Top Banner

of 34

Steganography (Final)1

Apr 07, 2018

Download

Documents

Ankit Singhal
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/4/2019 Steganography (Final)1

    1/34

    Submitted To :Nirupama Kurmi

    (H.O.D)

    Submitted By :Ankit Shrivastav

    Ankit Chaturvedi

    Gaurav Sharan Goyal

  • 8/4/2019 Steganography (Final)1

    2/34

    Steganography

  • 8/4/2019 Steganography (Final)1

    3/34

    INTRODUCTION

    Stegosaurus: a covered lizard(but not a type of cryptography)

    Greek Words:STEGANOSCovered

    GRAPHIEWriting

    Steganography is the art and science

    of writing hidden messages in such a

    way that no one apart from the

    intended recipient knows of the

    existence of the message.

    This can be achieve by concealing the

    existence ofinformation withinseemingly harmless carriers or cover

    Carrier: text, image, video, audio, etc.

  • 8/4/2019 Steganography (Final)1

    4/34

    DIAGRAM REPRESENTATION

  • 8/4/2019 Steganography (Final)1

    5/34

    PROBLEM DOMAIN

    In today's scenario there is a huge need of efficient

    data security. Thus there is a huge responsibility for

    protecting and hosting the vast majority

    of the data. More than 30% of the information created

    today from patient care records to personal financialinformation, already requires high standard

    of protection.

    A malicious program or a hacker may corrupt the data

    in order to make it unrecoverable or unusual.Similarly , encrypted operating systems can be

    corrupted by a malicious program or a hacker, making

    the system unusable.

  • 8/4/2019 Steganography (Final)1

    6/34

    In recent years there have been numerous report

    of confidential data such as customer's personal

    records being exposed through loss or theft of

    laptops or backup drives. Encrypting such files

    at rest helps protect them should physical

    security measures fail.

    Du to the above situation there is a strong need

    of a highly secure data transmission system.

  • 8/4/2019 Steganography (Final)1

    7/34

    SOLUTION DOMAIN

    The stated problems can be resolved by changing the

    form of data or changing the medium information with

    encrypting or hiding data while transferring.

    The data can be sent by hiding it in an image or

    audio/video visuals. The advantage of steganography,over cryptography alone , is that msgs do not attract

    attention to themselves

  • 8/4/2019 Steganography (Final)1

    8/34

    Plainly visible msgs - no matter how unbreakable -

    will arouse suspicion,

    and may in themselves be incriminating in countries

    where encryption is illegal.

    Thus our project would be n efficient & secure way totransfer confidential data. There are a wide variety of

    mediums available for hiding the data

    i.e. images, audio and video files.

  • 8/4/2019 Steganography (Final)1

    9/34

    FORMS

    The Steganography Software have following Forms :-

    LOGIN FORMOPTION FORM

    DATA FORM

    DATA HIDING FORM

    DATA RETRIEVAL FORM

  • 8/4/2019 Steganography (Final)1

    10/34

    LOGIN FORM

  • 8/4/2019 Steganography (Final)1

    11/34

    OPTION FORM

  • 8/4/2019 Steganography (Final)1

    12/34

    DATA FORM

  • 8/4/2019 Steganography (Final)1

    13/34

    DATA HIDING FORM

  • 8/4/2019 Steganography (Final)1

    14/34

    DECRYPTION FORM

  • 8/4/2019 Steganography (Final)1

    15/34

    TECHNOLOGY USED

    FRONTEND

    Java is a programming language originally

    developed by James Gosling at Sun Microsystems

    and released in 1995 as a core component of Sun

    Microsystems' Java platform. The language derives

    much of its syntax from C and C++ but has a

    simpler object model and fewer low-level facilities.

    Java applications are typically compiled to bytecode(class file) that can run on any Java Virtual Machine

    (JVM) regardless of computer architecture.

    HARDWARE SOFTWARE

  • 8/4/2019 Steganography (Final)1

    16/34

    HARDWARE,SOFTWAREREQUIREMENT

    Apart from the recommended configuration no other specific

    hardware is required to run the

    software.

    Recommended:Processor Intel Core2duoProcessor Speed 1.2 GHz

    RAM 2 GBHard Disk 250 GB

    HARDWARE INTERFACE :-

  • 8/4/2019 Steganography (Final)1

    17/34

    The JRE is required to run the software.

    The JRE version should be 1.5 or higher.

    The other software required is the Windows media

    player to play the video,audio files.

    The image viewer is required to view image file

    SOFTWARE INTERFACE :-

  • 8/4/2019 Steganography (Final)1

    18/34

    ARCHITECTURE

    1-Tier Architecture:-

    1-Tier Architecture is the simplest, single

    tier on single user, and is the equivalent of running an

    application on a personal computer. All the requiredcomponent to run the application are located within it.

    User interface, business logic, and data storage are all

    located on the same machine. They are the easiest to

    design, but the least scalable. Because they are not part ofa network, they are useless for designing web

    applications. The final application tier is the data tier.

  • 8/4/2019 Steganography (Final)1

    19/34

    MODEL USED

    INCREMENTAL MODEL:

    The incrementalbuild model is a method of software

    development where the model is designed, implemented

    and tested incrementally (a little more is added each time)

    until the product is finished. It involves both development

    and maintenance. The product is defined as finished when it

    satisfies all of its requirements. This model combines the

    elements of the waterfall model with the iterative

    philosophy of prototyping.

  • 8/4/2019 Steganography (Final)1

    20/34

    STEPS

    BLOCK DIAGRAM OF

  • 8/4/2019 Steganography (Final)1

    21/34

    BLOCK DIAGRAM OFINCREMENTAL MODEL

  • 8/4/2019 Steganography (Final)1

    22/34

    UML DIAGRAMS

    In software engineering, a use case diagram in the Unified

    Modeling Language (UML) is a type of behavioral diagram

    defined by and created from a Use-case analysis. Its purposeis to present a graphical overview of the functionality

    provided by a system in terms of actors, their goals

    (represented as use cases), and any dependencies between

    those use cases.The main purpose of a use case diagram is to show what

    system functions are performed for which actor. Roles of the

    actors in the system can be depicted.

    USE CASE DIAGRAM :-

  • 8/4/2019 Steganography (Final)1

    23/34

    Actor :-

    An actor defines the system boundary. It is always outside

    the system being modeled. An actor is a person, a system or

    some external entity linked to one or more system use cases.

    An actor is a non-overlapping logical grouping of use cases.The actor is the source of the incoming event that is the first

    line in the use case. It is always outside the system being

    defined. An actor is a role defined by the set of use cases

    with which it is associated. The actor that starts the use caseis the primary actor for that use case.

    ACTOR

  • 8/4/2019 Steganography (Final)1

    24/34

    Hide file

    Retriew file

    user

    USE CASE DIAGRAM

  • 8/4/2019 Steganography (Final)1

    25/34

    SEQUENCE DIAGRAM

    A sequence diagram in Unified Modeling Language

    (UML) is a kind of interaction diagram that shows how

    processes operate with one another and in what order. It is a

    construct of a Message Sequence Chart.Sequence diagrams are sometimes called Event-trace

    diagrams, event scenarios, and timing diagram.

    A sequence diagram shows, as parallel vertical lines

    ("lifelines"), different processes or objects that livesimultaneously, and, as horizontal arrows, the messages

    exchanged between them, in the order in which they occur.

    This allows the specification of simple runtime scenarios in

    a graphical manner.

    SEQUENCE DIAGRAM

  • 8/4/2019 Steganography (Final)1

    26/34

    : user: user

    select dataselect data select carrier

    file

    select carrier

    file

    insert keyinsert key carrier file with

    hidden message

    carrier file with

    hidden messagestorage mediastorage media

    key not inserted

    select data to be hidden

    select carrier file

    insert key

    hide data

    store data

    SEQUENCE DIAGRAM(HIDING DATA)

    SEQUENCE DIAGRAM

  • 8/4/2019 Steganography (Final)1

    27/34

    : user: user

    select carrier file with

    hidden message

    select carrier file with

    hidden message

    insert keyinsert key reveal datareveal data storage mediastorage media

    wrong key inserted(reinsert)

    select data to be hidden

    insert key

    original data revealed

    store file

    SEQUENCE DIAGRAM(RETRIEVE DATA)

  • 8/4/2019 Steganography (Final)1

    28/34

    Activity Diagram Description:Activity diagrams are typically used for

    business process modeling, for modeling the logic captured by a

    single use case or usage scenario, or for modeling the detailed logic ofabusiness rule. Although UML activity diagrams could potentially

    model the internal logic of a complex operation it would be far better to

    simply rewrite the operation so that it is simple enough that you dont

    require an activity diagram. In many ways UML activity diagrams are the

    object-oriented equivalent offlow charts and data flow diagrams

    (DFDs) from structured development.

    ACTIVITY DIAGRAM

    http://www.agilemodeling.com/artifacts/systemUseCase.htmhttp://www.agilemodeling.com/artifacts/businessRule.htmhttp://www.agilemodeling.com/artifacts/flowChart.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/flowChart.htmhttp://www.agilemodeling.com/artifacts/businessRule.htmhttp://www.agilemodeling.com/artifacts/systemUseCase.htmhttp://www.agilemodeling.com/artifacts/systemUseCase.htm
  • 8/4/2019 Steganography (Final)1

    29/34

    select carrier file with

    hidden message

    insert key

    reveal data

    revealed data

    save file

    login incorrect

    id/password

    enter correctid/password

    start

    ACTIVITY DIAGRAM(HIDING DATA)

    ACTIVITY DIAGRAM

  • 8/4/2019 Steganography (Final)1

    30/34

    start

    select

    image

    select

    song select

    video

    hide data

    carrier file with hidden data

    select file/data to

    be hidden

    insert key

    save file

    login incorrect

    enter correct

    id/password

    ACTIVITY DIAGRAM(RETRIEVE DATA)

    LIMITATION AND

  • 8/4/2019 Steganography (Final)1

    31/34

    LIMITATION ANDCONCLUSION

    Limitation with the size of object being used to hide

    the data.

    In order for steganography to be useful the message

    should be hidden without any major changes to theobject it is being embedded in.

    LIMITATION:

  • 8/4/2019 Steganography (Final)1

    32/34

    Steganography is a really interesting subject and outside

    of the mainstream cryptography and system

    administration that most of us deal with day after day.

    Steganography has its place in security. It is notintended to replace cryptography but supplement it.

    Hiding a message with steganography methods reduces

    the chance of a message being detected. However, if

    that message is also encrypted, if discovered, it must

    also be cracked (yet another layer of protection).

    CONCLUSION:

    REFERENCES AND

  • 8/4/2019 Steganography (Final)1

    33/34

    REFERENCES ANDBIBLIOGRAPHY

    en.wikipedia.org/wiki/Steganography

    www.garykessler.net/library/steganography.htmlwww.steganography.org

    http://mozaiq.org/

    ONLINE DOCUMENTATION :-

    http://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.htmlhttp://www.steganography.org/http://www.steganography.org/http://www.steganography.org/http://mozaiq.org/http://mozaiq.org/http://www.steganography.org/http://www.steganography.org/http://www.steganography.org/http://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.html
  • 8/4/2019 Steganography (Final)1

    34/34

    ANY QUERY?

    THANK YOU ALL