Project Steganography
Project Steganography
INTRODUCTION
Steganography is the art and science of communicating in a way which hides the existence of the communication , which is the art of hiding information in ways that prevent the detection of hidden messages . Steganography, derived from Greek, literally means covered writing . It includes a vast array of secret communications methods that conceal the message's very existence . These methods include invisible inks , microdots , character arrangement, digital signatures, covert channels , and spread spectrum
communications.
Steganography and Cryptography are cousins in the spy craft family. A message in cipher text , for instance , might arouse suspicion on the part of the recipient while an " invisible " message created with Steganography methods will not. In contrast to
Cryptography ,where the " enemy " is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a Cryptosystem ,the goal of Steganography is to hide messages inside other " harmless " messages in a way that does not message present. allow any " enemy " to even detect that there is a second secret
Now Steganography is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Steganography in images has truly come of age with the invention of fast ,powerful computers. The most popular technique in image Steganography is Least Significant Bit Insertion . More precisely, as Kuhn puts it : The goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to detect that there is a second secret message present.
Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevents the detection of hidden messages. Stegranography include an array of secret communication methods that hide the message from being seen or discovered. Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, streganography can be employed to secure information. In cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images. The growing possibilities of modern communications need the special means of security especially on computer network. The network security is becoming more important as the number of data being exchanged on the internet increases. Therefore, the
confidentiality and data integrity are requires to protect against unauthorized access and use. This has resulted in an explosive growth of the field of information hiding.
The advantage of Steganography is that it can be used to secretly transmit messages without the fact of the transmission being discovered .Often, using encryption might identify the sender or receiver as somebody with some-thing to hide . For example ,that picture of your cat could conceal the plans for your company's latest technical innovation. However ,Steganography has a number of disadvantages as well .Unlike encryption ,it generally requires a lot of overhead to hide a relatively few bits of information . However, there are ways around this . Also, once a Steganographic system is discovered , it is rendered useless. This problem, too , can be overcome if the hidden data depends on some sort of key for its insertion and extraction.
2. History of Steganography During World War 2 invisible ink was used to write information on pieces of paper. In Ancient Greece they used to select messengers and shave their head, they would then write a message on their head. Another method used in Greece was where someone would peel wax off a tablet that was covered in wax, write a message underneath the wax then re-apply the wax. Pirate legends tell of the practice of tattooing secret information, such as a map, on the head of someone, so that the hair would conceal it. There are rumors that during the 1980's Margareth Thatcher, then Prime Minister in UK, became so irritated about press leaks of cabinet documents, that she had the word processors programmed to encode the identity of the writer in the word spacing, thus being able to trace the disloyal ministers. During the "Cold War" period, US and USSR wanted to hide their sensors in the enemy's facilities. These devices had to send data to their nations, without being spotted. Today, steganography is researched both for legal and illegal reasons. Among the first ones there is war telecommunications, which use spread spectrum or meteor scatter radio in order to conceal both the message and its source. In the industry market, with the advent of digital communications and storage, one of the most important issues is copyright enforcement, so digital watermarking techniques are being developed to restrict the use of copyrighted data.
3. Types of Steganography:
Text Steganography : Since everyone can read, encoding text in neutral sentences is doubtfully eective. But taking the rst letter of each word of the previous sentence, you will see that it is possible and not very dicult. Encoding secret messages in text can be a very challenging task. This is because text files have a very small amount of redundant data to replace with a secret message. Image Steganography : Coding secret messages in digital images is by far the most widely used of all methods in the digital world of today. This is because it can take advantage of the limited power of the human visual system (HVS) Audio Steganography : Because of the range of the human auditory system (HAS), data hiding in audio signals is especially challenging. The HAS perceives over a range of power greater than one billion to one and range of frequencies greater than one thousand to one. Also, the auditory system is very sensitive to additive random noise. Any disturbances in a sound file can be detected as low as one part in ten million (80dB below ambient level). Printed steganography : Digital steganography output may be in the form of rinted documents. A message, the plaintext, may be first encrypted by traditional means, producing a ciphertext. Then, an innocuous covertext is modified in some way so as to contain the ciphertext, resulting in thestegotext. For example, the letter size, spacing, typeface, or other characteristics of a covertext can be manipulated to carry the hidden message. Only a recipient who knows the technique used can recover the message and then decrypt it. Francis Bacon developed Bacon's cipher as such a technique.
4. Project Scope:
This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file and image files and the path where the user wants to save Image and extruded file.
The user should be able to select and view the picture from which to decode.
When the decode is demanded the encryption key should be demanded and when entered the decrypted text displayed. He should be able to save the decrypted text message in a file. The picture inside picture option should have all the above qualities like view both, compare and decide whether to proceed, and also have an option to save the new image where the user chooses.
To retrieve the picture the user must be able to view it, and then retrieve and save the picture
6. Methodology:
User needs to run the application. The user has two tab options encrypt and decrypt. If user select encrypt, application give the screen to select image file, information file and option to save the image file. If user select decrypt, application gives the screen to select only image file and ask path where user want to save the secrete file. This project has two methods Encrypt and Decrypt. In encryption the secrete information is hiding in with any type of image file. Decryption is getting the secrete information from image file.
8. HARDWARE SPECIFICATION Processor RAM Hard Disk Cache Monitor Keyboard Mouse : : : : : : : Pentium. 64 MB. 2 GB. 512 KB. SVGA Color Monitor. 101 keys. 2 buttons.
Each of these can be applied to various images, with varying degrees of success. Each of them suffers to varying degrees from operations performed on images, such as cropping, or resolution decrementing, or decreases in the colour depth. LEAST SIGNIFICANT BIT INSERTION: One of the most common techniques used in steganography today is called least significant bit (LSB) insertion. This method is exactly what it sounds like; the least significant bits of the cover-image are altered so that they form the embedded information. The following example shows how the letter A can be hidden in the first eight bytes of three pixels in a 24-bit image.
Pixels: (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) A: 10000001
Result:
The three underlined bits are the only three bits that were actually altered. LSB insertion requires on average that only half the bits in an image be changed. Since the 8-bit letter A only requires eight bytes
to hide it in, the ninth byte of the three pixels can be used to hide the next character of the hidden message. A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity of the cover-object, but the coverobject degrades more statistically, and it is more detectable. Other variations on this technique include ensuring that statistical changes in the image do not occur. Some intelligent software also checks for areas that are made up of one solid color. Changes in these pixels are then avoided because slight changes would cause noticeable variations in the area.
> A slight variation of this technique allows for embedding the message in two or more of the least significant bits per byte. This increases the hidden information capacity.
Other techniques encrypt and scatter the hidden throughout the image in some predetermined manner. It is assumed that even if the message bits are extracted, they will be useless without the algorithm and stegokey to decode them. Although such techniques do help protect against hidden message extraction, they are not immune to destruction of the hidden message through image manipulation.
BMP FILE
Encryption - Encryption is the process of passing data or plaintext through a series of mathematical operations that generate an alternate form of the original data known as ciphertext. The encrypted data can only be read by parties who have been given the necessary key to decrypt the cipher text back into its original plaintext form. Encryption doesn't hide data, but it does make it hard to read! In encryption the secret information is hiding in with any type of image file.
INFORMATION FILE
IMAGE FILE
Decryption - The process of decoding data that has been encrypted into a
secret format. Decryption requires a secret key or password. Decryption is getting the secrete information from image file.
Flow Diagram