Академический Документы
Профессиональный Документы
Культура Документы
Page 1/39
TEGANOGRAPHY
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 2/39
SYNOPSIS
ON
STEGANOGRAPHY
(A new technique to hide information within image file)
Submitted to the
Mrs. MILI JAISWAL PROJECT GUIDE & LECTURER DEPTT. OF INFORMATION TECHNOLOGY
Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]
DEPARTMENT OF INFORMATION TECHNOLOGY GURU RAMDAS KHALSA INSTITUTE OF SCIENCE AND TECHNOLOGY JABALPUR
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 3/39
CERTIFICATE
This is to certify that synopsis STEGANOGRAPHY (a new technique to
hide information within image file) which has been completed and
submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.
Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]
INTERNAL
EXTERNAL
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 4/39
CERTIFICATE
This is to certify that synopsis STEGANOGRAPHY (a new technique to
hide information within image file) which has been completed and
submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.
Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]
Mrs. MILI JAISWAL PROJECT GUIDE & LECTURER DEPTT. OF INFORMATION TECHNOLOGY
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 5/39
ACKNOWLEDGEMENT
The synopsis defines and signifies the shear mannerism in which numerous interacted tasks are performed by a team composed of committed members. Each member bearing their own importance and providing contribution, which is nothing short of being invaluable.
We are thankful to Mr. Puneet Singh Duggal (HOD of Information Technology Department) under whose support we have been able to make this project a great success. We express our deep sense of gratitude to Mrs. Mili Jaiswal for their valuable support and supervision throughout the Bachelor of Engineering Degree. Last but not the least wi wish to remember with the deep sense of gratitude the encouragement provided friends and faculty members. to us by our
Rohit patel (0202it071043) Devendra Vishwakarma (0202IT071013) Narendra Nath Shukla (0202IT071031) Rohit Namdeo (0202IT071042)
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 6/39
ABSTRACT
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 7/39
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 8/39
INTRODUCTION
Steganography Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 9/39
ABOUT PROJECT
This project is based on Stegnography technique. Stegnography is the art and science of hiding information by embedding secure and confidential messages (such as Identity, Password etc.) within other harmless file format (such as JPEG, BMP , PNG, WAV, MP3 etc.)
communication. So, the fundamental purpose of this steganography based system is that the hide secure message within any image file format and generates a encrypted BMP image file format as output containing that secure message which will not be sensible to third party. When a message is encrypted, it has no meaning, and it's easy to understand that it contains sensitive information, a secret - and someone might try to break it. This Steganography based software solves this problem by hiding the sensitive information in a harmless file called carrier file (example bmp, jpeg ect.). This approach of information hiding technique has recently became important in a number of application area :This project has following objectives: To product security tool based on steganography techniques. Confidential communication and secret data storing using encryption module. Protection of data alteration To extract techniques of getting secret data using decryption module.
Steganography Synopsis
Page
Secret message
Stego Key
Stego Medium
Steganography Synopsis
Page
Cover-object, C F(X,M,K)
Message, M
Stego Object, Z
Stego-key, K
Message is the data that the sender wishes to remain it confidential. It can be plain text, ciphertext, other image, or anything such as a copyright mark, a covert communication, or a serial number. Encrption key is known as stego-key, which ensures that only recipient who know the corresponding decoding key will be able to extract the message from a cover-object. The cover-object with the secretly embedded message is then called the Stego-object.
Stego Object Z
Original message M
Steganography Synopsis
Page
Recovering message from a stego-object requires the cover-object itselt and a corresponding decoding key if a stego-key was used during the encoding process. The original image may or may not be required in most applications to extract the message. There are several suitable carriers below to be the cover-object: Network protocols such as TCP, IP and UDP Audio that using digital audio formats such as wav, midi, avi, mpeg, mp3 Images file such as bmp, gif and jpg, where they can be both color and gray-scale.
Steganography Vs Cryptography
Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between two is that steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information. The word steganography comes from the Greek Seganos, which mean covered or secret and graphy mean writing or drawing. Therefore, steganography mean, literally covered writing.
Steganography Synopsis
Page
that in the web most popular of image types are JPEG and other types not BPM, so we should have a solution for this problem. This software provide the solution of this problem, it can accept any type of image to hide information file, but finally it give the only BMP image as an output that has hidden file inside it.
Bitmap Steganography:
Bitmap type is the simplest type of picture because that it doesnt have any technology for decreasing file size. Structure of these files is that a bitmap image created from pixels that any pixel created from three colors ( red, green and blue said RGB) each color of a pixel is one byte information that shows the density of that color. Merging these three color makes every color that we see in these pictures. We know that every byte in computer science is created from 8 bit that first bit is Most-Significant-Bit (MSB) and last bit Least-Significant-Bit (LSB), the idea of using Steganography science is in this place; we use LSB bit for writing our security information inside BMP pictures. So if we just use last layer (8st layar) of information, we should change the last bit of pixels, in other hands we have 3 bits in each pixel so we have 3*hight*width bits memory to write our information. But before writing our data we must write name of data(file), size of name of data & size of data. We can do this by assigning some first bits of memory (8st layer).
Steganography Synopsis
Page
Steganography Synopsis
Page
Methodology
User needs to run the application. The user has two tab options encrypt and decrypt. If user select encrypt, application will give the screen to brows and select image file (such as bmp, jpeg, png) as a cover object, and the file (such as doc, txt, ppt) that containing the information that you want to embed in cover object And if user select decrypt option, the application give the screen to select Stego-Object (bmp image file) that you want to decrypt and ask path where user want to save the secrete file. This project has two methods Encrypt and Decrypt. In encryption, the secrete information is hiding in with any type of image file. Decryption is getting the secrete information from image file.
Steganography Synopsis
Page
Encryption Process
IMAGE FILE INFORMATION FILE
BMP file
Steganography Synopsis
Page
Decryption Process
BMP file
Image file
Information file
Steganography Synopsis
Page
Limataion: Now days many terrestrial group are using this method of stegnography to communicate with other terrestrial group since If one knows that a file contains some hidden data, without knowing the decryption method he is not able to get the secret data. Because they use some passwords while hiding the data. This project has an assumption that is both the sender and receiver must have shared some secret information before imprisonment. Pure steganography means that there is none prior information shared by two communication parties.
Steganography Synopsis
Page
PLANNING
Problem Statement:
The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try of hide messages physically. One disadvantage of linguistic steganography is that users must equip themselves to have a good knowledge of linguistry. In recent years, everything is trending toward digitization. And with the development of the internet technology, digital media can be transmitted conveniently over the network. Therefore, messages can be secretly carried by digital media by using the steganography techniques, and then be transmitted through the internet rapidly
Steganography Synopsis
Page
Planning strategy
Start Application
Encryption
Decryption
Image
Message file
Image
Message file
Steganography Synopsis
Page
REQUIREMENT ANALYSIS
HARDWARE REQUIREMENT Computer Intel or Compatible , Monitor Pentium III Processor or Higher Memory (RAM) 256 MB minimum on Windows XP/2000 512 MB recommended on Windows vista/7 Hard Disk Space Minimum 5 GB free space for installing Visual studio 2008 and .net framework 3.5) CDROM or DVDROM Drive Required for Installation
SOFTWARE REQUIREMENT
Front end
Visual Studio .Net 2008 or higher Visual Studio .Net Framework (3.5 or higher)
Steganography Synopsis
Page
FUNCTIONAL REQUIRMENT
PURPOSE:
The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system.
SCOPE:
Document plays a vital role in the development life cycle (SDLC).As it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. The following two things are considered in detail characteristic of functional requirement:
1. Input 2. Output
1. INPUT: -
Steganography system requires any type of image file (as a cover image file) and the secure information or message that is to be hidden. It has two modules encrypt and decrypt. The main objective during the input designs is as given below: To produce a cost-effective method of input. To ensure that the input is acceptable and understood by the user. Controlling the amount of input Avoiding error in data.
Steganography Synopsis
Page
2. OUTPUT:-
This steganography system produces a BMP image file format (as output) containing the cover image that appears in outer world and the secure information file that will be hidden inside covered image by embedding that using some stego-key. One of the most important factors of an information system for the user is the output the system produces. Without the quality of the output, the entire system may appear unnecessary that will make us avoid using it possibly causing it to fail. The term output applying to information produced by an information system whether printed or displayed while designing the output we should identify the specific output that is needed to information requirements select a method to present the formation and create a document report or other formats that contains produced by the system. Whether the output is formatted report or a simple listing of the contents of a file, a computer process will produce the output. A Document A Message Retrieval from a data store
Steganography Synopsis
Page
FEASIBILITY STUDY
Before developing project we studied the feasibility of the project in determining whether or not to implement this project/software and also did the analysis of the potential impact of the proposed project or software, that includes advantages and disadvantages of both the current situation and the proposed project. Following points are given below, on which we studied the feasibility before designing of the project:1. Is the project concept viable? 2. Are the projects cost and schedule assumptions realistic? 3. What are the current estimated cost and schedule for the project? 4. Have the major risks to the project been identified and can they minimized or avoided? 5. Is the software development plan complete and adequate to support further development work? 6. Have users and developers been able to agree on a detailed user interface prototype? If not, are the requirements really stable?
Steganography Synopsis
Page
Architecture
Front end:-
Back end:-
Steganography Synopsis
Page
Defines the scope or boundary of the concepts. Includes System Boundary, Cost Benefit Analysis. Risk Management Plan & Feasibility Study
Develops a Project Management Plan and other planning documents. Provides the basis for acquiring the resources needed to achieve objective
Analyses user needs and develop requirement specification, & user requirement. Create a detailed Functional Requirement Document
Transforms detailed requirements into complete, detailed system design document. Focus on how to deliver the required functionality.
Steganography Synopsis
Page
System analysis
Steganography system requires any type of image file and the information or message that is to be hidden. It has two modules encrypt and decrypt. Microsoft .Net framework prepares a huge amount of tool and options for programmers that they simples programming. One of .Net tools for pictures and images is auto-converting most types of pictures to BMP format. I used this tool in this software called Steganography that is written in C#.Net language and you can use this software to hide your information in any type of pictures without any converting its format to BMP (software converts inside it). Algorithms and Techniques There are three different techniques you can use to hide information in a cover file: 1. Injection (or insertion)Using this technique, you store the data you want to hide in sections of a file that are ignored by the processing application. By doing this you avoid modifying those file bits that are relevant to an end-userleaving the cover file perfectly usable. For example, you can add additional harmless bytes in an executable or binary file. Because those bytes don't affect the process, the end-user may not even realize that the file contains additional hidden information. However, using an insertion technique changes file size according to the amount of data hidden and therefore, if the file looks unusually large, it may arouse suspicion.
2. SubstitutionUsing this approach, you replace the least significant bits of information that determine the meaningful content of the original file with new data in a way that causes the least amount of distortion. The main advantage of that technique is that the cover file size does not change after the execution of the algorithm. On the other
Steganography Synopsis
Page
hand, the approach has at least two drawbacks. First, the resulting stego file may be adversely affected by quality degradationand that may arouse suspicion. Second, substitution limits the amount of data that you can hide to the number of insignificant bits in the file 3. GenerationUnlike injection and substitution, this technique doesn't require an existing cover filethis technique generates a cover file for the sole purpose of hiding the message. The main flaw of the insertion and substitution techniques is that people can compare the stego file with any pre-existing copy of the cover file (which is supposed to be the same file) and discover differences between the two. You won't have that problem when using a generation approach, because the result is an original file, and is therefore immune to comparison tests. Among the substitution techniques, a very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique in cases where the LSB substitution doesn't cause significant quality degradation, such as in 24-bit bitmaps.
Steganography Synopsis
Page
The encrypt module is used to hide information into the image; no one can see that information or file. This module requires any type of image and message and gives the only one image file in destination. The decrypt module is used to get the hidden information in an image file. It take the image file as an output, and give two file at destination folder, one is the same image file and another is the message file that is hidden it that. Before encrypting file inside image we must save name and size of file in a definite place of image. We could save file name before file information in LSB layer and save file size and file name size in most right-down pixels of image. Writing this information is needed to retrieve file from encrypted image in decryption state.
Steganography Synopsis
Page
SYSTEM DESIGN
Steganography Synopsis
Page
Start Application
Encryption
Decryption
Image
Message file
Image
Message file
At Sender Site
At Receiver Site
Steganography Synopsis
Page
Use-Case Diagram
Select & Load the Cover Image Using Stego-Key for Encryption
Sender
<<includes>> Embed Msg within cover image & Generate StegoImage
Steganography Synopsis
Page
Receiver
<<includes>> Separate Secure file from stego-image
Steganography Synopsis
Page
Cover Image
Secure Message
Bit stream
Bit stream
StegoSystem Encoder
Stego Image
Steganography Synopsis
Page
Stego Image
StegoSystem Decoder
Original Bit stream
Cover Image
Secure Message
Steganography Synopsis
Page
Cover Image
StegoSystem Encoder
Stego Image
Secure Message
StegoSystem Decoder
Steganography Synopsis
Page
Steganography Synopsis
Page
CONCLUSION
Steganography Synopsis
Page
Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. Steganography can be used for hidden communication. We have explored the limits of steganography theory and practice. We printed out the enhancement of the image steganography system using LSB approach to provide a means of secure communication. A stego-key has been applied to the system during embedment of the message into the cover image. This steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide, because of using maximum memory space in pictures to hide the file. Since ancient times, man has found a desire in the ability to communicate covertly. The recent explosion of research in watermarking to protect intellectual property is evidence that steganography is not just limited to military or espionage applications. Steganography, like cryptography, will play an increasing role in the future of secure communication in the digital world.
Steganography Synopsis