LightBlog
Contact at mumbai.academics@gmail.com or 8097636691/9323040215
Responsive Ads Here

Friday, 2 February 2018

Digital Steganography


Digital Steganography



ABSTRACT
The system deals with security during transmission of data. Commonly used technologies are Cryptography. This system deals with implementing security using Steganography. In this end user identifies an image which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent. The image if hacked or interpreted by a third party user will open up in any image previewed but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image.
STEGANOGRAPHY
Steganography is not actually a method of encrypting messages, but hiding them within something else to enable them to pass undetected. Traditionally this was achieved with invisible ink, microfilm or taking the first letter from each word of a message. This is now achieved by hiding the message within a graphics or sound file. For instance in a 256-greyscale image, if the least significant bit of each byte is replaced with a bit from the message then the result will be indistinguishable to the human eye. An eavesdropper will not even realize a message is being sent. This is not Cryptography however, and although it would fool a human, a computer would be able to detect this very quickly and reproduce the original message.
In the case of using this technique of hiding the data with an image file, the visibility of the image, resolution or clarity is not being affected. The hidden data can be of length in size. To the Hacker, only the image is make going to be visible when previewed and not a trace of the hidden data.
If the image file is opened across a text editor, then also the data is not going to be visible as the information is stored in an Encryption form, which is also binary. Hence making it difficult for the enclosure to differentiate the data to the image file.
ABOUT PROJECT
The system deals with security during transmission of data. Commonly used technologies are Cryptography. This system deals with implementing security using Steganography. In this the end user identifies an image, which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent.
The image if hacked or interpreted by a third party user will open up in any image previewed but not displaying the data. This protects the data from being invisible and hence be secure during transmission.
The user in the receiving end uses another piece of code to retrieve the data from the image.
EXISTING SYSTEM:
In today’s dynamic and information rich environment, information systems have become vital for any organization to survive. With the increase in the dependence of the organization on the information system, there exists an opportunity for the competitive organizations and disruptive forces to gain access to other organizations information system. This hostile environment makes information systems security issues critical to an organization. Current information security literature either focuses on unreliable information by describing the information security attacks taking place in the world or it comprises of the technical literature describing the types of security threats and the possible security systems.
 In order to secure the transmission of data, Cryptography has to be implemented. Cryptography is the science of devising methods that allow information to be sent in a secure form in such a way that the only person able to retrieve this information is intended recipient.
The basic principle is this: A message being sent is known as plaintext. The message is then coded using a Cryptographic Algorithm. This process is called Encryption, an Encrypted message is known as Cipher Text, and is turned back into plaintext by the process of decryption. Encryption can be done using Symmetric or Asymmetric Algorithms. In Symmetric algorithms, only one key is used both to encrypt and decrypt the message. In Asymmetric Algorithms, a key used to encrypt a message is different from the key that is used to decrypt the message. There are several algorithms present in the market for Cryptography.  Some of the commonly used once are IDEA and RSA that involves Asymmetric or Symmetric methods and also involves private and public keys.
PROPOSED SYSTEM:
The algorithms present in the existing system was some what complicated.  In Cryptography, the meaning of data has been changed. So, it makes intention to the hacker to hack or destroy the data. In our proposed system, we implement a new technology called Steganography for Network security. It not only change the meaning of data but also hides the presence of data from the hackers.
Module Description:
This project contains five modules. They are:
Ø  User Interface Module
Ø  Encryption and Decryption Module
     §  Uses Tiny Algorithm to Encrypt  the Passwords
Ø  CRC Generation  and Verification Module
      §  CRC Generation is done at the time of embedding.
      §  CRC Generation is done at the time of deembedding.
Ø  Compression  and Decompression  Module
       §  Uses Gzip Algorithm
Ø  Embedding and  Deembedding Module
        §  Uses Steganography Algorithm
Ø  Communication Manager(Send File) Module
       §  Socket Communication is established to send the data
Graphical User Interface:
This project is developed using graphics in Java Swings. The options available are displayed in a menu format, like in an online editor. Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed, listing all the options available under that menu item and the user can select the needed actions according to their wish
Encryption and Decryption:
This technique maps arbitrary input into printable character output.  The form of encoding has the following relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites, not a specific Binary Encoding of that character set. Thus, the characters themselves can be encoded into whatever form is needed by a specific system. For instance, the character 'E' is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal- c5.
CRC Generation and Verification:
Its purpose is to protect programs (in which supporting code is linked) with one of the most effective weapons against computer viruses: the Cyclic Redundancy Check ( CRC ). 
There are many utilities that perform CRC checks on other but most of these are external programs that are usually run only once, if at all.  The CRC generated by these utilities must be compared to a value in an external file; if the values match, the program is not infected.
Compress and Decompress Module:
 This utility provides the facility of compressing text files. It accepts the text file name from the user and compresses it with a ratio about 15%. The compressed file will have the same name of the text file with the .CMP extension. The package simulates the compression process with the help of progress bar and gives the detailed report about the compression (i.e., Source file name, Destination file name, sizes, compression ratios etc.,)
Data Embed and DeEmbed:
This module deals with identifying the Data and the Image to embed the data into the Image before it can be transmitted. This is followed after Compression to increase the rate of transfer of files between the networks.
The module opens by prompting the user to identify the file that need to be transmitted across the network. The file is then selected using the GUI interface provided through JAVA. The module then prompts to identify the Image File, which needs to hide the data file. The developed system will provide support to select and embed data into .bmp & .jpeg files. The selected Image File is then previewed before it can hide the data. The data is then Embedded into the Image File in such a way that the Image File is not corrupted; at the same time the data is secure. The image if hacked or interrupted by a third party can be viewed in any browser without actually displaying the data. The data on the receiver’s end is isolated and removed from the image.
Hardware Requirements:
Processor                     :         Pentium IV with 800 MHz Clock     Speed
RAM                                 :        256MB
Hard Disk Capacity       :       20GB
Network Interface Card:      32-Bit PCI Ethernet Card
SOFTWARE REQUIREMENTS
Operating System       :         Windows NT/2000 (Client/Server).
Software requirements
Front-end       :           Java JDK 1.6, Swings.
Back-end        :           Oracle 9i/10g

No comments:

Post a Comment