Top Banner

Click here to load reader

Project Report- Steganography

Oct 17, 2014

ReportDownload

Documents

defreeme

PROJECT REPORT ON

IMAGE STEGANOGRAPHY

SUBMITTED FOR THE PARTIAL FULFILLMENT OF THE DEGREE OF BACHELOR IN ENGINEERING IN COMPUTER SCIENCE ENGINEERING

UNIVERSITY INSTITUTE OF ENGINEERING AND TECHNOLOGY PANJAB UNIVERSITY, CHANDIGARH

UNIVERSITY OF ENGINEERING AND TECHNOLOGY, PANJAB UNIVERSITY, CHANDIGARH

CERTIFICATE

This is to certify that the following students of CSE (7th sem) have completed the work on project entitled IMAGE STEGANOGRAPHY

In partial fulfillment of the requirement for the degree of BACHELOR OF ENGINEERING to University Institute Of Engineering And Technology, Panjab University. This is record of work carried under the guidance and supervision of the undersigned.

Project Guide

University Institute of Engineering and Technology, Panjab University (Chandigarh)

The External Viva-Voice has been taken and the project report has been found to be satisfactory.

External Examiner

ACKNOWLEDGEMENT

We would like to express our deep-felt gratitude to our Project Guide, xxx for giving us an opportunity to work and for her advice, encouragement, and constant support. We wish to thank her for extending us the greatest freedom in deciding the direction and scope of our project. It has been both a privilege and a rewarding experience working with her. We would also like to thank our colleagues here at UIET for all the wonderful times we have had with them. Their valuable comments and suggestions have been vital to the completion of this work. We want to thank the faculty of UIET and the staff for providing us the means to complete our degree. And finally, we are grateful to our parents and siblings for their love, understanding, encouragement and support.

TABLE OF CONTENTS

ABSTRACT......... 1) INTRODUCTION1.1) INTRODUCTION........... 1.2) STEGANOGRAPHY vs. CRYPTOGRAPHY...... 1.3) HISTORY OF STEGANOGRAPHY.... 1.4) STEGANOGRAPHY TYPES..... 1.5) IMAGE AND TRANSFORM DOMAIN... 1.5.1) Image Domain. 1.5.2) Transform Domain... 1.5.3) Image or Transform domain..... 1.6) ALGORITHM REQUIREMENTS..... 1.6.1) EVALUATION OF DIFFERENT TECHNIQUES ACCORDING TO TABLE-2..... 1.7) IMAGE STEGANOGRAPHY TECHNIQUES.. 1.7.1) Least significant bit insertion....... 1.7.2) Masking and filtering....... 1.7.3) Redundant Pattern Encoding.... 1.7.4) Encrypt and Scatter.. 1.7.5) Algorithms and transformations... 1.8) DETECTION TECHNIQUE FOR IMAGE STEGANOGRAPHY... 1.9) IMPLEMENTATION..... 1.10) STEGANOGRAPHY APPLICATIONS......

2) PROJECT OVERVIEW2.1) PROJECT DESCRIPTION..... 2.2) REQUIREMENTS SPECIFICATION........................................................................................................

2.2.1) Hardware Requirements.............................................................................................. 2.2.2) Software Requirements................................................................................................

2.2.2.1) C#.NET/C++...... 2.2.2.2) Microsoft Visual Studio 2010... 2.2.2.3) Adobe Photoshop CS5.....2.3) FEASIBILITY STUDY.............................................................................................................................. 2.4) OBJECTIVE.. ..... 2.5) SCOPE......... 2.6) IMAGE DEFINITION....... . 2.7) IMAGE COMPRESSION....... 2.8) LEAST SIGNIFICANT BIT... 2.9) DETECTION/ ATTACKS...... 2.10) BENEFITS/ DRAWBACKS.........

3) PROJECT DESIGN3.1) WBS Diagram....... 3.2) User Interface design.......... 3.3) Encryption And Decryption Flowchart.. 4) PROJECT IMPLEMENTATION 4.1) Coding............. 4.2) Snapshots........ 4.3) Testing...................

5) PROJECT AND FUTURE SCOPE5.1) Project Scope...... 5.2) Future Scope.......

6) CONCLUSION BIBLIOGRAPHY... APPENDIX (PROGRAM CODE).....

ABSTRACTIn todays world the art of sending & displaying the hidden information especially in public places, has received more attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Information hiding is an emerging research area, which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, and steganography. In watermarking applications, the message contains information such as owner identification and a digital time stamp, which usually applied for copyright protection. Fingerprint, the owner of the data set embeds a serial number that uniquely identifies the user of the data set. This adds to copyright information to makes it possible to trace any unauthorized used of the data set back to the user. Steganography hide the secrete message within the host data set and presence imperceptible and is to be reliably communicated to a receiver. The host data set is purposely corrupted, but in a covert way, designed to be invisible to an information analysis.

CHAPTER 1 INTRODUCTION

1.1) INTRODUCTION

One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications. Although, Steganography is not to be confused with Encryption, which is the process of making a message unintelligibleSteganography attempts to hide the existence of communication. The basic structure of Steganography is made up of three components: the carrier, the message, and the key. Carrier is also known as cover-object, in which the message is embedded and serves to hide the presence of the message. The carrier can be a painting, a digital image, an mp3, even a TCP/IP packet among other things. It is the object that will carry the hidden message. A key is used to decode/decipher/discover the hidden message. This can be anything from a password, a pattern, a black-light, or even lemon juice. In this project we will focus on the use of Steganography within digital images (BMP) using LSB Substitution, although the properties of Image Steganography may be substituted with audio mp3s, zip archives, and any other digital document format relatively easily.

Basically, the model for steganography is shown in Figure 1. Message is the data that the sender wishes to remain it confidential. It can be plain text, ciphertext, other image, or anything that can be embedded in a bit stream such as a copyright mark, a covert communication, or a serial number. Password is known as stego-key, which ensures that only recipient who knows the corresponding decoding key will be able to extract the message from a cover-object. The cover-object with the secretly embedded message is then called the stego-object.

Recovering message from a stego-object requires the cover-object itself and a corresponding decoding key if a stego-key was used during the encoding process. The original image may or may not be required in most applications to extract the message.

There are several suitable carriers below to be the cover-object:: 1. Network Protocols such as TCP, IP and UDP 2. Audio that using digital audio formats such as wav, midi, avi, mpeg, mpi and voc 3. File and Disk that can hides and append files by using the slack space 4. Text such as null characters, just alike morse code including html and java 5. Images file such as bmp, gif and jpg, where they can be both color and gray-scale. In general, the information hiding process extracts redundant bits from cover-object. The process consists of two steps: Identification of redundant bits in a cover-object. Redundant bits are those bits that can be modified without corrupting the quality or destroying the integrity of the cover object. The embedding process then selects the subset of the redundant bits to be replaced with data from a secret message. The stego-object is created by replacing the selected redundant bits with message bits.

1.2) STEGANOGRAPHY vs. CRYPTOGRAPHY Basically, the purpose of cryptography and steganography is to provide secret communication. However, steganography is not the same as cryptography. Cryptography hides the contents of a secret message from a malicious people, whereas steganography even conceals the existence of the message. Steganography must not be confused with cryptography, where we transform the message so as to make i