Inspiration
Confidential communication and secret data storing The "secrecy" of the embedded data is essential in this area. Historically, steganography have been addressed in this area. Steganography provides us with: (A) Potential capability to hide the existence of confidential data (B) Hardness of detecting the hidden (i.e., embedded) data (C) Enhancing the secrecy of the encrypted data
- Protection of data alteration
We take advantage of the fragility of the embedded data in this application area. If you have some valuable content, which you think it is distributable if someone really needs it, and if it is possible to upload that content on Internet in some covert manner. And if you can issue a special "access key" to extract the content selectively, you will be very happy about it. A steganographic scheme can help realize this type of system.
3.Media Database systems In this application area of steganography secrecy is not important, but unifying two types of data into one is the most important. Media data (photo picture, movie, music, etc.) have some association with other information. A photo picture, for instance, may have the following.
(1) The title of the picture and some physical object information
(2) The date and the time when the picture was taken
(3) The camera and the photographer's information
Formerly, these are annotated beside the each picture in the album.
What it does
Steganography is the method of hiding secret data in any image/audio/video. In a nutshell, the main motive of steganography is to hide the intended information within any image/audio/video that doesn’t appear to be secret just by looking at it. The idea behind image-based Steganography is very simple. Images are composed of digital data (pixels), which describes what’s inside the picture, usually the colors of all the pixels. Since we know every image is made up of pixels and every pixel contains 3-values (red, green, blue).
How we built it
Modern steganography identifies two main classification schemes for the sorting of algorithms. The first distinguishes algorithms based on file type. The second, more widely used scheme categorizes based on embedding method. This is built with html ,scss , ts , python
Challenges we ran into
The development of powerful imaging tools, editing images for changing their data content is becoming a mark to undertake. Tempering image contents by adding, removing, or copying/moving without leaving a trace or unable to be discovered by the investigation is an issue in the computer forensic world. The protection of information shared on the Internet like images and any other confidential information is very significant. Nowadays, forensic image investigation tools and techniques objective is to reveal the tempering strategies and restore the firm belief in the reliability of digital media.
Accomplishments that we're proud of
What we learned
It's fair to say that steganography and cryptography aim to shield messages and data from prying eyes at their most fundamental level. However, they employ an alternative means of security.
Information is converted into unintelligible ciphertext in cryptography. Someone intercepting this message could tell immediately that encryption was used. In contrast, steganography hides a message without altering its original format.
What's next for steganography
Max file size warning to stop tab crashes on massive files Gray Bits feature Randomize colour palette for regular PNGs
Log in or sign up for Devpost to join the conversation.