AI Algoritham
AI Algoritham
Project Mates:
Name Roll No Sign
Bali Donadkar IT21033
Vaishnavi Digraskar ITD21073
Shyam Nimje ITD21072
Samrudhi Salunkey ITD21076
2. Introduction 3
4. Problem statement 6
5. Objective of Project 7
8. Work Plan 11
9. References 12-13
Aim of the Project
• The aim of this project is to investigate and demonstrate the application of Least
Significant Bit (LSB) Steganography as a method for concealing covert messages by
embedding text within images.
• The focus is on exploring the intricacies of LSB Steganography, understanding its
applications, and evaluating its implications in the context of information security.
• The project aims to highlight the potential of using this technique for secure
communication, emphasizing its ability to hide the very existence of a message within
media, thereby providing an additional layer of confidentiality beyond traditional
cryptographic methods.
• Through a detailed examination, the project aims to contribute to the understanding
and utilization of LSB Steganography as a means to safeguard sensitive data in the
digital realm.
Introduction
In an era dominated by the ubiquitous World Wide Web and stringent copyright laws,
safeguarding information has become a critical concern. While cryptography has traditionally
served as a means to ensure the confidentiality of data, its limitations in protecting both the
content and mere existence of a message have prompted the exploration of alternative
methods. Steganography, a distinct approach from cryptography, involves the concealment of
secret messages within various media, offering a unique perspective by focusing on hiding
the very presence of a message. The synthesis of cryptography and steganography presents a
compelling strategy for enhancing communication security.
This project delves into the realm of steganography, with a specific emphasis on image
steganography. The chosen technique for investigation is the Five Modulus Method (FMM), a
methodical approach to concealing information within images.
By exploring the application of FMM in this context, the project aims to contribute to the
understanding of how combining cryptography and steganography can provide dual-layered
security in communication. Notably, the paper concludes with comprehensive experimental
results and key findings, shedding light on the efficacy of the Five Modulus Method for
discreetly hiding information within images.
Literature survey
2020 ,Gupta, M., & Singh, P.Enhanced Least Significant Bit Steganography Algorithm
for Multimedia Security: the research paper titled "Enhanced Least Significant Bit
Steganography Algorithm for Multimedia Security," authored by Gupta, M., & Singh, P. in
the year 2020, delves into the domain of steganography with a specific emphasis on
multimedia security. Steganography is the practice of concealing information within other
non-secret data, and the Least Significant Bit (LSB) method is a common technique for
embedding data in digital images.In their work, Gupta and Singh identify vulnerabilities
inherent in traditional LSB steganography methods. These vulnerabilities may compromise
the security and robustness of hidden information. To address these issues, the authors
propose an enhanced LSB steganography algorithm. The key objective is to fortify the
security levels associated with concealing data within multimedia content, such as
images.The enhanced algorithm introduced in this paper aims to overcome limitations present
in conventional LSB techniques. By doing so, it seeks to provide a more robust and secure
method for hiding information within multimedia files. The specific enhancements made by
the authors are not explicitly detailed in the provided summary, but they are presumably
designed to improve the algorithm's resistance to detection and ensure the integrity of the
hidden data.
2018 Patel R & Shah, S LSB Steganography: A Comprehensive Review :serves as an
extensive examination of the evolution of Least Significant Bit (LSB) steganography
techniques. Instead of proposing a new algorithm, the authors conduct a thorough review of
existing methods, summarizing both their advancements and limitations. The primary focus
of the paper is to offer insights into the challenges faced by current LSB steganography
approaches.The comprehensive review conducted by Patel and Shah provides a valuable
resource for researchers, practitioners, and enthusiasts in the field of steganography. By
summarizing the progress made in LSB steganography techniques up to the publication date,
the paper aids in understanding the current state of the art. Additionally, the authors highlight
the limitations and challenges associated with existing methods, offering a critical analysis
that can guide future research endeavors.One key contribution of the paper is the
identification of potential areas for further research within the realm of LSB steganography.
By suggesting avenues for improvement and innovation, the authors contribute to the
ongoing evolution of steganographic techniques. This type of review is valuable for shaping
the research agenda in the field, helping researchers focus on addressing specific
shortcomings and pushing the boundaries of what LSB steganography can achieve.In
summary, "LSB Steganography: A Comprehensive Review" by Patel and Shah provides a
comprehensive overview of the historical development of LSB steganography, highlighting
its advancements and limitations. The paper serves as a reference point for understanding the
challenges faced by existing methods and offers valuable guidance for future research
directions in the domain of LSB steganography.
Problem Statement
• Design and implement a concealment system using Least Significant Bit (LSB)
Steganography to embed text into images securely.
• Address the challenge of preserving both the secrecy of the embedded message and the
covert nature of its existence within the image.
• Enhance the accessibility and usability of concealed messaging for secure communication
purposes.
Expected Results:
1. The successful implementation of the LSB Steganography technique into the messaging
application, allowing users to seamlessly conceal text messages within images before
transmission. This integration should be user-friendly and accessible to individuals with
varying levels of technical expertise.
2. Improved security and privacy for users employing the LSB Steganography feature. Even
in the event of message interception, the concealed text within images should remain
confidential, thereby adding an extra layer of protection to sensitive communications.
3. Positive feedback from users indicating a high level of satisfaction with the added privacy
and security features. Increased adoption of the LSB Steganography functionality within the
messaging application, reflecting user confidence in the effectiveness and reliability of the
concealed messaging system.
Discussion :
2. Analysis of user feedback regarding the user interface and experience of utilizing the LSB
Steganography feature. Discussion on the adoption rate and whether users find the additional
privacy layer valuable for secure communication. Any issues or challenges faced by users
during the adoption process will be considered for further improvement.
3.Examination of the project's adherence to legal and ethical standards, including compliance
with privacy laws and regulations. Discussion on any ethical considerations associated with
the use of LSB Steganography in a messaging application. Steps taken to address legal and
ethical concerns and ensure responsible use of the concealed messaging feature.
Work Plan
Reference
1. Anjali.V, Jeyalakshmi.PR, Anbubala.R “Web Based Placement Management System”,
International Journal of Computer Science and Information Technologies, Vol. 7 (2), 760-
763, 2016.
2. Mulla Kajal, Mahadik Awanti, Pandharpatte Bansod Swapnali, “Online Training and
Placement System” International Research Journal of Engineering and Technology (IRJET),
2016.
3. Rupali Komatwar, Swapnil Kamble, Mihir Khedekar, Kishor Walzade, “Placement Support
System ” International Journal of Advanced Research in Computer and Communication
Engineering, Vol. 5, Issue 1, January 2016 Vol. 5, Issue 1, January 2016.
7. Hajjar, D., AbouRizk, S. M. (2000). “Integrating Document Management with Project and
Company Data”. Journal of Computing in Civil Engineering, ASCE, 14 (1), pp. 70-77.
8. Casadesús, M., &Karapetrovic, S. (2005). The erosion of ISO 9000 benefits: A temporal
study. International Journal of Quality and Reliability Management, 22(2), 120-136