steganography synopsis

36
STEGANOGRAPHY (A new technique to hide information within image file)

Upload: vandana-maurya

Post on 24-Oct-2014

374 views

Category:

Documents


59 download

TRANSCRIPT

Page 1: Steganography Synopsis

STEGANOGRAPHY

(A new technique to hide

information within image file)

Page 2: Steganography Synopsis

SYNOPSIS

STEGANOGRAPHY

( Secure Data Transfer using Steganography )

Submitted by

Sneh Verma 0834810039

Jyoti kushwaha 0834810018

Neha Chaudhary 0834810022

Vandana Maurya 0834810405

Gopal Krishna Kushwaha 0834810012

Page 3: Steganography Synopsis

in partial fulfillment for the award of the degree

of

B.Tech.

IN

Computer Science and Engineering

Under the Guidance

of

Mrs ABHILASHA VARSHNEY

PRANVEER SINGH ACADEMY OF TECHNOLOGY

APPROVED BY A.I.C.T.E. NEW DELHI

AFFILIATED TO G.B.T.U. LUCKNOW BHAUTI , KANPUR - 208001

Page 4: Steganography Synopsis

SESSION 2012-2013

Page 5: Steganography Synopsis

CERTIFICATE

This is to certify that project report entitled “SECURE DATA TRANSFER USING STEGANOGRAPHY “ which is submitted by SNEH VERMA,JYOTI KUSHWAHA, NEHA CHAUDHARY, VANDANA MAURYA and GOPAL KRISHNA KUSHWAHA in partialfulfillment of the requirements for the award of degree B.Tech in department of ComputerScience & Engineering of U.P. Technical University is a record of the candidates own workcarried out by them under our supervision. The matter embodied in this dissertation is original and has not been submitted for the award of any other degree.

MR PRADEEP RAI

HEAD OF DEPARTMENT

(CS & IT DEPARTMENT)

INTERNAL EXAMINER EXTERNAL EXAMINER

Page 6: Steganography Synopsis

ACKNOWLEDGEMENT It gives us a great sense of pleasure to present the report of the B.Tech project undertaken during B.Tech Final Year. We owe special debt of gratitude to our Project Guide Mrs Abhilasha Varshney, PRANVEER SINGH ACADEMY OF TECHNOLOGY, Kanpur for her constant support and guidance throughout the course of our work. Her sincerity, thoroughness and perseverance have been a constant source of inspiration for us. It is only her cognizant efforts that our endeavors have seen light of the day. We also take the opportunity to acknowledge the contribution of Mr. PRADEEP RAI, Head Of Department Computer Science & Information Technology, Pranveer Singh Academy of Technology, Kanpur for his full support and assistance during the development of the project. We also do not like to miss the opportunity to acknowledge the contribution of all faculty members of the department for their kind assistance and cooperation during the development of our project. Last but not the least, we acknowledge our friends for their contribution in the completion of the project.

Page 7: Steganography Synopsis

Sneh Verma

Jyoti Kushwaha

Neha Chaudhary

Vandana Maurya

Gopal Krishna kushwaha

Page 8: Steganography Synopsis

ABSTRACT

Steganography is the art of hiding the fact that

communication is taking place, by hiding information in

other information. Many different carrier file formats can

be used, but digital images are the most popular because

of their frequency on the internet. For hiding secret

information in images, there exists a large variety of

steganography techniques some are more complex than

others and all of them have respective strong and weak

points. Different applications may require absolute

invisibility of the secret information, while others require

a large secret message to be hidden. This project report

intends to give an overview of image steganography, its

uses and techniques. It also attempts to identify the

requirements of a good steganography algorithm and

briefly reflects on which steganographic techniques are more suitable

for which applications.

Page 9: Steganography Synopsis

Table of ContentsTable of Contents...........................................................................5List of Figures.................................................................................14Chapter 1: Introduction and Overview........................................101.1 Introduction ..............................................................................101.2 Background of the problem………………………………………..101.3 Objective of project...................................................................111.4 Project modules .......................................................................121.5 Scope…………………………………………………………….......12Chapter 2: Requirement Analysis................................................132.1User’s requirement.....................................................................132.1.1 Software specification............................................................132.1.2 Hardware specification.......................................................... 132.1.3Description of technology …………………………...................142.1.3.1 C#.......................................................................................14

Page 10: Steganography Synopsis

2.1.3.2 Microsoft .NET platform……………………………...............152.1.3.2.1. NET framework……………………...................................152.1.3.2.2 Basic components of .NET framework…………………….162.1.3.2.3 IDE visual studio2010………………………………………..192.1.3.2.4 Advantages of C#.NET…………………………………….202.1.3.2.5 C#.Net architecture…………………………………..........222.1.3.2.6 File name Extension…………………………………………242.1.3.2.7 Understanding Namespaces……………………...............242.1.3.2.8 Execution cycle………………………………………………252.1.3.2.9 C#.NET controls……………………………………………26 PHP....................................................................................312.1.3.5 Microsoft office access………………………………………..34Chapter 3: Methodology.................................................................................373.1 project category........................................................................373.2 SDLC model Used ...................................................................373.2.1 Waterfall Model …………………...………………….…............37

Page 11: Steganography Synopsis

3.3 Project Planning........................................................................39

Chapter 4:System Design ………………………………………………………...42Chapter 5: System Analysis ………………………………………...455.1 Introduction ...............................................................................455.1.1 System Analysis ....................................................................455.2.4 Data flow diagram....................................................................51 5.2.4.1 0’level DFD……….…………………………..................51 5.2.4.2 1’level DFD……………………………………………....52 5.2.4.3 2’level DFD………………….……………………………535.2.5 Data tables ………………………………………………………..54Chapter 6: System Design............................................................566.1 Introduction ...............................................................................566.2 Entity relationship diagram.........................................................58 6.2.1 Introduction ..................................................................58

Page 12: Steganography Synopsis

6.2.2 ER Diagram...................................................................60Chapter 7 Implementation and testing..........................................617.1 Introduction ................................................................................61 7.1.1 Implementation…………………………………………….61 7.1.2 Code optimization……………..………………………….617.2 Testing……………………………………………………………….63Chapter 8: Snapshot…………………………………………………..668.1 Desktop Application module .....................................................668.2 Web application module.............................................................67 8.2.1 Home Page………………………….……………………..67 8.2.2 Register Page……………………………………………..68 8.2.3 Login Page…………………………………………………698.3 Mobile Application module………………………………………..69Chapter 9 Conclusion and Future Enhancement......................719.1 Conclusions…………………………………………………………719.2 Future Scope………………………………………………………..71

Page 13: Steganography Synopsis

Bibliography..................................................................................73

List of FiguresFigure 2.1: Compilation of code in C#.NET......................................19Figure 2.2: Architecture of .NET framework…………………………..22Figure 3.1: Waterfall model..............................................................38Figure 3.2 Project life cycle.............................................................24Figure 4.1: Three Tier Architecture ................................................42Figure 5.1: Requirement of risk analysis ........................................49Figure 5.2: Flow Diagram................................................................50Figure 5.3: 0’level DFD ..................................................................51Figure 5.4: 1’level DFD…………………………………………………52Figure 5.5: 2’level DFD…………………………………………………53Figure 5.6 Database Tables...........................................................54Figure 6.1: System Design.............................................................56Figure 6.2: ER Diagram……………………………….………………58Figure 6.3: Snapshots…………………………………………………66[

Page 14: Steganography Synopsis

CHAPTER -1 INTRODUCTION AND OVERVIEW OF PROJECT

1.1 INTRODUCTION :

One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists.

1.2 Background of the Problem Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevent the detection of hidden messages. Steganography include an array of secret communication methods that hide the message from being seen or discovered.

The goal of steganography is to avoid drawing suspicion to the existence of a hidden message. This approach of information hiding technique has recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hiddin copyright notice or serial number or even help to prevent unauthorized copying directly.

Page 15: Steganography Synopsis

1.3 Objective

This project comprehends the following objectives:

(i) To produce security tool based on steganographic techniques. (ii) To explore techniques of hiding data using steganography.

1.4 Project Modules There are three modules in the project: 1. Encryption module 2. Decryption module 3. Communication module

1.5 Scope

The scope of the project as follow: (i) Implementation of steganographic tools for hiding information

includes text and image files. (ii) Three different approaches being explored which are least

significant bit, masking and filtering and algorithms and transformation.

Page 16: Steganography Synopsis

Page 16/28

2 Requirement Analysis:

2.1 user’s requirement

Page 17: Steganography Synopsis

Page 17/28

INTRODUCTION

One of the reasons that intruders can be successful is the most of the

information they acquire from a system is in a form that they can read and

comprehend. Intruders may reveal the information to others, modify it to

misrepresent an individual or organization, or use it to launch an attack. One

solution to this problem is, through the use of steganography. Steganography is

a technique of hiding information in digital media. In contrast to cryptography, it

is not to keep others from knowing the hidden information but it is to keep

others from thinking that the information even exists.

Steganography become more important as more people join the cyberspace

revolution. Steganography is the art of concealing information in ways that

prevents the detection of hidden messages. Stegranography include an array of

secret communication methods that hide the message from being seen or

discovered.

Due to advances in ICT, most of information is kept electronically. Consequently,

the security of information has become a fundamental issue. Besides

cryptography, streganography can be employed to secure information. In

cryptography, the message or encrypted message is embedded in a digital host

before passing it through the network, thus the existence of the message is

unknown. Besides hiding data for confidentiality, this approach of information

hiding can be extended to copyright protection for digital media: audio, video

and images.

The growing possibilities of modern communications need the special means of

security especially on computer network. The network security is becoming more

important as the number of data being exchanged on the internet increases.

Therefore, the confidentiality and data integrity are requires to protect against

Page 18: Steganography Synopsis

Page 18/28

unauthorized access and use. This has resulted in an explosive growth of the

field of information hiding

Information hiding is an emerging research area, which encompasses

applications such as copyright protection for digital media, watermarking,

fingerprinting, and steganography.

In watermarking applications, the message contains information such as

owner identification and a digital time stamp, which usually applied for copyright

protection.

Fingerprint, the owner of the data set embeds a serial number that

uniquely identifies the user of the data set. This adds to copyright information to

makes it possible to trace any unauthorized used of the data set back to the

user.

Steganography hide the secrete message within the host data set and

presence imperceptible and is to be reliably communicated to a receiver. The

host data set is purposely corrupted, but in a covert way, designed to be

invisible to an information analysis.

Page 19: Steganography Synopsis

Page 19/28

SYNOPSIS

Project Name: STEGANOGRAPHY

Project Members:

This project is done in a group of two people. Project members are.

1.2.

Page 20: Steganography Synopsis

Page 20/28

What is Steganography?

Steganography is the practice of hiding private or sensitive information within

something that appears to be nothing out to the usual. Steganography is often

confused with cryptology because the two are similar in the way that they both

are used to protect important information. The difference between two is that

steganography involves hiding information so it appears that no information is

hidden at all. If a person or persons views the object that the information is

hidden inside of he or she will have no idea that there is any hidden information,

therefore the person will not attempt to decrypt the information.

What steganography essentially does is exploit human perception, human

senses are not trained to look for files that have information inside of them,

although this software is available that can do what is called Steganography. The

most common use of steganography is to hide a file inside another file.

Page 21: Steganography Synopsis

Page 21/28

History of Steganography:

Through out history Steganography has been used to secretly communicate

information between people.

Some examples of use of Steganography is past times are:

1. During World War 2 invisible ink was used to write information on pieces of

paper so that the paper appeared to the average person as just being

blank pieces of paper. Liquids such as milk, vinegar and fruit juices were

used, because when each one of these substances are heated they darken

and become visible to the human eye.

2. In Ancient Greece they used to select messengers and shave their head,

they would then write a message on their head. Once the message had

been written the hair was allowed to grow back. After the hair grew back

the messenger was sent to deliver the message, the recipient would shave

off the messengers hair to see the secrete message.

3. Another method used in Greece was where someone would peel wax off a

tablet that was

Page 22: Steganography Synopsis

Page 22/28

Why This Steganography?

This technique is chosen, because this system includes not only imperceptibility

but also un-delectability by any steganolysis tool.

Project Scope:

This project is developed for hiding information in any image file. The scope of

the project is implementation of steganography tools for hiding information

includes any type of information file and image files and the path where the user

wants to save Image and extruded file.

Methodology:

User needs to run the application. The user has two tab options – encrypt and

decrypt. If user select encrypt, application give the screen to select image file,

information file and option to save the image file. If user select decrypt,

application gives the screen to select only image file and ask path where user

want to save the secrete file.

This project has two methods – Encrypt and Decrypt.

In encryption the secrete information is hiding in with any type of image file.

Decryption is getting the secrete information from image file.

Page 23: Steganography Synopsis

Page 23/28

Software Requirements:

.NET Framework 3.5

Hardware Requirements:

Processor: Preferably 1.0 GHz or Greater.

RAM : 512 MB or Greater.

Page 24: Steganography Synopsis

Page 24/28

Encryption Process

IMAGE FILE INFORMATION FILE

BMP FILE

Page 25: Steganography Synopsis

Page 25/28

Decryption Process

BMP FILE

INFORMATION FILE IMAGE FILE

Page 26: Steganography Synopsis

Page 26/28

Limitations of the Software:

This project has an assumption that is both the sender and receiver must have

shared some secret information before imprisonment. Pure steganography

means that there is none prior information shared by two communication

parties.

Page 27: Steganography Synopsis

Page 27/28

Summary

Steganography is a really interesting subject and outside of the mainstream

cryptography and system administration that most of us deal with day after day.

Steganography can be used for hidden communication. We have explored the

limits of steganography theory and practice. We printed out the enhancement of

the image steganography system using LSB approach to provide a means of

secure communication. A stego-key has been applied to the system during

embedment of the message into the cover image.

This steganography application software provided for the purpose to how to use

any type of image formats to hiding any type of files inside their. The master

work of this application is in supporting any type of pictures without need to

convert to bitmap, and lower limitation on file size to hide, because of using

maximum memory space in pictures to hide the file.

Since ancient times, man has found a desire in the ability to communicate

covertly. The recent explosion of research in watermarking to protect intellectual

property is evidence that steganography is not just limited to military or

espionage applications. Steganography, like cryptography, will play an

increasing role in the future of secure communication in the “digital world”.

Page 28: Steganography Synopsis

Page 28/28

Bibliography

WebsitesFollowing websites are referring to create this project reports.

http://www.google.com

http://www.microsoft.com

http://www.asp.net

http://www.wikipedia.org

BooksFollowing books and ebook are used to complete this project reports.

Mastering C# (Paperback)

SQL Server Bible (Paperback)

.NET Black Book (Paperback)

Professional C#, 2nd Edition (Paperback)

Professional ASP.NET (Paperback)

MCAD/MCSD Self-Paced Training Kit: Developing Web Applications with

Microsoft® Visual Basic® .NET and Microsoft Visual C#® .NET, Second Edition

MCAD/MCSE/MCDBA Self-Paced Training Kit: Microsoft SQL Server 2000 Database

Design and Implementation, Exam 70-229, Second Edition