Top Banner
STEGANOGRAPHY By: G.Soujanya Reddy (08QC1A1243) T.Swarna Rekha (08QC1A1247) D.V.Vineela Swathi(08QC1A1253)
32
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography Ppt

STEGANOGRAPHYBy:

G.Soujanya Reddy (08QC1A1243)T.Swarna Rekha (08QC1A1247)

D.V.Vineela Swathi(08QC1A1253)

Page 2: Steganography Ppt

INTRODUCTION

● Steganography○ What is Steganography?○ History○ Steganography today○ Steganography tools

● Conclusions○ What’s in the Future?○ Other tools in the wild○ References

Page 3: Steganography Ppt

Steganography - Definition

● Steganography○ from the Greek word steganos meaning

“covered”○ and the Greek word graphie meaning “writing”

● Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination

● Anyone else viewing the message will fail to know it contains hidden/encrypted data

Page 4: Steganography Ppt

Steganography - History

● Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank.

● Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated.

● Invisible Ink is also a form of steganography

Page 5: Steganography Ppt

Steganography

● Modern digital steganography○ data is encrypted○ then inserted and hidden, using a special

algorithm which may add and/or modify the contents of the file

○ This technique may simply append the data to the file, or disperse it throughout

○ Carefully crafted programs apply the encrypted data such that patterns appear normal.

Page 6: Steganography Ppt

Steganography – Modern Day

Page 7: Steganography Ppt

Steganography – Carrier Files

Steganography Carrier Files

● bmp

● jpeg

● gif

● wav

● mp3

● Amongst others…

Page 8: Steganography Ppt

Steganography - Tools

Steganography Tools

● Steganos

● S-Tools (GIF, JPEG)

● StegHide (WAV, BMP)

● Invisible Secrets (JPEG)

● JPHide

● Camouflage

● Hiderman

● Many others…

Page 9: Steganography Ppt

Steganography

● Popular sites for Steganography information

● http://www.ise.gmu.edu/~njohnson/Steganography

● http://www.rhetoric.umn.edu/Rhetoric/misc/dfrank/stegsoft.html

● http://www.topology.org/crypto.html

Page 10: Steganography Ppt

Anomaly – Visual Detection

● Detecting Steganography by viewing it

● Can you see a difference in these two pictures? (I can’t!)

Page 11: Steganography Ppt

Module DescriptionIn this we have 2 modules

Steg module

UnSteg module

● Steg Module: In this module User need to write any secret information in Text area provided and need to select an Image file to which User wants to append the Secret Information Text. After Selecting the Image the processing of adding Secret Information to Image file takes place. In Steg Module only the Secret Text Information and Image to which Secret Text Information will be selected and the remaining process go on based on the pixels of image and Text given.

● UnSteg Module: In UnSteg module the Encrypted Image will be selected and Steganography Application will start decrypting it with each and every pixel of the Image and displays the output i.e. Secret Text Information. UnSteg module will be accepting only the Image which has the hidden text message in it. After decrypting the Image the Secret Text Info- rmation will be displayed from the Image by UnSteg Module.

Page 12: Steganography Ppt

Technological Requirements

Software Requirements: Java 2 Standard Edition, Java SwingsMicrosoft Windows, Linux or Mac any versionHardware Requirements: P2 above processor, 128MB+ of main memory (RAM) and 100MB hard disk and data base memory. LAN connection or internet connection.

Page 13: Steganography Ppt

SCOPE● Steganography provides some very useful and commercially important functions in the digital world, most notably digital watermarking. In this application, a user can embed a hidden message in a file so that ownership of intellectual property can later be asserted and/or to ensure the integrity of the content. An artist, for example, could post original artwork on a Website. If someone else steals the file and claims the work as his or her own, the artist can later prove ownership because only he/she can recover the watermark.

Page 14: Steganography Ppt

Existing System

● Developed for any one Operating System.

● Supports any one either command mode or graphical mode only.

● Usually available as a built in utility in the system.

● Should be applicable for any kind of Image Size for Steganography.

Page 15: Steganography Ppt

Proposed System● Steganography is supposed to run with Java

runtime environments version 1.4 and higher. This has the advantage of working under most operating systems in use today.

● Write the code to execute as Command mode and Graphical Interface

● Provide interactive interface through which user can interact with different types of Images, Image Sizes and Text Messages.

Page 16: Steganography Ppt

DATA FLOW DIAGRAMS

Level 0 DFD for Users

Page 17: Steganography Ppt

Level-1 Subsystem Level

Page 18: Steganography Ppt

Level-2: Detailed Level

Page 19: Steganography Ppt

UML Diagrams● Use Case:

Page 20: Steganography Ppt

UML Diagrams● Class Diagrams

Page 21: Steganography Ppt

UML Diagrams● Sequence Diagram

Page 22: Steganography Ppt

OUTPUT SCREENS

Page 23: Steganography Ppt

OUTPUT SCREENS

Page 24: Steganography Ppt

OUTPUT SCREENS

Page 25: Steganography Ppt

OUTPUT SCREENS

Page 26: Steganography Ppt

OUTPUT SCREENS

Page 27: Steganography Ppt

OUTPUT SCREENS

Page 28: Steganography Ppt

OUTPUT SCREENS

Page 29: Steganography Ppt

CONCLUSIONS

● Steganography today, however, is significantly more sophisticated than the examples above suggest, allowing a user to hide large amounts of information within image and audio files. These forms of steganography often are used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the information (an often difficult task in and of itself) and then decrypt it.

● Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. But it is also quite real; this is not just something that's used in the lab or an arcane subject of study in academia. Steg may, in fact, be all too real — there have been several reports that the terrorist organization behind the September 11 attacks in New York City, Washington, D.C., and outside of Pittsburgh used steganography as one of their means of communication.

Page 30: Steganography Ppt

Questions & Answers

Page 31: Steganography Ppt

THANK YOU

Page 32: Steganography Ppt

● Encoding

public boolean encode(String path, String original, String ext1, String stegan, String message)public String decode(String path, String name)private String image path(String path, String name, String ext)private BufferedImage getImage(String f)private boolean setImage(BufferedImage image, File file, String ext)private BufferedImage add text(BufferedImage image, String text)private BufferedImage user space(BufferedImage image)private byte[] get_byte_data(BufferedImage image)byte byte3 = (byte)((i & 0xFF000000) >>> 24); //0byte byte2 = (byte)((i & 0x00FF0000) >>> 16); //0byte byte1 = (byte)((i & 0x0000FF00) >>> 8 ); //0byte byte0 = (byte)((i & 0x000000FF) );