOIT,Pune Mrunal Patil BE-IT AISSMS IOIT,Pune Aakanksha Shinde BE-IT AISSMS IOIT,Pune Prof. Pragati Mahale Department of Information Technology AISSMS IOIT,Pune