Private Image Security: Nepal College of Information Technology

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Private Image Security (PIS)

Department of Software Engineering Submitted by:


Sanjaya Adhikari,14731
Nepal College of Information Technology Mithun Adhikari, 14748
Balkumari, Lalitpur, Nepal
Table of Content
 PIS: Introduction
 Problem Statement
 Significance of Study
 Objectives
 Terminology
 Scope and Application
 Proposed Methodology
 Use Case Diagram
PIS : Introduction 1

 In today’s context, Security of confidential data is most important.

 Cross platform (Android/ iOS ) based image processing Application.

 It’s a platform which Provides security of confidential (private)


Image

 Also a platform for the transmission of sensible data within some


dummy image

What we get? – image within image


PIS : Problem Statement 2

 Nowadays, People are sharing Private image. They face problem of


getting leak . How to know From where and who leaked it?

 How can we send a message secretly to the destination ?

 How can we cover a message secretly to the image?


PIS : Significance of Study 3

 The study of this project finds the solution of the problem arise
previously

 Using steganography, information can be hidden in carriers such as


images, audio files, text files, videos and data transmissions.

 we proposed a new framework of an image steganography system


to hide a digital text of a secret message.

 Requirement of this steganography system is that the hider message


carried by stego -media should not be sensible to human beings.
PIS : Objectives 4

 To trace the image who leaked it.

 watermarking images for reasons such as copyright protection.

 To Secure transmission of confidential image or sensible data.

 To claim the copyright and be safe from copyright issues.

 To destroy the sensible data or watermarks from the carrier image.


PIS : Terminology 5

 Steganography means hiding one piece of data within another.


 It conceals information by making it unseen

 Cryptography is a technique of writing secret code (cipher).


 It encrypts information by making it unreadable

 Steganalysis is a technique used to discover the existence of


hidden information.
 It is reverse process of steganography
PIS : Scope and Application 6

 Picture is worth of thousands words

Fig: Issues of security ‘ When sharing private image with others’


PIS : Scope and Application 7

Fig: Encoding the secret message with in dummy image

Since Everyone Can Read, Encoding Text


In Neutral Sentences Is Doubtfully Effective

‘Secret inside’
Fig: Hiding the information within text
PIS : Scope and Application 8

 Securely storing sensitive data, such as hiding system


passwords or keys within other files.
 Difficult to detect.
 Network surveillance and monitoring systems will not
flag messages or files that contain Steganography
data.
 Safe Emails
PIS : Proposed Methodology 9

 Agile Methodology
PIS :Use-case diagram 10
4

audience.ask(questions);

No?

Thank You Everyone

You might also like