LSB Image Steganography: Requirements & Design Document
LSB Image Steganography: Requirements & Design Document
LSB Image Steganography: Requirements & Design Document
Module – Advanced C
LSB Image
Steganography
Emertxe Information Technologies (P) Ltd REQUIREMENTS & DESIGN DOCUMENT
LSB Image Steganography 0.1 16-06-2014
Contents
1 Abstract............................................................................................................................... 1
2 Requirements...................................................................................................................... 2
3 Prerequisites........................................................................................................................ 3
4 Design................................................................................................................................. 4
5 Sample Output..................................................................................................................... 5
6 Artifacts................................................................................................................................ 7
6.1 Skeleton Code........................................................................................................ 7
6.2 References............................................................................................................. 7
1 Abstract
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are
more complex than others and all of them have respective strong and weak points. Different
applications may require absolute invisibility of the secret information, while others require a
large secret message to be hidden.
Steganography is the practice of hiding private or sensitive information within something that
appears to be nothing out to the usual. Steganography is often confused with cryptography,
because the two are similar in the way that they both are used to protect important
information. The difference between two is that steganography involves hiding information so
it appears that no information is hidden at all. If a person or persons views the object that the
information is hidden inside of he or she will have no idea that there is any hidden information,
therefore the person will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not
trained to look for files that have information inside of them, although this software is available
that can do what is called Steganography. The most common use of stenography is to hide a
file inside another file.
2 Requirements
• The application accept an image file say .bmp along with the a text file which contains the
message to be steged
• Analyze the size of the message file and the data part of the .bmp file to check whether the
message could fit in the provided .bmp image
• Provide a option to steg a magic string which could be useful to identify whether the image is
steged or not
• This has to be an command line application and all the options has to be passed as an
command line argument
3 Prerequisites
• Knowledge of encryption and decryption
• File I/O
4 Design
5 Sample Output
Fig 5 1: Usage
6 Artifacts
6.1 Skeleton Code
• www.emertxe.com/content/c-programming/code/steganography_src.zip
6.2 References
• https://en.wikipedia.org/wiki/Steganography
• https://en.wikipedia.org/wiki/BMP