Sie sind auf Seite 1von 34

Submitted To : Nirupama Kurmi (H.O.

D)

Submitted By : Ankit Shrivastav Ankit Chaturvedi Gaurav Sharan Goyal

Steganography

INTRODUCTION
Greek Words: STEGANOS Covered GRAPHIE Writing

Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieve by concealing the existence of information within seemingly harmless carriers or cover Carrier: text, image, video, audio, etc.

Stegosaurus: a covered lizard


(but not a type of cryptography)

DIAGRAM REPRESENTATION

PROBLEM DOMAIN
In today's scenario there is a huge need of efficient data security. Thus there is a huge responsibility for protecting and hosting the vast majority of the data. More than 30% of the information created today from patient care records to personal financial information, already requires high standard of protection. A malicious program or a hacker may corrupt the data in order to make it unrecoverable or unusual. Similarly , encrypted operating systems can be corrupted by a malicious program or a hacker, making the system unusable.

In recent years there have been numerous report of confidential data such as customer's personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Du to the above situation there is a strong need of a highly secure data transmission system.

SOLUTION DOMAIN
The stated problems can be resolved by changing the form of data or changing the medium information with encrypting or hiding data while transferring. The data can be sent by hiding it in an image or audio/video visuals. The advantage of steganography ,over cryptography alone , is that msgs do not attract attention to themselves

Plainly visible msgs - no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Thus our project would be n efficient & secure way to transfer confidential data. There are a wide variety of mediums available for hiding the data i.e. images, audio and video files.

FORMS
The Steganography Software have following Forms :-

LOGIN FORM OPTION FORM DATA FORM DATA HIDING FORM DATA RETRIEVAL FORM

LOGIN FORM

OPTION FORM

DATA FORM

DATA HIDING FORM

DECRYPTION FORM

TECHNOLOGY USED
FRONTEND Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM) regardless of computer architecture.

HARDWARE,SOFTWARE REQUIREMENT
HARDWARE INTERFACE :-

Apart from the recommended configuration no other specific hardware is required to run the software. Recommended: Processor Processor Speed RAM Hard Disk
Intel Core2duo 1.2 GHz 2 GB 250 GB

SOFTWARE INTERFACE :The JRE is required to run the software. The JRE version should be 1.5 or higher. The other software required is the Windows media player to play the video,audio files. The image viewer is required to view image file

ARCHITECTURE
1-Tier Architecture :1-Tier Architecture is the simplest, single tier on single user, and is the equivalent of running an application on a personal computer. All the required component to run the application are located within it. User interface, business logic, and data storage are all located on the same machine. They are the easiest to design, but the least scalable. Because they are not part of a network, they are useless for designing web applications. The final application tier is the data tier.

MODEL USED
INCREMENTAL MODEL: The incremental build model is a method of software development where the model is designed, implemented and tested incrementally (a little more is added each time) until the product is finished. It involves both development and maintenance. The product is defined as finished when it satisfies all of its requirements. This model combines the elements of the waterfall model with the iterative philosophy of prototyping.

STEPS

BLOCK DIAGRAM OF INCREMENTAL MODEL

UML DIAGRAMS
USE CASE DIAGRAM :In software engineering, a use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals (represented as use cases), and any dependencies between those use cases. The main purpose of a use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted.

Actor :An actor defines the system boundary. It is always outside the system being modeled. An actor is a person, a system or some external entity linked to one or more system use cases. An actor is a non-overlapping logical grouping of use cases. The actor is the source of the incoming event that is the first line in the use case. It is always outside the system being defined. An actor is a role defined by the set of use cases with which it is associated. The actor that starts the use case is the primary actor for that use case.

ACTOR

USE CASE DIAGRAM


Hide file

user

Retriew file

SEQUENCE DIAGRAM A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart. Sequence diagrams are sometimes called Event-trace diagrams, event scenarios, and timing diagram. A sequence diagram shows, as parallel vertical lines ("lifelines"), different processes or objects that live simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in which they occur. This allows the specification of simple runtime scenarios in a graphical manner.

SEQUENCE DIAGRAM (HIDING DATA)


select data : user select data to be hidden select carrier file insert key carrier file with hidden message storage media

select carrier file insert key hide data key not inserted store data

SEQUENCE DIAGRAM (RETRIEVE DATA)


select carrier file with hidden message : user select data to be hidden insert key reveal data storage media

insert key

wrong key inserted(reinsert)

original data revealed store file

Activity Diagram Description:


Activity diagrams are typically used for business process modeling, for modeling the logic captured by a single use case or usage scenario, or for modeling the detailed logic of abusiness rule. Although UML activity diagrams could potentially model the internal logic of a complex operation it would be far better to simply rewrite the operation so that it is simple enough that you dont require an activity diagram. In many ways UML activity diagrams are the object-oriented equivalent of flow charts and data flow diagrams (DFDs) from structured development.

ACTIVITY DIAGRAM (HIDING DATA)


start enter correct id/password incorrect id/password login

select carrier file with hidden message

insert key

reveal data

save file

revealed data

ACTIVITY DIAGRAM (RETRIEVE DATA)


start enter correct id/password login incorrect select file/data to be hidden

insert key

select image

select song

select video

hide data

sav file e

carrier file with hidden data

LIMITATION AND CONCLUSION


LIMITATION:

Limitation with the size of object being used to hide the data. In order for steganography to be useful the message should be hidden without any major changes to the object it is being embedded in.

CONCLUSION: Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. Steganography has its place in security. It is not intended to replace cryptography but supplement it. Hiding a message with steganography methods reduces the chance of a message being detected. However, if that message is also encrypted, if discovered, it must also be cracked (yet another layer of protection).

REFERENCES AND BIBLIOGRAPHY


ONLINE DOCUMENTATION :en.wikipedia.org/wiki/Steganography www.garykessler.net/library/steganography.html www.steganography.org http://mozaiq.org/

THANK YOU ALL ANY QUERY?

Das könnte Ihnen auch gefallen