SYNOPSIS ON STRGANOGRAPHY
Page 1/39
S
TEGANOGRAPHY
(A new technique to hide information within image file)
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 2/39
A
SYNOPSIS ON
STEGANOGRAPHY (A new technique to hide information within image file) Submitted to the
RAJIV GANDHI PROUDYOGIKI PR OUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P.) For the Degree Of
BACHELOR OF ENGINEERING (INFORMATION TECHNOLOGY) Under the Guidance of
Mr. PUNEET SINGH DUGGAL
Mrs. MILI JAISWAL
HOD
PROJECT GUIDE & LECTURER
DEPPT. OF INFORMATION TECHNOLOGY
DEPTT. OF INFORMATION TECHNOLOGY Submitted By
ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]
VII SEM (INFORMATION TECHNOLOGY)
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 2/39
A
SYNOPSIS ON
STEGANOGRAPHY (A new technique to hide information within image file) Submitted to the
RAJIV GANDHI PROUDYOGIKI PR OUDYOGIKI VISHWAVIDYALAYA BHOPAL (M.P.) For the Degree Of
BACHELOR OF ENGINEERING (INFORMATION TECHNOLOGY) Under the Guidance of
Mr. PUNEET SINGH DUGGAL
Mrs. MILI JAISWAL
HOD
PROJECT GUIDE & LECTURER
DEPPT. OF INFORMATION TECHNOLOGY
DEPTT. OF INFORMATION TECHNOLOGY Submitted By
ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]
VII SEM (INFORMATION TECHNOLOGY)
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 3/39
DEPARTMENT OF INFORMATION TECHNOLOGY
This is to certify that synopsis ―STEGANOGRAPHY (a new technique to
hide information within image file )‖ which has been completed and submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision.
Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]
VII SEM (INFORMATION TECHNOLOGY)
INTERNAL
EXTERNAL Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 4/39
DEPARTMENT OF INFORMATION TECHNOLOGY
This is to certify that synopsis ―STEGANOGRAPHY (a new technique to
hide information within image file )‖ which has been completed and submitted by the studen of Bachelor of Engineering (Information Technology) to the RGPV, Bhopal is a bonafide work by them. This synopsis has been completed under our guidance and supervision. Submitted By ROHIT PATEL [0202IT071043] DEVENDRA VISHWAKARMA [0202IT071013] NARENDRA NATH SHUKLA [0202IT071031] ROHIT NAMDEO [0202IT071042]
VII SEM (INFORMATION TECHNOLOGY)
Mr. PUNEET SINGH DUGGAL
Mrs. MILI JAISWAL
HOD
PROJECT GUIDE & LECTURER
DEPTT. OF INFORMATION TECHNOLOGY
DEPTT. OF INFORMATION TECHNOLOGY Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 5/39
The synopsis defines and signifies the shear mannerism in which numerous interacted tasks are performed by a team composed of committed members. Each member bearing their own importance and providing contribution, which is nothing short of being invaluable. We are thankful to under whose support we have been able to make this project a great success. We express our deep sense of gratitude to for their valuable support and supervision throughout the ‘Bachelor of Engineering’ Degree. Last but not the least wi wish to remember with the deep sense of gratitude the encouragement provided to us by our friends and faculty members.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 6/39
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 7/39
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganography algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 8/39
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page 9/39
This project is based on Stegnography technique. Stegnography is the art and science of hiding information by embedding secure and confidential messages (such as Identity, Password etc.) within other harmless file format (such as JPEG, BMP , PNG, WAV, MP3 etc.)
Objective of the project The
main
goal
of
this
steganography
based
system
is
to
covert
communication. So, the fundamental purpose of this steganography based system is that the hide secure message within any image file format and generates a encrypted BMP image file format as output containing that secure message which will not be sensible to third party. When a message is encrypted, it has no meaning, and it's easy to understand that it contains sensitive information, a secret - and someone might try to break it. This Steganography based software solves this problem by hiding the sensitive information in a harmless file called carrier file (example – bmp, jpeg ect.). This approach of
information
hiding
technique has recently became
important in a number of application area : This project has following objectives: To product security tool based on steganography techniques. Confidential communication and secret data storing using encryption module. Protection of data alteration To extract techniques of getting secret data using decryption module.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
StegnographyIT is the art and science of hiding information by embedding secure and confidential messages (such as Identity, Password etc.) within other harmless digital file format (such as JPEG, BMP , PNG, WAV, MP3 ect.). In one sentence, Steganography is a technique of hiding information in digital media. The purpose of steganography is covert communication to hide a message from a third party. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. The steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the steganography medium. The use of a steganography key may be employed for encryption of the hidden message and/or for randomization in the steganography scheme. In summary:
Secret message
Carrier or Cover Medium
Stego Key
Stego Medium
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Cover-object, C
Message, M
F(X,M,K)
Stego Object, Z
Stego-key, K
Message is the data that the sender wishes to remain it confidential. It can be plain text, ciphertext, other image, or anything such as a copyright mark, a covert communication, or a serial number. Encrption key is known as stego-key , which ensures that only recipient who know the corresponding decoding key will be able to extract the message from a cover-object . The cover-object with the secretly embedded message is then called the Stego-object .
Cover Object Stego Object Z
C Decoding key corresponding to stego key
Original message M
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Recovering message from a stego-object requires the cover-object itselt and a corresponding decoding key if a stego-key was used during the encoding process. The original image may or may not be required in most applications to extract the message. There are several suitable carriers below to be the cover-object: Network protocols such as TCP, IP and UDP Audio that using digital audio formats such as wav, midi, avi, mpeg, mp3 Images file such as bmp, gif and jpg, where they can be both color and gray-scale.
Steganography Vs Cryptography Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between two is that steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information. The word steganography comes from the Greek ―Seganos‖, which mean covered
or
secret
and – ―graphy‖
mean
writing
or
drawing.
Therefore,
steganography mean, literally covered writing.
Image Steganography and bitmap pictures: Using bitmap pictures for hiding secret information is one of most popular choices for Steganography. Many types of software built for this purpose, some of these software use password protection to encrypting information on picture. To use these software you must have a ‗BMP‘ format of a pictures to use it, but using other type of pictures like ―JPEG‖, ―GIF‖ or any other types is rather or never used, because of algorithm of ―BMP‖ pictures for Steganography is simple. Also we know
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
that in the web most popular of image types are ―JPEG‖ and other types not ―BPM‖, so we should have a solution for this problem. This software provide the solution of this problem, it can accept any type of image to hide information file, but finally it give the only ―BMP‖ image as an output that has hidden file inside it.
Bitmap Steganography: Bitmap t ype is the simplest type of picture because that it doesn‘t have any technology for decreasing file size. Structure of these files is that a bitmap image created from pixels that any pixel created from three colors ( red, green and blue said RGB) each color of a pixel is one byte information that shows the density of that color. Merging these three color makes every color that we see in these pictures. We know that every byte in computer science is created from 8 bit that first bit is Most-Significant-Bit (MSB) and last bit Least-Significant-Bit (LSB), the idea of using Steganography science is in this place; we use LSB bit for writing our security information inside BMP pictures. So if we just use last layer (8st layar) of information, we should change the last bit of pixels, in other hands we have 3 bits in each pixel so we have 3*hight*width bits memory to write our information. But before writing our data we must write name of data(file), size of name of data & size of data. We can do this by assigning some first bits of memory (8st layer).
(00101101 00011101 11011100) (10100110 11000101 00001100) (11010010 10101100 01100011)
Using each 3 pixel of picture to save a byte of data
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
The growing possibilities of modern communications need the special means of security especially on computer network. The network security is becoming more important as the number of data being exchanged on the internet increases. Therefore, the confidentiality and data integrity
are requires to protect against
unauthorized access and use. This has resulted in an explosive growth of the field of information hiding This project is developed for hiding information in any image file. The scope of the project is implementation of steganography tools for hiding information includes any type of information file within BMP image files and it also ask to receiver for the path where the user wants to save Image and extruded file. In short this software is able to do some kind of encryption for secure information hiding what is called Steganography. The most common use of steganography is to hide a file inside another file.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
User needs to run the application. The user has two tab options – encrypt and decrypt. If user select encrypt, application will give the screen to brows and select image file (such as bmp, jpeg, png) as a cover object, and the file (such as doc, txt, ppt) that containing the information that you want to embed in cover object And if user select decrypt option, the application give the screen to select Stego-Object (bmp image file) that you want to decrypt and ask path where user want to save the secrete file. This project has two methods – Encrypt and Decrypt.
In encryption, the secrete information is hiding in with any type of image file. Decryption is getting the secrete information from image file.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Encryption Process IMAGE FILE
INFORMATION FILE
BMP file
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Decryption Process BMP file
Image file
Information file
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Advantages:
Mainly steganographic based software can be used in sending confidential images for military purposes where this software enables them to hide file formats such as text files or image files like jpg or bitmap into another image files or in mp3 files.
Steganography covers even the existence of a hidden message, ie other than sender and receiver no one knows there is a secret data is stored in a carrier file.
Limataion:
Now days many terrestrial group are using this method of stegnography to communicate with other terrestrial group since If one knows that a file contains some hidden data, without knowing the decryption method he is not able to get the secret data. Because they use some passwords while hiding the data.
This project has an assumption that is both the sender and receiver must have
shared
some
secret
information
before
imprisonment.
Pure
steganography means that there is none prior information shared by two communication parties.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Problem Statement: The former consists of linguistic or language forms of hidden writing. The later, such as invisible ink, try of hide messages physically. One disadvantage of linguistic steganography is that users must equip themselves to have a good knowledge of linguistry. In recent years, everything is trending toward digitization. And with the development of the internet technology, digital media can be transmitted conveniently over the network. Therefore, messages can be secretly carried by digital media by using the steganography techniques, and then be transmitted through the internet rapidly
Possible and best plan for solution Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. So we prepare this application, to make the information hiding more simple and user friendly.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Planning strategy
Start Application
Decryption
Encryption
Ima e
Messa e file
BMP Image file
Image
Message file
BMP image file
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
HARDWARE REQUIREMENT Computer
Intel® or Compatible , Monitor Pentium III Processor or Higher
Memory (RAM)
256 MB minimum on Windows XP/2000 512 MB recommended on Windows vista/ 7
Hard Disk Space
Minimum 5 GB free space for installing Visual studio 2008 and .net framework 3.5)
CDROM or DVDROM – Drive
Required for Installation
SOFTWARE REQUIREMENT
Operating System (OS)
Front end
Windows XP SP2 or above Windows vista / Windows 7
Visual Studio .Net 2008 or higher Visual Studio .Net Framework (3.5 or higher)
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
FUNCTIONAL REQUIRMENT
PURPOSE:
The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system. SCOPE:
Document plays a vital role in the development life cycle (SDLC).As it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. The following two things are considered in detail characteristic of functional requirement:
1. Input 2. Output
1. INPUT: -
Steganography system requires any type of image file (as a cover image file) and the secure information or message that is to be hidden. It has two modules encrypt and decrypt. The main objective during the input designs is as given below:
To produce a cost-effective method of input. To ensure that the input is acceptable and understood by the user. Controlling the amount of input Avoiding error in data.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
2. OUTPUT:-
This steganography system produces a BMP image file format (as output) containing the cover image that appears in outer world and the secure information file that will be hidden inside covered image by embedding that using some stego-key. One of the most important factors of an information system for the user is the output the system produces. Without the quality of the output, the entire system may appear unnecessary that will make us avoid using it possibly causing it to fail. The term output applying to information produced by an information system whether printed or displayed while designing the output we should identify the specific output that is needed to information requirements select a method to present the formation and create a document report or other formats that contains produced by the system. Whether the output is formatted report or a simple listing of the contents of a file, a computer process will produce the output.
A Document
A Message
Retrieval from a data store
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Before developing project we studied the feasibility of the project in determining whether or not to implement this project/software and also did the analysis of the potential impact of the proposed project or software, that includes advantages and disadvantages of both the current situation and the proposed project. Following points are given below, on which we studied the feasibility before designing of the project:1. Is the project concept viable? 2. Are the project‘s cost and schedule assumptions realistic? 3. What are the current estimated cost and schedule for the project? 4. Have the major risks to the project been identified and can they minimized or avoided? 5. Is the software development plan complete and adequate to support further development work? 6. Have users and developers been able to agree on a detailed user interface prototype? If not, are the requirements really stable?
My project fulfills all the above mentioned criteria of feasibility study.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Front end:-
Visual studio 2008 (.NET Framework using C# language)
Back end:-
A stego key for encryption and decryption.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Begins when an Organization identifies a need of software. Concept Proposal is Created
Page
Defines the scope or boundary of the concepts. Includes System Boundary, Cost Benefit Analysis. Risk Management Plan & Feasibility Stud
Develops a Project Management Plan and other planning documents. Provides the basis for acquiring the resources needed to achieve
Analyses user needs and develop requirement specification, & user requirement. Create a detailed Functional Requirement Document
Transforms detailed requirements into complete, detailed system design document. Focus on how to deliver the required functionality.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Steganography system requires any type of image file and the information or message that is to be hidden. It has two modules encrypt and decrypt. Microsoft .Net framework prepares a huge amount of tool and options for programmers that they simples programming. One of .Net tools for pictures and images is auto-converting most types of pictures to BMP format. I used this tool in this software called ―Steganography‖ that is written in C#.Net language and you can use this software to hide your information in any type of pictures without any converting its format to BMP (software converts inside it). Algorithms and Techniques There are three different techniques you can use to hide information in a cover file: 1. Injection (or insertion) Using this technique, you store the data you want to hide in sections of a file that are ignored by the processing application. By doing this you avoid modifying those file bits that are relevant to an end-user — leaving the cover file perfectly usable. For example, you can add additional harmless bytes in an executable or binary file. Because those bytes don't affect the process, the end-user may not even realize that the file contains additional hidden information. However, using an insertion technique changes file size according to the amount of data hidden and therefore,
if
the
file
looks
unusually
large,
it
may
arouse
suspicion.
2. Substitution Using this approach, you replace the least significant bits of information that determine the meaningful content of the original file with new data in a way that causes the least amount of distortion. The main advantage of that technique is that the cover file size does not change after the execution of the algorithm. On the other
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
hand, the approach has at least two drawbacks. First, the resulting stego file may be adversely affected by quality degradation — and that may arouse suspicion. Second, substitution limits the amount of data that you can hide to the number of insignificant bits in the file 3. Generation Unlike injection and substitution, this technique doesn't require an existing cover file — this technique generates a cover file for the sole purpose of hiding the message. The main flaw of the insertion and substitution techniques is that people can compare the stego file with any pre-existing copy of the cover file (which is supposed to be the same file) and discover differences between the two. You won't have that problem when using a generation approach, because the result is an original file, and is therefore immune to comparison tests. Among the substitution techniques, a very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data. That's usually an effective technique in cases where the LSB substitution doesn't cause significant quality degradation, such as in 24-bit bitmaps.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
The encrypt module is used to hide information into the image; no one can see that information or file. This module requires any type of image and message and gives the only one image file in destination. The decrypt module is used to get the hidden information in an image file. It take the image file as an output, and give two file at destination folder, one is the same image file and another is the message file that is hidden it that. Before encrypting file inside image we must save name and size of file in a definite place of image. We could save file name before file information in LSB layer and save file size and file name size in most right-down pixels of image. Writing this information is needed to retrieve file from encrypted image in decryption state.
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Basic System Architecture
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
S stem Flow
Start Application
Decryption
Encryption
Ima e
Messa e file
BMP Image file
Image
Message file
BMP image file
At Sender Site
At Receiver Site
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Use-Case Dia ram
Start Encrypt Module of system
Select & Load the Cover Image Using Stego-Key Select & Load the File containing Secure Msg
for Encryption
Sender <> Embed Msg within cover image & Generate StegoImage
Send Stego image file
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Receive Stegoimage file
Start Decrypt Module of system
Load the Stego Image Using Stego-Key Set path for File containing Secure Msg
for Decryption
Receiver <> Separate Secure file from stego-image
Generate & save file in specified path
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Data Flow Dia ram
Cover Image
Secure Message
Bit stream
Bit stream
StegoSystem Encoder
Bit stream with changed LSB of cover image
Stego Image
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Stego Image
Cover image Bit stream + Secure File Bit stream
StegoSystem Decoder
Original Bit stream
Cover Image
Original Bit stream
Secure Message
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Secure Message File
Cover Image
StegoSystem Encoder
Stego Image
Stego image bit stream (cover image + message)
Secure Message
StegoSystem Decoder
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Control Flow Dia ram
Loading Message file bit stream
Loading Cover file bit stream
Prepare Cover Data
Encode Prepared cover data with message data
Generate Stego Data
Steganography – Synopsis
SYNOPSIS ON STRGANOGRAPHY
Page
Steganography – Synopsis