Image Steganography Abstract
Image Steganography Abstract
Image Steganography Abstract
ABSTRACT:
The word steganography means covered in hidden writing. The object of
steganography is to send a message through some innocuous carrier (to a
receiver while preventing anyone else from knowing that a message is being sent
to all. Computer based steganography allows changes to be made to what are
known as digital carriers such as images or sounds.
Images are the most widespread carrier medium. The are used for
steganography in the following way. The message may firstly be encrypted. They
are used for steganography in the following way. The message may firstly be
encrypted. The sender embeds the secret message to be sent into a graphic file.
This results in the production of what is called stego-image. Additional secret data
may be needed in the hiding process e.g. a stegokey etc. This stego-image is then
transmitted to the recipient.
With encryption, Bob can be reasonably sure that he has received a secret
message when a seemingly meaningless file arrives. It has either been
corrupted or is encrypted. It is not so clear with hidden data, Bob simply
receives an image, for example, and needs to know that there is a hidden
message and how to locate it.
Another limitation is due to the size of the medium being used to hide the
data. In order for steganography to be useful the message should be hidden
without any major changes to the object it is being embedded in. This leaves
limited room to embed a message without noticeably changing the original
object. This is most obvious in compressed files where many of the obvious
candidates for embedding data are lost. What is left is likely to be the most
perceptually significant portions of the file and although hiding data is still
possible it may be difficult to avoid changing the file.
The previously had many drawbacks such as more manual processing of data
which resulted in a time consuming process. Besides this cost of maintaining a
manually was more as compared to the computerized process. Besides this there
were complexities but not the least there was minimal amount of data security.
USERS
Sender
Sender who make a stegano image. Sender is an authorized person
who sends important information with the help of an image to receiver.
Receiver
Receiver is an authorized person who extracts important
information from image in a secure way. Receiver receives information
from sender.
Data Chucking
In this process the encrypted file is chunked in various parts and then this
file is to Be proceed for the further streganography. The aim of this step is to
reduce the stenography time and increase the effectiveness of this procedure.
Steganography
In this process this chunked files are supposed to be sent to the receiver
and this Files will be in the hidden form. This all files are received by the receiver
and then are proceed to get the original data.
File recombination
In this process the chunked files are supposed to be recombined to get the
whole File and this procedure are done on the receiver end, so the receiver must
have the stego-key or any secret information from the sender so that the receiver
can get the original file.
SYSTEM REQUIREMENT
Software Requirement
Hardware Requirements