Вы находитесь на странице: 1из 2

SECURE COMMUNICATION USING STEGANOGRAPHY

Under the guidance of


Chandrasekaran R, Prabhakar T.S,
Scientist ‘F’, Lecturer,
ADE, DRDO. ISE, PESCE.

ABSTRACT
For the past few years, cryptography and steganography are exclusively being used for secured
data communication. Here we propose a new method for strengthening security through the
combination of the above two techniques. Cryptography provides security by concealing the
contents and steganography provides security by concealing existence of the information being
communicated. The proposed method, viz secure communication using steganography consists of
encryption, embedding, revealing and decryption steps.

KEYWORDS
Cryptography, Steganography, RSA, LSB, JPEG

INTRODUCTION
In the age of advanced technology, people have created and relied upon various methods like
LAN, WAN, INTERNET etc. for transferring information around the globe. These
communication networks are open and can be accessed easily. Thus they must be regularly
monitored and intercepted. Steganography, in Greek means secret writing and is a long-practiced
form of hiding information. Although it is related to cryptography, they are not the same.
Steganography’s intent is to hide the existence of message, while cryptography scrambles a
message so that it cannot be detected.
Steganography includes vast array of techniques for hiding messages in a variety of
media. A message is embedded in a cover media in an invisible manner so that one could not
suspect its existence.

HARDWARE REQUIREMENTS
Hard disk - 7200 RPM
Memory - 1024 MB
Processor - Intel Pentium® IV
Speed - 2.22 GHz

Page 1 of 2
SOFTWARE REQUIREMENTS
Operating System - Windows® XP/Vista/Server 2003
Front End - ASP.NET/C#.NET
Programming Language - C/C#
Development Tool - Visual Studio 9

PROPOSED SYSTEM

APPLICATIONS
It is applicable, but not limited to the following areas:
 Confidential communication and secret data storing.
 Protection of data alteration.
 Access control system for digital content distribution.
 Metadata in a media Database systems.

Real-time Examples:
1. Steganography is used by some modern printers to contain encoded printer serial
numbers, as well as date and time stamps in the form of dots.
2. In 2010, FBI revealed that the Russian foreign intelligence service uses customized
steganography software for certain communications with "illegal agents".
3. Steganalysis is efficient for tracking terrorist communications.

TEAM STRENGTH
Three.

DURATION
Three months.

Page 2 of 2

Вам также может понравиться