Skip to content
Snippets Groups Projects
Commit 20ea4273 authored by Vipin Thomas's avatar Vipin Thomas
Browse files

Update Project proposal.md

parent 5da66131
No related branches found
No related tags found
No related merge requests found
......@@ -11,12 +11,6 @@
**Use Case 1** :
Since Intelluctual property theft is becoming a common act in current world scenario, companies or authorities can use this ip to embed secret identifiers in their media productions. So that we can easily identify plagarized images by checking the byte data. Doing small changes to the values for some pixels of one colour image won't be possible for human eyes to see those modified pixels but It is possible to do it on a software. These modified pixels represent a message somehow.
![images_bg1](https://miro.medium.com/max/2006/0*JTnkzopCLv2cRLuY.jpg)
![images_bg2](https://miro.medium.com/max/875/0*XWlQVMlAQra2KHSB.jpg)
image credits: [wikimedia](https://en.wikipedia.org/wiki/Bit_numbering#mediaviewer/File:Least_significant_bit.svg) , [technicalfoundation](https://technical-foundation.blogspot.com/2017/11/steganography-hide-data-in-images-with.html)
**Use Case 2** :
Doing small changes to the values for some pixels of an image won't be possible for human eyes to see those modified pixels but It is possible to do it on a software. These modified pixels represent a message somehow.
......@@ -26,6 +20,12 @@ Doing small changes to the values for some pixels of an image won't be possible
Use Case 1:
![images_bg1](https://miro.medium.com/max/2006/0*JTnkzopCLv2cRLuY.jpg)
![images_bg2](https://miro.medium.com/max/875/0*XWlQVMlAQra2KHSB.jpg)
image credits: [wikimedia](https://en.wikipedia.org/wiki/Bit_numbering#mediaviewer/File:Least_significant_bit.svg) , [technicalfoundation](https://technical-foundation.blogspot.com/2017/11/steganography-hide-data-in-images-with.html)
Use Case 2:
In order for both parties to agree on the secret, An algorithm must be implemented. This Algorithm accepts the user message and change some pixels values of an Image. Pixel values modification is based on a specific criteria (not decided yet). For example , If the sender wants to send the number "5" as a secret message , The algorithm could change 5 pixel values in the image which makes these 5 pixels have a unique value. and in the receiver part , the algorithm will calculate the number of modified pixels and identify the sender message.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment