Steganography Synopsis Final
Steganography Synopsis Final
ON
DIGITAL STEGANOGRAPHY
Submitted by
MUSKAN KUMARI
SNEHA RANI
KAJAL KUMARI
NAYANSHI KUMARI
HIMANSHU KUMAR TIWARI
Synopsis
Submitted to
Dumka Engineering College
in partial fulfilment
for the award of the degree of
BACHELOR OF TECHNOLOGY
In the department of
Computer Science & Engineering
March 2024
Certified that this synopsis titled “DIGITAL STEGANOGRAPHY” is the bonafide work of
“SNEHA RANI (20040440034)” who carried out the project work under my supervision.
Certified further, that to the best of my knowledge the work synopsis here in does not from any
other synopsis or dissertation on the basis of which a degree or award was conferred on an
earlier occasion on this or any other candidate.
Signature Signature
I declare that this written submission represents my ideas in my own words and where others'
ideas or words have been included, I have adequately cited and referenced the original sources.
I also declare that I have adhered to all principles of academic honesty and integrity and have
not misrepresented or fabricated or falsified any idea/data/fact/source in my submission. I
understand that any violation of the above will be cause for disciplinary action by the Institute
and can also evoke penal action from the sources which have thus not been properly cited or
from whom proper permission has not been taken when needed.
……………………………………
I would like to express my deepest gratitude to my guide, Mrs. Sunidhi Priyadarshini her
valuable guidance, consistent encouragement, personal caring, timely help and providing me
with an excellent atmosphere for doing the project. All through the work, in spite of her busy
schedule, she has extended cheerful and coordinal support to me for completing this project
work.
……………………………….........
Name and Signature of the Students
TABLE OF CONTENTS
CERTIFICATE I
DECLARATION II
ACKNOWLEDGEMENT III
CHAPTER 1: INTRODUCTION
1.1 PURPOSE 1
1.2 OBJECTIVE & SCOPE 2
CHAPTER 5: SNAPSHOTS
CHAPTER 7: REFERENCES
7.1 REFERENCES
16
LIST OF FIGURES
With the advancement of today's science and technology, we can’t keep our data and
information safe anymore with the help of only encryption. That’s a big reason why
steganography was introduced.
The main reason to learn and execute steganography is to hide data and information as well as
communication. The main focus of steganography is to make our data unreadable and
undetectable to an unauthorized user. Steganography provides an additional step that can be
used in conjunction with encryption in order to conceal or protect data.
This project humbly believes that, steganography decently brings privacy and hide the
existence of secret message.
1
OBJECTIVE AND SCOPE
Steganography can be used for both constructive and destructive purposes. For example,
education, business institutions, intelligence agencies, etc. The key objectives of steganography
include secrecy of communication, invisibility, it often referred to as attackers or steganalysts,
to discover the presence of hidden data and ensuring that this method of hiding information is
very secure.
The scope of steganography is to add extra layer of security during communication by hiding
messages within images, audio files and other carriers and to prevent unauthorized copying, or
prove authenticity. This technique enhances security measures.
2
TOOLS AND TECHNOLOGY USED
TOOL: -
1. VS Code: -
Visual Studio Code is a source-code editor made by Microsoft for Windows, Linux
and macOS. Features include support for debugging, syntax highlighting, intelligent
code completion, snippets, code refactoring, and embedded Git. Users can change
the theme, keyboard shortcuts, preferences, and install extensions that add
additional functionality.
Visual Studio Code is a source-code editor that can be used with a variety of
programming languages, including Java, JavaScript, Go, Node.js, Python and C++.
It is based on the Electron framework, which is used to develop Node.js Web
applications that run on the Blink layout engine. Visual Studio Code employs the
same editor component used in Azure DevOps (formerly called Visual Studio
Online and Visual Studio Team Services) [1].
TECHNLOGIES: -
1. HTML: -
Hypertext Markup language (HTML) is the standard markup language for
documents designed to be displayed in web browser. It can be assisted by
technological such as Cascading Style Sheet (CSS) and scripting language such as
JavaScript.
Web browsers receive HTML documents from web server or from local storage and
render the documents into multimedia web pages. HTML describes the structure of
a web page semantically and originally included cues for the appearance of the
document [2].
2. CSS: -
Cascading Style Sheet (CSS) is a style sheet language used for describing the
presentation of a document written in a markup language such as HTML. CSS is a
cornerstone technology of the World Wide Web, alongside HTML and JavaScript.
3
CSS is designed to enable the separation of presentation and content, including
layout, colors, and fonts. This separation can improve content accessibility, provide
more flexibility and control in the specification of presentation characteristics,
enable multiple web pages to share formatting by specifying the relevant CSS in a
separate CSS file which reduces complexity and repetition in the structural content
as well as enabling the CSS file to be cached to improve the page load speed
between the pages that share the file and its formatting [3].
3. JAVA SCRIPT: -
JavaScript often abbreviated as JS, is a programming language that conforms to the
ECMA Script specification. JavaScript is high-level, often just-in-time compiled,
and multi-paradigm. It has curly-bracket syntax, dynamic typing, prototype-based
object- orientation, and first-class functions.
Alongside HTML and CSS, JavaScript is one of the core technologies of the World
Wide Web. JavaScript enables interactive web pages and is an essential part of web
applications. The vast majority of websites use it for client-side page behaviour, and
all major web browsers have a dedicated JavaScript engine to execute it [4].
4. PYTHON: -
Python is a popular programming language known for its readability and versatility.
It is widely used in web development, data analysis, artificial intelligence, scientific
computing, and more. Python's syntax is designed to be clear and concise, making
it easy to learn for beginners and enjoyable to use for experienced developers.
Python is an interpreted language, which means that code is executed line by line
by the Python interpreter. Python's dynamic typing and automatic memory
management help simplify coding tasks and make it a great choice for a wide range
of applications [5].
4
HARDWARE AND SOFTWARE REQUIREMENT
HARDWARE REQUIREMENTS: -
1. Processor – i3
2. Hard Disk – 4GB
3. Memory – 1GB RAM
4. Internet Connection
SOFTWARE REQUIREMENTS: -
1. Windows 7 or higher
2. Browser (Google Chrome | Microsoft Edge)
5
DATA FLOW DIAGRAM
The 0-level DFD explains or gives very basic information about the software that is created. It
provides the ideas of a single process and some entities that are involved.
Process –
1. Steganography
Entity –
1. User
2. Admin
6
3.2 1-Level DFD:
In Level 1 DFD have detail description of the main process with combination of required
database and entities with proper data flow.
Process –
1. Login
2. Encode
3. Decode
4. Download 7
Entity –
1. User
2. Admin
Database –
Login process:
8
Encode Process:
In Level-2 DFD the process explained in level -1 are explained in more detail and depth.
Process –
1. Login
1.1 Sign up
1.2 Login
2. Encode
2.1 Download
Entity –
1. User
2. Admin
Database –
9
IMPLEMENTATION AND MODIFICATION
1. Spatial Method
2. Transform Method
Among this two this work uses spatial method. In spatial method LSB (Least Significant Bit)
substitution method is used it is a common simple approach used to embedding information in
a cover file. It converts the image bit in pixel and the text in binary format and alter the LSB
bit to embed the text in image and provide stego image which consist of hidden message.
In this, all pixels from the given image are stored in array format, where each pixel contains
information about its color or grayscale value (RGB).
All the binary bit from the given text file is extracted and stored in array format.
In this, place character of message array in each component of image array by replacing its
LSB bit.
10
and the image obtained after replacing all the bits will give us a stego image in which the
secret message is hidden inside the image.
11
SNAPSHOTS
12
Step 1 Step 2
Step 3
13
FUTURE ENHANCEMENT
As technology advances, this field will likely continue to evolve with new methods, challenges
and applications and in the upcoming future some fields where the goal of this work will be to
implement steganography techniques in different fields like:
14
CONCLUSION
In conclusion, the use of steganography can be beneficial as it offers a way to secure data and
communication covertly. It can provide an extra layer of security by hiding the existence of
sensitive and useful information in military and other secretive operations. It can also be used
for embedding invisible watermarks to protect intellectual property by hiding messages within
innocent-looking files.
15
REFERENCE
[1] https://en.wikipedia.org/wiki/Visual_Studio_Code
[2] https://en.wikipedia.org/wiki/HTML
[3] https://en.wikipedia.org/wiki/CSS
[4] https://en.wikipedia.org/wiki/JavaScript
[5] https://www.python.org/doc/essays/blurb/
[6] https://staruml.io/
[7] Al-Ani, Z. Kh., Zaidan, A. A., Zaidan, B. B., Alanazi, H. O., Overview: Main
16