Вы находитесь на странице: 1из 15

1.

INTRODUCTION
Steganography is the art and science of communicating in a way which hides the existence of the communication , which is the art of hiding information in ways that prevent the detection of hidden messages . Steganography, derived from Greek, literally means covered writing . It includes a vast array of secret communications methods that conceal the message's very existence . These methods include invisible inks , microdots , character arrangement, digital signatures, covert channels , and spread spectrum

communications.

Steganography and Cryptography are cousins in the spy craft family. A message in cipher text , for instance , might arouse suspicion on the part of the recipient while an " invisible " message created with Steganography methods will not. In contrast to

Cryptography ,where the " enemy " is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a Cryptosystem ,the goal of Steganography is to hide messages inside other " harmless " messages in a way that does not message present. allow any " enemy " to even detect that there is a second secret

Now Steganography is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Steganography in images has truly come of age with the invention of fast ,powerful computers. The most popular technique in image Steganography is Least Significant Bit Insertion . More precisely, as Kuhn puts it : The goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to detect that there is a second secret message present.

Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevents the detection of hidden messages. Stegranography include an array of secret communication methods that hide the message from being seen or discovered. Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, streganography can be employed to secure information. In cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images. The growing possibilities of modern communications need the special means of security especially on computer network. The network security is becoming more important as the number of data being exchanged on the internet increases. Therefore, the

confidentiality and data integrity are requires to protect against unauthorized access and use. This has resulted in an explosive growth of the field of information hiding.

The advantage of Steganography is that it can be used to secretly transmit messages without the fact of the transmission being discovered .Often, using encryption might identify the sender or receiver as somebody with some-thing to hide . For example ,that picture of your cat could conceal the plans for your company's latest technical innovation. However ,Steganography has a number of disadvantages as well .Unlike encryption ,it generally requires a lot of overhead to hide a relatively few bits of information . However, there are ways around this . Also, once a Steganographic system is discovered , it is rendered useless. This problem, too , can be overcome if the hidden data depends on some sort of key for its insertion and extraction.

2. History of Steganography During World War 2 invisible ink was used to write information on pieces of paper. In Ancient Greece they used to select messengers and shave their head, they would then write a message on their head. Another method used in Greece was where someone would peel wax off a tablet that was covered in wax, write a message underneath the wax then re-apply the wax. Pirate legends tell of the practice of tattooing secret information, such as a map, on the head of someone, so that the hair would conceal it. There are rumors that during the 1980's Margareth Thatcher, then Prime Minister in UK, became so irritated about press leaks of cabinet documents, that she had the word processors programmed to encode the identity of the writer in the word spacing, thus being able to trace the disloyal ministers. During the "Cold War" period, US and USSR wanted to hide their sensors in the enemy's facilities. These devices had to send data to their nations, without being spotted. Today, steganography is researched both for legal and illegal reasons. Among the first ones there is war telecommunications, which use spread spectrum or meteor scatter radio in order to conceal both the message and its source. In the industry market, with the advent of digital communications and storage, one of the most important issues is copyright enforcement, so digital watermarking techniques are being developed to restrict the use of copyrighted data.

3. Types of Steganography:
Text Steganography : Since everyone can read, encoding text in neutral sentences is doubtfully eective. But taking the rst letter of each word of the previous sentence, you will see that it is possible and not very dicult. Encoding secret messages in text can be a very challenging task. This is because text files have a very small amount of redundant data to replace with a secret message. Image Steganography : Coding secret messages in digital images is by far the most widely used of all methods in the digital world of today. This is because it can take advantage of the limited power of the human visual system (HVS) Audio Steganography : Because of the range of the human auditory system (HAS), data hiding in audio signals is especially challenging. The HAS perceives over a range of power greater than one billion to one and range of frequencies greater than one thousand to one. Also, the auditory system is very sensitive to additive random noise. Any disturbances in a sound file can be detected as low as one part in ten million (80dB below ambient level). Printed steganography : Digital steganography output may be in the form of rinted documents. A message, the plaintext, may be first encrypted by traditional means, producing a ciphertext. Then, an innocuous covertext is modified in some way so as to contain the ciphertext, resulting in thestegotext. For example, the letter size, spacing, typeface, or other characteristics of a covertext can be manipulated to carry the hidden message. Only a recipient who knows the technique used can recover the message and then decrypt it. Francis Bacon developed Bacon's cipher as such a technique.

4. Project Scope:
This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file and image files and the path where the user wants to save Image and extruded file.

5. The main aim:


The user should be able to conceal a text message in an image file without any visible alterations to the image as such. I.e. there should not be any noticeable changes to the coloring or the position of the various objects in the image.

5.1 Sub: aims:


It is preferred that we use a windows based front end. The user should be able to pick out the image file he wants to use in the hiding process. The format of the image files which can be used for the hiding process should be 24-bit bitmap. User should be able to enter the text message he wants to hide. User should be able to view the image before and after the hiding process is complete. It is preferable that a new image be created and displayed with the old image which will allow the user to compare the original image with the new one which will help him to decide whether his choice of image file was appropriate or whether he needs a new one. User should be able to transfer the image freely without any problems. I.e. he should be able to copy the new image file. Send or trade it with others without any special hardware requirements other than the normal communication systems available with a computer. There should be a encryption process to encrypt the text for better security. The user must be able to save the image in which the message is hidden in any desired folder.

The user should be able to select and view the picture from which to decode.

When the decode is demanded the encryption key should be demanded and when entered the decrypted text displayed. He should be able to save the decrypted text message in a file. The picture inside picture option should have all the above qualities like view both, compare and decide whether to proceed, and also have an option to save the new image where the user chooses.

To retrieve the picture the user must be able to view it, and then retrieve and save the picture

6. Methodology:
User needs to run the application. The user has two tab options encrypt and decrypt. If user select encrypt, application give the screen to select image file, information file and option to save the image file. If user select decrypt, application gives the screen to select only image file and ask path where user want to save the secrete file. This project has two methods Encrypt and Decrypt. In encryption the secrete information is hiding in with any type of image file. Decryption is getting the secrete information from image file.

7. Object Oriented Analysis (OOA) approach consists of the following steps :


Understanding the problem: This is the first step in the analysis process. The problem statement should be refined and redefined in terms of computer system engineering that could suggest a computer based solution . The problem statement should be stated, as far as possible , in a single , grammatically correct sentence . The problem statement provides the basis for drawing the requirements specification of both the user and the software . Therefore the problem statement is This project attempts to make use of the standard steganographic tool and some modified version of standard encryption algorithm to perform the task of data hiding for the purpose of observing privacy .

7.1 Requirements Specifications:


Once the problem is clearly defined, the next step is to understand what the proposed to do. Based on the user requirements, the specification for the software should be drawn. The developer should state clearly, What outputs are required? A set of screens displaying the output of data hiding and retrieval of hidden data . What inputs are necessary? Various interactive inputs that take the user through the different stages encountered during the execution of the application . What processes are involved to produce these outputs?

8. HARDWARE SPECIFICATION Processor RAM Hard Disk Cache Monitor Keyboard Mouse : : : : : : : Pentium. 64 MB. 2 GB. 512 KB. SVGA Color Monitor. 101 keys. 2 buttons.

9. Image Encoding Techniques:


Information can be hidden many different ways in images. Straight message insertion can be done, which will simply encode every bit of information in the image. More complex encoding can be done to embed the message only in "noisy" areas of the image that will attract less attention. The message may also be scattered randomly throughout the cover image. The most common approaches to information hiding in images are: Least significant bit (LSB) insertion Masking and filtering techniques Algorithms and transformations

Each of these can be applied to various images, with varying degrees of success. Each of them suffers to varying degrees from operations performed on images, such as cropping, or resolution decrementing, or decreases in the colour depth. LEAST SIGNIFICANT BIT INSERTION: One of the most common techniques used in steganography today is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embedded information. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image.

Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 10000001

Result:

(00100111 11101000 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001)

The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes

to hide it in, the ninth byte of the three pixels can be used to hide the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the coverobject degrades more statistically, and it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area.

Advantages of LSB Insertion:


Major advantage of the LSB algorithm is it is quick and easy. There has also been steganography software developed which work around LSB color alterations via palette manipulation. LSB insertion also works well with gray-scale images.

> A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity.

Masking and filtering :


Masking and filtering techniques hide information by marking an image in a manner similar to paper watermarks. Because watermarking techniques are more integrated into the image, they may be applied without fear of image destruction from lossy compression. By covering, or masking a faint but perceptible signal with another to make the first non-perceptible, we exploit the fact that the human visual system cannot detect slight changes in certain temporal domains of the image. Technically, watermarking is not a steganographic form. Strictly, steganography conceals data in the image; watermarking extends the image information and becomes an attribute of the cover image, providing license, ownership or copyright details. Masking techniques are more suitable for use in lossy JPEG images than LSB insertion because of their relative immunity to image operations such as compression and cropping.

Algorithms and transformations:


Because they are high quality color images with good compression, it is desirable to use JPEG images across networks such as the Internet. Indeed, JPEG images are becoming abundant on the Internet. JPEG images use the discrete cosine transform (DCT) to achieve compression. DCT is a lossy compression transform, because the cosine values cannot be calculated precisely, and rounding errors may be introduced. Variance between the original data and the recovered data depends on the values and methods used to calculate the DCT. Images can also be processed using fast Fourier transformation and wavelet transformation. Other properties such as luminance can also be utilised. The HVS has a very low sensitivity to small changes in luminance, being able to discern changes of no less than one part in thirty for random patterns. This figure goes up to one part in 240 for uniform regions of an image. Modern steganographic systems use spread-spectrum communications to transmit a narrowband signal over a much larger bandwidth so that the spectral density of the signal in the channel looks like noise. The two different spread-spectrum techniques these tools employ are called direct-sequence and frequency hopping. The former hides information by phase-modulating the data signal (carrier) with a pseudorandom number sequence that both the sender and the receiver know. The latter divides the available bandwidth into multiple channels and hops between these channels (also triggered by a pseudorandom number sequence). The Patchwork method is based on a pseudorandom, statistical process that takes advantage of the human weaknesses to luminance variation. Using redundant pattern encoding to repeatedly scatter hidden information throughout the cover image, like a patchwork, Patchwork can hide a reasonably small message many times in a image. In the Patchwork method, n pairs of image points (a,b) are randomly chosen. The brightness of a is decreased by one and the brightness of b is increased by one. For a labeled image, the expected value of the sum of the differences of the n pairs of points is then 2n. Bender shows that after JPEG compression, with the quality factor set to 75, the message can still be decoded with an 85 This algorithm is more robust to image processing such as cropping and rotating, but at the cost of message size. Techniques such as Patchwork are ideal for watermarking of images. Even if the image is cropped, there is a good probability that the watermark will still be readable.

Other techniques encrypt and scatter the hidden throughout the image in some predetermined manner. It is assumed that even if the message bits are extracted, they will be useless without the algorithm and stegokey to decode them. Although such techniques do help protect against hidden message extraction, they are not immune to destruction of the hidden message through image manipulation.

10. Encryption Process


IMAGE FILE INFORMATION FILE

BMP FILE

Encryption - Encryption is the process of passing data or plaintext through a series of mathematical operations that generate an alternate form of the original data known as ciphertext. The encrypted data can only be read by parties who have been given the necessary key to decrypt the cipher text back into its original plaintext form. Encryption doesn't hide data, but it does make it hard to read! In encryption the secret information is hiding in with any type of image file.

11. Decryption Process


BMP FILE

INFORMATION FILE

IMAGE FILE

Decryption - The process of decoding data that has been encrypted into a
secret format. Decryption requires a secret key or password. Decryption is getting the secrete information from image file.

12. DATA FLOW DIAGRAMS


LEVEL 0 DFD DIAGRAM

Level 1 DFD DIAGRAM

Embedding information in a file

Retrieving original information

13. USE CASE DIAGRAM

Flow Diagram