This document discusses steganography, which is the art and science of hiding messages. It involves embedding a secret message within another medium such as an image, audio, or video file. The document outlines some problems with current security systems and proposes a steganography system as a solution. It would allow users to embed and retrieve hidden messages and files. The system would use techniques like LSB steganography and encryption to hide data within image files. The document provides an overview of the proposed system's functions, development process, and some limitations of steganography.
1. STEGANOGRAPHY
Project Guide: Submitted by:
Mr. Murari Kr. Singh Sachin
Rathi(0622510046) Pradeep
Maurya(0622510035) Krishn
Kanhaiya(0622510027)
2. Greek Words:
STEGANOS – “Covered”
GRAPHIE – “Writing”
Steganography : Art and science of hiding the
existence of messages.
Embedding the message in some medium such
as a document, image, audio or video.
3. Problem Definition
Problems with nowadays security systems :
Even after applying encryption, data is not
secure.
Encryption and decryption algorithms
require much time.
People need a system having high security and
user friendly environment.
5. Functions to be provided
Embed message into file.
Embed file(image, text , audio, video etc.) into other
file.
Retrieve message from the file containing embedded
message.
Retrieve file from file containing embedded message.
Encrypting message/file before embedding into other
files.
6. Embedding message
within image
Encryption Steganography
(Containsembedded
encrypted message)
8. BASIC PRINCIPLE USED
Secret
image Stego
Object
Cover
Image
Encoder
Key
Secret
Decoder
Image Communications
Channel
Original
Cover
9. Solution Strategy
Steganography
Embed Retrieve Embed Retrieve
Message Message File File
Encrypt Compres Decrypt Encrypt Compres Decrypt
Message s File Message File s File File
DES ZIP DES ZIP DES ZIP
10. LSB Based Steganography
Technique
Substitute the least significant bit of each
sampling point with a binary message.
Hiding 1 bit of image in 16 bit sample
Hiding 4 bit of image in 16 bit sample
13. Development Schedule
Duration Tasks Accomplished
1st Week of August,2009 Introduction of project
1st Week Of September,2009 System requirement
1st Week Of October,2009 DFD, Use Case Diagram
2nd Week Of November,2009 System Requirement
Specification
2nd Week Of February,2010 Designing
Last Week Of April,2010 First Running Module Of
Project
14. PLATFORM USED
OPERATING SYSTEM:
MICROSOFT WINDOWS XP
FRONT END:
java 1.6.0
HARDWARE USED:
Pentium IV 1.5 GHz.
512 MB RAM
MINIMUM HARDWARE
REQUIREMENT:
Pentium III 166 MHz. Or higher
128 MB RAM
15. Use Case Diagram
Steganography
Encryption on
Message
Steganography
Encryption on
File
Sender
Compression
Steganography
Decryption on
Message
Steganography
Decryption on
File
Decompression
Receiver
17. Level - 1 DFD
Secret
Secret Carrier File
Carrier File Secret
Secret
Message
Message File
File
Compression
Compression
Process
Process
Compressed
Steganography
Steganography Steganography
Steganography
steg file
Encryption
Encryption Encryption
Encryption
process
process Decompression
Decompression process
process
Process
Process
Uncompressed
steg file
Steg File
Steg File Steganography Steg File
Steg File
Steganography
Hidden Message
Hidden Message Decryption Hidden File +
Hidden File +
Decryption
+ Carrier File
+ Carrier File Carrier File
Carrier File
Secret
Secret
Message/File
Message/File
18. Level - 2 DFD
(Steganography Encryption & Decryption process on secret file/msg)
Secret
Secret
Steg File
Steg File
File
File
Secret File +
Secret File +
Steganography
Steganography Carrier File
Carrier File
Encryption
Encryption
Process
Process
Carrier
Carrier Steganography
Steganography
File
File C Decryption
Decryption
C Process
Process
extract
Steg File
Steg File Secret
Secret
Secret File +
Secret File + File
File
Carrier File
Carrier File
19. Level - 2 DFD
(Steganography process with compression & decompression on
filemsg)
Compressed
Compressed
Steg File
Steg File
Secret
Secret Steganography
Steganography
File
File Encryption
Encryption
Process
Process
Decompressio
Decompressio
Steg file n Process
n Process
Carrier
Carrier
File
File Uncompressed
C
Compression
Compression steg file
C
Process
Process Steganography
Steganography
Decryption
Decryption
Process
Process
Compressed
Compressed extract
Steg File
Steg File
Secret
Secret
File
File
28. Limitations
Sender & receiver must agree on a method in which to hide
the message.
Quite an amount of covering information is needed to hide
whatever we want to. At least 8 to 10 times more if we really
want it to be non-detectable.
Nevertheless if the fact of the hiding becomes evident then
the entire business of hiding becomes virtually useless, if the
information is not encrypted from before.
Editing or compressing the picture do catastrophic damage
to the hidden information.