Sie sind auf Seite 1von 10

A

Project Report

On

INFORMATION HIDING SYSTEM

(Submitted in partial fulfillment of the requirement for the Award of Degree)

Bachelor of Technology
(Computer Sc. & Engg.)

2007-2011

Under the Guidance of: Submitted by :


Mrs. Mamta Dahiya Gaurav Aggarwal (071023, CSE A1)
(Lect.CSE,Dept.) Kanwaldeep Singh (071030, CSE A1)
Rahul Chaudhary(072033, CSE B2)

Department of Computer Science & Engineering


Apeejay College of Engineering.
Maharishi Dayanand University,
Rohtak (Haryana)
Apeejay college of Engineering,Sohna

BONAFIDE CERTIFICATE

Certified that this project report “INFORMATION HIDING SYSTEM” is the


bonafide work of by “GAURAV AGGARWAL (071023), RAHUL
CHAUDHARY (072033) and KANWALDEEP SINGH (071030) who
carried out the project work under my supervision, towards partial fulfillment of
the requirements of the Degree of Bachelor of Technology in Computer Science
& Engineering from Maharishi Dayanand University, Rohtak.

Mrs. Karishma Shukla Mrs.Mamta Dahiya

HEAD OF DEPARTMENT GUIDE

Lecturer

Computer Science and Engg. Computer Science and


Engg.
Apeejay College of Engg. Apeejay College of Engg.
M.D University M.D University
Rohtak(Haryana) Rohtak(Haryana)
i
ACKNOWLEDGEMENT

“The satisfaction and euphoria that accompany the successful completion of any task, would
not be complete without mention of the people who made it possible because success is the
epitome of hard work, and undeterred missionary zeal, steady fast determination unperturbed
concentration and dedication and above all adept advice .So with deep gratitude we
acknowledge all those for their advices and encouragement which server as beacon light.”

We would like to take this opportunity to acknowledge the valuable help and guidance
received from Mrs. Karishma (HOD,CSE DEPT) and Mrs. Mamta Dahiya (Project Guide) in
spite of their extremely busy schedule. They not only give us their valuable time but also
provide info details regarding project.

We sincerely express our grateful to the staff of computer Science Deptt. Who stood behind
us like our backbone and with whom this project could never have been presented in the
present form.

Gaurav Aggarwal Rahul Chaudhary Kanwaldeep Singh


071023 072033 071030
ii
DECLARATION
We, Gaurav Aggarwal, Rahul Chaudhary,Kanwaldeep Singh hereby declare that the
work presented in the project report titled “Information Hiding System” submitted to the
Deptt. Of Computer Sc. & Engg., Apeejay College of Engineering, Sohna (Gurgaon) for
the partial fulfillment of the requirement for the award of Degree of “Bachelor of Engineering
in Computer Sc. & Engg.” is our authentic record of my work carried out during the final
semester, 2011 at Apeejay College of Engineering, Sohna under the guidance of Mrs.Mamta
Dahiya, Lecture, Deptt. Of Computer Sc. & Engg., Apeejay College of Engineering, Sohna.

The matter embodied in this project report has not been submitted elsewhere by anybody for
the award of any degree or diploma.

Gaurav Aggarwal Rahul Chaudhary Kanwaldeep Singh


071023 072033 071030

iii
ABSTRACT
The selective application of technological and related procedural safeguards is an important
responsibility of every federal organization in providing adequate security to its electronic
data system. The two techniques cryptography and steganography may be used by the
organizations to protect sensitive data. Protection of data during transmission or while in
storage may be necessary to maintain the confidentiality and integrity of information
represented by the data.
WHY IS SECURITY NEEDED?
Computer security is a branch of technology known as information security as applied to
computers. The objective of computer security varies and can include protection of
information from theft or corruption, or the preservation of availability, as defined in the
security policy.Security in its simplest form is concerned with making sure that nosy people
cannot read or even modify messages intended for other recipients. Malicious people who try
to gain benefit or harm someone cause most of the security problems. There's a whole lot of
information that we don't want other people to see, such as:
• Credit-card information
• Private correspondence
• Personal details
• Sensitive company information
• Bank-account information
But still there are some People Who Cause Security Problems And reasons for that are as
under:
Adversary GOAL
STUDENT To have fun snooping on people’s E-MAIL
HACKER To test out one’s security system; steal data
BUSINESS MAN To discover a competitor’s marketing plan
EX-EMPLOYEE To get revenge for being fired
ACCOUNTANT To embezzle money from a company
CON MAN To steal credit card nos. for sale
SPY To learn the enemy’s military strength
TERRORIST To steal germ warfare secrets

iv

To be precise, Internet security is the practice of protecting and preserving private resources
and information on the Internet .
ENCRYPTION

Encryption is the process of encoding information in such a way that only the person (or
computer) with the key can decode it. Most computer encryption systems belong in one of
two categories:
• Security-key encryption
• Public-key encryption

AUTHENTICATION
Authentication, is used to verify that the information comes from a trusted source. Basically,
if information is "authentic," you know who created it and you know that it has not been
altered in any way since that person created it. These two processes, encryption and
authentication, work hand-in-hand to create a secure environment. There are several ways to
authenticate a person or information on a computer:

STEGANOGRAPHY
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message, a form of
security through obscurity. The very existence of a message is secret.

DIGITAL WATERMARKING

Digital watermarking is the process of embedding information into a digital signal in a way
that is difficult to remove. The signal may be audio, pictures or video, for example. If the
signal is copied, then the information is also carried in the copy. A signal may carry several
different watermarks at the same time. In visible watermarking, the information is visible in
the picture or video. Typically, the information is text or a logo which identifies the owner of
media.

v
LIST OF TABLES

TITLE OF TABLE PAGE NO.


1.1 Hardware requirements……………………………………………………………1

1.2 Software requirements…………………………………………………………….2

LIST OF FIGURES

TITLE OF FIGURE PAGE NO.

1.1 Hash Result and Salt………………………………………………………………8

1.2 Steganography Process……………………………………………………..........23

1.3 Least Significant bit insertion…………………………………………………….26

1.4 LSB Coding……………………………………………………………………….30

1.5 Parity Coding………………………………………………………………..........32

1.6 Phase Coding……………………………………………………………………...33

1.7 Echo Coding………………………………………………………………………35

1.8 Generic Process of Encoding and Decoding……………………………………...39

1.9 Visible Watermarking………………………………………………………….....42

vi

TABLE OF CONTENTS
TITLE PAGE NO.
ACKNOWLEDGEMENT ii
DECLARATION iii
ABSTRACT iv
LIST OF FIGURES vi

CHAPTER 1
1. INTRODUCTION OF INFORMATION HIDING SYSTEM 1
1.1 What is Information Hiding System 1
1.2 H/w and S/w requirements 1
1.2.1 Hardware requirements 1
1.2.2 Software requirements 2

CHAPTER 2
2. INTRODUCTION OF CRYPTOGRAPHY 3
2.1 Hash Functions 4
2.2 Secret Key Cryptography 11
2.3 Data Encryption Methods 14
2.3.1 DES Algorithm 16
2.3.2 Security threats reduced through encryption 18

CHAPTER 3
3. INTRODUCTION OF STEGANOGRAPHY 22
3.1 Image Steganography 23
3.1.1 LSB Technique 25
3.1.2 Masking and Filtering 26
3.1.3 Algorithms & Transformation 27
3.2 Audio Steganography 28
3.2.1 Methods of Audio Steganography 29
3.2.1.1 LSB Coding 29
3.2.1.2 Parity Coding 31
3.2.1.3 Phase Coding 33
3.2.1.4 Spread Coding 34
3.2.1.5 Echo Hiding 34
3.2.1.6 Audio Steganography Evaluation 35
CHAPTER 4
4. INTRODUCTION OF DIGITAL WATERMARKING 37
4.1 Types of digital Watermarking(based on file) 41
4.1.1 Fragile Watermarking 41
4.1.2 Robust Watermarking 41
4.2 Types of watermarking(based on image) 42
4.2.1 Visible Watermarking 42
4.2.2 Invisible Watermarking 42

CHAPTER 5
5. STRUCTURE OF MODULES 43
5.1 Process diagram 43

CHAPTER 6
6. SNAPSHOTS 44
6.1 Registeration Form 44
6.2 Login Form 45
6.3 Task Form 46
6.4 Sha-2 Algorithm Form 47
6.5 Sha-2 text &DES Form 48
6.6 Encryption &Decryption Form 49
6.7 Image Steganography Form 50

CHAPTER 7
7. CONCLUSION AND FUTURE PROSPECTIVES 51
7.1 Future prospective 51
7.2 Conclusion 52
8. REFERENCES 53

Das könnte Ihnen auch gefallen