Top Banner
IMAGE STEGANOGRAPHY A Project Submitted in partial fulfillment of the requirements for the award of the Degree of INTEGRATED MASTEROF COMPUTER APPLICATIONS BY ABHISHEK KUMAR PIYUSH (IMCA/4502/12) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING BIRLA INSTITUTE OF TECHNOLOGY MESRA-835215, RANCHI 2015 1
19

Image Steganography

Oct 03, 2015

Download

Documents

Harsh Ghuriani

Steganography
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

IMAGE STEGANOGRAPHY

A ProjectSubmitted in partial fulfillment of the requirements for the award of the Degree of

INTEGRATED MASTEROF COMPUTER APPLICATIONS

BY

ABHISHEK KUMAR PIYUSH(IMCA/4502/12)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERINGBIRLA INSTITUTE OF TECHNOLOGYMESRA-835215, RANCHI2015

Contents

1. Introduction

1.1 Introduction...41.2 Purpose..........51.3 Scope of the Project...5

2. Over All Description of Project

2.1 Over all Description of Project.7-9

3. System Requirement

4.1 Hardware Requirement.11 4.2 Software Requirement..11

4. System Design

4.1 Data Flow Diagram..........13 4.1.1 Zero Level DFD...........13 4.1.2 First Level DFD...13 4.1.3 Second Level DFD...134.2 Use Case Diagram.14

5. Reference.16

Chapter 1Introduction

1.1 IntroductionSteganography is the process of hiding a secret message within a larger one in such a way that someone cannot know the presence or contents of the hidden message. In this an encrypted message may draw suspicion while hidden messages will not. It is the art of passing information through original files in a manner that the existence of the message is unknown. The term Steganography is arrived from Greek word means, Covered writing. The files can be referred to as cover text, cover image, or cover audio etc. After embedding the secret message it is referred to as Stego-medium. While cryptography is about protecting the content of messages (their meaning), steganography is about hiding the message so that intermediate persons cannot see the message. Steganography refers to information or a file that has been concealed inside a digital Picture, Video or Audio file. Examples of historical usage include: Hidden messages in Wax tablets: In ancient Greece, people wrote messages on the wood, and then covered it with wax so that it looked like an ordinary, unused, tablet. Hidden messages on messenger's body: Also in ancient Greece. Herodotus tells the story of a message tattooed on a slave's shaved head, covered by hair regrowth, and exposed by reshaving. Hidden messages on paper written in secure inks under other messages or on the blank parts of other messages. During and after World War II, Espionage agents used microdots to send information back and forth. Since the dots were typically extremely small the size of a period produced by a Typewriter (perhaps in a font with 10 or 12 characters per inch) or even smaller -- the stegotext was whatever the dot was hidden within. If a letter or an address, it was some alphabetic characters. If under a postage stamp, it was the presence of the stamp.

1.2 Purpose The main objective of this project is to provide a highly secured communication between people. This project first encrypts the secret message into image format. This will ensure higher security. It the art of concealing the existence of the information. 1.3 Scope of the project1. The project will be using Windows as the platform and Java as the programming language. 2. All the operations will take place on JPEG image format.3. The project can be scaled to be used on various platforms such as UNIX and its variants, different windows variant etc.4. With the boost in computer power, the internet and with the development of digital signal processing (DSP), information theory and coding theory, steganography has gone digital.5. In the realm of this digital world, steganography has created an atmosphere of corporate vigilance that has spawned various interesting applications, thus its continuing evolution is guaranteed. 6. Cyber-crime is believed to benefit from this digital revolution.7. Hence an immediate concern is to find out best possible attacks to carry out steganalysis.8. We can simultaneously, finding out techniques to strengthen existing steganography techniques against popular attacks like steganalysis.9. Copyright information can be stored.

Chapter 2Overall description of the project

2.1 Overall Description of the ProjectIn this a data hiding method process is proposed. The image quality of the stegnographed image shows the effectiveness of the proposed method. The results obtained also show significant image quality. A good balance between the security and the image quality is achieved. The algorithm is usage for both 8 bit and 24 bit image of the same size of cover and secret image, so it is easy to be implementing in color image. Benefited from the effective optimization, a good balance between the security and the image quality is achieved. The program works well with JPEG, text format.An image contains lots of information which we cant understand and watch easily. In this process of steganography the bits of original message is replaced by the bits of cover image. This time the secret message is converting in to cover image by replacing the bits of original message. This conversion of secret message into cover image follows the RGB color combination. The color of RGB is consists of 24 bits, in which each color is consists of 8 bits or 1 byte. These colors are placed in manner in which first eight bits for red color second eight bits for green color and last eight bits for blue color. Left most bits represent the red color, next eight bits represent the green color and next eight bits represent the blue color. First of all message is converting into binary form. The concept of steganography is to replace the near most message value by cover image bits value since all are represented in the binary.

Original Image

Stegnographed Image

Chapter 3System Requirements

3.1 Hardware requirement The minimum hardware requirements are:- Intel processor Minimum 2 GB RAM Minimum 250 GB HD

3.2 Software requirement The minimum software requirements are:- Microsoft window xp Java runtime environment

Chapter 4System Design

4.1 Data flow diagram

0 Level DFD

1 Level DFD

2 Level DFD

4.2 Use case diagram

Chapter 5References

5.1 References5.1.1 http://en.wikipedia.org/wiki/Steganography5.1.2 http://vanilla47.com/PDFs/Cryptography/Steganography5.1.3 www.slideshare.net5.1.4 http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageSteganography.pdf

7