Skip to content

Latest commit

 

History

History
87 lines (64 loc) · 4.85 KB

README.md

File metadata and controls

87 lines (64 loc) · 4.85 KB

🛡️ SteGhost: Your Data’s Best-Kept Secret! 👁️‍🗨️

Welcome to SteGhost, a next-level steganography system that allows you to embed your sensitive data into images, videos, audio, or even QR codes with advanced encryption and hybrid algorithms. 🚀🔐

📜 Project Overview

SteGhost is our cutting-edge graduation project, developed with a strong focus on data security and concealment. Whether it's an image, video, audio file, or QR code, SteGhost provides a seamless process to embed files of any type into these formats using powerful algorithms. And the best part? It’s lightning fast and highly secure thanks to GPU processing. 💡💻

🛠️ How It Works

We designed SteGhost to offer a full spectrum of functionalities for data hiding, retrieval, and security:

  1. File Input: Take any file from the user (image, video, audio, or QR code).
  2. Data Processing Pipeline:
    • Compression 🔄
    • Binary Conversion 🧬
    • Encryption 🔐
    • Key Generation 🗝️ (for data retrieval)
  3. Embedding Process: Choose your preferred format (image, video, audio, or QR code) and embed your file.
  4. Retrieval Process:
    • Extract data from the multimedia format.
    • Decrypt using the key provided earlier.
    • Decompress and retrieve your original file.

All these steps are performed with ease via our intuitive GUI, available on both web and desktop platforms. 🎛️

🚀 Key Features & Advantages

  • 💾 Universal Input & Output: Accepts files of any type and embeds them into images, videos, audio files, or QR codes.
  • 🔒 Hybrid Encryption: Uses a blend of encryption methods for enhanced security.
  • 🧠 Intelligent Algorithms: Our video steganography intelligently selects key frames to hide data, making detection extremely difficult.
  • 🔀 Hybrid Steganography Algorithms: We use a combination of multiple steganography techniques to make it nearly impossible for anyone to extract hidden data.
  • 📈 Scalability: Capable of hiding large files and multiple files of different types simultaneously.
  • ⚡ GPU-Powered: Optimized to run efficiently with GPU acceleration, ensuring fast processing.
  • 🔐 Enhanced Security:
    • Hidden data is encrypted with keys, ensuring only authorized users can retrieve it.
    • Multiple algorithms are applied within a single file (e.g., dividing video into frames and applying different algorithms for each segment).
  • 📱 Versatility: Available as both a website and a desktop app.
  • 🛠 Robust Code: Fully handles video processing to embed and retrieve hidden data.

🎯 Why Choose SteGhost?

  1. Unmatched Concealment: We embed data into selected portions of frames or images, making it incredibly difficult to detect.
  2. Multiple Algorithms: By using different algorithms in different parts of a video or image, we significantly increase security and make it harder for attackers to retrieve the data.
  3. Fast & Efficient: With GPU-accelerated processing, the embedding and retrieval processes are swift.
  4. High Security: Your data remains safe and sound, thanks to encryption keys and multi-algorithm protection.
  5. Cross-Platform: Accessible from both web browsers and desktop environments.
  6. Handles Large Files: We support files of all sizes, ensuring maximum flexibility.
  7. Supports Various Formats: You can embed in formats like images, audio, video, and QR codes.

🎨 Our Unique Process

Embedding:

  1. User uploads a file (image, audio, video, QR code).
  2. Compression: The file is compressed to reduce its size.
  3. Binary Conversion: The data is transformed into a binary format.
  4. Encryption: We encrypt the binary data for maximum security.
  5. Embed: The encrypted data is embedded into the selected media format using our hybrid algorithms.

Retrieval:

  1. The user uploads the media file containing hidden data.
  2. Decryption: The user provides the key to decrypt the binary data.
  3. Decompression: The original data is decompressed.
  4. Retrieve: The hidden data is returned to the user.

💻 Technologies Used

  • Frontend: React, HTML5, CSS3, JavaScript
  • Backend: Node.js, Python for algorithm execution
  • Steganography Algorithms: LSB, PVD, F5, and custom hybrid algorithms
  • Encryption: AES, RSA (pre-built)
  • Compression: GZIP (pre-built)
  • GPU Processing: CUDA

💡 Future Enhancements

  • 🔗 Blockchain Integration: Further secure and authenticate hidden data by using blockchain technology.
  • 💻 AI-based Detection Avoidance: Incorporating machine learning to further enhance the concealment of data.

📫 Contact Us

Got questions, suggestions, or want to collaborate? Reach out at:
📧 Email: kareem.training1@gmail.com 📞 Phone: +201003991318