Sie sind auf Seite 1von 10

Project Proposal (IVSS)

IVSS
(IMAGE & VIDEO STEGANOGRAPHIC SOFTWARE)
“Project Proposal”

1
Project Proposal (IVSS)

“IVSS”
(IMAGE & VIDEO STEGANOGRAPHIC SOFTWARE)

MEMBERS:
ADIL AZHAR QURESHI 07-ARID-660
ABDULLAH AHMED 07-ARID-689

PROJECT SUPERVISOR:
MAM BUSHRA HAMID

“A proposal for the Final Year Project”


“A partial fulfillment for completion of Software Development as a Final Year
Project”

“University Institute Of Information Technology”


“Pir Meher Ali Shah Arid Agriculture University Rawalpindi”

December 2010

2
Project Proposal (IVSS)

Abstract:

Users of some systems are at risk of being compelled to disclose their keys or other private data,

and this risk could be mitigated if access control mechanisms supported an element of plausible

deniability. However, existing plausible deniability mechanisms, such as the one-time pad, are of

rather limited scope.

In our project, we will present the steganographic file system. This is a storage mechanism

designed to give the user a very high level of protection against being compelled to disclose its

contents. It will deliver a file to any user who knows its name and password; but an attacker who

does not possess this information and cannot guess it, can gain no information about whether the

file is present, even given complete access to all the hardware and software. We will provide two

independent constructions, which make slightly different assumptions.

If we make an overview of different technologies around us we come to know that there is a

keen need of security in every field. Therefore, in our project IVSS we will be concerned with

security of images and video which has many applications in cinematography, image or video

quality detection, image or video tempering detection and many more. The references and

concept of IVSS are consisted of Steganography, Cryptography and Watermarking

3
Project Proposal (IVSS)

Contents:

Abstract……………………………………………………………….3

1. Introduction and overview…………………………………………5

2. Project Rationale……………………………………………………6

3. Project Purpose……………………………………………………..6

4. Project Goal…………………………………………………………6

5. Broad statement of Scope………………………………………….6

6. Project Objectives…………………………………………………..7

7. Anticipated Benefits…………………………………………………7

8. Key Success Factors………………………………………………..7

9. Major Deliverables…………………………………………………7

10. Estimated Timeframe………………………………………………8

11. Estimated Budget…………………………………………………..8

12. Constraints………………………………………………………….9

13. Assumptions…………………………………………………..…….9

14. Potential Risks……………………………………………..……….9

4
Project Proposal (IVSS)

1. INTRODUCTION AND OVERVIEW:

If we make an overview of different technologies around us we come to know that there


is a keen need of security in every field. Therefore, in our project IVSS we will be
concerned with security of images and video which has many applications in
cinematography, image or video quality detection, image or video tempering detection
and many more. The references and concept of IVSS are consisted of Steganography,
Cryptography and Watermarking which are discussed below.

Steganography is the art and science of writing hidden messages in such a way that no
one, apart from the sender and intended recipient, suspects the existence of the message,
a form of security through obscurity. Generally, messages will appear to be something
else: images, articles, shopping lists, or some other converted text and, classically, the
hidden message may be in invisible ink between the visible lines of a private letter.

Video Steganography is a technique to hide any kind of files in any extension into a
carrying Video file. Our project will be the application, developed to embed any kind of
data(File) in another file, which is called carrier file. The carrier file must be a video file.
It will be concerned with embedding information in an innocuous cover media in a secure
and robust manner. The system will make the Files more secure by using the concepts
Steganography and Cryptography.

Digital watermarking is the process of embedding information into a digital signal in a


way that is difficult to remove. The signal may be audio, pictures or video, for example.
If the signal is copied, then the information is also carried in the copy. A signal may carry
several different watermarks at the same time.
In visible watermarking, the information is visible in the picture or video. Typically, the
information is text or a logo which identifies the owner of the media. The image on the
right has a visible watermark. When a television broadcaster adds its logo to the corner of
transmitted video, this is also a visible watermark.
For example if we make a steganographic program to encrypt/Decrypt some text under
image audio and video, we would use image as bmp(54 byte header) file, audio as
wav(44 byte header) file and video as avi(56 byte header) file formats afterwards, we will
encrypt text under all these file and it will get encrypted and will be decrypted on the
receiver end.
Our task will be concerned of matching the original and tempered images, videos that
will be accomplished by comparing the data bits of the images and videos. In case of
picture images the consistency and regularity of pixels to identify whether the image is

5
Project Proposal (IVSS)

tempered or any other kind of changing is done with it or not. On the other hand video
tempering will be handled through the quality of frames.

2. PROJECT RATIONALE:

One of the reasons that intruders can be successful is that most of the information they
acquire from a system is in a form that they can read and comprehend. Intruders may
reveal the information to others, modify it to misrepresent an individual or organization,
or use it to launch an attack. One solution to this problem is, through the use of
steganography. Steganography is a technique of hiding information in digital media. In
contrast to cryptography, it is not to keep others from knowing the hidden information
but it is to keep others from thinking that the information even exists.

Steganography become more important as more people join the cyberspace revolution.
Steganography is the art of concealing information in ways that prevent the detection of
hidden messages. Steganography include an array of secret communication methods that
hide the message from being seen or discovered.

3. PROJECT PURPOSE:

The overall reason for IVSS is to develop such a software which includes the
facility to secure the data using both techniques of image steganography and
video steganography.

4. PROJECT GOAL:

The goal of IVSS is to avoid drawing suspicion to the existence of a hidden


message. This approach of information hiding technique has recently become
important in a number of application areas. Digital audio, video, and pictures are
increasingly furnished with distinguishing but imperceptible marks, although we
will be specifically dealing with text, image files and video files which may
contain a hidden copyright notice or serial number or even help to prevent
unauthorized copying directly.

5. BROAD STAEMENT OF SCOPE:

The scope of the project as follow:

6
Project Proposal (IVSS)

(i) Implementation of steganographic tools for hiding information includes text,


image files and video files.
(ii) Three different approaches being explored which are least significant bit,
masking and filtering and algorithms and transformation.

6. PROJECT OBJECTIVES:

This project comprehends the following objectives:

(i) To produce security tool based on steganographic techniques (Image And


Video Steganography).

(ii) To explore techniques of hiding data using steganography.

7. ANTICIPATED BENEFITS:

There will be as many benefits of IVSS as the users want to communicate their
information securely which includes the common user as well. However some
organizational kinds of benefits could be extracted for:

Military communications system make increasing use of traffic security technique which,
rather than merely concealing the content of a message using encryption, seek to conceal
its sender, its receiver or its very existence.

Similar techniques are used in some mobile phone systems and schemes proposed for
digital elections.

8. KEY SUCCESS FACTORS:

The basic key success factor that can identify that the project is successfully completed is
that if the proposed software fulfills the software requirements and if the goals of the
project are achieved, therefore if the IVSS is able to hide the information by using text,
image files and video files we can say that the project is successfully completed.

7
Project Proposal (IVSS)

9. MAJOR DELIVERABLES:

The major deliverables of IVSS will include:

Functional description document


Behavioral description document
Validation and Criterion document
STD’s (State Transition Diagrams)
DFD’s (Data Flow Diagrams)
SRS (Software Requirement Specifications)

Deliverable Recipient Month Delivery Method


Functional description Supervisor and DEC, 2010 Text Document (Hard
document Uni. Project Copy)
Management
Behavioral description Supervisor and DEC, 2010 Text Document (Hard
document Uni. Project Copy)
Management
Validation and Criterion Supervisor and DEC, 2010 Text Document (Hard
document Uni. Project Copy)
Management
STD’s (State Transition Supervisor and DEC, 2010 Text Document (Hard
Diagrams) Uni. Project Copy)
Management
DFD’s (Data Flow Supervisor and DEC, 2010 Text Document (Hard
Diagrams) Uni. Project Copy)
Management
SRS (Software Requirement Supervisor and DEC, 2010 Text Document (Hard
Specifications) Uni. Project Copy)
Management
Final Implementation Supervisor and JUN, 2011 Executable file (Soft
Uni. Project Copy)
Management

10. ESTIMATED TIME FRAME:

8
Project Proposal (IVSS)

11. ESTIMATED BUDGET:


Labor Material Travel Total per
Project Task
Time Cost Cost Task
Upto
Project Documentation 2 months 2000 Rs 4000 Rs
2000 Rs
Upto
Project Hardware Requirement 6 months 1000 Rs 21000 Rs
20000 Rs
Up to
Develop System Architecture 4 months --- 2000 Rs
2000 Rs

12. CONSTRAINTS:

9
Project Proposal (IVSS)

One possible constraint on the program is how much data a given source image can hide
without it becoming evident that data is being hidden.

Another constraint is one imposed by the underlying operating system. The files that the
program manipulates cannot be larger than the largest possible file on the file system.

13. ASSUMPTIONS:

This project is assumed to be completed by June 2011. This depends on whether the
group can understand the mathematics involved in storing information into the image and
video files.

Once the mathematics and particulars of the encode and decode operations have been
solved, the rest of the project should be fairly simple to implement.

14. POTENTIAL RISKS:


The major potential risk that is involved in our project is to handle out the encryption and
decryption mechanisms.

Another risk is the identification of the threats that are involved in the protection
mechanism.

10