Image Steganography Using Web Application
DOI:
https://doi.org/10.24191/jcrinn.v8i2.373Keywords:
Steganographic, Randomized Least Significant Bit, Web application, Hiding informationAbstract
Nowadays most people are workaholics, driven by intense peer pressure to break new ground. Therefore, rather than using books as their source material, photographic memories are kept as images. However, to protect sensitive information, reliable and secure communication techniques are necessary in many real-world situations. This research offers a user-friendly interface for securely embedding and extracting secret information within digital images. The primary goals are to design a steganographic algorithm for concealing data in images and to evaluate the usability of image steganography while keeping the quality of images and the access to decode the image. The application utilizes an advanced steganographic algorithm, which is Randomized Least Significant Bit (RLSB), to ensure robust data concealment while maintaining the visual integrity of the cover image. Users can upload their desired image, select the preferred steganographic algorithm, and encode the hidden data for added security. The web application supports encoding and decoding images for concealing data in images. To evaluate its performance, extensive testing was conducted, including embedding and extracting data using different image formats. The results demonstrated the application's effectiveness in hiding information while preserving image quality. The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. In conclusion, the Image Steganography Web Application provides a convenient and secure solution for individuals and organizations needing to transmit sensitive data covertly within images, ensuring data privacy and integrity in an intuitive and user-friendly manner.
Downloads
References
Agarwal, A., & Malik, S. (2022). A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis. 2022 IEEE 7th International Conference for Convergence in Technology, I2CT 2022. https://doi.org/10.1109/I2CT54291.2022.9825422
Al-Fedaghi, S. (2011). Developing Web Applications. International Journal of Software Engineering and Its Applications, 5(2), 57–68.
Alshamrani, A., & Bahattab, A. (2015). A Comparison Between Three SDLC Models Waterfall Model, Spiral Model, and Incremental/Iterative Model. IJCSI International Journal of Computer Science Issues, 12(1), 106–111. www.IJCSI.org
Baldha, N. (2022). Web-based Image Steganography [University of Regina]. https://www.researchgate.net/publication/357810624
Bowne, S. (2018). Hands-On Cryptography with Python. Packt Publishing.
Goel, A. (2020, August 20). Image based Steganography using Python. Geeksforgeeks. https://www.geeksforgeeks.org/image-based-steganography-using-python/
Grinberg, M. (2018). Flask Web Development: Developing Web Applications With Python (2nd ed.). O’Reilly Media.
Li, X., & Li, H. (2018). A Visual Analysis of Research on Information Security Risk by Using CiteSpace. IEEE Access, 6, 63243–63257. https://doi.org/10.1109/ACCESS.2018.2873696
Rama Vyshnavi, V., & Malik, A. (2019). Efficient Way of Web Development Using Python and Flask. International Journal of Recent Research Aspects, 6(2), 16–19.
Rout, H., & Mishra, B. K. (2014). Pros and Cons of Cryptography, Steganography and Perturbation techniques. IOSR Journal of Electronics and Communication Engineering, 2278–8735. www.iosrjournals.org
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Computing Research and Innovation
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.