Lp4 CSDF Final
Lp4 CSDF Final
SUBMITTED BY
2024-2025
CERTIFICATE
Submitted by
Are bonafide students of this institute and the work has been carried out by them under
the supervision of Dr. S. P. Bendale and it is approved for the partial fulfillment of
the requirement of Savitribai Phule Pune University, for the award of the degree of
Bachelor of Engineering (Computer Engineering)
The present world of competition there is a race of existence in which those who have
the will to come forward succeed. Project is like a bridge between theoretical and
practical work. With this willing we joined this particular project. First of all, we would
like to thank the supreme power the Almighty God who is obviously the one who has
always guided us to work on the right path of life.
We sincerely thank,Dr. S.P. Bendale sir, Head of the Department of Computer Science of
NBN Sinhgad School of engineering, for all the facilities provided to us in the pursuit of
this project.
We are indebted to our project guide Dr. S. P. Bendale sir, Department of Computer
Science of
NBN Sinhgad School of engineering. We feel it’s a pleasure to be indebted to our guide
for his valuable support, advice and encouragement and we thank him for his superb
and constant guidance towards this project.
We are deeply grateful to all the staff members of the CS department, for supporting us in
all aspects.
We acknowledge our deep sense of gratitude to our loving parents for being a constant
source of inspiration and motivation.
01 5
Abstract
02 5
Introduction
03 8
Methodology
04 11
System Requirements
05 12
Conclusion
ABSTRACT
With the rapid expansion of digital communication, ensuring data security has become a
critical concern. This paper introduces a robust approach that combines image-based
steganography with AES (Advanced Encryption Standard) encryption to provide secure
message transmission. Steganography allows for embedding secret messages within images,
concealing the very existence of the data, while AES encryption offers a secure means of
encoding the content to prevent unauthorized access.The proposed system works by first
encrypting the message using AES, a symmetric key encryption algorithm known for its
efficiency and security. The encrypted message is then embedded into an image file using
steganographic techniques, ensuring that the alteration is imperceptible to the human eye.
The use of AES ensures that even if the steganographic image is intercepted, the message
remains unreadable without the decryption key. The result is a dual-layer security
mechanism, where steganography masks the presence of the data and AES secures its
content.This approach is particularly effective in scenarios where both confidentiality and
discretion are required, such as in military communications, corporate data sharing, or
personal privacy applications. The paper demonstrates the effectiveness of the system
through empirical results that show minimal degradation in image quality, high levels of
security, and low computational overhead. The combination of steganography and AES
encryption significantly enhances the reliability of secure message transmission in a highly
connected digital world.
INTRODUCTION
In the digital age, the security of information during transmission has become an
essential priority. With the growing use of online communication platforms, sensitive
data is increasingly vulnerable to unauthorized access, cyberattacks, and interception.
To address this issue, a wide range of cryptographic techniques and steganographic
methods have been developed to enhance the confidentiality, integrity, and availability
of information during transmission.
To encrypt the message using AES before embedding it within an image, ensuring that
the data remains secure even if the steganographic cover is detected.
To analyze the efficiency and security of this system, evaluating factors such as image
quality degradation, data payload capacity, and resistance to various steganalysis
techniques.
1. System Overview
2. AES Encryption
The first layer of security is achieved through AES encryption, a symmetric key algorithm
that transforms the plaintext message into ciphertext. AES offers three key sizes—128, 192,
or 256 bits. The process involves several rounds of substitution, permutation, and key
expansion operations to encrypt the data. In this methodology, we focus on the following
steps:
Encryption Process: The AES algorithm encrypts the message using the following key steps:
SubBytes: Each byte of the plaintext is substituted based on an S-box (substitution box).
ShiftRows: Rows of the data matrix are shifted to create diffusion.
MixColumns: Columns of the matrix are mixed to provide further confusion.
AddRoundKey: The round key is added to the matrix, which is derived from the symmetric
key.
Output Ciphertext: The result is the ciphertext (an encrypted version of the original
message), which is ready for embedding in an image.
The AES encryption ensures that the message remains secure, even if the embedded data is
extracted without the decryption key.
3. Image-Based Steganography
Once the message is encrypted, it needs to be embedded into an image using steganography.
The key principle of steganography is to conceal the encrypted message within the image
without noticeably altering the image's appearance. In this system, we use the Least
Significant Bit (LSB) substitution method, a widely used technique in image steganography
due to its simplicity and effectiveness. The LSB method replaces the least significant bits of
each pixel with the bits from the encrypted message. Here’s how the process works:
Input Image Selection: The sender selects a cover image (also known as the carrier image)
where the encrypted message will be embedded. The cover image must have enough
capacity to hold the message without visual degradation.
Message-to-Bit Conversion: The encrypted message (ciphertext) is converted into a binary
bitstream.
Embedding Process:
Each pixel of the image is represented by three color channels: Red, Green, and Blue (RGB).
The least significant bit of each color channel is replaced by the corresponding bit from the
message bitstream.
The process continues until all the bits of the encrypted message are embedded in the image.
Stego-Image Creation: After embedding the entire message, the modified image, now called
the stego-image, is ready for transmission. The changes made to the image are imperceptible
to the human eye, thus hiding the existence of the message.
4. Transmission
The stego-image, containing the encrypted message, is transmitted to the receiver over any
communication channel (such as email or social media). Since the message is embedded
within the image and encrypted, it provides a double layer of security during transmission.
5. Receiver-Side Operations
At the receiver’s end, the system performs the inverse operations to retrieve the original
message. The steps are as follows:
Stego-Image Input: The receiver receives the stego-image containing the hidden encrypted
message.
Message Extraction:
The LSB method is applied in reverse to extract the binary bitstream from the image's least
significant bits.
The extracted bitstream is converted back to form the encrypted message (ciphertext).
AES Decryption:
Using the shared secret key, the receiver decrypts the extracted ciphertext using the same
AES algorithm employed for encryption.
The decryption process involves reversing the substitution, shifting, mixing, and key
addition operations.
Recovered Message: The output of the decryption process is the original plaintext message
that was hidden and transmitted securely.
6. Evaluation Metrics
7.
The performance of the proposed system is evaluated using the following metrics:
Peak Signal-to-Noise Ratio (PSNR): This measures the quality of the stego-image compared
to the original cover image. A high PSNR value indicates minimal distortion and better
image quality.
Mean Squared Error (MSE): MSE quantifies the difference between the original and stego-
images. Lower MSE values signify less noticeable changes in the image.
Embedding Capacity: The amount of data that can be embedded in the cover image without
degrading its quality significantly. This is typically determined by the size of the image and
the method used for embedding.
Security Analysis: The system’s resistance to various attacks, such as steganalysis (the
detection of hidden information) and brute-force attacks on the AES encryption, is also
evaluated.
8. Computational Complexity
The proposed system ensures that the time and space complexity remain efficient:
AES Encryption and Decryption: The computational complexity of AES is O(n), where n is
the length of the message.
LSB Steganography: The complexity for embedding and extraction using the LSB method is
O(m), where m is the number of pixels in the cover image.
Conclusion
The integration of AES encryption and image-based steganography ensures a highly secure
and covert means of message transmission. By encrypting the message before embedding,
the system guarantees that even if the hidden message is detected, it remains inaccessible
without the correct decryption key. The use of LSB-based steganography ensures that the
cover image remains visually unchanged, providing an additional layer of security through
obfuscation.
The detailed architectural flow of the proposed model can be summarized as follows:
Sender-Side Process:
Encrypt the Message: The sender uses AES encryption to convert the plaintext message into
ciphertext.
Embed the Message: The encrypted ciphertext is embedded into the least significant bits of the
pixels in the cover image, creating the stego-image.
Transmit the Stego-Image: The stego-image is transmitted over the chosen communication channel.
Receiver-Side Process:
Extract the Encrypted Message: The receiver extracts the hidden ciphertext from the least
significant bits of the received stego-image.
Decrypt the Message: The extracted ciphertext is decrypted using the shared symmetric AES key to
retrieve the original plaintext message.
SYSTEM REQUIREMENTS
1. Hardware Requirements
To handle the encryption, steganography, and image processing tasks
efficiently, the following hardware specifications are recommended:
2. Software Requirements
The software requirements include both system-level and application-
specific tools to perform the encryption and steganographic embedding
efficiently. The recommended software stack is as follows:
Operating System:
Python 3.8 or later: The entire system can be implemented using Python
due to its rich library support for cryptography, image processing, and
steganography.
Integrated Development Environment (IDE): PyCharm, Visual Studio
Code, or any text editor supporting Python.
Required Libraries:
5. Performance Considerations
To ensure that the system operates efficiently, the following performance
considerations should be taken into account:
Image Size: Larger images provide more capacity for message embedding
but require more processing power and time. The system should optimize
for performance by balancing image size and message payload.
Message Size: The size of the encrypted message should be kept within
reasonable limits to avoid excessive image distortion. A message too
large may lead to noticeable changes in the image quality.
Processing Time: The system should aim for a low processing time for
both encryption and steganographic embedding. Performance
benchmarking should be conducted to ensure that the system performs
efficiently even with high-resolution images.
6. Security Considerations
To maintain high security, the system must include the following
features: