Top Banner

Click here to load reader

Steganography Synopsis Final

Mar 03, 2015

ReportDownload

Documents

SYNOPSIS ON STRGANOGRAPHY

Page 1/39

(A new technique to hide information within image file)

S

TEGANOGRAPHY

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 2/39

A

SYNOPSISON

STEGANOGRAPHY(A new technique to hide information within image file)Submitted to the

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P.)For the Degree Of

BACHELOR OF ENGINEERING (INFORMATION TECHNOLOGY)Under the Guidance of

Mr. PUNEET SINGH DUGGAL HOD DEPPT. OF INFORMATION TECHNOLOGY

Mrs. MILI JAISWAL PROJECT GUIDE & LECTURER DEPTT. OF INFORMATION TECHNOLOGY

Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]

VII SEM (INFORMATION TECHNOLOGY)

DEPARTMENT OF INFORMATION TECHNOLOGY GURU RAMDAS KHALSA INSTITUTE OF SCIENCE AND TECHNOLOGY JABALPURSteganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 3/39

DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATEThis is to certify that synopsis STEGANOGRAPHY (a new technique to

hide information within image file) which has been completed andsubmitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.

Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]

VII SEM (INFORMATION TECHNOLOGY)

INTERNAL

EXTERNALSteganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 4/39

DEPARTMENT OF INFORMATION TECHNOLOGY

CERTIFICATEThis is to certify that synopsis STEGANOGRAPHY (a new technique to

hide information within image file) which has been completed andsubmitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]

VII SEM (INFORMATION TECHNOLOGY)

Mr. PUNEET SINGH DUGGAL HOD DEPTT. OF INFORMATION TECHNOLOGY

Mrs. MILI JAISWAL PROJECT GUIDE & LECTURER DEPTT. OF INFORMATION TECHNOLOGYSteganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 5/39

ACKNOWLEDGEMENTThe synopsis defines and signifies the shear mannerism in which numerous interacted tasks are performed by a team composed of committed members. Each member bearing their own importance and providing contribution, which is nothing short of being invaluable.

We are thankful to Mr. Puneet Singh Duggal (HOD of Information Technology Department) under whose support we have been able to make this project a great success. We express our deep sense of gratitude to Mrs. Mili Jaiswal for their valuable support and supervision throughout the Bachelor of Engineering Degree. Last but not the least wi wish to remember with the deep sense of gratitude the encouragement provided friends and faculty members. to us by our

Rohit patel (0202it071043) Devendra Vishwakarma (0202IT071013) Narendra Nath Shukla (0202IT071031) Rohit Namdeo (0202IT071042)

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 6/39

ABSTRACT

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 7/39

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 8/39

INTRODUCTION

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY

Page 9/39

ABOUT PROJECTThis project is based on Stegnography technique. Stegnography is the art and science of hiding information by embedding secure and confidential messages (such as Identity, Password etc.) within other harmless file format (such as JPEG, BMP , PNG, WAV, MP3 etc.)

Objective of the projectThe main goal of this steganography based system is to covert

communication. So, the fundamental purpose of this steganography based system is that the hide secure message within any image file format and generates a encrypted BMP image file format as output containing that secure message which will not be sensible to third party. When a message is encrypted, it has no meaning, and it's easy to understand that it contains sensitive information, a secret - and someone might try to break it. This Steganography based software solves this problem by hiding the sensitive information in a harmless file called carrier file (example bmp, jpeg ect.). This approach of information hiding technique has recently became important in a number of application area :This project has following objectives: To product security tool based on steganography techniques. Confidential communication and secret data storing using encryption module. Protection of data alteration To extract techniques of getting secret data using decryption module.

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 10/39

Page

COCEPT OF THE PROJECTStegnographyIT is the art and science of hiding information by embedding secure andconfidential messages (such as Identity, Password etc.) within other harmless digital file format (such as JPEG, BMP , PNG, WAV, MP3 ect.). In one sentence, Steganography is a technique of hiding information in digital media. The purpose of steganography is covert communication to hide a message from a third party. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. The steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the steganography medium. The use of a steganography key may be employed for encryption of the hidden message and/or for randomization in the steganography scheme. In summary:

Secret message

Carrier or Cover Medium

Stego Key

Stego Medium

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 11/39

Page

Cover-object, C F(X,M,K)

Message, M

Stego Object, Z

Stego-key, K

Message is the data that the sender wishes to remain it confidential. It can be plain text, ciphertext, other image, or anything such as a copyright mark, a covert communication, or a serial number. Encrption key is known as stego-key, which ensures that only recipient who know the corresponding decoding key will be able to extract the message from a cover-object. The cover-object with the secretly embedded message is then called the Stego-object.

Stego Object Z

Cover Object C Decoding key corresponding to stego key

Original message M

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 12/39

Page

Recovering message from a stego-object requires the cover-object itselt and a corresponding decoding key if a stego-key was used during the encoding process. The original image may or may not be required in most applications to extract the message. There are several suitable carriers below to be the cover-object: Network protocols such as TCP, IP and UDP Audio that using digital audio formats such as wav, midi, avi, mpeg, mp3 Images file such as bmp, gif and jpg, where they can be both color and gray-scale.

Steganography Vs CryptographySteganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between two is that steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information. The word steganography comes from the Greek Seganos, which mean covered or secret and graphy mean writing or drawing. Therefore, steganography mean, literally covered writing.

Image Steganography and bitmap pictures:Using bitmap pictures for hiding secret information is one of most popular choices for Steganography. Many types of software built for this purpose, some of these software use password protection to encrypting information on picture. To use these software you must have a BMP format of a pictures to use it, but using other type of pictures like JPEG, GIF or any other types is rather or never used, because of algorithm of BMP pictures for Steganography is simple. Also we know

Steganography Synopsis

SYNOPSIS ON STRGANOGRAPHY 13/39

Page

that in the web most popular of image types are JPEG and other types not BPM, so we should have a solution for this problem. This software provide the solution of this proble