Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing”Steganography : Art and science of hiding the existence of messages.Embedding the message in some medium such as a document, image, audio or video.
Problem DefinitionProblems with nowadays security systems : Even after applying encryption, data is not secure. Encryption and decryption algorithms require much time.People need a system having high security and user friendly environment.
Functions to be provided Embed message into file. Embed file(image, text , audio, video etc.) into other file. Retrieve message from the file containing embedded message. Retrieve file from file containing embedded message. Encrypting message/file before embedding into other files.
Embedding message within image Encryption Steganography (Containsembedded encrypted message)
Hiding image within an image + =>
BASIC PRINCIPLE USED Secret image Stego ObjectCoverImage Encoder KeySecret DecoderImage Communications Channel Original Cover
Solution Strategy Steganography Embed Retrieve Embed Retrieve Message Message File FileEncrypt Compres Decrypt Encrypt Compres DecryptMessage s File Message File s File File DES ZIP DES ZIP DES ZIP
LSB Based Steganography TechniqueSubstitute the least significant bit of eachsampling point with a binary message. Hiding 1 bit of image in 16 bit sample Hiding 4 bit of image in 16 bit sample
Development ScheduleDuration Tasks Accomplished1st Week of August,2009 Introduction of project1st Week Of September,2009 System requirement1st Week Of October,2009 DFD, Use Case Diagram2nd Week Of November,2009 System Requirement Specification2nd Week Of February,2010 DesigningLast Week Of April,2010 First Running Module Of Project
PLATFORM USEDOPERATING SYSTEM: MICROSOFT WINDOWS XPFRONT END: java 1.6.0HARDWARE USED: Pentium IV 1.5 GHz. 512 MB RAMMINIMUM HARDWARE REQUIREMENT: Pentium III 166 MHz. Or higher 128 MB RAM
Use Case Diagram Steganography Encryption on Message Steganography Encryption on FileSender Compression Steganography Decryption on Message Steganography Decryption on File Decompression Receiver
Level - 1 DFD Secret Secret Carrier File Carrier File Secret Secret Message Message File File Compression Compression Process Process CompressedSteganography Steganography Steganography Steganography steg file Encryption Encryption Encryption Encryption process process Decompression Decompression process process Process Process Uncompressed steg file Steg File Steg File Steganography Steg File Steg File SteganographyHidden MessageHidden Message Decryption Hidden File + Hidden File + Decryption + Carrier File + Carrier File Carrier File Carrier File Secret Secret Message/File Message/File
Level - 2 DFD(Steganography Encryption & Decryption process on secret file/msg) Secret Secret Steg File Steg File File File Secret File + Secret File + Steganography Steganography Carrier File Carrier File Encryption Encryption Process Process Carrier Carrier Steganography Steganography File File C Decryption Decryption C Process Process extract Steg File Steg File Secret Secret Secret File + Secret File + File File Carrier File Carrier File
Level - 2 DFD (Steganography process with compression & decompression onfilemsg) Compressed Compressed Steg File Steg File Secret Secret Steganography Steganography File File Encryption Encryption Process Process Decompressio Decompressio Steg file n Process n Process Carrier Carrier File File Uncompressed C Compression Compression steg file C Process Process Steganography Steganography Decryption Decryption Process Process Compressed Compressed extract Steg File Steg File Secret Secret File File
Select Master file
Master File Information
Master file information
LimitationsSender & receiver must agree on a method in which to hide the message.Quite an amount of covering information is needed to hide whatever we want to. At least 8 to 10 times more if we really want it to be non-detectable.Nevertheless if the fact of the hiding becomes evident then the entire business of hiding becomes virtually useless, if the information is not encrypted from before.Editing or compressing the picture do catastrophic damage to the hidden information.