0% found this document useful (0 votes)
13 views22 pages

Steganography Synopsis Final

The document is a synopsis on Digital Steganography submitted by students for their Bachelor of Technology degree in Computer Science & Engineering. It outlines the purpose, objectives, tools, and methodologies used in the project, emphasizing the significance of steganography in securing data by hiding information within other files. The document also includes details on implementation, future enhancements, and concludes with the potential applications of steganography in various fields.

Uploaded by

officialravi7978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views22 pages

Steganography Synopsis Final

The document is a synopsis on Digital Steganography submitted by students for their Bachelor of Technology degree in Computer Science & Engineering. It outlines the purpose, objectives, tools, and methodologies used in the project, emphasizing the significance of steganography in securing data by hiding information within other files. The document also includes details on implementation, future enhancements, and concludes with the potential applications of steganography in various fields.

Uploaded by

officialravi7978
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

SYNOPSIS

ON
DIGITAL STEGANOGRAPHY
Submitted by

MUSKAN KUMARI
SNEHA RANI
KAJAL KUMARI
NAYANSHI KUMARI
HIMANSHU KUMAR TIWARI

Under the guidance of


Mrs. Sunidhi Priyadarshini
Department of Computer Science & Engineering

Techno India, Polytechnic Compound, Dumka, Jharkhand 814101

Synopsis
Submitted to
Dumka Engineering College
in partial fulfilment
for the award of the degree of
BACHELOR OF TECHNOLOGY
In the department of
Computer Science & Engineering
March 2024

Jharkhand University of Technology, Ranchi


DUMKA ENGINEERING COLLEGE

(Estd. by govt. of Jharkhand & run by Techno India under ppp)

Techno India, polytechnic compound road, Dumka, Jharkhand 814101

CERTIFICATE OF THE SUPERVISOR

Certified that this synopsis titled “DIGITAL STEGANOGRAPHY” is the bonafide work of
“SNEHA RANI (20040440034)” who carried out the project work under my supervision.
Certified further, that to the best of my knowledge the work synopsis here in does not from any
other synopsis or dissertation on the basis of which a degree or award was conferred on an
earlier occasion on this or any other candidate.

Signature Signature

MRS. SUNIDHI PRIYADARSHINI MR. RANADEEP DEY

Assistant Professor Head of the Department

Computer Science & Engineering Computer Science & Engineering


DECLARATION

I declare that this written submission represents my ideas in my own words and where others'
ideas or words have been included, I have adequately cited and referenced the original sources.
I also declare that I have adhered to all principles of academic honesty and integrity and have
not misrepresented or fabricated or falsified any idea/data/fact/source in my submission. I
understand that any violation of the above will be cause for disciplinary action by the Institute
and can also evoke penal action from the sources which have thus not been properly cited or
from whom proper permission has not been taken when needed.

……………………………………

Name and Signature of the Student


ACKNOWLEDGEMENT

I would like to express my deepest gratitude to my guide, Mrs. Sunidhi Priyadarshini her
valuable guidance, consistent encouragement, personal caring, timely help and providing me
with an excellent atmosphere for doing the project. All through the work, in spite of her busy
schedule, she has extended cheerful and coordinal support to me for completing this project
work.

……………………………….........
Name and Signature of the Students
TABLE OF CONTENTS

CERTIFICATE I
DECLARATION II
ACKNOWLEDGEMENT III

CHAPTER 1: INTRODUCTION

1.1 PURPOSE 1
1.2 OBJECTIVE & SCOPE 2

CHAPTER 2: WORKING APPROACH FOR PROJECT

2.1 TOOLS & TECHNOLOGY USED 3-4


2.2 HARDWARE AND SOFTWARE REQUIREMENTS 5

CHAPTER 3: DATA FLOW DIAGRAM

3.1 0-LEVEL DFD 6


3.2 1-LEVEL DFD 7
3.3 2-LEVEL DFD 8-9

CHAPTER 4: IMPLEMENTATION & MODIFICATION

4.1 IMPLEMENTATION & MODIFICATION 10-11

CHAPTER 5: SNAPSHOTS

5.1 SNAPSHOTS 12-13

CHAPTER 6: FUTURE ENHANCEMENT & CONCLUSION

6.1 FUTURE ENHANCEMENT 14


6.2 CONCLUSION 15

CHAPTER 7: REFERENCES

7.1 REFERENCES
16
LIST OF FIGURES

FIGURE NO. FIGURE NAME PAGE NO.

FIGURE 3.1 0-Level DFD 6


FIGURE 3.2 1-Level DFD 7
FIGURE 3.3.1 Login Process 8
FIGURE 3.3.2 Encode Process 9
FIGURE 5.1 Login Page 12
FIGURE 5.2 Signup Page 12
FIGURE 5.3 Encoding of an image 13
PURPOSE

With the advancement of today's science and technology, we can’t keep our data and
information safe anymore with the help of only encryption. That’s a big reason why
steganography was introduced.

The main reason to learn and execute steganography is to hide data and information as well as
communication. The main focus of steganography is to make our data unreadable and
undetectable to an unauthorized user. Steganography provides an additional step that can be
used in conjunction with encryption in order to conceal or protect data.

This project humbly believes that, steganography decently brings privacy and hide the
existence of secret message.

1
OBJECTIVE AND SCOPE

Steganography can be used for both constructive and destructive purposes. For example,
education, business institutions, intelligence agencies, etc. The key objectives of steganography
include secrecy of communication, invisibility, it often referred to as attackers or steganalysts,
to discover the presence of hidden data and ensuring that this method of hiding information is
very secure.

The scope of steganography is to add extra layer of security during communication by hiding
messages within images, audio files and other carriers and to prevent unauthorized copying, or
prove authenticity. This technique enhances security measures.

2
TOOLS AND TECHNOLOGY USED

TOOL: -

1. VS Code: -
Visual Studio Code is a source-code editor made by Microsoft for Windows, Linux
and macOS. Features include support for debugging, syntax highlighting, intelligent
code completion, snippets, code refactoring, and embedded Git. Users can change
the theme, keyboard shortcuts, preferences, and install extensions that add
additional functionality.

Visual Studio Code is a source-code editor that can be used with a variety of
programming languages, including Java, JavaScript, Go, Node.js, Python and C++.
It is based on the Electron framework, which is used to develop Node.js Web
applications that run on the Blink layout engine. Visual Studio Code employs the
same editor component used in Azure DevOps (formerly called Visual Studio
Online and Visual Studio Team Services) [1].

TECHNLOGIES: -

1. HTML: -
Hypertext Markup language (HTML) is the standard markup language for
documents designed to be displayed in web browser. It can be assisted by
technological such as Cascading Style Sheet (CSS) and scripting language such as
JavaScript.

Web browsers receive HTML documents from web server or from local storage and
render the documents into multimedia web pages. HTML describes the structure of
a web page semantically and originally included cues for the appearance of the
document [2].
2. CSS: -
Cascading Style Sheet (CSS) is a style sheet language used for describing the
presentation of a document written in a markup language such as HTML. CSS is a
cornerstone technology of the World Wide Web, alongside HTML and JavaScript.
3
CSS is designed to enable the separation of presentation and content, including
layout, colors, and fonts. This separation can improve content accessibility, provide
more flexibility and control in the specification of presentation characteristics,
enable multiple web pages to share formatting by specifying the relevant CSS in a
separate CSS file which reduces complexity and repetition in the structural content
as well as enabling the CSS file to be cached to improve the page load speed
between the pages that share the file and its formatting [3].

3. JAVA SCRIPT: -
JavaScript often abbreviated as JS, is a programming language that conforms to the
ECMA Script specification. JavaScript is high-level, often just-in-time compiled,
and multi-paradigm. It has curly-bracket syntax, dynamic typing, prototype-based
object- orientation, and first-class functions.

Alongside HTML and CSS, JavaScript is one of the core technologies of the World
Wide Web. JavaScript enables interactive web pages and is an essential part of web
applications. The vast majority of websites use it for client-side page behaviour, and
all major web browsers have a dedicated JavaScript engine to execute it [4].

4. PYTHON: -
Python is a popular programming language known for its readability and versatility.
It is widely used in web development, data analysis, artificial intelligence, scientific
computing, and more. Python's syntax is designed to be clear and concise, making
it easy to learn for beginners and enjoyable to use for experienced developers.
Python is an interpreted language, which means that code is executed line by line
by the Python interpreter. Python's dynamic typing and automatic memory
management help simplify coding tasks and make it a great choice for a wide range
of applications [5].

4
HARDWARE AND SOFTWARE REQUIREMENT

HARDWARE REQUIREMENTS: -

1. Processor – i3
2. Hard Disk – 4GB
3. Memory – 1GB RAM
4. Internet Connection

SOFTWARE REQUIREMENTS: -

1. Windows 7 or higher
2. Browser (Google Chrome | Microsoft Edge)

5
DATA FLOW DIAGRAM

3.1 0-Level DFD:

Fig 3.1: 0- Level DFD for Digital Steganography

The 0-level DFD explains or gives very basic information about the software that is created. It
provides the ideas of a single process and some entities that are involved.

Process –

1. Steganography

Entity –

1. User
2. Admin

6
3.2 1-Level DFD:

Fig 3.2: 1-Level DFD

In Level 1 DFD have detail description of the main process with combination of required
database and entities with proper data flow.

Process –

1. Login
2. Encode
3. Decode
4. Download 7
Entity –
1. User
2. Admin

Database –

1. User Details Database


2. Stego File Database

3.3 2-Level DFD:

Login process:

Fig 3.3.1: Login Process

8
Encode Process:

Fig 3.3.2: Encode Process

In Level-2 DFD the process explained in level -1 are explained in more detail and depth.

Process –

1. Login
1.1 Sign up
1.2 Login
2. Encode
2.1 Download

Entity –
1. User
2. Admin

Database –

1. User Details Database


2. Stego File Database

9
IMPLEMENTATION AND MODIFICATION

There are two methods in image steganography:

1. Spatial Method
2. Transform Method

Among this two this work uses spatial method. In spatial method LSB (Least Significant Bit)
substitution method is used it is a common simple approach used to embedding information in
a cover file. It converts the image bit in pixel and the text in binary format and alter the LSB
bit to embed the text in image and provide stego image which consist of hidden message.

Step 1: Formation of Image array

In this, all pixels from the given image are stored in array format, where each pixel contains
information about its color or grayscale value (RGB).

Step 2: Formation of Message array

All the binary bit from the given text file is extracted and stored in array format.

Step 3: LSB Operation

In this, place character of message array in each component of image array by replacing its
LSB bit.

10
and the image obtained after replacing all the bits will give us a stego image in which the
secret message is hidden inside the image.

11
SNAPSHOTS

Fig 5.1: Login Page

Fig 5.2: Signup Page

12
Step 1 Step 2

Step 3

Fig 5.3: Encoding of an image

13
FUTURE ENHANCEMENT

As technology advances, this field will likely continue to evolve with new methods, challenges
and applications and in the upcoming future some fields where the goal of this work will be to
implement steganography techniques in different fields like:

 The steganography process will be implemented in audio and video files.


 In this project we will try to implement it as multilayer steganography.
 We will try to merge steganography with different applications to make data more
secure.

14
CONCLUSION

In conclusion, the use of steganography can be beneficial as it offers a way to secure data and
communication covertly. It can provide an extra layer of security by hiding the existence of
sensitive and useful information in military and other secretive operations. It can also be used
for embedding invisible watermarks to protect intellectual property by hiding messages within
innocent-looking files.

15
REFERENCE

[1] https://en.wikipedia.org/wiki/Visual_Studio_Code

[2] https://en.wikipedia.org/wiki/HTML

[3] https://en.wikipedia.org/wiki/CSS

[4] https://en.wikipedia.org/wiki/JavaScript

[5] https://www.python.org/doc/essays/blurb/

[6] https://staruml.io/

[7] Al-Ani, Z. Kh., Zaidan, A. A., Zaidan, B. B., Alanazi, H. O., Overview: Main

Fundamentals for Steganography. (2010)

16

You might also like