Encrypted Data Hiding in Images: A Java-Based Steganography System

Verified

Added on  2025/04/21

|2
|518
|222
AI Summary
Desklib provides past papers and solved assignments for students. This project focuses on secure data hiding using image steganography and encryption.
Document Page
Student ID CSC8416 Project Proposal
Encrypted data hiding in image
Abstract
System for the Encrypted data hiding in the image was designed for the updated system. Firstly,
data was encrypted in the unrecognized or the other string that cannot be readable. Using any
cryptographic algorithm, the data was encrypted in the different kind of string that cannot be
readable. The encrypted string will not give specific information before decrypting the string
(Qin & Zhang 2015, pp.154-164).
By the steganography technique, the encrypted string will be hidden inside the image (Yin et al.
2017, pp.3899-3920).
Introduction
The designed application depended on encryption and decryption process. The cryptography and
the steganography technique were used for hiding the data in the image of the encrypted form. It
will secure the data from the hackers while transferring from one to another through network.
Motivation
It will motivate us to make the data confidential from hackers. While using this system, it will
decrease the attention of the hackers while exchanging the data via another network.
System Structure
Software required:
JAVA 8, Cryptographic libraries
Hardware required:
Hard disk: Above 500 GB, Processor: Intel i7, 6th generation, RAM: Not less than 2 GB.
Functions
a. It will first read the data from the file where it was stored for the encryption.
b. It will encrypt the data and store it in the separate or the other file.
c. It will hide the encrypted data or string inside an image.
d. It will extract back the encrypted data from the image.
e. At last, it will decrypt the encrypted string or data and save it into another file.
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Student ID CSC8416 Project Proposal
User Requirements
Java platform such as Eclipse or the Netbeans IDE was required.
Operating system is required to form users such as Windows.
Additional Features
For data encryption, asymmetric algorithm also can be used for encryption and decryption
process.
Challenges and Complexity
The image cannot be unusual while transferring the data to the another because hackers can
easily identify data behind the image. It will so complex and easy to transfer the data to another
person.
Project Planning
Items Data range Activity
1. Week 1 – Week 5 Research for the development of the system.
2. Week 6 – Week 8 Finding the requirement.
3. Week 9 – Week 11 Development of the system.
4. Week 12 – Week 15 Testing of the developed system is performed.
Conclusion
Designed application was for hiding the data into the image for making easy while transferring it.
Data was encrypted into the unrecognized string or the unidentified string so that hackers cannot
hack them easily. The attraction will become low for hackers while transferring the data to
another location. Encrypted string will not give the specific information before decrypting the
string.
References
- Qin, C. and Zhang, X., 2015. Effective reversible data hiding in encrypted image with privacy
protection for image content. Journal of Visual Communication and Image Representation, 31,
pp.154-164.
- Yin, Z., Abel, A., Tang, J., Zhang, X. and Luo, B., 2017. Reversible data hiding in encrypted
images based on multi-level encryption and block histogram modification. Multimedia Tools and
Applications, 76(3), pp.3899-3920.
2
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]