Cryptography and Security
This steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide ,b
2025-06-28 16:31:01 - Adil Khan
Cryptography and Security
Project Area of Specialization Information & Communication TechnologyProject SummaryThis steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide ,because of using maximum memory space in pictures to hide the file.
This application will help the user to hide the information, where the 3rd party would be completely ignorant about any hidden information. The application provides the user friendly interface for the user. The graphically interface is easy to understand for the user. The application deploy in nay machine with windows operating system. There is no security issue until user leak the information of encrypted file. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitations on file size to hide, because of using maximum memory space in pictures to hide the file
- To product security tool based on steganography techniques.
- To explore techniques of hiding data using encryption module of this project
- To extract techniques of getting secret data using decryption module.
We will follow the waterfall model for this project because it is also referred as a linearsequential life cycle model. It is very simple to understand and use. In a waterfall model, each phase must be completed fully before the next phase can begin. This type of model is basically used for the project which is small and there are no uncertain requirements. At the end of each phase, a review takes place to determine if the project is on the right path and whether or not to continue or discard the project. In this model the testing starts only after the development is complete.The algorithm used for Encryption and Decryption is this application provides using several layers lieu of using only LSB layer of image least significant bit (LSB) insertion is a simply approach to embedding in formation in image file.
Benefits of the Project- To provide a secret form of encryption through obscurity using images teganography
- To make all confidential information on both their systems and client systems encrypted to prevent unauthorized access,viewing,use,suspicionand modification.
- To provide a steganographic encryption platform for confidential communication and secret information sharing and storing
- The encrypted image must avoid drawing suspicion to the existence of hidden informationinit.
Technical Details are as follow:
- Microsoft Visual Studio
- Common Language Runtime(CLR)
- WindowsForms
- VisualC#
- Visualparadigm(VP)11.1
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 35492 | |||
| Microsoft Visual Studio | Equipment | 1 | 30714 | 30714 |
| Common Language Runtime(CLR) | Miscellaneous | 1 | 2778 | 2778 |
| ream boxes | Miscellaneous | 2 | 1000 | 2000 |