Cryptography and Security

This steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide ,b

2025-06-28 16:31:01 - Adil Khan

Project Title

Cryptography and Security

Project Area of Specialization Information & Communication TechnologyProject Summary

This steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide ,because of using maximum memory space in pictures to hide the file.
This application will help the user to hide the information, where the 3rd party would be completely ignorant about any hidden information. The application provides the user friendly interface for the user. The graphically interface is easy to understand for the user. The application deploy in nay machine with windows operating system. There is no security issue until user leak the information of encrypted file. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitations on file size to hide, because of using maximum memory space in pictures to hide the file

Project Objectives Project Implementation Method

We will follow the waterfall model for this project because it is also referred as a linearsequential life cycle model. It is very simple to understand and use. In a waterfall model, each phase must be completed fully before the next phase can begin. This type of model is basically used for the project which is small and there are no uncertain requirements. At the end of each phase, a review takes place to determine if the project is on the right path and whether or not to continue or discard the project. In this model the testing starts only after the development is complete.The algorithm used for Encryption and Decryption is this application provides using several layers lieu of using only LSB layer of image least significant bit (LSB) insertion is a simply approach to embedding in formation in image file. 

Benefits of the Project Technical Details of Final Deliverable

Technical Details are as follow:

Final Deliverable of the Project Software SystemCore Industry ITOther IndustriesCore Technology OthersOther TechnologiesSustainable Development Goals Industry, Innovation and InfrastructureRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 35492
Microsoft Visual Studio Equipment13071430714
Common Language Runtime(CLR) Miscellaneous 127782778
ream boxes Miscellaneous 210002000

More Posts