TITLE
EFFICIENT & SECURE MULTIMEDIA USING VIDEO
EMBED TECNIQUE WITH
TINY ALGORITHAM
1
CONTAINTS
1.INTRODUCTION
2.ABSTRACT
3.OBJECTIVE
4.TINY-ALGORITHM
5. TOOLS AND PLATFORM
6. MODULE DESCRIPTION
7.CONCLUSION
8.REFERENCES
2
INTRODUCTION
Encryption of data plays a vital role in the real time environment to keep the data out of
reach of unauthorized people, such that it is not altered and tampered and sending the in
video format is most secured way to transfer the data through the network. The Video
Stegnography is software, which tries to alter the originality of the file into some
encrypted form and embed the file into an video file. The major task of the Video
Stegnography is to provide the user the flexibility of passing the information
implementing the encryption standards as per the specification and algorithms proposed
and store the information in a form that is unreadable. The Application should have a
reversal process as of which should be in a position to de embed the data file from video
file and decrypt the data to its original format upon the proper request by the user. While
the Encryption and Decryption is done the application should confirm the standards of
authentication and authorization of the user.
The Entire application should strive to achieve a user friendly Graphical User Interface,
which need to be in a self-learning mode for the end user. The System Should provide all
the functional standards of proper navigation with in the environment, which makes it
possible for the users to have a smooth flow while working under the environment. The
Overall system should provide proper menu based navigation for easier navigation and
operation. The Application should be designed in such a way that, as soon as it starts
create a Buffer and associate this buffer to some homogeneous data environment, the
application should ask the user for the Encryption Key details and should start its
functionality upon the logistics that are provided with in this key. The key should be
designed in such a way that it prevents the unauthorized persons from stealing the
information at any point of time. This is some part of securing the data from third party
3
people. And the other way of securing the data is using Steganography in which
embedding the encrypted file in to a video file. If any one track that file they only see the
video file not the data.
The application of De-embedding, Decryption should be a reverse process at the other
end and should be translated only when the receiver of the data applies the proper
reversal key. The Decryption process should have a log-based methodology that will take
care of any errors that may be encountered while the system is under utilization and
should record all those events, which are above the general standards of security.
This system basically uses the Tiny Encryption Algorithm to encrypt the passwords. This
algorithm is a 64-bit block cipher with a variable length key. This algorithm has been
used because it requires less memory. It uses only simple operations, therefore it is easy
to implement.
4
Problem statement
Dependability ,a generic concept –defined as the trustworthiness of a computer system
such that reliance can Justifiably be placed on the service it delivers – may be viewed
w.r.t. different properties and so enables the definition of a number of different
dependability attributes , including: availability (w.r.t. readiness for usage ), reliability
(w.r.t. continuity of service), safety (w.r.t. avoidance of catastrophic
Consequences on the environment ) security (w.r.t. prevention of unauthorized access
and/or handling of information, i.e., provision of data integrity and confidentiality ).
Some of these attributes (reliability/availability and security) are often considered
separately because the Techniques used to achieve them are usually perceived as being
Mutually antagonistic. Firstly, reliability and availability are generally
Achieved by Incorporating mechanisms for Tolerating any
Faults (especially accidental faults) tha occur, or that remain despite attempts at fault
prevention durin the system design process.
These techniques will Of necessity involve space and/or time redundancy; they can easily
take advantage of a Distributed computing architecture by means of replicated
computation
Using sets of untrusted 1(or fallible)
processors.
Most notably, it suffers from equivalent keys—each key is equivalent to three others,
which means that the effective key size is only 126 bits. As a result, Some Algo is
especially bad as a cryptographic hash function. This weakness led to a method for
hacking Microsoft's Xbox game console, where the cipher was used as a hash function.
Some Algo is also susceptible to a related-key attack which requires 223 chosen
plaintexts under a related-key pair, with 2 32 time complexity. Because of these
weaknesses, the TEA cipher was designed.
5
OBJECTIVE
The project has the following objectives:
1. To create a tool that can be used to hide data inside a 24 bit color image.
2. The tool should be easy to use, and should use a graphical user interface.
3. The tool should work cross-platform.
4. The tool should effectively hide a message using an image degradation
approach, and should be able to retrieve this message afterwards.
5. The tool should take into account the
original content, to theoretically more effectively hide the message.
6. The tool should be able to provide some information as to the
effectiveness of the hiding i.e. it should be able to evaluate the degradation
of an image. The analysis used will consist of existing watermarking measures,
re- implemented for this tool.
7. The technique should fall under the category of Secret Key
Steganography -where without the key the hidden message cannot be
retrieved.
8. The tool should be able to encrypt the message before embedding it.
6
RESEARCH PART
Tiny Encryption Algorithm:
The Tiny Encryption Algorithm (TEA) is a cryptographic algorithm designed to
minimize memory footprint and maximize speed. It is a Feistel type cipher that uses
operations from mixed (orthogonal) algebraic groups. This research presents the
cryptanalysis of the Tiny Encryption Algorithm. In this research we inspected the
most common methods in the cryptanalysis of a block cipher algorithm. TEA seems to
be highly resistant to differential cryptanalysis, and achieves complete diffusion
(where a one bit difference in the plaintext will cause approximately 32 bit differences
in the cipher text) after only six rounds. Time performance on a modern desktop
computer or workstation is very impressive.
Block ciphers where the cipher text is calculated from the plain text by repeated
application of the same transformation or round function. In a Feistel cipher, the text
being encrypted is split into two halves. The round function, F, is applied to one half
using a sub key and the output of F is (exclusive-or-ed (XORed)) with the other half.
The two halves are then swapped. Each round follows the same pattern except for the
last round where there is often no swap. The focus of this thesis is the TEA Feistel
Cipher.
7
Hardware & Software Requirement
8
Hardware requirement: The hardware needed for this project are listed below. The
specification of the PC is:
Processor Intel Pentium 4-1.3GHz or faster
or AMD
Ram 512 MB DDR-Win XP
2GB DDR- Vista Business or
Vista Ultimate
Hard drive 1 GB
Memory 512 MB
Monitor Any standard monitor
Software requirement: In order to carry out the development of this project, many
software are needed, these include Microsoft Windows XP, which shall be the operating
system for the project to be developed;
Front End: JDK, Java
IDE : Netbeans 6.9 and Above
Backend: MySql
MODULE DESCRIPTION
9
The project consists of mainly four modules encryption, hide message, retrieve
message and decryption. Encryption and hide message form the modules. retrieve
message and decryption form the modules .
Encryption
Encryption includes a message or a file encrypting. Encryption involves
converting the message to be hidden into a cipher text. Encryption can be done by
passing a secret key.Secret key can be used for encryption of the message to be
hidden.It provides security by converting it into a cipher text,which will be difficult
for hackers to decrypt. Moreover if the message is password protected,then while
retrieving message,the retriever has to enter the correct password for viewing the
message.
Hide Message
Hiding message is the most important module of steganography.It involves
embedding the message into the cover text. Each pixel typically has three numbers
associated with it, one each for red, green, and blue intensities, and these values
often range from 0-255.In order to hide the message,data is first converted into byte
format and stored in a byte array.The message is then encrypted and then embed
each bits into the LSB position of each pixel position. The least significant
(rightmost) bit of each 8-bit byte has been co-opted to hide a text message.
Retrieve Message
It involves retrieving the embed message from the file independent of
the file format. Once the message has been retrieved it has to be converted into
original message or file.
10
This can be done by reading the embedded data from the master file. The read data
will be in the bytes format. This message has to be converted into the suitable
output file format.
Decryption
Decryption includes a message or a file decrypting. Decryption involves converting
the cipher text into decrypted format. Decryption can be done by passing a secret
key. Secret key can be used for decryption of the message that is hidden. It provides
security by converting the cipher text, into the original data message or file .
Moreover if the message is password protected, then while retrieving message, the
retriever has to enter the correct password for viewing the message.
11
CONCLUSION
The entire project has been developed and deployed as per the
requirements stated by the user, it is found to be bug free as per the
testing standards that is implemented. Any specification-untraced errors
will be concentrated in the coming versions, which are planned to be
developed in near future. The system at present does not take care of
lower level check constraints in accessing the file types in distributed
environments, which is to be considered in the future up gradations.
As per the present status the project developed is well equipped to
handle the Central file system of an organization in a server and provide
access to the users with various privileges as prescribed by the higher
authorities in the password file.
12
REFERENCES
BOOKS AND MANUALS :-
1.JAVA-2 Complete-Reference
Author : Patric Norton & Herberlt Schild
Publisher : Tata McGraw Hill
2.System Analysis & Designing
Author : James A. senn
Publisher : Tata McGraw Hill
3.Software Engineering Concepts
Author : Fairley
Publisher : Tata McGraw Hill Publication,3rd
Edition.
13