Top Banner

Click here to load reader

IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS

Apr 21, 2017

ReportDownload

Engineering

  • 1

    MINI PROJECT

    ON

    STEGANOGRAPHY

    Submitted to CS Department, Institute of Engineering and

    Technology,Bundelkhand University,Jhansi,For the fulfilment of the degree of

    B.Tech(Computer Science &Engineering)

    INSTITUTE OF ENGINEERING & TECHNOLOGY

    (Vth SEM-2015-2016)

    Er.B.B.Niranjan Er.Vijay Kumar Verma

    Lecturer Head of Department

    Computer Sc.& Engg. Dept. Computer Sc.& Engg. Dept

    IET,BU,JHANSI(UP) IET,BU,JHANSI(UP)

    Er.Vijay Kumar Verma 1.SHIVAM PORWAL(131234040048)

    (Mini Project Incharge) 2.NIKITA BISWAS (131234040028)

    Computer Sc.& Engg. Dept. 3.NIHAL RAWAT (131234040027)

    IET,BU,JHANSI(UP) 4. KUSHAL SINGH (131234040021)

  • 2

    INSTITUTE OF ENGINEERING & TECHNOLOGY,

    BUNDELKHAND UNIVERSITY,JHANSI

    CERTIFICATE

    This is to certify that the project report entitled IMAGE

    STEGANOGRAPHYis a bonafide record of the project work done

    by the students:

    1.SHIVAM PORWAL (131234040048)

    2.NIKITA BISWAS (131234040028)

    3.NIHAL RAWAT (131234040027)

    4. KUSHAL S. KUSHWAHA (131234040021)

    In partial fulfilment of the requirement for the 5th semester of

    COMPUTER SCIENCE & ENGINEERING in Institute of Engineering Technology,

    Bundelkhand University ,Jhansi.

    Er.Vijay Kumar Verma Er.B.B.Niranjan

    (Mini Project Incharge) (Mini Project Guide)

    Computer Sc.& Engg. Dept. Computer Sc.& Engg.

    Dept

    IET,BU,JHANSI(UP) IET,BU,JHANSI(UP)

  • 3

    ACKNOWLEDGEMENT

    This Project itself is an acknowledgement to the

    inspiration, drive and technical assistance contributed by many

    individuals. This project would have never seen the light of this

    day without the help and guidance I have received.

    I express my gratitude to Er. Vijay Kumar Verma ,

    Head, Department of Computer Science & Engineering, Institute

    of Engineering & Technology, Bundelkhand University ,Jhansi ,

    for providing me with excellent infrastructure and awesome

    environment that laid potentially strong foundation for my

    professional life .

    I own an incalculable debt of my all staffs of

    Department of Computer Science & Engineering for their direct

    and indirect help.

    I extend my heartfelt thanks to my parents, teacher,

    friends, and well-wishers for their support and timely help.

    Shivam porwal(131234040048) Nikita Biswas(131234040028)

    Nihal Rawat(131234040027) Kushal S.Kushwaha(131234040021)

  • 4

    DECLARATION

    I hereby declare that the project work entitled STEGANOGRAPHY

    Is submitted in partial fulfilment of the requirements for

    the 5th semester

    B.Tech(Computer Science & Engineering) and it is a

    report of the original work done by me during the period

    of July December in Institute of Engineering &

    Technology, Bundelkhand University, Jhansi.

    Shivam porwal(131234040048) Nikita Biswas (131234040028)

    Nihal Rawat (131234040027) Kushal Singh kushwaha(131234040021)

    Place: Jhansi

    Date: ---------------

  • 5

    CONTENTS

    Chapter no Name Page No

    1 Steganography at

    Large

    1.1 Introduction 1.2 Where hidden data

    hides

    1.3 What does the project do

    7

    2 Problem Statement 10

    3 Objective 11

    4 Module Description

    4.1 Interface Module

    Diagram

    4.2Data Flow Diagram

    12

    5 Software Support

    5.1 Technical details

    15

    6 Image Steganography

    6.1 Implementation

    6.2 Encoding process

    6.3 Decoding process

    16

    7 LSB Algorithm

    6.1 Implementation

    18

    8 User Manual 20

    9 Summary 25

    10 Bibliography 26

  • 6

    Abstract

    Steganography is the art of hiding the fact that

    communication is taking place, by hiding

    information in other information. Many different

    carrier file formats can be used, but digital images

    are the most popular because of their frequency on

    the Internet. For hiding secret information in

    images, there exists a large variety of stenographic

    techniques some are more complex than others and

    all of them have respective strong and weak points.

    Different applications have different requirements

    of the steganography technique used. For example,

    some applications may require absolute invisibility

    of the secret information, while others require a

    larger secret message to be hidden. This project

    intends to give an overview of image steganography,

    its uses and techniques. It also supports

    steganography in Audio files. For a more secure

    approach, the project encrypts the message using

    secret key and then sends it to the receiver. The

    receiver then decrypts the message to get the

    original one.

  • 7

    1. Steganography at Large

    1.1 Introduction

    Steganography derives from the Greek word steganos,

    meaning covered or secret, and graphy (writing or drawing).

    On the simplest level, steganography is hidden writing,

    whether it consists of invisible ink on paper or copyright

    information hidden in an audio file.

    Where cryptography scrambles a message into a code to

    obscure its meaning, steganography hides the message

    entirely. These two secret communication technologies can

    be used separately or togetherfor example, by first

    encrypting a message, then hiding it in another file for

    transmission. As the world becomes more anxious about the

    use of any secret communication, and as regulations are

    created by governments to limit uses of encryption,

    steganographys role is gaining prominence.

    What Steganography essentially does is exploit human

    perception, human senses are not trained to look for files

    that have information hidden inside of them, although

    there are programs available that can do what is called

    Steganalysis (Detecting use of Steganography.)

    Steganography hide the secrete message within the host data set and

    presence imperceptible and is to be reliably communicated to a

    receiver. The host data set is purposely corrupted, but in a covert

    way, designed to be invisible to an information analysis.

  • 8

    1.2 Where Hidden Data hides?

    It is possible to alter graphic or sound files

    slightly without losing their overall viability for the

    viewer and listener. With audio, you can use bits of

    file that contain sound not audible to the human ear.

    With graphic images, you can remove redundant bits

    of color from the image

    and still produce a picture that looks intact to human

    eye and is difficult to discern from its original.

    It is in those bits that stego hides its data. A

    stego program uses an algorithm, to embed data in

    an image or sound file, and a password scheme to

    allow you to retrieve information.

    1.3 What does the project do?

    - Hiding the text message in an image file .

    - Encryption of the same message, so as to

    support more secure steganography.

    - The decoding of the message, decryption and

    source message retrieval are also supported.

  • 9

    2. Problem Statement:

    The former consists of linguistic or language forms of

    hidden writing. The later, such as invisible ink, try of hide

    messages physically. One disadvantage of linguistic

    steganography is that users must equip themselves to have

    a good knowledge of linguistry. In recent years, everything

    is trending toward digitization. And with the development

    of the internet technology, digital media can be transmitted

    conveniently over the network. Therefore, messages can be

    secretly carried by digital media by using the

    steganography techniques, and then be transmitted

    through the internet rapidly

    Steganography is the art of hiding the fact that

    communication is taking place, by hiding information in

    other information. Many different carrier file formats can

    be used, but digital images are the most popular because of

    their frequency on the internet. For hiding secret

    information in images, there exists a large variety of

    steganography techniques