SlideShare a Scribd company logo
1 of 31
1
PROJECT
ON
“ AUDIO STEGANOGRAPHY”
Visit:
http://bit.ly/audio_javaproject
For Complete Project
2
INSTITUTE OF ENGINEERING & TECHNOLOGY,
qqqqqqqqqqqq UNIVERSITY
CERTIFICATE
This is to certify that the project report entitled
“STEGANOGRAPHY” is a bonafide record of the
project work done by the students:
In partial fulfillment of the requirement for the 6th
semester
of COMPUTER SCIENCE & ENGINEERING in
Institute of Engineering Technology, qqqqqqqq
University ,
3
ACKNOWLEDGEMENT
This Project itself is an acknowledgment
to the inspiration, drive and technical assistance
contributed by many individuals. This project would
have never seen the light of this day without the help
and guidance I have received.
I express my gratitude to xxxxxxxxxx,
Head, Department of Computer Science &
Engineering, Institute of Engineering & Technology,
Bundelkhand University , Jhansi , for providing me
with excellent infrastructure and awesome
environment that laid the potentially strong
foundation for my professional life.
I own an incalculable debt of my all staffs
of Department of Computer Science & Engineering
for their direct and indirect help.
I extend my heartfelt thanks to my parents,
teacher, friends, and well-wishers for their support
and timely help.
4
DECLARATION
I hereby declare that the project work entitled
“STEGANOGRAPHY”
Is submitted in partial fulfillment of the
requirements for the 6th
semester. B.Tech
(Computer Science & Engineering ) and it is a
report of the original work done by me during
the period of February – May in
5
Place: Jhansi
Date: ---------------
CONTENTS
Chapter no Name Page No
1 Steganography at
Large
1.1 Introduction
1.2 Where hidden data
hides
1.3 What does the project
do
7
2 Problem Statement 9
3 Objective 10
4 Module Description
4.1 Interface Module
Diagram
4.2Data Flow Diagram
11
5 Behavioral Description
5.1 image
5.2 audio
14
6 Software Support
6.1 Technical details
17
7 LSB Algorithm
7.1 Implementation 18
8 User Manual
A. Image Steganography
B. Audio Steganography
20
9 Summary 28
6
10 Bibliography 29
Abstract
Steganography is the art of hiding the fact that
Visit:
http://bit.ly/audio_javaproject
For Complete Project
7
1. Steganography at Large
1.1 Introduction
Steganography derives from the Greek word steganos,
meaning covered or secret, and graph (writing or drawing).
On the simplest level, steganography is hidden writing,
whether it consists of invisible ink on paper or copyright
information hidden in an audio or image file.
Where cryptography scrambles a message into a code to
obscure its meaning, steganography hides the message
entirely. These two secret communication technologies can
be used separately or together—for example, by first
encrypting a message, then hiding it in another file for
transmission. As the world becomes more anxious about the
use of any secret communication, and as regulations are
created by governments to limit uses of encryption,
steganography’s role is gaining prominence.
What Steganography essentially does is exploit human
perception, human senses are not trained to look for files
that have information hidden inside of them, although there
are programs available that can do what is called
Steganalysis (Detecting use of Steganography.)
Steganography hides the secreted message within the host data set
and presence imperceptible and is to be reliably communicated to a
8
receiver. The host data set is purposely corrupted, but in a covert
way, designed to be invisible to an information analysis.
9
1.2 Where Hidden Data hides?
It is possible to alter graphic or sound files
slightly without losing their overall viability for the
viewer and listener. With audio, you can use bits of
the file that contain sound not audible to the human
ear. With graphic images, you can remove redundant
bits of color from the image and still produce a
picture that looks intact to the human eye and is
difficult to discern from its original.
It is in those bits that stego hides its data. A
stego program uses an algorithm, to embed data in
an image or sound file, and a password scheme to
allow you to retrieve information.
1.3 What does the project do?
- Hiding the text message in audio or image file.
- Encryption of the same message, so as to
support more secure steganography.
- The decoding of the message, decryption and
source message retrieval are also supported.
2. Problem Statement:
Visit:
http://bit.ly/audio_javaproject
For Complete Project
3. Objective
The goal of steganography is to covert communication. So, a
fundamental requirement of this steganography system is that
the hider message carried by stego-media should not be sensible
to human beings.
The other goal of steganography is to avoid drawing
suspicion to the existence of a hidden message. This approach of
information hiding technique has recently became important in a
number of application area
This project has following objectives:
• To product security tool based on steganography
techniques.
• To explore techniques of hiding data using encryption
module of this project
• To extract techniques of getting secret data using
decryption module.
Steganography sometimes is used when encryption is not
permitted. Or, more commonly, steganography is used to
supplement encryption. An encrypted file may still hide
information using steganography, so even if the encrypted file
is deciphered, the hidden message is not seen.
4. Module Description
Home:
This page will have the home display of the software and it will
have the link to other modules also. Once the module is open it can
then link to the database and retrieve the settings from the database.
This module is also responsible to apply the settings on the other
modules. This module will have only database reading capabilities and
not writing.
Hide / Encrypt the data :
 Create a File using the Text editor : This module will be used
to create a file that will contain the Plaint text with no
formatting. Also the file created under this module will not be
saved in the system and can and will only be saved as a
Encrypted (Visual encryption) or will be concealed under an
image file.
 Import file: In this module we will be able to import a file from
the computer and that will be concealed under an image file.
Unhide / Decrypt the data:
 Import file: This module will have the ability to import file(s). It
will be able to decrypt, Unhide the file from the image file and it
will also be able to retrieve the message from the image files
generated by the encryption module using the Visual
Cryptography.
4.1 Interface Module Diagram :
PROJECT
ON
“ AUDIO STEGANOGRAPHY”
Visit:
http://bit.ly/audio_javaproject
For Complete Project
5. Behavioral Description for IMAGE
Steganography
Start Application
Encryption Decryption
Image file
BMP image file
Image Message
file
5. Behavioral Description for AUDIO
Steganography
USE CASE DIAGRAM
Visit:
http://bit.ly/audio_javaproject
For Complete Project
Send
Message
Audiofile
DeleteCreate
DecryptionEncryption
Create Delete
Audiofile
Receive
Message
6. Software Support
Operating system:
Windows or GNU/Linux
JDK (1.7) :
The Java Development Kit (JDK) is an implementation of
either one of the Java SE, Java EE or Java ME platforms released by
Oracle Corporation in the form of a binary product aimed at Java
developers on Solaris, Linux, Mac OS X or Windows.
Java is fast, secure, and reliable. I am using Java because of some
the most desirable features of Java. Some of those are list below-
 Security
 Portability
 Java Architecture
 Object-Oriented Robust
 JDBC (Java Database Connectivity)
Swing :
Swing, which is an extension library to the AWT, includes new
& improved components that enhance the look and functionality of
GUIs. Swing can be used to build Standalone swing GUI Applications as
well as Servlets and Applets. It employs model/view design
architecture. Swing is more portable and more flexible than AWT.
Swing is built on top of AWT and is entirely written in Java, using
AWT’s lightweight component support. The architecture of Swing
components makes it easy to customize both their appearance and
behavior.
7. LSB ALGORITHM for IMAGE
7.1 Implementation:
Structure of image files is that an image is created from pixels
that any pixel created from three colors ( red, green and blue
said RGB) each color of a pixel is one byte information that
shows the density of that color. Merging these three color makes
every color that we see in these pictures. We know that every
byte in computer science is created from 8 bit that first bit is
Most-Significant-Bit (MSB) and last bit Least-Significant-Bit
(LSB), the idea of using Steganography science is in this place;
we use LSB bit for writing our security information inside
pictures. So if we just use last layer (8st layar) of information, we
should change the last bit of pixels, in other hands we have 3 bits
in each pixel so we have 3*hight*width bits memory to write
our information. But before writing our data we must write
name of data(file), size of name of data & size of data. We can do
this by assigning some first bits of memory (8st layer).
7. LSB ALGORITHM for AUDIO
IS WORKS MOSTLY SIMILAR TO THE IMAGE STEGANOGRAPHY
Visit:
http://bit.ly/audio_javaproject
For Complete Project
8. (a) User Manual for
IMAGE STEGANOGRAPHY
The Embed stegonographic message box will
get opened where the message is to be
embedded
Then click on the OPEN tab.
Type the message to be embedded
Select the original image and than click to EMBED tab.
Than click to SAVE INTO NEW FILE tab .
Staganographed image get formed.
To decode steganographic image.
Select the open tab.
Select the steganographed image and click the DECODE
tab.
The decode message will displayed in
DECODED MESSAGE box.
Visit:
http://bit.ly/audio_javaproject
For Complete Project
8. (B) User Manual
AUDIO STEGANOGRAPHY
The Embed stegonographic message box will
get opened where the message is to be
embedded
Then click on the OPEN tab and give the file name which you
want to encode.
After giving the file type the message you want to encode
and then click the encode button
Visit:
http://bit.ly/audio_javaproject
For Complete Project
After giving the path of the file click on decode and
give the unique key for decryption
Hence you can see your MESSAGE.
9. Summary
Steganography is a really interesting subject and outside of the
mainstream cryptography and system administration that most
of us deal with day after day.
Steganography can be used for hidden communication. We have
explored the limits of steganography theory and practice. We
printed out the enhancement of the image steganography system
using LSB approach to provide a means of secure
communication. A stego-key has been applied to the system
during embedment of the message into the cover image.
This steganography application software provided for the
purpose to how to use any type of image formats to hiding any
type of files inside their. The master work of this application is in
supporting any type of pictures without need to convert to
bitmap, and lower limitation on file size to hide, because of
using maximum memory space in pictures to hide the file.
Steganography, like cryptography, will play an increasing role in
the future of secure communication in the “digital world”.
10. Bibliography
Books AND Whitepapers
1. T. Morkel Information and Computer Security
Architecture (ICSA) Research group
University of Pretoria, 0002, Pretoria,
South Africa
Visit:
http://bit.ly/audio_javaproject
For Complete Project

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project
Uttam Jain
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
ekta sharma
 

What's hot (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Stegnography
StegnographyStegnography
Stegnography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
steganography
steganographysteganography
steganography
 

Viewers also liked

Steganography
Steganography Steganography
Steganography
Uttam Jain
 

Viewers also liked (20)

Internet mail system java project
Internet mail system java projectInternet mail system java project
Internet mail system java project
 
Captcha making and solving java project
Captcha making and solving java projectCaptcha making and solving java project
Captcha making and solving java project
 
Bug Tracking Java Project
Bug Tracking Java ProjectBug Tracking Java Project
Bug Tracking Java Project
 
Human Resource Management System Java Project
Human Resource Management System Java ProjectHuman Resource Management System Java Project
Human Resource Management System Java Project
 
Banking java project
Banking java projectBanking java project
Banking java project
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Online shopping ecommerce java project
Online shopping ecommerce java projectOnline shopping ecommerce java project
Online shopping ecommerce java project
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
my project on Banking [ grade - 8]
my project on Banking [ grade - 8]my project on Banking [ grade - 8]
my project on Banking [ grade - 8]
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Edmonton April Advanced Notice
Edmonton April Advanced NoticeEdmonton April Advanced Notice
Edmonton April Advanced Notice
 
Técnicas e Instrumentos de Recolección de Datos.
Técnicas e Instrumentos de Recolección de Datos.Técnicas e Instrumentos de Recolección de Datos.
Técnicas e Instrumentos de Recolección de Datos.
 
Harborview Medical Center Cross Cultural Communication
Harborview Medical Center Cross Cultural CommunicationHarborview Medical Center Cross Cultural Communication
Harborview Medical Center Cross Cultural Communication
 
Thanks
ThanksThanks
Thanks
 
PerspectivES17
PerspectivES17PerspectivES17
PerspectivES17
 
Las claves que marcan los desfiles de alta costura
Las claves que marcan los desfiles de alta costuraLas claves que marcan los desfiles de alta costura
Las claves que marcan los desfiles de alta costura
 
Influencia de los temperamentos en el liderazgo
Influencia de los temperamentos en el liderazgoInfluencia de los temperamentos en el liderazgo
Influencia de los temperamentos en el liderazgo
 
Steganography
Steganography Steganography
Steganography
 
Actividad de maria camejo
Actividad de maria camejoActividad de maria camejo
Actividad de maria camejo
 

Similar to Audio Steganography java project

Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
IJRAT
 

Similar to Audio Steganography java project (20)

Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 
Stegnography synopsis
Stegnography synopsisStegnography synopsis
Stegnography synopsis
 
1.pdf
1.pdf1.pdf
1.pdf
 
HACKING
HACKINGHACKING
HACKING
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Data Security Using Steganography
Data Security Using Steganography Data Security Using Steganography
Data Security Using Steganography
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Multimedia
MultimediaMultimedia
Multimedia
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Steganoid - A tool for steganography
Steganoid - A tool for steganographySteganoid - A tool for steganography
Steganoid - A tool for steganography
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 

Recently uploaded (20)

Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Audio Steganography java project

  • 2. 2 INSTITUTE OF ENGINEERING & TECHNOLOGY, qqqqqqqqqqqq UNIVERSITY CERTIFICATE This is to certify that the project report entitled “STEGANOGRAPHY” is a bonafide record of the project work done by the students: In partial fulfillment of the requirement for the 6th semester of COMPUTER SCIENCE & ENGINEERING in Institute of Engineering Technology, qqqqqqqq University ,
  • 3. 3 ACKNOWLEDGEMENT This Project itself is an acknowledgment to the inspiration, drive and technical assistance contributed by many individuals. This project would have never seen the light of this day without the help and guidance I have received. I express my gratitude to xxxxxxxxxx, Head, Department of Computer Science & Engineering, Institute of Engineering & Technology, Bundelkhand University , Jhansi , for providing me with excellent infrastructure and awesome environment that laid the potentially strong foundation for my professional life. I own an incalculable debt of my all staffs of Department of Computer Science & Engineering for their direct and indirect help. I extend my heartfelt thanks to my parents, teacher, friends, and well-wishers for their support and timely help.
  • 4. 4 DECLARATION I hereby declare that the project work entitled “STEGANOGRAPHY” Is submitted in partial fulfillment of the requirements for the 6th semester. B.Tech (Computer Science & Engineering ) and it is a report of the original work done by me during the period of February – May in
  • 5. 5 Place: Jhansi Date: --------------- CONTENTS Chapter no Name Page No 1 Steganography at Large 1.1 Introduction 1.2 Where hidden data hides 1.3 What does the project do 7 2 Problem Statement 9 3 Objective 10 4 Module Description 4.1 Interface Module Diagram 4.2Data Flow Diagram 11 5 Behavioral Description 5.1 image 5.2 audio 14 6 Software Support 6.1 Technical details 17 7 LSB Algorithm 7.1 Implementation 18 8 User Manual A. Image Steganography B. Audio Steganography 20 9 Summary 28
  • 6. 6 10 Bibliography 29 Abstract Steganography is the art of hiding the fact that Visit: http://bit.ly/audio_javaproject For Complete Project
  • 7. 7 1. Steganography at Large 1.1 Introduction Steganography derives from the Greek word steganos, meaning covered or secret, and graph (writing or drawing). On the simplest level, steganography is hidden writing, whether it consists of invisible ink on paper or copyright information hidden in an audio or image file. Where cryptography scrambles a message into a code to obscure its meaning, steganography hides the message entirely. These two secret communication technologies can be used separately or together—for example, by first encrypting a message, then hiding it in another file for transmission. As the world becomes more anxious about the use of any secret communication, and as regulations are created by governments to limit uses of encryption, steganography’s role is gaining prominence. What Steganography essentially does is exploit human perception, human senses are not trained to look for files that have information hidden inside of them, although there are programs available that can do what is called Steganalysis (Detecting use of Steganography.) Steganography hides the secreted message within the host data set and presence imperceptible and is to be reliably communicated to a
  • 8. 8 receiver. The host data set is purposely corrupted, but in a covert way, designed to be invisible to an information analysis.
  • 9. 9 1.2 Where Hidden Data hides? It is possible to alter graphic or sound files slightly without losing their overall viability for the viewer and listener. With audio, you can use bits of the file that contain sound not audible to the human ear. With graphic images, you can remove redundant bits of color from the image and still produce a picture that looks intact to the human eye and is difficult to discern from its original. It is in those bits that stego hides its data. A stego program uses an algorithm, to embed data in an image or sound file, and a password scheme to allow you to retrieve information. 1.3 What does the project do? - Hiding the text message in audio or image file. - Encryption of the same message, so as to support more secure steganography. - The decoding of the message, decryption and source message retrieval are also supported.
  • 11. 3. Objective The goal of steganography is to covert communication. So, a fundamental requirement of this steganography system is that the hider message carried by stego-media should not be sensible to human beings. The other goal of steganography is to avoid drawing suspicion to the existence of a hidden message. This approach of information hiding technique has recently became important in a number of application area This project has following objectives: • To product security tool based on steganography techniques. • To explore techniques of hiding data using encryption module of this project • To extract techniques of getting secret data using decryption module. Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
  • 12. 4. Module Description Home: This page will have the home display of the software and it will have the link to other modules also. Once the module is open it can then link to the database and retrieve the settings from the database. This module is also responsible to apply the settings on the other modules. This module will have only database reading capabilities and not writing. Hide / Encrypt the data :  Create a File using the Text editor : This module will be used to create a file that will contain the Plaint text with no formatting. Also the file created under this module will not be saved in the system and can and will only be saved as a Encrypted (Visual encryption) or will be concealed under an image file.  Import file: In this module we will be able to import a file from the computer and that will be concealed under an image file. Unhide / Decrypt the data:  Import file: This module will have the ability to import file(s). It will be able to decrypt, Unhide the file from the image file and it will also be able to retrieve the message from the image files generated by the encryption module using the Visual Cryptography.
  • 13. 4.1 Interface Module Diagram :
  • 15. 5. Behavioral Description for IMAGE Steganography Start Application Encryption Decryption Image file BMP image file Image Message file
  • 16. 5. Behavioral Description for AUDIO Steganography USE CASE DIAGRAM Visit: http://bit.ly/audio_javaproject For Complete Project
  • 18. Operating system: Windows or GNU/Linux JDK (1.7) : The Java Development Kit (JDK) is an implementation of either one of the Java SE, Java EE or Java ME platforms released by Oracle Corporation in the form of a binary product aimed at Java developers on Solaris, Linux, Mac OS X or Windows. Java is fast, secure, and reliable. I am using Java because of some the most desirable features of Java. Some of those are list below-  Security  Portability  Java Architecture  Object-Oriented Robust  JDBC (Java Database Connectivity) Swing : Swing, which is an extension library to the AWT, includes new & improved components that enhance the look and functionality of GUIs. Swing can be used to build Standalone swing GUI Applications as well as Servlets and Applets. It employs model/view design architecture. Swing is more portable and more flexible than AWT. Swing is built on top of AWT and is entirely written in Java, using AWT’s lightweight component support. The architecture of Swing components makes it easy to customize both their appearance and behavior.
  • 19. 7. LSB ALGORITHM for IMAGE 7.1 Implementation: Structure of image files is that an image is created from pixels that any pixel created from three colors ( red, green and blue said RGB) each color of a pixel is one byte information that shows the density of that color. Merging these three color makes every color that we see in these pictures. We know that every byte in computer science is created from 8 bit that first bit is Most-Significant-Bit (MSB) and last bit Least-Significant-Bit (LSB), the idea of using Steganography science is in this place; we use LSB bit for writing our security information inside pictures. So if we just use last layer (8st layar) of information, we should change the last bit of pixels, in other hands we have 3 bits in each pixel so we have 3*hight*width bits memory to write our information. But before writing our data we must write name of data(file), size of name of data & size of data. We can do this by assigning some first bits of memory (8st layer).
  • 20. 7. LSB ALGORITHM for AUDIO IS WORKS MOSTLY SIMILAR TO THE IMAGE STEGANOGRAPHY Visit: http://bit.ly/audio_javaproject For Complete Project
  • 21. 8. (a) User Manual for IMAGE STEGANOGRAPHY The Embed stegonographic message box will get opened where the message is to be embedded
  • 22. Then click on the OPEN tab. Type the message to be embedded
  • 23. Select the original image and than click to EMBED tab. Than click to SAVE INTO NEW FILE tab . Staganographed image get formed. To decode steganographic image. Select the open tab.
  • 24. Select the steganographed image and click the DECODE tab. The decode message will displayed in DECODED MESSAGE box. Visit:
  • 25. http://bit.ly/audio_javaproject For Complete Project 8. (B) User Manual AUDIO STEGANOGRAPHY The Embed stegonographic message box will get opened where the message is to be embedded
  • 26. Then click on the OPEN tab and give the file name which you want to encode.
  • 27. After giving the file type the message you want to encode and then click the encode button
  • 28. Visit: http://bit.ly/audio_javaproject For Complete Project After giving the path of the file click on decode and give the unique key for decryption
  • 29. Hence you can see your MESSAGE. 9. Summary Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day.
  • 30. Steganography can be used for hidden communication. We have explored the limits of steganography theory and practice. We printed out the enhancement of the image steganography system using LSB approach to provide a means of secure communication. A stego-key has been applied to the system during embedment of the message into the cover image. This steganography application software provided for the purpose to how to use any type of image formats to hiding any type of files inside their. The master work of this application is in supporting any type of pictures without need to convert to bitmap, and lower limitation on file size to hide, because of using maximum memory space in pictures to hide the file. Steganography, like cryptography, will play an increasing role in the future of secure communication in the “digital world”. 10. Bibliography Books AND Whitepapers 1. T. Morkel Information and Computer Security Architecture (ICSA) Research group University of Pretoria, 0002, Pretoria, South Africa