This Python project is designed to enable users to perform steganography, the art of hiding data within other files. It utilizes encryption and data binding techniques to securely conceal and later retrieve data within various file types.
Before using this project, ensure you have the following prerequisites:
- Python 3
- Required Python packages (list them in a
requirements.txt
file if applicable)
-
Clone this repository to your local machine:
git clone https://github.com/yourusername/your-project.git cd your-project pip install -r requirements.txt python3 run.py
- The main script of the project.
- Provides a graphical user interface (GUI) for user interaction.
- Allows users to select a "main video file" and a "secret file" for steganography operations.
- Provides options for encryption, data binding, decryption, and data extraction.
- Responsible for AES 256 encryption and decryption.
- Uses a hardcoded password for encryption.
- Encrypts and decrypts data before and after binding it to other files.
- Enables the hiding (binding) of encrypted data within other files.
- Combines encrypted data with another file for concealment.
- Provides functionality to extract the concealed data.
- Users select a "main video file" and a "secret file" through the GUI.
- The "secret file" is encrypted using AES 256 encryption.
- The encrypted data is hidden (bound) within the "main video file" using the
binder.py
module. - Users can choose an extension for the decrypted file (e.g., "jpeg," "mp4") and then decrypt the data, extracting it from the "main video file."
- Run the
run.py
script to open the GUI. - Follow the on-screen instructions to select files, perform encryption, data binding, decryption, and data extraction.
- This project serves as a simplified demonstration. In a real-world application, enhanced security measures and user authentication would be recommended for encryption and decryption.
- Steganography, while having legitimate use cases (e.g., watermarking or secure data transfer), should be used responsibly and ethically, considering privacy and security implications.
This project is provided under the XYZ License. For more details, refer to the LICENSE file.
For questions or feedback, please contact [email protected].