From 4759fb6759dc292c8343c1b552752bffec17d465 Mon Sep 17 00:00:00 2001
From: Majd Hafiri <majd.hafiri@stud.th-deg.de>
Date: Tue, 18 May 2021 13:36:26 +0000
Subject: [PATCH] Update Project proposal.md

---
 Project proposal.md | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/Project proposal.md b/Project proposal.md
index bd23157..4fed278 100644
--- a/Project proposal.md	
+++ b/Project proposal.md	
@@ -5,7 +5,7 @@
 ## Overview
 **Use case 1**: We want to create an IP which can curb Intelluctual property theft using Stegnography alogorithms(LSB - bit manipulation). By this, each images will be having a secret Identifier embedded in it, which can be used to check the ownership.
 
-**Use Case 2**: This can also be used between two parties who want to exchange secret information through images.
+**Use Case 2**: This can also be used between two parties who want to exchange secret information through images by changing pixel values.
 
 ## Background
 **Use Case 1** : 
@@ -18,8 +18,8 @@ Since Intelluctual property theft is becoming a common act in current world scen
 image credits: [wikimedia](https://en.wikipedia.org/wiki/Bit_numbering#mediaviewer/File:Least_significant_bit.svg) , [technicalfoundation](https://technical-foundation.blogspot.com/2017/11/steganography-hide-data-in-images-with.html)
 
 
-**Use Case 2** :In order to 
-Doing small changes to the values for some pixels of one colour image won't be possible for human eyes to see those modified pixels but It is possible to do it on a software. These modified pixels represent a message somehow.
+**Use Case 2** : 
+Doing small changes to the values for some pixels of an image won't be possible for human eyes to see those modified pixels but It is possible to do it on a software. These modified pixels represent a message somehow.
 
 
 ## Implementation Strategy
@@ -28,7 +28,7 @@ Use Case 1:
 
 
 Use Case 2: 
-In order for both parties to agree on the secret, An algorithm must be implemented. This Algorithm accepts the user message and change some pixels values of an Image. Pixel values modification is based on a specific criteria (not decided yet). For example , If the sender wants to send the number "5" as a secret message , The algorithm could change 5 pixel values in the one color image and in the receiver part , the algorithm will calculate the number of modified pixels.
+In order for both parties to agree on the secret, An algorithm must be implemented. This Algorithm accepts the user message and change some pixels values of an Image. Pixel values modification is based on a specific criteria (not decided yet). For example , If the sender wants to send the number "5" as a secret message , The algorithm could change 5 pixel values in the image which makes these 5 pixels have a unique value. and in the receiver part , the algorithm will calculate the number of modified pixels and identify the sender message.
 
 How it works:
 
-- 
GitLab