scs image encryption

Upload: manu-kurakar

Post on 10-Apr-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Scs Image Encryption

    1/14

  • 8/8/2019 Scs Image Encryption

    2/14

    Table of Contents1.Introduction

    2.Overall Description

    3.External Interface Requirements

    4.System Features

    5.Other Non-Funtional Requirements

    6.DFD

    7.Conclusion and Future scope

    8.References

  • 8/8/2019 Scs Image Encryption

    3/14

    INTRODUCTIONy Steganography is a form ofsecurity through obscurity

    y

    Image steganography is the most widely used form ofsteganography.

    y Two issues regarding steganographic algorithm

    y Image distortion followed by steganographic process

    y Complexity of the linear transforms used

    y SCS image encryption is used to over come these issues

  • 8/8/2019 Scs Image Encryption

    4/14

    SCSImage Encryptiony It is a steganographic technique based on KL transform.

    y Input data is compressed using KLT.

    - To achieve higher concealing capacity.

    y It is hidden in the LSB of carrier object.

    y KLT require a great amount of processing time on larger set ofdata.

    y This problem is resolved by dividing digital image in to blocks

  • 8/8/2019 Scs Image Encryption

    5/14

    Carrier & Stego Images

    y Carrier image is the image chosen for encrypting the secret message(Pay load).

    y Stego image is the image formed after encryption.

    y Recovered message is the message recovered by the reciever.

  • 8/8/2019 Scs Image Encryption

    6/14

  • 8/8/2019 Scs Image Encryption

    7/14

    External Interface Requirementsy User Interface

    y Contains various screens like Initial screen , login screen, main form,help modules etc.

    y Hardware Interfacey 256 Mb of RAM is recommended with a 15 mb of hard disk free space for

    running this software.

    y Software interfacey Java Run Time environment (JRE 1.5) version for running and operating

    systems windows XP or higher is supported.

    y Communication interfacey Sending side modules and receiving side modules using TCP/IP protocol are

    also developing for safe and secure transmission.

  • 8/8/2019 Scs Image Encryption

    8/14

    System Featuresy Sender side

    y Segmentation: Secret message is segmented before compression toachieve concealing capacity and execution time.

    y Compression: KL transform based compression technique is usedfor compressing the segmented image. This reduces the energyloses as in the case of DCT.

    y Hide image:

  • 8/8/2019 Scs Image Encryption

    9/14

    System Features.Contdy Receiver Side

    y Retrieve Message: The receiving module in the receiver side receivesthe sent message and passed for decryption

    y Decryption: Decryption is exactly the reverse process of hidingprocess. Extract the hidden data from the LSB of stego image.

  • 8/8/2019 Scs Image Encryption

    10/14

    Other Non Functional

    requirementsy Performance

    y RAM should be 128 MB, 256 MB is recommended with a minium freespace of 15 MB is required for storage and execution.

    y Safetyy The size of the secret message will not exceed the maximum limit,

    otherwise the extra data will be truncated.y Security

    y First administrator account is created and then admin can create otheruser account. Password reset mechanism is also provided.

    y Software quality attributesy Software is developed such that its easy to extend and the software

    should be user friendly.y Business rules

    y User must satisfy the terms and conditions of the software. It should beused for intended purposes only.

  • 8/8/2019 Scs Image Encryption

    11/14

    Data Flow Diagram

  • 8/8/2019 Scs Image Encryption

    12/14

    Data Flow DiagramLevel 2 DFD

  • 8/8/2019 Scs Image Encryption

    13/14

    Conclusion and Future scopey The SCSA is a powerful algorithm in terms of

    y Execution time, concealing capacity, compression rate, stego imageand recovered message quality.

    y It is a good candidate for the use on multicore architecture

    y It is beneficial in implementing algorithm on mobile deviceswith video and image processing capabilities.

    y The algorithm is applicable only to images.

  • 8/8/2019 Scs Image Encryption

    14/14

    Referencesy http://www.jjtc.com/steganography

    y en.wikipedia.org/wiki/steganography

    y http://www.garykessler.net/library/steganography.html

    y http://www.computerworld.com

    y Segment Compression Steganographic AlgorithmDaniela Stanescu,Ioan-Gabriel Bucur, Mircea Stratulat,IEEE International JointConferences on Computational Cybernetics and Technical Informatics(ICCC-CONTI 2010) May 27-29, 2010 Timisora, Romania.