image steganography in embedded systems
Data security requires in different fields like E-trade and bio medical field. So as to keep the information secure different systems have been executed to encode and decode the secure information. The two clearest methods are cryptography and steganography. Cryptography covers the substance of a se
2025-06-28 16:33:02 - Adil Khan
image steganography in embedded systems
Project Area of Specialization Cyber SecurityProject SummaryData security requires in different fields like E-trade and bio medical field. So as to keep the information secure different systems have been executed to encode and decode the secure information. The two clearest methods are cryptography and steganography. Cryptography covers the substance of a secret message from a malignant people, though steganography even disguise the presence of the text. In cryptography, the framework is shattered when the aggressor can inspect the secret text. Breaking a steganography configuration need the aggeressor to recognize that steganography has been utilized.
Project ObjectivesThe aim of steganography is to conceal a secret text inside a spread media so that others can’t recognize the proximity of the hidden message. In fact in straightforward words
"steganography implies concealing one bit of information inside another".The fundamental target of our undertaking is primarily worried about the insurance of substance
of the hidden data.
Some of the techniques used for image steganography are following.
LSB(Least Significant Bit algorithm)
Masking and Filtering
Algorithms and Transformation
The approach which we are going to use for concealing the information in image is LSB algorithm. The most ordinary and general technique for advanced steganography is to
utilize LSB of picture’s pixel data. LSB-Steganography is a steganography strategy where we hide message inside a picture by displacing LSB of image with the bits of
text to be covered up. By adjusting the most right bit of an image we can embed our secret message and it will make the image unnoticeable, but if our message is too large
it will begin altering the second right most bit and an attacker can see the adjustments in picture. This method works best when the file is longer than the message document and
if picture is grayscale. While applying LSB strategies to every byte of a 24 bit picture, three bits can be encoded into every pixel. LSB steganography includes overwriting the
bit with the lowest arithmetic value.
Steganography is used :
To secure private records and reports.
To conceal Passwords or encryption Keys.
To convey extraordinary secret reports between International Authorities.
To convey text/information without displaying the presence of accessible text.
We will provide a system which will provide a person to hide the text data in any image. we will send the brain image embedded with text data to the receiver.
Final Deliverable of the Project Hardware SystemType of Industry Legal , Security Technologies OthersSustainable Development Goals Sustainable Cities and CommunitiesRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 70000 | |||
| zybo board | Equipment | 1 | 70000 | 70000 |