0% found this document useful (0 votes)
21 views

VPD Final Report Updated

Uploaded by

shk7676246389
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

VPD Final Report Updated

Uploaded by

shk7676246389
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 47

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“JNANA SANGAMA”, BELAGAVI, KARNATAKA-590018

Project Report on

“DIGITAL DATA CONCEALMENT USING ADVANCED


STEGANOGRAPHY”
Submitted in partial fulfillment for the award of degree of Bachelor of Engineering in
Computer Science & Engineering during the year 2023 -2024

By
RUDRAYYA S 4MN20CS039

SRINIDHI S 4MN20CS047

VARSHINI K Y 4MN20CS054

SAHANA D P 4MN21CS403

Under the guidance of


Prof. Hemanth C
Professor
Dept of CS&E,
MIT,
Thandavapura

2023-2024

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

MAHARAJA INSTITUTE OF TECHNOLOGY, THANDAVAPURA

JUST OFF NH 766, NANJANAGUDU TALUK, MYSORE DISTRICT – 571302


DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

MAHARAJA INSTITUTE OF TECHNOLOGY

THANDAVAPURA MYSORE-571302

CERTIFICATE
This is to certified that the project work titled “DIGITAL DATA CONCEALMENT
USING ADVANCED STEGANOGRAPHY” has been successfully carried out by
RUDRAYYA S [4MN20CS039], SRINIDHI S [4MN20CS047], VARSHINI K Y
[4MN20CS054], SAHANA D P [4MN21CS403] bonafide students of Maharaja Institute
of Technology Thandavapura in partial fulfilment of requirements of Degree of
Bachelor of Engineering in Computer Science & Engineering of Visvesvaraya
Technological University, Belgaum during the academic year 2023-24. The project report
has been approved as it satisfies the academic requirements with respect to the project
work prescribed for Bachelor of Engineering Degree.

Signature of guide Signature of the Signature of the Principal


Prof. Sumaiya HOD Dr. Ranjit K Dr. Y. T. Krishne Gowda
Assistant Professor N Associate Principal
Dept of CS&E, Professor HOD of MIT, Thandavapura
MIT, CS&E,
Thandavapura MIT, Thandavapura

External Viva
Name of the Examiners Signature with date

1.

2.
ABSTRACT

Steganography, an ancient art form, has evolved into a modern technique for covert
communication. It involves concealing a message within an innocuous carrier, such as an image, audio,
or video file, to evade detection. Unlike cryptography, which encrypts a message, steganography hides
the existence of the message itself. Utilizing imperceptible alterations in the carrier, steganography
embeds bits of information, imperceivable to the human eye or ear, yet retrievable by intended recipients
using specialized tools. This clandestine method finds applications in various fields, including
cybersecurity, digital watermarking, and espionage. With the exponential growth of digital media and
communication channels, steganography poses both a threat and a defense mechanism in the realm of
information security. Its continuous development challenges researchers and practitioners to create
robust detection techniques while also advancing the sophistication of concealment methods, shaping the
ongoing cat-and-mouse game of covert communication.
LIST OF CONTENTS
Page
Sl No. Index
No.
1 INTRODUCTION 1-5
1.1 Introduction 1
1.2 Overview with Problem Identification 3
1.3 Objective 3
1.4 Scope 4
1.5 Existing system 4
1.6 Proposed system 4
1.7 Applications 5
2 LITERATURE SURVEY 6-7
3 SYSTEM REQUIREMENT SPECIFICATION 8-13
3.1 Functional requirement 8
3.2 Non-Functional requirement 11
3.3 Hardware requirement 12
3.4 Software requirement 13
4 SYSTEM ANALYSIS AND DESIGN 14-18
4.1 System Analysis 14
4.2 System Architecture 14
4.3 High level design 15
4.3.1 Data flow Diagram 16
4.3.2 Use Case Diagram 17
4.4 Low level Design 18
4.4.1 Flow Chart 18
5 IMPLEMENTATION 20-27
5.1 Data collection and preprocessing 20
5.2 User interface components 20
5.3 Backend implementation 20
5.4 Image steganography 21
5.5 Video steganography 22
5.6 Audio steganography 24
5.7 Text steganography 26
6 TESTING 26-30
6.1 Design of test case 28
6.2 Types of Testing 28
6.2.1 Unit Testing 28
6.2.2 Integration Testing 28
6.2.3 Functional Testing 29
6.2.4 System Testing 30
6.2.5 White Box Testing 30
6.2.6 Black Box Testing 30
7 RESULTS AND SNAPSHOTS 31-37
7.1 Result Analysis 32
7.2 Snapshots 35
CONCLUSION AND FUTURE ENHANCEMENT 36
BIBLIOGRAPHY 37
LIST OF FIGURES

Figure Page
Figures Title
No. No.
4.2 System Architecture 13
4.3.1 Sequence Diagram 14
4.3.2 Use Case Diagram 15
4.4.1 Flow Chart 16
6.1 Black Box and White Box Testing 28
7.1 Home page 31
7.2 Upload image 31
7.3 32
7.4 Red Light Signaled and movement detection begins 32
7.5 When movement detected either eliminated or declared as winner 33
Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 1

INTRODUCTION

1.1 Introduction

The term "steganography" is derived from the Greek words "steganos,"


meaning covered or concealed, and "graphy," meaning writing or drawing.
Throughout history, steganography has been used in various forms to convey secret
messages, from ancient Greece to the digital age. Steganography, an ancient
technique rooted in secrecy and concealment, has persisted through the ages,
adapting to the digital landscape of the modern world. Its evolution mirrors the
advancements in communication and encryption, offering a covert means of hiding
information within digital media. From the clandestine messages of ancient
civilizations to the sophisticated digital manipulation of today, steganography
remains a powerful tool for covert communication, privacy preservation, and
authentication.. Over time, methods became more sophisticated, with invisible inks,
microdots, and even musical notation employed to hide messages in plain sight. In
the digital age, steganography has found a new home within the vast array of digital
media, including images, audio files, videos, and text.Digital steganography operates
on the principle of embedding secret data within a carrier file, which appears
unchanged to the naked eye or ear. This concealment is achieved through various
techniques, each tailored to exploit the specific characteristics of different types of
digital media. For instance, in images, the Least Significant Bit (LSB) substitution
technique alters the least significant bit of each byte in the image file to encode
hidden data. Similarly, in audio steganography, spread spectrum techniques spread
small bits of data across the frequency spectrum, making them imperceptible to
human ears.Transform domain techniques, such as Discrete Cosine Transform
(DCT) for images or Discrete Wavelet Transform (DWT) for audio, involve
embedding data in the frequency domain of the carrier signal, further enhancing the
concealment of hidden information. Text steganography, on the other hand, subtly
modifies text documents by altering spacing, using synonyms, or employing
invisible characters to hide messages within seemingly innocuous text.The
applications of steganography are diverse and far-reaching. One of its primary uses is
Department of CS&E, MITT Page 1
Digital Data Concealment using Advance Steganography 2023-2024

in covert communication, where it provides a means of exchanging sensitive


information without arousing suspicion. Terrorist organizations, criminal networks,
and espionage agencies have been known to exploit steganography to conceal their
communications and coordinate illicit activities. Additionally, steganography is
employed in digital watermarking, where imperceptible alterations are made to
media files to embed copyright information or ownership details, providing a
machine learning-based approaches and deep learning-based approaches. Machine
learning approaches first define features using one of the feature acquisition
descriptors such as histogram of oriented gradient(HOG) and then perform
classification using a technique such as a support vector machine(SVM).The
HOG+SV Mapproachshows superior means of authentication and protection against
intellectual property theft.

Moreover, steganography serves as a tool for privacy preservation, allowing


individuals to hide sensitive information within seemingly innocuous files.,
steganography also presents several challenges and limitations. One of the primary
challenges is detection. Detecting steganographically altered content can be
challenging, requiring sophisticated algorithms and tools. Even then, it may not
always be possible to detect hidden information, especially if the techniques used are
highly advanced.. Any alteration to the carrier file could potentially compromise the
hidden information, rendering it unreadable or exposing it to detection. Additionally,
the use of steganography raises ethical concerns, particularly when it facilitates
illegal activities such as terrorism, child exploitation, or corporate espionage. In
conclusion, steganography continues to play a significant role in the digital age,
offering a powerful means of covert communication, privacy preservation, and
authentication. Its evolution from ancient times to the present day reflects the
enduring human desire for secrecy and concealment, as well as the ever-present need
to navigate the delicate balance between security, privacy, and ethics. As technology
continues to advance, so too will the techniques and applications of steganography,
shaping its role in the digital landscape for years to come.

Department of CS&E, MITT Page 2


Digital Data Concealment using Advance Steganography 2023-2024

1.2 Overview with Problem Identification


Steganography is the practice of concealing messages or data within other seemingly
innocuous files or mediums in a manner that is highly resistant to detection. Unlike
cryptography, which focuses on making a message unintelligible to unauthorized parties,
steganography aims to hide the existence of the message itself. The history of
steganography dates back centuries, with techniques ranging from invisible ink and
microdots to modern digital methods. In the digital age, steganography has become
increasingly sophisticated, leveraging advanced algorithms and techniques to embed
hidden data within various types of digital media, including images, audio, video, and
text. Advanced steganographic methods often employ encryption to protect the hidden
data from unauthorized access and may combine multiple concealment techniques to
maximize capacity and resilience.

The widespread use of digital communication channels has made steganography a


significant concern for cybersecurity professionals, law enforcement agencies, and
intelligence organizations. The ability to covertly transmit sensitive information poses
risks to national security, corporate espionage, and individual privacy. The primary
challenge in combating steganography lies in detecting hidden messages or data within
vast amounts of digital content. Traditional methods of steganalysis, which rely on
statistical analysis and visual inspection, are often ineffective against advanced
steganographic techniques that exploit the complexities of digital media formats and
encryption algorithms. Moreover, the proliferation of social media platforms, cloud
services, and decentralized communication networks has created new avenues for covert
communication, making it increasingly difficult to detect and prevent steganographic
activity.

1.3 Objective
objective is to develop advanced steganalysis techniques capable of accurately
detecting hidden data within digital files. This involves leveraging machine learning, deep
neural networks, and signal processing methods to identify subtle deviations indicative of
steganographic manipulation, enhancing cybersecurity and safeguarding against covert
communication threats.

Department of CS&E, MITT Page 3


Digital Data Concealment using Advance Steganography 2023-2024

1.4 Scope
The scope encompasses researching and developing cutting-edge steganalysis
techniques to detect hidden data within various digital media formats. This includes
images, audio, video, and text files. The research involves leveraging machine learning
algorithms, deep neural networks, and signal processing methods to analyze complex
multimedia data and identify patterns indicative of steganographic manipulation. The goal
is to enhance cybersecurity measures and protect against covert communication threats in
the digital landscape.

1.5 Existing System


In the existing system, cryptograpgy , abfucation ,encryption methods . These methods,
while still prevalent, are becoming increasingly vulnerable to detection due to advancements in
steganalysis techniques. Steganalysis tools utilize statistical analysis, machine learning algorithms,
and signal processing methods to identify hidden data within digital files. However, the existing
system faces challenges in detecting sophisticated steganographic methods that exploit encryption,
advanced data embedding techniques, and multimedia formats. Moreover, the proliferation of
digital communication channels and the decentralized nature of the internet pose additional
challenges for steganalysis. As a result, there is a growing need for more advanced steganalysis
techniques capable of detecting covert communication across diverse digital media formats.

1.6 Proposed System

The proposed system aims to advance steganalysis capabilities by integrating


cutting-edge machine learning algorithms, deep neural networks, and signal processing
techniques. This system seeks to detect hidden data within digital files, including
images, audio, video, and text, with greater accuracy and efficiency than existing
methods. By leveraging the power of machine learning, the proposed system can learn
and adapt to evolving steganographic techniques, thereby enhancing its effectiveness in
detecting covert communication. Additionally, the system will prioritize minimizing
false positives while maximizing detection rates, ensuring reliable identification of
steganographic content. Moreover, the proposed system will facilitate interdisciplinary
collaboration between researchers in computer science, cryptography, signal processing,
and cybersecurity to develop holistic approaches to combatting steganographic threats.
Ultimately, the proposed system aims to bolster cybersecurity measures and safeguard
digital communication channels against covert communication activities.

Department of CS&E, MITT Page 4


Digital Data Concealment using Advance Steganography 2023-2024

Furthermore, the proposed system will incorporate dynamic training mechanisms to


continuously update and refine its detection capabilities based on emerging
steganographic trends and threat landscapes. By fostering ongoing collaboration and
knowledge exchange, the system will remain at the forefront of steganalysis research,
effectively countering evolving covert communication techniques in the digital domain.

1.7 Applications
1. Cybersecurity: The proposed system finds application in enhancing cybersecurity
measures by detecting covert communication channels used for malicious activities such
as data exfiltration, espionage, and cyberattacks.

2. Copy rights : by implementing the hidden data the owner ship of the original file can
be protected either the image ,audio ,video etc.

3. Intelligence Agencies: Intelligence agencies can employ the system to monitor digital
communications for covert messaging among potential threats, enhancing national
security efforts.

4. Corporate Security: Companies can use the system to protect sensitive information
and intellectual property by detecting attempts to hide data within digital files, thereby
mitigating risks of corporate espionage and data breaches.

5. Digital Watermarking: Forensic experts can employ the system to analyze digital
evidence and uncover hidden information within multimedia files, assisting in legal
proceedings and criminal investigations.

6. Social Media Monitoring: The system can be integrated into social media platforms
to detect covert communication channels used for spreading misinformation,
radicalization, or illicit activities.

7. Defense Sector: Military organizations can utilize the system to enhance


communications security (COMSEC) by detecting attempts to hide sensitive information
within digital communications, ensuring operational security and mission success.

Department of CS&E, MITT Page 5


Digital Data Concealment using Advance Steganography 2023-2024

Department of CS&E, MITT Page 6


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 2

LITERATU
RE
SURVEY

Department of CS&E, MITT Page 7


Author
Title Method Result
And Year
Digital Data Concealment using Advance Steganography 2023-2024
Dang ninh Lsb data hiding in 1-bit LSB method The focus is on the
tran & hang- digital images seamless integration
jurgen of hidden data into
-2023 the least significant
bits (LSBs) of pixel
values, allowing the
complete disappear
from the visual
appearance of the
image . providing
the next level
protection and
privacy for the data
communication

Ritu sindhu Information edge bit embedding The final result of the
& pragathi hiding using application
singh -2020 steganography developed provides
the encryption and
decryption the data
that need to be
hidden and the data is
hidden in an cover
image providing the
total concealment
which cannot be seen
by eyes and the same
reversed method is
used to decrypt the
image to get the
secret message back.

Ayodeji
akinwumi Implementing Random bit The primary focus of
& image embedding steganography
Oluwatosi steganography communication for
n ogbeide technique secure data transfer
-2021 technique for ultimately providing
secure data hiding data security
in development of
android application

Sabah Hiding information


abdil in digital images 2 and 4 bit LSB in this resesrch the
Azeez using LSB method LSB technique is
jabur & steganography used in two ways
abbas technique only the last two
nawar & significant bit is of
Emad each byte of pixel
kadhim will store. another
-2023 method is the four
Department of CS&E, MITT least significant bit
Page 8
where right half 4
bits of each channel
will store the
embedded data
Digital Data Concealment using Advance Steganography 2023-2024

Department of CS&E, MITT Page 9


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 3
SYSTEM REQUIREMENT SPECIFICATIONS

3.1 Functional Requirements

Functional requirement defines a function of a software system or its


component. A function is described as a set of inputs, behavior, and outputs. Functional
requirements may be technical details, data manipulation, encryption and decryption of
data, processing, and other specific functionality that define what a system is supposed to
accomplish.

The various libraries used in the project are:

1.Multer
2.FFmpeg
3.GDAL
4.laravel

Multer:
Multer is a middleware for handling multipart/form-data in Node.js applications,
particularly useful for handling file uploads. It is designed to work seamlessly with
frameworks such as Express to simplify the process of uploading files from clients to
servers. Developed by the team behind Express.js, Multer provides a flexible and easy-
to-use solution for handling file uploads in Node.js applications.

One of the key features of Multer is its ability to handle various types of file uploads,
including single files, multiple files, and even complex forms with both text fields and
file inputs. It allows developers to specify the destination directory where uploaded files
should be stored and provides options for renaming files, limiting file size, and filtering
file types to enhance security and control over the upload process.

Multer seamlessly integrates with middleware chains in Express applications, making


it easy to incorporate file upload functionality into existing routes and controllers. It
provides middleware functions that can be mounted to specific routes or used globally to
handle file uploads across the entire application..

Department of CS&E, MITT Page 10


Digital Data Concealment using Advance Steganography 2023-2024

FFmpeg:
FFmpeg stands as a cornerstone in the realm of multimedia processing, offering a
comprehensive suite of tools for encoding, decoding, transcoding, and manipulating audio
and video files. Developed by Fabrice Bellard and maintained by a dedicated global
community, FFmpeg boasts an impressive array of features and capabilities. Its versatility
shines through its support for an extensive range of audio and video formats, including
popular standards like MP3, AAC, WAV, FLAC, MP4, and AVI, among others. This
cross-platform framework operates seamlessly on Linux, macOS, Windows, and BSD,
providing accessibility to a diverse user base. With its command-line interface, users can
execute commands to perform diverse multimedia operations effortlessly, from basic file
conversions to complex filtering and streaming tasks. Thanks to its modular architecture
and rich set of libraries, FFmpeg is highly flexible and extensible, empowering developers
to build custom multimedia applications or integrate its functionality into existing projects
with ease. From decoding and encoding audio/video streams to extracting tracks, applying
effects, and streaming content over networks, FFmpeg serves as a Swiss Army knife for
multimedia processing. Supported by an active community and extensive documentation,
FFmpeg remains an indispensable tool for multimedia enthusiasts, developers, and
professionals seeking powerful and reliable solutions for their audio and video processing
needs.

GDAL:
GDAL (Geospatial Data Abstraction Library) stands as a cornerstone in the
realm of geospatial data processing, offering a comprehensive suite of tools and functions
for reading, writing, and manipulating raster and vector geospatial data formats.
Developed collaboratively by a dedicated community of developers, GDAL boasts
support for an extensive range of formats, including GeoTIFF, ESRI Shapefile,
GeoJSON, and KML, among others. Its cross-platform nature ensures compatibility
across Linux, macOS, Windows, and various Unix-like systems, facilitating accessibility
across diverse environments. At its core, GDAL provides a unified interface for accessing
and processing geospatial data, enabling operations such as data conversion, reprojection,
resampling, and mosaicking. With a suite of command-line tools and bindings for popular
programming languages like Python and Java, GDAL empowers users to perform
common geospatial tasks efficiently, whether through direct command-line interaction or

Department of CS&E, MITT Page 11


Digital Data Concealment using Advance Steganography 2023-2024

integration within custom software applications. Widely utilized in Geographic


Information System (GIS) software and geospatial applications, GDAL serves as a
fundamental component for data access and manipulation. Supported by an active
community, GDAL continues to evolve, providing users with a robust and versatile
solution for their geospatial data processing needs.

Laravel passport

Laravel Passport is an Authitication server implementation that provides a full-


featured authentication system for Laravel applications, making it easier to authenticate
users and issue access tokens for API authentication. Developed by the Laravel
community and integrated seamlessly into the Laravel framework, Passport offers a
simple and secure way to implement token-based authentication, enabling developers to
build secure APIs with minimal effort. With Passport, developers can easily generate
OAuth2 tokens for users, manage token lifetimes and scopes, and authenticate API
requests using tokens. It supports various OAuth2 grant types, including Authorization
Code, Implicit, Password, and Client Credentials, catering to different authentication
scenarios. Additionally, Passport integrates smoothly with Laravel's authentication
system, allowing developers to authenticate users via the web interface and API
simultaneously. Passport also provides a convenient API for managing clients and
personal access tokens, making it easy to create and revoke tokens as needed. Overall,
Laravel Passport simplifies the process of implementing authentication in Laravel

applications, offering a robust and flexible solution for securing APIs and protecting

sensitive data.

MySQL is a relational database management system based on the Structured Query


Language, which is the popular language for accessing and managing the records in the
database. MySQL is open-source and free software under the GNU license. MySQL
is a database system used on the web MySQL is a database system that runs on a
server MySQL is ideal for both small and large applications MySQL is very fast, reliable,
and easy to use MySQL uses standard SQL MySQL compiles on a number of platforms

The Number One HTTP Server On The Internet¶. The Apache HTTP Server Project
is an effort to develop and maintain an open-source HTTP server for modern operating

Department of CS&E, MITT Page 12


Digital Data Concealment using Advance Steganography 2023-2024

systems including UNIX and Windows. The goal of this project is to provide a secure,
efficient and extensible server that provides HTTP services in sync with the current
HTTP standards.

HTML as the skeleton of a webpage. It's used to structure a webpage's content, and it
also tells the web browser how to display it. As Front-End Web Developer Pat DePuydt
explains in the video above, the front end is the part of the website a user or customer
interacts with. A lot goes into making the front end work, including database architecture,
frameworks, scaling solutions, and more. It includes: Styles: This includes the buttons,
layouts, inputs, text, images, and more.

JavaScript (JS) is a lightweight, interpreted, or just-in-time compiled programming


language with first-class functions. While it is most well-known as the scripting language
for Web pages. PHP can generate dynamic page content PHP can create, open, read,
write, delete, and close files on the server , PHP can collect form data PHP can send and
receive cookies PHP can add, delete, modify data in your database and PHP can be used
to control user-access PHP can encrypt data.

Mysql Server :
The data in the system has to be stored and retrieved from database. Designing the
database is part of system design. Data elements and data structures to be stored have
been identified at analysis stage. They are structured and put together to design the data
storage and retrieval system.
A database is a collection of interrelated data stored with minimum redundancy to
serve many users quickly and efficiently. The general objective is to make database
access easy, quick, inexpensive and flexible for the user. Relationships are established
between the data items and unnecessary data items are removed. Normalization is done
to get an internal consistency of data and to have minimum redundancy and maximum
stability. This ensures minimizing data storage required, minimizing chances of data
inconsistencies and optimizing for updates. The MS Access database has been chosen
for developing the relevant databases.

3.2 Non-Functional Requirements


Non-Functional Requirements describe the aspect of the system that is not directly
Department of CS&E, MITT Page 13
Digital Data Concealment using Advance Steganography 2023-2024

related to its functional behavior. Non-functional requirements define system properties


and constraints it arises through user needs, because of budget constraints or
organizational policies, or due to external factors such as safety regulations, privacy
registration and so on.

The different Non-functional requirements for our project are:

Easy to Operate
The system should be easy to operate and should be such that it can be developed
within a short period and fit in the limited budget of the user.

Performance Requirements

Since the software is online, therefore much of the performance of the system
depends on the traffic that is present online and the speed of the Internet. We are trying
to give an improved performance by setting cookies to the functions.

Usability Requirements

The Navigation for the various operations is arranged in an orderly fashion based
on the requirements. The interface also must provide a soothing look to the eye of the
user.

Portability Requirements

The system should be portable and should be able to switch any environment
changes such as a change of database within a very short period.

Easy to Operate The system should be easy to operate and should be such that it
can be developed within a short period and fit in the limited budget of the user

 Secure access to confidential data.


 24 X 7 availability
 The flexible service-based architecture will be highly desirable for future
extension.

3.3 Hardware Requirements

 Central-Processor: Intel i5 2.4GHz

Department of CS&E, MITT Page 14


Digital Data Concealment using Advance Steganography 2023-2024

 Hard-Disk: 4OGB

 Ram: 2GB or above

3.4 Software Requirements


• Operating system: windows 10

• Coding Language: Server-side scripting languages like PHP, Node.js, or Python for

handling file uploads, encryption, decryption, and business logic.

• Framework: Frameworks such as Laravel (PHP), Express.js (Node.js), or Django


(Python) for structured development and MVC architecture.

• Tools: IDLE/ Visual Code,xamp.

Department of CS&E, MITT Page 15


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 4

SYSTEM ANALYSIS AND DESIGN

4.1 System Analysis

The system design process builds up general framework building design. The
programming outline includes speaking to the product framework works in a shape that
may be changed into one or more projects. The prerequisite indicated by the end client
must be put systematically. An outline is an inventive procedure; a great configuration is
a way to the viable framework. The framework "Outline" is characterized as "The
procedure of applying different systems and standards with the end goal of
characterizing a procedure or a framework inadequate point of interest to allow its
physical acknowledgment”. Different configuration components are taken after to add to
the framework. The configuration detail portrays the components of the framework, the
segments or components of the framework, and their appearance to end clients.

4.2 System Architecture

The architectural configuration procedure is concerned with building up a


fundamental basic system for a framework. It includes recognizing the real parts of the
framework and the interchange between these segments. The beginning configuration
procedure of recognizing these subsystems and building up a structure for subsystem
control and correspondence is called construction modeling outline and the yield of this
outlined procedure is a portrayal of the product structural planning. The proposed
architecture for this system is given below. It shows the way this system is designed and
the brief working of the system.

Department of CS&E, MITT Page 16


Digital Data Concealment using Advance Steganography 2023-2024

Fig 4.2 System Architecture

4.3 High-Level Designs


High-Level Design (HLD) explains the architecture that would be used for
developing a software product. The architecture diagram provides an overview of an entire
system, identifying the main components that would be developed for their interfaces. The
HLD uses possibly non-technical to mildly technical terms that should be understandable
to the administrators of the system. In contrast, low-level design further exposes the logical
detailed design of each of these elements for programmers.

4.3.1 Data Flow Diagram


Data Flow Diagram is a graphical representation of the techniques and procedures
that contain, operate, preserve, and distribute information between machine parts as well as
between a device and its surroundings. It gains the position of a potent fashion statement
among Users and Systems thanks to its Seen illustration. The DFD structure allows one to
build up from a hierarchy of specific diagrams to a thorough evaluation. For the reasons
indicated below, DFD has seen a lot of use.:

 Framework's logical data stream

 Determining the requirements for developing the physical framework

Department of CS&E, MITT Page 17


Digital Data Concealment using Advance Steganography 2023-2024

 Easy to understand documentation

 Creation of necessary manual and computerized frameworks

Fig 4.3.1 User Data Flow Diagram

Data flow: the path that the data takes between the external entities, processes and data
stores. It portrays the interface between the other mechanism and is shown with arrows,
typically label with a short data name, like "Billing details".

4.3.2 Use Case Diagram

A use case diagram is a graphical representation of the interactions between a system


and its users or external systems. It is a type of behavioral diagram in Unified Modeling
Language (UML) and is used to define the scope of a system and its requirements. The
primary elements of a use case diagram are actors and use cases. Actors are the users or
external systems that interact with the system, while use cases represent the specific
functionality or tasks that the system can perform. Use case diagrams also help to
establish a common understanding of the system's requirements among stakeholders,
including developers, project managers, and users. They can be used to communicate the
system's functionality and requirements to all stakeholders, helping to ensure that
everyone is on the same page. A typical use case diagram includes actors, use cases, and
relationships. Actors are the users or external systems that interact with the system, while
Department of CS&E, MITT Page 18
Digital Data Concealment using Advance Steganography 2023-2024

use cases represent the specific tasks or functionality the system can perform.
Relationships between the actors and use cases can be of different types, including
association, extend, and include. Association relationships show that an actor is
associated with a particular use case.

Fig 4.3.2 Use Case Diagram

Department of CS&E, MITT Page 19


Digital Data Concealment using Advance Steganography 2023-2024

4.4 Low-Level Design

Low-Level Design (LLD) is a component-level design process that follows a step


by-step refinement process. This process can be used for designing data structures,
required software architecture, source code, and ultimately, performance algorithms.
Overall, the data organization may be defined during requirement analysis and then
refined during data design work. During the detailed phase, the logical and functional
design is done and the design of application structure is developed during the High-
Level Design. Low-level diagrams are typically used in the development phase of a
project to help engineers and developers understand the specific details of the system's
components and their interactions. They are also used in testing and debugging to
identify issues and optimize performance. Low-level diagrams can include various types
of diagrams, including flowcharts, network diagrams, and component diagrams. Each
type of diagram provides a specific perspective on the system's components and
interactions, depending on the system's complexity and requirements.

4.4.1 Flowchart
A flowchart is a diagram that represents a set of instructions. Flowcharts
normally use standard symbols to represent the different types of instructions. These
symbols are used to construct the flowchart and show the step-by-step solution to the
problem.

Department of CS&E, MITT Page 20


Digital Data Concealment using Advance Steganography 2023-2024

Fig 4.4.1 Flow Chart

Department of CS&E, MITT Page 21


Digital Data Concealment using Advance Steganography 2023-2024

1. Start : first start by registering or else logging in as user.

2. selecting the process : the user has two options either he can embed(encrypt) the data
or he can extract (decrypt) the file.

3. Input Stage:
- Digital media files (images, audio, video, text) for steganalysis.
- Parameters for machine learning algorithms and signal processing techniques.

4. Preprocessing Stage:
- Data preprocessing steps such as normalization, feature extraction, and dimensionality
reduction.

5. Steganalysis Stage:
- Application of steganalysis techniques, including statistical analysis, machine learning
algorithms, and signal processing methods.
- Detection of hidden data within digital files.

6. Postprocessing Stage:
- Analysis of steganalysis results.
- Filtering and refinement of detected covert communication channels.

7. Output Stage:
- Presentation of steganalysis findings.
- Reporting of detected covert communication activities.
- Integration with security ecosystems for further action.

Each stage may have multiple subprocesses, and the flow diagram would illustrate
the sequential flow of data and processes within the system.

Department of CS&E, MITT Page 22


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER-5
IMPLEMENTATION
5.1 Data Collection and Preprocessing
In the proposed steganalysis system, data collection and processing are essential
stages aimed at gathering a diverse dataset of digital media files and extracting relevant
features for subsequent analysis. During the data collection phase, various types of digital
media, including images, audio recordings, video clips, and text documents, are acquired
from different sources and platforms. Metadata extraction is performed to capture relevant
information such as file format, size, and timestamps. Additionally, the dataset undergoes
annotation and labeling to differentiate between files containing hidden data
(steganographic content) and those without (clean content). Subsequently, in the data
processing stage, preprocessing steps standardize the format and resolution of digital files,
while feature extraction techniques capture important characteristics such as pixel values
for images, frequency coefficients for audio, and textual features for documents.
Dimensionality reduction methods may be applied to reduce the feature space
dimensionality, followed by optional data augmentation techniques to increase dataset
diversity. Finally, the dataset is embedded or extracted as per the user choice Through
meticulous data collection and processing, the steganalysis system ensures the availability
of high-quality data for robust analysis and model development.

5.2 User Interface Components


Implement user interface components, such as input forms, buttons, dropdowns, and

modals, to facilitate user interaction with the platform's features. Incorporate visual
elements, icons, and animations to enhance the user experience and provide feedback on
user actions

5.3 Backend Implementation


The intricacies of implementing the backend functionality of our web-based platform
using Python and the Django framework. Python, known for its simplicity and
versatility,coupled with Django's robust and scalable architecture, provided us with a solid
for developing a feature-rich and secure backend infrastructure. Here's anoverview of the
key components and methodologies employed in our backend.

Department of CS&E, MITT Page 23


Digital Data Concealment using Advance Steganography 2023-2024

5.4 Image steganography:


Steganography can be applied to various types of images, as well as other digital
media. Here are some common types of images where steganography can be used:

JPEG Images: JPEG (Joint Photographic Experts Group) images are one of the most
common types of images used for steganography due to their widespread use on the
internet and in digital photography. The lossy compression used in JPEG images allows
for hidden data to be embedded without significantly affecting the image quality.

PNG Images: PNG (Portable Network Graphics) images are another popular choice for
steganography. While PNG images use lossless compression, which preserves image
quality, they can still be used for hiding data by manipulating the pixel values.

BMP Images: BMP (Bitmap) images are uncompressed images that store color data for
each pixel in the image. While less common on the internet due to their larger file sizes,
BMP images can be used for steganography by directly manipulating the pixel values.

GIF Images: GIF (Graphics Interchange Format) images support animation and are
commonly used for simple graphics and animations on the web. While less common for
steganography due to their limited color palette and lossy compression, GIF images can
still be used for hiding data.

TIFF Images: TIFF (Tagged Image File Format) images are often used in professional
photography and publishing due to their support for lossless compression and high-
quality images. TIFF images can be used for steganography, although they are less
common for this purpose compared to JPEG and PNG images.

Image steganography Algorithm:


Embedding plaintext information within the least significant bits (LSBs) of image
pixels. The plaintext, along with encryption key metadata, is encrypted using a
symmetric encryption algorithm like AES-256.

Encoding algorithm steps:

Read the cover image: Load the cover image (the image in which you want to hide
data) using PHP's imagecreatefromjpeg function.

Convert the secret data to binary: Convert the secret message or data that you want to
hide into binary format. Each character is represented by its ASCII value, which is then
converted to 8-bit binary representation.

Department of CS&E, MITT Page 24


Digital Data Concealment using Advance Steganography 2023-2024

Embed the binary data into the image: Iterate over each pixel of the cover image. For
each pixel, replace the least significant bit (LSB) of each color component (R, G, B) with
the corresponding bit of the secret message. This is done to minimize the visual impact on
the cover image.

Save the modified image: Save the image with the embedded data using PHP's
imagejpeg function.

Decoding Algorithm Steps:

Read the stego image: Load the stego image (the image containing hidden data) using
PHP's imagecreatefromjpeg function.

Extract the LSBs from each pixel: Iterate over each pixel of the stego image. Extract the
least significant bit (LSB) from each color component (R, G, B) of every pixel.

Convert the extracted binary data to text: Combine the LSBs to form binary bytes,
then convert each byte to its corresponding ASCII character.

Detect the end of the message: Continue decoding until a null character (ASCII code 0)
is encountered, indicating the end of the hidden message.

Output the decoded message: Present the decoded message, which was hidden within
the stego image..

5.5 Video steganography:


Steganography can be applied to various video formats, but some formats are more
commonly used due to their popularity, widespread support, and characteristics that make
them suitable for steganographic techniques. Here are some types of video formats often
used in steganography:

 AVI (Audio Video Interleave): AVI is a widely supported video format developed
by Microsoft. It supports both audio and video data and is commonly used for storing
multimedia content on Windows systems. AVI files are relatively straightforward and can
be manipulated for steganographic purposes.

 MP4 (MPEG-4 Part 14): MP4 is a highly popular video format used for sharing
video content over the internet and on various devices. It supports advanced compression
techniques, making it suitable for steganography. MP4 files can contain audio, video, and
Department of CS&E, MITT Page 25
Digital Data Concealment using Advance Steganography 2023-2024

other data streams.


 MKV (Matroska Multimedia Container): MKV is an open-source multimedia
container format that can store video, audio, and subtitles in a single file. It is widely used
for storing high-definition video content and is suitable for steganographic purposes due
to its flexibility and support for various codecs.
 WMV (Windows Media Video): WMV is a video format developed by Microsoft
for streaming and downloading multimedia content. It is commonly used for online video
streaming and can be used for steganography, particularly on Windows platforms.
 FLV (Flash Video): FLV is a container format used for delivering video content
over the internet, primarily through Adobe Flash Player. It is commonly used for online
video streaming and is suitable for steganography due to its widespread support and
streaming capabilities.

video steganography Algorithm:


Hiding encrypted plaintext within video frames or auxiliary data areas, preserving
synchronization and maintaining perceptual invisibility. Encrypted plaintext and
metadata are securely encoded into the video stream
Encoding (Embedding):
 Read the Cover Video: Load the cover video file that will be used to embed the
hidden data.
 Convert Secret Data to Binary: Convert the secret message or data that you want to
hide into binary format.
 Select Embedding Method: Choose a steganographic technique suitable for videos,
such as LSB substitution, spread spectrum techniques, or audio-based methods.
 Embed Binary Data into Video Frames: Iterate through each frame of the video.
Apply the chosen embedding method to hide binary data within the frames. This could
involve modifying pixel values, audio samples, or other frame attributes.
 Save the Modified Video: Save the video file with the embedded data.

Decoding Algorithm Steps:


1) Read the Stego Video: Load the video file that contains the hidden data.
2) Extract Hidden Data from Video Frames: Iterate through each frame of the
video. Use the reverse process of the embedding method to extract the hidden binary data
Department of CS&E, MITT Page 26
Digital Data Concealment using Advance Steganography 2023-2024

from the frames.


3) Convert Binary Data to Text or Desired Format: Convert the extracted binary
data back into text or the desired format of the hidden message or data.
4) Output the Decoded Data: Present the decoded message or data to the user.

PHP Functions for Video Processing:


You'll need to utilize PHP libraries or extensions that support video processing. Some
options include:
 FFmpeg: Use FFmpeg with PHP to manipulate video files programmatically,
including reading, modifying, and saving video files.
 GD Library: Although primarily for image manipulation, GD can be used for basic
video frame extraction and modification.

5.6 Audio steganography :


Steganography can be applied to various audio formats, enabling the hiding of
secret data within audio files while maintaining the audio's perceptual quality. Here are
some common types of audio formats used in steganography:

 WAV (Waveform Audio File Format): WAV is a standard audio file format
developed by Microsoft and IBM. It is uncompressed and supports high-quality audio,
making it suitable for steganographic applications. WAV files are widely supported
across different platforms and software.

 MP3 (MPEG-1 Audio Layer III): MP3 is a popular audio compression format
that reduces file size while maintaining perceptual audio quality. Due to its widespread
use and support, MP3 files are commonly used for steganography. However, embedding
data in MP3 files requires careful consideration of the compression algorithm's effects
on the hidden data.

 FLAC (Free Lossless Audio Codec): FLAC is a lossless audio compression


format that preserves the original audio quality while reducing file size. FLAC files are
suitable for steganography because they support lossless compression, ensuring that
hidden data is not corrupted during compression and decompression.

Department of CS&E, MITT Page 27


Digital Data Concealment using Advance Steganography 2023-2024

 AAC (Advanced Audio Coding): AAC is an audio compression format


commonly used for streaming and storing high-quality audio. It offers better
compression efficiency than MP3 and is widely supported on various devices and
platforms. AAC files can be used for steganography, although embedding data in AAC
files may require special considerations due to the compression algorithm's complexity.

Encoding Algorithm Steps:


Concealing plaintext within the audio sample data, typically in the lower-amplitude
regions or least audible frequency bands. The plaintext, combined with encryption key
metadata, is encrypted using a robust symmetric encryption standard
1) Read the Cover Audio: Load the cover audio file that will be used to embed the
hidden data.
2) Convert Secret Data to Binary: Convert the secret message or data that you want
to hide into binary format.
3) Select Embedding Method: Choose a steganographic technique suitable for audio,
such as LSB substitution, spread spectrum techniques, or phase coding.
4) Embed Binary Data into Audio Samples: Iterate through each audio sample of
the cover audio. Apply the chosen embedding method to hide binary data within the
audio samples.
5) Save the Modified Audio: Save the audio file with the embedded data.

Decoding Algorithm Steps:


1) Read the Stego Audio: Load the audio file that contains the hidden data.
2) Extract Hidden Data from Audio Samples: Iterate through each audio sample of
the stego audio. Use the reverse process of the embedding method to extract the hidden
binary data from the audio samples.
3) Convert Binary Data to Text or Desired Format: Convert the extracted binary
data back into text or the desired format of the hidden message or data.
4) Output the Decoded Data: Present the decoded message or data to the user.

PHP Functions for Audio Processing:


You'll need to utilize PHP libraries or extensions that support audio processing. Some

Department of CS&E, MITT Page 28


Digital Data Concealment using Advance Steganography 2023-2024

options include:
FFmpeg: Use FFmpeg with PHP to manipulate audio files programmatically, including
reading, modifying, and saving audio files.
GDAL Library: Although primarily for geospatial data, GDAL can be used for basic
audio sample manipulation.

5.7 text steganography :


Steganography can be applied to various text formats, allowing for the hiding of secret
messages within text-based documents. Here are some common types of text formats
used in steganography:
Plain Text
Plain text is the simplest and most basic form of text representation, consisting of
unformatted text with no styling or formatting. Plain text files are commonly used for
steganography due to their simplicity and ease of manipulation.
Rich Text Format (RTF)
RTF is a document file format developed by Microsoft that allows for the inclusion
of text formatting, such as bold, italic, underline, font size, and font color. RTF files can
be used for steganography by embedding hidden data within the text or formatting
properties.
HTML (Hypertext Markup Language)
HTML is the standard markup language used for creating web pages and web
applications. HTML files consist of structured text with tags that define the structure and
formatting of the content. HTML files can be used for steganography by hiding data
within the HTML code or by embedding data within specific HTML elements or
attributes.
XML (Extensible Markup Language)
XML is a markup language similar to HTML, but it is designed to be more flexible
and extensible. XML files consist of structured text with customizable tags that define the
structure and content of the data. XML files can be used for steganography by hiding data
within the XML code or by embedding data within specific XML elements or attributes.

Encoding Algorithm Steps:


1) Read the Cover Text: Load the cover text document that will be used to embed the
hidden message.
Department of CS&E, MITT Page 29
Digital Data Concealment using Advance Steganography 2023-2024

2) Convert Secret Message to Binary: Convert the secret message or data that you
want to hide into binary format.
3) Select Embedding Method: Choose a steganographic technique suitable for text,
such as whitespace manipulation, word substitution, or Unicode character modification.
4) Embed Binary Data into Text: Apply the chosen embedding method to hide
binary data within the cover text document. This could involve modifying whitespace
characters, substituting specific words or characters, or altering the formatting of the
text.
5) Save the Modified Text: Save the text document with the embedded data.

Decoding Algorithm Steps:


 Read the Stego Text: Load the text document that contains the hidden data.
 Extract Hidden Data from Text: Apply the reverse process of the embedding
method to extract the hidden binary data from the stego text document.
 Convert Binary Data to Text or Desired Format: Convert the extracted binary
data back into text or the desired format of the hidden message or data.
 Output the Decoded Data: Present the decoded message or data to the user.

Department of CS&E, MITT Page 30


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 6
TESTING

6.1 Design of Test Case


The purpose of testing is to discover errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way to
check the functionality of components, sub-assemblies, assemblies, and/or a finished
product It is the process of exercising software with the intent of ensuring that the
software system meets its requirements and user expectations and does not fail
unacceptably. There are various types of tests. Each test type addresses a specific testing
requirement. Test cases are a crucial component of software testing, as they are used to
ensure that a software application or system is working as intended. A test case is a set of
steps or actions that are executed to verify the functionality, performance, and reliability
of an application or system.

6.2 Types of Testing

6.2.1 Unit Testing

Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual
software units of the application .it is done after the completion of an individual unit
before integration. This is structural testing, that relies on knowledge of its construction
and is invasive. Unit tests perform basic tests at the component level and test a specific
business process, application, and/or system configuration. Unit tests ensure that each
unique path of a business process performs accurately to the documented specifications
and contains clearly defined inputs and expected results. The benefits of unit testing
include improved code quality, reduced software defects, faster debugging and
troubleshooting, and greater confidence in the reliability of the software. By isolating and
testing individual components of a system, developers can identify and fix defects more
quickly and efficiently, reducing the overall time and cost of software development.

6.2.2 Integration Testing

Integration tests are designed to test integrated software components to determine if

Department of CS&E, MITT Page 31


Digital Data Concealment using Advance Steganography 2023-2024

they run as one program. Testing is event-driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components
were individually satisfied, as shown by successful unit testing, the combination of
components is correct and consistent. Integration testing is specifically aimed at exposing
the problems that arise from the combination of components. The benefits of integration
testing include improved software quality, reduced software defects, faster debugging and
troubleshooting, and greater confidence in the reliability of the software. By testing the
interactions between different software components, developers can ensure that the
software works as intended, and that all modules and services function correctly and
efficiently.

This testing can be complex and time-consuming, and requires careful planning and
coordination to ensure that all components are tested thoroughly and effectively. It should
be complemented by other testing methodologies such as unit testing, system testing, and
acceptance testing to provide a comprehensive and effective testing strategy.

6.2.3 Functional Testing

Functional tests provide systematic demonstrations that functions tested are


available as specified by the business and technical requirements, system documentation,
and user manuals. Functional testing is centered on the following items: Valid Input:
identified classes of valid input must be accepted. Invalid Input: identified classes of
invalid input must be rejected. Functions: identified functions must be exercised. Output:
identified classes of application outputs must be exercised. Systems/Procedures:
interfacing systems or procedures must be invoked. The organization and preparation of
functional tests are focused on requirements, key functions, or special test cases. In
addition, systematic coverage identifies business process flows; data fields, predefined
processes, and successive processes must be considered for testing. Before functional
testing is complete, additional tests are identified and the effective value of current tests is
determined. The benefits of functional testing include improved software quality, reduced
software defects, faster debugging and troubleshooting, and greater confidence in the
reliability of the software. By testing the software's functionality against its requirements,
developers can identify and fix defects and issues before the software is released to the
end-user. However, functional testing may not cover all aspects of the software,
such as non-functional requirements or compatibility with different hardware and

Department of CS&E, MITT Page 32


Digital Data Concealment using Advance Steganography 2023-2024

software configurations. Therefore, it should be complemented by other testing


methodologies such as non- functional testing and compatibility testing to provide a
comprehensive and effective testing strategy.

6.2.4 System Testing

System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration-oriented system integration test. System
testing is based on process descriptions and flows, emphasizing pre-driven process links
and integration points. The benefits of system testing include improved software quality,
reduced software defects, faster debugging and troubleshooting, and greater confidence in
the reliability of the software. By testing the entire system as a whole, developers can
identify and fix defects and issues that may have been missed during integration testing or
other testing phases. However, system testing can be complex and time-consuming, and
requires careful planning and execution to ensure that all aspects of the software are
tested thoroughly and effectively. It should be complemented by other testing
methodologies such as unit testing, integration testing, and acceptance testing to provide a
comprehensive and effective testing strategy.

6.2.5 White Box Testing

White Box Testing is a testing in which the software tester knows the inner
workings, structure, and language of the software, or at least its purpose. It is purpose. It
is used to test areas that cannot be reached from a black-box level. The benefits of white
box testing include improved code quality, reduced software defects, faster debugging
and troubleshooting, and greater confidence in the reliability of the software. By testing
the internal structure and implementation of the software, developers can identify and fix
defects and issues at an early stage, before they can propagate to other parts of the system
and become more difficult and expensive to fix. Therefore, it should be complemented by
other testing methodologies such as black box testing and grey box testing to provide a
comprehensive and effective testing strategy.

6.2.6 Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner
workings, structure, or language of the module being tested. Black box tests, like most

Department of CS&E, MITT Page 33


Digital Data Concealment using Advance Steganography 2023-2024

other kinds of tests, must be written from a definitive source document, such as
specification or requirements document, such as specification or requirements document.
It is a testing in which the software under test is treated, as a black box. you cannot “see”
into it. The test provides inputs and responds to outputs without considering how the
software works. The benefits of black box testing include improved software quality,
reduced software defects, faster debugging and troubleshooting, and greater confidence in
the reliability of the software. By testing the software from the perspective of an end-user,
testers can identify and fix defects and issues that may impact the end-user experience.
However, black box testing may not cover all aspects of the software, such as internal
logic and control structures, and may not identify defects that are related to the software's
internal workings. Therefore, it should be complemented by other testing methodologies
such as white box testing and grey box testing to provide a comprehensive and effective
testing strategy.

Fig 6.1: Black box and White box Testing

Department of CS&E, MITT Page 34


Digital Data Concealment using Advance Steganography 2023-2024

CHAPTER 7

SNAPSHOTS AND RESULT DISCUSSIONS

7.1 Analysis

 Define the objectives: Firstly, establish the goals of the sign language recognition
project, specifying the types of sign language to recognize, the required accuracy rate,
and the performance metrics used for model evaluation.
 Collect data: Gather a comprehensive dataset of sign language gestures along with
their corresponding labels. Divide the dataset into training, validation, and testing
subsets.
 Train the model: Utilize deep learning techniques to train the model on the training
dataset. Experiment with various architectures and hyperparameters to optimize model
performance according to the predefined objectives.
 Test the model: Assess the trained model's performance using the testing dataset,
measuring key metrics such as accuracy, precision, recall, and F1 score. Compare these
metrics against the established objectives.
 Analyze the results: Examine the model's performance through techniques like
confusion matrix analysis, identifying instances of correct and incorrect predictions.
Investigate misclassifications to uncover patterns or challenges in recognizing specific
sign gestures.
 Interpret the results: Interpret the findings within the context of the project's
objectives and evaluation metrics. Draw conclusions regarding the model's efficacy in
sign language recognition.
 Make recommendations: Based on the conclusions drawn, propose suggestions for
enhancing the model or dataset. This may include expanding the dataset, incorporating
more diverse sign language variations, or exploring alternative deep learning
architectures.
 Communicate the results: Present the project outcomes to stakeholders and
interested parties in a clear and concise manner, leveraging data visualizations and other
tools to support conclusions and recommendations effectively.

Department of CS&E, MITT Page 35


Digital Data Concealment using Advance Steganography 2023-2024

7.2 Snapshots

Fig 7.1 Home Page

Fig 7.2 : Upload Image

Department of CS&E, MITT Page 36


Digital Data Concealment using Advance Steganography 2023-2024

Fig 7.3 Prediction of No Tumor

Fig 7.4 Prediction of Glioma

Department of CS&E, MITT Page 37


Digital Data Concealment using Advance Steganography 2023-2024

Fig 7.5 Prediction of Pituitary

Fig 7.6 Prediction of Meningioma

Department of CS&E, MITT Page 38


Digital Data Concealment using Advance Steganography 2023-2024

CONCLUSION AND FUTURE ENHANCEMENT

In conclusion, the proposed system represents a significant advancement in


steganalysis capabilities, leveraging cutting-edge machine learning algorithms, and
signal processing techniques to detect hidden data within digital files with
unprecedented accuracy and efficiency. By addressing the limitations of existing
steganographic detection methods, the system offers numerous advantages, including
enhanced cybersecurity measures, adaptability to emerging threats, and broad coverage
across multimedia formats. Its applications span various sectors, including
cybersecurity, law enforcement, intelligence, corporate security, digital forensics, social
media monitoring, defense, and the financial sector. Through interdisciplinary
collaboration and ongoing research, the proposed system contributes to strengthening
overall cybersecurity measures, safeguarding digital communication channels, and
mitigating the risks associated with covert communication activities in the digital
domain.
Future enhancements may include real-time monitoring, automated threat
assessment, dynamic adversarial training, privacy-preserving techniques, cross-
platform compatibility, user-friendly interfaces, integration with security ecosystems,
and continuous research. These improvements aim to enhance the system's capabilities
in detecting covert communication channels, ensuring immediate response to threats,
adapting to evolving techniques, respecting privacy rights, covering diverse digital
platforms, facilitating ease of use, integrating with existing security infrastructure, and
staying abreast of emerging threats through ongoing research and development.

Department of CS&E, MITT Page 39


Digital Data Concealment using Advance Steganography 2023-2024

BIBLIOGRAPHY
[1] Ray, S. K., Ray, S. K., & Dey, S. (2020) Steganography for Digital Media Security:
Emerging Research and Opportunities. IGI Global..

[2] J. Li, J. Liu, G. Su, M. Zhang, and Y. Yang,(2021) ‘‘An generative steganography
method based on WGAN-GP,’’ in Proc. 2nd Int. Conf. Artif. Intell. Secur., Hohhot,
China, Communication

[3] Wahab O., Khalaf A., Hussein A. and Hamed F. (2021). Hiding Data Using Efficient
Combination of RSA Cryptography, and Compression Steganography Techniques,in
IEEE Access, vol. 9, pp. 31805-31815, 2021, doi: 10.1109/ACCESS.2021.3060317

[4] Omnia M. Mohammed E, Mohamed K, Afra A. , Khalid S(2022). Hybrid multistage


framework for data manipulation by steganography. Bulletin of Electrical
Engineering and Informatics vol. 11, No. 1, February 2022, pp.327~335 ISSN: 2302
-9285, DOI:10.11591/eei.v11i1.3451

[5] David Tidmarsh (2023). Guide to Steganography: Meaning, Types, Tools, &
Techniques. https://www.eccouncil.org/cybersecurity-exchange.

[6] X. Zhang, K. Chen, J. Ding, Y. Yang, W. Zhang and N. Yu,(2024). "Provably Secure
Public-Key Steganography Based on Elliptic Curve Cryptography," in IEEE
Transactions on Information Forensics and Security, vol. 19, pp. 3148-3163, 2024,
doi: 10.1109/TIFS.2024.3361219..

[7] Rajabi-Ghaleh S, Olyaeefar B, Kheradmand R and Ahmadi-Kandjani S (2024)


Image security using steganography and cryptography with sweeping computational
ghost imaging. Front. Phys. 12:1336485. doi: 10.3389/fphy.2024.1336485

Department of CS&E, MITT Page 40

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy