BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
ABSTRACT Due to the Internets sheer size, complexity, and various routing policies, it is difficult if not impossible to locate the causes of large volumes.
F5 A Steganographic Algorithm
Steganography and Network Security
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
2.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 2: Installing Windows Server.
Overview of Digital Stenography
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
How to Install Windows 7.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Passwords, Encryption Forensic Tools
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Personalized QoS-Aware Web Service Recommendation and Visualization.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Discovering Emerging Topics in Social Streams via Link Anomaly Detection.
A Steganography Project Project By: Awadesh Madhogaria.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Digital Steganography
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Software Development Software Testing. Testing Definitions There are many tests going under various names. The following is a general list to get a feel.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Protecting Sensitive Labels in Social Network Data Anonymization.
Identity-Based Secure Distributed Data Storage Schemes.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Facilitating Document Annotation using Content and Querying Value.
Twitsper: Tweeting Privately. Abstract Although online social networks provide some form of privacy controls to protect a user's shared content from other.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Facilitating Document Annotation Using Content and Querying Value.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
APARTMENT MAINTENANCE SYSTEM M.Tech( Ph.D) HOD of C.S.E & I.T Dept.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
Library Management System. Aim : To develop a project titled “LIBRARY MANAGEMENT” and is developed to maintain the operation done in a library. To develop.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
FOOTPRINTING STEGANOGRAPHY.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
BY S.S.SUDHEER VARMA (13NT1D5816)
Introduction to Steganography
DIT314 ~ Client Operating System & Administration
Security Using Armstrong Numbers and Authentication using Colors
ZIMBRA DESKTOP USER MANUAL
Welcome
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
Abstract The systems get affected due to worms and viruses. If worm enters the system it immediately starts affecting the system activities. Also the system.
STEGANOGRAPHY.
Information and Network Security
Steganography.
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
Visit for more Learning Resources
Computer Repair & Maintenance
HMAC and its Design Objectives
Message Authentication
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Presentation transcript:

BY

Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or contents of the hidden message. A message might be hidden with in an image by changing Least Significant Bit to be the message bits. Then the image can be transmitted through Network. LSB based Stenography is perhaps the most simple and straight forward approach. In this project we embed the message in to the least significant bit planes of the image.

Since this will only affect each pixel by +/- 1, if at all, it is generally assumed with good reason that degradation caused by this embedding process would perceptually transparent. Hence there are a number of LSB based steganography techniques in the passive warden model as it difficult to differentiate cover-images from steno images, given the small changes that have been made.

Secure data transmission or information hiding system has been developed to provide confidentiality security service. Second and main advantage is if the hacker wants to extract the embedded message in image file he must and should the following algorithms: a) Algorithm to extract the message from the image (Stego algorithm), b) Encryption algorithm, c) Correct password for algorithm, and d) Message process algorithm for check integrity of message. This increases levels of protection using encryption algorithm, the proposed system for steganography is stronger from the attacks than any other existing system.

There is 1 module in this Secured Data Transmission over the Network. They are:User User Module The functionalities of the User module are: A user runs application. User selects data to process. Application processes the data Encrypt or Decrypt data. User sends or receives data securely.

A use case diagram is a diagram that shows a set of use cases and actors and relationships.

An activity diagram shows the flow from activity to activity Run Application Process:

Encryption Process:

Decryption Process:

Testing Testing Methodologies Black box Testing: White box Testing. Gray Box Testing. Levels of Testing –Unit Testing. –Module Testing. –Integration Testing. –System Testing. –User Acceptance Testing.

Types Of Testing –Smoke Testing. –Sanitary Testing. –Regression Testing. –Re-Testing. –Static Testing. –Dynamic Testing. –Alpha-Testing. –Beta-Testing. –Monkey Testing. –Compatibility Testing. –Installation Testing. –Adhoc Testing. –Ext….

TCD (Test Case Documentation) STLC –Test Planning. –Test Development. –Test Execution. –Result Analysis. –Bug-Tracing. –Reporting. Microsoft Windows – Standards Manual Testing Automation Testing (Tools) –Win Runner. –Test Director

Until recently information hiding techniques received very much less attention from the research community and from industry than cryptography. Steganography has its place in security. It is not intended to replace cryptography but supplement it. In this system it has given an idea to enhance the security of system with a by combining techniques. It can enhance confidentiality of information and of information and provides a means of communicating privately.

Here message is encrypted and then embed in image file with help of Steganographic system. The system security further enhance by using password to embed the message. This system explains a tiny fraction of the art of steganography; it goes well beyond simply embedding text in an image.

Click to add The minimum software requirement specifications for developing this project are as follows: Operating System : Window 2000, XP Presentation layer : Java awt, Swingsjava.net; Presentation : Power Point 2003 Documentation Tool : Ms Office / GoBe Productive

The minimum hardware requirement specification for developing this project is as follows: Processor : Pentium IV/AMD Athelon (1.6 GHz) RAM : 512MB RAM Hard Disk : 10GB Monitor : Standard Color Monitor Keyboard : Standard Keyboard Mouse : Standard Mouse