System Architecture.

Technical rationale for the choice of algorithms and data structures for the project.

AES-256-GCM

Authenticated encryption ensures confidentiality and prevents data tampering within the image.

LSB Method

Embedding into the least significant bits of RGB (Red, Green, Blue) color channels makes changes imperceptible to the eye.

Go Kernel

High-performance kernel for pixel-by-pixel processing of heavy PNG containers without delays.

PIN Hash

Using a PIN code to generate a unique initialization vector and session key.

Pixel Anatomy

LSB steganography leverages the fact that the human eye cannot distinguish minimal variations in brightness.

1/255: Maximum color value modification.
Lossless: PNG format (Lossless) is utilized.
R: 255...0
G: 120...1
B: 45...0
R: 254...1
G: 121...0
B: 44...0
R: 255...1
G: 120...0

Security Principles

Zero-Knowledge

The server does not store any user data.

Integrity Check

Over 70,000,000 images tested - flawless "encryption-decryption" performance.

Plausible Deniability

The image appears as a standard photograph even under histogram analysis.