Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A Project
Submitted in partial fulfillment of the requirements for the award of
the Degree of
Contents
1. Introduction
1.1 Introduction...4
1.2 Purpose..........5
1.3 Scope of the Project...5
2. Over All Description of Project
2.1 Over all Description of Project.7-9
3. System Requirement
4.1 Hardware Requirement.11
4.2 Software Requirement..11
4. System Design
4.1 Data Flow Diagram..........13
4.1.1 Zero Level DFD...........13
4.1.2 First Level DFD...13
4.1.3 Second Level DFD...13
4.2 Use Case Diagram.14
5. Reference.16
Chapter 1
Introduction
1.1 Introduction
Steganography is the process of hiding a secret message within a larger one in such a way
that someone cannot know the presence or contents of the hidden message. In this an
encrypted message may draw suspicion while hidden messages will not. It is the art of
passing information through original files in a manner that the existence of the message is
unknown.
The term Steganography is arrived from Greek word means, Covered writing. The files
can be referred to as cover text, cover image, or cover audio etc. After embedding the secret
message it is referred to as Stego-medium. While cryptography is about protecting the
content of messages (their meaning), steganography is about hiding the message so that
intermediate persons cannot see the message. Steganography refers to information or a file
that has been concealed inside a digital Picture, Video or Audio file.
Examples of historical usage include:
Hidden messages in Wax tablets: In ancient Greece, people wrote messages on the wood,
and then covered it with wax so that it looked like an ordinary, unused, tablet.
Hidden messages on messenger's body: Also in ancient Greece. Herodotus tells the story of
a message tattooed on a slave's shaved head, covered by hair regrowth, and exposed by
reshaving.
Hidden messages on paper written in secure inks under other messages or on the blank parts
of other messages.
During and after World War II, Espionage agents used microdots to send information back
and forth. Since the dots were typically extremely small the size of a period produced by a
Typewriter (perhaps in a font with 10 or 12 characters per inch) or even smaller -- the
stegotext was whatever the dot was hidden within. If a letter or an address, it was some
alphabetic characters. If under a postage stamp, it was the presence of the stamp.
1.2Purpose
This project first encrypts the secret message into image format.
With the boost in computer power, the internet and with the development of digital
signal processing (DSP), information theory and coding theory, steganography has
gone digital.
5.
Hence an immediate concern is to find out best possible attacks to carry out
steganalysis.
Chapter 2
Overall description of the project
An image contains lots of information which we cant understand and watch easily. In this
process of steganography the bits of original message is replaced by the bits of cover image.
This time the secret message is converting in to cover image by replacing the bits of original
message.
This conversion of secret message into cover image follows the RGB color combination. The
color of RGB is consists of 24 bits, in which each color is consists of 8 bits or 1 byte. These
colors are placed in manner in which first eight bits for red color second eight bits for green
color and last eight bits for blue color. Left most bits represent the red color, next eight bits
represent the green color and next eight bits represent the blue color. First of all message is
converting into binary form. The concept of steganography is to replace the near most
message value by cover image bits value since all are represented in the binary.
Original Image
Stegnographed
Image
Chapter 3
System Requirements
10
Chapter 4
System Design
11
0 Level DFD
1 Level DFD
12
2 Level DFD
13
Chapter 5
References
5.1References
5.1.1
http://en.wikipedia.org/wiki/Steganography
5.1.2
http://vanilla47.com/PDFs/Cryptography/Steganography
5.1.3
www.slideshare.net
5.1.4
http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageSteganogr
aphy.pdf
14