SlideShare ist ein Scribd-Unternehmen logo
1 von 29
STEGANOGRAPHY



Project Guide:          Submitted by:
Mr. Murari Kr. Singh    Sachin
 Rathi(0622510046)               Pradeep
 Maurya(0622510035)              Krishn
 Kanhaiya(0622510027)
Greek Words:
              STEGANOS – “Covered”
              GRAPHIE – “Writing”
Steganography : Art and science of hiding the
 existence of messages.

Embedding the message in some medium such
 as a document, image, audio or video.
Problem Definition
Problems with nowadays security systems :
   Even after applying encryption, data is not
    secure.
   Encryption   and decryption     algorithms
    require much time.

People need a system having high security and
 user friendly environment.
A Steganography System
Message File                      Message File

                 Cover File




   Steganography Tool         Steganography Tool




        Steg File                    Steg File
   (with hidden data)           (with hidden data)


   Hiding messages             Extracting messages
Functions to be provided
 Embed message into file.


 Embed file(image, text , audio, video etc.) into other
 file.

 Retrieve message from the file containing embedded
 message.

 Retrieve file from file containing embedded message.


 Encrypting message/file before embedding into other
 files.
Embedding message
  within image




 Encryption      Steganography
              (Containsembedded
              encrypted message)
Hiding image within an image

        +       =>
BASIC PRINCIPLE USED
         Secret
         image                           Stego
                                         Object

Cover
Image
                  Encoder



                                         Key
Secret
                  Decoder
Image                                  Communications
                                       Channel
                            Original
                            Cover
Solution Strategy

                     Steganography

  Embed             Retrieve        Embed          Retrieve
  Message           Message          File            File

Encrypt   Compres    Decrypt   Encrypt   Compres    Decrypt
Message    s File    Message     File     s File     File


 DES        ZIP       DES        ZIP        DES       ZIP
LSB Based Steganography
       Technique

Substitute the least significant bit of each
sampling point with a binary message.


      Hiding 1 bit of image in 16 bit sample




      Hiding 4 bit of image in 16 bit sample
Example of LSB Technique
16 bit message ‘A’ in binary 16 bit encoded message


1001 1000 0011 1100   0     1001 1000 0011 1100

1101 1011 0011 1000   1     1101 1011 0011 1001

1011 1100 0011 1101   1     1011 1100 0011 1101

1011 1111 0011 1100   0     1011 1111 0011 1100

1011 1010 0111 1111   0     1011 1010 0111 1110

1111 1000 0011 1100   1     1111 1000 0011 1101

1101 1100 0111 1000   0     1101 1100 0111 1000
Team Structure
Development Schedule
Duration                     Tasks Accomplished

1st Week of August,2009      Introduction of project

1st Week Of September,2009   System requirement

1st Week Of October,2009     DFD, Use Case Diagram

2nd Week Of November,2009    System Requirement
                             Specification
2nd Week Of February,2010    Designing

Last Week Of April,2010      First Running Module Of
                             Project
PLATFORM USED
OPERATING SYSTEM:
  MICROSOFT WINDOWS XP
FRONT END:
  java 1.6.0
HARDWARE USED:
  Pentium IV 1.5 GHz.
  512 MB RAM
MINIMUM HARDWARE
 REQUIREMENT:
  Pentium III 166 MHz. Or higher
  128 MB RAM
Use Case Diagram
             Steganography
             Encryption on
                Message

             Steganography
             Encryption on
                  File

Sender
              Compression

             Steganography
             Decryption on
                Message

             Steganography
             Decryption on
                  File

             Decompression
                             Receiver
0 Level DFD

  Secret
   Secret
Message/File
Message/File


                    Steganography
                    Steganography    Steg File
                                     Steg File
                        System
                        System        Secret +
                                      Secret +
                                    Carrier File
                                    Carrier File

   Carrier File
   Carrier File
(txt,doc,pdf,jpg
 (txt,doc,pdf,jpg
    ,avi etc.)
     ,avi etc.)
Level - 1 DFD
    Secret
     Secret           Carrier File
                      Carrier File           Secret
                                              Secret
   Message
   Message                                     File
                                                File
                     Compression
                     Compression
                       Process
                       Process
                           Compressed
Steganography
 Steganography                            Steganography
                                           Steganography
                             steg file
  Encryption
   Encryption                               Encryption
                                             Encryption
    process
     process        Decompression
                    Decompression             process
                                               process
                       Process
                        Process
                           Uncompressed
                           steg file
   Steg File
    Steg File        Steganography            Steg File
                                               Steg File
                      Steganography
Hidden Message
Hidden Message         Decryption           Hidden File +
                                            Hidden File +
                        Decryption
 + Carrier File
  + Carrier File                             Carrier File
                                             Carrier File
                       Secret
                        Secret
                     Message/File
                     Message/File
Level - 2 DFD
(Steganography Encryption & Decryption process on secret file/msg)

     Secret
      Secret
                                                  Steg File
                                                   Steg File
       File
        File
                                                Secret File +
                                                 Secret File +
                     Steganography
                      Steganography              Carrier File
                                                  Carrier File
                       Encryption
                        Encryption
                         Process
                          Process
    Carrier
    Carrier                                     Steganography
                                                 Steganography
     File
      File                             C          Decryption
                                                   Decryption
                                       C            Process
                                                    Process
                                                        extract

                       Steg File
                        Steg File                   Secret
                                                     Secret
                     Secret File +
                      Secret File +                   File
                                                       File
                     Carrier File
                      Carrier File
Level - 2 DFD
 (Steganography process with compression & decompression on
filemsg)
                                              Compressed
                                              Compressed
                                                Steg File
                                                 Steg File
    Secret
     Secret         Steganography
                     Steganography
      File
       File         Encryption
                    Encryption
                           Process
                            Process
                                              Decompressio
                                              Decompressio
                           Steg file            n Process
                                                n Process
    Carrier
    Carrier
     File
      File                                           Uncompressed
                                       C
                    Compression
                    Compression                      steg file
                                       C
                      Process
                      Process                 Steganography
                                               Steganography
                                                Decryption
                                                 Decryption
                                                  Process
                                                  Process
                     Compressed
                     Compressed                      extract
                      Steg File
                       Steg File
                                                 Secret
                                                  Secret
                                                   File
                                                    File
Main Form
Select Master file
Embedding message
Master File Information
Retrieved Message
Embedding file
Master file information
Limitations
Sender & receiver must agree on a method in which to hide
 the message.
Quite an amount of covering information is needed to hide
 whatever we want to. At least 8 to 10 times more if we really
 want it to be non-detectable.
Nevertheless if the fact of the hiding becomes evident then
 the entire business of hiding becomes virtually useless, if the
 information is not encrypted from before.
Editing or compressing the picture do catastrophic damage
 to the hidden information.
Thanks
     For
  giving
   your

valuable
     time

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Audio steganography algorithms
Audio steganography algorithmsAudio steganography algorithms
Audio steganography algorithms
 

Andere mochten auch

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudSravan Narra
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 

Andere mochten auch (18)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Bch codes
Bch codesBch codes
Bch codes
 
BCH CODE AND DECODING BCH
BCH CODE AND DECODING BCHBCH CODE AND DECODING BCH
BCH CODE AND DECODING BCH
 
BCH Codes
BCH CodesBCH Codes
BCH Codes
 
Steganography document
Steganography documentSteganography document
Steganography document
 
key aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloudkey aggregate cryptosystem for scalable data sharing in cloud
key aggregate cryptosystem for scalable data sharing in cloud
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Stegnography
StegnographyStegnography
Stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 

Ähnlich wie Final stagenography

Steganography.
Steganography.Steganography.
Steganography.yprajapati
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography NidhinRaj Saikripa
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai
 
Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009ClubHack
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxGerhard Claassen
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyIOSR Journals
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityIAEME Publication
 

Ähnlich wie Final stagenography (20)

Steganography.
Steganography.Steganography.
Steganography.
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
A04020107
A04020107A04020107
A04020107
 
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
Audio-video Crypto Steganography using LSB substitution and advanced chaotic ...
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
 
Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2Suhas Desai Clubhack09 Open Source Data Security 0.2
Suhas Desai Clubhack09 Open Source Data Security 0.2
 
Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009Suhas desai _open_source_data_security - ClubHack2009
Suhas desai _open_source_data_security - ClubHack2009
 
Steganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptxSteganography - Hiding in plain sight.pptx
Steganography - Hiding in plain sight.pptx
 
HACKING
HACKINGHACKING
HACKING
 
H41034449
H41034449H41034449
H41034449
 
Enhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio SteganographyEnhancement of Data Hiding Capacity in Audio Steganography
Enhancement of Data Hiding Capacity in Audio Steganography
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Aoevideo
AoevideoAoevideo
Aoevideo
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
Multimedia
MultimediaMultimedia
Multimedia
 

Kürzlich hochgeladen

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Kürzlich hochgeladen (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Final stagenography

  • 1. STEGANOGRAPHY Project Guide: Submitted by: Mr. Murari Kr. Singh Sachin Rathi(0622510046) Pradeep Maurya(0622510035) Krishn Kanhaiya(0622510027)
  • 2. Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” Steganography : Art and science of hiding the existence of messages. Embedding the message in some medium such as a document, image, audio or video.
  • 3. Problem Definition Problems with nowadays security systems :  Even after applying encryption, data is not secure.  Encryption and decryption algorithms require much time. People need a system having high security and user friendly environment.
  • 4. A Steganography System Message File Message File Cover File Steganography Tool Steganography Tool Steg File Steg File (with hidden data) (with hidden data) Hiding messages Extracting messages
  • 5. Functions to be provided  Embed message into file.  Embed file(image, text , audio, video etc.) into other file.  Retrieve message from the file containing embedded message.  Retrieve file from file containing embedded message.  Encrypting message/file before embedding into other files.
  • 6. Embedding message within image Encryption Steganography (Containsembedded encrypted message)
  • 7. Hiding image within an image + =>
  • 8. BASIC PRINCIPLE USED Secret image Stego Object Cover Image Encoder Key Secret Decoder Image Communications Channel Original Cover
  • 9. Solution Strategy Steganography Embed Retrieve Embed Retrieve Message Message File File Encrypt Compres Decrypt Encrypt Compres Decrypt Message s File Message File s File File DES ZIP DES ZIP DES ZIP
  • 10. LSB Based Steganography Technique Substitute the least significant bit of each sampling point with a binary message. Hiding 1 bit of image in 16 bit sample Hiding 4 bit of image in 16 bit sample
  • 11. Example of LSB Technique 16 bit message ‘A’ in binary 16 bit encoded message 1001 1000 0011 1100 0 1001 1000 0011 1100 1101 1011 0011 1000 1 1101 1011 0011 1001 1011 1100 0011 1101 1 1011 1100 0011 1101 1011 1111 0011 1100 0 1011 1111 0011 1100 1011 1010 0111 1111 0 1011 1010 0111 1110 1111 1000 0011 1100 1 1111 1000 0011 1101 1101 1100 0111 1000 0 1101 1100 0111 1000
  • 13. Development Schedule Duration Tasks Accomplished 1st Week of August,2009 Introduction of project 1st Week Of September,2009 System requirement 1st Week Of October,2009 DFD, Use Case Diagram 2nd Week Of November,2009 System Requirement Specification 2nd Week Of February,2010 Designing Last Week Of April,2010 First Running Module Of Project
  • 14. PLATFORM USED OPERATING SYSTEM: MICROSOFT WINDOWS XP FRONT END: java 1.6.0 HARDWARE USED: Pentium IV 1.5 GHz. 512 MB RAM MINIMUM HARDWARE REQUIREMENT: Pentium III 166 MHz. Or higher 128 MB RAM
  • 15. Use Case Diagram Steganography Encryption on Message Steganography Encryption on File Sender Compression Steganography Decryption on Message Steganography Decryption on File Decompression Receiver
  • 16. 0 Level DFD Secret Secret Message/File Message/File Steganography Steganography Steg File Steg File System System Secret + Secret + Carrier File Carrier File Carrier File Carrier File (txt,doc,pdf,jpg (txt,doc,pdf,jpg ,avi etc.) ,avi etc.)
  • 17. Level - 1 DFD Secret Secret Carrier File Carrier File Secret Secret Message Message File File Compression Compression Process Process Compressed Steganography Steganography Steganography Steganography steg file Encryption Encryption Encryption Encryption process process Decompression Decompression process process Process Process Uncompressed steg file Steg File Steg File Steganography Steg File Steg File Steganography Hidden Message Hidden Message Decryption Hidden File + Hidden File + Decryption + Carrier File + Carrier File Carrier File Carrier File Secret Secret Message/File Message/File
  • 18. Level - 2 DFD (Steganography Encryption & Decryption process on secret file/msg) Secret Secret Steg File Steg File File File Secret File + Secret File + Steganography Steganography Carrier File Carrier File Encryption Encryption Process Process Carrier Carrier Steganography Steganography File File C Decryption Decryption C Process Process extract Steg File Steg File Secret Secret Secret File + Secret File + File File Carrier File Carrier File
  • 19. Level - 2 DFD (Steganography process with compression & decompression on filemsg) Compressed Compressed Steg File Steg File Secret Secret Steganography Steganography File File Encryption Encryption Process Process Decompressio Decompressio Steg file n Process n Process Carrier Carrier File File Uncompressed C Compression Compression steg file C Process Process Steganography Steganography Decryption Decryption Process Process Compressed Compressed extract Steg File Steg File Secret Secret File File
  • 27.
  • 28. Limitations Sender & receiver must agree on a method in which to hide the message. Quite an amount of covering information is needed to hide whatever we want to. At least 8 to 10 times more if we really want it to be non-detectable. Nevertheless if the fact of the hiding becomes evident then the entire business of hiding becomes virtually useless, if the information is not encrypted from before. Editing or compressing the picture do catastrophic damage to the hidden information.
  • 29. Thanks For giving your valuable time