Sie sind auf Seite 1von 20

TITLE

SECURE DATA TRANSFER IN A NETWORK


USING EMBED TECNIQUE WITH
MULTIMEDIA FILE

CONTAINTS

1.INTRODUCTION
2.ABSTRACT
3.OBJECTIVE
4.TINY-ALGORITHM
5. TOOLS AND PLATFORM
6. MODULE DESCRIPTION
7.CONCLUSION
8.REFERENCES

INTRODUCTION
2

Steganography deals with information hiding, as opposed to encryption. The word


Steganography or Stego as it is often referred to in the IT community, literally means,
"covered writing" which is derived from the Greek language. Steganography is defined as
the art and science of communicating in a way which hides the existence of the
communication.
The objective of steganography is to send a message through some innocuous carrier to a
receiver while preventing anyone else from knowing that a message is being sent at all.
Computer based steganography allows changes to be made to what are known as digital
carriers such as images or sounds. The changes represent the hidden message, but result if
successful in no discernible change to the carrier.
Cryptography and steganography are different. Cryptographic techniques can be used to
scramble a message so that if it is discovered it cannot be read. If a cryptographic
message is discovered it is generally known to be a piece of hidden information (anyone
intercepting it will be suspicious) but it is scrambled so that it is difficult or impossible to
understand and de-code. Steganography hides the very existence of a message so that if
successful it generally attracts no suspicion at all.
Using steganography, information can be hidden in carriers such as images, audio files,
text files, videos and data transmissions. When the message is hidden in the carrier a
stego-carrier is formed for example a stego-image. Hopefully it will be perceived to be as
close as possible to the original carrier or cover image by the human senses. Images are
the most widespread carrier medium. They are used for steganography in the following
way. The message may firstly be encrypted. The sender (or embedder) embeds the secret
message to be sent into a graphic file (the cover image or the carrier). This results in the
production of what is called a stego-image. The stego-image is then transmitted to the
recipient. The recipient (or extractor) extracts the message from the carrier image. The
3

message can only be extracted if there is a shared secret between the sender and the
recipient. The figure below shows the steganographic system.
Encryption of data plays a vital role in the real time environment to keep the data out of
reach of unauthorized people, such that it is not altered and tampered and sending the in
video format is most secured way to transfer the data through the network. The Video
Stegnography is software, which tries to alter the originality of the file into some
encrypted form and embed the file into an video file. The major task of the Video
Stegnography is to provide the user the flexibility of passing the information
implementing the encryption standards as per the specification and algorithms proposed
and store the information in a form that is unreadable. The Application should have a
reversal process as of which should be in a position to de embed the data file from video
file and decrypt the data to its original format upon the proper request by the user. While
the Encryption and Decryption is done the application should confirm the standards of
authentication and authorization of the user.
The Entire application should strive to achieve a user friendly Graphical User Interface,
which need to be in a self-learning mode for the end user. The System Should provide all
the functional standards of proper navigation with in the environment, which makes it
possible for the users to have a smooth flow while working under the environment. The
Overall system should provide proper menu based navigation for easier navigation and
operation. The Application should be designed in such a way that, as soon as it starts
create a Buffer and associate this buffer to some homogeneous data environment, the
application should ask the user for the Encryption Key details and should start its
functionality upon the logistics that are provided with in this key. The key should be
designed in such a way that it prevents the unauthorized persons from stealing the
information at any point of time. This is some part of securing the data from third party
people. And the other way of securing the data is using Steganography in which
4

embedding the encrypted file in to a video file. If any one track that file they only see the
video file not the data.
The application of De-embedding, Decryption should be a reverse process at the other
end and should be translated only when the receiver of the data applies the proper
reversal key. The Decryption process should have a log-based methodology that will take
care of any errors that may be encountered while the system is under utilization and
should record all those events, which are above the general standards of security.
This system basically uses the Tiny Encryption Algorithm to encrypt the passwords. This
algorithm is a 64-bit block cipher with a variable length key. This algorithm has been
used because it requires less memory. It uses only simple operations, therefore it is easy
to implement.

ABSTRACT

Steganography is the art

of hiding information. There are a large number of

Steganographic methods used in different applications. It is extensively used in Digital


Water marking, communication within closed community with additional degrees of
security. An attempt is being made to implement a new technique , entitled
Steganographic Application Tool, for image encoding in steganography. It provides
more security for data transfer on Internet and other networks. Our intention is to hide the
existence of the message; While Cryptography scrambles a message so that it can not be
understood.
Using Steganography a secret message can be transmitted without the fact of the
transmission being discovered. This hiding of data can be done in three different media
such as text, image and audio files. Though there are variety of image formats to
implement the algorithms used in this system, we use the JPEG format to embed the
Plain text as it contains the compressed image format. In this technique, firstly the pixels
values (RGB values) of the image in which the plain text is to be embedded are extracted.
The bits of the plain text into the two LSB bits of the RGB values in the image. The
transparency bits of the pixels are not disturbed. The fact that we are embedding the plain
text into the two LSB bits enables the recipient to get the original image without any
distortions. In order to provide more security, we are first encrypting the message using
DES algorithm and then cipher text as the input to our technique and the same message
will be extracted and decrypted at the receiver end.
Steganography is really interesting subject and the applications using Steganography are
increasing day-by-day. A number of algorithms were developed and implemented to
achieve Steganography in images and audio. Many new algorithms are coming and each
of them uses a unique method of making life of a Steg-Analyst more miserable everyday.

Problem statement
6

Dependability ,a generic concept defined as the trustworthiness of a computer system


such that reliance can Justifiably be placed on the service it delivers may be viewed
w.r.t. different properties and so enables the definition of a number of different
dependability attributes , including: availability (w.r.t. readiness for usage ), reliability
(w.r.t. continuity of service), safety (w.r.t. avoidance of catastrophic
Consequences on the environment ) security (w.r.t. prevention of unauthorized access
and/or handling of information, i.e., provision of data integrity and confidentiality ).
Some of these attributes (reliability/availability and security) are often considered
separately because the Techniques used to achieve them are usually perceived as being
Mutually antagonistic. Firstly, reliability and availability are generally
Achieved by Incorporating mechanisms for Tolerating any
Faults (especially accidental faults) tha occur, or that remain despite attempts at fault
prevention durin the system design process.
These techniques will Of necessity involve space and/or time redundancy; they can easily
take advantage of a Distributed computing architecture by means of replicated
computation
Using sets of untrusted 1(or fallible)
processors.
Most notably, it suffers from equivalent keyseach key is equivalent to three others,
which means that the effective key size is only 126 bits. As a result, Some Algo is
especially bad as a cryptographic hash function. This weakness led to a method for
hacking Microsoft's Xbox game console, where the cipher was used as a hash function.
Some Algo is also susceptible to a related-key attack which requires 223 chosen plaintexts
under a related-key pair, with 232 time complexity. Because of these weaknesses, the TEA
cipher was designed.
OBJECTIVE
7

The project has the following objectives:


1. To create a tool that can be used to hide data inside a 24 bit color
image.
2. The tool should be easy to use, and should use a graphical user
interface.
3. The tool should work cross-platform.
4.
The tool should effectively hide a message using an image
degradation approach, and should be able to retrieve this
message afterwards.
5.
The tool should take into account the
original content, to theoretically more effectively hide the
message.
6.
The tool should be able to provide some information as
to the effectiveness of the hiding i.e. it should be able to
evaluate the degradation of an image. The analysis used will
consist of existing watermarking measures, re- implemented for
this tool.
7.
The technique should fall under the category of Secret Key
Steganography -where without the key the hidden message
cannot be retrieved.
8. The tool should be able to encrypt the message before
embedding it.

RESEARCH PART
Tiny Encryption Algorithm:

The Tiny Encryption Algorithm (TEA) is a cryptographic algorithm designed to


minimize memory footprint and maximize speed. It is a Feistel type cipher that uses
operations from mixed (orthogonal) algebraic groups. This research presents the
cryptanalysis of the Tiny Encryption Algorithm. In this research we inspected the most
common methods in the cryptanalysis of a block cipher algorithm. TEA seems to be
highly resistant to differential cryptanalysis, and achieves complete diffusion (where a
one bit difference in the plaintext will cause approximately 32 bit differences in the
cipher text) after only six rounds. Time performance on a modern desktop computer or
workstation is very impressive.
Block ciphers where the cipher text is calculated from the plain text by repeated
application of the same transformation or round function. In a Feistel cipher, the text
being encrypted is split into two halves. The round function, F, is applied to one half
using a sub key and the output of F is (exclusive-or-ed (XORed)) with the other half.
The two halves are then swapped. Each round follows the same pattern except for the
9

last round where there is often no swap. The focus of this thesis is the TEA Feistel
Cipher.

10

LSB CODING
A very popular methodology is the LSB (Least Significant Bit) algorithm, which replaces
the least significant bit in some bytes of the cover file to hide a sequence of bytes
containing the hidden data. That's usually an effective technique in cases where the LSB
substitution doesn't cause significant quality degradation, such as in 24-bit bitmaps.
In computing, the least significant bit (LSB) is the bit position in a binary integer
giving the unitsvalue, that is, determining whether the number is even or odd. The LSB is
sometimes referred to as the right-most bit, due to the convention in positional notation of
writing less significant digit further to the right. It is analogous to the least significant
digit of a decimal integer, which is the digit in the ones (right-most) position.
The binary representation of decimal 149, with the LSB highlighted. The MSB in an 8-bit
binary number represents a value of 128 decimal. The LSB represents a value of 1. For
example, to hide the letter "a" (ASCII code 97, which is 01100001) inside eight bytes of a
cover, you can set the
LSB of each byte like this:
10010010
01010011
10011011
11010010
10001010
00000010
01110010
00101011
11

The application decoding the cover reads the eight Least Significant Bits of those bytes to
recreate the hidden bytethat is 0110001the letter "a." As you may realize, using this
technique
let you hide a byte every eight bytes of the cover. Note that there's a fifty percent chance
that the bit you're replacing is the same as its replacement, in other words, half the time,
the bit doesn't change, which helps to minimize quality degradation. The International
Journal of Multimedia & Its Applications (IJMA) method. Here the secret information is
HEY and the cover file is audio file. HEY is to be embedded inside the audio file. First
the secret information HEY and the audio file are converted into bit stream. The least
significant column of the audio file is replaced by the bit stream of sectet information
HEY. The resulting file after embedding secret information HEY is called Stego-file.

AUDIO STEGANOGRAPHIC APPLICATIONS


Audio data hiding can be used anytime you want to hide data. There are many reasons to
hide data but most important is to prevent unauthorized persons from becoming aware of
the existence of a message. In the business world Audio data hiding can be used to hide a
secret chemical formula or plans for a new invention .
Audio data hiding can also be used in the non commercial sector to hide information that
someone wants to keep private. Terrorists can also use Audio data hiding to keep their
communications secret and to coordinate attacks. In the project ARTUS1 which aims to
embed animation parameters into audio and video contents . Data hiding in video and
audio, is of interest for the protection of copyrighted digital media, and to the government
for information systems security and for covert communications . It can also be used in
forensic applications for inserting hidden data into audio files for the authentication of
spoken words and other sounds, and in the music business for the monitoring of the songs
over broadcast radio.
12

Evaluation of Audio Steganography


ADVANTAGES :

Audio based Steganography has the potential to conceal more


information:
Audio files are generally larger than images
Our hearing can be easily fooled
Slight changes in amplitude can store vast amounts of
information
The flexibility of audio Steganography is makes it very
potentially powerful :
The methods discussed provide users with a large amount of
choice and makes the technology more accessible to
everyone. A party that wishes to communicate can rank the
importance of factors such as data transmission rate,
bandwidth, robustness, and noise audibility and then select
the method that best fits their specifications.
For example, two individuals who just want to send the
occasional secret message back and forth might use the LSB
coding method that is easily implemented. On the other
hand, a large corporation wishing to protect its intellectual
property from "digital pirates" may consider a more
sophisticated method such as phase coding, SS, or echo
hiding.

13

Another aspect of audio Steganography that makes it so


attractive is its ability to combine with existing cryptography
technologies.
Users no longer have to rely on one method alone. Not only
can information be encrypted, it can be hidden altogether.
Many sources and types makes statistical analysis more
difficult :
Greater amounts of information can be embedded without
audible degradation
Security :
Many attacks that are malicious against image
Steganography algorithms (e.g. geometrical distortions,
spatial scaling, etc.) cannot be implemented against audio
Steganography schemes. Consequently, embedding
information into audio seems more secure due to less
steganalysis techniques for attacking to audio.
As emphasis placed on the areas of copyright protection,
privacy protection, and surveillance increases,
Steganography will continue to grow in importance as a
protection mechanism.
Audio Steganography in particular addresses key issues
brought about by the MP3 format, P2P software, and the
need for a secure broadcasting scheme that can maintain
the secrecy of the transmitted information, even when
passing through insecure channels.

14

DISADVANTAGES:
Embedding additional information into audio sequences is a
more tedious task than that of images, due to dynamic
supremacy of the HAS over human visual system.
Robustness: Copyright marks hidden in audio samples using
substitution could be easily manipulated or destroyed if a
miscreant comes to know that information is hidden this
way.
Commercialized audio Steganography have disadvantages
that the existence of hidden messages can be easily
recognized visually and only certain sized data can be
hidden.
Compressing an audio file with lossy compression will result
in loss of the hidden message as it will change the whole
structure of a file. Also, several lossy compression schemes
use the limits of the human ear to their advantage by
removing all frequencies that cannot be heard. This will also
remove any frequencies that are used by a Steganography
system which hides information in that part of the spectrum.

Hardware & Software Requirement


Hardware requirement: The hardware needed for this project are listed below. The
specification of the PC is:
Processor

Intel Pentium 4-1.3GHz or


faster or AMD

Ram

512 MB DDR-Win XP
2GB DDR- Vista Business or
15

Hard drive

Vista Ultimate
1 GB

Memory

512 MB

Monitor

Any standard monitor

Software requirement: In order to carry out the development of this project, many
software are needed, these include Microsoft Windows XP, which shall be the operating
system for the project to be developed;
Front End: JDK, Java
IDE : Netbeans 6.9 and Above
Backend: MySql

MODULE DESCRIPTION

The project consists of mainly four modules encryption, hide message,


retrieve message and decryption. Encryption and hide message form
the modules. retrieve message and decryption form the modules .
Encryption
Encryption includes a message or a file encrypting. Encryption
involves converting the message to be hidden into a cipher text.
Encryption can be done by passing a secret key.Secret key can be used
for encryption of the message to be hidden.It provides security by
converting it into a cipher text,which will be difficult for hackers to
16

decrypt. Moreover if the message is password protected,then while


retrieving message,the retriever has to enter the correct password for
viewing the message.
Hide Message
Hiding message is the most important module of steganography.It
involves embedding the message into the cover text. Each pixel
typically has three numbers associated with it, one each for red, green,
and blue intensities, and these values often range from 0-255.In order
to hide the message,data is first converted into byte format and stored
in a byte array.The message is then encrypted and then embed each
bits into the LSB position of each pixel position. The least significant
(rightmost) bit of each 8-bit byte has been co-opted to hide a text
message.

Retrieve Message
It involves retrieving the embed message from the file
independent of the file format. Once the message has been retrieved it
has to be converted into original message or file.

This can be done by reading the embedded data from the master file.
The read data will be in the bytes format. This message has to be
converted into the suitable output file format.
Decryption
Decryption includes a message or a file decrypting. Decryption
involves converting the cipher text into decrypted format. Decryption
can be done by passing a secret key. Secret key can be used for
17

decryption of the message that is hidden. It provides security by


converting the cipher text, into the original data message or file .
Moreover if the message is password protected, then while retrieving
message, the retriever has to enter the correct password for viewing
the message.

CONCLUSION
The entire project has been developed and deployed as per
the requirements stated by the user, it is found to be bug free
as per the testing standards that is implemented.

Any

specification-untraced errors will be concentrated in the


coming versions, which are planned to be developed in near
future. The system at present does not take care of lower
level

check

constraints in accessing
18

the file

types in

distributed environments, which is to be considered in the


future up gradations.
As per the present status the project developed is well
equipped to handle the Central file system of an organization
in a server and provide access to the users with various
privileges as prescribed by the higher authorities in the
password file.

REFERENCES
BOOKS AND MANUALS :1.JAVA-2

Complete-Reference
19

Author

Publisher :

Patric Norton & Herberlt Schild


Tata McGraw Hill

2.System Analysis & Designing


Author

Publisher :

James A. senn
Tata McGraw Hill

3.Software Engineering Concepts


Author
Publisher :

Fairley
Tata McGraw Hill Publication,3rd

Edition.

20

Das könnte Ihnen auch gefallen