LSB Image Steganography: Requirements & Design Document

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

EMERTXE INFORMATION TECHNOLOGIES (P) LTD

E ME RTX E TRA I NI NG P RO JE CT DO CUME NTA TI O N FRA ME WO RK


REQUIREMENTS & DESIGN DOCUMENT

Module – Advanced C

LSB Image
Steganography
Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

Contents
1 Abstract............................................................................................................................... 1

2 Requirements...................................................................................................................... 2

3 Prerequisites........................................................................................................................ 3

4 Design................................................................................................................................. 4

5 Sample Output..................................................................................................................... 5

6 Artifacts................................................................................................................................ 7
6.1 Skeleton Code........................................................................................................ 7
6.2 References............................................................................................................. 7

EIDTC RS-V02 Page i


Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

1 Abstract
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are
more complex than others and all of them have respective strong and weak points. Different
applications may require absolute invisibility of the secret information, while others require a
large secret message to be hidden.

Steganography is the practice of hiding private or sensitive information within something that
appears to be nothing out to the usual. Steganography is often confused with cryptography,
because the two are similar in the way that they both are used to protect important
information. The difference between two is that steganography involves hiding information so
it appears that no information is hidden at all. If a person or persons views the object that the
information is hidden inside of he or she will have no idea that there is any hidden information,
therefore the person will not attempt to decrypt the information.

What steganography essentially does is exploit human perception, human senses are not
trained to look for files that have information inside of them, although this software is available
that can do what is called Steganography. The most common use of stenography is to hide a
file inside another file.

EIDTC RDD-V02 Page 1


Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

2 Requirements
• The application accept an image file say .bmp along with the a text file which contains the
message to be steged

• Analyze the size of the message file and the data part of the .bmp file to check whether the
message could fit in the provided .bmp image

• Provide a option to steg a magic string which could be useful to identify whether the image is
steged or not

• The application should provide a option to decrypt the file

• This has to be an command line application and all the options has to be passed as an
command line argument

EIDTC RDD-V02 Page 2


Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

3 Prerequisites
• Knowledge of encryption and decryption

• File I/O

• Pointers and Structures

EIDTC RDD-V02 Page 3


Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

4 Design

EIDTC RDD-V02 Page 4


Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

5 Sample Output

Fig 5 1: Usage

Fig 5 2: Encoding - Incomplete Arguments

Fig 5 3: Encoding - Default Output File

Fig 5 4: Encoding - Output File Name Specified

EIDTC RDD-V02 Page 5


Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

Fig 5 5: Decoding – Default Output

Fig 5 6: Decoding - Output File Specified

EIDTC RDD-V02 Page 6


Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014

6 Artifacts
6.1 Skeleton Code

• www.emertxe.com/content/c-programming/code/steganography_src.zip

6.2 References

• https://en.wikipedia.org/wiki/Steganography

• https://en.wikipedia.org/wiki/BMP

EIDTC RDD-V02 Page 7

You might also like