Вы находитесь на странице: 1из 15

INDEX

S.No

Content

Page No

01

Objective

02

Introduction

03

Problem Statement

10

04

Use Case Diagram

11

05

Class Diagram

12

06

Data Flow Diagram

13

07

Conclusion and Future Scope

14

08

Bibliography

15

Objective
The goal of steganography is covert communication. So, a fundamental requirement of this
steganography system is that the hider message carried by stego-media should not be sensible to
human beings.
The other goad of steganography is to avoid drawing suspicion to the existence of a hidden
message. This approach of information hiding technique has recently became important in a
number of application area
This project has following objectives:

To product security tool based on steganography techniques.

To explore techniques of hiding data using encryption module of this project

To extract techniques of getting secret data using decryption module.

Steganography sometimes is used when encryption is not permitted. Or, more commonly,
steganography is used to supplement encryption. An encrypted file may still hide information
using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.

INTRODUCTION
One of the reasons that intruders can be successful is the most of the information they acquire
from a system is in a form that they can read and comprehend. Intruders may reveal the
information to others, modify it to misrepresent an individual or organization, or use it to launch
an attack. One solution to this problem is, through the use of steganography. Steganography is a
technique of hiding information in digital media. In contrast to cryptography, it is not to keep
others from knowing the hidden information but it is to keep others from thinking that the
information even exists.
Steganography become more important as more people join the cyberspace revolution.
Steganography is the art of concealing information in ways that prevents the detection of hidden
messages. Stegranography include an array of secret communication methods that hide the
message from being seen or discovered.
Due to advances in ICT, most of information is kept electronically. Consequently, the security of
information has become a fundamental issue. Besides cryptography, streganography can be
employed to secure information. In cryptography, the message or encrypted message is
embedded in a digital host before passing it through the network, thus the existence of the
message is unknown. Besides hiding data for confidentiality, this approach of information hiding
can be extended to copyright protection for digital media: audio, video and images.
The growing possibilities of modern communications need the special means of security
especially on computer network. The network security is becoming more important as the
number of data being exchanged on the internet increases. Therefore, the confidentiality and
data integrity are requires to protect against unauthorized access and use. This has resulted in an
explosive growth of the field of information hiding
Information hiding is an emerging research area, which encompasses applications such as
copyright protection for digital media, watermarking, fingerprinting, and steganography.
In watermarking applications, the message contains information such as owner identification and
a digital time stamp, which usually applied for copyright protection.

Fingerprint, the owner of the data set embeds a serial number that uniquely identifies the user of
the data set. This adds to copyright information to makes it possible to trace any unauthorized
used of the data set back to the user.
Steganography hide the secrete message within the host data set and presence imperceptible and
is to be reliably communicated to a receiver. The host data set is purposely corrupted, but in a
covert way, designed to be invisible to an information analysis.

What is Steganography?
Steganography is the practice of hiding private or sensitive information within something that
appears to be nothing out to the usual. Steganography is often confused with cryptology because
the two are similar in the way that they both are used to protect important information. The
difference between two is that steganography involves hiding information so it appears that no
information is hidden at all. If a person or persons views the object that the information is hidden
inside of he or she will have no idea that there is any hidden information, therefore the person
will not attempt to decrypt the information.
What steganography essentially does is exploit human perception, human senses are not trained
to look for files that have information inside of them, although this software is available that can
do what is called Steganography. The most common use of steganography is to hide a file inside
another file.

History of Steganography:
Through out history Steganography has been used to secretly communicate information between
people.
Some examples of use of Steganography is past times are:
1

During World War 2 invisible ink was used to write information on pieces of paper so
that the paper appeared to the average person as just being blank pieces of paper. Liquids
4

such as milk, vinegar and fruit juices were used, because when each one of these
substances are heated they darken and become visible to the human eye.
2

In Ancient Greece they used to select messengers and shave their head, they would then
write a message on their head. Once the message had been written the hair was allowed
to grow back. After the hair grew back the messenger was sent to deliver the message, the
recipient would shave off the messengers hair to see the secrete message.

RSA ALGORITHM (Rivest, Shamir & Adleman)


This algorithm is based on the difficulty of factorizing large numbers that have 2 and only 2
factors (Prime numbers). The system works on a public and private key system. The public key
is made available to everyone. With this key a user can encrypt data but cannot decrypt it, the
only person who can decrypt it is the one who possesses the private key. It is theoretically
possible but extremely difficult to generate the private key from the public key, this makes the
RSA algorithm a very popular choice in data encryption.

The RSA algorithm can be used for both public key encryption and digital signatures. Its security
is based on the difficulty of factoring large integers. RSA algorithm segregated into three parts:
Key Generation Algorithm (Used to create strong keys)
Encryption Algorithm (Converting the original text into cipher text)
Decryption Algorithm (Converting the cipher text into original text)

Algorithm
5

First of all, two large distinct prime numbers p and q must be generated. The product of these, we
call n is a component of the public key. It must be large enough such that the numbers p and q
cannot be extracted from it - 512 bits at least i.e. numbers greater than 10154.
We then generate the encryption key e which must be co-prime to the number
m = (n) = (p 1)(q 1).
We then create the decryption key d such that de mod m = 1. We now have both the public and
private keys.
Encryption
We let y = E(x) be the encryption function where x is an integer and y is the encrypted form of x
y=x
e%n

Decryption
We let X = D(y) be the decryption function where y is an encrypted integer and X is the
decrypted form of y
X=y
d%n

Why This Steganography?


This technique is chosen, because this system includes not only imperceptibility but also undelectability by any steganolysis tool.

The graphical representation of this system is as follows:

Start Application

Decryption

Encryption

Image

Image file

Message file

BMP image file

Encryption Process

IMAGE FILE

INFORMATION FILE

BMP FILE

Decryption Process

BMP FILE

INFORMATION FILE

IMAGE FILE

Problem Statement
The former consists of linguistic or language forms of hidden writing. The later, such as invisible
ink, try of hide messages physically. One disadvantage of linguistic steganography is that users
must equip themselves to have a good knowledge of linguistry. In recent years, everything is
trending toward digitization. And with the development of the internet technology, digital media
can be transmitted conveniently over the network. Therefore, messages can be secretly carried by
digital media by using the steganography techniques, and then be transmitted through the internet
rapidly
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are more
complex than others and all of them have respective strong and weak points.
So we prepare this application, to make the information hiding more simple and user friendly.

10

Use Case Diagram

Class Diagram

11

Data Flow Diagram

12

Context Diagram

Level-1 DFD

CONCLUSION AND FUTURE WORK


13

In the present world, the data transfers using internet is rapidly growingbecause it is so easier as
well as faster to transfer the data to destination. So, manyindividuals and business people use to
transfer business documents, importantinformation using internet. Security is an important issue
while transferring the datausing internet because any unauthorized individual can hack the data
and make ituseless or obtain information unintended to him.The proposed approach in this
project uses a new steganographic approach calledimage steganography. The application creates
a stego image in which the personaldata is embedded and is protected with a password which is
highly secured.The main intention of the project is to develop a steganographic application that
provides good security. The proposed approach provides higher security and canprotect the
message from stego attacks. The image resolution doesnt change much and is negligible when we
embed the message into the image and the image isprotected with the personal password. So, it is
not possible to damage the data byunauthorized personnel.I used the Least Significant Bit
algorithm in this project for developing the applicationwhich is faster and reliable and
compression ratio is moderate compared to otheralgorithms.The major limitation of the
application is designed for bit map images (.bmp). Itaccepts only bit map images as a carrier file,
and the compression depends on thedocument size as well as the carrier image size.The future
work on this project is to improve the compression ratio of the image tothe text. This project can
be extended to a level such that it can be used for thedifferent types of image formats like
.bmp, .jpeg, .tif etc., in the future. The securityusing Least Significant Bit Algorithm is good but
we can improve the level to acertain extent by varying the carriers as well as using different keys
for encryptionand decryption.

14

Bibliography

Websites
Following websites are referring to create this project reports.

http://www.google.com

http://www.microsoft.com

http://www.wikipedia.org

http://projectabstracts.com

Books
Following books and ebook are used to complete this project reports.

Windows Forms Programming in C#( by By Chris Sells)

Software Engineering ( by K.K. Singh & Yogesh Singh)

15