A Project report on
IMAGE STEGANOGRAPHY
INTRODUCTION The word word stegan steganogr ograph aphy y means” means” covere covered d in hidden hidden writin writing”. g”. The The object object of stegan steganogr ograph aphy y is to send send a messag messagee throug through h some some innocu innocuous ous carrier (to a receiver while preventing anyone else from knowing that a message is being sent to all. Computer based steganography allows changes to be made to what are known as digital carriers such as images or sounds. The changes represent the hidden message but result if successful in no discernible discernible change change to the carrier. carrier. The The informatio information n may be nothing nothing to do with the carrier sound or image or it might be information about the carrier such as the author or a digital watermarking or fingerprint. !n steg stegan anog ogra raph phy y info inform rmat atio ion n can can be hidd hidden en in carr carrie iers rs such such as images images audio audio files files te"t te"t files files and video video and data data transm transmiss ission ions. s. #hen #hen message is hidden in the carrier a stego carrier is formed for e"ample a stego$image. %opefully it will be perceived to be as close as possible to the original carrier or cover image by the human senses. !mages are the most widespread carrier medium. The are used for steganography in the following way. The message may firstly be encrypted. They are used for steganography in the following way. The message may firstly be encrypted. The sender embeds the secret message to be sent into a graphic file. This results in the production of what is called stego$image. Additional secret data may be needed in the hiding process e.g. a stegokey etc. This stego$image is then transmitted to the recipient.
The recipient e"tractor e"tracts the message from the carrier image. The message can only be e"tracted if there is a shared secret between the sender and the recipient. This could be the algorithm for e"traction or a special parameter such as stegokey. A stegoanalyst or attacker may try to intercept the stego image.
HISTORY OF STEGANOGRAPHY STEGANOGRAP HY &teganography is the dark cousin of cryptography the use of codes. #hile cryptography provides privacy steganography is intended to provide secrecy. Privacy is what you need when you use your credit card on the !nternet $$ you don't want your number revealed to the public. or this you use cryptography and send a coded pile of gibberish that only the web site can decipher. Though your code may be unbreakable any hacker can look and see you've sent a message. or true secrecy you don't want anyone to know you're sending a message at all. )arly steganography was messy. *efore phones before mail before horses messages were sent on foot. !f you wanted to hide a message you had had two two choi choice ces+ s+ have have the the mess messen enge gerr mem memori, ori,ee it it or hide hide it on the the messenger. !n fact the Chinese wrote messages on silk and encased them in balls of wa". The The wa" ball -la wan- could could then be hidden in the messenger. messenger. %erodo %erodotus tus an entert entertain aining ing but less less than than reliab reliable le reek reek histor historian ian reports a more ingenious method. %istaeus ruler of /iletus wanted to send a messag messagee to his friend friend Aristag ristagoru orus s urgi urging ng revolt revolt agains againstt the Persia Persians. ns. %istaeus shaved the head of his most trusted slave and then tattooed a message on the slave's scalp. After the hair grew back the slave was sent to Aristagorus with the message safely hidden. 0ater in %erodotus' histories the &partans received word that 1er"es was preparing to invade reece. Their informant 2emeratus was a reek in e"ile e"ile in Persia Persia.. earin earing g discov discovery ery 2emera 2emeratus tus wrote wrote his messag messagee on the wood backing of a wa" tablet. %e then hid the message underneath a fresh layer of wa". The apparently blank tablet sailed easily past sentries on the road.
The recipient e"tractor e"tracts the message from the carrier image. The message can only be e"tracted if there is a shared secret between the sender and the recipient. This could be the algorithm for e"traction or a special parameter such as stegokey. A stegoanalyst or attacker may try to intercept the stego image.
HISTORY OF STEGANOGRAPHY STEGANOGRAP HY &teganography is the dark cousin of cryptography the use of codes. #hile cryptography provides privacy steganography is intended to provide secrecy. Privacy is what you need when you use your credit card on the !nternet $$ you don't want your number revealed to the public. or this you use cryptography and send a coded pile of gibberish that only the web site can decipher. Though your code may be unbreakable any hacker can look and see you've sent a message. or true secrecy you don't want anyone to know you're sending a message at all. )arly steganography was messy. *efore phones before mail before horses messages were sent on foot. !f you wanted to hide a message you had had two two choi choice ces+ s+ have have the the mess messen enge gerr mem memori, ori,ee it it or hide hide it on the the messenger. !n fact the Chinese wrote messages on silk and encased them in balls of wa". The The wa" ball -la wan- could could then be hidden in the messenger. messenger. %erodo %erodotus tus an entert entertain aining ing but less less than than reliab reliable le reek reek histor historian ian reports a more ingenious method. %istaeus ruler of /iletus wanted to send a messag messagee to his friend friend Aristag ristagoru orus s urgi urging ng revolt revolt agains againstt the Persia Persians. ns. %istaeus shaved the head of his most trusted slave and then tattooed a message on the slave's scalp. After the hair grew back the slave was sent to Aristagorus with the message safely hidden. 0ater in %erodotus' histories the &partans received word that 1er"es was preparing to invade reece. Their informant 2emeratus was a reek in e"ile e"ile in Persia Persia.. earin earing g discov discovery ery 2emera 2emeratus tus wrote wrote his messag messagee on the wood backing of a wa" tablet. %e then hid the message underneath a fresh layer of wa". The apparently blank tablet sailed easily past sentries on the road.
WHAT IS STEGANOGRAPHY? &teganography (also known as -steg- or -stego-3 is -the art of writing in cipher or in characters which are not intelligible e"cept to persons who have the key4 cryptography-. !n computer terms steganography has evolved into the practice of hiding a message within a larger one in such a way that others cannot discern the presence or contents of the hidden message. !n contemporary terms steganography has evolved into a digital strategy of hiding a file in some form of multimedia such as an image an audio file (like a .wav or mp53 or even a video file.
What is Steganograph Use! "or?
0ike many security tools steganograp steganography hy can be used for a variety variety of reasons some good some not so good. 0egitimate purposes can include things like watermarking images for reasons such as copyright protection. 2igital watermarks (also known as fingerprinting significant especially in copyrighting material3 are simila similarr to stegan steganogr ograph aphy y in that that they they are overla overlaid id in files files which which appear to be part of the original file and are thus not easily detectable by the average person. &teganography can also be used as a way to make a substitute for a one$way hash hash value value (where you take a variable length input and create a static length output string to verify that no changes have been made to the original variable length input3. &teganography can be used to tag notes to online images (like post$it notes attached to paper files3. &teganography can be used to maintain the confidentiality of valuable inform informati ation on to protec protectt the data data from possib possible le sabota sabotage ge theft theft or unauthori,ed viewing.
&teganography can also be used for illegitimate reasons. !f someone was trying to steal data they could conceal it in another file or files and send it out in an innocent looking email or file transfer.
#IMITATIONS
There are limitations on the use of steganography. As with encryption if Alice wants to communicate secretly with *ob they must first agree on the method being used. 2emeratus a reek at the Persian court sent a warning to &parta about an imminent invasion by 1er"es by removing the wa" from a writing tablet writing the message on the wood and then covering it in wa" again. The tablet appeared to be blank and fooled the customs men but almost fooled the recipient too since he was unaware that the message was being hidden.
#ith encryption *ob can be reasonably sure that he has received a secret message when a seemingly meaningless file arrives. !t has either been corrupted or is encrypted. !t is not so clear with hidden data *ob simply receives an image for e"ample and needs to know that there is a hidden message and how to locate it.
Another limitation is due to the si,e of the medium being used to hide the data. !n order for steganography steganography to be useful useful the message should should be hidden without any major changes to the object it is being embedded in. This This leav leaves es limi limite ted d room room to embe embed d a mess messag agee with withou outt noti notice ceab ably ly changing the original object. This is most obvious in compressed files where many of the obvious candidates for embedding data are lost. #hat is left is likely to be the most perceptually significant portions of the file and although hiding data is still possible it may be difficult to avoid changing the file.
&imp &imple le spre spread ad spec spectr trum um tech techni ni6u 6ues es are are able able to surv surviv ivee ampl amplit itud udee dist distor orti tion on and and nois noisee addi additi tion on but but are are vuln vulnera erabl blee to timi timing ng erro errors rs.. &ynchroni,ation of the chip signal is re6uired in order for the techni6ue
to work so adjusting the synchroni,ation can cause the embedded data to be lost.
Nee! O" Propose! Sste$ The previously had many drawbacks such as more manual processing of data which resulted in a time consuming process. *esides this cost of maintaining a manually was more as compared to the computeri,ed process. *esides this there were comple"ities but not the least there was minimal amount of data security.
O%&ECTI'E
!t is complete and automatic system for 2ata &ecurity. 2esigning a system that gives us information about data security. %ide important information by unauthori,ed person while sending
information to receiver. #ith the help of an image to hide an information and provide security
to important information. 7nauthori,ed person not guess about information is hidden in an
image.
USERS
Sen!er
&ender who make a stegano image. &ender is an authori,ed person who sends important information with the help of an image to receiver.
Re(ei)er
8eceiver is an authori,ed person who e"tracts important information from image in a secure way. 8eceiver receives information from sender.
SCOPE OF STEGANOGRAPHY
En(rption
The object file which is supposed to be proceeding will be encrypted in some binary codes. This binary code depends on the nature of the object file. This encryption is different for different files. As e"ample the encryption is made of te"t file which is absolutely different from any audio file or image files.
Data Ch*(+ing
!n this process the encrypted file is chunked in various parts and then this file is to *e proceed for the further streganography. The aim of this step is to reduce the stenography time and increase the effectiveness of this procedure.
Steganograph
!n this process the steganography is done on the chunked encrypted files. !n this Process the binary codes of the encrypted files are to be changed by any of the method as mentioned below. &pecific method changes the specific binary numbers.
Sen!ing the (h*n+e! "i,es
!n this process this chunked files are supposed to be sent to the receiver and this iles will be in the hidden form. This all files are received by the receiver and then are proceed to get the original data.
Fi,e re(o$-ination
!n this process the chunked files are supposed to be recombined to get the whole ile and this procedure are done on the receiver end so the receiver must have the stego$key or any secret information from the sender so that the receiver can get the original file.
Data De(rption
!n this process the previously recombined file is to be decrypted so that the 8eceiver can get the original file which is sent from the sender. And now by entering the secret information the receiver is supposed to get the original file which is sent by the receiver. This procedure ends the whole procedure. Thus the whole procedure is carried out by following the above steps. E.AMP#E
This is the example of the steganography procedure which is explained below:-
!n this procedure the file which is in the binary form and it is now embedded in some form and now this file is in the hidden format and any
secret information is added by the sender and if the receiver wants to get the original image then he needs to e"tract the embedded image with the help of the secret information provided by the sender. #hen the receiver will receive the file will be in the embedded form and by e"tracting it he can use or read the original object file which is sent by the sender. This embedding of the binary code is different for the different types of the files.
FEASI%I#ITY STUDY A feasibility study is a test of a system proposal according to its workability impact on the organi,ation ability to meet user re6uirements and effective use of resource. The objective of feasibility study is not to the problem but to ac6uire a sense of its scope. 2uring this study the problem definition is crystalli,ed and aspects of the problem to be included in the system are determined. Conse6uently cost and benefits are estimated with greater accuracy at this stage. The key considerations involved in easibility Analysis are+ E(ono$i( Feasi-i,it + )conomic Analysis is the most fre6uently used
method for evaluating the effectiveness of a proposed system. /ore commonly known as cost$benefit analysis the procedure is to determine the benefit 9 savings that are e"pected from a proposed system and compare them with costs. !f the benefits are more than the costs then the decision is made to design and implement the system otherwise not. An economic feasibility study of the proposed &tudent administration system reveals that the software's proposed to be used for the system vi,. #indows :; are easily available and affordable. Te(hni(a, Feasi-i,it/ Technical easibility centers on the e"isting hardware software and to what e"tent it can support the proposed system or whether the new application could overload the system or
re6uire additional hardware which re6uire financial considerations to accommodate technical enhancements. The running costs of the proposed system when adopted will claim down with respect to the present operational cost of evaluating growths and profits. #ith full automation of the entire management and information system the entire cost of maintenance running application will come down to half of the e"isting total operational cost and will increase efficiently by almost <=>. Operationa, Feasi-i,it/ ?perational or behavioral feasibility determines how much effort will go into the system in educating and training the user staff on a candidate system. As is evident in many real life situations people are inherently resistant to changes and computers have been to facilitate changes. An estimate should be made of how strong is the reaction the user staff is likely to have towards the development of the computer system. !t is a common knowledge the computer installations have something to do with turnover transfers retraining and changes in employee job status. Therefore it is understandable that the introduction of a proposed system re6uires special efforts to educate sell and train staff on new ways of conducting business.
&r.no. Product @ame B Pentium$!$D.E%, Processor D PcAT <55 5 ;F< !ntel /other *oard
@umber of Cost7nit Total 8e6uirement (8s.3 Cost B
5===$
5===$
B BB
<==$ E===$
<==$ D===$
E FE/* 8A/
B
B==$
B==$
< F G ; :
B B B B B
<==$ 5===$ E==$ <==$ E===$
<==$ 5===$ E==$ <==$ D===$
;= * %ard 2isk B<” /onitor ?ptical /ouse B=;$Heys Heyboard /icrosoft #indows 1P
B= Iava 2evelopment Hit (jdk3+B.E B.<
B
B===$
Total
SYSTEM RE0UIREMENT
So"t1are Re2*ire$ent •
/icrosoft windows D=== 1P ista #indows G etc
•
Iava 2evelopment Hit (jdk3+B.E B.<
Har!1are Re2*ire$ents •
PcAT <55 and above with //1
•
FE /* 8A/ and above
•
/ouse or Pointing 2evices
•
/inimum of ;= /* %ard 2isk &pace
•
P$!! P$!!! P$! 2ual Core Processor
B===$
B5===$
USER CHARACTERISTICS &ender who make a stegano image. &ender is an authori,ed person who sends important information with the help of an image to receiver. 8eceiver is an authori,ed person who e"tracts important information from image in a secure way. 8eceiver receives information from sender
USER PRO%#EM STATEMENT
&low retrieval of data
Too much paper work
8epetition of work
!nconsistency of data
0ack of security
UM# DIAGRAM
Use Case Diagra$
Cr eat e Stegno SENDER Ext r ac t Obj ect Se c r e t Fi l e
C,ass Diagra$
RECEI VER
Sender
4
Encr ypt
@ameJ”Character” !2J”Alphanumeric”
4556
Messag e
Decr yp t
@ameJ” Alphanumeric” TypeJ”!mage or Te"t”
4556
Re c e i v e r @ameJ”Character” !2J”Alphanumeric”
O-3e(t Diagra$
Company:Rec ei v er @ameJ”&!?/” !2J”&!?/=B=”
Company:Sender
Pri vat e:Message
@ameJ”&!*A8”
@ameJ”P/BBA@”
!2J”&!*A8==B”
TypeJ”!mage$Te"t”
Company:Rec ei v er @ameJ”&!/CA” !2J”&!/CA=D=”
Se2*en(e Diagra$
Sender
e g noObj e c tCo nt r o l l e r St egnoCr eat eFor St
Cr eat eSt egnography( )
Se l e c tI mag e( ) Re c e i v eSt e g no( ) Ext r a ct( )
I nv al i d
Co,,a-oration Diagra$
1.Cr eat eSt egnography( )
3.Re c e i v eSt e g no( )
D. Se l e c tI mag e( )
5.I nv al i d
SI BAR:Sender
A(ti)it Diagra$
4.Ext r a ct( )
SENDER
RECEI VER
Cr eat e Stegno Obj ec t Encr ypt Se c r e t e Fi l e
Send
Re c e i v e Se c r e t e Fi l e
I f Pass wor
No
d
Cor r ec t Ye s
Dec r ypt Se c r e t e Fi l e
Pass wor d I nc or r e c t
WOR7ING 8 DESIGN OF PRO&ECT STEPS FOR ENCODING
?n first form there are total < tabs namely encode decode %elp About us %ome.
#hen user clicks on encode tab this form display.
To select a file which is to be hide in */P image user has to click ?pen source button.
#hen user clicks on ?pen source button a dialog bo" will open from which user can select a file with any e"tension for hiding.
After selecting a particular file the file will open another window.
or selecting */P image in which file has to be hide user has to click on button ?pen */P.
or encoding user has to give ; character password which is also encodedhided in */P image.
!n a te"t field in front of every button path of the particular file will be displayed.
!n front of Test ile label you have to give the path for storing encoded image.
or actual processing user should click on Processing button.
Pro(essing 1i,, -e !one in "o,,o1ing $anner
a.
!mage must be 5 times greater than original file which is to be hide. b. !f password is not of eight character it will give an error.
F,o1 Chart "or En(o!ing
St ar t
Fi l et obehi dedandi mage
Pass wor d
I si to f8 c har ac t e r s ?
Pr oc e s s i ng
I magei spl aced Enc odi ng
Encode di mag e
St op
STEPS FOR DECODING •
After encoding both the images that is before hiding and after hiding will be displayed in two separate windows.
•
or decoding user should close both the window and click on 2ecode tab.
•
or opening images with hidden file click on ?pen */P button and follow the same path where encoded image is stored. Complete path will displayed in te"t bo" which is in front of 2estile button.
•
The te"t bo" which is in front of ?riginal button the name and path of retrieved file is stored.
•
&ame password must be given by user at decoding code also.
•
#hen user clicks on 2ecoding button actual decoding starts and original file will be opened into separate images.
F,o1 Chart o" De(o!ing
-
St art
De s t i nat i on
Pass wor d
No I si to f8 c har ac t e r s ? Ye s Pr o ce s s i ng Or i g i nalFi l ewhi c hi shi dde n
St op
GUI SCREEN
C?/PA8AT!)0K
I$age -e"ore en(rption
I$age a"ter en(rption
TEST P#AN B. eneral !nformation B.B &ummary+ $ Testing working of !mage &teganography. &ender )ncrypt the information in an image and set a password to an encrypted image. 8eceiver 2ecrypt the information from image. !mportant information is protected by unauthori,ed access. B.D ?bjective+ $ This Test Plan for the image steganography have following test objective+$ )ncrypted image work properly. Password is set to encrypted image in a alphanumeric. Password is in minimum ; characters. )ncrypted image is work properly when receiver decrypted that image.
D. Plan D.B &oftware 2escription+$ D.B.B?ven working+$ !nput &et a cover image.
#orking of image steganography.
2ecryption Process.
Take a te"t or image which is set in a cover image.
?utput
)ncrypted image is created.
&et a password during encryption process. 2ecrypt the encrypted )"tract information
image.
from encrypted image.
D.D Test Team+$The test team will consist of$ A Project /anager A Test 0ead A Tester Product user
Project /anager
8esponsible for Project schedules and the overall success of the project. Participate on CC*.
Test 0ead
)nsures the overall success of the test cycles. %eshe will coordinate weekly meetings and will communicate the testing status to the project team. Participate on CC*.
Testers
8esponsible for performing actual system testing.
7ser
8esponsible for performing testing at user end.
D.5 &chedule+$ &r )vent no B !ntroduction of the product D Training on the testing &oftware which are used in testing
2ate BED=BD DED=BD $ FED=BD
*udget
the
5 E
Testing for module L)ncryption” #orking. Testing for module L2ecryption” #orking
;ED=BD BEGD=BD
5. &pecification 5.B *usiness unction+ $ !mage &teganography #orking. 5.B.B )ncryption Process+ $ !n encryption process in which sender hide an information (Te"t!mage3 in a cover image and done the encryption after setting a password. Then encrypted image is send to authori,ed person. 5.B.B.B Testing following functionality +$ Checking default configuration parameter Password should be minimum ; characters. %idden image si,e is less than cover image. ?peration Correctness All option should work as per specification. #hen password is incorrect than it display an error message. #hen cover image si,e is less than hidden image than encrypted image is damage. 5.B.B.D Testing Type and /ethodology+$ •
•
Checked following Muality parameter
ollowing Type of Testing will be performed on it
Correctness
7nit Testing #hite *o" 7sability Testing Performance Testing *lack *o"
)ase of use
ollowing /ethod is used for testing
Performance
8ecover Testing
*lack *o"
5.B.D 2ecryption Process+$!n decryption process in which receiver receive encrypted image from authori,ed person and write a password which is given by authori,ed person. 8eceivers decrypt the given image and e"tract information. 5.B.D.B Testing following functionality+$ Checking default configuration parameter •
)ntered password should be correct.
?peration Correctness All option should be properly used. 5.B.D.D Testing Type and /ethodology +$ •
Checked following Muality parameter
ollowing Type of Testing will be performed on it
Correctness
7nit Testing #hite *o" 7sability Testing Performance Testing *lack *o" 8ecover Testing *lack *o"
)ase of use Performance
ollowing /ethod is used for testing
E. Test 2escriptions E.B. )ncryption+$ Control+ $ Take proper cover image should be taken as per si,e of imagete"t. !nput+$
E.B.B )ncrypting Process Cover image is sufficient si,e. E.B.D &tarting )ncrypt the image. &et password. E.B.5 &topping )ncrypted image ready. &end to authori,ed person. E.D 2ecryption+$ E.B.B 2ecrypting Process &oftware should be installed in computer. E.B.D &tarting Copy encrypted image. Password is known. 2ecrypt the image. E.B.5 &topping )"tract information. •
• •
• •
•
• • •
•
TEST CASE
*usiness &tructural unction unction !mage )ncryption &teganography
Muality parameter Correctness )ase of use Performance 2ecryption Correctness )ase of use Performance
Type of Testing 7nit Testing 7sability Testing Performance Testing 7nit Testing 7sability Testing Performance Testing
&trategy of testing #hite *o" *lack *o" *lack *o" #hite *o" *lack *o" *lack *o"
C?@C07&!?@ As all the of the methods evaluated re6uired either colour reduction of the original images palette or colour substitution in the stegoed image they all had their own weaknesses as the stegoed image inevitably suffered some distortion from the steganography process. &teganography is a fascinating and effective method of hiding data that has been used throughout history. /ethods that can be employed to uncover such devious tactics but the first step are awareness that such methods even e"ist. There are many good reasons as well to use this type of data hiding including watermarking or a more secure central storage method for such things as passwords or key processes. 8egardless the technology is easy to use and difficult to detect. The more that you know about its features and functionality the more ahead you will be in the game.
%I%#IOGRAPHY
%OO7S9PAPERS
B.
Iava The complete 8eference $ Patrick @aughton
D.
The ree ?n$line 2ictionary of Computing $ 2enis %owe
5.
Applied Cryptography *ruce &chneier Iohn #iley and &ons !nc. B::F.
E.
&teganography+ %idden 2ata by 2eborah 8adcliff Iune B= D==D
WE%SITES
B. D. 5. E.
www.ggogle.com http+en.wikipedia.orgwiki java http+www.jjtc.comstegdocsecD=D.html http+dictionary.reference.comsearchN6Jsteganography
<.
http+www.computerworld.comsecuritytopicssecuritystory=B=;=B GBGDF==.html
&r no
Topic name
Page no
B D 5 E
Project 8eport Acknowledgement Certificate &oftware 8e6uirement &pecification !ntroduction • )"isting &ystem • 0imitations of )"isting &ystem • @eed of purposed &ystem • oal 9 ?bjective • &tatement of scope • easibility &tudy • 7ser Characteristic • 7ser Problem &tatement • 2evelopment ?perating and /aintenance )nvironment 2evelopment )nvironment • &ystem eatures(7ml 2iagram3 7se case 2iagram •
B D 5 <$BE < F G : B= BB BD B5 BE
< F
Class 2iagram ?bject 2iagram • &e6uence 2iagram • Collaboration 2iagram • Activity 2iagram • low Chart • !nputoutput screen Test Plan •
; : B= BB BD
Conclusion and future enhancement *ibliography 8eferences
B< BF BG DB DD DE DG 55 E<