IMAGE STEGANOGRAPHY
A ProjectSubmitted in partial fulfillment of the requirements
for the award of the Degree of
INTEGRATED MASTEROF COMPUTER APPLICATIONS
BY
ABHISHEK KUMAR PIYUSH(IMCA/4502/12)
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERINGBIRLA INSTITUTE OF
TECHNOLOGYMESRA-835215, RANCHI2015
Contents
1. Introduction
1.1 Introduction...41.2 Purpose..........51.3 Scope of the
Project...5
2. Over All Description of Project
2.1 Over all Description of Project.7-9
3. System Requirement
4.1 Hardware Requirement.11 4.2 Software Requirement..11
4. System Design
4.1 Data Flow Diagram..........13 4.1.1 Zero Level
DFD...........13 4.1.2 First Level DFD...13 4.1.3 Second Level
DFD...134.2 Use Case Diagram.14
5. Reference.16
Chapter 1Introduction
1.1 IntroductionSteganography is the process of hiding a secret
message within a larger one in such a way that someone cannot know
the presence or contents of the hidden message. In this an
encrypted message may draw suspicion while hidden messages will
not. It is the art of passing information through original files in
a manner that the existence of the message is unknown. The term
Steganography is arrived from Greek word means, Covered writing.
The files can be referred to as cover text, cover image, or cover
audio etc. After embedding the secret message it is referred to as
Stego-medium. While cryptography is about protecting the content of
messages (their meaning), steganography is about hiding the message
so that intermediate persons cannot see the message. Steganography
refers to information or a file that has been concealed inside a
digital Picture, Video or Audio file. Examples of historical usage
include: Hidden messages in Wax tablets: In ancient Greece, people
wrote messages on the wood, and then covered it with wax so that it
looked like an ordinary, unused, tablet. Hidden messages on
messenger's body: Also in ancient Greece. Herodotus tells the story
of a message tattooed on a slave's shaved head, covered by hair
regrowth, and exposed by reshaving. Hidden messages on paper
written in secure inks under other messages or on the blank parts
of other messages. During and after World War II, Espionage agents
used microdots to send information back and forth. Since the dots
were typically extremely small the size of a period produced by a
Typewriter (perhaps in a font with 10 or 12 characters per inch) or
even smaller -- the stegotext was whatever the dot was hidden
within. If a letter or an address, it was some alphabetic
characters. If under a postage stamp, it was the presence of the
stamp.
1.2 Purpose The main objective of this project is to provide a
highly secured communication between people. This project first
encrypts the secret message into image format. This will ensure
higher security. It the art of concealing the existence of the
information. 1.3 Scope of the project1. The project will be using
Windows as the platform and Java as the programming language. 2.
All the operations will take place on JPEG image format.3. The
project can be scaled to be used on various platforms such as UNIX
and its variants, different windows variant etc.4. With the boost
in computer power, the internet and with the development of digital
signal processing (DSP), information theory and coding theory,
steganography has gone digital.5. In the realm of this digital
world, steganography has created an atmosphere of corporate
vigilance that has spawned various interesting applications, thus
its continuing evolution is guaranteed. 6. Cyber-crime is believed
to benefit from this digital revolution.7. Hence an immediate
concern is to find out best possible attacks to carry out
steganalysis.8. We can simultaneously, finding out techniques to
strengthen existing steganography techniques against popular
attacks like steganalysis.9. Copyright information can be
stored.
Chapter 2Overall description of the project
2.1 Overall Description of the ProjectIn this a data hiding
method process is proposed. The image quality of the stegnographed
image shows the effectiveness of the proposed method. The results
obtained also show significant image quality. A good balance
between the security and the image quality is achieved. The
algorithm is usage for both 8 bit and 24 bit image of the same size
of cover and secret image, so it is easy to be implementing in
color image. Benefited from the effective optimization, a good
balance between the security and the image quality is achieved. The
program works well with JPEG, text format.An image contains lots of
information which we cant understand and watch easily. In this
process of steganography the bits of original message is replaced
by the bits of cover image. This time the secret message is
converting in to cover image by replacing the bits of original
message. This conversion of secret message into cover image follows
the RGB color combination. The color of RGB is consists of 24 bits,
in which each color is consists of 8 bits or 1 byte. These colors
are placed in manner in which first eight bits for red color second
eight bits for green color and last eight bits for blue color. Left
most bits represent the red color, next eight bits represent the
green color and next eight bits represent the blue color. First of
all message is converting into binary form. The concept of
steganography is to replace the near most message value by cover
image bits value since all are represented in the binary.
Original Image
Stegnographed Image
Chapter 3System Requirements
3.1 Hardware requirement The minimum hardware requirements are:-
Intel processor Minimum 2 GB RAM Minimum 250 GB HD
3.2 Software requirement The minimum software requirements are:-
Microsoft window xp Java runtime environment
Chapter 4System Design
4.1 Data flow diagram
0 Level DFD
1 Level DFD
2 Level DFD
4.2 Use case diagram
Chapter 5References
5.1 References5.1.1
http://en.wikipedia.org/wiki/Steganography5.1.2
http://vanilla47.com/PDFs/Cryptography/Steganography5.1.3
www.slideshare.net5.1.4
http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageSteganography.pdf
7