ASP Final Report
ASP Final Report
A Project Report on
By
RUDRAYYA S 4MN20CS039
SRINIDHI S 4MN20CS047
VARSHINI K Y 4MN20CS054
SAHANA D P 4MN21CS403
2023-2024
MYSORE-571302
CERTIFICATE
This is to certified that the project work titled “DIGITAL DATA CONCEALMENT
USING ADVANCED STEGANOGRAPHY” has been successfully carried out by
RUDRAYYA S [4MN20CS039], SRINIDHI S [4MN20CS047], VARSHINI K Y
[4MN20CS054], SAHANA D P [4MN21CS403] bonafide students of Maharaja Institute
of Technology Thandavapura in partial fulfilment of requirements of Degree of
Bachelor of Engineering in Computer Science & Engineering of Visvesvaraya
Technological University, Belgaum during the academic year 2023-24. The project report
has been approved as it satisfies the academic requirements with respect to the project work
prescribed for Bachelor of Engineering Degree.
External Viva
Name of the Examiners Signature with date
1.
2.
ACKNOWLEDGEMENT
It gives us immense pleasure to bring our Project report entitled “DIGITAL DATA
CONCEALMENT USING ADVANCED STEGANOGRAPHY” in the Final Year
Engineering Course.
We are very thankful to Dr. Y T Krishne Gowda, Principal, MITT for having supported us in
our academic endeavours.
We would like to sincerely thank Our project guide Dr Ranjit K N, Associate Professor, Dept.
of CS & E for providing relevant information, valuable guidance and encouragement to complete
this report.
We would also like to thank all our teaching and non-teaching staff members of the Department
for their support. We are always thankful to our parents for their valuable support and guidance in
every step.
We express Our deepest gratitude and indebted thanks to MITT which has provided us an
opportunity in fulfilling our most cherished desire of reaching the goal.
RUDRAYYA S [4MN20CS039]
SRINIDHI S [4MN20CS047]
VARSHINI K Y [4MN20CS054]
SAHANA D P [4MN21CS403]
ABSTRACT
Steganography, an ancient art form, has evolved into a modern technique for covert
communication. It involves concealing a message within an innocuous carrier, such as an image, audio,
or video file, to evade detection. Unlike cryptography, which encrypts a message, steganography hides the
existence of the message itself. Utilizing imperceptible alterations in the carrier, steganography embeds
bits of information, imperceivable to the human eye or ear, yet retrievable by intended recipients using
specialized tools. This clandestine method finds applications in various fields, including cybersecurity,
digital watermarking, and espionage. With the exponential growth of digital media and communication
channels, steganography poses both a threat and a defense mechanism in the realm of information security.
Its continuous development challenges researchers and practitioners to create robust detection techniques
while also advancing the sophistication of concealment methods, shaping the ongoing cat-and-mouse
game of covert communication.
LIST OF CONTENTS
Page
Sl No. Index
No.
1 INTRODUCTION 1-5
1.1 Introduction 1
1.2 Overview with Problem Identification 3
1.3 Objective 3
1.4 Scope 3
1.5 Existing system 4
1.6 Proposed system 4
1.7 Applications 5
2 LITERATURE SURVEY 6-7
3 SYSTEM REQUIREMENT SPECIFICATION 8-13
3.1 Functional requirement 8
3.2 Non-Functional requirement 11
3.3 Hardware requirement 13
3.4 Software requirement 13
4 SYSTEM ANALYSIS AND DESIGN 14-18
4.1 System Analysis 14
4.2 System Architecture 14
4.3 High level design 15
4.3.1 Data flow Diagram 15
4.3.2 Use Case Diagram 16
4.4 Low level Design 18
4.4.1 Flow Chart 18
5 IMPLEMENTATION 20-27
5.1 Data collection and preprocessing 20
5.2 User interface components 20
5.3 Backend implementation 20
5.4 Image steganography 21
5.5 Video steganography 22
5.6 Audio steganography 24
5.7 Text steganography 26
6 TESTING 28-30
6.1 Design of test case 28
6.2 Types of Testing 28
6.2.1 Unit Testing 28
6.2.2 Integration Testing 28
6.2.3 Functional Testing 29
6.2.4 System Testing 30
6.2.5 White Box Testing 30
6.2.6 Black Box Testing 30
7 RESULTS AND SNAPSHOTS 33-36
7.1 Result Analysis 33
7.2 Snapshots 34
CONCLUSION AND FUTURE ENHANCEMENT 37
BIBLIOGRAPHY 38
LIST OF FIGURES
Figure Page
Figures Title
No. No.
4.2 System Architecture 15
4.3.1 User Data Flow Diagram 16
4.3.2 Use Case Diagram 17
4.4.1 Flow Chart 18
6.1 Black Box and White Box Testing 31
7.1 Login Page 34
7.2 Home Page 35
7.3 Encryption Page 35
7.4 Decryption Page 36
7.5 About Page 36
TABLE OF CONTENTS
CHAPTER 1
INTRODUCTION
1.1 Introduction
The term "steganography" is derived from the Greek words "steganos," meaning
covered or concealed, and "graphy," meaning writing or drawing. Throughout history,
steganography has been used in various forms to convey secret messages, from ancient
Greece to the digital age. Steganography, an ancient technique rooted in secrecy and
concealment, has persisted through the ages, adapting to the digital landscape of the
modern world. Its evolution mirrors the advancements in communication and
encryption, offering a covert means of hiding information within digital media. From
the clandestine messages of ancient civilizations to the sophisticated digital
manipulation of today, steganography remains a powerful tool for covert
communication, privacy preservation, and authentication.. Over time, methods became
more sophisticated, with invisible inks, microdots, and even musical notationemployed
to hide messages in plain sight. In the digital age, steganography has found a new home
within the vast array of digital media, including images, audio files, videos, and
text.Digital steganography operates on the principle of embedding secret data within a
carrier file, which appears unchanged to the naked eye or ear. This concealment is
achieved through various techniques, each tailored to exploit the specific
characteristics of different types of digital media. For instance, in images, the Least
Significant Bit (LSB) substitution technique alters the least significant bit of each byte
in the image file to encode hidden data. Similarly, in audio steganography, spread
spectrum techniques spread small bits of data across the frequency spectrum, making
them imperceptible to human ears.Transform domain techniques, such as Discrete
Cosine Transform (DCT) for images or Discrete Wavelet Transform (DWT) for audio,
involve embedding data in the frequency domain of the carrier signal, further enhancing
the concealment of hidden information. Text steganography, on the other hand, subtly
modifies text documents by altering spacing, using synonyms, or employing invisible
characters to hide messages within seemingly innocuous text.The applications of
steganography are diverse and far-reaching. One of its primary uses where
imperceptible alterations are made to media files to embed copyright information or
ownership.
1.3 Objective
The objective is to develop advanced steganalysis techniques capable of accurately
detecting hidden data within digital files. This involves leveraging machine learning, deep
neural networks, and signal processing methods to identify subtle deviations indicative of
steganographic manipulation, enhancing cybersecurity and safeguarding against covert
communication threats.
1.4 Scope
The scope encompasses researching and developing cutting-edge steganalysis
techniques to detect hidden data within various digital media formats. This includes
images, audio, video, and text files. The research involves leveraging machine learning
algorithms, deep neural networks, and signal processing methods to analyze complex
multimedia data and identify patterns indicative of steganographic manipulation. The
goal is to enhance cybersecurity measures and protect against covert communication
threats in the digital landscape.
1.7 Applications
1. Cybersecurity: The proposed system finds application in enhancing cybersecurity
measures by detecting covert communication channels used for malicious activities
such as data exfiltration, espionage, and cyberattacks.
2. Copy rights : by implementing the hidden data the owner ship of the original file can
beprotected either the image ,audio ,video etc.
3. Intelligence Agencies: Intelligence agencies can employ the system to monitor digital
communications for covert messaging among potential threats, enhancing national
securityefforts.
4. Corporate Security: Companies can use the system to protect sensitive information
and intellectual property by detecting attempts to hide data within digital files,
thereby mitigating risks of corporate espionage and data breaches.
5. Digital Watermarking: Forensic experts can employ the system to analyze digital
evidence and uncover hidden information within multimedia files, assisting in legal
proceedings and criminal investigations.
6. Social Media Monitoring: The system can be integrated into social media platforms
to detect covert communication channels used for spreading misinformation,
radicalization, or illicit activities.
7. Defense Sector: Military organizations can utilize the system to enhance
communications security (COMSEC) by detecting attempts to hide sensitive
information within digital communications, ensuring operational security and
mission success.
CHAPTER 2
LITERATURE SURVEY
Author
Title Method Result
And Year
Dang ninh Lsb data hiding in 1-bit LSB method The focus is on the
tran & hang- digital images seamless integration
jurgen of hidden data into
-2023 the least significant
bits (LSBs) of pixel
values, allowing the
complete disappear
from the visual
appearance of the
image . providing
the next level
protection and
privacy for the data
communication
Ritu sindhu Information edge bit embedding The final result of the
& pragathi hiding using application
singh -2020 steganography developed provides
the encryption and
decryption the data
that need to be
hidden and the data is
hidden in an cover
image providing the
total concealment
which cannot be seen
by eyes and the same
reversed method is
used to decrypt the
image to get the
secret message back.
Ayodeji
akinwumi Implementing Random bit The primary focus of
& image embedding steganography
Oluwatosi steganography communication for
n ogbeide technique secure data transfer
-2023 technique for ultimately providing
secure data hiding data security
in development of
android application
CHAPTER 3
SYSTEM REQUIREMENT SPECIFICATIONS
3.1 Functional Requirements
Functional requirement defines a function of a software system or its
component. A function is described as a set of inputs, behavior, and outputs. Functional
requirements maybe technical details, data manipulation, encryption and decryption of
data, processing, and other specific functionality that define what a system is supposed to
accomplish.
The various libraries used in the project are:
• Multer
• FFmpeg
• GDAL
• laravel
Multer:
Multer is a middleware for handling multipart/form-data in Node.js applications,
particularly useful for handling file uploads. It is designed to work seamlessly with
frameworks such as Express to simplify the process of uploading files from clients to
servers. Developed by the team behind Express.js, Multer provides a flexible and easy-to-
use solution for handling file uploads in Node.js applications.
One of the key features of Multer is its ability to handle various types of file
uploads, including single files, multiple files, and even complex forms with both text
fields and file inputs. It allows developers to specify the destination directory where
uploaded files should be stored and provides options for renaming files, limiting file size,
and filtering file typesto enhance security and control over the upload process.
Multer seamlessly integrates with middleware chains in Express applications,
making it easy to incorporate file upload functionality into existing routes and controllers.
It provides middleware functions that can be mounted to specific routes or used globally to
handle fileuploads across the entire application.
FFmpeg
FFmpeg stands as a cornerstone in the realm of multimedia processing, offering a
comprehensive suite of tools for encoding, decoding, transcoding, and manipulating
audio and video files.
Department of CS&E, Page 9
MITT
MITT
Digital Data Concealment using Advance Steganography 2023-2024
Including popular standards like MP3, AAC, WAV, FLAC, MP4, and AVI, among
others. This cross- platform framework operates seamlessly on Linux, macOS, Windows,
and BSD, providing accessibility to a diverse user base. With its command-line interface,
users can execute commands to perform diverse multimedia operations effortlessly, from
basic file conversions to complex filtering and streaming tasks. Thanks to its modular
architecture and rich set of libraries, FFmpeg is highly flexible and extensible,
empowering developers to build custom multimedia applications or integrate its
functionality into existing projects with ease. From decoding and encoding audio/video
streams to extracting tracks, applying effects, and streaming content over networks,
FFmpeg serves as a Swiss Army knife for multimedia processing. Supported by an active
community and extensive documentation, FFmpeg remains an indispensable tool for
multimedia enthusiasts, developers, and professionals seeking powerful and reliable
solutions for their audio and video processing needs.
GDAL:
Laravel passport
Laravel Passport is an Authitication server implementation that provides a full-
featured authentication system for Laravel applications, making it easier to authenticate
users and issue access tokens for API authentication. Developed by the Laravel
community and integrated seamlessly into the Laravel framework, Passport offers a
simple and secure way to implement token-based authentication, enabling developers to
build secure APIs with minimal effort. With Passport, developers can easily generate
OAuth2 tokens for users, manage token lifetimes and scopes, and authenticate API
requests using tokens. It supports various OAuth2 grant types, including Authorization
Code, Implicit, Password, and Client Credentials, catering to different authentication
scenarios. Additionally, Passport integrates smoothly with Laravel's authentication
system, allowing developers to authenticate users via the web interface and API
simultaneously. Passport also provides a convenient API for managing clients and
personal access tokens, making it easy to create and revoke tokens as needed. Overall,
Laravel Passport simplifies the process of implementing authentication in Laravel
applications, offering a robust and flexible solution for securing APIs and protecting
sensitive data.
The Number One HTTP Server On The Internet¶. The Apache HTTP Server Project
is an effort to develop and maintain an open-source HTTP server for modern operating
systems including UNIX and Windows. The goal of this project is to provide a secure,
efficient and extensible server that provides HTTP services in sync with the current
HTTPstandards.
As Front-End Web Developer Pat DePuydt explains in the video above, the front
end is the part of the website a user or customer interacts with. A lot goes into making the
front end work, including database architecture, frameworks, scaling solutions, and more.
It includes: Styles: This includes the buttons, layouts, inputs, text, images.
HTML as the skeleton of a webpage. It's used to structure a webpage's content, and
it also tells the web browser how to display it. As Front-End Web Developer Pat
DePuydt explains in the video above, the front end is the part of the website a user or
customer interacts with. A lot goes into making the front end work, including database
architecture, frameworks, scaling solutions, and more. It includes: Styles: This includes
the buttons, layouts, inputs, text, images, and more.
JavaScript (JS) is a lightweight, interpreted, or just-in-time compiled programming
language with first-class functions. While it is most well-known as the scripting
language for Web pages. PHP can generate dynamic page content PHP can create, open,
read, write,delete, and close files on the server , PHP can collect form data PHP can send
and receive cookies PHP can add, delete, modify data in your database and PHP can be
used to controluser-access PHP can encrypt data.
Mysql Server :
The data in the system has to be stored and retrieved from database. Designingthe
database is part of system design. Data elements and data structures to be storedhave been
identified at analysis stage. They are structured and put together to designthe data storage
and retrieval system.
A database is a collection of interrelated data stored with minimum redundancyto
serve many users quickly and efficiently. The general objective is to make database access
easy, quick, inexpensive and flexible for the user. Relationships areestablished between
the data items and unnecessary data items are removed.Normalization is done to get an
internal consistency of data and to have minimum redundancy and maximum stability.
This ensures minimizing data storage required,minimizing chances of data inconsistencies
and optimizing for updates. The MS Access database has been chosen for developing the
relevant databases.
3.2 Non-Functional Requirements
Non-Functional Requirements describe the aspect of the system that is not directly
related to its functional behavior. Non-functional requirements define system properties
and constraints it arises through user needs, because of budget constraints or organizational
policies, or due to external factors such as safety regulations, privacy registration and so
on. Relationships areestablished between the data items and unnecessary data items are
removed.Normalization is done to get an internal consistency of data and to have
minimum redundancy and maximum stability.
Department of CS&E, MITT Page 12
Digital Data Concealment using Advance Steganography 2023-2024
CHAPTER 4
SYSTEM ANALYSIS AND DESIGN
4.1 System Analysis
The system design process builds up general framework building design. The
programming outline includes speaking to the product framework works in a shape that
may be changed into one or more projects. The prerequisite indicated by the end client
must be put systematically. An outline is an inventive procedure; a great configuration is
a way to the viable framework. The framework "Outline" is characterized as "The
procedure of applying different systems and standards with the end goal of characterizing
a procedure or a framework inadequate point of interest to allow its physical
acknowledgment”. Different configuration components are taken after to add to the
framework. The configuration detail portrays the components of the framework, the
segments or components of the framework, and their appearance to end clients.
Data flow: the path that the data takes between the external entities, processes and data
stores. It portrays the interface between the other mechanism and is shown with arrows,
typically label with a short data name, like "Billing details".
or functionality the system can perform. Relationships between the actors and use cases
can be of different types, including association, extend, and include. Association
relationships show that an actor is associated with a particular use case.
4.4.1 Flowchart
A flowchart is a diagram that represents a set of instructions. Flowcharts normally
use standard symbols to represent the different types of instructions. These symbols are
used to construct the flowchart and show the step-by-step solution to the problem.
CHAPTER-5
IMPLEMENTATION
5.1 Data Collection and Preprocessing
In the proposed steganalysis system, data collection and processing are essential
stages aimed at gathering a diverse dataset of digital media files and extracting relevant
features for subsequent analysis. During the data collection phase, various types of digital
media, including images, audio recordings, video clips, and text documents, are acquired
from different sources and platforms. Metadata extraction is performed to capture
relevant information such as file format, size, and timestamps. Additionally, the dataset
undergoes annotation and labeling to differentiate between files containing hidden data
(steganographic content) and those without (clean content). Subsequently, in the data
processing stage, preprocessing steps standardize the format and resolution of digital
files, while feature extraction techniques capture important characteristics such as pixel
values for images, frequency coefficients for audio, and textual features for documents.
Dimensionality reduction methods may be applied to reduce the feature space
dimensionality, followed by optional data augmentation techniques to increase dataset
diversity. Finally, the dataset is embedded or extracted as per the user choice Through
meticulous data collection and processing, the steganalysis system ensures the availability
of high-quality data for robust analysis and model development.
JPEG Images: JPEG (Joint Photographic Experts Group) images are one of the most
common types of images used for steganography due to their widespread use on the
internet and in digital photography. The lossy compression used in JPEG images allows
for hidden data to be embedded without significantly affecting the image quality.
PNG Images: PNG (Portable Network Graphics) images are another popular choice for
steganography. While PNG images use lossless compression, which preserves image
quality, they can still be used for hiding data by manipulating the pixel values.
BMP Images: BMP (Bitmap) images are uncompressed images that store color data for
each pixel in the image. While less common on the internet due to their larger file sizes,
BMP images can be used for steganography by directly manipulating the pixel values.
GIF Images: GIF (Graphics Interchange Format) images support animation and are
commonly used for simple graphics and animations on the web. While less common for
steganography due to their limited color palette and lossy compression.
TIFF Images: TIFF (Tagged Image File Format) images are often used in professional
photography and publishing due to their support for lossless compression and high-
quality images. TIFF images can be used for steganography, although they are less
common for this purpose compared to JPEG and PNG images.
Embedding plaintext information within the least significant bits (LSBs) of image
pixels. The plaintext, along with encryption key metadata, is encrypted using a symmetric
encryption algorithm like AES-256.
Encoding Steps:
Step 1: Load the cover image (the image in which you want to hide data) using PHP's
imagecreatefromjpeg function.
Step 2: Convert the secret message or data that you want tohide into binary format. Each
character is represented by its ASCII value.
Step 3: Iterate over each pixel of the cover image. For each pixel, replace the least
significant bit (LSB) of each color component (R, G, B) with the corresponding bit of the
secret message. This is done to minimize the visual impact onthe cover image.
Step 4: Save the image with the embedded data using PHP's imagejpegfunction.
Step 2: Iterate over each pixel of the stego image. Extract the least significant bit (LSB)
from each color component (R, G, B) of every pixel.
Step 3: the LSBs to form binary bytes, then convert each byte to its corresponding ASCII
character.
Step 4: Continue decoding until a null character (ASCII code 0) is encountered, indicating
the end of the hidden message.
Step 5: Present the decoded message, which was hidden within the stego image.
5.5 Video steganography:
Steganography can be applied to various video formats, but some formats are more
commonly used due to their popularity, widespread support, and characteristics that make
them suitable for steganographic techniques. Here are some types of video formats often
used in steganography:
AVI (Audio Video Interleave): AVI is a widely supported video format developed by
Microsoft. It supports both audio and video data and is commonly used for storing
multimedia content on Windows systems. AVI files are relatively straightforward and can
be manipulated for steganographic purposes.
MP4 (MPEG-4 Part 14): MP4 is a highly popular video format used for sharing video
content over the internet and on various devices. It supports advanced compression
techniques, making it suitable for steganography. MP4 files can contain audio, video, and
container format that can store video, audio, and subtitles in a single file. It is widely
used for storing high-definition video content and is suitable for steganographic purposes
due toits flexibility and support for various codecs.
WMV (Windows Media Video): WMV is a video format developed by Microsoft for
streaming and downloading multimedia content. It is commonly used for online video
streaming and can be used for steganography, particularly on Windows platforms.
FLV (Flash Video): FLV is a container format used for delivering video content overthe
internet, primarily through Adobe Flash Player. It is commonly used for online video
streaming and is suitable for steganography due to its widespread support and streaming
capabilities.
Step 3: Convert the extracted binary databack into text or the desired format of the hidden
message or data.
Step 4: Present the decoded message or data to the user.
Remember, the effectiveness of video steganography depends on various factors,
including the chosen embedding technique, the capacity of the carrier video, and the
robustness of the extraction process.
AAC (Advanced Audio Coding): AAC is an audio compression format commonly used
for streaming and storing high-quality audio. It offers better compression efficiency than
MP3 and is widely supported on various devices and platforms. AAC files can be used
for steganography, although embedding data in AAC files may require special
considerations due to the compression algorithm's complexity.
Encoding Algorithm Steps:
Concealing plaintext within the audio sample data, typically in the lower-amplitude
regions or least audible frequency bands. The plaintext, combined with encryption key
metadata, is encrypted using a robust symmetric encryption standard
Step 1: Load the cover audio file that will be used to embed the hidden data.
Step 2: Convert the secret message or data that you want to hide into binary format.
Step 3: Choose a steganographic technique suitable for audio, such as LSB substitution,
spread spectrum techniques, or phase coding.
Step 4: Iterate through each audio sample of thecover audio. Apply the chosen embedding
method to hide binary data within the audio samples.
Step 5: Save the audio file with the embedded data.
You'll need to utilize PHP libraries or extensions that support audio processing.
FFmpeg: Use FFmpeg with PHP to manipulate audio files programmatically, including
reading, modifying, and saving audio files.
GDAL Library: Although primarily for geospatial data, GDAL can be used for basic audio
manipulation.While the GDAL (Geospatial Data Abstraction Library) is indeed primarily
designed for geospatial data processing and manipulation, it does offer functionality
beyond just that domain. GDAL provides support for a wide range of raster and vector
geospatial data formats and includes various tools for data conversion, transformation.
CHAPTER 6
TESTING
6.1 Design of Test Case
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub-assemblies, assemblies, and/or a finished product It is the
process of exercising software with the intent of ensuring that the software system meets
its requirements and user expectations and does not fail unacceptably. There are various
types of tests. Each test type addresses a specific testing requirement. Test cases are a
crucial component of software testing, as they are used to ensure that a software application
or system is working as intended. A test case is a set of steps or actions that are executed to
verify the functionality, performance, and reliability of an application or system.
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual
software units of the application .it is done after the completion of an individual unit
before integration. This is structural testing, that relies on knowledge of its construction
and is invasive. Unit tests perform basic tests at the component level and test a specific
business process, application, and/or system configuration. Unit tests ensure that each
unique path of a business process performs accurately to the documented specifications
and contains clearly defined inputs and expected results. The benefits of unit testing
include improved code quality, reduced software defects, faster debugging and
troubleshooting, and greater confidence in the reliability of the software. By isolating and
testing individual components of a system, developers can identify and fix defects more
quickly and efficiently, reducingthe overall time and cost of software development.
The problems that arise from the combination of components. The benefits of
integration testing include improved software quality, reduced software defects, faster
debugging and troubleshooting, and greater confidence in the reliability of the software.
By testing the interactions between different software components, developers can ensure
that the software works as intended, and that all modules and services function correctly
and efficiently.
This testing can be complex and time-consuming, and requires careful planning and
coordination to ensure that all components are tested thoroughly and effectively. It should
be complemented by other testing methodologies such as unit testing, system testing, and
acceptance testing to provide a comprehensive and effective testing strategy.
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals. Functional testing is centered on the following items: Valid Input: identified
classes of valid input must be accepted. Invalid Input: identified classes of invalid input
must be rejected. Functions: identified functions must be exercised. Output: identified
classes of application outputs must be exercised. Systems/Procedures: interfacing systems
or procedures must be invoked. The organization and preparation of functional tests are
focused on requirements, key functions, or special test cases. In addition, systematic
coverage identifies business process flows; data fields, predefined processes, and
successive processes must be considered for testing. Before functional testing is complete,
additional tests are identified and the effective value of current tests is determined. The
benefits of functional testing include improved software quality, reduced software defects,
faster debugging and troubleshooting, and greater confidence in the reliability of the
software. By testing the software's functionality against its requirements, developers can
identify and fix defects and issues before the software is released to the end-user. However,
functional testing may not cover all aspects of the software, such as non-functional
requirements or compatibility with different hardware and software configurations.
Therefore, it should be complemented by other testing methodologies such as non-
functional testing and compatibility testing to provide a comprehensive and effective
testing strategy.
6.2.4 System Testing
System testing ensures that the entire integrated software system meets requirements.
It tests a configuration to ensure known and predictable results. An example of system
testing is the configuration-oriented system integration test. System testing is based on
process descriptions and flows, emphasizing pre-driven process links and integration
points. The benefits of system testing include improved software quality, reduced software
defects, faster debugging and troubleshooting, and greater confidence in the reliability of
the software. By testing the entire system as a whole, developers can identify and fix defects
and issues that may have been missed during integration testing or other testing phases.
However, system testing can be complex and time-consuming, and requires careful
planning and execution to ensure that all aspects of the software are tested thoroughly and
effectively. It should be complemented by other testing methodologies such as unit testing,
integration testing, and acceptance testing to provide a comprehensive and effective testing
strategy.
White Box Testing is a testing in which the software tester knows the inner workings,
structure, and language of the software, or at least its purpose. It is purpose. It is used to
test areas that cannot be reached from a black-box level. The benefits of white box testing
include improved code quality, reduced software defects, faster debugging and
troubleshooting, and greater confidence in the reliability of the software. By testing the
internal structure and implementation of the software, developers can identify and fix
defects and issues at an early stage, before they can propagate to other parts of the system
and become more difficult and expensive to fix. Therefore, it should be complemented by
other testing methodologies such as black box testing and grey box testing to provide a
comprehensive and effective testing strategy.
Black Box Testing is testing the software without any knowledge of the inner
workings, structure, or language of the module being tested. Black box tests, like most other
kinds of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document.
It is a testing in which the software under test is treated, as a black box. you cannot “see”
into it. The test provides inputs and responds to outputs without considering how the
software works. The benefits of black box testing include improved software quality,
reduced software defects, faster debugging and troubleshooting, and greater confidence in
the reliability of the software. By testing the software from the perspective of an end-user,
testers can identify and fix defects and issues that may impact the end-user experience.
However, black box testing may not cover all aspects of the software, such as internal logic
and control structures, and may not identify defects that are related to the software's internal
workings. Therefore, it should be complemented by other testing methodologies such as
white box testing and grey box testing to provide a comprehensive and effective testing
strategy. Black Box Testing is testing the software without any knowledge of the inner
workings, structure, or language of the module being tested. Black box tests, like most other
kinds of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document.
CHAPTER 7
RESULTS AND SNAPSHOTS
7.1 Analysis
Define the objectives: Firstly, establish the goals of the sign language recognition
project, specifying the types of sign language to recognize, the required accuracy rate, and
the performance metrics used for model evaluation.
Collect data: Gather a comprehensive dataset of sign language gestures along with
theircorresponding labels. Divide the dataset into training, validation, and testing subsets.
Train the model: Utilize deep learning techniques to train the model on the training
dataset. Experiment with various architectures and hyperparameters to optimize model
performance according to the predefined objectives.
Test the model: Assess the trained model's performance using the testing dataset,
measuring key metrics such as accuracy, precision, recall, and F1 score. Compare these
metrics against the established objectives.
Analyze the results: Examine the model's performance through techniques like
confusion matrix analysis, identifying instances of correct and incorrect predictions.
Investigate misclassifications to uncover patterns or challenges in recognizing specific
sign gestures.
Interpret the results: Interpret the findings within the context of the project's objectives
and evaluation metrics. Draw conclusions regarding the model's efficacy in sign
language recognition.
Make recommendations: Based on the conclusions drawn, propose suggestions for
enhancing the model or dataset. This may include expanding the dataset, incorporating
more diverse sign language variations, or exploring alternative deep learningarchitectures.
Communicate the results: Present the project outcomes to stakeholders and interested
parties in a clear and concise manner, leveraging data visualizations and other tools to
support conclusions and recommendations effectively.
Security and Detection Resistance: Evaluate the security of the steganographic method
against various detection techniques and adversaries. Examine the susceptibility of the
method to statistical analysis, visual inspection, or specialized steganalysis algorithms
designed to detect hidden data. Consider the trade-offs between hiding capacity and
detection resistance, aiming for a balance that ensures effective concealment while
minimizing the risk of detection.
7.2 Snapshots
[2] J. Li, J. Liu, G. Su, M. Zhang, and Y. Yang,(2021) ‘‘An generative steganography
method based on WGAN-GP,’’ in Proc. 2nd Int. Conf. Artif. Intell. Secur., Hohhot,
China, Communication
[3] Wahab O., Khalaf A., Hussein A. and Hamed F. (2021). Hiding Data Using Efficient
Combination of RSA Cryptography, and Compression Steganography Techniques,in
IEEE Access, vol. 9, pp. 31805-31815, 2021, doi: 10.1109/ACCESS.2021.3060317
[5] David Tidmarsh (2023). Guide to Steganography: Meaning, Types, Tools, &
Techniques. https://www.eccouncil.org/cybersecurity-exchange.
[6] X. Zhang, K. Chen, J. Ding, Y. Yang, W. Zhang and N. Yu,(2024). "Provably Secure
Public-Key Steganography Based on Elliptic Curve Cryptography," in IEEE
Transactions on Information Forensics and Security, vol. 19, pp. 3148-3163, 2024,
doi: 10.1109/TIFS.2024.3361219..
1 Assistant Professor, Dept. of Computer Science and Engineering, Maharaja Institute of Technology,
Thandavapura, Karnataka, India
2-5Students, Dept of Computer Science and Engineering, Maharaja Institute of Technology, country
© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 417
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072
techniques for data security, such as Steganography, steganography provides a foundation for secure
Cryptography, and Water marking to disguise data. communication and data protection but requires ongoing
research and development to address emerging threats and
[B] : Jayakanth Kunhoth1 Nandhini Subramanian1 enhance resilience against detection and attacks.
Somaya Al-Maadeed1 Ahmed Bouridane2 Video
steganography approach enables hiding chunks of secret 4. PROPOSED SYSTEM
information inside video sequences. The features of video
sequences including high capacity as well.structure make Our proposed steganography system integrates advanced
them the more desirable option when selecting a cover encryption techniques with image hiding algorithms to
material compared to other options like text, image, or conceal secret messages within digital images. Leveraging
audio.C. Sobin, SRM University AP, Amaravati, LSB (Least Significant Bit) insertion method for embedding
India,Engineering and Computer Science data ensures minimal visual distortion. Additionally,
Department, V. M. Manikandan, SRM University AP, employing AES (Advanced Encryption Standard)
Amaravati, India, encryption fortifies message security, enhancing resistance
against unauthorized access. The system offers a user-
[C] Department of Mechanical Design and Computer friendly interface for seamless encoding and decoding
Science. The steganography is a data hiding process which operations, facilitating efficient communication in sensitive
helps to transmit secure messages by embedding it into a contexts. Through meticulous attention to both security and
cover medium. The cover medium can be any digital usability, our project aims to provide a robust and reliable
information like images, audio, video, text file, etc. The steganographic solution for clandestine data transmission.
audio steganography is a very popular scheme in which an
audio signal will be used as a cover medium and the secret
message can be any digital data It may note that any digital
data can be shown as a sequence of bits irrespective of its
type. In general, an audio steganography scheme involves
two actors: a sender who will embed secret bits in audio and
send to the receiver, and a receiver who will extract the
secret message from the received audio signal and ignores
the cover audio signal used for data hidingprocess. as image,
text, or audio
3. EXISTING SYSYTEM
Existing systems often incorporate encryption mechanisms
to improve the security of hidden data, ensuring that even if
the carrier is intercepted, the concealed information
remains protected from unauthorized access. However,
despite these advancements, the existing systems may still
face challenges such as detection by advanced steganalysis
techniques or vulnerabilities in implementation leading to
potential exploitation. Overall, the existing system of
© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 418
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072
5. SYSTEM ARECHITECTURE
© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 419
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072
contractual 2-bit of each ZWCs, every 12 bit from conclusion audio file. Firstly we convert our secret message to its
of the word, stego file. point. Now we divide the 12 bit into binary equivalent and added delimiter '*****' to conclusion
two parts first 4 bit and another 8bit on which we do the xor of the message. For encoding we have modified the LSB
operation with 170(binary value 10101010). Now Algorithm, for that we take each frame byte of the
according to the first 4bit if its is "0110" we increment it by converting to 8 bit format then check for the 4th LSB and
48 else we decrement by 48. At last we convert the convert see if it matches with the secret message bit. If yes change
an ASCII value to the corresponding character to get the the 2nd LSB to 0 using logical AND operator between each
final hidden message from the stego file. frame byte and 253(11111101). Else we change the 2nd
LSB to 1 using logical AND operation with 253 and then
5.4 VEDIO STEGANOGRAPHY logical OR to change it to 1 and now add secret message bit
in LSB for achieving that use logical AND operation between
In video steganography we have used combination of
each frame byte of carrier audio and a binary number of 254
cryptography abd Steganography. We encode the message
(11111110).
through two parts We convert plaintext to cipher text for
doing so we have used Cryptography Algorithm RC4. RC 4 is
a variable-length key algorithm and stream cipher. A byte at
a time is encrypted using this approach. It is divided into
two main sections: encryption and decryption. KSA
(KeyScheduling Algorithm)- A list S of length 256 is made
and the entries of set to the values in ascending sequence,
ranging from 0 to 255. We request the user's key. and
convert it to its equivalent ascii code. S [] is a permutation
of 0,1,2. 255, now a variable j is assigned as
j=(j+S[i]+key[i%key_length) mod 256 and swap S(i) with
S(j) and accordingly we get new permutation for the whole
keystream according to the key.
© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 420
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072
6. RESULT
Result I s Shown bellow:
8. CONCLUSIONS
Conclusion, this steganography project confirms the efficacy
Fig -5: Audio Steganography of concealing information within digital media, highlighting its relevance in
secure communication and data protection.
Through rigorous analysis, it demonstrates the robustness
of modern techniques against common attacks and explores
their diverse applications in digital forensics and copyright
© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 421
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 11 Issue: 05 | May 2024 www.irjet.net p-ISSN: 2395-0072
ACKNOWLEDGEMENT
We wish to express our deepest appreciation to our
esteemed Project Guide, Prof. Hemanth, whose invaluable
guidance and suggestions have propelled our project
beyond our expectations. We extend our heartfelt gratitude
to our Project Coordinator, Dr. HK Chethan, for his
unwavering support and dedication in helping us complete
this project within a tight timeframe. We would also like to
acknowledge our Head of Department, Dr. Ranjit KN, for
fostering an environment that encourages innovation and
practical application of our academic Dr. Y curriculum.
Finally, we extend our sincerest thanks to our Principal, Dr.
Y T Krishne Gowda, for providing us with a golden
opportunity to carry out project on the topic of 'Digital Data
Concealment Using Advanced Steganography’.
REFERENCES
[1] Sabah Abdulazeez Jebur, Abbas Khalifa Nawar, Lubna
Emad Kadhim, Mothefer Majeed JaheferIman
AlKadhum Baghdad.
© 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 422