Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
TY. B. Tech.
Assignment No: 1
Steganography Binder
VERSION 0.1
1 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering
Table of Contents
2 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering
1. TITLE
1.1. Steganography is a special method of writing hidden messages in such a way that no one apart
from the sender and the receiver can even realize that there is a hidden message.
1.2. The levels of security provided to the users is increased by encrypting the messages to be
embedded.
1.3. Encrypt the entered message using the polyalphabetic substitution algorithm developed, with
the key entered by the user.
1.4. Images are composed of digital data (pixels), which describes what’s inside the picture, usually
the colors of all the pixels. Since we know every image is made up of pixels and every pixel
contains 3-values (red, green, blue).
1.5. The purpose of this work is to implement Image Steganography on any format of image files for
Android devices.advance.
2. BACKGROUND
If you were to use steganography in the same situation, you would hide the letter inside a pair of socks
that you would be gifting the intended recipient of the letter. To those who don’t know about the
message, it would look like there was nothing more to your gift than the socks. But the intended
recipient knows what to look for, and finds the message hidden in them.
Similarly, if two users exchanged media files over the internet, it would be more difficult to determine
whether these files contain hidden messages, than if they were communicating using cryptography.
2.1. Steganography is closely related to the problem of “hidden channels” secure operating system
design, a term which refers to all communication paths that cannot easily be restricted by
access control mechanisms.
2.2. Steganographic technologies are a very important part of the future of Internet security and
privacy on open systems such as the Internet.
2.3. Steganography can be used to hide important data inside another file so that only the parties
intended to get the message even knows a secret message exists.
2.4. Steganography is the practice of concealing a file, message, image within another file, message,
image.
2.5. Steganography includes the concealment of information within computer files.
2.6. In digital steganography, electronic communications may include steganographic coding inside
of a transport layer, such as a document file, image file, program or protocol.
3 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering
2.7. The growing use of the Internet has led to a continuous increase in the amount of data that is
being exchanged and storage in various digital media. This has led to some unexpected cases
involving both benevolent and malevolent usage of digital data. Security and authentication
techniques like steganographic methods and other data embedding algorithms have
contributed much to enhance the various security features and to preserve the intellectual
property.
2.8. In this respect, steganographic techniques have been the most successful in supporting hiding
of critical information in ways that prevent the detection of hidden messages. While
cryptography scrambles the message so that it cannot be understood, steganography hides the
data so that it cannot be observed.
3. OBJECTIVE
The Software helps the users to hide thier messages with an undecodeable format which increase
the security of the data.The Motive of the software is to hide the existence of communication.
3.1. Requirement of this Steganography system is that the hider message carried by stego-media
should not be sensible to human beings.
3.2. The other goals of steganography is to avoid drawing suspicion to the existence of a hidden
message.
3.3. This approach of information hiding technique has recently became important in a number of
applocation areas.
3.4. To perform steganography for keeping it in secrete pattern.
4 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering
4.3. Encryption –
In cryptography, encryption is the process of encoding a message or information in such a way
that only authorized parties can access it and those who are not authorized cannot. Encryption
does not itself prevent interference but denies the intelligible content to a would-be
interceptor. In an encryption scheme, the intended information or message, referred to as
plaintext, is encrypted using an encryption algorithm–a cipher–generating ciphertext that can
be read-only if decrypted.
4.4. Encoding -
Encoding is the process of converting data from one form to another. While "encoding" can be
used as a verb, it is often used as a noun, and refers to a specific type of encoded data. There
are several types of encoding, including image encoding, audio and video encoding, and
character encoding
4.5. Decoding –
Decoding is the process of translating print into speech by rapidly matching a letter or
combination of letters (graphemes) to their sounds (phonemes) and recognizing the patterns
that make syllables and words. There is an area in the brain that deals with language processing
and does this process automatically.
4.6. Steganography –
Steganography is a method of hiding secret data, by embedding it into an audio, video, image or
text file. It is one of the methods employed to protect secret or sensitive data from malicious
attacks.
5 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering
Android Studio is the official Integrated Development Environment (IDE) for Android app development,
based on IntelliJ IDEA.
6 2019-20-S-II
VISHWAKARMA INSTITUTE OF TECHNOLOGY, PUNE-37
Department of Computer engineering
7. DELIVERABLES
The system is in the initial stage of development and some of the deliverables may vary as the system
continues to develop into a product. Amongst the contract deliverables are the core concepts of the
project which will not change in any case. The system will stay true to its vision and the only changes
may be seen are the ones in the User Interface.
These are some of the deliverables that team can outline at this stage of development. Each stage has
its own challenges and will be given apt importance by the contractor.
No. Details
1 Statement of Work
2 Feature Set
3 SRS Document
4 Feasibility Study and Project Plan using AGILE
5 Sprint level planning activity
6 Sprint Plan and Sprint Design
7 Software Configuration Management Plan (SCMP)
8 Sprint Execution
9 Sprint Review and Sign- offs
8.1. The project working will begin with the suitable planning of the software documentary.
8.2. In the meantime, using different sources of information like Wikipedia ,Documentation of the
Libraries, Youtube, geeks for geeks ,etc.
8.3. The major part is encoding and decoding of the image , So different suitable algorithms will be
studied, checked and the best will be used .
8.4. The project will follow the agile model and all the necessary steps will be taken as per the
organization standards.
8.5. A Software Configuration Management Plan (SCMP) will be presented to ensure consistency of
the product’s performance, functional and physical attributes with its requirements and
operational information throughout its life.
8.6. The software will be reviewed and tested by the target organization based on which this
software has been created , feedbacks will be taken by them.
8.7. Upon resolving all the issues and bugs in the program, a final and formal sign-off will be
undertaken.
7 2019-20-S-II