Internship Project Report
Internship Project Report
Steganography
(Hiding Information in Images)
A Project Report
submitted in partial fulfillment of the requirements
of
AICTE-Edunet Foundation IBM Skillsbuild Cybersecurity
Internship
by
Mayureshwar V. Shendre
Dr. S. V. Pattalwar
HOED
Department of Electronics & Telecommunication Engineering
Prof. Ram Meghe Institute of Technology & Research,
Badnera-Amravati
ACKNOWLEDGEMENT
I would like to express my deepest gratitude to the IBM and AICTE -Edunet
Foundation for providing me with an invaluable opportunity to delve into the fascinating
world of cybersecurity, AICTE-Edunet Foundation IBM SkillsBuild Cybersecurity
Internship 2025 program through its IBM Skillsbuild Platform. The project, focusing on
Steganography, has been a cornerstone of my learning experience.
This journey has not only equipped me with crucial technical abilities but also ignited
a deeper passion for information security and data protection. I am truly grateful for the
foundation laid by this program, which will undoubtedly serve as a significant stepping stone
in my career.
ABSTRACT
This project responds to the essential demand for secure and encrypted information hiding
in the digital era. Standard data encryption, as it protects content, tends to signal the existence
of sensitive information and draw unwarranted attention. The main aim was to create a
lightweight, Python-based steganography tool that could hide secret text messages in digital
images through ASCII-based XOR operations, keeping the concealed data imperceptible.
The technique entails text-to-ASCII conversion, XORing with a secret key, and inserting
resulting bits into the Least Significant Bits (LSBs) of chosen image pixels. Extraction is the
reverse process that can recover the original message using the same key. Experimental
results show effective message embedding with negligible visual distortion to the cover
image and its perceived integrity.
Abstract ............................................................................................................... I
Figure Page
Figure Caption
No. No.
Figure 1 Python Code with Libraries 7
Figure 2 Encryption Code with Output 8
Figure 3 Decryption Code with Output 8
Figure 4 Original Image 9
Figure 5 Encrypted Image 9
CHAPTER 1
Introduction
1.2 Motivation:
This project was chosen due to the growing importance of digital privacy, information
security, and the increasing sophistication of cyber threats. Steganography offers a unique
approach to data protection by making hidden information virtually invisible, serving as a
powerful complement to traditional encryption.
Ideal for secure internal communications, copyright marking, digital watermarking, and
covert data channels, especially in environments where encrypted data might be
scrutinized.
pg. 1
1.3 Objective:
The primary objectives of this project are:
To develop a Python-based application for embedding secret text messages into digital
images.
To implement a secure and reversible ASCII-based XOR operation for data concealment.
To create a corresponding extraction mechanism that can accurately retrieve the hidden
message using the correct XOR key.
Cover Medium: Digital image files (e.g., PNG, JPG) supported by the Pillow library.
Key Management: A simple shared XOR key (character or sequence) for both
embedding and extraction.
Limitations:
This project does not include advanced cryptographic features beyond XOR
The capacity for hidden data is dependent on the size and properties of the cover image.
pg. 2
CHAPTER 2
Literature Survey
Steganography, derived from the Greek words "steganos" (covered) and "graphia"
(writing), is the art of hiding communication. Its history dates back to ancient Greece, where
messages were tattooed on slaves' scalps and hidden under wax tablets. In the digital age,
steganography has evolved to conceal information within various digital media, including
images, audio, video, and text files. The fundamental principle is to embed a secret message
within a "cover" file, producing a "stego-file" that appears innocuous.
Least Significant Bit (LSB) Insertion: This is one of the simplest and most widely
used techniques. It involves replacing the least significant bits of the pixel values in
the cover image with the bits of the secret message. Because LSB changes only
slightly alter the pixel's color, the changes are usually imperceptible to the human
eye. This project primarily utilizes LSB insertion.
Transform Domain Techniques: These methods embed data into the transform
coefficients of the cover image (e.g., using Discrete Cosine Transform (DCT) in
JPEG images or Discrete Wavelet Transform (DWT)). These methods are generally
more robust to image manipulations like compression and filtering compared to
spatial domain methods.
Cover Generation: Instead of finding a suitable cover, this method generates a cover
medium that inherently contains the secret message.
pg. 3
CHAPTER 3
Proposed Methodology
pg. 4
o Stego-Image: The final image file that visually resembles the original Cover Image but
contains the hidden Secret Message.
pg. 5
Software Requirements:
Operating System: Platform-independent (Windows 10/11, macOS, Linux
distributions).
Programming Language: Python 3.8 or higher.
Integrated Development Environment (IDE) / Code Editor: Any preferred IDE such
as VS Code, PyCharm, or Jupyter Notebook, Google Colab.
Required Python Libraries:
o Pillow (PIL Fork)
Installation Command: pip install Pillow
o NumPy
Installation Command: pip install numpy
o PyCryptoDome (Crypto.Cipher)
Installation Command: pip install pycryptodome
pg. 6
CHAPTER 4
Result
4.1 Result:
The implementation of this project involved writing Python scripts that utilized the PIL
(Pillow) library for image manipulation and NumPy for efficient array operations. The core
logic handles the conversion of text to ASCII, the application of XOR with a secret key, and
the strategic embedding/extraction of these processed bits into/from the Least Significant
Bits of image pixels.
pg. 7
Figure 2: Encryption_code_with_output
Figure 3: Decryption_code_with_output
pg. 8
Figure 4: Original_Image
Figure 5: Encrypted_Image
pg. 9
CHAPTER 5
Conclusion
The project serves as a valuable educational tool, fulfilling its role within the AICTE-
Edunet Foundation IBM SkillsBuild Cybersecurity Internship 2025 by providing a
practical, hands-on understanding of:
pg. 10
REFERENCES
pg. 11