Security System Using
Steganography
Introduction
 While transferring a file from one point to another through
Intranet and Internet we need more file secure concepts.
 Ordinary, file Encryption-Decryption Concepts, which are
readily available in java examples are easily captured by
middle way itself.
 This project helps to send a file from one place to another in
a secured manner
Objective
The main objective of this project is SECURITY during file transmission
from one end to another end both in Internet and private network. The main
concept of Steganography, i.e. Encrypt a file and hide it in another media to
invisible it, is maintained by our project such that our target file will be
encrypted and embedded into an audio or video file then the resultant video
file is send through the network. The front-end screen of this software will be
designed in Java using Swing Concepts.
Steganography is the practice of hiding private or sensitive information
within something that appears to be nothing out of the usual.
Steganography is often confused with cryptography because the two are
similar in the way that they both are used to protect important information.
Steganography comes from the Greek words Steganós (Covered) and
Graptos (Writing).
Steganography
 The art of detecting Steganography is referred to as Steganalysis.
 Steganalysis does not deal with trying to decrypt the hidden information
inside of a file, just discovering it.
 To put it simply Steganalysis involves detecting the use of Steganography
inside of a file.
 The most common use of Steganography is to hide a file inside another
file.
Existing System
 For Transmitting a file from one point to another many of us are using Encryption only.
This will not give that much of security.
 While using Steganography for embedding a source file to an another media they are using
watermark embedding. It is also have its own disadvantages. The resultant file of this
techniques will be change from the source file. Watermark embedding is easily decrypted
by the hackers.
 Encryption and Embedding only is not give that much of security to our communication.
Proposed System
 In our system we are not following the regular encryption, decryption techniques.
 We are Introducing a new algorithm Bit-Shift in Random Cycle Order. I.e. totally 4
different types of Bit-Shift algorithms are used randomly to encrypt the data
 This Encryption is embedded into an Audio or Video File.
 Again It will be embedded into another media. This double embedding increases the level
of security.
 Password Protection of this entire works give an additional security.
Technologies overview
 This project helps to send a file from one place to another in a secured manner.
 Firstly the target file is encrypted using an algorithm called Bit Shifting.
 The Encrypted file is embedded into an audio file.
 The resultant file will be embedded into a video file.
 The video file and the whole thing is protected by a password and sent through net.
Modules
 Connection manager Module
 Merger Module
 Extractor Module
 Result window Module
Merger Module
This Module is front end module and it is designed using
swing. This module gets the inputs from sender. The inputs are
Audio/ video, Image/Text and secret message file with password.
Then merge the all requirements and then send to receiver.
Connection manager Module
The merged file can send from sender or
server to receiver. The UDP protocol can be use
for that networking process.
Extractor Module
This module gets the merged file after a
password verification. Then extract the merged
file and call the result window module to open
extracted file.
Result window Module
This module displays the original secret file
and covered Audio/Video file .
Architecture for Encoding - Transmission
Steganography-Transmission Flow
Architecture for Decoding - Reception
Steganography - Reception Flow
Hardware Requirements
 CPU - PENTIUM III PROCESSOR
 HARD DISK SPACE - 40 GB
 DISPLAY - 15” COLOR MONITOR
 MAIN MEMORY - 256 MB
 KEYBOARD - 104 KEYS
 CLOCK-SPEED - 2.6 GHZ
 MONITOR - 15 ″ SVGA COLOR
Software Requirements
 OPERATING SYSTEM - WINDOWS NT/XP
 BACKEND - MS SQL SERVER 2000
 FRONT END - JAVA (jdk1.6)
Merger
Audio File Select
Video File Select
Text File Select
File Embedding
Client Embedded File Received
Type Password For Encrypted File
Encrypted File Displayed
Data Security Using Steganography

Data Security Using Steganography

  • 1.
  • 2.
    Introduction  While transferringa file from one point to another through Intranet and Internet we need more file secure concepts.  Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself.  This project helps to send a file from one place to another in a secured manner
  • 3.
    Objective The main objectiveof this project is SECURITY during file transmission from one end to another end both in Internet and private network. The main concept of Steganography, i.e. Encrypt a file and hide it in another media to invisible it, is maintained by our project such that our target file will be encrypted and embedded into an audio or video file then the resultant video file is send through the network. The front-end screen of this software will be designed in Java using Swing Concepts.
  • 4.
    Steganography is thepractice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect important information. Steganography comes from the Greek words Steganós (Covered) and Graptos (Writing). Steganography
  • 5.
     The artof detecting Steganography is referred to as Steganalysis.  Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it.  To put it simply Steganalysis involves detecting the use of Steganography inside of a file.  The most common use of Steganography is to hide a file inside another file.
  • 6.
    Existing System  ForTransmitting a file from one point to another many of us are using Encryption only. This will not give that much of security.  While using Steganography for embedding a source file to an another media they are using watermark embedding. It is also have its own disadvantages. The resultant file of this techniques will be change from the source file. Watermark embedding is easily decrypted by the hackers.  Encryption and Embedding only is not give that much of security to our communication.
  • 7.
    Proposed System  Inour system we are not following the regular encryption, decryption techniques.  We are Introducing a new algorithm Bit-Shift in Random Cycle Order. I.e. totally 4 different types of Bit-Shift algorithms are used randomly to encrypt the data  This Encryption is embedded into an Audio or Video File.  Again It will be embedded into another media. This double embedding increases the level of security.  Password Protection of this entire works give an additional security.
  • 8.
    Technologies overview  Thisproject helps to send a file from one place to another in a secured manner.  Firstly the target file is encrypted using an algorithm called Bit Shifting.  The Encrypted file is embedded into an audio file.  The resultant file will be embedded into a video file.  The video file and the whole thing is protected by a password and sent through net.
  • 9.
    Modules  Connection managerModule  Merger Module  Extractor Module  Result window Module
  • 10.
    Merger Module This Moduleis front end module and it is designed using swing. This module gets the inputs from sender. The inputs are Audio/ video, Image/Text and secret message file with password. Then merge the all requirements and then send to receiver.
  • 11.
    Connection manager Module Themerged file can send from sender or server to receiver. The UDP protocol can be use for that networking process.
  • 12.
    Extractor Module This modulegets the merged file after a password verification. Then extract the merged file and call the result window module to open extracted file.
  • 13.
    Result window Module Thismodule displays the original secret file and covered Audio/Video file .
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
    Hardware Requirements  CPU- PENTIUM III PROCESSOR  HARD DISK SPACE - 40 GB  DISPLAY - 15” COLOR MONITOR  MAIN MEMORY - 256 MB  KEYBOARD - 104 KEYS  CLOCK-SPEED - 2.6 GHZ  MONITOR - 15 ″ SVGA COLOR
  • 19.
    Software Requirements  OPERATINGSYSTEM - WINDOWS NT/XP  BACKEND - MS SQL SERVER 2000  FRONT END - JAVA (jdk1.6)
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
    Type Password ForEncrypted File
  • 27.