SlideShare a Scribd company logo
1 of 28
Security System Using
Steganography
Introduction
 While transferring a file from one point to another through
Intranet and Internet we need more file secure concepts.
 Ordinary, file Encryption-Decryption Concepts, which are
readily available in java examples are easily captured by
middle way itself.
 This project helps to send a file from one place to another in
a secured manner
Objective
The main objective of this project is SECURITY during file transmission
from one end to another end both in Internet and private network. The main
concept of Steganography, i.e. Encrypt a file and hide it in another media to
invisible it, is maintained by our project such that our target file will be
encrypted and embedded into an audio or video file then the resultant video
file is send through the network. The front-end screen of this software will be
designed in Java using Swing Concepts.
Steganography is the practice of hiding private or sensitive information
within something that appears to be nothing out of the usual.
Steganography is often confused with cryptography because the two are
similar in the way that they both are used to protect important information.
Steganography comes from the Greek words Steganós (Covered) and
Graptos (Writing).
Steganography
 The art of detecting Steganography is referred to as Steganalysis.
 Steganalysis does not deal with trying to decrypt the hidden information
inside of a file, just discovering it.
 To put it simply Steganalysis involves detecting the use of Steganography
inside of a file.
 The most common use of Steganography is to hide a file inside another
file.
Existing System
 For Transmitting a file from one point to another many of us are using Encryption only.
This will not give that much of security.
 While using Steganography for embedding a source file to an another media they are using
watermark embedding. It is also have its own disadvantages. The resultant file of this
techniques will be change from the source file. Watermark embedding is easily decrypted
by the hackers.
 Encryption and Embedding only is not give that much of security to our communication.
Proposed System
 In our system we are not following the regular encryption, decryption techniques.
 We are Introducing a new algorithm Bit-Shift in Random Cycle Order. I.e. totally 4
different types of Bit-Shift algorithms are used randomly to encrypt the data
 This Encryption is embedded into an Audio or Video File.
 Again It will be embedded into another media. This double embedding increases the level
of security.
 Password Protection of this entire works give an additional security.
Technologies overview
 This project helps to send a file from one place to another in a secured manner.
 Firstly the target file is encrypted using an algorithm called Bit Shifting.
 The Encrypted file is embedded into an audio file.
 The resultant file will be embedded into a video file.
 The video file and the whole thing is protected by a password and sent through net.
Modules
 Connection manager Module
 Merger Module
 Extractor Module
 Result window Module
Merger Module
This Module is front end module and it is designed using
swing. This module gets the inputs from sender. The inputs are
Audio/ video, Image/Text and secret message file with password.
Then merge the all requirements and then send to receiver.
Connection manager Module
The merged file can send from sender or
server to receiver. The UDP protocol can be use
for that networking process.
Extractor Module
This module gets the merged file after a
password verification. Then extract the merged
file and call the result window module to open
extracted file.
Result window Module
This module displays the original secret file
and covered Audio/Video file .
Architecture for Encoding - Transmission
Steganography-Transmission Flow
Architecture for Decoding - Reception
Steganography - Reception Flow
Hardware Requirements
 CPU - PENTIUM III PROCESSOR
 HARD DISK SPACE - 40 GB
 DISPLAY - 15” COLOR MONITOR
 MAIN MEMORY - 256 MB
 KEYBOARD - 104 KEYS
 CLOCK-SPEED - 2.6 GHZ
 MONITOR - 15 ″ SVGA COLOR
Software Requirements
 OPERATING SYSTEM - WINDOWS NT/XP
 BACKEND - MS SQL SERVER 2000
 FRONT END - JAVA (jdk1.6)
Merger
Audio File Select
Video File Select
Text File Select
File Embedding
Client Embedded File Received
Type Password For Encrypted File
Encrypted File Displayed
Data Security Using Steganography

More Related Content

What's hot

Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- Nikhil Praharshi
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography-
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Data Security Using Steganography

Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsMaddiSujitha
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.pptNavyaChikki1
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visualsijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijcisjournal
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijdms
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityIAEME Publication
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxSAMPATHKUMARS20
 
Optimization of video steganography with additional compression and encryption
Optimization of video steganography with additional compression and encryptionOptimization of video steganography with additional compression and encryption
Optimization of video steganography with additional compression and encryptionTELKOMNIKA JOURNAL
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppIRJET Journal
 

Similar to Data Security Using Steganography (20)

Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
HACKING
HACKINGHACKING
HACKING
 
Multimedia
MultimediaMultimedia
Multimedia
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
E-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documentsE-Fraud Prevention based on self-authentication of e-documents
E-Fraud Prevention based on self-authentication of e-documents
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
H41034449
H41034449H41034449
H41034449
 
Steganography ppt.ppt
Steganography ppt.pptSteganography ppt.ppt
Steganography ppt.ppt
 
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and VisualsHighly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSHIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALS
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Audio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data securityAudio video steganography using forensic techniquefor data security
Audio video steganography using forensic techniquefor data security
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Optimization of video steganography with additional compression and encryption
Optimization of video steganography with additional compression and encryptionOptimization of video steganography with additional compression and encryption
Optimization of video steganography with additional compression and encryption
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android App
 

Recently uploaded

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 

Recently uploaded (20)

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 

Data Security Using Steganography

  • 2. Introduction  While transferring a file from one point to another through Intranet and Internet we need more file secure concepts.  Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself.  This project helps to send a file from one place to another in a secured manner
  • 3. Objective The main objective of this project is SECURITY during file transmission from one end to another end both in Internet and private network. The main concept of Steganography, i.e. Encrypt a file and hide it in another media to invisible it, is maintained by our project such that our target file will be encrypted and embedded into an audio or video file then the resultant video file is send through the network. The front-end screen of this software will be designed in Java using Swing Concepts.
  • 4. Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect important information. Steganography comes from the Greek words Steganós (Covered) and Graptos (Writing). Steganography
  • 5.  The art of detecting Steganography is referred to as Steganalysis.  Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it.  To put it simply Steganalysis involves detecting the use of Steganography inside of a file.  The most common use of Steganography is to hide a file inside another file.
  • 6. Existing System  For Transmitting a file from one point to another many of us are using Encryption only. This will not give that much of security.  While using Steganography for embedding a source file to an another media they are using watermark embedding. It is also have its own disadvantages. The resultant file of this techniques will be change from the source file. Watermark embedding is easily decrypted by the hackers.  Encryption and Embedding only is not give that much of security to our communication.
  • 7. Proposed System  In our system we are not following the regular encryption, decryption techniques.  We are Introducing a new algorithm Bit-Shift in Random Cycle Order. I.e. totally 4 different types of Bit-Shift algorithms are used randomly to encrypt the data  This Encryption is embedded into an Audio or Video File.  Again It will be embedded into another media. This double embedding increases the level of security.  Password Protection of this entire works give an additional security.
  • 8. Technologies overview  This project helps to send a file from one place to another in a secured manner.  Firstly the target file is encrypted using an algorithm called Bit Shifting.  The Encrypted file is embedded into an audio file.  The resultant file will be embedded into a video file.  The video file and the whole thing is protected by a password and sent through net.
  • 9. Modules  Connection manager Module  Merger Module  Extractor Module  Result window Module
  • 10. Merger Module This Module is front end module and it is designed using swing. This module gets the inputs from sender. The inputs are Audio/ video, Image/Text and secret message file with password. Then merge the all requirements and then send to receiver.
  • 11. Connection manager Module The merged file can send from sender or server to receiver. The UDP protocol can be use for that networking process.
  • 12. Extractor Module This module gets the merged file after a password verification. Then extract the merged file and call the result window module to open extracted file.
  • 13. Result window Module This module displays the original secret file and covered Audio/Video file .
  • 14. Architecture for Encoding - Transmission
  • 18. Hardware Requirements  CPU - PENTIUM III PROCESSOR  HARD DISK SPACE - 40 GB  DISPLAY - 15” COLOR MONITOR  MAIN MEMORY - 256 MB  KEYBOARD - 104 KEYS  CLOCK-SPEED - 2.6 GHZ  MONITOR - 15 ″ SVGA COLOR
  • 19. Software Requirements  OPERATING SYSTEM - WINDOWS NT/XP  BACKEND - MS SQL SERVER 2000  FRONT END - JAVA (jdk1.6)
  • 26. Type Password For Encrypted File