Академический Документы
Профессиональный Документы
Культура Документы
CONTAINTS
1.INTRODUCTION
2.ABSTRACT
3.OBJECTIVE
4.TINY-ALGORITHM
5. TOOLS AND PLATFORM
6. MODULE DESCRIPTION
7.CONCLUSION
8.REFERENCES
INTRODUCTION
2
message can only be extracted if there is a shared secret between the sender and the
recipient. The figure below shows the steganographic system.
Encryption of data plays a vital role in the real time environment to keep the data out of
reach of unauthorized people, such that it is not altered and tampered and sending the in
video format is most secured way to transfer the data through the network. The Video
Stegnography is software, which tries to alter the originality of the file into some
encrypted form and embed the file into an video file. The major task of the Video
Stegnography is to provide the user the flexibility of passing the information
implementing the encryption standards as per the specification and algorithms proposed
and store the information in a form that is unreadable. The Application should have a
reversal process as of which should be in a position to de embed the data file from video
file and decrypt the data to its original format upon the proper request by the user. While
the Encryption and Decryption is done the application should confirm the standards of
authentication and authorization of the user.
The Entire application should strive to achieve a user friendly Graphical User Interface,
which need to be in a self-learning mode for the end user. The System Should provide all
the functional standards of proper navigation with in the environment, which makes it
possible for the users to have a smooth flow while working under the environment. The
Overall system should provide proper menu based navigation for easier navigation and
operation. The Application should be designed in such a way that, as soon as it starts
create a Buffer and associate this buffer to some homogeneous data environment, the
application should ask the user for the Encryption Key details and should start its
functionality upon the logistics that are provided with in this key. The key should be
designed in such a way that it prevents the unauthorized persons from stealing the
information at any point of time. This is some part of securing the data from third party
people. And the other way of securing the data is using Steganography in which
4
embedding the encrypted file in to a video file. If any one track that file they only see the
video file not the data.
The application of De-embedding, Decryption should be a reverse process at the other
end and should be translated only when the receiver of the data applies the proper
reversal key. The Decryption process should have a log-based methodology that will take
care of any errors that may be encountered while the system is under utilization and
should record all those events, which are above the general standards of security.
This system basically uses the Tiny Encryption Algorithm to encrypt the passwords. This
algorithm is a 64-bit block cipher with a variable length key. This algorithm has been
used because it requires less memory. It uses only simple operations, therefore it is easy
to implement.
ABSTRACT
Problem statement
6
RESEARCH PART
Tiny Encryption Algorithm:
last round where there is often no swap. The focus of this thesis is the TEA Feistel
Cipher.
10
LSB CODING
A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces
the least significant bit in some bytes of the cover file to hide a sequence of bytes
containing the hidden data. That's usually an effective technique in cases where the LSB
substitution doesn't cause significant quality degradation, such as in 24-bit bitmaps.
In computing, the least significant bit (LSB) is the bit position in a binary integer
giving the unitsvalue, that is, determining whether the number is even or odd. The LSB is
sometimes referred to as the right-most bit, due to the convention in positional notation of
writing less significant digit further to the right. It is analogous to the least significant
digit of a decimal integer, which is the digit in the ones (right-most) position.
The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit
binary number represents a value of 128 decimal. The LSB represents a value of 1. For
example, to hide the letter "a" (ASCII code 97, which is 01100001) inside eight bytes of a
cover, you can set the
LSB of each byte like this:
10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011
11
The application decoding the cover reads the eight Least Significant Bits of those bytes to
recreate the hidden bytethat is 0110001the letter "a." As you may realize, using this
technique
let you hide a byte every eight bytes of the cover. Note that there's a fifty percent chance
that the bit you're replacing is the same as its replacement, in other words, half the time,
the bit doesn't change, which helps to minimize quality degradation. The International
Journal of Multimedia & Its Applications (IJMA) method. Here the secret information is
HEY and the cover file is audio file. HEY is to be embedded inside the audio file. First
the secret information HEY and the audio file are converted into bit stream. The least
significant column of the audio file is replaced by the bit stream of sectet information
HEY. The resulting file after embedding secret information HEY is called Stego-file.
13
14
DISADVANTAGES:
Embedding additional information into audio sequences is a
more tedious task than that of images, due to dynamic
supremacy of the HAS over human visual system.
Robustness: Copyright marks hidden in audio samples using
substitution could be easily manipulated or destroyed if a
miscreant comes to know that information is hidden this
way.
Commercialized audio Steganography have disadvantages
that the existence of hidden messages can be easily
recognized visually and only certain sized data can be
hidden.
Compressing an audio file with lossy compression will result
in loss of the hidden message as it will change the whole
structure of a file. Also, several lossy compression schemes
use the limits of the human ear to their advantage by
removing all frequencies that cannot be heard. This will also
remove any frequencies that are used by a Steganography
system which hides information in that part of the spectrum.
Ram
512 MB DDR-Win XP
2GB DDR- Vista Business or
15
Hard drive
Vista Ultimate
1 GB
Memory
512 MB
Monitor
Software requirement: In order to carry out the development of this project, many
software are needed, these include Microsoft Windows XP, which shall be the operating
system for the project to be developed;
Front End: JDK, Java
IDE : Netbeans 6.9 and Above
Backend: MySql
MODULE DESCRIPTION
Retrieve Message
It involves retrieving the embed message from the file
independent of the file format. Once the message has been retrieved it
has to be converted into original message or file.
This can be done by reading the embedded data from the master file.
The read data will be in the bytes format. This message has to be
converted into the suitable output file format.
Decryption
Decryption includes a message or a file decrypting. Decryption
involves converting the cipher text into decrypted format. Decryption
can be done by passing a secret key. Secret key can be used for
17
CONCLUSION
The entire project has been developed and deployed as per
the requirements stated by the user, it is found to be bug free
as per the testing standards that is implemented.
Any
check
constraints in accessing
18
the file
types in
REFERENCES
BOOKS AND MANUALS :1.JAVA-2
Complete-Reference
19
Author
Publisher :
Publisher :
James A. senn
Tata McGraw Hill
Fairley
Tata McGraw Hill Publication,3rd
Edition.
20