Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
FACULTY OF COMPUTING
DEPARTMENT OF COMPUTER SCIENCE
BY SUPERVISED BY
4612 HI JAYAVILAL Mr. DMR KULASEKARA
1
INTAKE 32 Mrs. WPJ PEMARATHNE
Contents……
PROBLEM ADDRESSED
SOLUTION
WHAT IS STEGANOGRAPHY….?
AIM AND OBJECTIVES
LITERATURE REVIEW
METHODOLOGY
REQUIREMENTS
LIMITATIONS
REFERENCES
2
Research problem………
Today’s context communication securely is nearly impossible,
secret communication is Communicating with each other without
knowing to 3rd parties.
Best way to harm our privacy is by stealing our information the best
way to do so is eavesdropping, eavesdropping means secretly
listening other people’s conversations.
Can I communicate with people without getting caught ? Because
of that my interest in secret communication.
3
`
Secret
Message
Is Stego Message
Cover Embedding Stego Message? renewal Secret
Message Algorithm Message algorithm Message
Secret Secret
key key
Suppress
Message
4
Research solution………
My Project deliverable will be a functional desktop application
which facilitates
it’s users to embed and extract text files in audio files,
in digital media such as images and scramble text paragraphs
to a non-understandable format,
descramble it to the original state to user to read it.
Implement hiding application, which is able to protect the
messages in network environment .
This system based on hiding these messages in audio files by
least significant bit (LSB) jumping algorithm technique.
5
What Is Steganography….?
the practice of concealing a file, message, image, or video within
another file, message, image, or video. The
word steganography, meaning "covered, concealed, or
protected," and graphing meaning "writing".
steganography is the hiding of a secret message within an
ordinary message and the extraction of it at its destination.
Unlike encryption, where it's obvious that a message is being
hidden,
steganography hides data in plain view,
In steganography does not alter the structure of the secret
message, but hides it inside a cover image or audio so that it
6
cannot be seen .
Aim and objective………
Aim
Hide a message in a career and develop an application that acts as a perfect
educational tool complies with user requirements as the final output.
Objective
Analyse user requirements and provide what they need.
Provide easy to use interface.
Provide a mix of functions in a one software.
To learn different techniques of hiding data.
To make the outputs as undetectable as possible.
7
Literature Review……
PAPER YEAR TECHNOLOGIES DESCRIPTION
Three layered model for 2012 least significant bit The secret message to be transmitted is
audio steganography. replacement passed through two layers before it is
embedded within the cover message in
the third layer.
objective of the paper is to make sure the
confidentiality
Audio Steganography 2012 novel approach of Using genetic algorithm, message bits
using LSB submission technique are embedded into multiple and higher
of audio Steganography LSB layer values,
Data Hiding 2012 Least Significant Bit sample of cover audio is replaced with
Technique: Audio (LSB) secret message bit.
Steganography using method compares the spectra of original
LSB Technique audio signal before embedding and
audio signal after
embedding.
Modified LSB Audio 2013 method which is a The stego file along
Steganography variant of well-known with the filtered file thus obtained is
Approach” LSB method used to generate a
unique key.
9
Methodology……
Embedding
Stego file
Message Module
Stego key
Identification of redundant bits in a cover-file. Redundant bits are those bits that
can he modified without corrupting the quality or destroying the integrity of the
cover-file.
To embed the secret information in the cover file, the redundant bits in the cover
file is replaced by the bits of the secret information. 11
Methodology……
12
Requirement……
Functional Requirements
The system should select the correct file for encryption and decryption.
The system is supposed to perform steganography algorithm.
Should show and save decrypted text.
Should have an option to exit application.
Clear the space for new encryption.
Non-Functional Requirements
User Privacy
Response time
Reliability
Maintainability 13
Requirement……
Software Requirements:
Tool Kit – MS Visual Studio
Resource Requirements….
Resources that matches following criteria or above will be able to
run this program.
Requirements
Operating System Windows XP, Windows 7, 8, 8.1,10 with both x64 and x86 architecture.
14
Limitation……
15
Time plan……
ACTIVITIES JAN FEB MAR APR MAY JUNE JULY AUG SEP OCT NOV DEC
Gathering data
Methodology Understanding
Technology Identification
Requirement Analysis
Design Analysis
Design Development
Testing
System Development part 2
Testing 2
Overall System Testing
Thesis Submission
Supervisor Interaction 16
References……
1) Muhammad Asad, Junaid Gilani, Adnan Khalid, “Three Layered Model for Audio Steganography”, 2012
International Conference on Emerging Technologies (ICET)
2) Masahiro Wakiyama, Yasunobu Hidaka, Koichi Nozaki, “An audio steganography by a low-bit coding
method with wave files”, 2010 Sixth International Conference on Intelligent Information Hiding and
Multimedia Signal Processing, pp. 530 - 533.
3) Lovey Rana, Saikat Banerjee, “Dual Layer Randomization in Audio Steganography Using Random Byte
Position Encoding” , International Journal of Engineering and Innovative Technology, Volume 2, Issue 8,
February 2013
4) Kirti Gandhi, Gaurav Garg, “ Modified LSB Audio Steganography Approach” International Journal of
Emerging Technology and Advanced Engineering, Volume 3, Issue 6, June 2012, pp 158-161
5) Bankar Priyanka R., Katariya Vrushabh R, Patil Komal K, “Audio Steganography using LSB’’, International
Journal of Electronics, Communication and Soft Computing Science and Engineering, March 2012, pp 90-
92.
6) Medical Image Protection by Using Cryptography Data Hiding and Steganography, Vinay Pandey, Angad
Singh,
Manish Srivastava, ISSN 2250-2459,Volume 2,Issue
1,January 2012
7) Data Hiding Method with Quality Control for Binary Images, Ki-Hyun Jung, Kee-Young Yoo, J. Software
Engineering and Applications,2009,2:20-24. 17
Thank you…
18