Authentication, security, and confidentiality are some of the most important topics of cyber security. It is a critical component of any security system and is essential in ensuring that only authorized personnel can access sensitive information or perform specific actions. There is a large amount of data that is confidential and there are lots of threats to the data if it is not secured properly. It involves the protection of networks or data from unauthorized manipulation and destruction.
Authentication is a critical component of any security system that verifies the identity of a user, device, or application attempting to access a resource or system. The purpose of this project is to design and implement a multi-factor authentication system to ensure the security of the system usingCryptography and Steganography.
To ensure the security of the authentication system, the project will implement appropriate security measures, using the complexities of Cryptography and Steganography. The project will also address requirements such as scalability, accessibility, usability, and reliability.
II. REPORT ON THE PRESENT INVESTIGATION
A. Existing System
Today, digitization has successfully permeated every aspect of contemporary society. Authentication is a crucial component for keeping this procedure safe. It includes a wide range of topics related to a hyper-connected environment, such as communications, access rights management, online payments, etc. The progression of authentication systems towards Multi-Factor Authentication (MFA), from Single-Factor Authentication (SFA), is explained in this work. MFA is planned to be used specifically for human-to-everything interactions by facilitating quick, simple, and trustworthyauthentication when logging into a service. The existing system right now has biometrics as authentication and password as another factor of authentication. Cracking the password is quite easy in the emerging technology. There various tools available to crack the passwords.
It is essential to add multiple layers of authentication where breaking the layer is difficult and costly. Therefore, layers of Steganography and cryptography has added to the security aspect to store data safely and securely.
The scope of the project is in the field of data security and cyber security. This project can be implemented in any company which wants to secure its data with multilayer authentication.
The password crashing system and tools have been able to crack the passwords of big organizations and individuals by the following techniques:-
Brute Force attacks and so on
Hence passwords can be easily cracked these days. But when it comes to steganography and cryptography it is not much popular and it is nearly next to impossible or quite difficult to crack the image steganography as well as the message which is encrypted.
The main aim of the project is to help at the national level to secure the data at a very high level.
IV. LITERATURE SURVEY
“Image Steganography: A Review of the Recent Advances”, IEEE . The main goal of this paper is to explore and discuss various deep-learning methods available in the image steganography field.
“Information Hiding in Images Using Steganography Techniques”, Research Gate . In this paper, we review some techniques of steganography and digital watermarking in both spatial and frequency domains.
“Image Steganography Techniques - A Review Paper”, IJARCCE . In this paper, a detailed literature review on a variety of different methods, algorithms, and schemes in image steganography is conducted to analyse and investigate them.
“Research on Various Cryptography techniques”, IJTRE . The objective of this paper is to find reviews and results of various cryptography techniques and to find comparative evaluation on each one using various techniques applied to the algorithms
“A RESEARCH PAPER ON CRYPTOGRAPHY”, IJTRE . Detailed study of cryptography and the basic study of data encryption and data decryption. Also, the study of asymmetric encryption is explained with the help of diagrams
“A Review Paper On Concepts Of Cryptography And Cryptographic Hash Function”, EJMCM  Detailed study of goals of cryptography and history of cryptography. Analysis of various techniques is also provided. Study of various cryptographic hash functions. This paper also gives comparisons between various cryptographic algorithms and different hash functions which help to understand the crux of cryptography. In various hash functions, attacks were found. More effective attacks can be developed i.e., the security level of newly and effectively develop hash functions can be checked.
V. PROBLEM STATEMENT
This project addresses the security problem of data or networks by providing fundamental cryptographic and steganography mechanisms of authentication for the implementation of a secure infrastructure. The authentication is implemented with layers of steganography and cryptography.
VI. IMPLEMENTATION AND METHODOLOGY
A. For sign up
Upload an Image
Enter a message which will be hidden in the Image using steganography
Enter a password to encrypt the above message
Press the sign-up button to create the account
Download the image which is generated by the system
B. For Log In
Upload the image which was generated from the sign-up process
Enter the password which was used to encrypt the message in the sign-up process
The password is used to decrypt the message in the image
If the message is same as it was in the sign-up process. Access is granted to the database otherwise access is denied
We sincerely thank our Atharva College of Engineering for providing us with a platform to prepare a project on the topic “Multi-Factor Authentication Using Cryptography and Steganography”. We want to appreciate all the help and support we have received from the organization and would like to thank them for instilling in us the need for this research and giving us the opportunity and time to conduct and present research on the topic. We are also grateful for having Prof. Shweta Sharma as our guide.
Thus, we have used the concept of Steganography and combined it with cryptography to offer strong multi-factor authentication. By implementing appropriate security measures, the authentication system provides a robust and secure authentication mechanism. This is a useful software to have a strong multi-layer authentication system where there is a lot of possibilities for the data to be leaked or the network to get disrupted.
 Nandhini Subramanian, Somaya Al-Maadeed, Ahmed Bouridane, “Image Steganography: A Review of the Recent Advances” IEEE, January 2021.
 Ramadhan J. Mstafa, Christian Bach, “Information Hiding in Images Using Steganography Techniques”, Research Gate, March 2013.
 Mohammed A. Saleh “Image Steganography Techniques - A Review Paper”, IJARCCE, September 2018.
 Yahia Alemami, Mohamad Afendee Mohamed, Saleh Atiewi, “Research on Various Cryptography Techniques”, IJTRE, July 2019.
 Gurdeep Singh, Prateek Kumar, Nishant Taneja, Gurpreet Kaur “A RESEARCH PAPER ON CRYPTOGRAPHY”, IJTRE, December 2019.
 Dr. R.K Gupta “A Review Paper On Concepts Of Cryptography And Cryptographic Hash Function”, EJMCM, 2020