Skip to content
Snippets Groups Projects
Commit 6baa9799 authored by Vipin Thomas's avatar Vipin Thomas
Browse files

Update Project proposal.md

parent c2ef98dd
No related branches found
No related tags found
No related merge requests found
......@@ -11,7 +11,7 @@ Since Intelluctual property theft is becoming a common act in current world scen
![images_bg1](https://miro.medium.com/max/2006/0*JTnkzopCLv2cRLuY.jpg)
![images_bg2](https://miro.medium.com/max/875/0*XWlQVMlAQra2KHSB.jpg)
(image credits: [https://en.wikipedia.org/wiki/Bit_numbering#mediaviewer/File:Least_significant_bit.svg](wikimedia),[https://technical-foundation.blogspot.com/2017/11/steganography-hide-data-in-images-with.html](technicalfoundation))
(image credits: [https://en.wikipedia.org/wiki/Bit_numbering#mediaviewer/File:Least_significant_bit.svg](wikimedia) , [https://technical-foundation.blogspot.com/2017/11/steganography-hide-data-in-images-with.html](technicalfoundation))
## Implementation Strategy
In order for both parties to agree on a a secret message , An algorithm must be implemented. This Algorithm accepts the user message and change some pixels values of an Image. Pixel values modification is based on a specific criteria (not decided yet). For example , If the sender wants to send the number "5" as a secret message , The algorithm could change 5 pixel values in the one color image and in the receiver part , the algorithm will calculate the number of modified pixels.
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment