Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
36 views55 pages

ASP Final Report

Uploaded by

shk7676246389
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views55 pages

ASP Final Report

Uploaded by

shk7676246389
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“JNANA SANGAMA”, BELAGAVI, KARNATAKA-590018

A Project Report on

“DIGITAL DATA CONCEALMENT USING ADVANCED


STEGANOGRAPHY”
Submitted in partial fulfillment for the award of degree of Bachelor of Engineering in
Computer Science & Engineering during the year 2023 -2024

By
RUDRAYYA S 4MN20CS039

SRINIDHI S 4MN20CS047

VARSHINI K Y 4MN20CS054

SAHANA D P 4MN21CS403

Under the guidance of


Prof. Hemanth C
Assistant Professor
Dept of CS&E,
MIT Thandavapura

2023-2024

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

MAHARAJA INSTITUTE OF TECHNOLOGY THANDAVAPURA

JUST OFF NH 766, NANJANAGUDU TALUK, MYSORE DISTRICT – 571302


DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

MAHARAJA INSTITUTE OF TECHNOLOGY THANDAVAPURA

MYSORE-571302

CERTIFICATE
This is to certified that the project work titled “DIGITAL DATA CONCEALMENT
USING ADVANCED STEGANOGRAPHY” has been successfully carried out by
RUDRAYYA S [4MN20CS039], SRINIDHI S [4MN20CS047], VARSHINI K Y
[4MN20CS054], SAHANA D P [4MN21CS403] bonafide students of Maharaja Institute
of Technology Thandavapura in partial fulfilment of requirements of Degree of
Bachelor of Engineering in Computer Science & Engineering of Visvesvaraya
Technological University, Belgaum during the academic year 2023-24. The project report
has been approved as it satisfies the academic requirements with respect to the project work
prescribed for Bachelor of Engineering Degree.

Signature of guide Signature of the HOD Signature of the Principal


Prof. Hemanth C Dr. Ranjit K N Dr. Y. T. Krishne Gowda
Assistant Professor Associate Professor Principal
Dept of CS&E, HOD of CS&E, MIT Thandavapura
MIT Thandavapura MIT Thandavapura

External Viva
Name of the Examiners Signature with date

1.

2.
ACKNOWLEDGEMENT

It gives us immense pleasure to bring our Project report entitled “DIGITAL DATA
CONCEALMENT USING ADVANCED STEGANOGRAPHY” in the Final Year
Engineering Course.

We are very thankful to Dr. Y T Krishne Gowda, Principal, MITT for having supported us in
our academic endeavours.

We would like to sincerely thank Our project guide Dr Ranjit K N, Associate Professor, Dept.
of CS & E for providing relevant information, valuable guidance and encouragement to complete
this report.

We would also like to thank all our teaching and non-teaching staff members of the Department
for their support. We are always thankful to our parents for their valuable support and guidance in
every step.

We express Our deepest gratitude and indebted thanks to MITT which has provided us an
opportunity in fulfilling our most cherished desire of reaching the goal.

RUDRAYYA S [4MN20CS039]

SRINIDHI S [4MN20CS047]

VARSHINI K Y [4MN20CS054]

SAHANA D P [4MN21CS403]
ABSTRACT

Steganography, an ancient art form, has evolved into a modern technique for covert
communication. It involves concealing a message within an innocuous carrier, such as an image, audio,
or video file, to evade detection. Unlike cryptography, which encrypts a message, steganography hides the
existence of the message itself. Utilizing imperceptible alterations in the carrier, steganography embeds
bits of information, imperceivable to the human eye or ear, yet retrievable by intended recipients using
specialized tools. This clandestine method finds applications in various fields, including cybersecurity,
digital watermarking, and espionage. With the exponential growth of digital media and communication
channels, steganography poses both a threat and a defense mechanism in the realm of information security.
Its continuous development challenges researchers and practitioners to create robust detection techniques
while also advancing the sophistication of concealment methods, shaping the ongoing cat-and-mouse
game of covert communication.
LIST OF CONTENTS
Page
Sl No. Index
No.
1 INTRODUCTION 1-5
1.1 Introduction 1
1.2 Overview with Problem Identification 3
1.3 Objective 3
1.4 Scope 3
1.5 Existing system 4
1.6 Proposed system 4
1.7 Applications 5
2 LITERATURE SURVEY 6-7
3 SYSTEM REQUIREMENT SPECIFICATION 8-13
3.1 Functional requirement 8
3.2 Non-Functional requirement 11
3.3 Hardware requirement 13
3.4 Software requirement 13
4 SYSTEM ANALYSIS AND DESIGN 14-18
4.1 System Analysis 14
4.2 System Architecture 14
4.3 High level design 15
4.3.1 Data flow Diagram 15
4.3.2 Use Case Diagram 16
4.4 Low level Design 18
4.4.1 Flow Chart 18
5 IMPLEMENTATION 20-27
5.1 Data collection and preprocessing 20
5.2 User interface components 20
5.3 Backend implementation 20
5.4 Image steganography 21
5.5 Video steganography 22
5.6 Audio steganography 24
5.7 Text steganography 26
6 TESTING 28-30
6.1 Design of test case 28
6.2 Types of Testing 28
6.2.1 Unit Testing 28
6.2.2 Integration Testing 28
6.2.3 Functional Testing 29
6.2.4 System Testing 30
6.2.5 White Box Testing 30
6.2.6 Black Box Testing 30
7 RESULTS AND SNAPSHOTS 33-36
7.1 Result Analysis 33
7.2 Snapshots 34
CONCLUSION AND FUTURE ENHANCEMENT 37
BIBLIOGRAPHY 38
LIST OF FIGURES

Figure Page
Figures Title
No. No.
4.2 System Architecture 15
4.3.1 User Data Flow Diagram 16
4.3.2 Use Case Diagram 17
4.4.1 Flow Chart 18
6.1 Black Box and White Box Testing 31
7.1 Login Page 34
7.2 Home Page 35
7.3 Encryption Page 35
7.4 Decryption Page 36
7.5 About Page 36
TABLE OF CONTENTS

Table Table Title Page


No No
2.1 Literature Survey 7
3.1 Requirement Traceability Matrix 13
6.1 Test cases 32
7.1 Result Table 34
Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 1
INTRODUCTION
1.1 Introduction
The term "steganography" is derived from the Greek words "steganos," meaning
covered or concealed, and "graphy," meaning writing or drawing. Throughout history,
steganography has been used in various forms to convey secret messages, from ancient
Greece to the digital age. Steganography, an ancient technique rooted in secrecy and
concealment, has persisted through the ages, adapting to the digital landscape of the
modern world. Its evolution mirrors the advancements in communication and
encryption, offering a covert means of hiding information within digital media. From
the clandestine messages of ancient civilizations to the sophisticated digital
manipulation of today, steganography remains a powerful tool for covert
communication, privacy preservation, and authentication.. Over time, methods became
more sophisticated, with invisible inks, microdots, and even musical notationemployed
to hide messages in plain sight. In the digital age, steganography has found a new home
within the vast array of digital media, including images, audio files, videos, and
text.Digital steganography operates on the principle of embedding secret data within a
carrier file, which appears unchanged to the naked eye or ear. This concealment is
achieved through various techniques, each tailored to exploit the specific
characteristics of different types of digital media. For instance, in images, the Least
Significant Bit (LSB) substitution technique alters the least significant bit of each byte
in the image file to encode hidden data. Similarly, in audio steganography, spread
spectrum techniques spread small bits of data across the frequency spectrum, making
them imperceptible to human ears.Transform domain techniques, such as Discrete
Cosine Transform (DCT) for images or Discrete Wavelet Transform (DWT) for audio,
involve embedding data in the frequency domain of the carrier signal, further enhancing
the concealment of hidden information. Text steganography, on the other hand, subtly
modifies text documents by altering spacing, using synonyms, or employing invisible
characters to hide messages within seemingly innocuous text.The applications of
steganography are diverse and far-reaching. One of its primary uses where
imperceptible alterations are made to media files to embed copyright information or
ownership.

Department of CS&E, MITT Page 1


Digital Data Concealment using Advance Steganography 2023-2024

Information without arousing suspicion. Terrorist organizations, criminal networks,


and espionage agencies have been known to exploit steganography to conceal their
communications and coordinate illicit activities. Additionally, steganography is
employed in digital watermarking, where imperceptible alterations are made to media
files to embed copyright information or ownership details, providing a machinelearning-
based approaches and deep learning-based approaches. Machine learning approaches
first define features using one of the feature acquisition descriptors such as histogram of
oriented gradient(HOG) and then perform classification using a technique such as a
support vector machine(SVM).The HOG+SV Mapproachshows superior means of
authentication and protection against intellectual property theft.

Moreover, steganography serves as a tool for privacy preservation, allowing


individuals to hide sensitive information within seemingly innocuous files.,
steganography also presents several challenges and limitations. One of the primary
challenges is detection. Detecting steganographically altered content can be challenging,
requiring sophisticated algorithms and tools. Even then, it may not always be possible to
detect hidden information, especially if the techniques used are highly advanced.. Any
alteration to the carrier file could potentially compromise the hidden information,
rendering it unreadable or exposing it to detection. Additionally, the use of
steganography raises ethical concerns, particularly when it facilitates illegal activities
such as terrorism, child exploitation, or corporate espionage. In conclusion,
steganography continues to play a significant role in the digital age, offering a powerful
means of covert communication, privacy preservation, and authentication. Its evolution
from ancient times to the present day reflects the enduring human desire for secrecy and
concealment, as well as the ever-present need to navigate the delicate balance between
security, privacy, and ethics. As technology continues to advance, so too will the
techniques and applications of steganography, shaping its role in the digital landscape for
years to come.
In the digital age, steganography has found a new home within the vast array of
digital media, including images, audio files, videos, and text.Digital steganography
operates on the principle of embedding secret data within a carrier file, which appears
unchanged to the naked eye or ear. This concealment is achieved through various
techniques, each tailored to exploit the specific characteristics of different types of
digital media.

Department of CS&E, MITT Page 2


Digital Data Concealment using Advance Steganography 2023-2024

1.2 Overview with Problem Identification


Steganography is the practice of concealing messages or data within other seemingly
innocuous files or mediums in a manner that is highly resistant to detection. Unlike
cryptography, which focuses on making a message unintelligible to unauthorized parties,
steganography aims to hide the existence of the message itself. The history of
steganography dates back centuries, with techniques ranging from invisible ink and
microdots to modern digital methods. In the digital age, steganography has become
increasingly sophisticated, leveraging advanced algorithms and techniques to embed
hidden data within various types of digital media, including images, audio, video, and
text. Advanced steganographic methods often employ encryption to protect the hidden
data from unauthorized access and may combine multiple concealment techniques to
maximizecapacity and resilience.
The widespread use of digital communication channels has made steganography a
significant concern for cybersecurity professionals, law enforcement agencies, and
intelligence organizations. The ability to covertly transmit sensitive information poses
risks to national security, corporate espionage, and individual privacy. The primary
challenge in combating steganography lies in detecting hidden messages or data within
vast amounts of digital content. Traditional methods of steganalysis, which rely on
statistical analysis and visual inspection, are often ineffective against advanced
steganographic techniques that exploit the complexities of digital media formats and
encryption algorithms. Moreover, the proliferation of social media platforms, cloud
services, and decentralized communication networks has created new avenues for covert
communication, making it increasingly difficult to detect and prevent steganographic
activity.

1.3 Objective
The objective is to develop advanced steganalysis techniques capable of accurately
detecting hidden data within digital files. This involves leveraging machine learning, deep
neural networks, and signal processing methods to identify subtle deviations indicative of
steganographic manipulation, enhancing cybersecurity and safeguarding against covert
communication threats.

1.4 Scope
The scope encompasses researching and developing cutting-edge steganalysis

Department of CS&E, MITT Page 3


Digital Data Concealment using Advance Steganography 2023-2024

techniques to detect hidden data within various digital media formats. This includes
images, audio, video, and text files. The research involves leveraging machine learning
algorithms, deep neural networks, and signal processing methods to analyze complex
multimedia data and identify patterns indicative of steganographic manipulation. The
goal is to enhance cybersecurity measures and protect against covert communication
threats in the digital landscape.

1.5 Existing System


In the existing system, cryptograpgy , abfucation ,encryption methods . These
methods, while still prevalent, are becoming increasingly vulnerable to detection due to
advancements in steganalysis techniques. Steganalysis tools utilize statistical analysis,
machine learning algorithms, and signal processing methods to identify hidden data
within digital files. However, the existing system faces challenges in detecting
sophisticated steganographic methods that exploit encryption, advanced data embedding
techniques, and multimedia formats. Moreover, the proliferation of digital
communication channels and the decentralized nature of the internet pose additional
challenges for steganalysis. As a result, there is a growing need for more advanced
steganalysis techniques capable of detecting covert communication across diverse digital
media formats.

1.6 Proposed System


The proposed system aims to advance steganalysis capabilities by integrating cutting-
edge machine learning algorithms, deep neural networks, and signal processing
techniques. This system seeks to detect hidden data within digital files, including images,
audio, video, and text, with greater accuracy and efficiency than existing methods. By
leveraging the power of machine learning, the proposed system can learn and adapt to
evolving steganographic techniques, thereby enhancing its effectiveness in detecting
covert communication. Additionally, the system will prioritize minimizing false positives
while maximizing detection rates, ensuring reliable identification of steganographic
content. Moreover, the proposed system will facilitate interdisciplinary collaboration
between researchers in computer science, cryptography, signal processing, and
cybersecurity to develop holistic approaches to combatting steganographic threats.
Ultimately, the proposed system aims to bolster cybersecurity measures and safeguard
digital communication channels against covert communication activities.

Department of CS&E, MITT Page 4


Digital Data Concealment using Advance Steganography 2023-2024

1.7 Applications
1. Cybersecurity: The proposed system finds application in enhancing cybersecurity
measures by detecting covert communication channels used for malicious activities
such as data exfiltration, espionage, and cyberattacks.
2. Copy rights : by implementing the hidden data the owner ship of the original file can
beprotected either the image ,audio ,video etc.
3. Intelligence Agencies: Intelligence agencies can employ the system to monitor digital
communications for covert messaging among potential threats, enhancing national
securityefforts.
4. Corporate Security: Companies can use the system to protect sensitive information
and intellectual property by detecting attempts to hide data within digital files,
thereby mitigating risks of corporate espionage and data breaches.
5. Digital Watermarking: Forensic experts can employ the system to analyze digital
evidence and uncover hidden information within multimedia files, assisting in legal
proceedings and criminal investigations.
6. Social Media Monitoring: The system can be integrated into social media platforms
to detect covert communication channels used for spreading misinformation,
radicalization, or illicit activities.
7. Defense Sector: Military organizations can utilize the system to enhance
communications security (COMSEC) by detecting attempts to hide sensitive
information within digital communications, ensuring operational security and
mission success.

Department of CS&E, MITT Page 5


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 2
LITERATURE SURVEY
Author
Title Method Result
And Year

Dang ninh Lsb data hiding in 1-bit LSB method The focus is on the
tran & hang- digital images seamless integration
jurgen of hidden data into
-2023 the least significant
bits (LSBs) of pixel
values, allowing the
complete disappear
from the visual
appearance of the
image . providing
the next level
protection and
privacy for the data
communication

Ritu sindhu Information edge bit embedding The final result of the
& pragathi hiding using application
singh -2020 steganography developed provides
the encryption and
decryption the data
that need to be
hidden and the data is
hidden in an cover
image providing the
total concealment
which cannot be seen
by eyes and the same
reversed method is
used to decrypt the
image to get the
secret message back.

Ayodeji
akinwumi Implementing Random bit The primary focus of
& image embedding steganography
Oluwatosi steganography communication for
n ogbeide technique secure data transfer
-2023 technique for ultimately providing
secure data hiding data security
in development of
android application

Department of CS&E, MITT Page 7


Digital Data Concealment using Advance Steganography 2023-2024

Sabah Hiding information


abdil in digital images 2 and 4 bit LSB in this resesrch the
Azeez using LSB method LSB technique is
jabur & steganography used in two ways
abbas technique only the last two
nawar & significant bit is of
Emad each byte of pixel
kadhim will store. another
-2023 method is the four
least significant bit
where right half 4
bits of each channel
will store the
embedded data
Prof Image hiding by Spatial domain
Ghazali using spatial steganography can be
bin sulong domain 2 bit LSB method implemented in the 2
& prof steganography bit LSB method
dr.maria a using various
wimmer - programming
2021 language including
python which
provides rich image
processing libraries
with multiple image
editing tools and can
be implemented in
many algotithms

Table 2.1: Literature Survey

Department of CS&E, MITT Page 8


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 3
SYSTEM REQUIREMENT SPECIFICATIONS
3.1 Functional Requirements
Functional requirement defines a function of a software system or its
component. A function is described as a set of inputs, behavior, and outputs. Functional
requirements maybe technical details, data manipulation, encryption and decryption of
data, processing, and other specific functionality that define what a system is supposed to
accomplish.
The various libraries used in the project are:
• Multer
• FFmpeg
• GDAL
• laravel

Multer:
Multer is a middleware for handling multipart/form-data in Node.js applications,
particularly useful for handling file uploads. It is designed to work seamlessly with
frameworks such as Express to simplify the process of uploading files from clients to
servers. Developed by the team behind Express.js, Multer provides a flexible and easy-to-
use solution for handling file uploads in Node.js applications.
One of the key features of Multer is its ability to handle various types of file
uploads, including single files, multiple files, and even complex forms with both text
fields and file inputs. It allows developers to specify the destination directory where
uploaded files should be stored and provides options for renaming files, limiting file size,
and filtering file typesto enhance security and control over the upload process.
Multer seamlessly integrates with middleware chains in Express applications,
making it easy to incorporate file upload functionality into existing routes and controllers.
It provides middleware functions that can be mounted to specific routes or used globally to
handle fileuploads across the entire application.

FFmpeg
FFmpeg stands as a cornerstone in the realm of multimedia processing, offering a
comprehensive suite of tools for encoding, decoding, transcoding, and manipulating
audio and video files.
Department of CS&E, Page 9
MITT
MITT
Digital Data Concealment using Advance Steganography 2023-2024

Including popular standards like MP3, AAC, WAV, FLAC, MP4, and AVI, among
others. This cross- platform framework operates seamlessly on Linux, macOS, Windows,
and BSD, providing accessibility to a diverse user base. With its command-line interface,
users can execute commands to perform diverse multimedia operations effortlessly, from
basic file conversions to complex filtering and streaming tasks. Thanks to its modular
architecture and rich set of libraries, FFmpeg is highly flexible and extensible,
empowering developers to build custom multimedia applications or integrate its
functionality into existing projects with ease. From decoding and encoding audio/video
streams to extracting tracks, applying effects, and streaming content over networks,
FFmpeg serves as a Swiss Army knife for multimedia processing. Supported by an active
community and extensive documentation, FFmpeg remains an indispensable tool for
multimedia enthusiasts, developers, and professionals seeking powerful and reliable
solutions for their audio and video processing needs.

GDAL:

GDAL (Geospatial Data Abstraction Library) stands as a cornerstone in the realm of


geospatial data processing, offering a comprehensive suite of tools and functions for
reading, writing, and manipulating raster and vector geospatial data formats. Developed
collaboratively by a dedicated community of developers, GDAL boasts support for an
extensive range of formats, including GeoTIFF, ESRI Shapefile, GeoJSON, and KML,
among others. Its cross-platform nature ensures compatibility across Linux, macOS,
Windows, and various Unix-like systems, facilitating accessibility across diverse
environments. At its core, GDAL provides a unified interface for accessing and processing
geospatial data, enabling operations such as data conversion, reprojection, resampling, and
mosaicking. With a suite of command-line tools and bindings for popular programming
languages like Python and Java, GDAL empowers users to perform common geospatial
tasks efficiently, whether through direct command-line interaction or integration within
custom software applications. Widely utilized in Geographic Information System (GIS)
software and geospatial applications, GDAL serves as a fundamental component for data
access and manipulation. Supported by an active community, GDAL continues to evolve,
providing users with a robust and versatile solution for their geospatial data processing
needs. Developed collaboratively by a dedicated community of developers, GDAL boasts
support for across Linux, macOS, Windows, and various Unix-like systems, for accessing
and processing geospatial data, enabling operations such as data conversion.
Department of CS&E, Page 10
MITT
MITT
Digital Data Concealment using Advance Steganography 2023-2024

Laravel passport
Laravel Passport is an Authitication server implementation that provides a full-
featured authentication system for Laravel applications, making it easier to authenticate
users and issue access tokens for API authentication. Developed by the Laravel
community and integrated seamlessly into the Laravel framework, Passport offers a
simple and secure way to implement token-based authentication, enabling developers to
build secure APIs with minimal effort. With Passport, developers can easily generate
OAuth2 tokens for users, manage token lifetimes and scopes, and authenticate API
requests using tokens. It supports various OAuth2 grant types, including Authorization
Code, Implicit, Password, and Client Credentials, catering to different authentication
scenarios. Additionally, Passport integrates smoothly with Laravel's authentication
system, allowing developers to authenticate users via the web interface and API
simultaneously. Passport also provides a convenient API for managing clients and
personal access tokens, making it easy to create and revoke tokens as needed. Overall,
Laravel Passport simplifies the process of implementing authentication in Laravel
applications, offering a robust and flexible solution for securing APIs and protecting
sensitive data.

MySQL is a relational database management system based on the Structured Query


Language, which is the popular language for accessing and managing the records in the
database. MySQL is open-source and free software under the GNU license. MySQL
is a database system used on the web MySQL is a database system that runs on a server
MySQL is ideal for both small and large applications MySQL is very fast, reliable, and
easy to use MySQL uses standard SQL MySQL compiles on a number of platforms

The Number One HTTP Server On The Internet¶. The Apache HTTP Server Project
is an effort to develop and maintain an open-source HTTP server for modern operating
systems including UNIX and Windows. The goal of this project is to provide a secure,
efficient and extensible server that provides HTTP services in sync with the current
HTTPstandards.
As Front-End Web Developer Pat DePuydt explains in the video above, the front
end is the part of the website a user or customer interacts with. A lot goes into making the
front end work, including database architecture, frameworks, scaling solutions, and more.
It includes: Styles: This includes the buttons, layouts, inputs, text, images.

Department of CS&E, MITT Page 11


Digital Data Concealment using Advance Steganography 2023-2024

HTML as the skeleton of a webpage. It's used to structure a webpage's content, and
it also tells the web browser how to display it. As Front-End Web Developer Pat
DePuydt explains in the video above, the front end is the part of the website a user or
customer interacts with. A lot goes into making the front end work, including database
architecture, frameworks, scaling solutions, and more. It includes: Styles: This includes
the buttons, layouts, inputs, text, images, and more.
JavaScript (JS) is a lightweight, interpreted, or just-in-time compiled programming
language with first-class functions. While it is most well-known as the scripting
language for Web pages. PHP can generate dynamic page content PHP can create, open,
read, write,delete, and close files on the server , PHP can collect form data PHP can send
and receive cookies PHP can add, delete, modify data in your database and PHP can be
used to controluser-access PHP can encrypt data.
Mysql Server :
The data in the system has to be stored and retrieved from database. Designingthe
database is part of system design. Data elements and data structures to be storedhave been
identified at analysis stage. They are structured and put together to designthe data storage
and retrieval system.
A database is a collection of interrelated data stored with minimum redundancyto
serve many users quickly and efficiently. The general objective is to make database access
easy, quick, inexpensive and flexible for the user. Relationships areestablished between
the data items and unnecessary data items are removed.Normalization is done to get an
internal consistency of data and to have minimum redundancy and maximum stability.
This ensures minimizing data storage required,minimizing chances of data inconsistencies
and optimizing for updates. The MS Access database has been chosen for developing the
relevant databases.
3.2 Non-Functional Requirements
Non-Functional Requirements describe the aspect of the system that is not directly
related to its functional behavior. Non-functional requirements define system properties
and constraints it arises through user needs, because of budget constraints or organizational
policies, or due to external factors such as safety regulations, privacy registration and so

on. Relationships areestablished between the data items and unnecessary data items are
removed.Normalization is done to get an internal consistency of data and to have
minimum redundancy and maximum stability.
Department of CS&E, MITT Page 12
Digital Data Concealment using Advance Steganography 2023-2024

3.3 Hardware Requirements


• Central-Processor: Intel i5 2.4GHz
• Hard-Disk: 4OGB
• Ram: 2GB or above

3.4 Software Requirements


• Operating system: windows 10
• Coding Language: Server-side scripting languages like PHP, Node.js, or Python for
handling file uploads, encryption, decryption, and business logic.
• Framework: Frameworks such as Laravel (PHP), Express.js (Node.js), or Django
(Python) for structured development and MVC architecture.

• Tools: IDLE/ Visual Code,xamp.


3.5 Requirement Traceability Matrix

Serial Requirement Requirement Requirement


No ID Brief Description
1 RID-1 User Authentication Users must be able to
authenticate using
username and
password.
2 RID-2 Data Encryption All sensitive data
must be encrypted
using AES-256
encryption algorithm.
3 RID-3 Users should be able
File Upload to upload files in
various formats (e.g.,
PDF, DOCX).
4 RID-4 Access Control Access to sensitive
information should
be restricted based on
user roles.
5 RID-5 Audit Trail System must
maintain an audit
trail of user actions
for accountability.

Table 3.1: Requirement Traceability Matrix

Department of CS&E, MITT Page 13


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 4
SYSTEM ANALYSIS AND DESIGN
4.1 System Analysis

The system design process builds up general framework building design. The
programming outline includes speaking to the product framework works in a shape that
may be changed into one or more projects. The prerequisite indicated by the end client
must be put systematically. An outline is an inventive procedure; a great configuration is
a way to the viable framework. The framework "Outline" is characterized as "The
procedure of applying different systems and standards with the end goal of characterizing
a procedure or a framework inadequate point of interest to allow its physical
acknowledgment”. Different configuration components are taken after to add to the
framework. The configuration detail portrays the components of the framework, the
segments or components of the framework, and their appearance to end clients.

4.2 System Architecture

The architectural configuration procedure is concerned with building up a


fundamental basic system for a framework. It includes recognizing the real parts of the
framework and the interchange between these segments. The beginning configuration
procedure of recognizing these subsystems and building up a structure for subsystem
control and correspondence is called construction modeling outline and the yield of this
outlined procedure is a portrayal of the product structural planning. The proposed
architecture for this system is given below. It shows the way this system is designed and
the brief working of the system. A steganography system typically consists of a carrier
medium (such as an image or audio file), a secret message, an encoding algorithm to
embed the message into the carrier, and a decoding algorithm to extract the hidden
message. Security measures may include encryption of the message prior to embedding.
A steganography system comprises a carrier medium (like an image or audio), a
secret message, an encoding algorithm for embedding, and a decoding algorithm for
extraction. The carrier conceals the message, imperceptible to casual observers.
Encryption before embedding enhances security, requiring decryption for message
retrieval. Robust systems employ techniques to resist detection, like LSB (Least
Significant Bit) substitution or frequency domain manipulation.

Department of CS&E, MITT Page 14


Digital Data Concealment using Advance Steganography 2023-2024

Fig 4.2 System Architecture

4.3 High-Level Designs


High-Level Design (HLD) explains the architecture that would be used for developing
a software product. The architecture diagram provides an overview of an entire system,
identifying the main components that would be developed for their interfaces. The HLD uses
possibly non-technical to mildly technical terms that should be understandable to the
administrators of the system. In contrast, low-level design further exposes the logical
detailed design of each of these elements for programmers.

4.3.1 Data Flow Diagram


Data Flow Diagram is a graphical representation of the techniques and procedures that
contain, operate, preserve, and distribute information between machine parts as well as
between a device and its surroundings. It gains the position of a potent fashion statement
among Users and Systems thanks to its Seen illustration. The DFD structure allows one to
build up from a hierarchy of specific diagrams to a thorough evaluation. For the reasons
indicated below, DFD has seen a lot of use.

• Framework's logical data stream


• Determining the requirements for developing the physical framework
Department of CS&E, MITT Page 15
Digital Data Concealment using Advance Steganography 2023-2024

• Easy to understand documentation

• Creation of necessary manual and computerized frameworks

Fig 4.3.1 User Data Flow Diagram

Data flow: the path that the data takes between the external entities, processes and data
stores. It portrays the interface between the other mechanism and is shown with arrows,
typically label with a short data name, like "Billing details".

4.3.2 Use Case Diagram


A use case diagram is a graphical representation of the interactions between a system
and its users or external systems. It is a type of behavioral diagram in Unified Modeling
Language (UML) and is used to define the scope of a system and its requirements. The
primary elements of a use case diagram are actors and use cases. external systems that
interact with the system, while use cases represent the specific functionality or tasks that
the system can perform. Use case diagrams also help to establish a common
understanding of the system's requirements among stakeholders, including developers,
project managers, and users. They can be used to communicate the system's
functionality and requirements to all stakeholders, helping to ensure that everyone is on
the same page. A typical use case diagram includes actors, use cases, and relationships.
Actors are the usersor external systems that in while use cases represent the specific tasks

Department of CS&E, MITT Page 16


Digital Data Concealment using Advance Steganography 2023-2024

or functionality the system can perform. Relationships between the actors and use cases
can be of different types, including association, extend, and include. Association
relationships show that an actor is associated with a particular use case.

Fig 4.3.2 Use Case Diagram

Department of CS&E, MITT Page 17


Digital Data Concealment using Advance Steganography 2023-2024

4.4 Low-Level Design


Low-Level Design (LLD) is a component-level design process that follows a step by-
step refinement process. This process can be used for designing data structures, required
software architecture, source code, and ultimately, performance algorithms. Overall, the
data organization may be defined during requirement analysis and then refined during data
design work. During the detailed phase, the logical and functional design is done and the
design of application structure is developed during the High- Level Design. Low-level
diagrams are typically used in the development phase of a project to help engineers and
developers understand the specific details of the system's components and their
interactions. They are also used in testing and debugging to identify issues and optimize
performance. Low-level diagrams can include various types of diagrams, including
flowcharts, network diagrams, and component diagrams. Each type of diagram provides a
specific perspective on the system's components and interactions, depending on the
system's complexity and requirements.

4.4.1 Flowchart
A flowchart is a diagram that represents a set of instructions. Flowcharts normally
use standard symbols to represent the different types of instructions. These symbols are
used to construct the flowchart and show the step-by-step solution to the problem.

Fig 4.4.1 Flow Chart

Department of CS&E, MITT Page 18


Digital Data Concealment using Advance Steganography 2023-2024

1. Start : first start by registering or else logging in as user.


2. Selecting the process : the user has two options either he can embed(encrypt) the data
or he can extract (decrypt) the file.
3. Input Stage:
- Digital media files (images, audio, video, text) for steganalysis.
- Parameters for machine learning algorithms and signal processing techniques.
4. Preprocessing Stage:
- Data preprocessing steps such as normalization, feature extraction, and dimensionality
reduction.
5. Steganalysis Stage:
- Application of steganalysis techniques, including statistical analysis, machine learning
algorithms, and signal processing methods.
- Detection of hidden data within digital files.
6. Postprocessing Stage:
- Analysis of steganalysis results.
- Filtering and refinement of detected covert communication channels.
7. Output Stage:
- Presentation of steganalysis findings.
- Reporting of detected covert communication activities.
- Integration with security ecosystems for further action.
Each stage may have multiple subprocesses, and the flow diagram would illustrate the
sequential flow of data and processes within the system.

Department of CS&E, MITT Page 19


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER-5
IMPLEMENTATION
5.1 Data Collection and Preprocessing
In the proposed steganalysis system, data collection and processing are essential
stages aimed at gathering a diverse dataset of digital media files and extracting relevant
features for subsequent analysis. During the data collection phase, various types of digital
media, including images, audio recordings, video clips, and text documents, are acquired
from different sources and platforms. Metadata extraction is performed to capture
relevant information such as file format, size, and timestamps. Additionally, the dataset
undergoes annotation and labeling to differentiate between files containing hidden data
(steganographic content) and those without (clean content). Subsequently, in the data
processing stage, preprocessing steps standardize the format and resolution of digital
files, while feature extraction techniques capture important characteristics such as pixel
values for images, frequency coefficients for audio, and textual features for documents.
Dimensionality reduction methods may be applied to reduce the feature space
dimensionality, followed by optional data augmentation techniques to increase dataset
diversity. Finally, the dataset is embedded or extracted as per the user choice Through
meticulous data collection and processing, the steganalysis system ensures the availability
of high-quality data for robust analysis and model development.

5.2 User Interface Components


Implement user interface components, such as input forms, buttons, dropdowns,
and modals, to facilitate user interaction with the platform's features. Incorporate visual
elements, icons, and animations to enhance the user experience and provide feedback on
useractions

5.3 Backend Implementation


The intricacies of implementing the backend functionality of our web-based
platform using Python and the Django framework. Python, known for its simplicity and
versatility,coupled with Django's robust and scalable architecture, provided us with a
solid for developing a feature-rich and secure backend infrastructure. Here's anoverview
of the key components and methodologies employed in our backend.
Django is a high-level Python web framework that encourages rapid development
and clean, pragmatic design. It provides built-in features for handling web requests.
Department of CS&E, MITT Page 20
Digital Data Concealment using Advance Steganography 2023-2024

5.4 Image steganography:

Steganography can be applied to various types of images, as well as other digital


media. Here are some common types of images where steganography can be used:

JPEG Images: JPEG (Joint Photographic Experts Group) images are one of the most
common types of images used for steganography due to their widespread use on the
internet and in digital photography. The lossy compression used in JPEG images allows
for hidden data to be embedded without significantly affecting the image quality.

PNG Images: PNG (Portable Network Graphics) images are another popular choice for
steganography. While PNG images use lossless compression, which preserves image
quality, they can still be used for hiding data by manipulating the pixel values.

BMP Images: BMP (Bitmap) images are uncompressed images that store color data for
each pixel in the image. While less common on the internet due to their larger file sizes,
BMP images can be used for steganography by directly manipulating the pixel values.

GIF Images: GIF (Graphics Interchange Format) images support animation and are
commonly used for simple graphics and animations on the web. While less common for
steganography due to their limited color palette and lossy compression.

TIFF Images: TIFF (Tagged Image File Format) images are often used in professional
photography and publishing due to their support for lossless compression and high-
quality images. TIFF images can be used for steganography, although they are less
common for this purpose compared to JPEG and PNG images.

Image steganography Algorithm:

Embedding plaintext information within the least significant bits (LSBs) of image
pixels. The plaintext, along with encryption key metadata, is encrypted using a symmetric
encryption algorithm like AES-256.

Encoding Steps:

Step 1: Load the cover image (the image in which you want to hide data) using PHP's
imagecreatefromjpeg function.

Step 2: Convert the secret message or data that you want tohide into binary format. Each
character is represented by its ASCII value.

Department of CS&E, MITT Page 21


Digital Data Concealment using Advance Steganography 2023-2024

Step 3: Iterate over each pixel of the cover image. For each pixel, replace the least
significant bit (LSB) of each color component (R, G, B) with the corresponding bit of the
secret message. This is done to minimize the visual impact onthe cover image.

Step 4: Save the image with the embedded data using PHP's imagejpegfunction.

Decoding Algorithm Steps:


Step 1: Load the stego image (the image containing hidden data) using PHP's
imagecreatefromjpeg function.

Step 2: Iterate over each pixel of the stego image. Extract the least significant bit (LSB)
from each color component (R, G, B) of every pixel.

Step 3: the LSBs to form binary bytes, then convert each byte to its corresponding ASCII
character.

Step 4: Continue decoding until a null character (ASCII code 0) is encountered, indicating
the end of the hidden message.

Step 5: Present the decoded message, which was hidden within the stego image.
5.5 Video steganography:
Steganography can be applied to various video formats, but some formats are more
commonly used due to their popularity, widespread support, and characteristics that make
them suitable for steganographic techniques. Here are some types of video formats often
used in steganography:
AVI (Audio Video Interleave): AVI is a widely supported video format developed by
Microsoft. It supports both audio and video data and is commonly used for storing
multimedia content on Windows systems. AVI files are relatively straightforward and can
be manipulated for steganographic purposes.
MP4 (MPEG-4 Part 14): MP4 is a highly popular video format used for sharing video
content over the internet and on various devices. It supports advanced compression
techniques, making it suitable for steganography. MP4 files can contain audio, video, and

other data streams.


MKV (Matroska Multimedia Container): MKV is an open-source multimedia
container format that can store video, audio, and subtitles in a single file. It is widely
used for storing high-definition video content and is suitable for steganographic purposes
due toits flexibility and support for various codecs.

MKV (Matroska Multimedia Container): MKV is an open-source multimedia


Department of CS&E, MITT Page 22
Digital Data Concealment using Advance Steganography 2023-2024

container format that can store video, audio, and subtitles in a single file. It is widely
used for storing high-definition video content and is suitable for steganographic purposes
due toits flexibility and support for various codecs.
WMV (Windows Media Video): WMV is a video format developed by Microsoft for
streaming and downloading multimedia content. It is commonly used for online video
streaming and can be used for steganography, particularly on Windows platforms.
FLV (Flash Video): FLV is a container format used for delivering video content overthe
internet, primarily through Adobe Flash Player. It is commonly used for online video
streaming and is suitable for steganography due to its widespread support and streaming
capabilities.

Video steganography Algorithm:


Hiding encrypted plaintext within video frames or auxiliary data areas, preserving
synchronization and maintaining perceptual invisibility. Encrypted plaintext and
metadataare securely encoded into the video stream
Encoding (Embedding):
Step 1: Load the cover video file that will be used to embed the hidden data.
Step 2: Convert the secret message or data that you want tohide into binary format.
Step 3:Choose a steganographic technique suitable for videos, such as LSB substitution,
spread spectrum techniques, or audio-based methods.
Step 4: Iterate through each frame of the video. Apply the chosen embedding method to
hide binary data within the frames. This could involve modifying pixel values, audio
samples, or other frame attributes.
Step 5: Save the video file with the embedded data.

Decoding Algorithm Steps:


Step 1: Load the video file that contains the hidden data.
Step 2: Iterate through each frame of the video. Use the reverse process of the embedding
method to extract the hidden binary data from the frames.

Step 3: Convert the extracted binary databack into text or the desired format of the hidden
message or data.
Step 4: Present the decoded message or data to the user.
Remember, the effectiveness of video steganography depends on various factors,
including the chosen embedding technique, the capacity of the carrier video, and the
robustness of the extraction process.

Department of CS&E, MITT Page 23


Digital Data Concealment using Advance Steganography 2023-2024

PHP Functions for Video Processing:


You'll need to utilize PHP libraries or extensions that support video processing. Some
options include:
FFmpeg: Use FFmpeg with PHP to manipulate video files programmatically,including
reading, modifying, and saving video files.
GD Library: Although primarily for image manipulation, GD can be used for basicvideo
frame extraction and modification.
5.6 Audio steganography :
Steganography can be applied to various audio formats, enabling the hiding of secret
data within audio files while maintaining the audio's perceptual quality. Audio
steganography involves concealing secret information within audio files without
perceptibly altering the original sound. It typically exploits the imperfections in human
auditory perception. Techniques include LSB (Least Significant Bit) substitution, spread
spectrum modulation, and phase coding. LSB substitution replaces the least significant
bits of audio samples with secret data, minimizing perceptible changes. Here are some
common types of audio formats used in steganography:
WAV (Waveform Audio File Format): WAV is a standard audio file format developed
by Microsoft and IBM. It is uncompressed and supports high-quality audio, making it
suitable for steganographic applications. WAV files are widely supported across different
platforms and software.
MP3 (MPEG-1 Audio Layer III): MP3 is a popular audio compression format that
reduces file size while maintaining perceptual audio quality. Due to its widespread use
and support, MP3 files are commonly used for steganography. However, embedding data
in MP3 files requires careful consideration of the compression algorithm's effects on the
hidden data.
FLAC (Free Lossless Audio Codec): FLAC is a lossless audio compression format that
preserves the original audio quality while reducing file size. FLAC files are suitable for
steganography because they support lossless compression, ensuring that hidden data is
not corrupted during compression and decompression.
The nature of audio files allows for the embedding of additional data without
significantly altering the perceptible quality of the audio. By exploiting the properties of
human auditory perception, subtle modifications can be made to the audio data to encode
hidden information. FLAC supports embedding metadata within the audio file. This
metadata can be manipulated to hide additional information or provide instructions.

Department of CS&E, MITT Page 24


Digital Data Concealment using Advance Steganography 2023-2024

AAC (Advanced Audio Coding): AAC is an audio compression format commonly used
for streaming and storing high-quality audio. It offers better compression efficiency than
MP3 and is widely supported on various devices and platforms. AAC files can be used
for steganography, although embedding data in AAC files may require special
considerations due to the compression algorithm's complexity.
Encoding Algorithm Steps:

Concealing plaintext within the audio sample data, typically in the lower-amplitude
regions or least audible frequency bands. The plaintext, combined with encryption key
metadata, is encrypted using a robust symmetric encryption standard
Step 1: Load the cover audio file that will be used to embed the hidden data.
Step 2: Convert the secret message or data that you want to hide into binary format.
Step 3: Choose a steganographic technique suitable for audio, such as LSB substitution,
spread spectrum techniques, or phase coding.
Step 4: Iterate through each audio sample of thecover audio. Apply the chosen embedding
method to hide binary data within the audio samples.
Step 5: Save the audio file with the embedded data.

Decoding Algorithm Steps:


Step 1: Load the audio file that contains the hidden data.
Step 2: Iterate through each audio sample of the stego audio. Use the reverse process of
the embedding method to extract the hidden binary data from the audio samples.
Step 3: Convert the extracted binary data back into text or the desired format of the
hidden message or data.
Step 4: Present the decoded message or data to the user.

PHP Functions for Audio Processing:

You'll need to utilize PHP libraries or extensions that support audio processing.

FFmpeg: Use FFmpeg with PHP to manipulate audio files programmatically, including
reading, modifying, and saving audio files.
GDAL Library: Although primarily for geospatial data, GDAL can be used for basic audio
manipulation.While the GDAL (Geospatial Data Abstraction Library) is indeed primarily
designed for geospatial data processing and manipulation, it does offer functionality
beyond just that domain. GDAL provides support for a wide range of raster and vector
geospatial data formats and includes various tools for data conversion, transformation.

Department of CS&E, MITT Page 25


Digital Data Concealment using Advance Steganography 2023-2024

5.7 text steganography :


Steganography can be applied to various text formats, allowing for the hiding of secret
messages within text-based documents. Here are some common types of text formats used
in steganography.
Plain Text
Plain text is the simplest and most basic form of text representation, consisting of
unformatted text with no styling or formatting. Plain text files are commonly used for
steganography due to their simplicity and ease of manipulation.
Rich Text Format (RTF)
RTF is a document file format developed by Microsoft that allows for the inclusion
of text formatting, such as bold, italic, underline, font size, and font color. RTF files can
be used for steganography by embedding hidden data within the text or formatting
properties.HTML (Hypertext Markup Language)
HTML is the standard markup language used for creating web pages and web
applications. HTML files consist of structured text with tags that define the structure and
formatting of the content. HTML files can be used for steganography by hiding data
withinthe HTML code.
XML (Extensible Markup Language)
XML is a markup language similar to HTML, but it is designed to be more flexible
and extensible. XML files consist of structured text with customizable tags that define
thestructure and content of the data. XML files can be used for steganography by hiding
data within the XML code or by embedding data within specific XML elements or
attributes.
Encoding Algorithm Steps:
Step 1: Load the cover text document that will be used to embed thehidden message.
Step 2: Convert the secret message or data that you wantto hide into binary format.

Step 3:Choose a steganographic technique suitable for text, such as whitespace


manipulation, word substitution, or Unicode character modification.
Step 4: Apply the chosen embedding method to hide binary data within the cover text
document. This could involve modifying whitespace characters, substituting specific
words or characters, or altering the formatting of the text.
Step 5: Save the text document with the embedded data.
After completing the algorithm, the next step would be to verify the success of the
embedding process by ensuring that the hidden message can be extracted accurately.
Department of CS&E, MITT Page 26
Digital Data Concealment using Advance Steganography 2023-2024

Decoding Algorithm Steps:


Step 1: Load the text document that contains the hidden data.
Step 2: Apply the reverse process of the embedding method to extract the hidden
binary data from the stego text document.
Step 3: Convert the extracted binary data back into text or the desired format of the hidden
message or data.
Step 4: Present the decoded message or data to the user.

Department of CS&E, MITT Page 27


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 6
TESTING
6.1 Design of Test Case
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies, and/or a finished product It is the
process of exercising software with the intent of ensuring that the software system meets
its requirements and user expectations and does not fail unacceptably. There are various
types of tests. Each test type addresses a specific testing requirement. Test cases are a
crucial component of software testing, as they are used to ensure that a software application
or system is working as intended. A test case is a set of steps or actions that are executed to
verify the functionality, performance, and reliability of an application or system.

6.2 Types of Testing

6.2.1 Unit Testing

Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual
software units of the application .it is done after the completion of an individual unit
before integration. This is structural testing, that relies on knowledge of its construction
and is invasive. Unit tests perform basic tests at the component level and test a specific
business process, application, and/or system configuration. Unit tests ensure that each
unique path of a business process performs accurately to the documented specifications
and contains clearly defined inputs and expected results. The benefits of unit testing
include improved code quality, reduced software defects, faster debugging and
troubleshooting, and greater confidence in the reliability of the software. By isolating and
testing individual components of a system, developers can identify and fix defects more
quickly and efficiently, reducingthe overall time and cost of software development.

6.2.2 Integration Testing

Integration tests are designed to test integrated software components to determine if


they run as one program.

Department of CS&E, MITT Page 28


Digital Data Concealment using Advance Steganography 2023-2024

The problems that arise from the combination of components. The benefits of
integration testing include improved software quality, reduced software defects, faster
debugging and troubleshooting, and greater confidence in the reliability of the software.
By testing the interactions between different software components, developers can ensure
that the software works as intended, and that all modules and services function correctly
and efficiently.

This testing can be complex and time-consuming, and requires careful planning and
coordination to ensure that all components are tested thoroughly and effectively. It should
be complemented by other testing methodologies such as unit testing, system testing, and
acceptance testing to provide a comprehensive and effective testing strategy.

6.2.3 Functional Testing

Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals. Functional testing is centered on the following items: Valid Input: identified
classes of valid input must be accepted. Invalid Input: identified classes of invalid input
must be rejected. Functions: identified functions must be exercised. Output: identified
classes of application outputs must be exercised. Systems/Procedures: interfacing systems
or procedures must be invoked. The organization and preparation of functional tests are
focused on requirements, key functions, or special test cases. In addition, systematic
coverage identifies business process flows; data fields, predefined processes, and
successive processes must be considered for testing. Before functional testing is complete,
additional tests are identified and the effective value of current tests is determined. The
benefits of functional testing include improved software quality, reduced software defects,
faster debugging and troubleshooting, and greater confidence in the reliability of the
software. By testing the software's functionality against its requirements, developers can
identify and fix defects and issues before the software is released to the end-user. However,
functional testing may not cover all aspects of the software, such as non-functional
requirements or compatibility with different hardware and software configurations.
Therefore, it should be complemented by other testing methodologies such as non-
functional testing and compatibility testing to provide a comprehensive and effective
testing strategy.
6.2.4 System Testing

Department of CS&E, MITT Page 29


Digital Data Concealment using Advance Steganography 2023-2024

System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration-oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points. The benefits of system testing include improved software quality, reduced software
defects, faster debugging and troubleshooting, and greater confidence in the reliability of
the software. By testing the entire system as a whole, developers can identify and fix defects
and issues that may have been missed during integration testing or other testing phases.
However, system testing can be complex and time-consuming, and requires careful
planning and execution to ensure that all aspects of the software are tested thoroughly and
effectively. It should be complemented by other testing methodologies such as unit testing,
integration testing, and acceptance testing to provide a comprehensive and effective testing
strategy.

6.2.5 White Box Testing

White Box Testing is a testing in which the software tester knows the inner workings,
structure, and language of the software, or at least its purpose. It is purpose. It is used to
test areas that cannot be reached from a black-box level. The benefits of white box testing
include improved code quality, reduced software defects, faster debugging and
troubleshooting, and greater confidence in the reliability of the software. By testing the
internal structure and implementation of the software, developers can identify and fix
defects and issues at an early stage, before they can propagate to other parts of the system
and become more difficult and expensive to fix. Therefore, it should be complemented by
other testing methodologies such as black box testing and grey box testing to provide a
comprehensive and effective testing strategy.

6.2.6 Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner
workings, structure, or language of the module being tested. Black box tests, like most other
kinds of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document.
It is a testing in which the software under test is treated, as a black box. you cannot “see”
into it. The test provides inputs and responds to outputs without considering how the
software works. The benefits of black box testing include improved software quality,

Department of CS&E, MITT Page 30


Digital Data Concealment using Advance Steganography 2023-2024

reduced software defects, faster debugging and troubleshooting, and greater confidence in
the reliability of the software. By testing the software from the perspective of an end-user,
testers can identify and fix defects and issues that may impact the end-user experience.
However, black box testing may not cover all aspects of the software, such as internal logic
and control structures, and may not identify defects that are related to the software's internal
workings. Therefore, it should be complemented by other testing methodologies such as
white box testing and grey box testing to provide a comprehensive and effective testing
strategy. Black Box Testing is testing the software without any knowledge of the inner
workings, structure, or language of the module being tested. Black box tests, like most other
kinds of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document.

Fig 6.1: Black box and White box Testing

Department of CS&E, MITT Page 31


Digital Data Concealment using Advance Steganography 2023-2024

6.3 Test Cases


Sl Test Case Input 1 Input 2 Output Test Remarks
No Reference Result
.
1 TC-1 Text: "Hello None Encrypted Pass Encryption
World" Text successful

2 TC-2 Decrypted Pass


Encrypted
None Text Decryption
Text
successful

3 TC-3 Image Encrypted Pass


Text: "OpenAI" Encryption
Image
successful

4 TC-4 Decrypted Pass


Encrypted image None Text Decryption
successful

5 TC-5 Text: Encrypted Pass Encryption


"Steganography Video Video successful
"
6 TC-6 Decrypted Text Pass
Encrypted None Decryption
Video
successful

7 TC-7 Encrypted Pass Encryption


Text: Audio file Audio successful
"Confidential"

8 TC-8 Encrypted Decrypted Pass Decryption


Audio None Text successful

Table 6.1 Test cases

Department of CS&E, MITT Page 32


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 7
RESULTS AND SNAPSHOTS
7.1 Analysis
Define the objectives: Firstly, establish the goals of the sign language recognition
project, specifying the types of sign language to recognize, the required accuracy rate, and
the performance metrics used for model evaluation.
Collect data: Gather a comprehensive dataset of sign language gestures along with
theircorresponding labels. Divide the dataset into training, validation, and testing subsets.
Train the model: Utilize deep learning techniques to train the model on the training
dataset. Experiment with various architectures and hyperparameters to optimize model
performance according to the predefined objectives.
Test the model: Assess the trained model's performance using the testing dataset,
measuring key metrics such as accuracy, precision, recall, and F1 score. Compare these
metrics against the established objectives.
Analyze the results: Examine the model's performance through techniques like
confusion matrix analysis, identifying instances of correct and incorrect predictions.
Investigate misclassifications to uncover patterns or challenges in recognizing specific
sign gestures.
Interpret the results: Interpret the findings within the context of the project's objectives
and evaluation metrics. Draw conclusions regarding the model's efficacy in sign
language recognition.
Make recommendations: Based on the conclusions drawn, propose suggestions for
enhancing the model or dataset. This may include expanding the dataset, incorporating
more diverse sign language variations, or exploring alternative deep learningarchitectures.
Communicate the results: Present the project outcomes to stakeholders and interested
parties in a clear and concise manner, leveraging data visualizations and other tools to
support conclusions and recommendations effectively.
Security and Detection Resistance: Evaluate the security of the steganographic method
against various detection techniques and adversaries. Examine the susceptibility of the
method to statistical analysis, visual inspection, or specialized steganalysis algorithms
designed to detect hidden data. Consider the trade-offs between hiding capacity and
detection resistance, aiming for a balance that ensures effective concealment while
minimizing the risk of detection.

Department of CS&E, MITT Page 33


Digital Data Concealment using Advance Steganography 2023-2024

Method Input (File Output Remarks


chosen)
Text Text data Modified text file The output text file
Steganography looks similar to the
original but
contains hidden
data.
Image Cover image The output image
Steganography (e.g., .png, Steganographic image appears visually
.jpg) (e.g., .png, .jpg) similar to the cover
image but contains
hidden data.
Video Cover video The output video
Steganography (e.g., .mp4) Steganographic video looks similar to the
(e.g., .mp4) cover video but
contains concealed
information.
Audio Audio file Steganographic The output audio
Steganography (e.g., .wav) audio file (e.g., sounds similar to
.wav) the original but
contains hidden
information.

Table 7.1 Result Table

7.2 Snapshots

Fig 7.1 Login Page

Department of CS&E, MITT Page 34


Digital Data Concealment using Advance Steganography 2023-2024

Fig 7.2 Home Page

Fig 7.3 Encryption Page

Department of CS&E, MITT Page 35


Digital Data Concealment using Advance Steganography 2023-2024

Fig 7.4 Decryption Page

Fig 7.6 About Page

Department of CS&E, MITT Page 36


CONCLUSION AND FUTURE ENHANCEMENT
In conclusion, the proposed system represents a significant advancement in
steganalysis capabilities, leveraging cutting-edge machine learning algorithms, and signal
processing techniques to detect hidden data within digital files with unprecedented
accuracy and efficiency. By addressing the limitations of existing steganographic
detection methods, the system offers numerous advantages, including enhanced
cybersecurity measures, adaptability to emerging threats, and broad coverage across
multimedia formats. Its applications span various sectors, including cybersecurity, law
enforcement, intelligence, corporate security, digital forensics, social media monitoring,
defense, and the financial sector. Through interdisciplinary collaboration and ongoing
research, the proposed system contributes to strengthening overall cybersecurity
measures, safeguarding digital communication channels, and mitigating the risks
associated with covert communication activities in the digital domain.
Future enhancements may include real-time monitoring, automated threat
assessment, dynamic adversarial training, privacy-preserving techniques, cross-platform
compatibility, user-friendly interfaces, integration with security ecosystems, and
continuous research. These improvements aim to enhance the system's capabilities in
detecting covert communication channels, ensuring immediate response to threats,
adapting to evolving techniques, respecting privacy rights, covering diverse digital
platforms, facilitating ease of use, integrating with existing security infrastructure, and
staying abreast of emerging threats through ongoing research and development.
BIBLIOGRAPHY
[1] Ray, S. K., Ray, S. K., & Dey, S. (2020) Steganography for Digital Media Security:
Emerging Research and Opportunities. IGI Global..

[2] J. Li, J. Liu, G. Su, M. Zhang, and Y. Yang,(2021) ‘‘An generative steganography
method based on WGAN-GP,’’ in Proc. 2nd Int. Conf. Artif. Intell. Secur., Hohhot,
China, Communication

[3] Wahab O., Khalaf A., Hussein A. and Hamed F. (2021). Hiding Data Using Efficient
Combination of RSA Cryptography, and Compression Steganography Techniques,in
IEEE Access, vol. 9, pp. 31805-31815, 2021, doi: 10.1109/ACCESS.2021.3060317

[4] Omnia M. Mohammed E, Mohamed K, Afra A. , Khalid S(2022). Hybrid multistage


framework for data manipulation by steganography. Bulletin of Electrical Engineering
and Informatics vol. 11, No. 1, February 2022, pp.327~335 ISSN: 2302 -9285,
DOI:10.11591/eei.v11i1.3451

[5] David Tidmarsh (2023). Guide to Steganography: Meaning, Types, Tools, &
Techniques. https://www.eccouncil.org/cybersecurity-exchange.

[6] X. Zhang, K. Chen, J. Ding, Y. Yang, W. Zhang and N. Yu,(2024). "Provably Secure
Public-Key Steganography Based on Elliptic Curve Cryptography," in IEEE
Transactions on Information Forensics and Security, vol. 19, pp. 3148-3163, 2024,
doi: 10.1109/TIFS.2024.3361219..

[7] Rajabi-Ghaleh S, Olyaeefar B, Kheradmand R and Ahmadi-Kandjani S (2024) Image


security using steganography and cryptography with sweeping computational ghost
imaging. Front. Phys. 12:1336485. doi: 10.3389/fphy.2024.1336485
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072

DIGITAL DATA CONCEALMENT USING ADVANCED STEGANOGRAPHY


Mr. Hemanth C 1, Mr. Rudrayya S2, Mr. Srinidhi S3, Ms. Varshini K Y 4, Ms. Sahana D P5

1 Assistant Professor, Dept. of Computer Science and Engineering, Maharaja Institute of Technology,
Thandavapura, Karnataka, India
2-5Students, Dept of Computer Science and Engineering, Maharaja Institute of Technology, country

Thandavapura, Karnataka, India


---------------------------------------------------------------------***--------------------------------------------------------------------
-
Abstract - Steganography, an ancient art form, has evolved presenting both a threat to information safety additionally
into a modern technique for covert communication. It a challenge for detection and mitigation efforts. Despite
involves concealing a message within an innocuous carrier, advancements in detection methods, the continuous
like a picture, sound, or video to evade detection. Unlike evolution of steganographic techniques complicates the
cryptography, which encrypts a message, steganography task of identifying and intercepting hidden messages within
conceals the message's actual existence Utilizing digital carriers. Additionally, the proliferation of digital
imperceptible alterations in the carrier, steganography media platforms and communication channels exacerbates
embeds bits of information, imperceivable to the human eye the potential impact of steganography on sensitive data and
or ear, yet retrievable by intended recipients using critical infrastructure.
specialized tools. This clandestine method finds applications
in various fields, including cybersecurity, digital 1.2 OBJECTIVE
watermarking, and espionage. With the exponential growth
of digital media and communication channels, The objectives of steganography encompass several key
steganography poses both a threat and a defense mechanism aims. Firstly, it serves as a means of covert communication
in the realm of information security. Its continuous innocuous carriers like images or audio files. This includes
development challenges researchers and practitioners to applications such as digital watermarking to safeguard
create robust detection techniques while also advancing the intellectual property or embedding digital signatures for
sophistication of concealment methods, shaping the ongoing authentication. Additionally, steganography aims to
cat-and-mouse game of covert communication. enhance security by adding an extra layer of complexity to
data transmission and storage, making it more challenging
Key Words: Steganography, covert communication, for adversaries to identify and intercept hidden data.
concealment, carrier, cryptography, digital media, Moreover, steganography plays a role in anti-forensics by
imperceptible alterations, cybersecurity. concealing traces of illicit activities within digital content,
and in counter-forensics by aiding investigators in
1.INTRODUCTION
uncovering hidden information within digital evidence.
Advanced steganography represents the cutting edge of
1.3 SCOPE
covert communication techniques, leveraging sophisticated
methods to embed and extract information from digital The extent of steganography is extensive, encompassing
carriers with unprecedented stealth and resilience. In various domains like cybersecurity, digital forensics, and
contrast to traditional steganography, which primarily privacy protection. Its applications range from covert
focuses on concealing data within static images, audio, communication and data hiding to anti-forensics and
video text, advanced steganography explores innovative copyright protection. With the proliferation of digital media
approaches across a diverse range of multimedia formats, and communication channels, steganography continues to
including audio, video. Moreover, advanced steganography evolve, presenting new challenges and opportunities.
techniques often incorporate encryption mechanisms to
enhance security of the hidden data, ensuring that even if 2. LITERATURE SURVEY
the carrier is intercepted, the concealed information
remains protected from unauthorized access. [A] Sabah Abdulazeez Jebur, Abbas Khalifa Nawar,
Lubna
1.1 PROBLEM DEFINITION Emad Kadhim, Mothefer Majeed JaheferImanAl-Kadhum
College, Baghdad, The highest way to protect data from
In the realm of cybersecurity, steganography poses a intruder and unauthorized persons has developed into a
significant challenge as a covert communication technique, major issue. This matter led to the development of many

© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 417
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072

techniques for data security, such as Steganography, steganography provides a foundation for secure
Cryptography, and Water marking to disguise data. communication and data protection but requires ongoing
research and development to address emerging threats and
[B] : Jayakanth Kunhoth1 Nandhini Subramanian1 enhance resilience against detection and attacks.
Somaya Al-Maadeed1 Ahmed Bouridane2 Video
steganography approach enables hiding chunks of secret 4. PROPOSED SYSTEM
information inside video sequences. The features of video
sequences including high capacity as well.structure make Our proposed steganography system integrates advanced
them the more desirable option when selecting a cover encryption techniques with image hiding algorithms to
material compared to other options like text, image, or conceal secret messages within digital images. Leveraging
audio.C. Sobin, SRM University AP, Amaravati, LSB (Least Significant Bit) insertion method for embedding
India,Engineering and Computer Science data ensures minimal visual distortion. Additionally,
Department, V. M. Manikandan, SRM University AP, employing AES (Advanced Encryption Standard)
Amaravati, India, encryption fortifies message security, enhancing resistance
against unauthorized access. The system offers a user-
[C] Department of Mechanical Design and Computer friendly interface for seamless encoding and decoding
Science. The steganography is a data hiding process which operations, facilitating efficient communication in sensitive
helps to transmit secure messages by embedding it into a contexts. Through meticulous attention to both security and
cover medium. The cover medium can be any digital usability, our project aims to provide a robust and reliable
information like images, audio, video, text file, etc. The steganographic solution for clandestine data transmission.
audio steganography is a very popular scheme in which an
audio signal will be used as a cover medium and the secret
message can be any digital data It may note that any digital
data can be shown as a sequence of bits irrespective of its
type. In general, an audio steganography scheme involves
two actors: a sender who will embed secret bits in audio and
send to the receiver, and a receiver who will extract the
secret message from the received audio signal and ignores
the cover audio signal used for data hidingprocess. as image,
text, or audio

[D] M. Anusha Department of Computer Science,


Amrita Vishwa Vidyapeetham, Mysore, India, Amrita
University of Arts & Sciences Amrita University of & Amrita
Vishwa
Vidyapeetham, Mysore, India, Sciences / K. N. Bhanu Fig -1: Flow Diagram
Computer Science Department D. Divyashree Amrita
Vishwa Vidyapeetham, Mysore, India; Amrita School of Arts
& Sciences, Department of Computer Science. Data security
has gained an utmost importance due to the unprecedented
increase in the produced data over the internet, which is a
basic necessity of any application in information
technology. Steganography is a specialty of science to
manage and conceal a piece of important information inside
image, audio, video or text documents

3. EXISTING SYSYTEM
Existing systems often incorporate encryption mechanisms
to improve the security of hidden data, ensuring that even if
the carrier is intercepted, the concealed information
remains protected from unauthorized access. However,
despite these advancements, the existing systems may still
face challenges such as detection by advanced steganalysis
techniques or vulnerabilities in implementation leading to
potential exploitation. Overall, the existing system of

© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 418
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072

5. SYSTEM ARECHITECTURE

Fig -2: Use Case Diagram

Fig -3: Schematic Of The System Architecture

5.1 TEXT STEGANOGRAPHY

For every character of the secret message We get its ascii


value and it is incremented or decremented based on if ascii
value between 32 and 64 , Yes, it is incremented by 48(ascii
value for 0) else it is decremented by 48 Then xor the
obtained value with 170(binary equivalent-10101010)
Convert the obtained number from first two step to its
binary equivalent then add "0011" if it earlier belonged to
ascii value between 32 and 64 else add "0110" making it 12
bit for each character. With the final binary equivalent we
also 111111111111 as delimiter to find the end of message
Now from 12 bit representing each character every 2 bit is
replaced with equivalent ZWCs according to the table. Each
character is hidden after a word in the cover text. After
receiving a stego file, the extraction algorithm discovers the

© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 419
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072

contractual 2-bit of each ZWCs, every 12 bit from conclusion audio file. Firstly we convert our secret message to its
of the word, stego file. point. Now we divide the 12 bit into binary equivalent and added delimiter '*****' to conclusion
two parts first 4 bit and another 8bit on which we do the xor of the message. For encoding we have modified the LSB
operation with 170(binary value 10101010). Now Algorithm, for that we take each frame byte of the
according to the first 4bit if its is "0110" we increment it by converting to 8 bit format then check for the 4th LSB and
48 else we decrement by 48. At last we convert the convert see if it matches with the secret message bit. If yes change
an ASCII value to the corresponding character to get the the 2nd LSB to 0 using logical AND operator between each
final hidden message from the stego file. frame byte and 253(11111101). Else we change the 2nd
LSB to 1 using logical AND operation with 253 and then
5.4 VEDIO STEGANOGRAPHY logical OR to change it to 1 and now add secret message bit
in LSB for achieving that use logical AND operation between
In video steganography we have used combination of
each frame byte of carrier audio and a binary number of 254
cryptography abd Steganography. We encode the message
(11111110).
through two parts We convert plaintext to cipher text for
doing so we have used Cryptography Algorithm RC4. RC 4 is
a variable-length key algorithm and stream cipher. A byte at
a time is encrypted using this approach. It is divided into
two main sections: encryption and decryption. KSA
(KeyScheduling Algorithm)- A list S of length 256 is made
and the entries of set to the values in ascending sequence,
ranging from 0 to 255. We request the user's key. and
convert it to its equivalent ascii code. S [] is a permutation
of 0,1,2. 255, now a variable j is assigned as
j=(j+S[i]+key[i%key_length) mod 256 and swap S(i) with
S(j) and accordingly we get new permutation for the whole
keystream according to the key.

5.3 AUDIO STEGANOGRAPHY

In audio we will be using Cover Audio as a Cover file to


encode the given text. Wave module is used to read the

© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 420
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072

6. RESULT
Result I s Shown bellow:

Fig -5: Image Steganography

Fig -4: Text Steganography

Fig -5: Audio Steganography

8. CONCLUSIONS
Conclusion, this steganography project confirms the efficacy
Fig -5: Audio Steganography of concealing information within digital media, highlighting its relevance in
secure communication and data protection.
Through rigorous analysis, it demonstrates the robustness
of modern techniques against common attacks and explores
their diverse applications in digital forensics and copyright

© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 421
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072

protection. Looking ahead, future research should


prioritize enhancing security and exploring novel
applications in emerging technologies. This project
underscores steganography's pivotal role in safeguarding
digital information and privacy in an interconnected world,
contributing to ongoing efforts to mitigate risks associated
with unauthorized access and tampering.

ACKNOWLEDGEMENT
We wish to express our deepest appreciation to our
esteemed Project Guide, Prof. Hemanth, whose invaluable
guidance and suggestions have propelled our project
beyond our expectations. We extend our heartfelt gratitude
to our Project Coordinator, Dr. HK Chethan, for his
unwavering support and dedication in helping us complete
this project within a tight timeframe. We would also like to
acknowledge our Head of Department, Dr. Ranjit KN, for
fostering an environment that encourages innovation and
practical application of our academic Dr. Y curriculum.
Finally, we extend our sincerest thanks to our Principal, Dr.
Y T Krishne Gowda, for providing us with a golden
opportunity to carry out project on the topic of 'Digital Data
Concealment Using Advanced Steganography’.

REFERENCES
[1] Sabah Abdulazeez Jebur, Abbas Khalifa Nawar, Lubna
Emad Kadhim, Mothefer Majeed JaheferIman
AlKadhum Baghdad.

[2] Jayakanth Kunhoth1 Nandhini Subramanian1 Somaya


Al-Maadeed1.

[3] C.Sobin Department of Computer Science


and
Engineering, SRM University AP, Amaravati, IndiaV. M.
ManikandanDepartment of Computer Science and
Engineering.

[4] M. AnushaDepartment, Amrita School of Arts &


Sciences,
Amrita Vishwa Vidyapeetham, Mysore,K. N.
Bhanu,Amrita School of Arts & Sciences, Amrita
Vishwa Vidyapeetham, Mysore.

[5] M. Anusha , K. N. Bhanu Department of Computer


Science, Amrita School of Arts & Sciences, Amrita
Vishwa Vidyapeetham, Mysore, India

© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 422

You might also like