final stagenography
DESCRIPTION
stegnography art of hidingTRANSCRIPT
STEGANOGRAPHY
Project Guide: Submitted by:Mr. Murari Kr. Singh Sachin
Rathi(0622510046) Pradeep Maurya(0622510035) Krishn Kanhaiya(0622510027)
Kamlesh Maddheshiya(0622510023)
Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”
Steganography : Art and science of hiding the existence of messages.
Embedding the message in some medium such as a document, image, audio or video.
Problem DefinitionProblems with nowadays security
systems : Even after applying encryption, data is
not secure. Encryption and decryption algorithms
require much time.
People need a system having high security and user friendly environment.
A Steganography System
Message File
Cover File
Steganography Tool
Steg File(with hidden data)
Steganography Tool
Hiding messages Extracting messages
Steg File(with hidden data)
Message File
Functions to be provided
Embed message into file.
Embed file(image, text , audio, video etc.) into other file.
Retrieve message from the file containing embedded message.
Retrieve file from file containing embedded message.
Encrypting message/file before embedding into other files.
Embedding message within
image
Encryption Steganography(Contains embedded encrypted message)
Hiding image within an image
+ =>
BASIC PRINCIPLE USED
Encoder
Decoder
Cover Image
Secretimage
Key
Stego Object
Original Cover
Secret Image Communications
Channel
Steganography
Embed Messag
e
Retrieve Messag
e
Embed File
Retrieve File
Encrypt
Message
Compress File
Decrypt
Message
Encrypt File
Compress File
Decrypt File
DES ZIP
Solution Strategy
DES ZIP DES ZIP
LSB Based Steganography
Technique
Hiding 1 bit of image in 16 bit sample
Hiding 4 bit of image in 16 bit sample
Substitute the least significant bit of each sampling point with a binary message.
16 bit message ‘A’ in binary 16 bit encoded message
1001 1000 0011 1100 0 1001 1000 0011 1100
1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1010 0111 1111 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
Example of LSB Technique
Team Structure
Development ScheduleDuration Tasks Accomplished
1st Week of August,2009 Introduction of project
1st Week Of September,2009
System requirement
1st Week Of October,2009 DFD, Use Case Diagram
2nd Week Of November,2009
System Requirement Specification
2nd Week Of February,2010
Designing
Last Week Of April,2010 First Running Module Of Project
PLATFORM USEDOPERATING SYSTEM: MICROSOFT WINDOWS XP
FRONT END: java 1.6.0
HARDWARE USED: Pentium IV 1.5 GHz. 512 MB RAM
MINIMUM HARDWARE REQUIREMENT:
Pentium III 166 MHz. Or higher 128 MB RAM
Decompression
Steganography
Encryption on MessageSteganograp
hy Encryption
on File
CompressionSender
Receiver
Steganography
Decryption on
MessageSteganography
Decryption on File
Use Case Diagram
Steg FileSecret + Carrier
File
Steg FileSecret + Carrier
FileCarrier File (txt,doc,pdf,jpg,avi etc.)
Carrier File (txt,doc,pdf,jpg,avi etc.)
Secret Message/
File
Secret Message/
File
Steganography SystemSteganography System
0 Level DFD
Steganography
Encryption process
Steganography
Encryption process
Compression ProcessCompression Process
Decompression
Process
Decompression
Process
Steganography
Decryption
Steganography
Decryption
Steganography
Encryption process
Steganography
Encryption process
Level - 1 DFD
Compressedsteg file
Uncompressed steg file
SecretMessageSecret
Message
Steg FileHidden
Message + Carrier File
Steg FileHidden
Message + Carrier File
Carrier File
Carrier File
SecretFile
SecretFile
Steg FileHidden File + Carrier File
Steg FileHidden File + Carrier File
SecretMessage/
File
SecretMessage/
File
Steganography
Encryption Process
Steganography
Encryption Process
Secret File
Secret File
CarrierFile
CarrierFile C
C
SecretFile
SecretFile
Steganography
Decryption Process
Steganography
Decryption Process
Steg FileSecret File + Carrier File
Steg FileSecret File + Carrier File
Steg FileSecret File + Carrier File
Steg FileSecret File + Carrier File
extract
Level - 2 DFD (Steganography Encryption & Decryption process on secret file/msg)
Compression ProcessCompression Process
Steganography
Encryption Process
Steganography
Encryption Process
Carrier File
Carrier File
CC
Secret File
Secret File
Secret File
Secret File
Compressed Steg File
Compressed Steg File
Steganography
Decryption Process
Steganography
Decryption Process
Compressed Steg File
Compressed Steg File
Decompression Process
Decompression ProcessSteg file
extract
Uncompressed steg file
Level - 2 DFD (Steganography process with compression & decompression on file\msg)
Main Form
Select Master file
Embedding message
Master File Information
Retrieved Message
Embedding file
Master file information
LimitationsSender & receiver must agree on a method in
which to hide the message.Quite an amount of covering information is needed
to hide whatever we want to. At least 8 to 10 times more if we really want it to be non-detectable.
Nevertheless if the fact of the hiding becomes evident then the entire business of hiding becomes virtually useless, if the information is not encrypted from before.
Editing or compressing the picture do catastrophic damage to the hidden information.
Thanks
For For
giving giving your your
valuable valuable
timetime