Вы находитесь на странице: 1из 39

SYNOPSIS ON STRGANOGRAPHY

Page 1/39

(A new technique to hide information within image file)

TEGANOGRAPHY

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 2/39

SYNOPSIS
ON

STEGANOGRAPHY
(A new technique to hide information within image file)
Submitted to the

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P.)


For the Degree Of

BACHELOR OF ENGINEERING (INFORMATION TECHNOLOGY)


Under the Guidance of

Mr. PUNEET SINGH DUGGAL HOD DEPPT. OF INFORMATION TECHNOLOGY

Mrs. MILI JAISWAL PROJECT GUIDE & LECTURER DEPTT. OF INFORMATION TECHNOLOGY

Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]

VII SEM (INFORMATION TECHNOLOGY)

DEPARTMENT OF INFORMATION TECHNOLOGY GURU RAMDAS KHALSA INSTITUTE OF SCIENCE AND TECHNOLOGY JABALPUR
Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 3/39

DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE
This is to certify that synopsis STEGANOGRAPHY (a new technique to

hide information within image file) which has been completed and
submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.

Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]

VII SEM (INFORMATION TECHNOLOGY)

INTERNAL

EXTERNAL
Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 4/39

DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATE
This is to certify that synopsis STEGANOGRAPHY (a new technique to

hide information within image file) which has been completed and
submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.
Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]

VII SEM (INFORMATION TECHNOLOGY)

Mr. PUNEET SINGH DUGGAL HOD DEPTT. OF INFORMATION TECHNOLOGY

Mrs. MILI JAISWAL PROJECT GUIDE & LECTURER DEPTT. OF INFORMATION TECHNOLOGY
Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 5/39

ACKNOWLEDGEMENT
The synopsis defines and signifies the shear mannerism in which numerous interacted tasks are performed by a team composed of committed members. Each member bearing their own importance and providing contribution, which is nothing short of being invaluable.

We are thankful to Mr. Puneet Singh Duggal (HOD of Information Technology Department) under whose support we have been able to make this project a great success. We express our deep sense of gratitude to Mrs. Mili Jaiswal for their valuable support and supervision throughout the Bachelor of Engineering Degree. Last but not the least wi wish to remember with the deep sense of gratitude the encouragement provided friends and faculty members. to us by our

Rohit patel (0202it071043) Devendra Vishwakarma (0202IT071013) Narendra Nath Shukla (0202IT071031) Rohit Namdeo (0202IT071042)

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 6/39

ABSTRACT

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 7/39

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 8/39

INTRODUCTION

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 9/39

ABOUT PROJECT
This project is based on Stegnography technique. Stegnography is the art and science of hiding information by embedding secure and confidential messages (such as Identity, Password etc.) within other harmless file format (such as JPEG, BMP , PNG, WAV, MP3 etc.)

Objective of the project


The main goal of this steganography based system is to covert

communication. So, the fundamental purpose of this steganography based system is that the hide secure message within any image file format and generates a encrypted BMP image file format as output containing that secure message which will not be sensible to third party. When a message is encrypted, it has no meaning, and it's easy to understand that it contains sensitive information, a secret - and someone might try to break it. This Steganography based software solves this problem by hiding the sensitive information in a harmless file called carrier file (example bmp, jpeg ect.). This approach of information hiding technique has recently became important in a number of application area :This project has following objectives: To product security tool based on steganography techniques. Confidential communication and secret data storing using encryption module. Protection of data alteration To extract techniques of getting secret data using decryption module.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 10/39

Page

COCEPT OF THE PROJECT


StegnographyIT is the art and science of hiding information by embedding secure and
confidential messages (such as Identity, Password etc.) within other harmless digital file format (such as JPEG, BMP , PNG, WAV, MP3 ect.). In one sentence, Steganography is a technique of hiding information in digital media. The purpose of steganography is covert communication to hide a message from a third party. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. The steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the steganography medium. The use of a steganography key may be employed for encryption of the hidden message and/or for randomization in the steganography scheme. In summary:

Secret message

Carrier or Cover Medium

Stego Key

Stego Medium

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 11/39

Page

Cover-object, C F(X,M,K)

Message, M

Stego Object, Z

Stego-key, K

Message is the data that the sender wishes to remain it confidential. It can be plain text, ciphertext, other image, or anything such as a copyright mark, a covert communication, or a serial number. Encrption key is known as stego-key, which ensures that only recipient who know the corresponding decoding key will be able to extract the message from a cover-object. The cover-object with the secretly embedded message is then called the Stego-object.

Stego Object Z

Cover Object C Decoding key corresponding to stego key

Original message M

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 12/39

Page

Recovering message from a stego-object requires the cover-object itselt and a corresponding decoding key if a stego-key was used during the encoding process. The original image may or may not be required in most applications to extract the message. There are several suitable carriers below to be the cover-object: Network protocols such as TCP, IP and UDP Audio that using digital audio formats such as wav, midi, avi, mpeg, mp3 Images file such as bmp, gif and jpg, where they can be both color and gray-scale.

Steganography Vs Cryptography
Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between two is that steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information. The word steganography comes from the Greek Seganos, which mean covered or secret and graphy mean writing or drawing. Therefore, steganography mean, literally covered writing.

Image Steganography and bitmap pictures:


Using bitmap pictures for hiding secret information is one of most popular choices for Steganography. Many types of software built for this purpose, some of these software use password protection to encrypting information on picture. To use these software you must have a BMP format of a pictures to use it, but using other type of pictures like JPEG, GIF or any other types is rather or never used, because of algorithm of BMP pictures for Steganography is simple. Also we know

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 13/39

Page

that in the web most popular of image types are JPEG and other types not BPM, so we should have a solution for this problem. This software provide the solution of this problem, it can accept any type of image to hide information file, but finally it give the only BMP image as an output that has hidden file inside it.

Bitmap Steganography:
Bitmap type is the simplest type of picture because that it doesnt have any technology for decreasing file size. Structure of these files is that a bitmap image created from pixels that any pixel created from three colors ( red, green and blue said RGB) each color of a pixel is one byte information that shows the density of that color. Merging these three color makes every color that we see in these pictures. We know that every byte in computer science is created from 8 bit that first bit is Most-Significant-Bit (MSB) and last bit Least-Significant-Bit (LSB), the idea of using Steganography science is in this place; we use LSB bit for writing our security information inside BMP pictures. So if we just use last layer (8st layar) of information, we should change the last bit of pixels, in other hands we have 3 bits in each pixel so we have 3*hight*width bits memory to write our information. But before writing our data we must write name of data(file), size of name of data & size of data. We can do this by assigning some first bits of memory (8st layer).

(00101101 00011101 11011100) (10100110 11000101 00001100) (11010010 10101100 01100011)

Using each 3 pixel of picture to save a byte of data

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 14/39

Page

SCOPE OF THE PROJECT


The growing possibilities of modern communications need the special means of security especially on computer network. The network security is becoming more important as the number of data being exchanged on the internet increases. Therefore, the confidentiality and data integrity of information hiding This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file within BMP image files and it also ask to receiver for the path where the user wants to save Image and extruded file. In short this software is able to do some kind of encryption for secure information hiding what is called Steganography. The most common use of steganography is to hide a file inside another file. are requires to protect against unauthorized access and use. This has resulted in an explosive growth of the field

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 15/39

Page

Methodology
User needs to run the application. The user has two tab options encrypt and decrypt. If user select encrypt, application will give the screen to brows and select image file (such as bmp, jpeg, png) as a cover object, and the file (such as doc, txt, ppt) that containing the information that you want to embed in cover object And if user select decrypt option, the application give the screen to select Stego-Object (bmp image file) that you want to decrypt and ask path where user want to save the secrete file. This project has two methods Encrypt and Decrypt. In encryption, the secrete information is hiding in with any type of image file. Decryption is getting the secrete information from image file.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 16/39

Page

Encryption Process
IMAGE FILE INFORMATION FILE

BMP file

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 17/39

Page

Decryption Process
BMP file

Image file

Information file

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 18/39

Page

AdVANTAGES & Limitations of the Software:


Advantages: Mainly steganographic based software can be used in sending confidential images for military purposes where this software enables them to hide file formats such as text files or image files like jpg or bitmap into another image files or in mp3 files. Steganography covers even the existence of a hidden message, ie other than sender and receiver no one knows there is a secret data is stored in a carrier file.

Limataion: Now days many terrestrial group are using this method of stegnography to communicate with other terrestrial group since If one knows that a file contains some hidden data, without knowing the decryption method he is not able to get the secret data. Because they use some passwords while hiding the data. This project has an assumption that is both the sender and receiver must have shared some secret information before imprisonment. Pure steganography means that there is none prior information shared by two communication parties.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 19/39

Page

PLANNING

Problem Statement:
The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try of hide messages physically. One disadvantage of linguistic steganography is that users must equip themselves to have a good knowledge of linguistry. In recent years, everything is trending toward digitization. And with the development of the internet technology, digital media can be transmitted conveniently over the network. Therefore, messages can be secretly carried by digital media by using the steganography techniques, and then be transmitted through the internet rapidly

Possible and best plan for solution


Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. So we prepare this application, to make the information hiding more simple and user friendly.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 20/39

Page

Planning strategy

Start Application

Encryption

Decryption

Image

Message file

BMP Image file

BMP image file

Image

Message file

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 21/39

Page

REQUIREMENT ANALYSIS
HARDWARE REQUIREMENT Computer Intel or Compatible , Monitor Pentium III Processor or Higher Memory (RAM) 256 MB minimum on Windows XP/2000 512 MB recommended on Windows vista/7 Hard Disk Space Minimum 5 GB free space for installing Visual studio 2008 and .net framework 3.5) CDROM or DVDROM Drive Required for Installation

SOFTWARE REQUIREMENT

Operating System (OS)

Windows XP SP2 or above Windows vista / Windows 7

Front end

Visual Studio .Net 2008 or higher Visual Studio .Net Framework (3.5 or higher)

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 22/39

Page

FUNCTIONAL REQUIRMENT
PURPOSE:

The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system.
SCOPE:

Document plays a vital role in the development life cycle (SDLC).As it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. The following two things are considered in detail characteristic of functional requirement:

1. Input 2. Output
1. INPUT: -

Steganography system requires any type of image file (as a cover image file) and the secure information or message that is to be hidden. It has two modules encrypt and decrypt. The main objective during the input designs is as given below: To produce a cost-effective method of input. To ensure that the input is acceptable and understood by the user. Controlling the amount of input Avoiding error in data.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 23/39

Page

2. OUTPUT:-

This steganography system produces a BMP image file format (as output) containing the cover image that appears in outer world and the secure information file that will be hidden inside covered image by embedding that using some stego-key. One of the most important factors of an information system for the user is the output the system produces. Without the quality of the output, the entire system may appear unnecessary that will make us avoid using it possibly causing it to fail. The term output applying to information produced by an information system whether printed or displayed while designing the output we should identify the specific output that is needed to information requirements select a method to present the formation and create a document report or other formats that contains produced by the system. Whether the output is formatted report or a simple listing of the contents of a file, a computer process will produce the output. A Document A Message Retrieval from a data store

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 24/39

Page

FEASIBILITY STUDY

Before developing project we studied the feasibility of the project in determining whether or not to implement this project/software and also did the analysis of the potential impact of the proposed project or software, that includes advantages and disadvantages of both the current situation and the proposed project. Following points are given below, on which we studied the feasibility before designing of the project:1. Is the project concept viable? 2. Are the projects cost and schedule assumptions realistic? 3. What are the current estimated cost and schedule for the project? 4. Have the major risks to the project been identified and can they minimized or avoided? 5. Is the software development plan complete and adequate to support further development work? 6. Have users and developers been able to agree on a detailed user interface prototype? If not, are the requirements really stable?

My project fulfills all the above mentioned criteria of feasibility study.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 25/39

Page

Architecture
Front end:-

Visual studio 2008 (.NET Framework using C# language)

Back end:-

A stego key for encryption and decryption.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 26/39

Page

SDLC (Software development life cycle)

Begins when an Organization identifies a need of software. Concept Proposal is Created

Defines the scope or boundary of the concepts. Includes System Boundary, Cost Benefit Analysis. Risk Management Plan & Feasibility Study

Develops a Project Management Plan and other planning documents. Provides the basis for acquiring the resources needed to achieve objective

Analyses user needs and develop requirement specification, & user requirement. Create a detailed Functional Requirement Document

Transforms detailed requirements into complete, detailed system design document. Focus on how to deliver the required functionality.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 27/39

Page

System analysis
Steganography system requires any type of image file and the information or message that is to be hidden. It has two modules encrypt and decrypt. Microsoft .Net framework prepares a huge amount of tool and options for programmers that they simples programming. One of .Net tools for pictures and images is auto-converting most types of pictures to BMP format. I used this tool in this software called Steganography that is written in C#.Net language and you can use this software to hide your information in any type of pictures without any converting its format to BMP (software converts inside it). Algorithms and Techniques There are three different techniques you can use to hide information in a cover file: 1. Injection (or insertion)Using this technique, you store the data you want to hide in sections of a file that are ignored by the processing application. By doing this you avoid modifying those file bits that are relevant to an end-userleaving the cover file perfectly usable. For example, you can add additional harmless bytes in an executable or binary file. Because those bytes don't affect the process, the end-user may not even realize that the file contains additional hidden information. However, using an insertion technique changes file size according to the amount of data hidden and therefore, if the file looks unusually large, it may arouse suspicion.

2. SubstitutionUsing this approach, you replace the least significant bits of information that determine the meaningful content of the original file with new data in a way that causes the least amount of distortion. The main advantage of that technique is that the cover file size does not change after the execution of the algorithm. On the other

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 28/39

Page

hand, the approach has at least two drawbacks. First, the resulting stego file may be adversely affected by quality degradationand that may arouse suspicion. Second, substitution limits the amount of data that you can hide to the number of insignificant bits in the file 3. GenerationUnlike injection and substitution, this technique doesn't require an existing cover filethis technique generates a cover file for the sole purpose of hiding the message. The main flaw of the insertion and substitution techniques is that people can compare the stego file with any pre-existing copy of the cover file (which is supposed to be the same file) and discover differences between the two. You won't have that problem when using a generation approach, because the result is an original file, and is therefore immune to comparison tests. Among the substitution techniques, a very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique in cases where the LSB substitution doesn't cause significant quality degradation, such as in 24-bit bitmaps.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 29/39

Page

The encrypt module is used to hide information into the image; no one can see that information or file. This module requires any type of image and message and gives the only one image file in destination. The decrypt module is used to get the hidden information in an image file. It take the image file as an output, and give two file at destination folder, one is the same image file and another is the message file that is hidden it that. Before encrypting file inside image we must save name and size of file in a definite place of image. We could save file name before file information in LSB layer and save file size and file name size in most right-down pixels of image. Writing this information is needed to retrieve file from encrypted image in decryption state.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 30/39

Page

SYSTEM DESIGN

Basic System Architecture

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 31/39

Page

System Flow Diagram

Start Application

Encryption

Decryption

Image

Message file

BMP Image file

BMP image file

Image

Message file

At Sender Site

At Receiver Site

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 32/39

Page

Use-Case Diagram

Start Encrypt Module of system

Select & Load the Cover Image Using Stego-Key for Encryption

Select & Load the File containing Secure Msg

Sender
<<includes>> Embed Msg within cover image & Generate StegoImage

Send Stego image file

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 33/39

Page

Receive Stegoimage file

Start Decrypt Module of system

Load the Stego Image Using Stego-Key for Decryption

Set path for File containing Secure Msg

Receiver
<<includes>> Separate Secure file from stego-image

Generate & save file in specified path

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 34/39

Page

Data Flow Diagram

Cover Image

Secure Message

Bit stream

Bit stream

StegoSystem Encoder

Bit stream with changed LSB of cover image

Stego Image

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 35/39

Page

Stego Image

Cover image Bit stream + Secure File Bit stream

StegoSystem Decoder
Original Bit stream

Original Bit stream

Cover Image

Secure Message

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 36/39

Page

Secure Message File

Cover Image

StegoSystem Encoder

Stego Image

Stego image bit stream (cover image + message)

Secure Message

StegoSystem Decoder

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 37/39

Page

Control Flow Diagram

Loading Message file bit stream

Loading Cover file bit stream

Prepare Cover Data

Encode Prepared cover data with message data

Generate Stego Data

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 38/39

Page

CONCLUSION

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 39/39

Page

Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. Steganography can be used for hidden communication. We have explored the limits of steganography theory and practice. We printed out the enhancement of the image steganography system using LSB approach to provide a means of secure communication. A stego-key has been applied to the system during embedment of the message into the cover image. This steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide, because of using maximum memory space in pictures to hide the file. Since ancient times, man has found a desire in the ability to communicate covertly. The recent explosion of research in watermarking to protect intellectual property is evidence that steganography is not just limited to military or espionage applications. Steganography, like cryptography, will play an increasing role in the future of secure communication in the digital world.

Steganography Synopsis

Вам также может понравиться