CONTENTS PAGE NO.
1. Acknowledgement 3
2. Project Description 4
3. Analysis and Requirement Specification 5
4. Software Design Specification
i. Execution Sequence 19 ii. Data Flow Diagram 22
5. Software and Hardware Required 23
6. Code Snippets 24
7. Screen Shots 28
8. Testing 35
9. Conclusion 38
10. Bibliography 39
2. PROJECT DESCRIPTION
What Is Steganography?
Steganography applications conceal information in other, seemingly innocent media. Steganographic results may masquerade as other file for data types, be concealed within various media, or even hidden in network traffic or disk space. We are only limited by our imagination in the many ways information and data can be exploited to conceal additional information.
For many years Information Hiding has captured the imagination of researchers. Digital watermarking and steganography techniques are used to address digital rights management, protect information, and conceal secrets. Information hiding techniques provide an interesting challenge for digital forensic investigations. Information can easily traverse through firewalls undetected. Research into steganalysis techniques aids in the discovery of such hidden information as well as leads research toward improved methods for hiding information.
Related research themes include: anonymous communications, anonymous online transactions, covert channels in computer systems, covert/subliminal communications, detection of hidden information (steganalysis), digital forensics, information hiding aspects of privacy, steganography, subliminal channels in cryptographic protocols, watermarking for protection of intellectual property, and other applications
Steganography is a complex subject, please note that although it involves hiding messages, it is not cryptography. The