SlideShare a Scribd company logo
1 of 6
Download to read offline
Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 2, March -April 2013, pp.379-384
     Using Stegnography Technique for Data Leakage Problems
                             Detect
                Ashwini Palimkar (student), Prof. Dr. Suhas. H. Patil
            Bharati Vidyapeeth Deemed University College of engineering, Pune, Maharashtra, India

Abstract:
Our goal is to detect when the distributor’s              repositories and libraries, e-commerce, online
sensitive data have been leaked by agents, and if         decision support system etc. These applications
possible to identify the agent that leaked the            make the digital assets, such as digital images,
data. In this project, we are giving the                  video, audio, database content etc, easily accessible
methodology for adding fake object into data.             by ordinary people around the world for sharing,
Fake object will be added through stegnography            purchasing, distributing, or many other purposes. In
concept.                                                  computer based stegnographhy, several forms of
Stegnnography is an ancient technique of data             digital media may Be used as cover for hidden
hiding or the stegnography is the art and science         information, photos, documents, web pages and
of hiding the existence of information, we                even MP3 music files may all serve as innocuous
contrast it with the related disciplines of               looking hosts for secret messages
cryptography                                              The data leakage application will be shown through
And traffic security.                                     News channel.
Many techniques are used to hide data in                  In this project we are finding out the data is leaked
various formats in steganography. The most                or not. The agent will receive the information to
widely used mechanism on account of its                   broadcast the data on the news media from server.
simplicity is the use of the Least Significant Bit.       We will check whether the authorized user leaked
Least Significant Bit or its variants are normally        the data to another news media channel.
used to hide data in a digital image. This paper          Assumption1:
discusses technique to hide data in a colorful            Each and every agent has its unique data.
image using least significant bit.                        Assumption2:
                                                          Another news channel will received the data only
1. Introduction                                           from agent.
    Sometimes data is leaked and found in                 Description of this paper in short:
unauthorized Places Nowadays; more and more               The data leakage application will be shown through
data are sold and transmitted on the internet.            BNN News channel.
Databases are being used widely in many important         In this paper, we are finding out the data is leaked
fields, such as, banking and so on. With the fast         or not. The agent will receive the information to
growth of database business on the net, the data          broadcast the data on the news media from server.
may be unsafe after passing through the unsecure          We will check whether the authorized user leaked
network.                                                  the data to another news media channel.
The recent surge in the growth of the Internet            In this, for the agent has its unique username will
results in offering of a wide range of web-based          be considered as the fake object. All over
services, such as database as a service, digital          information of the agent is stored into the database
                                                          (MySQL)




                                        Figure 1: BNN News Channel



                                                                                               379 | P a g e
Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 2, March -April 2013, pp.379-384
2. Modules Information                              example, say the distributed data objects are
Module1:                                                    medical records and the agents are hospitals. In this
         In this module consist of the design for the       case, even small modifications to the records of
website as well as database design for the                  actual patients may be undesirable. However, the
application. The authorized agent will log in. for          addition of some fake medical records may be
the new agent has to fill the register form, after          acceptable, since no patient matches these records,
successful submission of data he can logged into            and hence no one will ever be treated based on fake
our system. The agent will request for the data             records. A trace file is maintained to identify the
(jpeg image), he will receive the data by adding the        guilty agent. Trace file are a type of fake objects
fake object into data.                                      that help to identify improper use of data.
Module2:
 If the agent leaks that particular data then other         4. STEGANOGRAPHY
news channel will be updated by those images. At            Steganography, as defined above is a technique to
server side the Admin is user for data security             hide a data in an image in such a manner that it is
purpose. It will check whether the leaked data is           unperceivable.
same or not.                                                Many a times Steganography is related to
Module3:                                                    Cryptography. It may be a misleading statement
The agent request for the data by explicit request          with respect to a Steganography approach.
and the data is mp3 file. The user will receive the         Steganography is related to Cryptography by
data by adding the fake object which is unique.             meaning that both are used for security purposes
Module4:                                                    but with different approach or implementation.
This module checks whether our system data as               Steganography is, along with Cryptography, a very
well as another system data is same or not. If he           ancient concept but its application varies according
found the same data then the agent will be called           to emerging technologies.
guilty agent.                                               The steps in steganography,
                                                            1.        Include the writing the text messages,
3. ADDING OF FAKE OBJECT                                    encryption of the text message is one of the
          The distributor may be able to add fake           options available.
objects to the distributed data in order to improve         2. Later, text is hidden in the selected media and
his effectiveness in detecting guilty agents.               transmitted to recipient.
However, fake objects may impact the correctness            3. At receiver end, reverse process is implemented
of what agents do, so they may not always be                to recover the original text message. Various
allowable. The idea of perturbing data to detect            techniques used in the art of steganography is the
leakage is not new. However, in most cases,                 arrangements of various bits of the characters of the
individual objects are perturbed, e.g., by adding           text in an image or other media. Keeping in mind
random noise to sensitive salaries, or adding a             the above, two files are needed; the image file and
watermark to an image. In this case, perturbing the         the text file that contains the data.
set of distributor objects by adding fake elements is
done. In some applications, fake objects may cause
fewer problems that perturbing real objects. For




                                      Figure 2: The Process of hiding data




                                                                                                 380 | P a g e
Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 2, March -April 2013, pp.379-384
LSB affects the smallest changes of the 8 bits            we can easily encrypt is using several ways. This is
therefore it alters the image to minimum. The most        the point where Cryptography and steganography
common method used is called LSB (Least                   differs. Applying, cryptography result in an output
Significant Bit) Mechanism that is hiding if the          of an unreadable text which when send over an
data in the least significant Bit (LSB) of the            internet is easily detectable that some important
message.                                                  information is being conveyed. Hiding message in
          However, one of its major limitations is        an image, along with the conditions, may seem just
small size of data which can be embedded in such          an exchange of picture between two ends.
type of images using only LSB. LSB is extremely                     At this point mind wanders that how an
vulnerable to attacks. LSB techniques implemented         image can contain a message with no change in its
to 24 bit formats are difficult to detect contrary to 8   quality and size. From this end onwards we will
bit format. The other techniques include Masking          give a brief vision on the image design. To begin
and Filtering. It is normally associated with JPEG.       with, one must have a clear concept of an Image
In this technique image data is extended by               layout which includes the Image Header
masking secret data over it. Therefore, experts do        information, Image block information, Image
not include this as a form of Steganography.              extensible information (if any).Most of this
All algorithms employed for any type of format            information is clearly specified in standard
have pros and cons and depend upon the                    technical documents.
environments used. It also depends upon the                         We are using 24-bit BMP over 24-bit
information to be embedded. Various techniques            JPEG because it is lossless compression. JPEG is
developed were compared.                                  lossy i.e. to save space on disk it just eliminates
                                                          parts of any image. If you compare the bit depth
5. IMPLEMENTATION                                         and pixel value of a BMP and JPEG both have the
          Steganography, as defined above is a            same except the file size on disk. The reason lies in
technique to hide a data in an image in such a            the compression scheme used by JPEG and BMP.
manner that it is unperceivable. To achieve such          To make this compression efficient the color model
outcome one may think of chopping the raw data            much be changed from RGB to YUV color model,
that is the data to be hidden in equal number of          why YUV model, reason lies in the way this color
block and hide it in specific areas with in an image.     model represents color. Simply, RGB stores image
Such a thought interprets that the concept is not         color in combination but YUV separates these
vivid. That is, one is not able to extract the true       color in Y for Luminance (color Brightness), U for
beauty of Steganography.                                  chrominance(color difference) and V for color
Presently the technology being mostly used is             information. This approach is used because human
Digital Images [6]. By digital Images we presume          eye is more sensitive to Luminance then
to deal with bits that is 0‟s and 1‟s.                    chrominance. Fewer bits can be used for
          Digital Images we have selected are 24-bit      representing chrominance information. Reducing
depth color images using RGB color model. 24-bit          bits in chrominance is achieved by applying
refers to 8-bit for each RGB color channel, i.e. 8-       chrominance down sampling. Thus, reducing the
bits for red.8-bits for green and 8-bits for blue and     overall size of an image.
24-bit depth with width and height of 800 x 600                     Our algorithm is simple and flexible using
pixels. It must be remembered that image                  LSB technique. We have selected the formats that
resolution is highly dependent on the monitor             commonly use lossless compression that is BMP,
screen resolution.                                        PNG, TIFF and GIF. We can make use of any of
          The idea is to hide text in image with the      these formats or convert BMP into any of the above
conditions that the image quality is retained along       said formats. When data is streamed, it is captured
with the size of the image. Here, a thought may           after the header and chopped into 8 bits.
arise that why we need to hide text in an image if




                                                                                               381 | P a g e
Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 2, March -April 2013, pp.379-384




                                Figure 3: Simple conversion of a BMP to GIF

It has been analyzed that the conversions do not           pixel value of an image. Each pixel value contains
distort the images to a level where the degradation        the value of the color and is represented in bits (0
can be felt with the naked eye.                            & 1).Similarly, text to hide is also represented in
We recommend this algorithm to be used to hide             bits (0&1).Therefore comparing bit values byte by
small amount of data although large amount of data         byte result in hiding the bit values of Text in bit
may also be incorporated in an image. The concept          value of an Image. The technique we are using is
is similar to somewhat one time pad. A large               Least Significant Bit (LSB) i.e. storing in LSB of a
number of images from the said formats were                byte (pixel). As mentioned above, the RGB model
chosen to hide the data. Results confirm the use of        is used, we first stream an Image file and read the
these formats for successful Steganography                 file in bits and then seek the position ahead the
techniques.                                                header bits.
In 24-bit BMP, using RGB color model, with
header size of 54 bytes.54 bytes onwards starts the




                           Figure 5 Resultant image after hiding data in GIF format



                                                                                                382 | P a g e
Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and
                   Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 3, Issue 2, March -April 2013, pp.379-384
6. IMAGE ANALYSIS                                    most used colour to the least used colours to reduce
A. LSB in BMP                                            lookup time. Some extra care is to be taken if the
          The BMP file format also called bitmap or      GIF images are to be used for Steganography. This
DIB file format (for device-independent bitmap), is      is because of the problem with the palette
an image file format used to store bitmap digital        approach. If the LSB of a GIF image is changed
images , if it is transmitted with an LSB stego.         using the palette approach, it may result in a
When image are used as the carrier in                    completely different colour. This is because the
Steganography they are generally manipulated by          index to the colour palette is changed. The change
changing one or more of the bits of the byte or          in the resulting image is noticeable if the adjacent
bytes that make up the pixels of an image. The           palette entries are not similar. But the change is not
message can be stored in the LSB of one colour of        noticeable if the adjacent palette entries are similar.
the RGB value or in the parity bit of the entire         Most applications that use LSB methods on GIF
RGB value.A BMP is capable of hiding big                 images have low security because it is possible to
message. LSB in BMP is most suitable for                 detect even moderate change in the image.
applications, where the focus is on the amount of        Solutions to these problems could be ,
information to be transmitted and not on the             1. Sort the palette so that the colour difference
secrecy of that information. If more number of bits      between consecutive colours is minimized
is altered, it may result in a larger possibility that   2. Add new colours, which are visually similar to
the altered bits can be seen with the human eye.         the existing colours in the palette.
But with the LSB the main objective of                   3. Use Gray scale images. In a 8 bit Gray scale GIF
Steganography is to pass a message to a receiver         image, there are 256 shades of gray. This results in
without an intruder even knowing that a message is       gradual changes in the colours and it is hard to
being passed is being achieved.                          detect.

B. LSB in PNG                                            CONCLUSION
          Portable Network Graphics (PNG) is a                      In some cases “realistic but fake” data
bitmapped image format that employs lossless data        records are injected to improve the chances of
compression. PNG was created to improve upon             detecting leakage and identifying the guilty party.
and replace GIF. When images are used as the                        Using containers (cover messages) to
carrier in Steganography they are generally              embed secret messages into is by far the most
manipulated by changing one or more of the bits of       popular use of Steganography today. This method
the byte or bytes that make up the pixels of an          of Steganography is very useful when a party must
image. The message can be stored in the LSB of           send a top secret, private or highly sensitive
one colour of the RGB value or in the parity bit of      document over an open systems environment such
the entire RGB value .A PNG is capable of hiding         as the Internet. By embedding the hidden data into
quite a large message. LSB in PNG is most suitable       the cover message and sending it, you can gain a
for applications where the focus is on the amount        sense of security by the fact that no one knows you
of information to be transmitted and not on the          have sent more than a harmless message other than
secrecy of that information. If more number of bits      the intended recipients.
is altered it may result in a larger possibility that               Steganography is in the nascent stage of
the altered bits can be seen with the human eye.         development. This allows users to hide files of
But with the LSB the main objective of                   larger sizes while at the same time preserve the
steganography is s to pass a message to a receiver       general appearance of any cover image used.
without an intruder even knowing that a message is       Furthermore, the implementation of various
being passed is being achieved.                          security measures provides a high level of
                                                         protection for the hidden data. It is concluded that
C. LSB in GIF                                            the, it is seen that the original image and the final
         Graphics interchange format also known          embedded image appear to be identical to the
as GIF is one of the machine independent                 human eye.
compressed formats for storing images. Since GIF                    LSB makes use of BMP image, to be able
images only have a bit depth of 8, amount of             to hide a secret message inside a BMP file, one
information that can be hidden is less than with         would require a very large cover image. BMP
BMP. Embedding information in GIF images using           images of 800×600 pixels found to have less web
LSB results in almost the same results as those of       applications. Moreover such uses are not accepted
using LSB with BMP. LSB in GIF is a very                 as valid. For this reason, LSB Steganography has
efficient algorithm to use when embedding a              also been developed for use with other image file
reasonable amount of data in a grayscale image.          formats. All the major image file formats have
GIF images are indexed images where the colours          different methods of hiding messages, with
used in the image are stored in a palette. The           different strong and weak points respectively. LSB
colours of the palette are typically ordered from the    in GIF images has the potential of hiding a large



                                                                                                383 | P a g e
Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 2, March -April 2013, pp.379-384
message, but only when the most suitable cover
image has been chosen.

REFERENCES:
  [1]   Panagiotis Papadimitriou, Hector Garcia-
        Molina (2010)„Data Leakage Detection‟,
        IEEE Transactions on knowledge and data
        engineering, Vol.22, No.3.
  [2]   P. Papadimitriou and H. Garcia-Molina,
        “Data Leakage Detec- tion,” technical
        report, Stanford Univ., 2008.
  [3]   “A      Stegnography       Implementation”,
        Beenish Mehboob and Rashid Aziz
        Faruqui.
  [4]   Moerland, T., “Steganography and
        Steganalysis”,     Leiden     Institute    of
        Advanced Computing Science.
  [5]   Silman,      J.,   “Steganography        and
        Steganalysis: An Overview”, SANS
        Institute, 2001 Jamil, T.,
  [6]   Bryan. “Steganography: How to Send a
        Secret     Message.”      8 Nov.        2001
        www.strangehorizons.com/2001/2001100
        8/steganography.shtml.
  [7]   Johnson, Neil F., and Sushil Jajodia,
        “Steganalysis of Images created using
        Current      Steganographic      Software”,
        Proceedings of the Second Information
        Hiding Workshop, April 1998.
  [8]    Krenn,      R.,    “Steganography       and
        Steganalysis”,
        http://www.Krenn.nl/univ/cry/steg/article.
        pdf Kafa Rabah. Steganography - The Art
        of Hiding Data. Information technology
        Journal 3 (3) - 2004
  [9]   Sellars, D., “An Introduction to
        Steganography”,




                                                                                 384 | P a g e

More Related Content

What's hot

A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data miningijujournal
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemKumar Goud
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd Iaetsd
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreLuisa Francisco
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesIRJAES Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...IJECEIAES
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionbunnz12345
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Journals
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computingeSAT Publishing House
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionIOSR Journals
 

What's hot (20)

A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Database
 
Privacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage SystemPrivacy Preserving Based Cloud Storage System
Privacy Preserving Based Cloud Storage System
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...Automated hierarchical classification of scanned documents using convolutiona...
Automated hierarchical classification of scanned documents using convolutiona...
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
Hindering data theft attack through fog computing
Hindering data theft attack through fog computingHindering data theft attack through fog computing
Hindering data theft attack through fog computing
 
Data Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage DetectionData Allocation Strategies for Leakage Detection
Data Allocation Strategies for Leakage Detection
 

Viewers also liked

Viewers also liked (20)

Bf32370372
Bf32370372Bf32370372
Bf32370372
 
Ch32524527
Ch32524527Ch32524527
Ch32524527
 
Fy3310631066
Fy3310631066Fy3310631066
Fy3310631066
 
Professora ivone slide show
Professora ivone slide showProfessora ivone slide show
Professora ivone slide show
 
Aye khudavan khuda
Aye khudavan khudaAye khudavan khuda
Aye khudavan khuda
 
Universidad autónoma del estado de hidalgo
Universidad autónoma del estado de hidalgoUniversidad autónoma del estado de hidalgo
Universidad autónoma del estado de hidalgo
 
CONCURSO CURIOSIPICS
CONCURSO CURIOSIPICSCONCURSO CURIOSIPICS
CONCURSO CURIOSIPICS
 
Biodiversidade e conhecimentos tradicionais
Biodiversidade e conhecimentos tradicionaisBiodiversidade e conhecimentos tradicionais
Biodiversidade e conhecimentos tradicionais
 
Sistema respiratorio
Sistema respiratorioSistema respiratorio
Sistema respiratorio
 
A cor da lágrima
A cor da lágrimaA cor da lágrima
A cor da lágrima
 
Roles evento profetico 2013
Roles evento profetico 2013Roles evento profetico 2013
Roles evento profetico 2013
 
Curso de Extensão: Introdução à Informática para Educação
Curso de Extensão: Introdução à Informática para EducaçãoCurso de Extensão: Introdução à Informática para Educação
Curso de Extensão: Introdução à Informática para Educação
 
Distpopulaao 1218630199259034-9
Distpopulaao 1218630199259034-9Distpopulaao 1218630199259034-9
Distpopulaao 1218630199259034-9
 
Desenvolvendo Aplicações para Windows 8
Desenvolvendo Aplicações para Windows 8Desenvolvendo Aplicações para Windows 8
Desenvolvendo Aplicações para Windows 8
 
Presentación tesis 3
Presentación tesis 3Presentación tesis 3
Presentación tesis 3
 
Portfolios. bauer
Portfolios. bauerPortfolios. bauer
Portfolios. bauer
 
Producto
ProductoProducto
Producto
 
Modelospedagogicos
ModelospedagogicosModelospedagogicos
Modelospedagogicos
 
El ascensor
El ascensorEl ascensor
El ascensor
 
Física 2 sistema solar
Física 2   sistema solarFísica 2   sistema solar
Física 2 sistema solar
 

Similar to Bh32379384

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 

Similar to Bh32379384 (20)

4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
P017329498
P017329498P017329498
P017329498
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 
finl.docx
finl.docxfinl.docx
finl.docx
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
H43064650
H43064650H43064650
H43064650
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 

Bh32379384

  • 1. Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.379-384 Using Stegnography Technique for Data Leakage Problems Detect Ashwini Palimkar (student), Prof. Dr. Suhas. H. Patil Bharati Vidyapeeth Deemed University College of engineering, Pune, Maharashtra, India Abstract: Our goal is to detect when the distributor’s repositories and libraries, e-commerce, online sensitive data have been leaked by agents, and if decision support system etc. These applications possible to identify the agent that leaked the make the digital assets, such as digital images, data. In this project, we are giving the video, audio, database content etc, easily accessible methodology for adding fake object into data. by ordinary people around the world for sharing, Fake object will be added through stegnography purchasing, distributing, or many other purposes. In concept. computer based stegnographhy, several forms of Stegnnography is an ancient technique of data digital media may Be used as cover for hidden hiding or the stegnography is the art and science information, photos, documents, web pages and of hiding the existence of information, we even MP3 music files may all serve as innocuous contrast it with the related disciplines of looking hosts for secret messages cryptography The data leakage application will be shown through And traffic security. News channel. Many techniques are used to hide data in In this project we are finding out the data is leaked various formats in steganography. The most or not. The agent will receive the information to widely used mechanism on account of its broadcast the data on the news media from server. simplicity is the use of the Least Significant Bit. We will check whether the authorized user leaked Least Significant Bit or its variants are normally the data to another news media channel. used to hide data in a digital image. This paper Assumption1: discusses technique to hide data in a colorful Each and every agent has its unique data. image using least significant bit. Assumption2: Another news channel will received the data only 1. Introduction from agent. Sometimes data is leaked and found in Description of this paper in short: unauthorized Places Nowadays; more and more The data leakage application will be shown through data are sold and transmitted on the internet. BNN News channel. Databases are being used widely in many important In this paper, we are finding out the data is leaked fields, such as, banking and so on. With the fast or not. The agent will receive the information to growth of database business on the net, the data broadcast the data on the news media from server. may be unsafe after passing through the unsecure We will check whether the authorized user leaked network. the data to another news media channel. The recent surge in the growth of the Internet In this, for the agent has its unique username will results in offering of a wide range of web-based be considered as the fake object. All over services, such as database as a service, digital information of the agent is stored into the database (MySQL) Figure 1: BNN News Channel 379 | P a g e
  • 2. Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.379-384 2. Modules Information example, say the distributed data objects are Module1: medical records and the agents are hospitals. In this In this module consist of the design for the case, even small modifications to the records of website as well as database design for the actual patients may be undesirable. However, the application. The authorized agent will log in. for addition of some fake medical records may be the new agent has to fill the register form, after acceptable, since no patient matches these records, successful submission of data he can logged into and hence no one will ever be treated based on fake our system. The agent will request for the data records. A trace file is maintained to identify the (jpeg image), he will receive the data by adding the guilty agent. Trace file are a type of fake objects fake object into data. that help to identify improper use of data. Module2: If the agent leaks that particular data then other 4. STEGANOGRAPHY news channel will be updated by those images. At Steganography, as defined above is a technique to server side the Admin is user for data security hide a data in an image in such a manner that it is purpose. It will check whether the leaked data is unperceivable. same or not. Many a times Steganography is related to Module3: Cryptography. It may be a misleading statement The agent request for the data by explicit request with respect to a Steganography approach. and the data is mp3 file. The user will receive the Steganography is related to Cryptography by data by adding the fake object which is unique. meaning that both are used for security purposes Module4: but with different approach or implementation. This module checks whether our system data as Steganography is, along with Cryptography, a very well as another system data is same or not. If he ancient concept but its application varies according found the same data then the agent will be called to emerging technologies. guilty agent. The steps in steganography, 1. Include the writing the text messages, 3. ADDING OF FAKE OBJECT encryption of the text message is one of the The distributor may be able to add fake options available. objects to the distributed data in order to improve 2. Later, text is hidden in the selected media and his effectiveness in detecting guilty agents. transmitted to recipient. However, fake objects may impact the correctness 3. At receiver end, reverse process is implemented of what agents do, so they may not always be to recover the original text message. Various allowable. The idea of perturbing data to detect techniques used in the art of steganography is the leakage is not new. However, in most cases, arrangements of various bits of the characters of the individual objects are perturbed, e.g., by adding text in an image or other media. Keeping in mind random noise to sensitive salaries, or adding a the above, two files are needed; the image file and watermark to an image. In this case, perturbing the the text file that contains the data. set of distributor objects by adding fake elements is done. In some applications, fake objects may cause fewer problems that perturbing real objects. For Figure 2: The Process of hiding data 380 | P a g e
  • 3. Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.379-384 LSB affects the smallest changes of the 8 bits we can easily encrypt is using several ways. This is therefore it alters the image to minimum. The most the point where Cryptography and steganography common method used is called LSB (Least differs. Applying, cryptography result in an output Significant Bit) Mechanism that is hiding if the of an unreadable text which when send over an data in the least significant Bit (LSB) of the internet is easily detectable that some important message. information is being conveyed. Hiding message in However, one of its major limitations is an image, along with the conditions, may seem just small size of data which can be embedded in such an exchange of picture between two ends. type of images using only LSB. LSB is extremely At this point mind wanders that how an vulnerable to attacks. LSB techniques implemented image can contain a message with no change in its to 24 bit formats are difficult to detect contrary to 8 quality and size. From this end onwards we will bit format. The other techniques include Masking give a brief vision on the image design. To begin and Filtering. It is normally associated with JPEG. with, one must have a clear concept of an Image In this technique image data is extended by layout which includes the Image Header masking secret data over it. Therefore, experts do information, Image block information, Image not include this as a form of Steganography. extensible information (if any).Most of this All algorithms employed for any type of format information is clearly specified in standard have pros and cons and depend upon the technical documents. environments used. It also depends upon the We are using 24-bit BMP over 24-bit information to be embedded. Various techniques JPEG because it is lossless compression. JPEG is developed were compared. lossy i.e. to save space on disk it just eliminates parts of any image. If you compare the bit depth 5. IMPLEMENTATION and pixel value of a BMP and JPEG both have the Steganography, as defined above is a same except the file size on disk. The reason lies in technique to hide a data in an image in such a the compression scheme used by JPEG and BMP. manner that it is unperceivable. To achieve such To make this compression efficient the color model outcome one may think of chopping the raw data much be changed from RGB to YUV color model, that is the data to be hidden in equal number of why YUV model, reason lies in the way this color block and hide it in specific areas with in an image. model represents color. Simply, RGB stores image Such a thought interprets that the concept is not color in combination but YUV separates these vivid. That is, one is not able to extract the true color in Y for Luminance (color Brightness), U for beauty of Steganography. chrominance(color difference) and V for color Presently the technology being mostly used is information. This approach is used because human Digital Images [6]. By digital Images we presume eye is more sensitive to Luminance then to deal with bits that is 0‟s and 1‟s. chrominance. Fewer bits can be used for Digital Images we have selected are 24-bit representing chrominance information. Reducing depth color images using RGB color model. 24-bit bits in chrominance is achieved by applying refers to 8-bit for each RGB color channel, i.e. 8- chrominance down sampling. Thus, reducing the bits for red.8-bits for green and 8-bits for blue and overall size of an image. 24-bit depth with width and height of 800 x 600 Our algorithm is simple and flexible using pixels. It must be remembered that image LSB technique. We have selected the formats that resolution is highly dependent on the monitor commonly use lossless compression that is BMP, screen resolution. PNG, TIFF and GIF. We can make use of any of The idea is to hide text in image with the these formats or convert BMP into any of the above conditions that the image quality is retained along said formats. When data is streamed, it is captured with the size of the image. Here, a thought may after the header and chopped into 8 bits. arise that why we need to hide text in an image if 381 | P a g e
  • 4. Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.379-384 Figure 3: Simple conversion of a BMP to GIF It has been analyzed that the conversions do not pixel value of an image. Each pixel value contains distort the images to a level where the degradation the value of the color and is represented in bits (0 can be felt with the naked eye. & 1).Similarly, text to hide is also represented in We recommend this algorithm to be used to hide bits (0&1).Therefore comparing bit values byte by small amount of data although large amount of data byte result in hiding the bit values of Text in bit may also be incorporated in an image. The concept value of an Image. The technique we are using is is similar to somewhat one time pad. A large Least Significant Bit (LSB) i.e. storing in LSB of a number of images from the said formats were byte (pixel). As mentioned above, the RGB model chosen to hide the data. Results confirm the use of is used, we first stream an Image file and read the these formats for successful Steganography file in bits and then seek the position ahead the techniques. header bits. In 24-bit BMP, using RGB color model, with header size of 54 bytes.54 bytes onwards starts the Figure 5 Resultant image after hiding data in GIF format 382 | P a g e
  • 5. Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.379-384 6. IMAGE ANALYSIS most used colour to the least used colours to reduce A. LSB in BMP lookup time. Some extra care is to be taken if the The BMP file format also called bitmap or GIF images are to be used for Steganography. This DIB file format (for device-independent bitmap), is is because of the problem with the palette an image file format used to store bitmap digital approach. If the LSB of a GIF image is changed images , if it is transmitted with an LSB stego. using the palette approach, it may result in a When image are used as the carrier in completely different colour. This is because the Steganography they are generally manipulated by index to the colour palette is changed. The change changing one or more of the bits of the byte or in the resulting image is noticeable if the adjacent bytes that make up the pixels of an image. The palette entries are not similar. But the change is not message can be stored in the LSB of one colour of noticeable if the adjacent palette entries are similar. the RGB value or in the parity bit of the entire Most applications that use LSB methods on GIF RGB value.A BMP is capable of hiding big images have low security because it is possible to message. LSB in BMP is most suitable for detect even moderate change in the image. applications, where the focus is on the amount of Solutions to these problems could be , information to be transmitted and not on the 1. Sort the palette so that the colour difference secrecy of that information. If more number of bits between consecutive colours is minimized is altered, it may result in a larger possibility that 2. Add new colours, which are visually similar to the altered bits can be seen with the human eye. the existing colours in the palette. But with the LSB the main objective of 3. Use Gray scale images. In a 8 bit Gray scale GIF Steganography is to pass a message to a receiver image, there are 256 shades of gray. This results in without an intruder even knowing that a message is gradual changes in the colours and it is hard to being passed is being achieved. detect. B. LSB in PNG CONCLUSION Portable Network Graphics (PNG) is a In some cases “realistic but fake” data bitmapped image format that employs lossless data records are injected to improve the chances of compression. PNG was created to improve upon detecting leakage and identifying the guilty party. and replace GIF. When images are used as the Using containers (cover messages) to carrier in Steganography they are generally embed secret messages into is by far the most manipulated by changing one or more of the bits of popular use of Steganography today. This method the byte or bytes that make up the pixels of an of Steganography is very useful when a party must image. The message can be stored in the LSB of send a top secret, private or highly sensitive one colour of the RGB value or in the parity bit of document over an open systems environment such the entire RGB value .A PNG is capable of hiding as the Internet. By embedding the hidden data into quite a large message. LSB in PNG is most suitable the cover message and sending it, you can gain a for applications where the focus is on the amount sense of security by the fact that no one knows you of information to be transmitted and not on the have sent more than a harmless message other than secrecy of that information. If more number of bits the intended recipients. is altered it may result in a larger possibility that Steganography is in the nascent stage of the altered bits can be seen with the human eye. development. This allows users to hide files of But with the LSB the main objective of larger sizes while at the same time preserve the steganography is s to pass a message to a receiver general appearance of any cover image used. without an intruder even knowing that a message is Furthermore, the implementation of various being passed is being achieved. security measures provides a high level of protection for the hidden data. It is concluded that C. LSB in GIF the, it is seen that the original image and the final Graphics interchange format also known embedded image appear to be identical to the as GIF is one of the machine independent human eye. compressed formats for storing images. Since GIF LSB makes use of BMP image, to be able images only have a bit depth of 8, amount of to hide a secret message inside a BMP file, one information that can be hidden is less than with would require a very large cover image. BMP BMP. Embedding information in GIF images using images of 800×600 pixels found to have less web LSB results in almost the same results as those of applications. Moreover such uses are not accepted using LSB with BMP. LSB in GIF is a very as valid. For this reason, LSB Steganography has efficient algorithm to use when embedding a also been developed for use with other image file reasonable amount of data in a grayscale image. formats. All the major image file formats have GIF images are indexed images where the colours different methods of hiding messages, with used in the image are stored in a palette. The different strong and weak points respectively. LSB colours of the palette are typically ordered from the in GIF images has the potential of hiding a large 383 | P a g e
  • 6. Ashwini Palimkar, Dr. Suhas. H. Patil / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 2, March -April 2013, pp.379-384 message, but only when the most suitable cover image has been chosen. REFERENCES: [1] Panagiotis Papadimitriou, Hector Garcia- Molina (2010)„Data Leakage Detection‟, IEEE Transactions on knowledge and data engineering, Vol.22, No.3. [2] P. Papadimitriou and H. Garcia-Molina, “Data Leakage Detec- tion,” technical report, Stanford Univ., 2008. [3] “A Stegnography Implementation”, Beenish Mehboob and Rashid Aziz Faruqui. [4] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science. [5] Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 Jamil, T., [6] Bryan. “Steganography: How to Send a Secret Message.” 8 Nov. 2001 www.strangehorizons.com/2001/2001100 8/steganography.shtml. [7] Johnson, Neil F., and Sushil Jajodia, “Steganalysis of Images created using Current Steganographic Software”, Proceedings of the Second Information Hiding Workshop, April 1998. [8] Krenn, R., “Steganography and Steganalysis”, http://www.Krenn.nl/univ/cry/steg/article. pdf Kafa Rabah. Steganography - The Art of Hiding Data. Information technology Journal 3 (3) - 2004 [9] Sellars, D., “An Introduction to Steganography”, 384 | P a g e