Image Steganography (3 Way Encryption)

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 5

Image Steganography (3 Way Encryption)

Steganography is the technique of hiding private or sensitive


information within something that appears to be nothing be
a usual image.
Steganography involves hiding Text so it appears that to be a
normal image or other file.
If a person views that object which has hidden information
inside, he or she will have no idea that there is any secret
information.
What steganography essentially does is exploit human
perception, human senses are not trained to look for files
that have information inside of them.
What this system does is, it lets user to send text as secrete
message inside an image file, user uploads the image and
enters the text to send secretly, and gives a key or a pass
word to lock the text, what this key does is it encrypts the
text, so that even if it is hacked by hacker he will not be able
to read the text.
You will need the key to decrypt the hidden text.
User then sends the image and key to the receiver and
receiver first opens the image, and then he enters the key or
password for decryption of text, he then press decrypt key to
get secret text of the sender.
By using this method you can double ensure that your secret
message is sent secretly without outside interference of
hackers or crackers.

If sender sends this image in public others will not know


what is it, and it will be received by receiver.

This system comprises of 4 Modules:

Description:
1. Registration:
- To access the core system, user first need to register
themselves by providing required details.
2. Login:
- After registration, user may login into the system.
3. Algorithm Selection:
- Here, user will select the algorithm such as DES (Data
Encryption Standard), AES (Advance Encryption Standard)
or LSB (Least Significant Bit) for encrypting data into
image file.
4. Image Selection:
Here, User selects an image for sending a secret
message.
5. Entering Text:
Here, User enter/inputs the text that is to be hidden in
the image.
6. Setting Password and Encrypting the Data:
User sets a password and use the encryption technique
to encrypt the data.
7. Sharing:
After hiding the text with the encryption technique, user
saves the image a then sends it to the other party i.e.
Receiver.

Hardware Requirement:

Dual Core Processor Based Computer


1GB RAM
50 GB Hard Disk Space
Monitor

Software Requirement:

Windows 7 or higher
Visual studio 2010
SQL Server 2008

Advantages

Fast and easy way of to send secure stuff.


Easy process to encrypt text on image.
Can be added on any image, so that it is like other images
only.

Disadvantages:
Password have to be shared which can be hacked and used.
Only small length of text can be sent like hardly 2-3 lines.
Have to manually send the image to receiver.

Application:
This system can be used by everyone who wants send some
confidential text to someone. Image can be shared by any easy
mean like email, watsapp, etc.

You might also like