Beruflich Dokumente
Kultur Dokumente
Project Report
On
Bachelor of Technology
(Computer Sc. & Engg.)
2007-2011
BONAFIDE CERTIFICATE
Lecturer
“The satisfaction and euphoria that accompany the successful completion of any task, would
not be complete without mention of the people who made it possible because success is the
epitome of hard work, and undeterred missionary zeal, steady fast determination unperturbed
concentration and dedication and above all adept advice .So with deep gratitude we
acknowledge all those for their advices and encouragement which server as beacon light.”
We would like to take this opportunity to acknowledge the valuable help and guidance
received from Mrs. Karishma (HOD,CSE DEPT) and Mrs. Mamta Dahiya (Project Guide) in
spite of their extremely busy schedule. They not only give us their valuable time but also
provide info details regarding project.
We sincerely express our grateful to the staff of computer Science Deptt. Who stood behind
us like our backbone and with whom this project could never have been presented in the
present form.
The matter embodied in this project report has not been submitted elsewhere by anybody for
the award of any degree or diploma.
iii
ABSTRACT
The selective application of technological and related procedural safeguards is an important
responsibility of every federal organization in providing adequate security to its electronic
data system. The two techniques cryptography and steganography may be used by the
organizations to protect sensitive data. Protection of data during transmission or while in
storage may be necessary to maintain the confidentiality and integrity of information
represented by the data.
WHY IS SECURITY NEEDED?
Computer security is a branch of technology known as information security as applied to
computers. The objective of computer security varies and can include protection of
information from theft or corruption, or the preservation of availability, as defined in the
security policy.Security in its simplest form is concerned with making sure that nosy people
cannot read or even modify messages intended for other recipients. Malicious people who try
to gain benefit or harm someone cause most of the security problems. There's a whole lot of
information that we don't want other people to see, such as:
• Credit-card information
• Private correspondence
• Personal details
• Sensitive company information
• Bank-account information
But still there are some People Who Cause Security Problems And reasons for that are as
under:
Adversary GOAL
STUDENT To have fun snooping on people’s E-MAIL
HACKER To test out one’s security system; steal data
BUSINESS MAN To discover a competitor’s marketing plan
EX-EMPLOYEE To get revenge for being fired
ACCOUNTANT To embezzle money from a company
CON MAN To steal credit card nos. for sale
SPY To learn the enemy’s military strength
TERRORIST To steal germ warfare secrets
iv
To be precise, Internet security is the practice of protecting and preserving private resources
and information on the Internet .
ENCRYPTION
Encryption is the process of encoding information in such a way that only the person (or
computer) with the key can decode it. Most computer encryption systems belong in one of
two categories:
• Security-key encryption
• Public-key encryption
AUTHENTICATION
Authentication, is used to verify that the information comes from a trusted source. Basically,
if information is "authentic," you know who created it and you know that it has not been
altered in any way since that person created it. These two processes, encryption and
authentication, work hand-in-hand to create a secure environment. There are several ways to
authenticate a person or information on a computer:
STEGANOGRAPHY
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message, a form of
security through obscurity. The very existence of a message is secret.
DIGITAL WATERMARKING
Digital watermarking is the process of embedding information into a digital signal in a way
that is difficult to remove. The signal may be audio, pictures or video, for example. If the
signal is copied, then the information is also carried in the copy. A signal may carry several
different watermarks at the same time. In visible watermarking, the information is visible in
the picture or video. Typically, the information is text or a logo which identifies the owner of
media.
v
LIST OF TABLES
LIST OF FIGURES
vi
TABLE OF CONTENTS
TITLE PAGE NO.
ACKNOWLEDGEMENT ii
DECLARATION iii
ABSTRACT iv
LIST OF FIGURES vi
CHAPTER 1
1. INTRODUCTION OF INFORMATION HIDING SYSTEM 1
1.1 What is Information Hiding System 1
1.2 H/w and S/w requirements 1
1.2.1 Hardware requirements 1
1.2.2 Software requirements 2
CHAPTER 2
2. INTRODUCTION OF CRYPTOGRAPHY 3
2.1 Hash Functions 4
2.2 Secret Key Cryptography 11
2.3 Data Encryption Methods 14
2.3.1 DES Algorithm 16
2.3.2 Security threats reduced through encryption 18
CHAPTER 3
3. INTRODUCTION OF STEGANOGRAPHY 22
3.1 Image Steganography 23
3.1.1 LSB Technique 25
3.1.2 Masking and Filtering 26
3.1.3 Algorithms & Transformation 27
3.2 Audio Steganography 28
3.2.1 Methods of Audio Steganography 29
3.2.1.1 LSB Coding 29
3.2.1.2 Parity Coding 31
3.2.1.3 Phase Coding 33
3.2.1.4 Spread Coding 34
3.2.1.5 Echo Hiding 34
3.2.1.6 Audio Steganography Evaluation 35
CHAPTER 4
4. INTRODUCTION OF DIGITAL WATERMARKING 37
4.1 Types of digital Watermarking(based on file) 41
4.1.1 Fragile Watermarking 41
4.1.2 Robust Watermarking 41
4.2 Types of watermarking(based on image) 42
4.2.1 Visible Watermarking 42
4.2.2 Invisible Watermarking 42
CHAPTER 5
5. STRUCTURE OF MODULES 43
5.1 Process diagram 43
CHAPTER 6
6. SNAPSHOTS 44
6.1 Registeration Form 44
6.2 Login Form 45
6.3 Task Form 46
6.4 Sha-2 Algorithm Form 47
6.5 Sha-2 text &DES Form 48
6.6 Encryption &Decryption Form 49
6.7 Image Steganography Form 50
CHAPTER 7
7. CONCLUSION AND FUTURE PROSPECTIVES 51
7.1 Future prospective 51
7.2 Conclusion 52
8. REFERENCES 53