Data Hiding and Encryption in Images using Steganography Techniques
VerifiedAdded on 2025/04/14
|19
|511
|326
AI Summary
Desklib provides past papers and solved assignments for students. This project explores data hiding in encrypted images using steganography.

“Data hiding in encrypted image
using steganography approach”
using steganography approach”
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
• Introduction
• Description
• Input
• Output
• Methodology
• Programming Language
• Literature Review
• Implementation
• Conclusion
• References
• Introduction
• Description
• Input
• Output
• Methodology
• Programming Language
• Literature Review
• Implementation
• Conclusion
• References

Introduction
• Project Description
• Inputs used
• Generated Outputs
• Methodological Approach
• Technology
• Project Implementation
• Project Description
• Inputs used
• Generated Outputs
• Methodological Approach
• Technology
• Project Implementation
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Description
• ‘Steganography’ – An art of secret information hiding
• Combination of encryption and protection
• Hiding data behind other file format
• Hiding data behind images
• Hiding data behind multi media files like audio or video
• Cryptography
• Cyber Security
• ‘Steganography’ – An art of secret information hiding
• Combination of encryption and protection
• Hiding data behind other file format
• Hiding data behind images
• Hiding data behind multi media files like audio or video
• Cryptography
• Cyber Security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Input
• Secret data to be made hidden
• Text file
• Image file
• Stego key
• Secret data to be made hidden
• Text file
• Image file
• Stego key

Output
• Altered original image
• Stegano image
• Altered original image
• Stegano image
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Methodology
MD5
Algorithm of message-digest
Cryptographic function of one way processing
Takes input of undefined length
Returns output of fixed length
128 bit output
Uses message authentication code of Cryptography
MD5
Algorithm of message-digest
Cryptographic function of one way processing
Takes input of undefined length
Returns output of fixed length
128 bit output
Uses message authentication code of Cryptography
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

SHA
Secure Hash Algorithm 1
Takes input having the of less than 264 bits
Forms message digest of 160 bit
Generates output of 256 bits
Secure Hash Algorithm 1
Takes input having the of less than 264 bits
Forms message digest of 160 bit
Generates output of 256 bits

Programming Language
• ‘Python’- Best for cyber security
• High performance
• High productivity
• High processing speed
• Extensive support for libraries
• ‘Python’- Best for cyber security
• High performance
• High productivity
• High processing speed
• Extensive support for libraries
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Literature Review
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Reversible Data Hiding
• Method of recovering original image without deformation of
marked image.
• Implementation method after the extraction of hidden data.
• Embedding data in image by slight modification in the pixel
values of image.
• Large amount of data can be embedded, as compared to other
data hiding algorithms.
• Applicable in all kinds of images like text images, medical
images, aerial images, etc.
• Method of recovering original image without deformation of
marked image.
• Implementation method after the extraction of hidden data.
• Embedding data in image by slight modification in the pixel
values of image.
• Large amount of data can be embedded, as compared to other
data hiding algorithms.
• Applicable in all kinds of images like text images, medical
images, aerial images, etc.

Least Significant bit algorithm
for data hiding
• Process of hiding message in each pixel byte by choosing least
significant bit.
• Best for images having the value of 8 bit for each pixel of
image (Greyscale image).
• Encrypting data before hiding data.
• Method of hiding text in other text, image, audio, or video.
for data hiding
• Process of hiding message in each pixel byte by choosing least
significant bit.
• Best for images having the value of 8 bit for each pixel of
image (Greyscale image).
• Encrypting data before hiding data.
• Method of hiding text in other text, image, audio, or video.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 19
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.