final stagenography

29
STEGANOGRAPHY Project Guide: Submitted by: Mr. Murari Kr. Singh Sachin Rathi(0622510046) Pradeep Maurya(0622510035) Krishn Kanhaiya(0622510027) Kamlesh Maddheshiya(0622510023)

Upload: richaria

Post on 24-May-2015

2.040 views

Category:

Education


0 download

DESCRIPTION

stegnography art of hiding

TRANSCRIPT

Page 1: Final stagenography

STEGANOGRAPHY

Project Guide: Submitted by:Mr. Murari Kr. Singh Sachin

Rathi(0622510046) Pradeep Maurya(0622510035) Krishn Kanhaiya(0622510027)

Kamlesh Maddheshiya(0622510023)

Page 2: Final stagenography

Greek Words:

STEGANOS – “Covered”

GRAPHIE – “Writing”

Steganography : Art and science of hiding the existence of messages.

Embedding the message in some medium such as a document, image, audio or video.

Page 3: Final stagenography

Problem DefinitionProblems with nowadays security

systems : Even after applying encryption, data is

not secure. Encryption and decryption algorithms

require much time.

People need a system having high security and user friendly environment.

Page 4: Final stagenography

A Steganography System

Message File

Cover File

Steganography Tool

Steg File(with hidden data)

Steganography Tool

Hiding messages Extracting messages

Steg File(with hidden data)

Message File

Page 5: Final stagenography

Functions to be provided

Embed message into file.

Embed file(image, text , audio, video etc.) into other file.

Retrieve message from the file containing embedded message.

Retrieve file from file containing embedded message.

Encrypting message/file before embedding into other files.

Page 6: Final stagenography

Embedding message within

image

Encryption Steganography(Contains embedded encrypted message)

Page 7: Final stagenography

Hiding image within an image

+ =>

Page 8: Final stagenography

BASIC PRINCIPLE USED

Encoder

Decoder

Cover Image

Secretimage

Key

Stego Object

Original Cover

Secret Image Communications

Channel

Page 9: Final stagenography

Steganography

Embed Messag

e

Retrieve Messag

e

Embed File

Retrieve File

Encrypt

Message

Compress File

Decrypt

Message

Encrypt File

Compress File

Decrypt File

DES ZIP

Solution Strategy

DES ZIP DES ZIP

Page 10: Final stagenography

LSB Based Steganography

Technique

Hiding 1 bit of image in 16 bit sample

Hiding 4 bit of image in 16 bit sample

Substitute the least significant bit of each sampling point with a binary message.

Page 11: Final stagenography

16 bit message ‘A’ in binary 16 bit encoded message

1001 1000 0011 1100 0 1001 1000 0011 1100

1101 1011 0011 1000 1 1101 1011 0011 1001

1011 1100 0011 1101 1 1011 1100 0011 1101

1011 1111 0011 1100 0 1011 1111 0011 1100

1011 1010 0111 1111 0 1011 1010 0111 1110

1111 1000 0011 1100 1 1111 1000 0011 1101

1101 1100 0111 1000 0 1101 1100 0111 1000

Example of LSB Technique

Page 12: Final stagenography

Team Structure

Page 13: Final stagenography

Development ScheduleDuration Tasks Accomplished

1st Week of August,2009 Introduction of project

1st Week Of September,2009

System requirement

1st Week Of October,2009 DFD, Use Case Diagram

2nd Week Of November,2009

System Requirement Specification

2nd Week Of February,2010

Designing

Last Week Of April,2010 First Running Module Of Project

Page 14: Final stagenography

PLATFORM USEDOPERATING SYSTEM: MICROSOFT WINDOWS XP

FRONT END: java 1.6.0

HARDWARE USED: Pentium IV 1.5 GHz. 512 MB RAM

MINIMUM HARDWARE REQUIREMENT:

Pentium III 166 MHz. Or higher 128 MB RAM

Page 15: Final stagenography

Decompression

Steganography

Encryption on MessageSteganograp

hy Encryption

on File

CompressionSender

Receiver

Steganography

Decryption on

MessageSteganography

Decryption on File

Use Case Diagram

Page 16: Final stagenography

Steg FileSecret + Carrier

File

Steg FileSecret + Carrier

FileCarrier File (txt,doc,pdf,jpg,avi etc.)

Carrier File (txt,doc,pdf,jpg,avi etc.)

Secret Message/

File

Secret Message/

File

Steganography SystemSteganography System

0 Level DFD

Page 17: Final stagenography

Steganography

Encryption process

Steganography

Encryption process

Compression ProcessCompression Process

Decompression

Process

Decompression

Process

Steganography

Decryption

Steganography

Decryption

Steganography

Encryption process

Steganography

Encryption process

Level - 1 DFD

Compressedsteg file

Uncompressed steg file

SecretMessageSecret

Message

Steg FileHidden

Message + Carrier File

Steg FileHidden

Message + Carrier File

Carrier File

Carrier File

SecretFile

SecretFile

Steg FileHidden File + Carrier File

Steg FileHidden File + Carrier File

SecretMessage/

File

SecretMessage/

File

Page 18: Final stagenography

Steganography

Encryption Process

Steganography

Encryption Process

Secret File

Secret File

CarrierFile

CarrierFile C

C

SecretFile

SecretFile

Steganography

Decryption Process

Steganography

Decryption Process

Steg FileSecret File + Carrier File

Steg FileSecret File + Carrier File

Steg FileSecret File + Carrier File

Steg FileSecret File + Carrier File

extract

Level - 2 DFD (Steganography Encryption & Decryption process on secret file/msg)

Page 19: Final stagenography

Compression ProcessCompression Process

Steganography

Encryption Process

Steganography

Encryption Process

Carrier File

Carrier File

CC

Secret File

Secret File

Secret File

Secret File

Compressed Steg File

Compressed Steg File

Steganography

Decryption Process

Steganography

Decryption Process

Compressed Steg File

Compressed Steg File

Decompression Process

Decompression ProcessSteg file

extract

Uncompressed steg file

Level - 2 DFD (Steganography process with compression & decompression on file\msg)

Page 20: Final stagenography

Main Form

Page 21: Final stagenography

Select Master file

Page 22: Final stagenography

Embedding message

Page 23: Final stagenography

Master File Information

Page 24: Final stagenography

Retrieved Message

Page 25: Final stagenography

Embedding file

Page 26: Final stagenography

Master file information

Page 27: Final stagenography
Page 28: Final stagenography

LimitationsSender & receiver must agree on a method in

which to hide the message.Quite an amount of covering information is needed

to hide whatever we want to. At least 8 to 10 times more if we really want it to be non-detectable.

Nevertheless if the fact of the hiding becomes evident then the entire business of hiding becomes virtually useless, if the information is not encrypted from before.

Editing or compressing the picture do catastrophic damage to the hidden information.

Page 29: Final stagenography

Thanks

For For

giving giving your your

valuable valuable

timetime