0% found this document useful (0 votes)
24 views20 pages

Image Crypt

The document is a project proposal for an Image Encode System aimed at securely encrypting and concealing sensitive information within digital images using steganography and cryptographic methods like AES. The system utilizes the Least Significant Bit (LSB) technique to embed encrypted data while maintaining the visual quality of the cover image, making unauthorized access nearly impossible. The proposal outlines the project's objectives, methodologies, and expected outcomes, emphasizing its user-friendly interface for easy data encoding and decoding.

Uploaded by

dhakalshishir982
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views20 pages

Image Crypt

The document is a project proposal for an Image Encode System aimed at securely encrypting and concealing sensitive information within digital images using steganography and cryptographic methods like AES. The system utilizes the Least Significant Bit (LSB) technique to embed encrypted data while maintaining the visual quality of the cover image, making unauthorized access nearly impossible. The proposal outlines the project's objectives, methodologies, and expected outcomes, emphasizing its user-friendly interface for easy data encoding and decoding.

Uploaded by

dhakalshishir982
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

TRIBHUVAN UNIVERSITY

FACULTY OF HUMANITIES AND SOCIAL SCIENCE

A Project Proposal on
Image Encode System
Submitted to

Department of Computer Application


Southwestern State college, Basundhara, Kathmandu

In partial fulfillment of the requirements for the Bachelors in


Computer Application

Submitted By

Name: Shishir Dhakal


TU Roll no: 53002078

February 2, 2024
ABSTRACT
Image Encode System is a secure encryption and steganography-based system designed
to provide a robust mechanism for concealing sensitive information within digital images.
The primary objective of this project is to ensure secure communication by integrating
cryptographic methods with image steganography, making unauthorized access and
detection virtually impossible.
Steganography involves hiding information within various forms of media, such as text,
images, audio, and video. In this project, the LSB method is used for embedding
encrypted data into digital images while maintaining the visual quality of the cover
image. By combining encryption techniques, such as AES, with LSB-based
steganography, this system offers a high level of security that prevents attackers from
accessing hidden data even if the stego image is intercepted.
The proposed system ensures that encrypted messages are embedded within an image file
in a way that does not arouse suspicion, making it highly useful for secure
communications, digital watermarking, and covert data transmission. Additionally, the
project aims to create an intuitive user interface that allows for easy encryption,
embedding, and extraction of hidden messages.

Keywords: Steganography, Cryptography, Image Security, Data Hiding, LSB, AES,


Secure Communication etc.

ii
TABLE OF CONTENTS
ABSTRACT...................................................................................................ii
LIST OF FIGURES......................................................................................iv
LIST OF TABLES.........................................................................................v
LIST OF ABBREVIATIONS.......................................................................vi
CHAPTER 1: INTRODUCTION................................................................1
1.1 Overview...............................................................................................................1
1.2 Objective................................................................................................................1
1.3 Problem Statement.................................................................................................2
1.4 Scope.....................................................................................................................2
1.5 Development Methodology...................................................................................2
CHAPTER 2: LITERATURE REVIEW....................................................3
2.1 Existing System..........................................................................................................3
2.2 Literature Review.......................................................................................................4
2.3 Requirement Collection Method................................................................................4
CHAPTER 3: SYSTEM ANALYSIS AND DESIGN.................................5
3.1 Requirement Identification.........................................................................................5
3.1.1 Functional Requirement......................................................................................5
3.1.2 Non-Functional Requirement..............................................................................5
3.2 System Requirement..................................................................................................6
3.3 Feasibility Study.........................................................................................................7
3.3.1 Technical Feasibility...........................................................................................7
3.3.2 Operational Feasibility........................................................................................7
3.3.3 Economic Feasibility...........................................................................................7
3.3.4 Schedule Feasibility............................................................................................8
3.4 Methodology..............................................................................................................9
3.5 System Design..........................................................................................................10
3.6 Algorithm Analysis...................................................................................................11
3.6.1 Least Significant Bit Algorithm (LSB).............................................................11
3.6.2 Advanced Encryption Standard (AES)..............................................................11
CHAPTER 4: EXPECTED OUTCOME..................................................12
CHAPTER 5: CONCLUSION...................................................................13
REFERENCES............................................................................................14

iii
LIST OF FIGURES
Figure 1: Gantt Chart...........................................................................................................8
Figure 2: Waterfall method...................................................................................................9
Figure 3: UseCase Diagram...............................................................................................10

iv
LIST OF TABLES
Table 1: Software Requirements..........................................................................................6
Table 2: Hardware Requirements.........................................................................................6

v
LIST OF ABBREVIATIONS

AES - Advanced Encryption Standard


LSB - Least Significant Bit
PIL - Python Imaging Library
OpenCV - Open-Source Computer Vision Library
NumPy - Numerical Python
UI - User Interface
API - Application Programming Interface
TCP/IP - Transmission Control Protocol/Internet Protocol
HTTP - Hypertext Transfer Protocol
HTTPS - Hypertext Transfer Protocol Secure
USB - Universal Serial Bus
LAN - Local Area Network

vi
CHAPTER 1: INTRODUCTION
1.1 Overview
In the digital age, secure communication and data protection are critical concerns. With
the increasing exchange of sensitive information over the internet, the risk of data
breaches, cyber-attacks, and unauthorized access has also grown significantly. Image
Encode System is a web-based application designed to enhance data security by
leveraging steganography to conceal secret messages or images within another image.
This approach ensures that the hidden data remains undetectable to unauthorized users,
providing an additional layer of security beyond traditional encryption methods.
The system employs the LSB technique, a widely used steganographic method that
modifies the least significant bits of the pixel values in the cover image to store secret
information. Since the changes in pixel values are minimal, the alterations are
imperceptible to the human eye, making the hidden data nearly impossible to detect
without the appropriate decoding mechanism. This ensures that confidential information
can be securely transmitted without raising suspicion.
Image Encode System is structured into two main functionalities. The first allows users to
embed text messages within an image, enabling secure communication that disguises
sensitive information as an ordinary image file. The second functionality extends this
capability by allowing users to embed an entire image within another image, offering a
more advanced level of concealment for visual data. These features make the system
highly versatile for various applications, such as secure messaging, digital watermarking,
and protecting sensitive media files.
1.2 Objective
 To develop a system that encrypts and hides text or images inside digital images.
 To implement AES to secure the hidden data.
 To provide an efficient and user-friendly interface for encoding and decoding.

1
1.3 Problem Statement
One evening, while sending confidential documents to a colleague, I faced an issue that
highlighted the vulnerability of traditional data transmission methods. I encrypted the
document to protect its content, but when sending it over email, I realized that the
encryption itself made the data look suspicious. This raised concerns that the encrypted
file could attract unwanted attention or even be intercepted by unauthorized parties.
As a result, I realized the importance of developing a more secure and undetectable way
to protect sensitive information. Recognizing these issues, I decided to develop Image
Encode System, a system that uses steganography to ensure that sensitive data remains
hidden and secure. By embedding encrypted data within an image, this system not only
protects the information from unauthorized access but also makes it resistant to tampering
and detection, providing a more reliable solution for secure communication in a digital
world.
1.4 Scope
The system is designed to address common issues in digital communication, where
sending sensitive data through open channels can expose it to risks of interception. Image
Encode System offers an efficient solution by hiding the information within commonly
used image files, which do not raise suspicion and are typically exchanged in digital
communication. The system’s resistance to tampering and manipulation ensures the
integrity of the hidden data, even if the image is modified by processes such as noise
addition or contrast adjustments.
Intended to be user-friendly, the system will allow both technical and non-technical users
to easily encode and decode secret information using a simple web-based interface. It has
practical applications in a wide range of fields, such as secure messaging, digital
watermarking for intellectual property protection, and privacy protection in personal
communication. Image Encode System is also scalable, with future updates expected to
support additional file formats or advanced techniques in steganography.
1.5 Development Methodology
 Conduct a thorough analysis of existing system to identify strength and weakness.
 Create user interface designs.
 Develop the system using Python, Django, and other web technologies.
 Test the system thoroughly for functionality, usability and security.

2
CHAPTER 2: LITERATURE REVIEW
This is the second chapter in which technical review of the project takes place which
mainly focuses on the techniques and tools used for the developing project. It will focus
on the outlook of existing systems and tries to overcome the lacking of the current
system. This chapter helps to justify the importance of the project, and highlight how
different it will be from other similar systems. Literature reviews are a basis for research
in nearly every academic field.
2.1 Existing System
 OpenStego [1]:
OpenStego is a free and open-source tool designed for image-based steganography,
allowing users to embed hidden data within digital images without compromising their
visual quality. The tool uses Least Significant Bit (LSB) encoding, which ensures that the
alterations made to the image are imperceptible to the human eye, thus keeping the
hidden content undetectable. OpenStego features a simple, user-friendly interface that
makes it accessible to both technical and non-technical users. Users can easily encode and
decode secret messages within cover images, and it also provides an option to secure the
embedded data with a password, adding an extra layer of protection. However,
OpenStego focuses solely on the steganography aspect, lacking built-in encryption
methods, which may leave the hidden data vulnerable to attacks. Despite its limitations,
OpenStego remains a popular choice for users seeking a straightforward, open-source
solution for basic image-based steganography.
 Invisible Secrets [2]:
Invisible Secrets is a commercial steganography tool that allows users to hide files or text
inside images, audio files, or even video files. It offers a variety of file formats for
embedding secret information, providing a secure and undetectable way of transmitting
data. It also includes features like compression to further ensure the hidden data remains
inconspicuous. Despite its robust functionality, Invisible Secrets is a commercial product,
requiring users to purchase a license for full access to its capabilities. While the tool
offers a higher level of security and versatility than free alternatives, its complexity and
cost may deter casual users. Additionally, despite the added encryption, the tool remains
susceptible to some image and media processing attacks, making it less reliable in highly
secure environments.

3
2.2 Literature Review
While both OpenStego and Invisible Secrets offer distinct features and cater to the
steganography technique they each have their limitations. OpenStego, while user-friendly,
relies on basic LSB techniques, making it vulnerable to image manipulation and
steganalysis. It lacks built-in encryption and is limited in data capacity, which may
degrade the cover image’s quality. On the other hand, Invisible Secrets provides
encryption alongside steganography, adding complexity and reducing performance speed,
especially for large files. Despite its advanced features, it remains susceptible to image
processing attacks and can be overwhelming for non-technical users. Both tools lack the
ability to handle a wide variety of file types, limiting their versatility in more complex
applications.

2.3 Requirement Collection Method


The requirements for the project were acquired through the collection methods such as
analyzing the existing salon, gathering their faults and interviewing friends, supervisors
and seniors who have used other salon management system. Also, we reviewed some
documentations and journals related to steganography.

4
CHAPTER 3: SYSTEM ANALYSIS AND DESIGN
Well, from here the real work begins, development of the proposed system is analyzed
into details. It will analyze the tools and technologies used, data sources and
programming languages used and why.
3.1 Requirement Identification
3.1.1 Functional Requirement
 The system shall allow users to embed text messages within an image.
 The system shall allow users to embed one image within another image.
 The system shall provide a user-friendly interface for encoding and decoding data.
 The system shall ensure that the hidden data remains secure and undetectable.
3.1.2 Non-Functional Requirement
 The system must be compatible with commonly used web browsers (Chrome, Firefox,
Safari, etc.).
 The system must be secure.
 The system must be easy to maintain and upgrade.
 The system response time must be fast.

5
3.2 System Requirement
For a well-developed project, the system requirement is one of the most important factors.
The system comprises of the hardware requirement and the software requirement.
Software and hardware to be used in the project are tabulated below:

S.N. Software Purpose


1 Visual Studio Code Code Editor
2 Microsoft Word For documentation
3 Snipping Tool To take screenshots
4 Draw.io To draw use-case diagram and flowcharts
5 Online Gantt To draw Gantt chart
Table 1: Software Requirements

S.N. Hardware Specification

1 Processor Intel Core i3 2.0 GHz or higher

2 RAM 2GB or higher

Table 2: Hardware Requirements

6
3.3 Feasibility Study
3.3.1 Technical Feasibility
The system will be implemented using Python, a versatile and well-supported
programming language, alongside key libraries such as OpenCV, PIL and NumPy. These
technologies are particularly suitable for image processing tasks, as they offer efficient
tools for handling image manipulation and pixel-level operations. Python's OpenCV will
be leveraged for image loading, processing, and modification, ensuring smooth
integration of steganography techniques within images. The PIL library will assist with
image format conversion and manipulation, making it easier to handle various image
formats. NumPy will be used for efficient array manipulations, which is essential for
embedding data at the pixel level. Additionally, cryptographic libraries will be
incorporated to implement encryption for protecting the hidden data, ensuring that the
information is securely encoded before being embedded in the cover image. These
technologies are robust, well-documented, and widely used, ensuring the feasibility of the
project from a technical standpoint.
3.3.2 Operational Feasibility
The system is designed to be user-friendly, targeting individuals with minimal technical
knowledge. The main goal is to ensure that the encoding and decoding of hidden data are
straightforward processes that do not require extensive technical expertise. Users will be
able to load images, input the secret data they wish to hide, and perform encoding or
decoding with just a few clicks. The interface will guide the user through each step, from
selecting cover images to retrieving hidden data, ensuring that even non-technical users
can efficiently use the system.
3.3.3 Economic Feasibility
The economic feasibility of the project is favorable due to the minimal development costs
associated with using open-source tools and libraries. The core components of the system,
such as Python, OpenCV, PIL, and NumPy, are free and open-source, significantly
reducing the overall cost of development. Furthermore, there are no recurring licensing
fees or expensive hardware requirements, as the system can be deployed on standard
computer systems. This makes the system highly cost-effective for individuals and
organizations that require secure communication methods but are constrained by budget
limitations. The low cost of implementation, combined with the potential to scale the

7
system for various use cases, positions this project as an economically viable solution for
providing secure data transmission without significant financial investment.
3.3.4 Schedule Feasibility
The schedule for the Image Encode System project outlines a phased approach to
development, starting with the active Planning stage and subsequent inactive stages of
Analysis, Design, Coding, Testing, and Delivery. The projected is time lined from
February 5 to April 20, 2025. The project begins with Planning and Analysis in Week 1
(Feb 5 - Feb 11, 2025), where the project scope, objectives, and technologies (Python,
OpenCV, PIL, NumPy) are defined. The system's requirements and architecture are also
documented. In Week 2 (Feb 12 - Feb 18, 2025), the development environment is set up,
UI mockups are created, and data structures and algorithms for steganography are
defined. Weeks 3-4 (Feb 19 - Mar 4, 2025) will focus on the core development, where
image processing, encoding/decoding algorithms are implemented, and encryption is
integrated if needed. The functionality is tested during this phase. In Weeks 5-6 (Mar 5 -
Mar 18, 2025), the user interface will be developed and tested, ensuring the system is
user-friendly and efficient. Weeks 7-8 (Mar 19 - Apr 1, 2025) will be dedicated to testing
and debugging, including system and security testing to address any issues. In Week 9
(Apr 2 - Apr 8, 2025), the focus will shift to final documentation and review, completing
the user manual, installation guide, and project report.
Finally, in Week 10 (Apr 9 - Apr 15, 2025), the system will be deployed, and a
presentation will be prepared to showcase the project. A buffer period (Apr 16 - Apr 22,
2025) allows for any final adjustments or unforeseen delays.

Figure 1: Gantt Chart

8
3.4 Methodology
To implement the project, we are going to use the waterfall model (outcome of one phase
acts as input for next phase). The following illustration is a representation of the different
phases of the Waterfall Model.

Figure 2: Waterfall method


Our project's description is stable. Since we have well known, clean and fixed
requirements therefore it fits best for the software development. This model is simple,
easy to comprehend and user friendly. Phases are processed and finished one at a time in
this model, and they do not overlap. The waterfall model works well for smaller tasks
with well-defined sequences.

9
3.5 System Design

Figure 3: UseCase Diagram

10
3.6 Algorithm Analysis
In the Image Encode System project, two primary algorithms are utilized:
3.6.1 Least Significant Bit Algorithm (LSB)
The Least Significant Bit (LSB) algorithm is a simple and widely used technique in image
steganography. It works by embedding secret data in the least significant bit of the pixel
values in an image. The pixel values in an image are made up of color components (Red,
Green, and Blue), each of which has a range of values from 0 to 255. By modifying only,
the least significant bit of each color component, the LSB method embeds the binary
representation of the secret message without causing noticeable changes to the image. The
message is embedded by iterating through the pixels, replacing the least significant bit of
each component with a bit of the secret message. This technique is efficient, as it causes
minimal distortion to the image, making the hidden data imperceptible to the human eye.
Despite its simplicity, LSB is an effective method for hiding small amounts of data in
images.
3.6.2 Advanced Encryption Standard (AES)
AES (Advanced Encryption Standard) is a symmetric encryption algorithm used to secure
data by converting it into an unreadable format. AES operates on blocks of 128 bits and
supports key lengths of 128, 192, or 256 bits. The algorithm processes the data by
applying a series of transformations, including substitution, shifting, mixing, and adding
round keys, which are repeated for multiple rounds depending on the key length. The
result is a block of encrypted data that can only be decrypted with the correct key. In the
context of the Image Encode System project, AES is used to securely encrypt the secret
data before it is hidden in the image. This ensures that even if the image is intercepted, the
encrypted message remains protected. Only someone with the correct decryption key can
retrieve and read the secret data. AES provides a strong layer of security, making it ideal
for protecting sensitive information before embedding it within an image.

11
CHAPTER 4: EXPECTED OUTCOME
The expected outcomes of this project include the creation of a fully functional system
that enables secure hiding and retrieval of data using steganographic methods. The system
will ensure that the hidden information remains undetectable by making minimal,
undetectable changes to the image, maintaining its original quality and visual appearance.
By integrating both cryptographic and steganographic techniques, the project aims to
enhance the overall security of data transmission, providing a robust defense against
unauthorized access. The application will be designed with a focus on user experience,
ensuring it is intuitive and easy to use for individuals with minimal technical knowledge,
making secure communication accessible to a broader audience. Additionally, the system
will safeguard against unauthorized extraction of hidden data, incorporating measures to
protect the integrity and confidentiality of the information being transmitted. This
combination of security, usability, and image quality will ensure that the project meets its
goal of providing a secure, reliable, and efficient solution for hiding sensitive data.

12
CHAPTER 5: CONCLUSION
The Image Encode System project marks a significant advancement in the field of
steganography and data hiding, offering a robust solution for secure communication. By
utilizing the LSB technique, the system allows for the embedding and extraction of secret
messages or images within a cover image, ensuring that the hidden data remains
undetectable to unauthorized users. The simplicity and effectiveness of this technique
make it a valuable tool in a variety of applications, from protecting confidential
information to enabling secure communication across insecure channels.
The system’s design emphasizes user-friendliness, ensuring that even users with minimal
technical knowledge can easily encode and decode data. The focus on simplicity not only
makes it accessible to a wider audience but also enhances the overall user experience,
making secure data transmission both easy and efficient.
Furthermore, the project has the potential to contribute significantly to the ongoing
development of secure communication technologies. It provides a strong foundation for
future enhancements, such as integrating more advanced encryption techniques or
expanding its use to other media formats. As data security continues to grow in
importance, this system could play a crucial role in protecting sensitive information and
ensuring privacy in various fields, including business, personal communication, and even
governmental use. The Image Encode System project, therefore, represents a promising
solution for the future of digital security and secure data sharing.

13
REFERENCES

[1] "OpenStego: An Open Source Steganography Tool," 2019. [Online]. Available:


https://www.openstego.com/.
[2] "Invisible Secrets Steganography Tool," 2019. [Online]. Available:
https://www.invisiblesecrets.com/.

14

You might also like