Sei sulla pagina 1di 7

Video Stegnography

INTRODUCTION
ABSTRACT
Project name: Video Stegnography
The project entitled Video Stegnography is the application developed to
embed an video fle in another video signal. It is concerned with
embedding information in an innocuous cover Speech in a secure and
robust manner. This system maes the !iles more secure by using the
concepts Stegnography and "ryptography.
Stegnography# poor cousin of "ryptography is the art of hiding messages
inside other messages such that the very e$istence of the message is
unnown to third party. The goal of cryptography is to mae data
unreadable by a third party# the goal of Stegnography is to hide the data
from a third party Through the use of advanced computer software#
authors of images and software can place a hidden trademar in their
product# allowing them to eep a chec on piracy. This is commonly nown
as watermaring. %iding serial numbers or a set of characters that
distinguishes an object from a similar object is nown as fnger printing.
Together# these two are intended to fght piracy. The latter is used to
detect copyright violators and the former is used to prosecute them. &ut
these are only e$amples of the much wider feld of Stegnography.
The cover data should not be signifcantly degraded by the embedded
data# and the embedded data should be as imperceptible as possible. The
embedded data should be as immune as possible to modifcations from
intelligent attacs or anticipated manipulations. Thus it is necessary that
the hidden message should be encrypted.
STEGNOGRAPHY
Stenography is not actually a method of encrypting messages# but
hiding them within something else to enable them to pass undetected.
Traditionally this was achieved with invisible in# microflm or taing the
frst letter from each word of a message. This is now achieved by hiding
the message within a graphics or sound fle. !or instance in a '()*
greyscale image# if the least signifcant bit of each byte is replaced with a
bit from the message then the result will be indistinguishable to the
human eye. +n eavesdropper will not even reali,e a message is being
sent. This is not cryptography however# and although it would fool a
human# a computer would be able to detect this very -uicly and
reproduce the original message.
In the case of using this techni-ue of hiding the data with an image
fle# the visibility of the image# resolution or clarity is not being a.ected.
The hidden data can be of length in si,e. To the %acer# only the image is
mae going to be visible when previewed and not a trace of the hidden
data.
If the image fle is opened across a te$t editor# then also the data is
not going to be visible as the information is stored in an encryption form#
which is also binary. %ence maing it di/cult for the enclosure to
di.erentiate the data to the image fle.
Syste Ana!ysis
People for long time have tried to sort out the problems faced in the
general digital communication system but as these problems e$ist even
now# a secured and easy transfer system evolved and came to be nown
as the 0ncryption and 1ecryption of the data and converting the fle to
video format to be transferred using the cryptographic standards and
Stegnography. The advantages of this Video Stegnography are:
%igh level Security
"ost e.ective transfer
In this fast growing world where every individual free to access the
information on the networ and even the people are technically sound
enough in hacing the information from the networ for various reasons.
The organi,ations have the process of information transfer in and out of
their networ at various levels# which need the process to be in a secured
format for the organi,ational benefts.
If the organi,ations have the Video Stegnography System# then each
employee can send the information to any other registered employee and
thus can establish communication and perform the prescribed tass in
secured fashion. The video fle that the employee sends reaches the
destinations within no time in an video fle format where the end user
need to de embed the fle# decrypt it and use for the purpose. The various
branches of the organi,ation can be connected to a single host server and
then an employee of one branch can send fles to the employee of another
branch through the server but in a secured format.
E"isting Syste
In the traditional architecture there e$isted only the server and
the client. In most cases the server was only a data base server
that can only o.er data. Therefore majority of the business logic
i.e.# validations etc. had to be placed on the clients system. This
maes maintenance e$pensive. Such clients are called as 2fat
clients3. This also means that every client has to be trained as to
how to use the application and even the security in the
communication is also the factor to be considered.
Since the actual processing of the data taes place on the remote client
the data has to be transported over the networ# which re-uires a secured
format of the transfer method. %ow to conduct transactions is to be
controlled by the client and advanced techni-ues implementing the
cryptographic standards in the e$ecuting the data transfer transactions.
Present day transactions are considered to be 4un*trusted4 in terms of
security# i.e. they are relatively easy to be haced. +nd also we have to
consider the transfer the large amount of data through the networ will
give errors while transferring. 5evertheless# sensitive data transfer is to be
carried out even if there is lac of an alternative. 5etwor security in the
e$isting system is the motivation factor for a new system with higher*level
security standards for the information e$change.
Proposed Syste
The proposed system should have the following features. The
transactions should tae place in a secured format between
various clients in the networ. It provides 6e$ibility to the user to
transfer the data through the networ very easily. It should also
identify the user and provide the communication according to the
prescribed level of security with transfer of the fle re-uested and
run the re-uired process at the server if necessary. In this system
the data will be sending through the networ as a video fle. The
user who received the fle will do the operations lie de
embedding# and decryption in their level of hierarchy etc.
So#t$are Re%&ireents'
Operating Syste
7indows 5T8'999 :"lient8Server;.
So#t$are re%&ireents
!ront*end: <ava <'S1= >.(# Swings.
Hard$are Re%&ireents'
Syste Con(g&ration
Pentium III Processor with ?99 @%, "loc Speed
'() @& A+@ '9 B& %11# C' &it P"I 0thernet "ard.

Potrebbero piacerti anche