0% found this document useful (0 votes)
14 views20 pages

Final

Uploaded by

anasuyarongala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views20 pages

Final

Uploaded by

anasuyarongala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

ENHANCING

HISTORICAL DATA
PRESERVATION: A
ROBUST
STEGANOGRAPHIC
FRAMEWORK WITH
Presented By : S.B.L.S.Mehar, O.Likitha, S.
STEGHIDE
Sudhanya, R.Lohitha
KL University | 2024
2
AGENDA
• Abstarct • Methodology • References

• Introduction • Results • Thank You

• Literary Review • Conclusion

• Objectives • Future Scope


3
ABSTRACT
This research enhances the Steghide tool, traditionally used
for covert communication by embedding data within media
such as images and audio. By integrating the Advanced
Encryption Standard (AES) and Least Significant Bit (LSB)
methods, we provide improved preservation of historical data,
ensuring both privacy and security through additional
encryption layers. Our approach strengthens data integrity,
protecting records from unauthorized access or tampering.
Steghide's simple interface allows users to securely conceal
data within files of varying sizes, offering a reliable and
ethical solution for secure archival practices and historical
4
INTRODUCTION
• Today, we face the challenge of managing
and protecting large volumes of sensitive
historical data, which is stored for long-
term analysis and reference.
• This study highlights steganography as an
effective way to hide important
information within media files like images
and audio, making it less detectable.
5

• Unlike cryptography, which scrambles data, steganography


conceals the existence of hidden data, allowing it to blend in
with ordinary files.
• The hidden data can be stored in regular files, providing an
extra layer of protection, even without encryption.
• To enhance security, we use AES encryption (Advanced
Encryption Standard), which protects data with 128- or 256-bit
keys, ensuring that only authorized users can access it.
• Even if the carrier file is intercepted, the hidden data remains
secure and unreadable without the right decryption key.
• Our proposed method combines steganography with AES
encryption to improve privacy and security without distorting
6
LITERATURE REVIEW
S.No Paper Title Year of Journal/ Observations Limitations
Publicati Publiser
on
1. Historical data as a baseline for 2015 Royal Society Preserving historical data is vital for
conservation: reconstructing long- understanding long-term changes, and
term faunal extinction dynamics altering it risks distorting scientific
in Late Imperial–modern China knowledge and undermining trust.

2. Enhancing Arabic Text 2022 International Firgured out security method like
Steganography Based on Unicode Journal of Steganography which balances effective
Features Computing data concealment with challenges like
and Digital technological obsolescence, security
Systems risks, and privacy concerns.

3. Study of Cryptography and 2015 International The combination of cryptography and


Steganography System Journal Of steganography strengthens secure
Engineering communication by embedding data
And within media files, making it nearly
Computer undetectable while leveraging human
Science ISSN sensory limitations.

4. A Novel Approach to Image 2024 Research The proposed LSB-based steganography


Steganography: A Fusion of Square approach enhances data security by
Chaotic and Genetic Algorithms embedding information into image
for Unbreakable Data Hiding pixels, adding an extra layer of integrity
7
S.N Paper Title Year of Journal/Publiser Observations Limitations
o Publication
5. An Effective Predictive 2020 International Journal of The proposed probabilistic model
Maintenance Approach Prognostics and Health leverages historical maintenance
based on Historical Management data to predict high-risk failure
Maintenance Data intervals, enabling effective health
using a Probabilistic assessment and predictive
Risk Assessment: maintenance of industrial assets.
PHM14 Data Challenge

6. Steganography 2023 spiedigitallibrary This paper redefines


Capacity: A steganography's security and
Steganalysis capacity in relation to steganalysis,
Perspective emphasizing covert communication
while accounting for the
effectiveness of detection methods.
7. An Examination on 2014 International Journal of Steganographic tools hide data
Information Hiding Information Security within various digital media using
Tools for sophisticated methods, enhancing
Steganography secure communication, though
ethical concerns and regulatory
oversight are necessary to prevent
misuse.
8
S.No Paper Title Year of Journal/Publiser Observations Limitations
Publicati
on
8. Improving the Robustness 2021 IEEE Signal Processing Robust steganography
of JPEG Steganography With Letters enhances covert
Robustness Cost communication over social
networks by improving
resistance to JPEG
recompression, achieving
stronger robustness while
maintaining high security with
minimal performance
reduction.
9. A Survey of Steganography 2023 The 18th International Network steganography, or
Tools at Layers 2-4 and Conference on Availability, "Covert Channels," has
HTTP Reliability and Security advanced significantly, with
tools developed for hiding data
in layers 2 to 4 of the ISO/OSI
model and the HTTP protocol,
raising concerns about
potential false positives in
security systems.
10. Performance Analysis of 2020 4th International The study analyzes the
Open Puff Steganography Conference: Innovative performance of the OpenPuff
Tool Using Advancement in Engineering steganography tool on various
Various Image Formats & Technology (IAET) 2020 image formats (JPEG, BMP,
PNG), comparing robustness,
9
OBJECTIVES
Objective I Objective II

The objective of this paper is The paper proposes a


to develop a robust scalable solution for long-
framework for securely term historical data
preserving historical data by preservation, enhancing
utilizing Steghide integrated steganography detection
with AES encryption and the resistance while minimizing
Least Significant Bit (LSB) media quality impact.
method.
10
METHODOLOGY
Step I Select historical data to be embedded (text,
image, or audio) which is considered as Secret
Message.
Generate the Stego Key through AES Encryption
Step II
which is a popular Symmetric algorithm due its
strong security properties.

With the help of Generated stego key hide the


Step III
secret Message(In form of text, Image) into stego
Media (image, audio).
11

Step IV The file becomes a Encrypted file. (Secret Message


+
Key =Encrypted File) is embeded in Stego Media.

Step V For Decryption, abstract the Encrypted file from


Stego Media.

Step VI Using OpenSSL decrypt the above abstarcted file.


Architecture of Steghide
12
Integration
13
RESULTS
1.Embedding Historical Data in
Images

• Decryption confirmed
that the cover image
preserved the
embedded text without
any loss of data
integrity.
Decrypting Secret text from stego
Image
14
II. Hiding Secret Data in Cover Audio
File

• Secret text extraction


from the cover audio
was successful, with
complete data integrity
maintained throughout
the process.

Abstracting Secret Text from stego


audio
15
III.Hiding Secret Image in a Cover
Audio File

• The secret image was


successfully extracted
from the stego audio,
confirming full integrity
of the hidden image.

Abstracting Secret Image from stego


Audio
16
FUTURE SCOPE
• As steganography detection tools evolve, future improvements
in Steghide and similar tools will focus on making the hidden
data even more resistant to steganalysis and digital forensics.

• Future extensions of the framework could include cloud


integration for storing and retrieving historical data securely.
Moreover, using distributed systems (e.g., blockchain) could
provide an additional layer of security and redundancy for long-
term preservation.
17
CONCLUSION
• Successfully developed a framework using Steghide, AES
encryption to securely embed historical data into images and
audio files.
• The embedded data was fully retrieved with 100% accuracy even
if it is audio and image also there is no change in their quality,
confirming the integrity and security of the hidden data.
• The proposed system provides an innovative solution for covertly
storing historical data while ensuring that it remains secure and
protected from unauthorized access.
18
REFERENCES
• Lee, Dong & Lee, Tai Sik. (2004). The improvement & management of
historical data at the construction site —Focused on the supervision
committee—. KSCE Journal of Civil Engineering. 8. 479-489.
10.1007/BF02899575.
• Lockwood, Robert & Curran, Kevin. (2017). Text based steganography.
Interna-tional Journal of Information Privacy, Security and Integrity. 3.
134. 10.1504/IJIPSI.2017.10009581.
• Srilakshmi, P. & Himabindu, Ch & Chaitanya, N. & Muralidhar, S.V. &
Sumanth, M.V. & Vinay, K.. (2018). Text embedding using image ste-
ganography in spatial domain. In-ternational Journal of Engineering and
Technology(UAE). 7. 1-4. 10.14419/ijet.v7i3.6.14922.
19

• Aggarwal, Shruti & Gurusamy, Vasukidevi & Sethuramalingam,


Selvakanmani & Pant, Bhaskar & Kaur, Kiranjeet & Verma, Amit &
Binegde, Geleta. (2022). Audio Segmen-tation Techniques and
Applications Based on Deep Learning. Scientific Programming. 2022. 1-
9. 10.1155/2022/7994191.
• Rajkumar, Gat & Malemath, Virendra. (2017). Video Steganography:
Secure Data Hid-ing Technique. International Journal of Computer Network
and Information Security. 9. 38-45. 10.5815/ijcnis.2017.09.05.
• S. Bobade and R. Goudar, "Secure Data Communication Using Protocol
Steganog-raphy in IPv6," 2015 International Conference on Computing
Communication Control and Automation, Pune, India, 2015, pp. 275-279,
doi: 10.1109/ICCUBEA.2015.59.
THANK YOU

You might also like