STEGANOANALYSIS STEGANOANALYSIS Securing Data Transmission On Networks
Oct 15, 2014
STEGANOANALYSISSTEGANOANALYSIS
Securing Data Transmission On Networks
AIM & OBJECTIVESNetwork Security plays an important issue
when a Secure Data Transmission is required.
Several techniques have been implemented to ensure the integrity and privacy of any data transmission.
The main objective is to use these techniques to prevent the data from being manipulated by the hackers.
EXISTING TECHNOLOGYThere are several existing techniques that cater to
Network Security.
Some of them are Cryptography Water-marking Firewalls CRC Steganography etc.
Every technique provides security to the data transmission to some extent, but then they too have certain drawbacks.
And the hackers somehow find a way out to lay their hands on the confidential information.
Proposed solutionOur main aim is to defeat the hacker’s intentions of
damaging or manipulating the data.
The existing technologies used either of the techniques individually. Ex: Either of the well known techniques cryptography and steganography is used.
The new approach in our system is that we are going to use these well known technologies-Compression, Steganography & CRC together to provide extra security to the Data Transmission.
CYCLIC REDUNDANCY CHECK
A mathematical function performed on the contents of an entity that is then included to enable a receiving system to recalculate the value and compare to the original. If the values are different, corruption of the contents has occurred.
CYCLIC REDUNDANCY CHECK
COMPRESSION
Storing data in a format that requires less space than usual. Compressing data is the same as packing data.
The utility used to compress the data not only reduces the file size but it also Encrypts the data.
Encryption: It is the process of scrambling the data to make it unreadable to the unauthorized user.
Encryption & Decryption
encryption decryption
plain text cipher text plain text
STEGANOGRAPHY
STEGANOGRAPHY
It is the art or science of hiding the data within a less seemingly harmless media.
STEGANOGRAPHY
The most common use of steganography is to hide a file inside another file also known as a container.
Containers may be of several types-Non-multimedia containers: Multimedia
Containers: >Text
>Images >Slack space >Audio >Alternative data streams >Video >TCP/IP headers etc
CRC GENERATION & VERIFICATION
GENERATION:
This part deals with the generation ofCRC for the Actual Data.The CRC generated is stored back with the Actual Data
CRC GENERATION & VERIFICATION
VERIFICATION:
At the receiving end the CRC is calculated for the received data and then compared with the CRC of the Actual Data.
The CRC values of both the data, if match, then the data is accepted by the receiver else it is rejected indicating that the data is corrupted.
COMPRESSION: It compresses or packs the data in order to reduce the file size. We shall compress the Actual Data & the CRC together and then transmitted.
Compression in turn also leads tothe automatic Encryption of the Actual Data & CRC.
COMPRESSION & DECOMPRESSION
DE-COMPRESSION: The receiver receives the compressed file and performs the decompression process in order to retrieve the actual sized file.
A new file is created that containsthe CRC and the Actual Data.
COMPRESSION & DE-COMPRESSION
EMBED: • The compressed data & CRC file is appended (embed) to the end of the image file without affecting the image data or theheader information ofthat image.• The software stores the data ina format that is not recognizable even when viewed from a text or document editor.
EMBED AND DE-EMBED
DE-EMBED: At the receiving end the module identify the location of the data picks up the size of the file, filename and reads the data to the length of the data file and regenerate the text file that was embedded with in the image file.
EMBED AND DE-EMBED
IMPLEMENTATION SENDER RECEIVER
Message Message (perform) (accept/reject)
CRC check CRC verify (msg+crc) (msg+crc)
Compression Decompression (encrypt msg+crc) (decrypt
msg+crc)
Embed De-embed (hide) (retrieve)
Container Container (damages the data)
Hacker
The hacker would not know the presence of the confidential data inside the image being transmitted in the first place.
Even if he identifies it, we would not know that the data had been compressed.
Even if he identifies the presence of compression, he would find the data as encrypted.
Even if he does decrypt the data, he would not know the presence of CRC inside the data.
Even if he identifies its presence he would not know which part of data is the Actual data and which is CRC and would tamper the data.
The tampered data on the receiving end would not have its CRC match with the CRC of the original data. And the user rejects it.
Conclusion