Top Banner
STEGANOANALYSIS STEGANOANALYSIS Securing Data Transmission On Networks
25
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: STEGANOANALYSIS

STEGANOANALYSISSTEGANOANALYSIS

Securing Data Transmission On Networks

Page 2: STEGANOANALYSIS

AIM & OBJECTIVESNetwork Security plays an important issue

when a Secure Data Transmission is required.

Several techniques have been implemented to ensure the integrity and privacy of any data transmission.

The main objective is to use these techniques to prevent the data from being manipulated by the hackers.

Page 3: STEGANOANALYSIS

EXISTING TECHNOLOGYThere are several existing techniques that cater to

Network Security.

Some of them are Cryptography Water-marking Firewalls CRC Steganography etc.

Every technique provides security to the data transmission to some extent, but then they too have certain drawbacks.

And the hackers somehow find a way out to lay their hands on the confidential information.

Page 4: STEGANOANALYSIS

Proposed solutionOur main aim is to defeat the hacker’s intentions of

damaging or manipulating the data.

The existing technologies used either of the techniques individually. Ex: Either of the well known techniques cryptography and steganography is used.

The new approach in our system is that we are going to use these well known technologies-Compression, Steganography & CRC together to provide extra security to the Data Transmission.

Page 5: STEGANOANALYSIS
Page 6: STEGANOANALYSIS

CYCLIC REDUNDANCY CHECK

Page 7: STEGANOANALYSIS

A mathematical function performed on the contents of an entity that is then included to enable a receiving system to recalculate the value and compare to the original. If the values are different, corruption of the contents has occurred.

Page 8: STEGANOANALYSIS

CYCLIC REDUNDANCY CHECK

Page 9: STEGANOANALYSIS

COMPRESSION

Page 10: STEGANOANALYSIS

Storing data in a format that requires less space than usual. Compressing data is the same as packing data.

The utility used to compress the data not only reduces the file size but it also Encrypts the data.

Encryption: It is the process of scrambling the data to make it unreadable to the unauthorized user.

Page 11: STEGANOANALYSIS

Encryption & Decryption

encryption decryption

plain text cipher text plain text

Page 12: STEGANOANALYSIS

STEGANOGRAPHY

Page 13: STEGANOANALYSIS

STEGANOGRAPHY

It is the art or science of hiding the data within a less seemingly harmless media.

Page 14: STEGANOANALYSIS

STEGANOGRAPHY

The most common use of steganography is to hide a file inside another file also known as a container.

Containers may be of several types-Non-multimedia containers: Multimedia

Containers: >Text

>Images >Slack space >Audio >Alternative data streams >Video >TCP/IP headers etc

Page 15: STEGANOANALYSIS

CRC GENERATION & VERIFICATION

GENERATION:

This part deals with the generation ofCRC for the Actual Data.The CRC generated is stored back with the Actual Data

Page 16: STEGANOANALYSIS

CRC GENERATION & VERIFICATION

VERIFICATION:

At the receiving end the CRC is calculated for the received data and then compared with the CRC of the Actual Data.

The CRC values of both the data, if match, then the data is accepted by the receiver else it is rejected indicating that the data is corrupted.

Page 17: STEGANOANALYSIS

COMPRESSION: It compresses or packs the data in order to reduce the file size. We shall compress the Actual Data & the CRC together and then transmitted.

Compression in turn also leads tothe automatic Encryption of the Actual Data & CRC.

COMPRESSION & DECOMPRESSION

Page 18: STEGANOANALYSIS

DE-COMPRESSION: The receiver receives the compressed file and performs the decompression process in order to retrieve the actual sized file.

A new file is created that containsthe CRC and the Actual Data.

COMPRESSION & DE-COMPRESSION

Page 19: STEGANOANALYSIS

EMBED: • The compressed data & CRC file is appended (embed) to the end of the image file without affecting the image data or theheader information ofthat image.• The software stores the data ina format that is not recognizable even when viewed from a text or document editor.

EMBED AND DE-EMBED

Page 20: STEGANOANALYSIS

DE-EMBED: At the receiving end the module identify the location of the data picks up the size of the file, filename and reads the data to the length of the data file and regenerate the text file that was embedded with in the image file.

EMBED AND DE-EMBED

Page 21: STEGANOANALYSIS

IMPLEMENTATION SENDER RECEIVER

Message Message (perform) (accept/reject)

CRC check CRC verify (msg+crc) (msg+crc)

Compression Decompression (encrypt msg+crc) (decrypt

msg+crc)

Embed De-embed (hide) (retrieve)

Container Container (damages the data)

Hacker

Page 22: STEGANOANALYSIS
Page 23: STEGANOANALYSIS

The hacker would not know the presence of the confidential data inside the image being transmitted in the first place.

Even if he identifies it, we would not know that the data had been compressed.

Even if he identifies the presence of compression, he would find the data as encrypted.

Page 24: STEGANOANALYSIS

Even if he does decrypt the data, he would not know the presence of CRC inside the data.

Even if he identifies its presence he would not know which part of data is the Actual data and which is CRC and would tamper the data.

The tampered data on the receiving end would not have its CRC match with the CRC of the original data. And the user rejects it.

Page 25: STEGANOANALYSIS

Conclusion