Skip to content

Image Steganography using K-Means clustering and DES encryption

License

Notifications You must be signed in to change notification settings

Honey20/Camouflage

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

59 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Project Camouflage

In this project, we use DES encryption to encrypt the text message and pixels of the cover image are clustered using the K-means clustering algorithm. Cluster-wise steganography is then performed and the stego-image, along with the DES key is transferred. On the receiver’s end, the ciphertext is extracted from the cover images and then decrypted using DES algorithm to obtain the message.

The entire implementation of this project can be summarized in the following steps:

  • Step 1: Encrypting the message entered by sender using DES encryption algorithm.
  • Step 2: Dividing the cover image into K clusters using K-means clustering algorithm.
  • Step 3: Using LSB technique to perform cluster wise steganography to hide cipher text in the image clusters.
  • Step 4: Sending the stego-image clusters and the DES key to the receiver.
  • Step 5: Extracting cipher text from the stego-images.
  • Step 6: Decrypting the cipher text at the receiver's end using the key to obtain the original message.



Flow chart for overall methology



Below given data flow diagram describes the use of files and information through the entire project.

DFD

Sender's Side:

  • DES Encryption: Secret Message is encrypted using the DES algorithm. Two files containing the key and the cipher text are generated. `

  • K-means Clustering: Given image is clustered into k-segments using K-means algorithm. Clusters and file storing cluster information is generated.

    `

  • LSB Encryption: The cipher text is hidden in the images created above using LSB steganography and new images are stored. `

Receiver's Side:

  • LSB Decryption: Cipher is extracted from the stego-images and is stored in a file. `

  • DES Decryption: The cipher text is then decrypted to obtain the secret message. File storing the key is used for decryption.
    `

About

Image Steganography using K-Means clustering and DES encryption

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages