PROJECT REPORT ON “SECURE DAT A TRANSMISSI ON TOOL” Submitted in partial fulfillment of the requirements for summer training project. Submitted by: PA RVEEN KRISHNANTREY Roll No. 0691310212! AMIT KHANDOOJA Roll No. 01310212 SAJAL SA"ENA Roll No. 0#91310212 Submitted to: M$. R%&' A$o$% A(('()%*) P$o+,((o$! CSE D,-%$),*) H. M. R. I. T. M.! D,l/' H. M. R. Institute of Technology and Management AI!IAT"# T$ %&R& %$'I(# SI(%H I(#RA)RASTHA &(I*"RSIT+ Sector , -/ #0ar1a2 #elhi , --33452 India
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
7/23/2019 Project Report on image steganography BY PARVEEN
-. To create a tool that can be used to hide data inside a @B bit color image.
@. The tool should be easy to use2 and should use a graphical user interface.
C. The tool should 0or1 cross,platform.
B. The tool should effecti8ely hide a message using an image degradation
approach2 and should be able to retrie8e this message after0ards.
5. The tool should ta1e into account the original content2 to theoretically more
effecti8ely hide the message.
. The tool should be able to pro8ide some information as to the effecti8eness of
the hiding i.e. it should be able to e8aluate the degradation of an image. The
analysis used 0ill consist of e7isting 0atermar1ing measures2 re, implemented
for this tool.
4. The tool should be able to encrypt the message before embedding it.
1.2 #"TAI!S
Steganography is the art and science of 0riting hidden messages in such a 0ay that
no one apart from the intended recipient 1no0s of the e7istence of the messageD this is
in contrast to cryptography2 0here the e7istence of the message itself is not disguised2
but the content is obscured. The ad8antage of steganography o8er cryptography aloneis that messages do not attract attention to themsel8es2 to messengers2 or to recipients.
Steganographic messages are often first encrypted by some traditional means2
and then a co8erte7t is modified in some 0ay to contain the encrypted message2
resulting in stegote7t. or e7ample2 the letter siEe2 spacing2 typeface2 or other
characteristics of a co8erte7t can be manipulated to carry the hidden messageD only
the recipient 90ho must 1no0 the technique used can reco8er the message and then
7/23/2019 Project Report on image steganography BY PARVEEN
As mentioned abo8e2 cryptography is often used in situations 0here the
e7istence of the message is clear2 but the meaning of the message is obscured. In particular2 the sender transforms the message into a form that 9hopefully only the
intended recipient of the message can decrypt and read.Steganography is often used in
situations 0here the actual e7istence of the message needs to be obscured.
STEANORAPHY AND CRYPTORAPHY CAN 7E COM7INED
The message can also be encrypted before it is hidden inside a cover message.
This pro8ides a double layer of protection. To begin 0ith2 encryption may ma1e the
e7istence of the message e8en more difficult to detect2 due to the fact that some
encryption techniques cause the patterns of the characters in the encrypted 8ersion to
be more random than in the original 8ersion. In addition2 e8en if the e7istence of the
encrypted message is detected2 it is unli1ely that an ea8esdropper 0ill be able to read
the message.
HIDIN THE MESSAE
-. This program hides the message in the image by doing the follo0ing:
@. Reducing the message to the B,character set beginning 0ith the space
character in the AS/II table. "ach character can then be represented by si7
bits.
C. #ecomposing each si7,bit character into three groups of t0o bits each.
B. Replacing the t0o least,significant bits 9!S' in the red2 green2 and
blue 8alues for a gi8en pi7el by the three groups of t0o bits. Thus2 each pi7el
can carry one si7,bit character
7/23/2019 Project Report on image steganography BY PARVEEN
Remo8ed many confusing and>or rarely,used features e.g.2 e7plicit pointers2 operator
o8erloading etc.
(o need to remo8e unreferenced objects because there is Automatic %arbage
/ollection in ja8a.
O?B,)o$',*),
$bject,oriented means 0e organiEe our soft0are as a combination of different types
of objects that incorporates both data and beha8iour.
$bject,oriented programming9$$)s is a methodology that simplify soft0arede8elopment and maintenance by pro8iding some rules.
'asic concepts of $$)s are:
-. $bject
@. /lass
C. Inheritance
B. )olymorphism
5. Abstraction
. "ncapsulation
Pl%)+o$ I*,-,*,*)
A platform is the hard0are or soft0are en8ironment in 0hich a program runs. Thereare t0o types of platforms soft0are,based and hard0are,based. a8a pro8ides
soft0are,based platform. The a8a platform differs from most other platforms in the
sense that itGs a soft0are,based platform that runs on top of other hard0are,based
platforms.It has t0o components:
-. Runtime "n8ironment
@. A)I9Application )rogramming Interface
a8a code can be run on multiple platforms e.g.6indo0s2!inu72Sun Solaris2Mac>$S
etc. a8a code is compiled by the compiler and con8erted into bytecode.This bytecode
is a platform independent code because it can be run on multiple platforms i.e. 6rite
$nce and Run Any0here96$RA.
S,8$,
a8a is secured because:
• (o e7plicit pointer
• )rograms run inside 8irtual machine sandbo7.
• Cl%((lo%,$ adds security by separating the pac1age for the classes of the
local file system from those that are imported from net0or1 sources.
• 7),o, V,$'+',$ chec1s the code fragments for illegal code that can 8iolate
access right to objects.
• S,8$') M%*%=,$ determines 0hat resources a class can access such asreading and 0riting to the local dis1.
7/23/2019 Project Report on image steganography BY PARVEEN
It in8ol8es retrie8ing the embed message from the file independent of the file
format. $nce the message has been retrie8ed it has to be con8erted into original message or file.
This can be done by reading the embedded data from the master file. The read data 0ill be in the
bytes format. This message has to be con8erted into the suitable output file format.
D,$-)'o*
#ecryption includes a message or a file decrypting. #ecryption in8ol8es con8erting the cipher te7t
into decrypted format. #ecryption can be done by passing a secret 1ey. Secret 1ey can be used for decryption of the message that is hidden. It pro8ides security by con8erting the cipher te7t2 into the
original data message or file. Moreo8er if the message is pass0ord protected2 then 0hile retrie8ing
message2 the retrie8er has to enter the correct pass0ord for 8ie0ing the message.
7/23/2019 Project Report on image steganography BY PARVEEN