Top Banner
Security System Using Steganography
28

Data Security Using Steganography

Dec 17, 2014

Download

Engineering

Nidhin Raj

While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data Security Using Steganography

Security System UsingSteganography

Page 2: Data Security Using Steganography

Introduction

While transferring a file from one point to another through Intranet and Internet we need more file secure concepts.

Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself.

This project helps to send a file from one place to another in a secured manner

Page 3: Data Security Using Steganography

Objective

The main objective of this project is SECURITY during file transmission

from one end to another end both in Internet and private network. The main

concept of Steganography, i.e. Encrypt a file and hide it in another media to

invisible it, is maintained by our project such that our target file will be

encrypted and embedded into an audio or video file then the resultant video

file is send through the network. The front-end screen of this software will be

designed in Java using Swing Concepts.

Page 4: Data Security Using Steganography

Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual.

Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect important information.

Steganography comes from the Greek words Steganós (Covered) and Graptos (Writing).

Steganography

Page 5: Data Security Using Steganography

The art of detecting Steganography is referred to as Steganalysis.

Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it.

To put it simply Steganalysis involves detecting the use of Steganography inside of a file.

The most common use of Steganography is to hide a file inside another file.

There are many methods that can be used to detect Steganography.

Page 6: Data Security Using Steganography

Existing System

For Transmitting a file from one point to another many of us are using Encryption only.

This will not give that much of security.

While using Steganography for embedding a source file to an another media they are

using watermark embedding. It is also have its own disadvantages. The resultant file of

this techniques will be change from the source file. Watermark embedding is easily

decrypted by the hackers.

Encryption and Embedding only is not give that much of security to our communication.

Page 7: Data Security Using Steganography

Proposed System

In our system we are not following the regular encryption, decryption techniques.

We are Introducing a new algorithm Bit-Shift in Random Cycle Order. I.e. totally 4

different types of Bit-Shift algorithms are used randomly to encrypt the data

This Encryption is embedded into an Audio or Video File.

Again It will be embedded into another media. This double embedding increases the level

of security.

Password Protection of this entire works give an additional security.  

Page 8: Data Security Using Steganography

Technologies overview

This project helps to send a file from one place to another in a secured manner.

Firstly the target file is encrypted using an algorithm called Bit Shifting.

The Encrypted file is embedded into an audio file.

The resultant file will be embedded into a video file.

The video file and the whole thing is protected by a password and sent through net.

Page 9: Data Security Using Steganography

Modules

 

Connection manager Module Merger Module Extractor Module Result window Module

Page 10: Data Security Using Steganography

Merger Module

This Module is front end module and it is designed using

swing. This module gets the inputs from sender. The inputs are

Audio/ video, Image/Text and secret message file with password.

Then merge the all requirements and then send to receiver.

Page 11: Data Security Using Steganography

Connection manager Module

The merged file can send from sender or

server to receiver. The UDP protocol can be use

for that networking process.

Page 12: Data Security Using Steganography

Extractor Module

This module gets the merged file after a

password verification. Then extract the merged

file and call the result window module to open

extracted file.

Page 13: Data Security Using Steganography

Result window Module

This module displays the original secret file

and covered Audio/Video file .

Page 14: Data Security Using Steganography

Architecture for Encoding - Transmission

Page 15: Data Security Using Steganography

Steganography-Transmission Flow

Page 16: Data Security Using Steganography

Architecture for Decoding - Reception

Page 17: Data Security Using Steganography

Steganography - Reception Flow

Page 18: Data Security Using Steganography

Hardware Requirements

CPU - PENTIUM III PROCESSOR

HARD DISK SPACE - 40 GB

DISPLAY - 15” COLOR MONITOR

MAIN MEMORY - 256 MB

KEYBOARD - 104 KEYS

CLOCK-SPEED - 2.6 GHZ

MONITOR - 15 ″ SVGA COLOR

Page 19: Data Security Using Steganography

Software Requirements

OPERATING SYSTEM - WINDOWS NT/XPBACKEND - MS SQL SERVER 2000FRONT END - JAVA (jdk1.6)

Page 20: Data Security Using Steganography

Merger

Page 21: Data Security Using Steganography

Audio File Select

Page 22: Data Security Using Steganography

Video File Select

Page 23: Data Security Using Steganography

Text File Select

Page 24: Data Security Using Steganography

File Embedding

Page 25: Data Security Using Steganography

Client Embedded File Received

Page 26: Data Security Using Steganography

Type Password For Encrypted File

Page 27: Data Security Using Steganography

Encrypted File Displayed

Page 28: Data Security Using Steganography

QUERIES………