STEGANOGRAPHY.

Slides:



Advertisements
Similar presentations
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
Advertisements

WEB USAGE MINING FRAMEWORK FOR MINING EVOLVING USER PROFILES IN DYNAMIC WEBSITE DONE BY: AYESHA NUSRATH 07L51A0517 FIRDOUSE AFREEN 07L51A0522.
F5 A Steganographic Algorithm
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Welcome Course 20410B Module 0: Introduction Audience
I have lost all my vacation pictures due to memory card corruption. Can I get them back? I have accidently deleted some important Photos, Music files.
INTRUSION DETECTION SYSTEM
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Layered Approach using Conditional Random Fields For Intrusion Detection.
Introduction to Computers By: Najam Khan What we will learn about: Hardware: The term used to describe the physical parts of a computer. Ex. The box,
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
Digital Steganography
Your Interactive Guide to the Digital World Discovering Computers 2012.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Identity-Based Secure Distributed Data Storage Schemes.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
Preventing Private Information Inference Attacks on Social Networks.
What is CrossLoop? FREE secure screen sharing utility designed for people of all technical skill levels. Connect any two PCs on Earth Available in 21 Languages.
© 2006 Pearson Education Chapter 1: Computer Systems.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Windows Certification Paths OR MCSA Windows Server 2012 Installing and Configuring Windows Server 2012 Exam (20410) Administering Windows Server.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
By : Praveen Tiwari.  It is a malicious technique of tricking a web user into clicking on something different to what the user perceives they are clicking.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
Secure and Practical Outsourcing of Linear Programming in Cloud Computing.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
BY S.S.SUDHEER VARMA (13NT1D5816)
Introduction to Steganography
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Discovering Computers 2012: Chapter 8
Authentication Schemes for Session Passwords using Color and Images
Towards Scalable Traffic Management in Cloud Data Centers
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Distributed Shared Memory
Welcome
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
Cryptography And Network Security
Data & Network Security
Key Feature of Gen PC Spy
APARTMENT MAINTENANCE SYSTEM
Department Of Computer Science Engineering
Information and Network Security
Steganography.
A Presentation on online voting system
Looking Inside the Computer System
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Firewalls and Security
Security.
An Introduction to Operating Systems
Challenges Of Network Security
Chapter 5 Computer Security
Presentation transcript:

STEGANOGRAPHY

Abstract Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.

Introduction One of the reasons that intruders can be successful is the most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists.

Continue Steganography become more important as more people join the cyberspace revolution. Steganography is the art of concealing information in ways that prevents the detection of hidden messages. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Due to advances in ICT, most of information is kept electronically. Consequently, the security of information has become a fundamental issue. Besides cryptography, steganography can be employed to secure information. In cryptography, the message or encrypted message is embedded in a digital host before passing it through the network, thus the existence of the message is unknown. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media: audio, video and images.

Scope This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file and image files and the path where the user wants to save Image and extruded file.

Methodology User needs to run the application. The user has two tab options – encrypt and decrypt. If user select encrypt, application give the screen to select image file, information file and option to save the image file. If user select decrypt, application gives the screen to select only image file and ask path where user want to save the secrete file. This project has two methods – Encrypt and Decrypt. In encryption the secrete information is hiding in with any type of image file. Decryption is getting the secrete information from image file.

Problem Statement The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try of hide messages physically. One disadvantage of linguistic steganography is that users must equip themselves to have a good knowledge of linguistry. In recent years, everything is trending toward digitization. And with the development of the internet technology, digital media can be transmitted conveniently over the network. Therefore, messages can be secretly carried by digital media by using the steganography techniques, and then be transmitted through the internet rapidly Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. So we prepare this application, to make the information hiding more simple and user friendly.

Objectives To product security tool based on steganography techniques. To explore techniques of hiding data using encryption module of this project To extract techniques of getting secret data using decryption module.

Hardware Software Requirement Hardware Requirements: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 14’ Colour Monitor. Mouse : Optical Mouse. Ram : 512 Mb. Keyboard : 101 Keyboard. Software Requirements: Operating system : Windows XP. Coding Language : ASP.Net with C# Data Base : SQL Server 2008.