Вы находитесь на странице: 1из 12

Implementation of BPCS in Steganography

Existing Work

Information send through any network have a chance to attack by hackers Encryption provides
an obvious approach to information security, and encryption programs are readily available.
However, encryption clearly marks a message as containing “interesting” information, and the
encrypted message becomes subject to attack. Furthermore, in many cases it is desirable to send
information without anyone even noticing that information has been sent secret information.

Objective of the Proposed System

The main objective of this system is we never leave any information about something will be
hided in that vessel.

Proposed System

• In Steganography, data is hidden inside a vessel or container that looks like it contains
only something else. A variety of vessels are possible, such as digital images, sound clips,
and even executable files.
• All of the traditional Steganography techniques have limited information-hiding capacity.
They can hide only 10% (or less) of the data amounts of the vessel.
• This Technique uses an image as the vessel data, and we embed secret information in the
bit-planes of the vessel.

• We can replace all of the “noise-like” regions in the bit-planes of the vessel image with
secret data without deteriorating the image quality.

• We termed our Steganography “BPCS-Steganography,” which stands for Bit-Plane


Complexity Segmentation Steganography
Requirements Analysis and Specification

Hardware requirements

Processor : Pentium Celeron

Processor Speed : 850 MHZ

Memory Size : 128MB

Hard Disk Drive : 40GB

Software Requirements

Operating System : Windows 98/2000/NT

Front End : JAVA 1.5.0

Back End : Oracle9i


Implementation

Modules

Bit-Plane Complexity Segmentation Steganography is our new Steganography technique, which


has a large information hiding capacity. As was shown in the previous section, the replacement
of the complex regions in each bit-plane of a color image with random binary patterns is invisible
to the human eye. We can use this property for our information hiding (embedding) strategy. Our
practical method is as follows.
In our method we call a carrier image a “vessel” or “dummy” image. It is a color image in
BMP file format, which hides (or, embeds) the secret information (files in any format). We
segment each secret file to be embedded into a series of blocks having 8 bytes of data each.

These blocks are regarded as 8  8 image patterns. We call such blocks the secret blocks. We
embed these secret blocks into the vessel image using the following steps.

1. Transform the dummy image from PBC to CGC system.

2. Segment each bit-plane of the dummy image into informative and noise-like regions by using
a threshold value (a0). A typical value is a0 = 0.3.

3. Group the bytes of the secret file into a series of secret blocks.

4. If a block (S) is less complex than the threshold ( 0), then Conjugate it to make it a more
complex block (S*). The conjugated block Must be more complex than 0 as shown by
equation

5. Embedded each secret block into the noise-like regions of the bit- planes (or, replace all the
noise-like regions with a series of secret blocks). If the block is conjugated, then record this fact
in a “conjugation map.”

6. Also embed the conjugation map as was done with the secret blocks
7. Convert the embedded dummy image from CGC back to PBC.

The Decoding algorithm (i.e., the extracting operation of the secret information from an
embedded dummy image) is just the reverse procedure of the embedding steps.

The novelty in BPCS-Steganography is itemized in the following.

A) Segmentation of each bit-plane of a color image into “Informative” and “Noise-like” regions.

B) Introduction of the B-W boarder based complexity measure () for region segmentation

C) Introduction of the conjugation operation to convert simple secret blocks to complex blocks.

D) Using CGC image plane instead of PBC plane

Modules Names

 Hider
 Retriever
Module Description

HIDER

1. Load Image

2. Load
Source

3. Choose
Encryption Keys

4. File
Compressor

5. Image Analyzer

6.File Hider
RETRIEVER

1. Choose
Embedded Image

2. Choose Text File

Directory

3. File Extractor

4. Content
Displayer
BPCS

1. Load 1. Choose
Image Embedded
Image
2. Load 2. Choose
Source Text File

3. Choose
Encryption Directory
3. File
Keys Extractor
4. File
Compressor 4. Content
Displayer
5. Image
Analyzer

6.File Hider
Sub Modules

Encryptor

• Public key Exponent Finder

• Private Key Exponent Finder

• File Reader

• File Text Encryption

• Encrypted File Storage

File Compressor

• Get Encrypted file from Encryptor

• File compression

• Store compressed File

Image Analyzer

• Identifier

• File size
Image List Viewer

• Database Connector

• Image List Displayer

• File Name Container

System Design

Flow Diagram

SERVER SIDE
Encryption key,

Other keys

Cover Embedding Marked


media
(Images. algorithm media

Audio files,

Network packets, (Stego


Information
Circuitry/software to hide media)

Text)
CLIENT SIDE
Decryption key,

Other keys

Stego Extraction Extracted


media algorithm message
FLOW DIAGRAM
(Client Side)

HOME
PAGE

ABOUT
LOGIN REGISTER
US

HOME User
PAGE
Exist

User Interaction

Stego-image

Encryption

Decompression

decryption

Original
Message
FLOW DIAGRAM
(Server Side)

HOME
PAGE

ABOUT
LOGIN REGISTER
US

HOME User
PAGE
Exist

User Interaction

Choose Vessel
Secret File
Image

Encryption

Compression

Data Hiding into


Vessel Image

Sign Out

Вам также может понравиться