Steganography..Ppt

14
STEGANOGRAPHY 1. Vijay S. Kakade. 2. Sanjeevani S. Ingle. 3. Kavita V. Sonavale. Presented by:

Transcript of Steganography..Ppt

Page 1: Steganography..Ppt

STEGANOGRAPHY

1. Vijay S. Kakade.2. Sanjeevani S. Ingle.3. Kavita V. Sonavale.

Presented by:

Page 2: Steganography..Ppt

What is Steganography?

Stegosaurus: a covered lizard(but not a type of cryptography)

Greek Words:

STEGANOS – “Covered”

GRAPHIE – “Writing”

Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.

This can be achieved by concealing the existence of information within seemingly harmless carriers or cover

Carrier: text, image, video, audio, etc.

Page 3: Steganography..Ppt

Types of Steganography

Classification is based on type of cover medium used.

Audio Steganography

Carrier file : any type of audio file Recipient decodes information by using easily. Data hiding process consists of following two steps

i. Identification of redundant bits in a cover-file

ii. To embed the secret information in the cover file

Video Steganography

Carrier file : any type of video file Popularity of sending & receiving files over network. It is concerned with embedding information in an

innocuous cover media in a secure and robust manner.

Page 4: Steganography..Ppt

Use of Steganography

Secure data transmission over the network

Offer deniable storage of information

To store information on desired location

banking information some military secrets

Used to implement watermarking

Provides a secure yet simple interface for hiding information

4

Page 5: Steganography..Ppt

Existing System

Existing System of Audio

i. Phase coding

ii. Parity coding

Disadvantages Selection of audio formats is restricted to one message length is restricted to 500 characters Lack in good user interface Consume much time to encode and decode User needs to understand better to know the

operations

Page 6: Steganography..Ppt

Existing System continued..

Existing System Of video

Embed hidden messages in multimedia objects Disadvantages Lack of good user interface. Non-provision of choosing the key. More encode-decode time consumption. Unavailability of programs for particular operating

system.

Page 7: Steganography..Ppt

Problem Statement

Digitization

Digital media can be transmitted conveniently over the network.

For hiding secret information in audio and video there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points.

So we prepare this application, to make the information hiding simpler and user friendly.

Page 8: Steganography..Ppt

Scope of Project

Scope of the project is implementation of steganography tools for hiding information includes any type of information file within another file

Provide better security when transmitting or transferring the data or messages from one end to another

Provide confidentiality and data integrity which requires to protect against unauthorized access and use

Page 9: Steganography..Ppt

Proposed System

Least Significant bit (LSB) Modification Method

Modifications are made to the least significant bits of the carrier file’s individual pixels

Example of LSB substitution

(00100111 11101001 11001000)

(00100111 11001000 11101001)

(11001000 00100111 11101001) Letter 'A' is represented in ASCII format as the binary string

10000011

(00100111 11101000 11001000)

(00100110 11001000 11101000)

(11001001 00100111 11101001) Advantages 9

Page 10: Steganography..Ppt

Proposed system of Audio

Least Significant Bit (LSB) coding method is the simplest way to embed secret information in a digital audio file by replacing the least significant bit of audio file with a binary message.

Advantages over existing system.

Proposed system of Video

Hiding data in the video image, retrieving the hidden data from the video using LSB modification method

Advantage over Existing system LSB coding method is a very high watermark channel bit rate

and a low computational complexity10

Page 11: Steganography..Ppt

SAMPLE OUTPUT

11

Steganography- Select Text file and Audio file

Page 12: Steganography..Ppt

SAMPLE OUTPUT

12

Steganography- Select Text file and Video file

Page 13: Steganography..Ppt

Design Details

Basic Architecture

Page 14: Steganography..Ppt

THANK YOU