Sie sind auf Seite 1von 13

Image Stegnography

0
Abstract
This system is used to send the message in the unknown format.
There are chances to miss the confdential or important information,
when sent in the normal format. These problems can be avoided by
making use of this system.
The concept of steganography will be very helpful to the
management, whose prime requirement is to send confdential
information in a secure manner. This software lets you embed
important or private messages or fles into uncompressed format fles
like .bmp (bitmap image fles) or sound fles.
There is no loss to the quality of the images as it uses the least
signifcant bits (L!) of the fle, which are not used by the "mage
#iewer or $udio %layer. The sender hide the message in the image fle
and send it to the receiver. The authori&ed receiver receives the image
and then retrieves the message using this software. o there is no way
to fnd out the message embedded in the image. This mechanism is
known as teganography.
$ny color pi'el is made up of a combination of ()*+,())-+!L.)
((,!) wherein each (,! component consists of / bits. "f the
characters in $0"" are to be represented within the color pi'els, the
rightmost digit called the L! can be altered. $ny variation in the value
of this bit leads to minimal variation in color.
"f we want to hide the word 1*",2 in the image, we take the L!
of every color and hide each bit of the word in its (,! combination.
This is very secure. The message is encrypted frst and then converted
into bytes. This method uses double authentication, where the user
must enter the encryption key as well as validation code to e'tract the
secret message.
The encryption key is the combination of how the encryption
format should be. Think encryption keys as passwords to the real te't.
!ut they are not real passwords. 3or e'ample, for each encryption key
there will be di4erent encryption format, you are actually mentioning
the format and not passwords.
1
#alidation code is not actually a code, but the byte position from
which hidden message begins in the image fle.
$part from hiding the message, a detailed log fle is created
containing the following details. The name of the system from which
this fle was sent, the name of the image or sound fle containing this
secret message, the email+id of the sender and the receiver, the date
of dispatch and the si&e of the source fle and the output fle.
Thus this mechanism will be very useful to bury the information
in a secure way without any loss of data.
The confdential or important information, which sent with
normal format, there might, may be a chance of happening misuse
cases. These can be avoided by making use of this system. The
mechanism, which is used to hide the message in the image fles, is
known as T),$-5,($%67.

MODULES:
$uthentication
)mbedding a message in a picture fle
)mbedding a fle in a picture fle
(etrieving the embedded message from the picture fle
(etrieving the embedded fle from the picture fle
2
SYSTEM STUDY
Existing System

0reating software is important thing but providing security is
most important thing .The software or data may get corrupted or the
intruders may change even the content of data. To avoid these entire
things proper security to the software must be provided.
0ommonly everyone provide security by means of
providing password but this method does not provide proper security.
$ny one can guess the password or break the password and see the
actual content.
8ostly the intruders corrupt the messages during the
message transferring. Therefore, here proper security has been
provided during data transition itself.
%rotection of the document is done using the technique
of cryptography. "n which the original te't is encrypted using some key
values and can be decrypted also the te't using the mentioned key, to
see the original te't back. !ut if intruders corrupt the key then whole
can be traced they will trace content. Therefore proper security issues
must be followed.
3
Propose System
The security is needed during the data transmission
because during transmission intruders may take the content. To
provide proper security to content concept of teganography has been
used.
The whole content is hidden in the image fle and
transferred to the destination as image. 6ere the intruder cannot able
to see the information or they may not know that the message is
hidden in the image fle. This will provide proper security to the
message.
This software lets to embed important or private messages
or fles right into uncompressed format fles like .!8% !itmap images,
8%9 fles etc. There is no loss to the quality of the images or 8%9 fles
as it uses the least signifcant bits of the fle, which are not used by the
"mage viewer.
ecurity can be provided by the encryption and
decryption method, content ere the viewers can easily determine that
the content is encrypted that why they can break the protection. !ut
incase of steganography the outsider2s does not know that the is
hidden in the image fle so it will provide better protection.

Stri!ing "eat#res:
0onfdential information in a secure manner.
-o loss to the quality of the images.
5nly the authori&ed receive can view :receive the message.
*etailed log fle is maintaining details.
4
"nformation is buried secure manner without any loss of data.
Prob$em De%nition

The confdential or important information, which sent with
normal format, there might, may be a chance of happening misuse
cases. These can be avoided by making use of this system. The
mechanism, which is used to hide the message in the image fles, is
known as T),$-5,($%67.
This will be very helpful to the management, which wants to send
some confdential information in a secure manner. This software lets
you embed important or private messages or fles right into
uncompressed format fles like .bmp,.gif,.;peg etc. There is no loss to
the quality of the images or8p9 fles as it uses least signifcant bits of
the fle, which are not used by the "mage viewer or audio players.
This system is used to send the message in the unknown format. There
are chances to miss the confdential or important information, when
sent in the normal format. These problems can be avoided by making
use of this system.
5
Prob$em escription
The %ro;ect entitled as <)0.() 8)$,) %$-)L= help us to send
the confdential information in a secure manner.
This software embeds important or private messages or fles in
to an uncompressed format fles like bmp (!itmap images) 8%9 fles
etc., there is no loss to the quality of the images or 8%9 fles.
This pro;ect has consists of the modules like $uthentication 3orm,
6ide 8essage, #iew 8essage, )'tract 8essage, 6ide 3ile, #iew 3ile,
)'tract 3ile, #iew 6istory etc in more detailed format.
A#thentication
$uthentication 3orm is used to provide permission to view this pro;ect.
The &o$$o'ing etai$s neee &or A#thentication "orm
(. Username
). Pass'or
The &o$$o'ing operations are carrie o#t in this &orm
O!
"t consists of the username and the password felds. "f these felds
are valid then only it2s possible to view this pro;ect. "f these felds are
invalid it2s prompt out the error message like <"nvalid tring=.
6
*ance$
"t2s used to cancel the user action.
EM+EDDI,- A MESSA-E I, A PI*TU.E "ILE
This module is used to hide message in picture fles. "mage
Location, ave 3ile Location, )ncryption >ey are provided by the user to
hide message in the save fle location.
Image $ocation
The "mage fle, which is already, e'ists in the system. .ser has to
open the fle from the open dialog bo'.
Sa/e the %$e
This is also an "mage fle, which is generated by the user. .ser
has to save this new fle in any location according to their wish. This
fle is used to embed the message in the image fle.
Encryption 0ey
This key is the private key. This is confdential key between
sender and receiver. This is also embed in picture with message
1a$iation coe
This is actual fle si&e of the image location. This is in bytes. The
message is added to the saved image location after this last byte.
2ie
"t is used to hide the message into saved image fle. 8essage
encrypted in unknown format and then embed in the saved image fle.
7
Sen
The user to another user uses this button to send the saved
image fle, which contains the message hided.
.ET.I1I,- T2E EM+EDDED MESSA-E ".OM T2E PI*TU.E "ILE
Extract Messages
This module is used to e'tract messages
Image Location
*ownloaded images by the user are given as input in this te't
bo'.
Encryption !ey
The key used to e'tract the message. This is a secret key.
(eceiver should know this key to retrieve message
1a$iation *oe
This is the o4set of the fle where actually the message is reside.
Extract message
?hen receiver clicks this button the message is shown to the
receiver.
)ncrypted messages are decrypted and then shown in the te't bo'.
EM+EDDI,- A "ILE I, A PI*TU.E "ILE
This module is used to hide picture in data fle. "t has the
following process like, "mage Location, ave 3ile Location, )ncryption
>ey is provided by the user to hide picture fle in the saved data fle
location.
8
Image $ocation
The "mage fle, which is already, e'ists in the system. .ser has
to open the fle from the open dialog bo'.
Sa/e "i$e Location
This is also "mage fle, which is generated by the user. .ser has
to save this new fle in any location according to their wish. This fle is
used to embed the picture fle in the data fle.
Encryption 0ey
This key is the private key. This is confdential key between
sender and receiver. This is also embedding the picture fle with data
fle.
1a$iation coe
This is actual fle si&e of the image location. This is in bytes. The
picture fle is added to the saved image location after this last byte.
2ie
"t is used to hide the data fle into saved picture fle. %icture fle
encrypted in unknown format and then embed in the saved data fle.
Sen
The user to another user uses this button to send the saved
image fle, which contains the picture hided.
9
.ET.I1I,- T2E EM+EDDED "ILE ".OM T2E PI*TU.E "ILE
E3T.A*T "ILE
This module is used to e'tract fles.
Image Location
*ownloaded images by the user are given as input in this te't
bo'.
Encryption !ey
The key used to e'tract the fle. This is a secret key. (eceiver
should know this key to retrieve message
1a$iation *oe
This is the o4set of the fle where actually the picture fle is
resided.
E3T.A*T "ILE
?hen receiver clicks this button the picture fle is shown to the
receiver.
)ncrypted fles are decrypted and then shown in the te't bo'.
2ISTO.Y
"t displays the details like aved "mage name, )ncryption >ey,
#alidation 0ode in more detailed format.
10
SYSTEM A,ALYSIS
2ar'are .e4#irements
%rocessor @ %entium "# A.B,6&
8ain 8emory @ CA/ 8! ($8
6ard *isk @ egate DE ,!
8onitor @ amtron CB= 0olor 8onitor
>eyboard @ amsung "nternet >eyboard
8ouse @ Logitech A !utton croll %:A
So&t'are Speci%cation
5perating ystem @ ?indows F% or later
platform @ G*> C.B or Later
11
12

Das könnte Ihnen auch gefallen