Final
Final
A PROJECT REPORT
Submitted by
LOGANATHAN.S 422518106024
MEGAVANNAN.S 422518106705
of
BACHELOR OF ENGINEERING
in
JUNE 2022
ANNA UNIVERSITY, CHENNAI-600 025
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
We would like to thank our respected Dean. Dr. R.SENTHIL, ME, Ph.D., for
Providing good environment and facilities to complete the project.
We express our sincere thanks to our respectful Head of the Department Dr.
A.SARASWATHI, M. Tech., Ph.D., for her great support in completing this
project.
We thank our beloved project guide Dr. D.PALANI, M.E., Ph.D., for providing
perfect guidance and continuously inspiring us in positive way and to learn more
about our project, instead of just finishing it.
We deliver our profound and benevolent thanks to all the Staff members in the
Department of Electronics and Communication Engineering, who enunciated the
project with their encouraging guidance.
We will be faulty in our duty if we don’t thank our parents for their benevolence
and blessings which stood us in good stead during the course of the project.
AKRAM BASHA.I
LOGANATHAN.S
MEGAVANNAN.S
ABSTRACT
Here, signature image information is kept hidden into cover image using
private key of sender & receiver, which extracts the information from stego image
using a public key.
i
TABLE OF CONTENTS
1 INTRODUCTION 01
1.1 OBJECTIVE 01
2 LITERATURE SURVEY 02
3 METHODOLOGY 07
3.5 CONCEPT 12
3.5.1 Steganography 12
3.5.2 Cryptography 13
4 COMPONENTS 19
4.1 COMPONENTS 19
4.1.1 Specification 19
4.1.3 Usability 20
iii
4.2.2 Minimum Software Requirement 21
5 SOFTWARE REQUIREMENTS 22
INTRODUCTION 22
5.5 HADOOP 25
7 CONCLUTION 30
REFERENCE 31
iv
LIST OF FIGURES
NO TITLE PAGE NO
v
LIST OF ABBREVIATIONS
11 AI Artificial Intelligence
vi
CHAPTER 1
INTRODUCTION
1.1 OBJECTIVE
For secured data transmission with reduced encrypted object and high degree
of security. Hacking by 3rd party is completely reduced.
This approach supports the concept of Digital Signature. At the receiver end,
from the stego image, the encrypted color image information is being extracted
and using the sender’s public key, original image information is decrypted.
This permits a person to conceal information in the file and assure that no
human involvement could notice the alteration in the file. The LSB method
performs in a superior way in image files which needs to have an inflated
resolution and locate various colors.
LSB method also performs well with audio files that have dissimilar
sounds and an enhanced bit rate. The LSB procedure normally does not only
facilitate the file size, but depending on the magnitude of the information that is
to be concealed inside the file, the file can become perceptively twisted.
1
CHAPTER 2
LITERATURE SURVEY
The LSB procedure normally does not only facilitate the file size, but
depending on the magnitude of the information that is to be concealed inside the
file, the file can become perceptively twisted.
Here, some innovative algorithm is applied that will help to bring the
modification very less. The algorithm will support to prevent illusion regarding
the hidden data within the original image.
DISADVANTAGES
Here, some innovative algorithm is applied that will help to bring the
modification very less. The algorithm will support to prevent illusion regarding
the hidden data within the original image.
2
In steganography, information is kept hidden behind a cover image. In this
paper, approaches for information hiding using both cryptography &
steganography is proposed keeping in mind two considerations - size of the
encrypted object and degree of security.
Here, signature image information is kept hidden into cover image using
private key of sender & receiver, which extracts the information from stego image
using a public key.
Size constraint for Text File: To store 1 byte information (8 bits), at least 8
pixels are needed for the cover image. File should be at least 8 times bigger (in
terms of pixels) than the Text File. In the current work, .bmp file with RGB color
format provided by Microsoft is used as cover image. Each pixel is constituted
by the colors red, green & blue that occupies 1 byte space to store each of the
colors.
3
2.3 ADVANTAGES OF PROPOSED WORK
4
A New Hybrid Steganalysis Steganalysis is the
2016 A.Fatnassi Based Approach for mechanism of
Embedding Image in Audio and detecting the presence
Image Cover Media of hidden information
in the stego media
5
Sabyasachi Application of The proposed
2013 Pramanik Steganography in Symmetric technique is the
Key Cryptography with application of
Genetic Algorithm steganography for
confidential
transmission of
symmetric
Design of Image steganography deals
Steganography based on RSA with the concealment
2017 Richard Apau Algorithm and LSB Insertion or hiding of a secreted
for Android Smartphones. message from the
unauthorized person.
6
CHAPTER 3
METHODOLOGY
T
T T
T T T T
T T
T
(b) Step 2: Perform edge detection of the cover image file chosen.
(c) Step 3: Remold the ASCII character or text message (P) into array form,
then convert it into ASCII format (Q).
(d) Step 4: Remold the text message (P) into array form, then convert itinto
ASCII format (Q).
7
(e) Step 5: Convert the ASCII message into a binary matrix.
(f)Step 6: Generate the key (k) encrypt the matrix using key P= (Q+K) Pi,
where i =2; Perform the embed process with the LSB replacement algorithm.
The result generated is Stego-image (Z)
P T
P T
T T
T T
P T
P T
(a) Step1: The input in the decoding process is the Stego-image (Z). Then, read
the Stego-image and convert it into binary format.
(b) tep 2: n the receiver’s side the image is multiplied with the inverse of the
original matrix. i.e., a(x, y).
(c) Step 3: The decoded audio i.e. b(x, y)is not exactly equal to the original
audio due to the image compression hiding i.e. DCT(Discrete cosine
transformation) technique.
8
(d) Step 4: After decoding the audio file (M) using the reverse process of the
LSB algorithm the next step is to decode the text message (p) from the Stego-
image (z). Now, read the edge area along with the key to obtain the extraction
matrix.
(e)Step 5: Decode the text message with the key to generate decode matrix P=
(P-Q) Pi, where i=2. (f) Step 6: Convert the decode matrix into ASCII form
PT
P TK T T
TT T
(a) Step 1: To hide an image inside another, the image which will be hidden
needs to have at most the same size of the image which will hide it.
(b) Step 2: We must create two loops to go through all rows and columns from
the images.
(c) Step 3: So, we get the RGB from the image 1 and image 2 as binary values
9
(d) Step 4 : We can use the ”int to bin” method to convert a decimal value to a
binary value.
(e) Step 5: We merge the most significant bits from the image 1 with the most
significant bits from the image 2 sing the ” merge rgb” method
(f) Step 6: Finally, we convert the new binary value to a decimal value using the
”Z bin to int” method and after that set it to a new pixel position from the
resulted image.
(a) Step 1: To reveal an image, we must know how many bits were used to hide
the image. In this case, we are using a fixed number of 8 bits.
(b) Step 2: First of all, we need to create two loops to go through all pixels from
the image
10
(c) Step 3: So, we extract each RGB channel as a binary value from the current
pixel sing the ” int to in” method
(d) Step 4 : Then, we create a new RGB value by concatenating only the 4
rightmost bits from the current pixel with zero values (to create a new 8-bit
value).
(e) Step 5: . Finally, we convert the binary value to a decimal value and set it to
the current pixel in the new image.
(f) Step6: The developed algorithm as only one more last step to remove the
black borders when the hidden image was smaller than the image which is
hiding it.
(g) Step 7: Now we have the decoded message from the image.
4.At the receiver end, embedded information is retrieved from the stego
image.
11
3.4 APPROACH FOR HIDING INFORMATION
least 8 pixels are needed for the cover image. File should be at least
• n the current work, .bmp file with color format provided by icrosoft
is used as cover image. Each pixel is constituted by the colors red, green & blue
that occupies 1 byte space to store each of the colors.
• Text ile’s ormat is maintained in such a way that the text must be
terminated by a . (dot). It may be any other negotiated character/symbol.
3.5 CONCEPT
3.5.1 Steganography
12
The use of steganography can be combined with encryption as an extra step
for hiding or protecting data.
3.5.2 Cryptography
13
The hidden text in the cover image is concealed in the first phase,
whereas the secret audio file is stored in the cover image file in the second
phase.
Firstly, every text character and each cover picture pixel value is
translated into binary. The Stego-key on the sender side is used as the password
for embedding the hidden message in the cover picture format.
Once the process of embedding the text file into the cover image is
complete, an audio file is selected which is embed in same image file where the
text file is inserted previously.
The audio file in the WAV format is selected and embedded in the image
file. The resulting final or Stego-image is sent to the receiver through the
desired channel of communication. While inserting the binary bit of secret text
message into the conceal picture document.
We can describe it as a finite set of digital values, called pixels. Pixels are
the smallest individual element of an image, holding values that represent the
brightness of a given color at a specific point.
14
Hence, we can think of an image as a matrix (two-dimensional array) of
pixels which contain a fixed number of rows and columns.
Here, it is referenced to the raster graphic, which are basically dot matrix
data structure, representing a grid of pixels, which in turn can be stored in image
files with varying formats.
The RGB color model is an additive color model in which Red, Green
and Blue lights are added together in numerous ways to reproduce a broad array
of colors.
So each pixel from the image is composed of three values (Red, Green,
Blue) which are 8- bit values that ranges from 0 – 255.
15
FIG 3.5.5 : 8-BIT REPRESENTATION
Every pixel has three values (RGB), each RGB value is 8-bit (this infers
that it can store 8 binary values) and the rightmost bits are less substantial.
Therefore, changing the rightmost bits will have a small visual impact on
the final image. This is the steganography key to hide an image inside another
by changing the less significant bits from an image and including the most
significant bits from the other image.
a. The user will start the application and run the code.
b. As soon as the code is run user has to import various libraries, Some
Libraries are installed from external sources as It provides a Command Line
16
Interface (CLI)to find, install, download and remove packages from PyPI and
other Python Package indexes.
After the libraries are installed the application starts up and a user
interface is presented on the users screen as shown :
c. Now the given set of data or information, be it text, audio or image is taken,
converted into ASCII values.
d. The user then imports the cover image and the input file that has chosen.
e. After the selection of the encryption of the information under the cover image
begins.
f. Convert the disintegrated each ASCII in 4 value. Divide 8-bit number into 2-
bit digit, which helps the user at the time of hiding the data.
i. The receiver then starts the decryption of the sent image file.
k. The hidden message image is then decrypted and the information is extracted
from the image in its original form.
17
FIG 3.5.6 IMPORTED LIBRARY
For the experiment of hiding the image inside another image we need to
make sure that the image which is being hidden i.e. our data should be less than
or equal to the cover image.
18
CHAPTER 4
4.1 COMPONENTS:
The security of the modification of the secret data can be obtained by two
ways: encryption and steganography. A blend of encryption and steganography
can be used to enhance the data security. Here steganography is to hide data,
whereas cryptography is used to encrypt data. Steganography can also be used
with cryptography, thus encrypted data is hidden into cover image, thereby
generating a stego image.
4.1.1 Specifications
SME
Prior Date Reviewed
Req# Requirement Comments
ity Rvwd /
Approved
19
SME
Prior Date Reviewed
Req# Requirement Comments
ity Rvwd /
Approved
4.1.3 Usability
Learnability
The help should be context sensitive and explain how to achieve common tasks
(See http://www.usabilitynet.org/)
20
4.2 SYSTEM REQUIREMENTS
• Ram : 512 MB
21
CHAPTER 5
SOFTWARE REQUIREMENTS
INTRODUCTION
Aside from the raw analysis step, it involves database and data
management aspects, data pre-processing, model and inference considerations-
interestingness metrics, complexity considerations, post-processing of
discovered structures, visualization, and online updating. Data mining is the
analysis step of the "knowledge discovery in databases" process, or KDD.
22
Neither the data collection, data preparation, nor result interpretation and
reporting is part of the data mining step, but do belong to the overall KDD process
as additional steps.
The related terms data dredging, data fishing, and data snooping refer to
the use of data mining methods to sample parts of a larger population data set that
are (or may be) too small for reliable statistical inferences to be made about the
validity of any patterns discovered. These methods can, however, be used in
creating new hypotheses to test against the larger data populations.
Big Data concern large-volume, complex, growing data sets with multiple,
autonomous sources. With the fast development of networking, data storage, and
the data collection capacity, Big Data are now rapidly expanding in all science
and engineering domains, including physical, biological and biomedical sciences.
This paper presents a HACE theorem that characterizes the features of the Big
Data revolution, and proposes a Big Data processing model, from the data mining
perspective.
Big data is a collection of data sets so large and complex that it becomes
difficult to process using on-hand database management tools. The challenges
include capture, curation, storage, search, sharing, analysis, and visualization.
The trend to larger data sets is due to the additional information derivable from
analysis of a single large set of related data, as compared to separate smaller sets
with the same total amount of data, allowing correlations to be found to "spot
23
business trends, determine quality of research, prevent diseases, link legal
citations, combat crime, and determine real-time roadway traffic conditions.
Put another way, big data is the realization of greater business intelligence
by storing, processing, and analyzing data that was previously ignored due to the
limitations of traditional data management technologies
• Veracity: Trust and integrity is a challenge and a must and is important for
big data just as for traditional relational DBs
24
5.4 SOME CONCEPTS
• No SQL (Not Only SQL): Databases that “move beyond” relational data
models (i.e., no tables, limited or no use of SQL)
– Focus on key-value data stores that can be used to locate data objects
5.5 HADOOP
25
5.5.1 Some Hadoop Related Names to Know
• Mahout: an AI tool designed for machine learning; that is, to assist with
filtering data for analysis and exploration
26
The Knowledge Discovery in Databases (KDD) process is commonly defined
with the stages:
(1) Selection
(2) Pre-processing
(3) Transformation
(4) Data Mining
(5) Interpretation/Evaluation.
It exists, however, in many variations on this theme, such as the Cross
Industry Standard Process for Data Mining (CRISP-DM) which defines six
phases:
(1) Business Understanding
(2) Data Understanding
(3) Data Preparation
(4) Modelling
(5) Evaluation
(6) Deployment or a simplified process such as
• pre-processing
• data mining, and
• results validation.
27
CHAPTER 6
i. Combining the results and discussion section allows for more coherence,
because it allows you to discuss results of a particular test or method immediately
after presenting them. However, if you decide to forego the distinction between
results and discussion, you will need to divide your section into appropriate
subsections, potentially into different topics or tests: for example,
ii. Keeping results and discussion separate, on the other hand, allows you to
discuss all of the results at one time. In the above example, it may be more
important to discuss the relationships between composition, strength and
flexibility of individual samples than it is to compare the features of all four
28
samples. In this case, you may want to hold off on discussing the results until you
have presented all of them.
Both analysis and interpretation involve drawing conclusions from the data
presented in results. In doing either, be sure to clearly link your claims to specific
sets of data, and logically explain how the data supports your claim.
29
CHAPTER 7
CONCLUSION
The project demonstrates the approach for hiding secret data inside a cover
image which later can be extracted by the receiver. Here we discuss, how
steganography can be blended with the concept of digital signature to provide a
better support for improved secrecy and safety of data transmission through the
internet.
Also, we may enhance our work by providing the support for error
detection and subsequently error correction. The researchers provide a continuing
support that can enhance the capability of better message authentication , privacy,
security and integrity for the communication of e-world.
30
REFERENCES
[8] adhusudhan ishra, angadhar Tiwari and run Kumar adav, “ ecret
ommunication using Public Key teganography”, nternational
Conference on Recent Advances and Innovations in Engineering, 2014.
31
[9] Arati Appaso Pujari and unita unil hinde, “ ata ecurity using
ryptography and teganography”, Journal of omputer ngineering, vol.
18, issue 4, pp. 130-139, 2016.
[10] anjive Tyagi, akesh Kumar wivedi and shendra K. axena, “ igh
Capacity PDF Text Steganography Technique Based on Hashing Using
Quadratic Probing”, nternational Journal of ntelligent ngineering and ystems,
vol. 12, no. 3, pp. 192-202, 2018.
32
Computer Applications, vol. 164, no. 1, pp. 13–22, Apr. 2017. DOI:
10.5120/ijca2017913557.
[16] . , “ T P T T
TP T ,” Journal of nnovative mage Processing, vol. 1,
no. 01, pp. 20–30, Oct. 2019. DOI: 10.36548/jiip.2019.1.003.
33