Sei sulla pagina 1di 14

IMAGE STEGANOGRAPHY

A Project
Submitted in partial fulfillment of the requirements for the award of
the Degree of

INTEGRATED MASTEROF COMPUTER APPLICATIONS


BY

ABHISHEK KUMAR PIYUSH


(IMCA/4502/12)

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


BIRLA INSTITUTE OF TECHNOLOGY
MESRA-835215, RANCHI
2015

Contents

1. Introduction
1.1 Introduction...4
1.2 Purpose..........5
1.3 Scope of the Project...5
2. Over All Description of Project
2.1 Over all Description of Project.7-9
3. System Requirement
4.1 Hardware Requirement.11
4.2 Software Requirement..11
4. System Design
4.1 Data Flow Diagram..........13
4.1.1 Zero Level DFD...........13
4.1.2 First Level DFD...13
4.1.3 Second Level DFD...13
4.2 Use Case Diagram.14
5. Reference.16

Chapter 1
Introduction

1.1 Introduction

Steganography is the process of hiding a secret message within a larger one in such a way
that someone cannot know the presence or contents of the hidden message. In this an
encrypted message may draw suspicion while hidden messages will not. It is the art of
passing information through original files in a manner that the existence of the message is
unknown.
The term Steganography is arrived from Greek word means, Covered writing. The files
can be referred to as cover text, cover image, or cover audio etc. After embedding the secret
message it is referred to as Stego-medium. While cryptography is about protecting the
content of messages (their meaning), steganography is about hiding the message so that
intermediate persons cannot see the message. Steganography refers to information or a file
that has been concealed inside a digital Picture, Video or Audio file.
Examples of historical usage include:

Hidden messages in Wax tablets: In ancient Greece, people wrote messages on the wood,

and then covered it with wax so that it looked like an ordinary, unused, tablet.

Hidden messages on messenger's body: Also in ancient Greece. Herodotus tells the story of

a message tattooed on a slave's shaved head, covered by hair regrowth, and exposed by
reshaving.

Hidden messages on paper written in secure inks under other messages or on the blank parts

of other messages.

During and after World War II, Espionage agents used microdots to send information back

and forth. Since the dots were typically extremely small the size of a period produced by a
Typewriter (perhaps in a font with 10 or 12 characters per inch) or even smaller -- the
stegotext was whatever the dot was hidden within. If a letter or an address, it was some
alphabetic characters. If under a postage stamp, it was the presence of the stamp.

1.2Purpose

The main objective of this project is to provide a highly secured communication


between people.

This project first encrypts the secret message into image format.

This will ensure higher security.

It the art of concealing the existence of the information.

1.3Scope of the project


1. The project will be using Windows as the platform and Java as the programming
language.
2. All the operations will take place on JPEG image format.
3. The project can be scaled to be used on various platforms such as UNIX and its
variants, different windows variant etc.
4.

With the boost in computer power, the internet and with the development of digital
signal processing (DSP), information theory and coding theory, steganography has
gone digital.

5.

In the realm of this digital world, steganography has created an atmosphere of


corporate vigilance that has spawned various interesting applications, thus its
continuing evolution is guaranteed.

6. Cyber-crime is believed to benefit from this digital revolution.


7.

Hence an immediate concern is to find out best possible attacks to carry out
steganalysis.

8. We can simultaneously, finding out techniques to strengthen existing steganography


techniques against popular attacks like steganalysis.
5

9. Copyright information can be stored.

Chapter 2
Overall description of the project

2.1 Overall Description of the Project


In this a data hiding method process is proposed. The image quality of the stegnographed image
shows the effectiveness of the proposed method. The results obtained also show significant image
quality. A good balance between the security and the image quality is achieved. The algorithm is
usage for both 8 bit and 24 bit image of the same size of cover and secret image, so it is easy to be
implementing in color image. Benefited from the effective optimization, a good balance between the
security and the image quality is achieved. The program works well with JPEG, text format.

An image contains lots of information which we cant understand and watch easily. In this
process of steganography the bits of original message is replaced by the bits of cover image.
This time the secret message is converting in to cover image by replacing the bits of original
message.
This conversion of secret message into cover image follows the RGB color combination. The
color of RGB is consists of 24 bits, in which each color is consists of 8 bits or 1 byte. These
colors are placed in manner in which first eight bits for red color second eight bits for green
color and last eight bits for blue color. Left most bits represent the red color, next eight bits
represent the green color and next eight bits represent the blue color. First of all message is
converting into binary form. The concept of steganography is to replace the near most
message value by cover image bits value since all are represented in the binary.

Original Image

Stegnographed

Image

Chapter 3
System Requirements

3.1 Hardware requirement


The minimum hardware requirements are: Intel processor
Minimum 2 GB RAM
Minimum 250 GB HD

10

3.2 Software requirement


The minimum software requirements are: Microsoft window xp
Java runtime environment

Chapter 4
System Design
11

4.1 Data flow diagram

0 Level DFD

1 Level DFD

12

2 Level DFD

4.2 Use case diagram

13

Chapter 5
References

5.1References
5.1.1

http://en.wikipedia.org/wiki/Steganography

5.1.2

http://vanilla47.com/PDFs/Cryptography/Steganography

5.1.3

www.slideshare.net

5.1.4

http://www1.chapman.edu/~nabav100/ImgStegano/download/ImageSteganogr
aphy.pdf

14

Potrebbero piacerti anche