Top Banner

Click here to load reader

Project Report- Steganography

Oct 25, 2014

ReportDownload

Documents

Image and Audio Steganography

B.Tech Project ReportSubmitted in partial fulfillment of the requirements for the degree of

Bachelor of Technology, Computer Science and Engineering

Submitted By:

Rohit Jaiswal CSE 06000025

SUPERVISOR: Mr. Rajeev Srivastava (Reader) Department of Computer Science and Engineering Institute of Technology Banaras Hindu University, Varanasi - 221005

DEPARTMENT OF COMPUTER ENGINEERING INSTITUTE OF TECHNOLOGY BANARAS HINDU UNIVERSITY Varanasi 221005, INDIA Rajeev Srivastava Reader Computer Science and EngineeringRef. No. IT/CSE/2007-08/ Dated: ______________

CERTIFICATE

This is to certify that Rohit Jaiswal ( Roll no. 06000025), student of the Department of Computer Science & Engineering , Institute of Technology, Banaras Hindu University, Varanasi worked for his B.Tech. Minor Project entitled Image and Audio Steganography under my supervision from beginning of fourth semester of B.Tech. program 2006-2010. The report submitted by him embodies the literature from various reputed resources and is an authentic record of the work carried out by them under my supervision and guidance.

(Rajeev Srivastava) Reader Department of Computer Science & Engineering Institute Of Technology Banaras Hindu University

Page | 2

ACKNOWLEDGEMENTIt has indeed been a great privilege for me to have Mr. Rajeev Srivastava, Department of Computer Science and Engineering, Institute of Technology, Banaras Hindu University, as my mentor for this project. His awe-inspiring personality, superb guidance and constant encouragement are the motive force behind this project work. I take this opportunity to express my utmost gratitude to him. I am also indebted to him for his timely and valuable advice. I am highly grateful to Prof. A.K.Tripathi, Head, Department of Computer Science and Engineering, Institute of Technology, Banaras Hindu University for providing necessary facilities and encouraging me during the course of work. I am thankful to all technical and non-teaching staff of the Department of Computer Science and Engineering for their constant assistance and co-operation.

( Rohit Jaiswal ) Roll No. : 06000025 B.Tech (Part II) Semester IV Department of Computer Science & Engineering Institute Of Technology ,Banaras Hindu University

Page | 3

Contents1. Abstract ...........................................................................................................5 2. Chapter 1: Introduction.....................................................................................6 Steganography and Cryptography...6 Scope of Steganography...7 3. Chapter 2: Technologies Used.................................................................8 Visual C#.NET 8.0 or higher8 Macromedia Flash 8..8 4. Chapter 3: Theoretical Background..........................................................9 Analysis of Digital Image...9 Analysis of Digital Audio..12 5. Chapter 4: Analysis and Design........................................................14 Context Diagram...14 Data Flow Diagram.........................................................................15 Encoding.15 Decoding.16 6. Chapter 5. Algorithms17 7. Chapter 6: Software Implementation........................................................23 Functions23 Functions Map..24 8. Chapter 7: Inputs and Outputs.........................................................25 9. Chapter 8:Conclusion and Future Work...........................................................34 8. References......................................................................................................35 9. Appendix......................................................................36 Keywords....36 Source Code............................................................................................37

Page | 4

ABSTRACTSteganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted form. This is where steganography can come into play. While cryptography provides privacy, steganography is intended to provide secrecy. This project deals with hiding of text behind multimedia, i.e. digital images, wave audio, real media audio, etc. Cryptographic cipher is used before hiding text to make this procedure more secure. The GUI has been given a funky look by using flash.

IMPORTANT KEYWORDS

Steganography , Cryptography, Cover Medium , Plain Text, Cipher Text, Stego Key, Stego Medium

Page | 5

CHAPTER 1

IntroductionThe word steganography is of Greek origin and means "covered, or hidden writing". Steganography is the art and science of communicating in a way which hides the existence of the communication. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message.

Steganography and CryptographyCryptography the science of writing in secret codes addresses all of the elements necessary for secure communication over an insecure channel, namely privacy, confidentiality, key exchange, authentication, and non-repudiation. But cryptography does not always provide safe communication. Consider an environment where the very use of encrypted messages causes suspicion. Consider the following text file; what else is it likely to be if not encrypted?qANQR1DBwU4D/TlT68XXuiUQCADfj2o4b4aFYBcWumA7hR1Wvz9rbv2BR6WbEUsy ZBIEFtjyqCd96qF38sp9IQiJIKlNaZfx2GLRWikPZwchUXxB+AA5+lqsG/ELBvRa c9XefaYpbbAZ6z6LkOQ+eE0XASe7aEEPfdxvZZT37dVyiyxuBBRYNLN8Bphdr2zv z/9Ak4/OLnLiJRk05/2UNE5Z0a+3lcvITMmfGajvRhkXqocavPOKiin3hv7+Vx88 uLLem2/fQHZhGcQvkqZVqXx8SmNw5gzuvwjV1WHj9muDGBY0MkjiZIRI7azWnoU9 3KCnmpR60VO4rDRAS5uGl9fioSvze+q8XqxubaNsgdKkoD+tB/4u4c4tznLfw1L2 YBS+dzFDw5desMFSo7JkecAS4NB9jAu9K+f7PTAsesCBNETDd49BTOFFTWWavAfE gLYcPrcn4s3EriUgvL3OzPR4P1chNu6sa3ZJkTBbriDoA3VpnqG3hxqfNyOlqAka mJJuQ53Ob9ThaFH8YcE/VqUFdw+bQtrAJ6NpjIxi/x0FfOInhC/bBw7pDLXBFNaX HdlLQRPQdrmnWskKznOSarxq4GjpRTQo4hpCRJJ5aU7tZO9HPTZXFG6iRIT0wa47 AR5nvkEKoIAjW5HaDKiJriuWLdtN4OXecWvxFsjR32ebz76U8aLpAK87GZEyTzBx dV+lH0hwyT/y1cZQ/E5USePP4oKWF4uqquPee1OPeFMBo4CvuGyhZXD/18Ft/53Y WIebvdiCqsOoabK3jEfdGExce63zDI0= =MpRf

The message above is a sentence in English that is encrypted using Pretty Good Privacy (PGP), probably the most commonly used e-mail encryption software today.

The advantage of steganography over cryptography alone is that messages do not attract attention to themselves, to messengers, or to recipients. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to hide the data from a third party. Often, steganography and cryptography are used together to ensure security of the covert message.

Page | 6

SCOPE OF STEGANOGRAPHYSteganography is a very interesting and advantageous science these days and has following uses:

Digital Watermarking To protect a copyright on information. Photo collections, sold on CD, often have hidden messages in the photos which allow detection of unauthorized use. The same technique applied to DVDs is even more effective, since the industry builds DVD recorders to detect and disallow copying of protected DVDs. The simplest and oldest are used in map making, where cartographers sometimes add a tiny fictional street to their maps, allowing them to prosecute copycats. A similar trick is to add fictional names to mailing lists as a check against unauthorized resellers. Steganography doesn't just apply to written forms of communication. Radio and TV messages, from World War II to today, can be used to hide coded or hidden messages. Some government sources suspect that Osama bin Laden's pre-recorded videos that are re-played on TV stations around the world contain hidden messages. Even biological data, stored on DNA, may be a candidate for hidden messages, as biotech companies seek to prevent unauthorized use of their genetically engineered material. The technology is already in place for this: three New York researchers successfully hid a secret message in a DNA sequence and sent it across the country. Steganography can also be used to allow communication within an underground community.

Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps.

Page | 7

CHAPTER 2

TECHNOLOGIES USED

Visual Studio.NET version 2.0 or higher or Visual C#.NET 8.0 or higherC# is an object-oriented programming language developed by Microsoft as part of the .NET initiative and later approved as a standard by ECMA (ECMA334) and ISO (ISO/IEC 23270). Anders Hejlsberg leads development of the C# language, which has a procedural, object-oriented syntax based on C++ and includes influences from aspects of several other programming languages (most notably Delphi and Java) with a particular emphasis on simplification. In this project all the framework has been designed in C#. It deals with the main Algorithms of this project.

Macromedia Flash Professional 8.0Flash is commonly used to create animation, advertisements, various web page components, to integrate video into web pages, and more recently, to develop rich Internet applications. Files in the SWF (pronounced: Swif) format, traditionally called "Flash movies" or "Flash games", usually have a .swf file extension and may be an object of a web page, strictly "played" in a standalone Flash Player, or incorporated into a Projector, a self-executing Flash movie (with the .exe extension in Microsoft Windows). In this project Flash has been used to give the application a stylish look