IMAGE STEGANOGRAPHY USING MID POINT TRANSFORMATION TECHNIQUE
Om Prakash Samantray1, G Manoj Reddy2, Y Srinu3, T S S Sandeep Reddy4, G V D Surya Teja5
1Associate Professor, Department of Computer Science & Engineering: Cyber Security & Raghu Engineering College
2 Department of Computer Science & Engineering: Cyber Security & Raghu Engineering College
3 Department of Computer Science & Engineering: Cyber Security & Raghu Engineering College
4 Department of Computer Science & Engineering: Cyber Security & Raghu Engineering College
5 Department of Computer Science & Engineering: Cyber Security & Raghu Engineering College
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The project titled "Image Steganography using Mid-Point Transformation Technique" aims to explore and implement a novel approach to concealing information within digital images while preserving their visual integrity. Steganography is an age-old technique for covert communication, and this project leverages the mid-point transformation method to embed data seamlessly into images.
The mid-point transformation technique involves the subtle alteration of pixel values based on the midpoint of neighboring pixels. This process ensures that the changes made to the image are imperceptible to the human eye, allowing for effective data hiding without compromising the overall visual quality.
The project will focus on the development of an algorithm to encode and decode hidden information within images using the mid-point transformation technique. Implementation will be carried out using a programming language suitable for image processing, and the project aims to provide a user-friendly interface for ease of use.
Key objectives include understanding the theoretical foundations of steganography, implementing the mid-point transformation algorithm, evaluating the effectiveness of the technique in terms of data capacity and visual impact, and comparing the results with existing steganographic methods.
Key Words: Image Steganography, Mid Point Transformation, Steganography Techniques, Digital Image Security, Data Hiding, Information Security.