0% found this document useful (0 votes)
6 views12 pages

AI Algoritham

algo AI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views12 pages

AI Algoritham

algo AI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Project Title : Design and Devlopment of Real Time Code Editior

for Web Application


Group No. : 08

Project Mates:
Name Roll No Sign
Bali Donadkar IT21033
Vaishnavi Digraskar ITD21073
Shyam Nimje ITD21072
Samrudhi Salunkey ITD21076

Mini Project Supervisor


Name : Mrs. Ankita Nathe
Sign :
Index

Sr. No. Topic Page No.

1. Aim of the Project 2

2. Introduction 3

3. Literature Survey 4-5

4. Problem statement 6

5. Objective of Project 7

6. Design / Block Diagram 8-9

7. Expected Results and Discussion 10

8. Work Plan 11

9. References 12-13
Aim of the Project

• The aim of this project is to investigate and demonstrate the application of Least
Significant Bit (LSB) Steganography as a method for concealing covert messages by
embedding text within images.
• The focus is on exploring the intricacies of LSB Steganography, understanding its
applications, and evaluating its implications in the context of information security.
• The project aims to highlight the potential of using this technique for secure
communication, emphasizing its ability to hide the very existence of a message within
media, thereby providing an additional layer of confidentiality beyond traditional
cryptographic methods.
• Through a detailed examination, the project aims to contribute to the understanding
and utilization of LSB Steganography as a means to safeguard sensitive data in the
digital realm.
Introduction

In an era dominated by the ubiquitous World Wide Web and stringent copyright laws,
safeguarding information has become a critical concern. While cryptography has traditionally
served as a means to ensure the confidentiality of data, its limitations in protecting both the
content and mere existence of a message have prompted the exploration of alternative
methods. Steganography, a distinct approach from cryptography, involves the concealment of
secret messages within various media, offering a unique perspective by focusing on hiding
the very presence of a message. The synthesis of cryptography and steganography presents a
compelling strategy for enhancing communication security.

This project delves into the realm of steganography, with a specific emphasis on image
steganography. The chosen technique for investigation is the Five Modulus Method (FMM), a
methodical approach to concealing information within images.

By exploring the application of FMM in this context, the project aims to contribute to the
understanding of how combining cryptography and steganography can provide dual-layered
security in communication. Notably, the paper concludes with comprehensive experimental
results and key findings, shedding light on the efficacy of the Five Modulus Method for
discreetly hiding information within images.
Literature survey

2020 ,Gupta, M., & Singh, P.Enhanced Least Significant Bit Steganography Algorithm
for Multimedia Security: the research paper titled "Enhanced Least Significant Bit
Steganography Algorithm for Multimedia Security," authored by Gupta, M., & Singh, P. in
the year 2020, delves into the domain of steganography with a specific emphasis on
multimedia security. Steganography is the practice of concealing information within other
non-secret data, and the Least Significant Bit (LSB) method is a common technique for
embedding data in digital images.In their work, Gupta and Singh identify vulnerabilities
inherent in traditional LSB steganography methods. These vulnerabilities may compromise
the security and robustness of hidden information. To address these issues, the authors
propose an enhanced LSB steganography algorithm. The key objective is to fortify the
security levels associated with concealing data within multimedia content, such as
images.The enhanced algorithm introduced in this paper aims to overcome limitations present
in conventional LSB techniques. By doing so, it seeks to provide a more robust and secure
method for hiding information within multimedia files. The specific enhancements made by
the authors are not explicitly detailed in the provided summary, but they are presumably
designed to improve the algorithm's resistance to detection and ensure the integrity of the
hidden data.
2018 Patel R & Shah, S LSB Steganography: A Comprehensive Review :serves as an
extensive examination of the evolution of Least Significant Bit (LSB) steganography
techniques. Instead of proposing a new algorithm, the authors conduct a thorough review of
existing methods, summarizing both their advancements and limitations. The primary focus
of the paper is to offer insights into the challenges faced by current LSB steganography
approaches.The comprehensive review conducted by Patel and Shah provides a valuable
resource for researchers, practitioners, and enthusiasts in the field of steganography. By
summarizing the progress made in LSB steganography techniques up to the publication date,
the paper aids in understanding the current state of the art. Additionally, the authors highlight
the limitations and challenges associated with existing methods, offering a critical analysis
that can guide future research endeavors.One key contribution of the paper is the
identification of potential areas for further research within the realm of LSB steganography.
By suggesting avenues for improvement and innovation, the authors contribute to the
ongoing evolution of steganographic techniques. This type of review is valuable for shaping
the research agenda in the field, helping researchers focus on addressing specific
shortcomings and pushing the boundaries of what LSB steganography can achieve.In
summary, "LSB Steganography: A Comprehensive Review" by Patel and Shah provides a
comprehensive overview of the historical development of LSB steganography, highlighting
its advancements and limitations. The paper serves as a reference point for understanding the
challenges faced by existing methods and offers valuable guidance for future research
directions in the domain of LSB steganography.
Problem Statement

Following are the Identified Problems statements of Project :

• Design and implement a concealment system using Least Significant Bit (LSB)
Steganography to embed text into images securely.

• Focus on the specific application of concealing textual information within images.

• Address the challenge of preserving both the secrecy of the embedded message and the
covert nature of its existence within the image.

• Leverage advanced steganographic techniques, specifically LSB Steganography, to ensure


accurate and discreet integration of text into images.

• Enhance the accessibility and usability of concealed messaging for secure communication
purposes.

• Develop a versatile text-hiding mechanism capable of accommodating a diverse range of


textual content.

• Implement user-friendly input methods, including text uploads and manipulation, to


facilitate seamless integration of concealed messages into images.
Objective of the Project

The objectives of proposed work are as follows:


• Develop a robust algorithm for embedding text messages within image files using the
Least Significant Bit (LSB) Steganography technique.
• Incorporate the LSB Steganography functionality seamlessly into a messaging
application, allowing users to conceal their text messages within images before
sending them.
• Design an intuitive and user-friendly interface within the messaging application to
enable users, even with minimal technical expertise, to easily utilize the LSB
Steganography feature.
• Provide an additional layer of security for text messages by implementing LSB
Steganography. Ensure that the concealed messages remain confidential even if
intercepted during transmission.
• Prepare comprehensive documentation detailing the functionality, usage, and security
measures of the LSB Steganography feature. Provide clear and concise guidelines for
users to understand and utilize this additional privacy layer.
• Develop educational materials and resources to raise awareness about the importance
of privacy and security in digital communication. Educate users on the benefits and
responsible use of LSB Steganography within the messaging application.
• Design the system to be scalable and optimize its performance to handle a significant
user base while maintaining the security and efficiency of the LSB Steganography
functionality.
Design / Block Diagram

Fig 1 : Workflow Block data diagram


Expected Results & Discussion

Expected Results:
1. The successful implementation of the LSB Steganography technique into the messaging
application, allowing users to seamlessly conceal text messages within images before
transmission. This integration should be user-friendly and accessible to individuals with
varying levels of technical expertise.

2. Improved security and privacy for users employing the LSB Steganography feature. Even
in the event of message interception, the concealed text within images should remain
confidential, thereby adding an extra layer of protection to sensitive communications.

3. Positive feedback from users indicating a high level of satisfaction with the added privacy
and security features. Increased adoption of the LSB Steganography functionality within the
messaging application, reflecting user confidence in the effectiveness and reliability of the
concealed messaging system.

Discussion :

1.Evaluation of the technical effectiveness of the LSB Steganography implementation,


including its ability to successfully embed and extract text messages without compromising
image quality. Discussion on the security measures implemented to protect against
interception and potential vulnerabilities, ensuring the concealed messages remain secure.

2. Analysis of user feedback regarding the user interface and experience of utilizing the LSB
Steganography feature. Discussion on the adoption rate and whether users find the additional
privacy layer valuable for secure communication. Any issues or challenges faced by users
during the adoption process will be considered for further improvement.

3.Examination of the project's adherence to legal and ethical standards, including compliance
with privacy laws and regulations. Discussion on any ethical considerations associated with
the use of LSB Steganography in a messaging application. Steps taken to address legal and
ethical concerns and ensure responsible use of the concealed messaging feature.
Work Plan
Reference
1. Anjali.V, Jeyalakshmi.PR, Anbubala.R “Web Based Placement Management System”,
International Journal of Computer Science and Information Technologies, Vol. 7 (2), 760-
763, 2016.

2. Mulla Kajal, Mahadik Awanti, Pandharpatte Bansod Swapnali, “Online Training and
Placement System” International Research Journal of Engineering and Technology (IRJET),
2016.

3. Rupali Komatwar, Swapnil Kamble, Mihir Khedekar, Kishor Walzade, “Placement Support
System ” International Journal of Advanced Research in Computer and Communication
Engineering, Vol. 5, Issue 1, January 2016 Vol. 5, Issue 1, January 2016.

4. Sanket R. Rahul S. Ghule, Shubham K. Brahmankar, Chavan, “A Survey 0n Android App


for Traning and Placement cell”, IJARIIE-ISSN(O)-2395-4396 , V0l-1 Issue-4 2015

5. G. Kumar, “Training Placement Activities in Context with Industry Institute Interaction”,


International Journal of Emerging Research in Management &Technology ISSN: 2278-9359
(Volume-4, Issue11) 2015.

6. Snehal D. Shriramjwar. Chandure “A study paper on college collaboration portal with


training and Placement” International Journal of Research In Science & Engineering.

7. Hajjar, D., AbouRizk, S. M. (2000). “Integrating Document Management with Project and
Company Data”. Journal of Computing in Civil Engineering, ASCE, 14 (1), pp. 70-77.

8. Casadesús, M., &Karapetrovic, S. (2005). The erosion of ISO 9000 benefits: A temporal
study. International Journal of Quality and Reliability Management, 22(2), 120-136

You might also like