Sei sulla pagina 1di 13

Private Image Security (PIS)

Department of Software Engineering Submitted by:


Sanjaya Adhikari,14731
Nepal College of Information Technology Mithun Adhikari, 14748
Balkumari, Lalitpur, Nepal
Table of Content
 PIS: Introduction
 Problem Statement
 Significance of Study
 Objectives
 Terminology
 Scope and Application
 Proposed Methodology
 Use Case Diagram
PIS : Introduction 1

 In today’s context, Security of confidential data is most important.

 Cross platform (Android/ iOS ) based image processing Application.

 It’s a platform which Provides security of confidential (private)


Image

 Also a platform for the transmission of sensible data within some


dummy image

What we get? – image within image


PIS : Problem Statement 2

 Nowadays, People are sharing Private image. They face problem of


getting leak . How to know From where and who leaked it?

 How can we send a message secretly to the destination ?

 How can we cover a message secretly to the image?


PIS : Significance of Study 3

 The study of this project finds the solution of the problem arise
previously

 Using steganography, information can be hidden in carriers such as


images, audio files, text files, videos and data transmissions.

 we proposed a new framework of an image steganography system


to hide a digital text of a secret message.

 Requirement of this steganography system is that the hider message


carried by stego -media should not be sensible to human beings.
PIS : Objectives 4

 To trace the image who leaked it.

 watermarking images for reasons such as copyright protection.

 To Secure transmission of confidential image or sensible data.

 To claim the copyright and be safe from copyright issues.

 To destroy the sensible data or watermarks from the carrier image.


PIS : Terminology 5

 Steganography means hiding one piece of data within another.


 It conceals information by making it unseen

 Cryptography is a technique of writing secret code (cipher).


 It encrypts information by making it unreadable

 Steganalysis is a technique used to discover the existence of


hidden information.
 It is reverse process of steganography
PIS : Scope and Application 6

 Picture is worth of thousands words

Fig: Issues of security ‘ When sharing private image with others’


PIS : Scope and Application 7

Fig: Encoding the secret message with in dummy image

Since Everyone Can Read, Encoding Text


In Neutral Sentences Is Doubtfully Effective

‘Secret inside’
Fig: Hiding the information within text
PIS : Scope and Application 8

 Securely storing sensitive data, such as hiding system


passwords or keys within other files.
 Difficult to detect.
 Network surveillance and monitoring systems will not
flag messages or files that contain Steganography
data.
 Safe Emails
PIS : Proposed Methodology 9

 Agile Methodology
PIS :Use-case diagram 10
4

audience.ask(questions);

No?

Thank You Everyone

Potrebbero piacerti anche