SYNOPSIS ON STRGANOGRAPHY Page 1/38
Steganography – Synopsis
STEGANOGRAPHY (A new technique to hide information within
image file)
SYNOPSIS ON STRGANOGRAPHY Page 2/38
Steganography – Synopsis
A
SYNOPSISON
STEGANOGRAPHY(A new technique to hide information within
image file)Submitted to the
RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P.)For the Degree Of
BACHELOR OF ENGINEERING(INFORMATION TECHNOLOGY)
Under the Guidance of
Mr. PUNEET SINGH DUGGALHOD
DEPPT. OF INFORMATION TECHNOLOGY
Mrs. MILI JAISWALPROJECT GUIDE & LECTURER
DEPTT. OF INFORMATION TECHNOLOGYSubmitted ByROHIT PATEL [0202IT071043]
DEVENDRA VISHWAKARMA [0202IT071013]NARENDRA NATH SHUKLA [0202IT071031]
ROHIT NAMDEO [0202IT071042]VII SEM (INFORMATION TECHNOLOGY)
DEPARTMENT OF INFORMATION TECHNOLOGYGURU RAMDAS KHALSA INSTITUTE OF SCIENCE AND
TECHNOLOGYJABALPUR
SYNOPSIS ON STRGANOGRAPHY Page 3/38
Steganography – Synopsis
DEPARTMENT OF INFORMATION TECHNOLOGY
CERTIFICATE
This is to certify that synopsis “STEGANOGRAPHY (a new technique to hide information within image file)” which has been completed and submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.
Submitted ByROHIT PATEL [0202IT071043]
DEVENDRA VISHWAKARMA [0202IT071013]NARENDRA NATH SHUKLA [0202IT071031]
ROHIT NAMDEO [0202IT071042]VII SEM (INFORMATION TECHNOLOGY)
INTERNAL EXTERNAL
SYNOPSIS ON STRGANOGRAPHY Page 4/38
Steganography – Synopsis
DEPARTMENT OF INFORMATION TECHNOLOGY
This is to certify that synopsis “STEGANOGRAPHY (a new technique to hide information within image file)” which has been completed and submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.
Submitted ByROHIT PATEL [0202IT071043]
DEVENDRA VISHWAKARMA [0202IT071013]NARENDRA NATH SHUKLA [0202IT071031]
ROHIT NAMDEO [0202IT071042]VII SEM (INFORMATION TECHNOLOGY)
Mr. PUNEET SINGH DUGGALHOD
DEPTT. OF INFORMATION TECHNOLOGY
Mrs. MILI JAISWALPROJECT GUIDE & LECTURER
DEPTT. OF INFORMATION TECHNOLOGY
CERTIFICATE
SYNOPSIS ON STRGANOGRAPHY Page 5/38
Steganography – Synopsis
ACKNOWLEDGEMENT
The synopsis defines and signifies the shear mannerism in which numerous interacted tasks are performed by a team composed of committed members. Each member bearing their own importance and providing contribution, which is nothing short of being invaluable.
We are thankful to Mr. Puneet Singh Duggal (HOD of Information Technology Department) under whose support we have been able to make this project a great success.
We express our deep sense of gratitude to Mrs. Mili Jaiswal for their valuable support and supervision throughout the ‘Bachelor of Engineering’ Degree. Last but not the least wi wish to remember with the deep sense of gratitude the encouragement provided to us by our friends and faculty members.
Rohit patel (0202it071043)
Devendra Vishwakarma (0202IT071013)Narendra Nath Shukla (0202IT071031)Rohit Namdeo (0202IT071042)
SYNOPSIS ON STRGANOGRAPHY Page 6/38
Steganography – Synopsis
ABSTRACT
SYNOPSIS ON STRGANOGRAPHY Page 7/38
Steganography – Synopsis
Steganography is the art of hiding the fact that communication is taking
place, by hiding information in other information. Many different carrier file
formats can be used, but digital images are the most popular because of their
frequency on the internet. For hiding secret information in images, there exist a
large variety of steganography techniques some are more complex than others
and all of them have respective strong and weak points. Different applications
may require absolute invisibility of the secret information, while others require a
large secret message to be hidden. This project report intends to give an
overview of image steganography, its uses and techniques. It also attempts to
identify the requirements of a good steganography algorithm and briefly reflects
on which steganographic techniques are more suitable for which applications.
SYNOPSIS ON STRGANOGRAPHY Page 8/38
Steganography – Synopsis
INTRODUCTION
ABOUT PROJECT
SYNOPSIS ON STRGANOGRAPHY Page 9/38
Steganography – Synopsis
This project is based on Stegnography technique. Stegnography is the art
and science of hiding information by embedding secure and confidential
messages (such as Identity, Password etc.) within other harmless file format
(such as JPEG, BMP , PNG, WAV, MP3 etc.)
Objective of the project
The main goal of this steganography based system is to covert
communication. So, the fundamental purpose of this steganography based
system is that the hide secure message within any image file format and
generates a encrypted BMP image file format as output containing that secure
message which will not be sensible to third party.
When a message is encrypted, it has no meaning, and it's easy to
understand that it contains sensitive information, a secret - and someone might
try to break it. This Steganography based software solves this problem by hiding
the sensitive information in a harmless file called carrier file (example – bmp,
jpeg ect.).
This approach of information hiding technique has recently became
important in a number of application area :-
This project has following objectives:
To product security tool based on steganography techniques.
Confidential communication and secret data storing using encryption
module.
Protection of data alteration
To extract techniques of getting secret data using decryption module.
COCEPT OF THE PROJECT
SYNOPSIS ON STRGANOGRAPHY Page 10/38
Steganography – Synopsis
Secret message Carrier or Cover Medium Stego Key
Stego Medium
Stegnography-
IT is the art and science of hiding information by embedding secure and
confidential messages (such as Identity, Password etc.) within other harmless
digital file format (such as JPEG, BMP , PNG, WAV, MP3 ect.). In one sentence,
Steganography is a technique of hiding information in digital media.
The purpose of steganography is covert communication to hide a message
from a third party. In contrast to cryptography, it is not to keep others from
knowing the hidden information but it is to keep others from thinking that the
information even exists.
The steganography process generally involves placing a hidden message
in some transport medium, called the carrier. The secret message is embedded
in the carrier to form the steganography medium. The use of a steganography
key may be employed for encryption of the hidden message and/or for
randomization in the steganography scheme. In summary:
Cover-object, C
Message, M
F(X,M,K) Stego Object, Z
SYNOPSIS ON STRGANOGRAPHY Page 11/38
Steganography – Synopsis
Message is the data that the sender wishes to remain it confidential. It can
be plain text, ciphertext, other image, or anything such as a copyright mark, a
covert communication, or a serial number. Encrption key is known as stego-key,
which ensures that only recipient who know the corresponding decoding key will
be able to extract the message from a cover-object. The cover-object with the
secretly embedded message is then called the Stego-object.
Recovering message from a stego-object requires the cover-object itselt
and a corresponding decoding key if a stego-key was used during the encoding
process. The original image may or may not be required in most applications to
extract the message.
There are several suitable carriers below to be the cover-object:
Cover-object, C
Message, M
F(X,M,K) Stego Object, Z
Decoding key corresponding
to stego key
Stego Object Z
Cover Object C
Original message M
SYNOPSIS ON STRGANOGRAPHY Page 12/38
Steganography – Synopsis
Network protocols such as TCP, IP and UDP Audio that using digital audio formats such as wav, midi, avi, mpeg,
mp3 Images file such as bmp, gif and jpg, where they can be both color
and gray-scale.
Steganography Vs Cryptography
Steganography is often confused with cryptology because the two are
similar in the way that they both are used to protect important information. The
difference between two is that steganography involves hiding information so it
appears that no information is hidden at all. If a person or persons views the
object that the information is hidden inside of he or she will have no idea that
there is any hidden information, therefore the person will not attempt to decrypt
the information.
The word steganography comes from the Greek “Seganos”, which mean
covered or secret and – “graphy” mean writing or drawing. Therefore,
steganography mean, literally covered writing.
Image Steganography and bitmap pictures:
Using bitmap pictures for hiding secret information is one of most popular
choices for Steganography. Many types of software built for this purpose, some
of these software use password protection to encrypting information on picture.
To use these software you must have a ‘BMP’ format of a pictures to use it, but
using other type of pictures like “JPEG”, “GIF” or any other types is rather or
never used, because of algorithm of “BMP” pictures for Steganography is simple.
Also we know that in the web most popular of image types are “JPEG” and other
types not “BPM”, so we should have a solution for this problem.
This software provide the solution of this problem, it can accept any type of
image to hide information file, but finally it give the only “BMP” image as an
output that has hidden file inside it.
SYNOPSIS ON STRGANOGRAPHY Page 13/38
Steganography – Synopsis
Bitmap Steganography:
Bitmap type is the simplest type of picture because that it doesn’t have
any technology for decreasing file size. Structure of these files is that a bitmap
image created from pixels that any pixel created from three colors ( red, green
and blue said RGB) each color of a pixel is one byte information that shows the
density of that color. Merging these three color makes every color that we see in
these pictures. We know that every byte in computer science is created from 8
bit that first bit is Most-Significant-Bit (MSB) and last bit Least-Significant-Bit
(LSB), the idea of using Steganography science is in this place; we use LSB bit for
writing our security information inside BMP pictures. So if we just use last layer
(8st layar) of information, we should change the last bit of pixels, in other hands
we have 3 bits in each pixel so we have 3*hight*width bits memory to write our
information. But before writing our data we must write name of data(file), size of
name of data & size of data. We can do this by assigning some first bits of
memory (8st layer).
(00101101 00011101 11011100)
(10100110 11000101 00001100)
(11010010 10101100 01100011)
Using each 3 pixel of picture to save a byte of data
SYNOPSIS ON STRGANOGRAPHY Page 14/38
Steganography – Synopsis
SCOPE OF THE PROJECT
The growing possibilities of modern communications need the special
means of security especially on computer network. The network security is
becoming more important as the number of data being exchanged on the
internet increases. Therefore, the confidentiality and data integrity are requires
to protect against unauthorized access and use. This has resulted in an explosive
growth of the field of information hiding
This project is developed for hiding information in any image file. The
scope of the project is implementation of steganography tools for hiding
information includes any type of information file within BMP image files and it
also ask to receiver for the path where the user wants to save Image and
extruded file. In short this software is able to do some kind of encryption for
secure information hiding what is called Steganography. The most common use
of steganography is to hide a file inside another file.
SYNOPSIS ON STRGANOGRAPHY Page 15/38
Steganography – Synopsis
Methodology
User needs to run the application. The user has two tab options – encrypt
and decrypt. If user select encrypt, application will give the screen to brows and
select image file (such as bmp, jpeg, png) as a cover object, and the file (such as
doc, txt, ppt) that containing the information that you want to embed in cover
object And if user select decrypt option, the application give the screen to select
Stego-Object (bmp image file) that you want to decrypt and ask path where user
want to save the secrete file.
This project has two methods – Encrypt and Decrypt.
In encryption, the secrete information is hiding in with any type of image file.
Decryption is getting the secrete information from image file.
Encryption Process
IMAGE FILE INFORMATION FILE
SYNOPSIS ON STRGANOGRAPHY Page 16/38
Steganography – Synopsis
BMP file
SYNOPSIS ON STRGANOGRAPHY Page 17/38
Steganography – Synopsis
Decryption Process
BMP file
Image file Information file
SYNOPSIS ON STRGANOGRAPHY Page 18/38
Steganography – Synopsis
AdVANTAGES & Limitations of the Software:
Advantages:-
Mainly steganographic based software can be used in sending confidential
images for military purposes where this software enables them to hide file
formats such as text files or image files like jpg or bitmap into another
image files or in mp3 files.
Steganography covers even the existence of a hidden message, ie other
than sender and receiver no one knows there is a secret data is stored in a
carrier file.
Limataion:-
Now days many terrestrial group are using this method of stegnography
to communicate with other terrestrial group since If one knows that a file
contains some hidden data, without knowing the decryption method he is
not able to get the secret data. Because they use some passwords while
hiding the data.
This project has an assumption that is both the sender and receiver must
have shared some secret information before imprisonment. Pure
steganography means that there is none prior information shared by two
communication parties.
SYNOPSIS ON STRGANOGRAPHY Page 19/38
Steganography – Synopsis
PLANNING
Problem Statement :
The former consists of linguistic or language forms of hidden writing. The
later, such as invisible ink, try of hide messages physically. One disadvantage of
linguistic steganography is that users must equip themselves to have a good
knowledge of linguistry. In recent years, everything is trending toward
digitization. And with the development of the internet technology, digital media
can be transmitted conveniently over the network. Therefore, messages can be
secretly carried by digital media by using the steganography techniques, and
then be transmitted through the internet rapidly
Possible and best plan for solution
Steganography is the art of hiding the fact that communication is taking
place, by hiding information in other information. Many different carrier file
formats can be used, but digital images are the most popular because of their
frequency on the internet. For hiding secret information in images, there exists a
large variety of steganography techniques some are more complex than others
and all of them have respective strong and weak points.
So we prepare this application, to make the information hiding more
simple and user friendly.
SYNOPSIS ON STRGANOGRAPHY Page 20/38
Steganography – Synopsis
Start Application
Encryption Decryption
BMP Image file
BMP image file
Image Message file
Message file
Planning strategy
SYNOPSIS ON STRGANOGRAPHY Page 21/38
Steganography – Synopsis
REQUIREMENT ANALYSIS
HARDWARE REQUIREMENT
Computer Intel® or Compatible , Monitor
Pentium III Processor or Higher
Memory (RAM) 256 MB minimum on Windows XP/2000
512 MB recommended on Windows vista/7
Hard Disk Space Minimum 5 GB free space for installing Visual
studio 2008 and .net framework 3.5)
CDROM or DVDROM – Drive
Required for Installation
Operating System
(OS)
Windows XP SP2 or above
Windows vista / Windows 7
Front end Visual Studio .Net 2008 or higher Visual Studio .Net Framework (3.5 or higher)
SOFTWARE REQUIREMENT
FUNCTIONAL REQUIRMENT
SYNOPSIS ON STRGANOGRAPHY Page 22/38
Steganography – Synopsis
PURPOSE:
The main purpose for preparing this document is to give a general
insight into the analysis and requirements of the existing system or situation and
for determining the operating characteristics of the system.
SCOPE:
Document plays a vital role in the development life cycle (SDLC).As it
describes the complete requirement of the system. It is meant for use by the
developers and will be the basic during testing phase.
The following two things are considered in detail characteristic of
functional requirement:
1. Input
2. Output
1. INPUT: -
Steganography system requires any type of image file (as a cover
image file) and the secure information or message that is to be hidden. It has
two modules encrypt and decrypt.
The main objective during the input designs is as given below:
To produce a cost-effective method of input. To ensure that the input is acceptable and understood by the user. Controlling the amount of input Avoiding error in data.
2. OUTPUT:-
SYNOPSIS ON STRGANOGRAPHY Page 23/38
Steganography – Synopsis
This steganography system produces a BMP image file format (as
output) containing the cover image that appears in outer world and the
secure information file that will be hidden inside covered image by
embedding that using some stego-key.
One of the most important factors of an information system for the
user is the output the system produces. Without the quality of the output,
the entire system may appear unnecessary that will make us avoid using it
possibly causing it to fail.
The term output applying to information produced by an information
system whether printed or displayed while designing the output we should
identify the specific output that is needed to information requirements
select a method to present the formation and create a document report or
other formats that contains produced by the system.
Whether the output is formatted report or a simple listing of the
contents of a file, a computer process will produce the output.
A Document
A Message
Retrieval from a data store
FEASIBILITY STUDY
SYNOPSIS ON STRGANOGRAPHY Page 24/38
Steganography – Synopsis
Before developing project we studied the feasibility of the project in
determining whether or not to implement this project/software and also did the
analysis of the potential impact of the proposed project or software, that
includes advantages and disadvantages of both the current situation and the
proposed project.
Following points are given below, on which we studied the feasibility
before designing of the project:-
1. Is the project concept viable?
2. Are the project’s cost and schedule assumptions realistic?
3. What are the current estimated cost and schedule for the project?
4. Have the major risks to the project been identified and can they
minimized or avoided?
5. Is the software development plan complete and adequate to support
further development work?
6. Have users and developers been able to agree on a detailed user
interface prototype? If not, are the requirements really stable?
Architecture
Front end:-
My project fulfills all the above mentioned criteria of feasibility study.
SYNOPSIS ON STRGANOGRAPHY Page 25/38
Steganography – Synopsis
Visual studio 2008 (.NET Framework using C# language)
Back end:-
A stego key for encryption and decryption.
SDLC (Software development life cycle)
SYNOPSIS ON STRGANOGRAPHY Page 26/38
Steganography – Synopsis
System analysis
Steganography system requires any type of image file and the information
or message that is to be hidden. It has two modules encrypt and decrypt.
Begins when anOrganization identifiesa need of software.ConceptProposal isCreated
Defines the scope or boundary of the concepts. Includes System Boundary, Cost Benefit Analysis.Risk Management Plan & Feasibility Study
Develops a Project Management Plan and other planning documents.Provides the basis for acquiring the resources needed to achieve
Analyses user needs and develop requirement specification, & user requirement. Create a detailed Functional Requirement Document
Transforms detailed requirements into complete, detailed system design document. Focus on how to deliver the required functionality.
SYNOPSIS ON STRGANOGRAPHY Page 27/38
Steganography – Synopsis
Microsoft .Net framework prepares a huge amount of tool and options for
programmers that they simples programming. One of .Net tools for pictures and
images is auto-converting most types of pictures to BMP format. I used this tool
in this software called “Steganography” that is written in C#.Net language and
you can use this software to hide your information in any type of pictures
without any converting its format to BMP (software converts inside it).
Algorithms and Techniques
There are three different techniques you can use to hide information in a
cover file:
1. Injection (or insertion) -
Using this technique, you store the data you want to hide in sections of a
file that are ignored by the processing application. By doing this you avoid
modifying those file bits that are relevant to an end-user—leaving the cover file
perfectly usable. For example, you can add additional harmless bytes in an
executable or binary file. Because those bytes don't affect the process, the end-
user may not even realize that the file contains additional hidden information.
However, using an insertion technique changes file size according to the amount
of data hidden and therefore, if the file looks unusually large, it may arouse
suspicion.
2. Substitution -
Using this approach, you replace the least significant bits of information
that determine the meaningful content of the original file with new data in a way
that causes the least amount of distortion. The main advantage of that technique
is that the cover file size does not change after the execution of the algorithm.
On the other hand, the approach has at least two drawbacks. First, the resulting
stego file may be adversely affected by quality degradation—and that may
arouse suspicion. Second, substitution limits the amount of data that you can
hide to the number of insignificant bits in the file
SYNOPSIS ON STRGANOGRAPHY Page 28/38
Steganography – Synopsis
3. Generation -
Unlike injection and substitution, this technique doesn't require an existing
cover file—this technique generates a cover file for the sole purpose of hiding
the message. The main flaw of the insertion and substitution techniques is that
people can compare the stego file with any pre-existing copy of the cover file
(which is supposed to be the same file) and discover differences between the
two. You won't have that problem when using a generation approach, because
the result is an original file, and is therefore immune to comparison tests.
Among the substitution techniques, a very popular methodology is
the LSB (Least Significant Bit) algorithm, which replaces the least
significant bit in some bytes of the cover file to hide a sequence of bytes
containing the hidden data. That's usually an effective technique in cases where
the LSB substitution doesn't cause significant quality degradation, such as in 24-
bit bitmaps.
The encrypt module is used to hide information into the image; no one can
see that information or file. This module requires any type of image and
message and gives the only one image file in destination.
SYNOPSIS ON STRGANOGRAPHY Page 29/38
Steganography – Synopsis
The decrypt module is used to get the hidden information in an image file.
It take the image file as an output, and give two file at destination folder, one is
the same image file and another is the message file that is hidden it that.
Before encrypting file inside image we must save name and size of file in a
definite place of image. We could save file name before file information in LSB
layer and save file size and file name size in most right-down pixels of image.
Writing this information is needed to retrieve file from encrypted image in
decryption state.
SYSTEM DESIGN
SYNOPSIS ON STRGANOGRAPHY Page 30/38
Steganography – Synopsis
System
Basic System Architecture
SYNOPSIS ON STRGANOGRAPHY Page 31/38
Steganography – Synopsis
Start Application
Encryption Decryption
BMP Image file
BMP image file
Image Message file
Message file
At Sender At Receiver
Use-Case
SYNOPSIS ON STRGANOGRAPHY Page 32/38
Steganography – Synopsis
Sender
Start Encrypt Module of system
Select & Load the Cover Image
Select & Load the File containing Secure Msg
Using Stego-Key for Encryption
<<includes>>
Start Decrypt Module of system
Embed Msg within cover image & Generate Stego-
Image
Send Stego image file
Receive Stego- image file
SYNOPSIS ON STRGANOGRAPHY Page 33/38
Steganography – Synopsis
Start Decrypt Module of system
Separate Secure file from stego-image
Generate & save file in specified path
Data Flow Diagram
Cover Image Secure Message
Bit stream Bit stream
SYNOPSIS ON STRGANOGRAPHY Page 34/38
Steganography – Synopsis
StegoSystem Encoder
Stego Image
Stego Image
Bit stream with changed LSB of cover image
Cover image Bit stream + Secure File Bit stream
SYNOPSIS ON STRGANOGRAPHY Page 35/38
Steganography – Synopsis
StegoSystem Decoder
Cover Image Secure Message
Original Bit streamOriginal Bit stream
StegoSystem Encoder
Cover Image
Secure Message
File
Stego Image
Stego image bit stream (cover image + message)
SYNOPSIS ON STRGANOGRAPHY Page 36/38
Steganography – Synopsis
StegoSystem Decoder
Secure Message
Control Flow Diagram
Loading Cover file bit stream
Loading Message file bit stream
Prepare Cover Data
EncodePrepared cover data with message data
SYNOPSIS ON STRGANOGRAPHY Page 37/38
Steganography – Synopsis
Generate Stego Data
SYNOPSIS ON STRGANOGRAPHY Page 38/38
Steganography – Synopsis
CONCLUSION
Steganography is a really interesting subject and outside of the mainstream
cryptography and system administration that most of us deal with day after day.
Steganography can be used for hidden communication. We have explored the
limits of steganography theory and practice. We printed out the enhancement of
the image steganography system using LSB approach to provide a means of
secure communication. A stego-key has been applied to the system during
embedment of the message into the cover image.
This steganography application software provided for the purpose to how to use
any type of image formats to hiding any type of files inside their. The master
work of this application is in supporting any type of pictures without need to
convert to bitmap, and lower limitation on file size to hide, because of using
maximum memory space in pictures to hide the file.
Since ancient times, man has found a desire in the ability to communicate
covertly. The recent explosion of research in watermarking to protect intellectual
property is evidence that steganography is not just limited to military or
espionage applications. Steganography, like cryptography, will play an
increasing role in the future of secure communication in the “digital world”.