SlideShare a Scribd company logo
BY
     N.HIMASINDHU
     P.SHANKAR
     K.VAMSHI
     J.RAM BABU
                    1
The term Steganography comes from the Greek words for
covered writing.


 Steganography is the art of covered or hidden writing.


 The purpose of steganography is covert communication-to
hide the existence of a message from a third party.




                                                           2
Thousands of years ago, the
 Greeks used staganography to hide
information from their enemies.



  One hiding method was to engrave a
message in a block of wood, then
cover it with wax, so it looks like a
blank wax tablet. when they wanted to
retrieve the message, they would
simply melt off the wax.

                                        3
We can also perform steganography using a computer.
Everything in a computer is stored as 1’s and 0’s (a bit).
Bits are grouped in sets of eight, one set is called a byte.

       1 0                        10011000
                         11111111
   0                                  00001000
          Bits                       Bytes

One byte can be used to represent each letter of the
alphabet. This is what is used in text files.

                    01000001 = A
                    01000010 = B
                    01000011 = C
                                                           4
Pictures are made up of lots of little dots called pixels.
Each pixel is represented as 3 bytes – one for red, one for
green and one for blue.


        11111000 11001001 00000011

            248            201             3

Each byte is interpreted as a number, which is how much of
that colour is used to make the final colour of the pixel.


        248 + 201 + 3 = Orange Colour

                                                         5
The difference between two colours that differ by one in
either one red, green or blue value is impossible to see
with the human eye.

        248 + 201 + 3 = Original Colour
        248 + 201 + 4 = Blue +1

        247 + 201 + 3 = Red -1

If we change the least significant (last) bit in a byte, we
either add or subtract one from the value it represents.

This means we can overwrite the last bit in a byte without
affecting the colour it appears to be.
                                                              6
We can use images to hide things if we replace the last
  bit of every colour’s byte with a bit from the message.

Message: A          01000001
Image with 3 pixels:

Pixel 1:          11111000 11001001 00000011
Pixel 2:          11111000 11001001 00000011
Pixel 3:          11111000 11001001 00000011
Now we hide our message in the image:

Pixel 1:               11111000 11001001 00000010
Pixel 2:               11111000 11001000 00000010
                       11111000 11001001 00000011
Pixel 3:
New image:
Even if we do this across a big image and with a really
large message, it is still hard to tell that anything is wrong.




         Original                      With Hidden
                                        Message

                                                            8
EXISTING SYSTEM                 PROPOSED SYSTEM
 This application is platform    This application is platform
                                 independent.
 dependent.
                                 Supports both command mode
 Supports any one either
                                 and graphical mode
 command mode or graphical
 mode.                           Provide interactive interface
                                 through which user can
 Should be applicable for any    interact with different types of
 kind of image size for          Images, Image Sizes and Text
 steganography.                  Messages.




                                                              9
HARDWARE REQUIREMENTS
 Processor:: Pentium-III (or) Higher
 Ram:: 64MB (or) Higher
 Cache:: 512MB
 Hard disk:: 10GB


SOFTWARE REQUIREMENTS
 Tools:: Micro Soft Front
 Operating System:: WindowsNT/2000
 Client Side:: GUI


                                       10
In this we have 2 modules
Steg module : In this module User need to write any secret
information in Text area provided and need to select an Image file to
which User wants to append the Secret Information Text .

In UnSteg module the Encrypted Image will be selected and
Steganography Application will start decrypting it with each and
every pixel of the Image and displays the output i.e. Secret Text
Information




                                                                        11
This is output screen




                        12
This is a steg module in which secret text is
typed as shown above



                                                13
Selecting image and appending the secret information in
to image which is also steg module


                                                          14
The secret information is added in this image



                                                15
This is unsteg module ,i.e. the encrypted image
file is selected.
The encrypted image file is saved in the same
folder of the image which we are selected to
encrypt                                           16
Here decrypting image is done ,which is also an unsteg module



                                                                17
This is decrypted secret information from encrypted image




                                                            18
Technical feasibility

Operational feasibility

Economical feasibility:
          Cost benefit analysis
          Long-term returns
          Maintenance costs




                                   19
Class diagram of steganography


                                encryption
    steg                      text
                              image
message
                              encryption
image
                              takeimage()
selectmessage()
                              taketext()
selectimage()
                              encrypt()
                              createnewimage()




                                     decryption
      unsteg                        decrypt
 decryption                         displayimage

 takedecryptedimage()               decrypt()
                                    displayimage()


                                                     20
Sequence diagram for steganography


user                              steg module               Encryption           unsteg                     decryption


       1.select message and image

                                        2.Take Message & image




                                      3.create a new image file with encrypted message
          4.send new image file




                    5.select encrypted image file

                                                                                              6.take encrypted image




                                                                                          7.display secret text

                         8.display decrypted message




                                                                                                                         21
Usecase diagram for steganography




                             select secret text




                              select image file



user



                             select steg module




                            select unsteg module




                                                   22
Allows user to hide large amounts of information within image and audio
files.

 These forms of steganography often are used in conjunction with
cryptography so that the information is doubly protected

Stego may, in fact, be all too real —
                     There have been several reports that the terrorist
organization behind the September 11 attacks in New York City,
Washington, D.C., and outside of Pittsburgh used steganography as one of
their means of communication.




                                                                     23
24
25

More Related Content

What's hot

Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Steganography
SteganographySteganography
SteganographySonam M
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
Mikel Solabarrieta
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
VijayMaheshwari12
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 

What's hot (20)

Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
Steganography Steganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

ERP on School Management System
ERP on School Management SystemERP on School Management System
ERP on School Management System
Amit Gandhi
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
Pratik Poddar
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
Saurabh Kaushik
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
Girish Ram M
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
Preeti Yadav
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
Ritu Agarwal
 
Steganography
SteganographySteganography
Steganography
bhaskarnarula
 
Steganography
SteganographySteganography
Steganography
PRACHETA BISWAS
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 

Viewers also liked (12)

ERP on School Management System
ERP on School Management SystemERP on School Management System
ERP on School Management System
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
File000133
File000133File000133
File000133
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 

Similar to Steganography

Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
Monica Turner
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Stegnography final
Stegnography finalStegnography final
Stegnography finalNikhil Kumar
 
Presentation i
Presentation iPresentation i
Presentation i
nidhip216
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
NAIM PARVEZ GALIB
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
IJERA Editor
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
csandit
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
iosrjce
 

Similar to Steganography (20)

Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Stegnography final
Stegnography finalStegnography final
Stegnography final
 
Presentation i
Presentation iPresentation i
Presentation i
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Video Stegnography
Video StegnographyVideo Stegnography
Video Stegnography
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 

More from Shankar Murthy

Cloud computing
Cloud computing Cloud computing
Cloud computing
Shankar Murthy
 
Earthquake detection using P and S waves, IEEE Conference
Earthquake detection using P and S waves, IEEE ConferenceEarthquake detection using P and S waves, IEEE Conference
Earthquake detection using P and S waves, IEEE Conference
Shankar Murthy
 
Earthquake prediction
Earthquake predictionEarthquake prediction
Earthquake prediction
Shankar Murthy
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3Shankar Murthy
 
Automated detection of stealthy port scans.ppt(mine)
Automated detection of stealthy port scans.ppt(mine)Automated detection of stealthy port scans.ppt(mine)
Automated detection of stealthy port scans.ppt(mine)Shankar Murthy
 
Latency equalization as a new network service primitive.ppt
Latency equalization as a new network service primitive.pptLatency equalization as a new network service primitive.ppt
Latency equalization as a new network service primitive.pptShankar Murthy
 
Earthquake prediction preview 1
Earthquake prediction preview 1Earthquake prediction preview 1
Earthquake prediction preview 1Shankar Murthy
 

More from Shankar Murthy (8)

Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Earthquake detection using P and S waves, IEEE Conference
Earthquake detection using P and S waves, IEEE ConferenceEarthquake detection using P and S waves, IEEE Conference
Earthquake detection using P and S waves, IEEE Conference
 
Earthquake prediction
Earthquake predictionEarthquake prediction
Earthquake prediction
 
Exploration routing chapter_3
Exploration routing chapter_3Exploration routing chapter_3
Exploration routing chapter_3
 
W3 analyzer.ppt
W3 analyzer.pptW3 analyzer.ppt
W3 analyzer.ppt
 
Automated detection of stealthy port scans.ppt(mine)
Automated detection of stealthy port scans.ppt(mine)Automated detection of stealthy port scans.ppt(mine)
Automated detection of stealthy port scans.ppt(mine)
 
Latency equalization as a new network service primitive.ppt
Latency equalization as a new network service primitive.pptLatency equalization as a new network service primitive.ppt
Latency equalization as a new network service primitive.ppt
 
Earthquake prediction preview 1
Earthquake prediction preview 1Earthquake prediction preview 1
Earthquake prediction preview 1
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 

Steganography

  • 1. BY N.HIMASINDHU P.SHANKAR K.VAMSHI J.RAM BABU 1
  • 2. The term Steganography comes from the Greek words for covered writing. Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. 2
  • 3. Thousands of years ago, the Greeks used staganography to hide information from their enemies. One hiding method was to engrave a message in a block of wood, then cover it with wax, so it looks like a blank wax tablet. when they wanted to retrieve the message, they would simply melt off the wax. 3
  • 4. We can also perform steganography using a computer. Everything in a computer is stored as 1’s and 0’s (a bit). Bits are grouped in sets of eight, one set is called a byte. 1 0 10011000 11111111 0 00001000 Bits Bytes One byte can be used to represent each letter of the alphabet. This is what is used in text files. 01000001 = A 01000010 = B 01000011 = C 4
  • 5. Pictures are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes – one for red, one for green and one for blue. 11111000 11001001 00000011 248 201 3 Each byte is interpreted as a number, which is how much of that colour is used to make the final colour of the pixel. 248 + 201 + 3 = Orange Colour 5
  • 6. The difference between two colours that differ by one in either one red, green or blue value is impossible to see with the human eye. 248 + 201 + 3 = Original Colour 248 + 201 + 4 = Blue +1 247 + 201 + 3 = Red -1 If we change the least significant (last) bit in a byte, we either add or subtract one from the value it represents. This means we can overwrite the last bit in a byte without affecting the colour it appears to be. 6
  • 7. We can use images to hide things if we replace the last bit of every colour’s byte with a bit from the message. Message: A 01000001 Image with 3 pixels: Pixel 1: 11111000 11001001 00000011 Pixel 2: 11111000 11001001 00000011 Pixel 3: 11111000 11001001 00000011 Now we hide our message in the image: Pixel 1: 11111000 11001001 00000010 Pixel 2: 11111000 11001000 00000010 11111000 11001001 00000011 Pixel 3: New image:
  • 8. Even if we do this across a big image and with a really large message, it is still hard to tell that anything is wrong. Original With Hidden Message 8
  • 9. EXISTING SYSTEM PROPOSED SYSTEM This application is platform This application is platform independent. dependent. Supports both command mode Supports any one either and graphical mode command mode or graphical mode. Provide interactive interface through which user can Should be applicable for any interact with different types of kind of image size for Images, Image Sizes and Text steganography. Messages. 9
  • 10. HARDWARE REQUIREMENTS Processor:: Pentium-III (or) Higher Ram:: 64MB (or) Higher Cache:: 512MB Hard disk:: 10GB SOFTWARE REQUIREMENTS Tools:: Micro Soft Front Operating System:: WindowsNT/2000 Client Side:: GUI 10
  • 11. In this we have 2 modules Steg module : In this module User need to write any secret information in Text area provided and need to select an Image file to which User wants to append the Secret Information Text . In UnSteg module the Encrypted Image will be selected and Steganography Application will start decrypting it with each and every pixel of the Image and displays the output i.e. Secret Text Information 11
  • 12. This is output screen 12
  • 13. This is a steg module in which secret text is typed as shown above 13
  • 14. Selecting image and appending the secret information in to image which is also steg module 14
  • 15. The secret information is added in this image 15
  • 16. This is unsteg module ,i.e. the encrypted image file is selected. The encrypted image file is saved in the same folder of the image which we are selected to encrypt 16
  • 17. Here decrypting image is done ,which is also an unsteg module 17
  • 18. This is decrypted secret information from encrypted image 18
  • 19. Technical feasibility Operational feasibility Economical feasibility:  Cost benefit analysis  Long-term returns  Maintenance costs 19
  • 20. Class diagram of steganography encryption steg text image message encryption image takeimage() selectmessage() taketext() selectimage() encrypt() createnewimage() decryption unsteg decrypt decryption displayimage takedecryptedimage() decrypt() displayimage() 20
  • 21. Sequence diagram for steganography user steg module Encryption unsteg decryption 1.select message and image 2.Take Message & image 3.create a new image file with encrypted message 4.send new image file 5.select encrypted image file 6.take encrypted image 7.display secret text 8.display decrypted message 21
  • 22. Usecase diagram for steganography select secret text select image file user select steg module select unsteg module 22
  • 23. Allows user to hide large amounts of information within image and audio files. These forms of steganography often are used in conjunction with cryptography so that the information is doubly protected Stego may, in fact, be all too real — There have been several reports that the terrorist organization behind the September 11 attacks in New York City, Washington, D.C., and outside of Pittsburgh used steganography as one of their means of communication. 23
  • 24. 24
  • 25. 25