Beruflich Dokumente
Kultur Dokumente
D)
Steganography
INTRODUCTION
Greek Words: STEGANOS Covered GRAPHIE Writing
Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. This can be achieve by concealing the existence of information within seemingly harmless carriers or cover Carrier: text, image, video, audio, etc.
DIAGRAM REPRESENTATION
PROBLEM DOMAIN
In today's scenario there is a huge need of efficient data security. Thus there is a huge responsibility for protecting and hosting the vast majority of the data. More than 30% of the information created today from patient care records to personal financial information, already requires high standard of protection. A malicious program or a hacker may corrupt the data in order to make it unrecoverable or unusual. Similarly , encrypted operating systems can be corrupted by a malicious program or a hacker, making the system unusable.
In recent years there have been numerous report of confidential data such as customer's personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Du to the above situation there is a strong need of a highly secure data transmission system.
SOLUTION DOMAIN
The stated problems can be resolved by changing the form of data or changing the medium information with encrypting or hiding data while transferring. The data can be sent by hiding it in an image or audio/video visuals. The advantage of steganography ,over cryptography alone , is that msgs do not attract attention to themselves
Plainly visible msgs - no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Thus our project would be n efficient & secure way to transfer confidential data. There are a wide variety of mediums available for hiding the data i.e. images, audio and video files.
FORMS
The Steganography Software have following Forms :-
LOGIN FORM OPTION FORM DATA FORM DATA HIDING FORM DATA RETRIEVAL FORM
LOGIN FORM
OPTION FORM
DATA FORM
DECRYPTION FORM
TECHNOLOGY USED
FRONTEND Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities. Java applications are typically compiled to bytecode (class file) that can run on any Java Virtual Machine (JVM) regardless of computer architecture.
HARDWARE,SOFTWARE REQUIREMENT
HARDWARE INTERFACE :-
Apart from the recommended configuration no other specific hardware is required to run the software. Recommended: Processor Processor Speed RAM Hard Disk
Intel Core2duo 1.2 GHz 2 GB 250 GB
SOFTWARE INTERFACE :The JRE is required to run the software. The JRE version should be 1.5 or higher. The other software required is the Windows media player to play the video,audio files. The image viewer is required to view image file
ARCHITECTURE
1-Tier Architecture :1-Tier Architecture is the simplest, single tier on single user, and is the equivalent of running an application on a personal computer. All the required component to run the application are located within it. User interface, business logic, and data storage are all located on the same machine. They are the easiest to design, but the least scalable. Because they are not part of a network, they are useless for designing web applications. The final application tier is the data tier.
MODEL USED
INCREMENTAL MODEL: The incremental build model is a method of software development where the model is designed, implemented and tested incrementally (a little more is added each time) until the product is finished. It involves both development and maintenance. The product is defined as finished when it satisfies all of its requirements. This model combines the elements of the waterfall model with the iterative philosophy of prototyping.
STEPS
UML DIAGRAMS
USE CASE DIAGRAM :In software engineering, a use case diagram in the Unified Modeling Language (UML) is a type of behavioral diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals (represented as use cases), and any dependencies between those use cases. The main purpose of a use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted.
Actor :An actor defines the system boundary. It is always outside the system being modeled. An actor is a person, a system or some external entity linked to one or more system use cases. An actor is a non-overlapping logical grouping of use cases. The actor is the source of the incoming event that is the first line in the use case. It is always outside the system being defined. An actor is a role defined by the set of use cases with which it is associated. The actor that starts the use case is the primary actor for that use case.
ACTOR
user
Retriew file
SEQUENCE DIAGRAM A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart. Sequence diagrams are sometimes called Event-trace diagrams, event scenarios, and timing diagram. A sequence diagram shows, as parallel vertical lines ("lifelines"), different processes or objects that live simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in which they occur. This allows the specification of simple runtime scenarios in a graphical manner.
select carrier file insert key hide data key not inserted store data
insert key
insert key
reveal data
save file
revealed data
insert key
select image
select song
select video
hide data
sav file e
Limitation with the size of object being used to hide the data. In order for steganography to be useful the message should be hidden without any major changes to the object it is being embedded in.
CONCLUSION: Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. Steganography has its place in security. It is not intended to replace cryptography but supplement it. Hiding a message with steganography methods reduces the chance of a message being detected. However, if that message is also encrypted, if discovered, it must also be cracked (yet another layer of protection).