Steganography

6,808 views

Published on

Project Report

2 Comments
5 Likes
Statistics
Notes
No Downloads
Views
Total views
6,808
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
0
Comments
2
Likes
5
Embeds 0
No embeds

No notes for slide

Steganography

  1. 1. STEGANOGRAPHYSUBMITTED BY:-REG NO :- 10803554 & 10804870Group No :-G005CSE490BKD07 (KD07)
  2. 2. ABOUT JAVA:- Java is simple programming language because it has to work on the electronic devices where less memory is available. Example : - concepts of pointers used in C or C ++ has been completely eliminated in java. More over it is pure Oops language it is secure ,system independent,portable,high performance, multi-threaded Here JVM plays major role it is heart of entire 2 java program. Execution process.
  3. 3. 3
  4. 4. 3-Tier Architecture
  5. 5. WHAT IS STEGANOGRAPHY?? From the Greek word STEGANOS meaning “covered And Greek word GRAPHIE meaning “writing” Steganography is the branch of science .it is used for writing hidden messages in such a way that no one can able to read the message only the sender and receiver can read. 5
  6. 6. STEGANOGRAPHY TERMS: Carrier File – A file which has hidden information inside of it. Steganalysis – The process of detecting hidden information inside of a file. Stego-Medium – The medium in which the information is hidden. 6
  7. 7. ACTIVITY DIAGRAM: 7
  8. 8. DFD : 8
  9. 9. ALGORITHM FOR HIDING MESSAGEBEHIND IMAGE :- Suppose my message is “hello” with the password “12345”. String p ,m; Convert it into the binary form. By using the pixel grabber class it take each pixel of the image. Which we will store in the in the array say a[ ]. Converting it into binary form it gives 32-bit. Then we remove 8-bits which is of sign bit. 9
  10. 10. ALGORITHM FOR HIDING MESSAGEBEHIND IMAGE :- Then after removing 2-bit more to add the bits of password and the message then to know that the bits has been finished we take 111111 at the last. The for un-hiding the message behind from the image we go through for same steps. 10
  11. 11. WORKING OF ALGORITHM: 11
  12. 12. DES (Symmetric Encryption)
  13. 13. ALGORITHM FOR ENCRYPTION:- 13
  14. 14. Decryption DES
  15. 15. Data Compression Types
  16. 16. ZIP Algorithm WorkingProbabilistic compression methods: Uses bits to represent different characterparametersLempel-Ziv-Welch Compression Algorithm: It analyses a files content,therefore producing higher compression ratios. LZW works by building adictionary of phrases (groups of one or more bytes) from the file. When a newphrase is found, the compression mechanism checks to see if that phrase isalready in the dictionary. If not, the phrase is added to the dictionary and a tokenthat identifies the phrases position in the dictionary is output. If the phrase wasalready in the dictionary, then the compression mechanism simply outputs thetoken for the existing phrase.Other Algorithms: Huffman Code & Shannon- Fano Code: Work on the sourcesymbols probability and arranges them in such a way that their is reducedredundancy
  17. 17. TYPES OF STEGANOGRAPHY: SECRET MESSAGE IS HIDDEN IN DIFFERENT FORM.. Steganography In Images Steganography In Audio Steganography In Video Steganography In Documents 17
  18. 18. STEGANOGRAPHY TOOLS: Steganos S-Tools (GIF, JPEG) StegHide (WAV, BMP) Invisible Secrets (JPEG) JPHide Camouflage Hiderman Many others… 18
  19. 19. Snap Shots Of Code(Hiding)
  20. 20. Hiding- Message
  21. 21. Un-hide
  22. 22. Encryption (DES)
  23. 23. Decryption (DES)
  24. 24. Compress/Decompress
  25. 25. ADVANTAGES: It is used in a way of hiding, not the Information but the password to reach that Information. Basically used in Intelligent Services. Can be applied differently in digital image, audio & video file. It can be done faster with the varying no of softwares, using different algorithms. 25
  26. 26. DISADVANTAGES: Huge data = huge file size, so some one can suspect about it. During sending and receiving information can be spoofed. The confidentiality of information is maintained by the algorithms, and if the algorithms are known then its all over. The software can be misused if it goes in wrongs hands ie., people with wrong intentions. 26
  27. 27. CONCLUSION: The basic modular aim of the project transpires around the security systems of data which are in this product of Steganography are obtained by hiding and encrypting the data to be transferred. The data encryption involves around the making the data unintelligible in order to fool the intruder in case the hidden image fails to hide the data. The keys working with the encryption are the basis of secrecy. 27

×