You are on page 1of 11

STEGAN

Group Members : Under the guidence of


professor :

1529013001 Aakarsh verma Sumit kumar


1529013020 Madhur pal
1529013032 Sagar Goyal
PROBLEM STATEMENT

This project attempts to make use of the standard steganographic tool and
a modified version of standard encryption algorithm to perform the task of
data hiding for the purpose of observing privacy. The user should be able to
conceal a text message in an image file without any visible alterations to
the image as such i.e. there should not be any noticeable changes to the
colouring or the position of the various objects in the image.
PROPOSED SOLUTION

We are making a web based application through which we can encrypt and
decrypt images, videos and audio

Unlike traditional applications, It is accessible anytime, anywhere, via a PC


with an Internet connection.

The internet connection is only used to send or receive the data if the
application has already been installed on the system.
INTRODUCTION

 Steganography is the art and science of invisible communication.

 Steganography is the practice of concealing a file, message, image, or video


within another file, message, image, or video.

 The word steganography combines the Greek words steganos, meaning


"covered, concealed, or protected", and graphein meaning "writing".

 There are only two modules in this software


• Sender module
• Receiver module
OBJECTIVE

• To make the web application of Steganography usable for the secret


data sharing.
• This steganography application software provided for the purpose to
how to use any type of image formats to hiding any type of files inside
their.
• To access the encrypted data.
•To avoid drawing suspicion to the existence of a hidden message.
FEATURES
• Stagen provides confidential communication.
•Stegan provides secret data storing.
•Stegan provides protection of data alteration.
•Stegan provides access control system for digital contents distribution.
•Stegan provides media database system.
•Stegan enhances the secrecy of encrypted data.
TOOLS AND TECHNOLOGY

•JAVA 8

•JAVA SWING

•ORACLE
FUTURE SCOPE
 Voice over Internet protocol (VoIP) used for steganography owing to its
difficulty in detecting hidden information in VoIP streams.

Steganography is capable of mitigating piracy by aiding copyright marking.

Digital camera manufacturers could implement steganographic features as a


part of camera firmware to annotate pictures with the photographer’s
copyright information.

You might also like