Sie sind auf Seite 1von 7

SYNOPSIS FOR M.

TECH PROJECT
DOUBLE LAYER SECURITY USING
CRYPTOGRAPHY AND STEGANOGRAPHY
by
DEEPANSHI ARORA
1/13/FET/MCS/1/012

DEPARTMENT OF ECE

1. INTRODUCTION

Cryptography and Steganography are well known and widely used techniques that manipulate
information in order to cipher or hide their existence respectively. Steganography is the art and
science of communicating in a way which hides the existence of the communication.
Cryptography scrambles a message so it cannot be understood; the Steganography hides the
message so it cannot be seen. Even though both methods provide security, a study is made to
combine both cryptography and Steganography methods into one system for better
confidentiality and security.
Cryptography systems can be broadly classified into symmetric-key systems that use a single key
that both the sender and the receiver have, and public-key systems that use two keys, a public
key known to everyone and a private key that only the recipient of messages uses.
In Cryptography, a cipher message for instance, might arouse suspicion on the part of the
recipient while an invisible message created with steganographic methods will not. In fact,
steganography can be useful when the use of cryptography is forbidden: where cryptography and
strong encryption are outlawed, steganography can circumvent such policies to pass message
covertly. However, steganography and cryptography differ in the way they are evaluated:
steganography fails when the enemy is able to access the content of the cipher message, while

cryptography fails when the enemy detects that there is a secret message present in the
steganographic medium.
The disciplines that study techniques for deciphering cipher messages and detecting hide
messages are called cryptanalysis and steganalysis. The former denotes the set of methods for
obtaining the meaning of encrypted information, while the latter is the art of discovering covert
messages.
Steganography is the art and science of hiding communication; a steganographic system
thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdroppers
suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic
content. Today, computer and network technologies provide easy-to-use communication for
steganography.
Essentially, the information-hiding process in a steganographic system starts by identifying a
cover mediums redundant bits (those that can be modified without destroying that mediums
integrity). The embedding process creates a stego medium by replacing these redundant bits with
data from the hidden message.
Modern steganographys goal is to keep its mere presence undetectable, but steganographic
systems because of their invasive natureleave behind detectable traces in the cover medium.
Even if secret content is not revealed, the existence of it is: modifying the cover medium changes
its statistical properties, so eavesdroppers can detect the distortions in the resulting stego
mediums statistical properties. The process of finding these distortions is called statistical
steganalysis.

2. LITERATURE SURVEY (PREVIOUS WORK & THEIR LIMITATIONS)

A. The Scope Of Steganography


With the boost in computer power, the internet and with the development of digital signal
processing (DSP), information theory and coding theory, steganography has gone digital. In
the realm of this digital world, steganography has created an atmosphere of corporate vigilance
that has spawned various interesting applications, thus its continuing evolution is
guaranteed.Cyber-crime is believed to benefit from this digital revolution. Hence an immediate
concernis to find out best possible attacks to carry out steganalysis, and simultaneously, finding
out techniques to strengthen existing stegnography techniques against popular attacks like
steganalysis.

B. Cryptography

Cryptography encodes information in such a way that nobody can read it, except the person who
holds the key. More advanced cryptotechniques ensure that the information being transmitted has
not been modified in transit.There is some difference in cryptography and steganography, in
cryptography the hidden message is always visible, because information is in plain text form but
in steganography hidden message is invisible.
Vignesh Kumar Munirajan, Eric Cole, Sandy Ring in Steganography is a means of data hiding in
images for covert transmission. Though steganography aims at transmitting images without
visual degradation or changes for a naked observer, it cannot dispense with altering spatial and
transform level details in order to embed the data [1, 2, 3 ]. Even though these alterations may
not be captured by visual observation, they do manifest themselves for detailed analysis.
Ken Cabeen and Peter Gent have discussed the mathematical equations of Discrete Cosine
Transform (DCT) and its uses in image compression. Andrew B.
Watson has discussed Discrete Cosine Transform (DCT) technique for converting a signal into
elementary frequency component. He developed simple function to compute DCT and show how
it is used for image compression.
Jessica Fridrich have discussed a reliable and accurate method for detecting least significant bit
(LSB) non sequential embedding in digital images. The secret message length is derived by
inspecting the lossless capacity in the LSB and shifted LSB plane.

According to a paper, there usually exists some smooth regions in natural images, which would
cause the LSB of cover images not to be completely random or even to contain some texture
information just like those in higher bit planes. If embedding a message in these regions, the LSB
of stego images becomes more random, and according to our analysis and extensive experiments,
it is easier to detect. In most previous steganographic schemes, however, the pixel/pixel-pair
selection is mainly determined by a PRNG without considering the relationship between the
characteristics of content regions and the size of the secret message to be embedded, which
means that those smooth/flat regions will be also contaminated by such a random selection
scheme even if there are many available edge regions with good hiding characteristics. To
preserve the statistical and visual features in cover images, a novel scheme is proposed which
can first embed the secret message into the sharper edge regions adaptively according to a
threshold determined by the size of the secret message and the gradients of the content edges.

3. OBJECTIVE
The goal of steganography is covert communication. So, a fundamental requirement of this
steganography system is that the hider message carried by stego-media should not be sensible to
human beings.
The other goal of steganography is to avoid drawing suspicion to the existence of a hidden
message. This approach of information hiding technique has recently became important in a
number of application area.
This project has following objectives:

To do extensive literature survey.


To study various techniques of Cryptography.
To study various techniques of Steganography.
To study how to combine both the techniques.
To Implement techniques of Cryptography.
To Implement techniques of Steganography.
To combine both the techniques.
Do a comparitative study between the techniques used.

4. METHODOLOGY OF PROPOSED SYSTEM


Basically a text is encrypted using Cryptography and then is hidden i.e embedded with the cover
image using Steganography. At the receiving end, encrypted msg is extracted and then decrypted
to get the original message.

The basic model of steganography consists of Carrier, Message and password. Carrier is also
known as cover-object, which the message is embedded and serves to hide the presence of the
message.
Basically, the model for steganography is shown on following figure:
Coverobject, X
F(X, M,
K)
Message,
M

Stego-key,
K

Another model to explain the concept :

Stego Object,
Z

Message is the data that the sender wishes to remain it confidential. It can be plain text, cipher
text, other image, or anything that can be embedded in a bit stream such as a copyright mark, a
covert communication, or a serial number. This message is encrypted using Cryptography. Then
a password is used known as stego-key, which ensures that only recipient who knows the
corresponding decoding key will be able to extract the message from a cover-object. The coverobject with the secretly embedded message is then called the Stego-object.
Recovering message from a stego-object requires the cover-object itself and a corresponding
decoding key if a stego-key was used during the encoding process. The original image may or
may not be required in most applications to extract the message. The extracted message is
decrypted using cryptography technique.

5. REFERENCES

Ken Cabeen and Peter Gent, Image Compression and Discrete Cosine Transform,
College
of
Redwoods.
http://online.redwoods.cc.ca.us/instruct/darnold/LAP
ROJ/Fall98/PKen/dct.pdf

Chang, C.C., Chen, T.S. and Chung, L.Z., A steganographic method based upon JPEG
and quantization table modification, Information Sciences, 2002, 141(1-2), pp.123-38.
[4]T. Morkel, J.H.P. Eloff , M.S. Olivier,"An Overview of Image Steganography," in
Proceedings of the Fifth Annual Information Security South Africa Conference
(ISSA2005), Sandton, South Africa, June/July 2005 .

Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, An Encrypto-Stego Technique Based
secure data Transmission System, PEC, Chandigarh.

Venkata Sai Manoj, Cryptography and Steganography, International Journal of


Computer Applications (0975 8887), Volume 1 No.12

B B Zaidan, A.A Zaidan, A.K. Al-Frajat and H.A. Jalab, On the Differences between
Hiding Information and Cryptography Techniques: An Overview, Journal of Applied
Sciences 10(15): 1650-1655, 2010

Domenico Bloisi and Luca Iocchi, Image Based Steganography and Cryptography,
Sapienza University of Rome, Italy.

Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu, A Survey on
Cryptography and Steganography Methods for Information Security, Internaltional
Journal of Computer Applications(0975-8887), Volume 12 No. 2, November 2010.

Dipti Kapoor Sarmah, Neha bajpai, Proposed System for Data Hhiding Using
Cryptography and Steganography, International Journal of Computer Applications (0975
8887), Volume 8 No. 9, October 2010.

Das könnte Ihnen auch gefallen