0% found this document useful (0 votes)
32 views4 pages

Steganography Image Project Proposal

Uploaded by

ddol36899
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views4 pages

Steganography Image Project Proposal

Uploaded by

ddol36899
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Project Proposal

Project Name:

Image Steganography - Hide information within image file - C#

Abstract:

Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the internet.

One of the reasons that intruders can be successful is the most of the information they
acquire from a system is in a form that they can read and comprehend. Intruders may reveal the
information to others, modify it to misrepresent an individual or organization, or use it to launch an
attack. One solution to this problem is, through the use of steganography. Steganography is a
technique of hiding information in digital media. In contrast to cryptography, it is not to keep others
from knowing the hidden information but it is to keep others from thinking that the information
even exists.

Steganography become more important as more people join the cyberspace revolution.
Steganography is the art of concealing information in ways that prevents the detection of hidden
messages. Steganography include an array of secret communication methods that hide the message
from being seen or discovered.

Due to advances in ICT, most of information is kept electronically. Consequently, the security
of information has become a fundamental issue. Besides cryptography, steganography can be
employed to secure information. In cryptography, the message or encrypted message is embedded
in a digital host before passing it through the network, thus the existence of the message is
unknown. Besides hiding data for confidentiality, this approach of information hiding can be
extended to copyright protection for digital media: audio, video and images..

The growing possibilities of modern communications need the special means of security
especially on computer network. The network security is becoming more important as the number
of data being exchanged on the internet increases. Therefore, the confidentiality and data integrity
are requires to protect against unauthorized access and use. This has resulted in an explosive
growth of the field of information hiding.

Software Requirements:

 C#
 VS 2005 / 2008 and heigher

Hardware Requirements:

To buy complete ready to submit synopsis, project report, source code, and data base
script.
Please contact R. M. Solution.  +91-9920329254,  +91-22-28550428,
 : [email protected] or [email protected]
 www.readymadeproject.com
Processor: Preferably 3.0 GHz or
Greater. RAM : 1 GB or Greater.

Limitations of the Software:

This project was developed to fulfill user requirement; however there are lots of scope to
improve the performance of the Steganography for hiding data in image files System in the area of
user interface, database performance, and query processing time. Etc.

Future Enhancements:

 Support more audio file format like mp3, mpg4 etc.

Project Details:

 No of Form, Pages, Reports in project source : 2


 No of database tables : NA
 No of pages in project report : 80

Project Demo:

https://youtu.be/0rq5Uk1U2oM

For buy this project:

https://readymadeproject.com/FullProjectDetail?id=90 https://readymadeproject.com/QuickPay?

id=90&type=cs

Project Report TOC:

Page
Topic / Contents No.
Abstract 3
Introduction 5
Context and Preliminary Investigation 6
Literature Review 10
Analysis 39
Design 42
Implementation 46
Testing 57

To buy complete ready to submit synopsis, project report, source code, and data base
script.
Please contact R. M. Solution.  +91-9920329254,  +91-22-28550428,
 : [email protected] or [email protected]
 www.readymadeproject.com
Critical Evaluation 67
Future Enhancement and Conclusion 71
References 72
Appendices 73

https://readymadeproject.com/FullProjectDetail?id=90

To buy complete ready to submit synopsis, project report, source code, and data base
script.
Please contact R. M. Solution.  +91-9920329254,  +91-22-28550428,
 : [email protected] or [email protected]
 www.readymadeproject.com
** There will be no watermark on project **

To buy complete ready to submit synopsis, project report, source code, and data base
script.
Please contact R. M. Solution.  +91-9920329254,  +91-22-28550428,
 : [email protected] or [email protected]
 www.readymadeproject.com

You might also like