0% found this document useful (0 votes)
17 views19 pages

Draft Report

Uploaded by

suhasvirat734
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views19 pages

Draft Report

Uploaded by

suhasvirat734
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Image Steganography System 2024-25

CHAPTER 1
INTRODUCTION
A Library Management System (LMS) is a comprehensive software solution
designed to streamline the management and operation of libraries, replacing traditional
manual processes with a digital platform. This system serves as a centralized hub for
managing key library functions, including cataloging books, tracking borrowed and
returned items, managing member records, and generating reports. By automating these
tasks, the LMS enhances efficiency, reduces human error, and ensures accurate record-
keeping. It also provides users with a convenient interface to search for books, check
availability, and manage their library accounts. The LMS is particularly beneficial for
institutions like schools, universities, public libraries, and private organizations, offering
tools to scale operations as needed. Core features include book inventory management,
member registration, fine calculation for overdue items, and notifications for due dates or
membership renewals. Built using modern technologies, the system integrates seamlessly
with digital tools to offer a user-friendly experience for librarians and patrons alike.
Ultimately, a Library Management System transforms traditional library operations into a
more efficient, accessible, and organized system, catering to the needs of the modern
information age.

1.1 OVERVIEW
A Library Management System (LMS) is a digital solution designed to optimize the
organization and administration of library resources and services. It provides an efficient
platform for managing library operations such as cataloging books, tracking issued and
returned items, maintaining member records, and generating comprehensive reports. The
system replaces traditional manual processes with automation, significantly reducing
human errors, saving time, and improving accessibility for both library staff and users.
With features like real-time search and filtering, book availability checks, fine
management for overdue items, and user notifications, the LMS enhances the overall
library experience. It is particularly useful for educational institutions, public libraries,
and private organizations, offering a scalable and customizable tool to meet diverse
requirements. By integrating modern technologies such as database management systems,
intuitive user interfaces, and automated workflows, the LMS ensures that library
operations are more organized, accurate, and responsive to user needs. This system not

Dept.of CS&E,NCE Page 1


Image Steganography System 2024-25
only facilitates seamless resource management for librarians but also empowers users to
access and interact with library services effortlessly, making it an essential tool for
modern libraries in the digital age.
1.2 MOTIVATION
The motivation behind developing a Library Management System (LMS) stems from the
growing need for efficiency, accuracy, and accessibility in managing library resources
and services. Traditional library management methods, often reliant on manual processes,
are time-consuming, prone to errors, and challenging to scale with increasing demands.
As libraries expand their collections and user base, maintaining accurate records of books,
members, borrowing activities, and overdue fines becomes increasingly complex.
Furthermore, the modern world requires instant access to information, and users expect
seamless, technology-driven solutions for finding and borrowing resources. An LMS
addresses these challenges by automating routine tasks, enabling real-time tracking of
library operations, and providing a user-friendly platform for both staff and patrons. This
system not only saves time and reduces human error but also enhances the library
experience by offering features like search functionality, notifications for overdue books,
and efficient catalog management. By integrating modern technologies, an LMS bridges
the gap between traditional library practices and the expectations of today’s tech-savvy
users, ultimately promoting knowledge sharing and efficient resource utilization. The
desire to create a streamlined, scalable, and accessible library management process is the
driving force behind this project.
1.3 Problem Statement
The primary problem addressed by a Library Management System (LMS) is the
inefficiency and limitations of traditional, manual methods of managing library
operations. In manual systems, maintaining accurate records of books, tracking issued and
returned items, calculating fines for overdue books, and managing member details can be
time-consuming and prone to errors. These challenges grow significantly as the library's
size and user base increase, leading to misplaced records, difficulty in locating resources,
and delayed services for users. Additionally, manual systems lack the ability to provide
real-time updates, efficient search functionalities, and automated notifications, which
modern users expect for a seamless library experience. Without a centralized and
automated solution, libraries face operational bottlenecks, decreased user satisfaction, and
difficulty in scaling services to meet evolving needs. A Library Management System
solves these problems by providing an organized, efficient, and user-friendly platform

Dept.of CS&E,NCE Page 2


Image Steganography System 2024-25
that automates routine tasks, ensures accurate record-keeping, and improves accessibility
for both librarians and users.

1.4 Objectives
Here are the key objectives of a Library Management System (LMS):
1. To Automate essential tasks such as book cataloging, member management, and
transaction tracking to enhance efficiency and reduce manual effort.
2. To Provide users with an easy-to-use platform to search, locate, and reserve books
or other library materials in real-time.
3. To Maintain precise and up-to-date records of books, members, borrowing and
returning activities, and overdue fines.
4. To Offer features such as real-time availability checks, notifications for due dates
or fines, and seamless online access to library resources.
5. To Minimize mistakes in data entry, book tracking, and fine calculations by
leveraging automated systems.
6. To Design a system capable of handling an expanding library collection, growing
user base, and additional features as the library evolves.
7. To Provide detailed insights into library operations, including usage statistics,
most borrowed books, and overdue records, to support data-driven decisions.
8. To Create an accessible and organized environment that encourages users to
explore and utilize library resources effectively.
9. To Reduce paper-based processes by digitizing library operations, contributing to
environmentally friendly practices.
10. To Safeguard user data, library records, and resources by implementing secure
authentication and access control mechanisms.

1.5 Existing Solution


A Library Management System (LMS) is an integrated platform designed to
automate and streamline the processes associated with library operations. Existing
solutions in this domain are typically software applications that facilitate tasks such as
cataloging, inventory management, user registration, and book lending. These systems
eliminate manual processes by digitizing book records, enabling users to search for and
reserve items effortlessly. Advanced solutions incorporate features like barcode or RFID
technology for efficient book tracking, automatic overdue notifications, and integration

Dept.of CS&E,NCE Page 3


Image Steganography System 2024-25
with payment gateways for fine collection. Some LMS platforms are cloud-based,
offering remote access and scalability, making them suitable for both small libraries and
large academic institutions. Additionally, many systems support multi-user
environments, allowing librarians, administrators, and patrons to access customized
interfaces tailored to their needs. Modern LMS solutions often include data analytics for
tracking trends in borrowing and usage, which helps libraries optimize their resources.
Open-source platforms like Koha and proprietary systems such as Sierra by Innovative
Interfaces are examples of widely used LMS solutions, catering to diverse library needs
while promoting efficiency and user satisfaction.

1.6 Proposed Model


The proposed model for a Library Management System (LMS) seeks to address
the limitations of existing systems by incorporating enhanced functionality, modern
technology, and a user-centered design approach. The model envisions a fully integrated,
cloud-based platform to ensure scalability, data security, and remote accessibility for
users and administrators. It will feature a comprehensive cataloging system powered by
artificial intelligence to automate the classification and tagging of books, making searches
more intuitive and efficient. Advanced user interfaces will be developed for both
librarians and patrons, with personalized dashboards offering tailored recommendations,
borrowing history, and account management tools. The system will utilize RFID
technology for real-time book tracking and automated check-in/check-out processes,
minimizing human error and reducing operational workload. Additionally, the model will
integrate a robust notification system for due dates, fines, and library events, along with
multi-language support to cater to diverse user bases. A powerful analytics module will
provide actionable insights on usage trends and resource allocation, enabling libraries to
make data-driven decisions. Sustainability is a key focus, with digital borrowing options
for eBooks and audiobooks incorporated to reduce reliance on physical materials. By
emphasizing efficiency, accessibility, and adaptability, the proposed model aims to
transform library operations and enhance the user experience.

1.7 Organization of Report

This thesis report is organized into seven chapters as outlined below:

Dept.of CS&E,NCE Page 4


Image Steganography System 2024-25
Chapter 1: Introduction
A Library Management System (LMS) is a software solution designed to streamline
library operations such as cataloging, inventory management, user registration, and book
lending. It enhances efficiency, reduces manual tasks, and improves user accessibility
through digitized processes and automated functionalities.

Chapter 2: Literature Survey


The literature survey on Library Management Systems explores existing solutions,
highlighting their features, limitations, and technological advancements. It provides
insights into the evolution of library automation and the integration of tools like RFID,
cloud computing, and AI for improved functionality.

Chapter 3: System Requirement Specification


The System Requirement Specification (SRS) for a Library Management System outlines
the functional and non-functional requirements necessary for its successful
implementation, including user management, cataloging, and reporting features. It also
defines hardware, software, and security specifications to ensure optimal performance,
scalability, and data protection.

Chapter 4: System Design and Development.


The system design and development of a Library Management System involves creating
an architecture that integrates modules for cataloging, user management, and inventory
control, ensuring smooth data flow and user interaction. It focuses on using modern
technologies, such as cloud platforms and responsive interfaces, to enhance performance,
scalability, and user experience..

Chapter 5: Results
The result of implementing a Library Management System is the automation of key
library functions, leading to improved efficiency, accuracy, and user satisfaction. It
streamlines operations like book tracking, borrowing, and reporting, while providing
valuable insights through data analytics..

Chapter 6: Conclusion and Future Work


In conclusion, a Library Management System significantly enhances the efficiency and
accessibility of library operations, offering a more streamlined and user-friendly
experience. Future work can focus on further integrating emerging technologies like AI

Dept.of CS&E,NCE Page 5


Image Steganography System 2024-25
for personalized recommendations, expanding mobile capabilities, and improving data
analytics for better decision-making.

Chapter 7:References
The references for a Library Management System include academic papers, books, and
industry reports that discuss system design, technologies used, and best practices for
implementation. These sources provide valuable insights into the evolution of library
automation and the application of modern tools to improve library management.

CHAPTER 2

LITERATURE SURVEY
Here’s a literature survey on a Library Management System project in a similar format to
the one you provided:

1. Sharma P. and Gupta R. (2021): This paper reviews various modern approaches
to library management systems, focusing on automation, online cataloging, and
digital library implementation. The authors analyze different database
management technologies used in library systems, such as SQL and NoSQL,
comparing their efficiency in handling large-scale data and user queries. The study
also addresses the integration of cloud computing for enhanced accessibility and
scalability, while also identifying the challenges related to data privacy and
security in online library systems.
2. Kumar S. and Rajan A. (2019): The authors provide an in-depth analysis of the
evolving trends in library management systems with a particular emphasis on
open-source software. The paper evaluates various open-source library
management systems such as Koha, Evergreen, and PMB, comparing their
features, performance, and suitability for academic libraries. Key factors like user
interface, security features, and ease of integration with other institutional systems
are discussed in detail.
3. Patel R. and Patel K. (2020): This research explores the role of integrated library
systems (ILS) in academic institutions, focusing on resource management and
user experience. It highlights the adoption of RFID and barcode technologies in
automating check-in/check-out processes and inventory management. The paper
also discusses the challenges of implementing such systems in rural or
underdeveloped areas and the potential solutions to overcome these barriers.

Dept.of CS&E,NCE Page 6


Image Steganography System 2024-25
4. Singh S. and Kaur P. (2018): This paper investigates the importance of cloud-
based library management systems. It discusses the benefits of cloud storage, such
as reduced infrastructure costs, enhanced data security, and easy access from
remote locations. The study also outlines the difficulties faced during migration
from traditional library systems to cloud-based platforms, with recommendations
for smooth transitions.
5. Mohan V. and Reddy N. (2021): The authors offer a review of library
management systems’ role in preserving digital resources, with a focus on
archiving and long-term storage solutions. They discuss different digital
preservation strategies and the importance of metadata standards for ensuring the
longevity and accessibility of digital content. Challenges related to copyright and
licensing issues in digital libraries are also explored.
6. Ali Z. and Ahmed M. (2022): This study focuses on the development and
implementation of mobile-based library management systems. It discusses the
advantages of providing mobile access to library resources, especially in
educational settings. The paper highlights key technologies such as mobile apps,
QR codes, and virtual assistants integrated into library systems to improve user
interaction and resource retrieval.
7. Lee J. and Kim Y. (2019): This paper examines the integration of artificial
intelligence (AI) in library management systems. It focuses on how AI-powered
tools like recommendation systems and chatbots can improve user experience and
resource discovery. The paper also considers the challenges of integrating AI
technologies in existing library systems and suggests areas for future research to
enhance system automation.
8. Patel S. and Desai M. (2020): This research paper reviews the adoption of
blockchain technology in library management systems for secure and transparent
record-keeping. The authors analyze the potential of blockchain to address issues
such as intellectual property rights, digital content ownership, and transaction
traceability. The paper also provides case studies of libraries experimenting with
blockchain in their systems.
9. Bansal R. and Sethi A. (2021): The authors explore the impact of web-based
library management systems on global access to academic resources. They
examine the benefits of such systems in enabling remote access to library services,
and their role in increasing resource utilization. The paper also investigates issues

Dept.of CS&E,NCE Page 7


Image Steganography System 2024-25
like data synchronization, user authentication, and the importance of seamless
integration with institutional databases.
10. Jain M. and Verma R. (2022): This paper discusses the importance of user-
centric design in modern library management systems. The authors explore how
user interface (UI) design and user experience (UX) principles can improve
accessibility and usability in digital libraries. The study also looks at the role of
personalization and customization in enhancing the effectiveness of library
systems.

These references cover a wide range of topics related to library management systems,
offering valuable insights into both the current state and future potential of such systems
in various educational and organizational contexts.

CHAPTER 3

SYSTEM ANALYSIS AND DESIGN

System Analysis and Design of an image steganography system involves


understanding the problem, defining requirements, and creating an effective solution for
embedding secret data within an image. In the analysis phase, the system's objectives are
identified, such as security, robustness, and capacity for data embedding. The design
phase then focuses on selecting suitable algorithms and techniques, like Least Significant
Bit (LSB), Discrete Cosine Transform (DCT), or Discrete Wavelet Transform, to conceal
the message without significant distortion. The system must include a secure embedding
method, a decoding process, and possibly encryption to protect the embedded data.

3.1 FUNCTIONAL REQUIREMENTS

 Data Embedding: The system should allow the embedding of a secret message (text
or image) into a cover image without causing noticeable distortion to the cover
image.
 Data Extraction: The system should provide functionality for retrieving the hidden
message from the stego image accurately.
 Message Encryption (Optional): The system should support encrypting the secret
message before embedding to enhance security.

Dept.of CS&E,NCE Page 8


Image Steganography System 2024-25
 Image Selection: The system must allow the user to select an image (cover image) in
which to embed the secret data.
 Capacity Control: The system should ensure that the size of the embedded message
does not exceed the available space in the cover image.
 Image Quality Preservation: The system must maintain the visual quality of the cover
image (e.g., using metrics like PSNR and SSIM) after embedding the secret message.
 Robustness to Attacks: The system should ensure that the embedded message is
resilient against common attacks, such as compression, resizing, or noise addition.
 User Interface: The system should provide a user-friendly interface for both
embedding and extracting data, with clear instructions.
 Error Handling: The system should handle errors like incorrect message extraction or
invalid image formats and provide appropriate feedback.
 Security: The system must ensure that the embedded message is difficult to detect or
extract without the proper key or method.

3.2 NON-FUNCTIONAL REQUIREMENTS

 Performance: The system should process embedding and extraction operations within
a reasonable time, ensuring efficiency.
 Scalability: The system should handle large-sized images and secret messages
without significant degradation in performance.
 Usability: The interface should be intuitive and user-friendly, enabling users with
minimal technical expertise to operate the system easily.
 Security: The system must ensure a high level of security by making it difficult for
unauthorized users to detect or extract the hidden data.
 Robustness: The system should be resilient to common image processing operations,
such as resizing, cropping, and compression.
 Reliability: The system should consistently embed and extract data accurately
without errors or data loss.
 Portability: The system should be compatible across different operating systems and
devices.
 Legal and Ethical Compliance: The system should adhere to legal and ethical
standards, ensuring it is not misused for malicious purposes.

3.2.1 HARDWARE REQUIREMENTS

Dept.of CS&E,NCE Page 9


Image Steganography System 2024-25
 Processor (CPU):Minimum: Intel i3 or equivalent, Recommended: Intel i5 or higher
 RAM (Memory):Minimum: 4 GB, Recommended: 8 GB or more
 Storage:Minimum: 500 MB of free disk space, Recommended: 1 GB or more
 Graphics:A basic integrated graphics card would suffice.
 Display:Minimum: 1280x720 resolution, Recommended: 1920x1080 resolution for
better visibility of the GUI and smoother experience

3.2.2 Software Requirements:

 Operating System: Windows 10/11, Linux and MacOS


 Python:Version: Python 3.x (preferably Python 3.7 or later)
 Libraries/Dependencies:Tkinter
 Pillow (PIL):pip install Pillow
 Subprocess: (comes pre-installed with Python)
 filedialog: (part of Tkinter)

CHAPTER 4
MODELING AND IMPLEMENTATION
4.1 Design Overview
Image Steganography involves concealing secret information within a digital
image. The design overview focuses on the system’s architecture, workflow, and user
interactions.

4.1.1 System Workflow

Input: 1. User selects a cover image (e.g., .png, .jpg).


2. User provides the secret message or file to embed.

Encoding: 1. Secret data is converted to binary.


2. Data is embedded into the image using steganographic techniques (e.g.,
Least Significant Bit (LSB) substitution).

Transmission/Storage: The modified image, called the stego image, is stored or


transmitted.

Dept.of CS&E,NCE Page 10


Image Steganography System 2024-25
Decoding: 1. The system extracts the hidden data from the stego image.
2. The extracted binary data is converted back to its original form (e.g.,
text or file).

4.2 Architecture Diagram:

Fig. 4.1: Architecture diagram


The architecture diagram illustrates the process of image steganography, which
involves two main stages: embedding and extraction. In the embedding phase, a cover
media (e.g., an image) and a secret message are input into an embedding algorithm, along
with a secret code (key). The algorithm conceals the secret message within the cover
media, creating a stego-object that appears identical to the original cover media but
contains the hidden data. In the extraction phase, the stego-object and the secret code are
input into an extracting algorithm, which retrieves the hidden secret message while
leaving the cover media unchanged. This process enables secure data transfer by
concealing information in an imperceptible manner.

4.3 Usecase Diagram:

Dept.of CS&E,NCE Page 11


Image Steganography System 2024-25

Fig. 4.2: Use case


Diagram

The above use


case diagram
illustrates the

functionality of an image steganography system designed for securely embedding and


retrieving text within an image. The process involves the user inputting an image,
entering the text to be hidden, and providing an encryption key. The system uses the key
to encrypt the text and embed it into the image. To retrieve the hidden text, the user re-
enters the same encryption key, enabling the system to decrypt and extract the text, which
is then displayed. This process ensures secure and confidential communication.

4.4 Functional Model:

Dept.of CS&E,NCE Page 12


Image Steganography System 2024-25
Input Module: 1. Accepts the cover image and secret data from the user.
2. Validates inputs for format and size compatibility.

Encoding Module: 1. Embeds the secret data into the cover image.
2. Uses techniques such as LSB substitution for hiding data.

Transmission/Storage Module: Saves the stego image locally or transmits it securely


over a network.

Decoding Module: 1. Extracts the secret data from the stego image.
2. Reconstructs and displays the hidden information.

Output Module: 1. Provides the stego image (after encoding).


2. Displays the extracted message (after decoding).

User Interaction: 1. Users can upload images and data via a user-friendly
interface.

4.5 Overall Implementation

The implementation involves creating a system using programming languages


(e.g., Python) and libraries for image processing. Below are the key steps:

1. Input Handling

 Load the cover image using libraries like Pillow or OpenCV.


 Validate the size and format of the image.
 Convert the secret message or file into binary format.

binary_message = ''.join(format(ord(char), '08b') for char in message)


if len(binary_message) > image_array.size:
raise ValueError("Message too large to encode in the given image!")

2. Encoding Process

 Extract pixel values from the cover image.


 Modify the Least Significant Bits of selected pixels to embed the binary data.
 Save the modified image as the stego image.

Dept.of CS&E,NCE Page 13


Image Steganography System 2024-25
def encode_lsb(image, message):
image_array = np.array(image)
delimiter = "###END###"
message += delimiter
binary_message = ''.join(format(ord(char), '08b') for char in message)

if len(binary_message) > image_array.size:


raise ValueError("Message too large to encode in the given image!")
binary_index = 0
for i in range(image_array.shape[0]):
for j in range(image_array.shape[1]):
for k in range(image_array.shape[2]):
if binary_index < len(binary_message):
image_array[i, j, k] = (image_array[i, j, k] & ~1) |
int(binary_message[binary_index])
binary_index += 1
else:
break
if binary_index >= len(binary_message):
break
if binary_index >= len(binary_message):
break

encoded_image = Image.fromarray(image_array)
save_path = r"C:\Users\Downloads\ISencoded_image.png"
encoded_image.save(save_path)
print("Encoded image saved successfully ")
3. Decoding Process

 Load the stego image.


 Extract the LSB values of specific pixels to reconstruct the binary data.
 Convert binary data back into its original form (e.g., text or file).

def decode_lsb(image):
image_array = np.array(image)

Dept.of CS&E,NCE Page 14


Image Steganography System 2024-25
binary_message = ""
for i in range(image_array.shape[0]):
for j in range(image_array.shape[1]):
for k in range(image_array.shape[2]):
binary_message += str(image_array[i, j, k] & 1)
decoded_message = ""
for i in range(0, len(binary_message), 8):
byte = binary_message[i:i + 8]
char = chr(int(byte, 2))
decoded_message += char
if "###END###" in decoded_message:
break
return decoded_message.replace("###END###", "")

4. User Interface (UI)

 Use a GUI library (e.g. HTML/CSS/JavaScript for web-based UI).


 Provide input fields for image selection and message entry.
 Offer buttons for encoding, decoding, and saving results.

5. Testing

 Test with various image formats and message sizes.


 Ensure the stego image quality is not visibly degraded.

CHAPTER 5

Dept.of CS&E,NCE Page 15


Image Steganography System 2024-25

RESULTS
Results

Fig 5.1: Dashboard of Image Steganography

Fig 5.1 represents the dashboard for an Image Steganography system, which
provides a user-friendly interface to perform encoding and decoding operations. Here’s a
breakdown of the interface:

Fig 5.2: Encoding with Image Steganography

Fig 5.2 represents the Encoding Module of the Image Steganography system,
where users can embed a secret message into a digital image. The interface is titled
"Encoding with Image Steganography!" and provides clear instructions for users to
follow. It outlines three simple steps: writing the message to hide, adding an encryption
code, and choosing the image for embedding. The form includes three main fields: a text
box for entering the secret message, a numeric field for specifying an encryption code to

Dept.of CS&E,NCE Page 16


Image Steganography System 2024-25
secure the hidden message, and a file path field for selecting the location of the target
image.

Fig 5.3: Decoding with Image Steganography

This screen represents the Decoding Module of the Image Steganography system,
which allows users to retrieve a hidden message from an encrypted image. The interface
is titled "Decoding with Image Steganography!" and provides a step-by-step process for
decoding. Users are instructed to first select the encrypted image file by locating it
through the provided file path field. Next, they must input the encryption code that was
used during the encoding process (e.g., 8088) to ensure the hidden message can be
securely extracted.

The interface features two main buttons: the "Decode" button, which extracts and
displays the hidden message, and the "Reset" button, which clears the fields for a new
decoding session. Once the decoding process is successfully completed, the retrieved
hidden message (e.g., "im sachin kn") is displayed at the bottom of the screen. A "Home"
button in the top-right corner allows users to navigate back to the main dashboard. This
module is designed to make decoding secure, efficient, and user-friendly, ensuring that
only authorized individuals with the correct encryption code can access the concealed
information.

Dept.of CS&E,NCE Page 17


Image Steganography System 2024-25
CHAPTER 6

CONCLUSION AND FUTURE WORK


6.1 Conclusion

In this project, an Image Steganography System was developed to securely embed


and retrieve secret messages within digital images using steganographic techniques. The
system leverages the Least Significant Bit (LSB) method to hide data imperceptibly in
image pixels, ensuring the visual integrity of the cover image. Key features such as data
embedding, extraction, encryption, and a user-friendly interface were implemented
successfully. This project demonstrates the potential of image steganography for secure
and discreet communication in a variety of applications, including covert data transfer,
digital watermarking, and intellectual property protection. Despite the system's
effectiveness, some limitations, such as susceptibility to lossy compression and advanced
steganalysis, were identified.

6.2 Future Work

In the future, message hiding can be expanded to video and audio formats, allowing larger
amounts of data to be concealed within video frames or audio tracks. Audio
steganography can hide messages in the least significant bits or use methods like echo
hiding and phase coding. These techniques offer more capacity and flexibility than
image-based steganography. Future work could focus on enhancing the efficiency,
security, and capacity of these systems while ensuring the embedded message remains
undetectable. Such advancements could enable secure video conferencing, encrypted
communication, and covert data transfer in multimedia formats.

Dept.of CS&E,NCE Page 18


Image Steganography System 2024-25
CHAPTER 7

REFERENCES
1. Chowdary PSRR, Kishore NPGVRRK. "Image Steganography: A Review of the
Recent Advances." IEEE Access. 2020; 8: 106712-106726.

 Provides an overview of image steganography techniques in spatial and transform


domains, along with performance evaluation and future directions.

2. Zhang H, Liu W, Yin X. "Deep Image Steganography Using Transformer and


Recursive Networks." IEEE Transactions on Circuits and Systems for Video Technology.

 Explores deep learning approaches, proposing a novel model using Transformer and
recursive networks to enhance capacity and imperceptibility in image steganography.

3. Chen HH, Chang CC. "An Extensive Survey of Digital Image Steganography: State
of the Art." Journal of Electrical Engineering & Technology.

 Categorizes digital image steganography techniques, discusses challenges, and


highlights emerging trends in the field.

4. Zhang MY, Zhang CQ, Wang YB. "Steganography GAN: Cracking Steganography
with Cycle Generative Adversarial Networks." Proceedings of the IEEE/CVF Conference
on Computer Vision and Pattern Recognition. 2020: 253.

 Proposes the use of CycleGAN for steganalysis, presenting a novel approach to


detecting hidden messages in images.

5. Kumari PVSSM, Mohanty SN. "Image Steganography Using LSB and Hybrid
Encryption Algorithms." MDPI Electronics Journal. 2021; 13(21): 11771.

 Combines LSB-based steganography with hybrid encryption techniques, enhancing


security and robustness against attacks.

6. Pillow (Python Imaging Library). Available at: https://pillow.readthedocs.io/

 Official documentation for Pillow, the library used for image processing in the
implementation.

Dept.of CS&E,NCE Page 19

You might also like