Beruflich Dokumente
Kultur Dokumente
MINI PROJECT
ON
STEGANOGRAPHY
Submitted to CS Department, Institute of Engineering and
Technology,Bundelkhand University,Jhansi,For the fulfilment of the degree of
B.Tech(Computer Science &Engineering)
CERTIFICATE
This is to certify that the project report entitled IMAGE
STEGANOGRAPHYis a bonafide record of the project work done
by the students:
1.SHIVAM PORWAL (131234040048)
ACKNOWLEDGEMENT
This Project itself is an acknowledgement to the
inspiration, drive and technical assistance contributed by many
individuals. This project would have never seen the light of this
day without the help and guidance I have received.
DECLARATION
Place: Jhansi
Date: ---------------
5
CONTENTS
Chapter no Name Page No
1 Steganography at
Large
1.1 Introduction
7
1.2 Where hidden data
hides
1.3 What does the project
do
2 Problem Statement 10
3 Objective 11
4 Module Description
4.1 Interface Module
Diagram 12
4.2Data Flow Diagram
5 Software Support
5.1 Technical details 15
6 Image Steganography
6.1 Implementation
6.2 Encoding process 16
6.3 Decoding process
7 LSB Algorithm
6.1 Implementation 18
8 User Manual 20
9 Summary 25
10 Bibliography 26
6
Abstract
1. Steganography at Large
1.1 Introduction
Steganography hide the secrete message within the host data set and
presence imperceptible and is to be reliably communicated to a
receiver. The host data set is purposely corrupted, but in a covert
way, designed to be invisible to an information analysis.
8
2. Problem Statement:
The former consists of linguistic or language forms of
hidden writing. The later, such as invisible ink, try of hide
messages physically. One disadvantage of linguistic
steganography is that users must equip themselves to have
a good knowledge of linguistry. In recent years, everything
is trending toward digitization. And with the development
of the internet technology, digital media can be transmitted
conveniently over the network. Therefore, messages can be
secretly carried by digital media by using the
steganography techniques, and then be transmitted
through the internet rapidly
3. Objective
4. Module Description
Home:
This page will have the home display of the software and it will
have the link to other modules also. Once the module is open it can
then link to the database and retrieve the settings from the database.
This module is also responsible to apply the settings on the other
modules. This module will have only database reading capabilities and
not writing.
Create a File using the Text editor : This module will be used
to create a file that will contain the Plaint text with no
formatting. Also the file created under this module will not be
saved in the system and can and will only be saved as a
Encrypted (Visual encryption) or will be concealed under an
image file.
Import file: This module will have the ability to import file(s). It
will be able to decrypt, Unhide the file from the image file and it
will also be able to retrieve the message from the image files
generated by the encryption module using the Visual
Cryptography.
12
Home Page
Level-0 Diagram :
Database
Level-1 Diagram :
User Databas
preferences e
Home
Hide Unhide
/Encrypt /Decrypt
Proce Proce
ss ss
5. Software Support
Operating system:
Windows or GNU/Linux
JDK (1.7) :
The Java Development Kit (JDK) is an implementation of
either one of the Java SE, Java EE or Java ME platforms released by
Oracle Corporation in the form of a binary product aimed at Java
developers on Solaris, Linux, Mac OS X or Windows.
Java is fast, secure, and reliable. I am using Java because of some
the most desirable features of Java. Some of those are list below-
Security
Portability
Java Architecture
Object-Oriented Robust
JDBC (Java Database Connectivity)
Swing :
Swing, which is an extension library to the AWT, includes new
& improved components that enhance the look and functionality of
GUIs. Swing can be used to build Standalone swing GUI Applications as
well as Servlets and Applets. It employs model/view design
architecture. Swing is more portable and more flexible than AWT.
Swing is built on top of AWT and is entirely written in Java, using
AWTs lightweight component support. The architecture of Swing
components makes it easy to customize both their appearance and
behavior.
15
6. Image Steganography
6.1 Implementation:
- Technical Details:
o Using java.awt.Image, ImageIO
o The package contains all the necessary classes and
methods along with interfaces that are necessary for the
manipulation of the images.
6.2 The Encoding Process:
- The steganography technique used is LSB coding.
- The offset of the image is retrieved from its header.
- That offset is left as it is to preserve the integrity of the
header, and from the next byte, we start our encoding
process.
- For encoding, we first take the input carrier file i.e. an image
file and then direct the user to the selection of the text file.
- Creation of User Space:
o User Space is created for preserving the original file, so
that all the modifications are done in the user space.
o In the object of BufferedImage, using ImageIO.read
method we take the original image.
o Using createGraphics and drawRenderedImage method
of Graphics class, we create our user space in
BufferedImage object.
- The text file is taken as input and separated in stream of
bytes.
- Now, each bit of these bytes is encoded in the LSB of each
next pixel.
- And, finally we get the final image that contains the encoded
message and it is saved, at the specified path given by user,
in PNG format using ImageIO.write method.
16
Start Application
Encryption Decryption
7. LSB ALGORITHM
7.1 Implementation:
Encryption Process
IMAGE FILE INFORMATION FILE
Decryption Process
8. User Manual
9. Summary
10. Bibliography
Books AND Whitepapers
1. T. Morkel Information and Computer Security
Architecture (ICSA) Research group
University of Pretoria, 0002, Pretoria,
South Africa
www.oracle.com
www.slideshare.net