SlideShare a Scribd company logo
1 of 55
Download to read offline
A
B. TECH PROJECT REPORT
on
“STEGANOGRAPHY”
Submitted in partial fulfillment of
the requirements for the award of the degree of
Bachelor of Technology
in
Information Technology
Submitted by
Mr. Abhijeet Harihar Khire (Roll No. 20140759)
Ms. Shweta Sanjay Mahadik (Roll No. 20140760)
Mr. Madhav Vyankatrao Solanke (Roll No. 20130756)
Mr. Suraj Shivaji Panavkar (Roll No. 20150785)
Under the guidance of
Prof. S.R.Hivre
Prof. P.P.Jadhav
DEPARTMENT OF INFORMATION TECHNOLOGY
DR.BABASAHEB AMBEDKAR TECHNLOGICAL UNIVERSITY,
LONERE,RAIGAD-MAHARASHTRA, INDIA-402103
2017-2018
DR.BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY
Lonere,Raigad-Maharashtra,India-402103
DEPARTMENT OF INFORMATION TECHNOLOGY
Certificate
This is to certify that the final year project entitled on Steganography is submitted by Mr.
Abhijeet Harihar Khire (Roll No.20140759) , Ms.Shweta Sanjay Mahadik (Roll No.20140760) ,
Mr.Madhav Vyankatrao Solanke (Roll No.20130756), Mr.Suraj Shivaji Panavkar (Roll No.20150785)
for the partial fulfilment of the requirements of the degree of Bachelor of Technology in Informa-
tion Technology of the Dr.Babasaheb Ambedkar Technological University,Lonere is a bonafide
work carried out during the academic year 2017-2018.
Prof.S.R.Hivre
Prof.P.P.Jadhav Dr.S.M.Jadhav
(Project Guide) (Head of Department)
Information Technology Information Technology
Examiners:
1)
2).
Date:
Place:Vidyavihar, Lonere- 402103
ACKNOWLEDGEMENT
We are pleased to present this Project report entitled STEGNAOGRAHY. It is indeed a
great pleasure and a moment of immense satisfaction for us to express our sense of profound
gratitude and indebtedness towards our guide Prof.S.R.Hivre and Prof. P.P.Jadhav whose en-
thusiasm are the source of inspiration for us. We are extremely thankful for the guidance and
untiring attention, which she bestowed on me right from the beginning. Her valuable and timely
suggestions at crucial stages and above all her constant encouragement have made it possible
for us to achieve this work. Would also like to give our sincere thanks to Dr. S.M. JADHAV
Head of Department of INFORMATION TECHNOLOGY for necessary help and providing us
the required facilities for completion of this project report. We would like to thank the entire
Teaching staff who are directly or indirectly involved in the various data collection and soft-
ware assistance to bring forward this seminar report. We express our deep sense of gratitude
towards our parents for their sustained cooperation and wishes, which have been a prime source
of inspiration to take this project work to its end without any hurdles. Last but not the least,
We would like to thank all our B.Tech. colleagues for their co-operation and useful suggestion
and all those who have directly or indirectly helped us in completion of this project work.
Mr. Abhijeet Khire (Roll No.20140759)
Ms.Shweta Mahadik (Roll No.20140760)
Mr. Madhav Solanke (Roll No.20130756)
Mr.Suraj Panavkar (Roll No.20150785)
Date:
Place:Lonere
ABSTRACT
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital
images are the most popular because of their frequency on the Internet. For hiding secret
information in images, there exists a large variety of steganography techniques some are more
complex than others and all of them have respective strong and weak points. Different appli-
cations have different requirements of the steganography technique used.
For example, some applications may require absolute invisibility of the secret information,
while others require a larger secret message to be hidden. This project hides the message with
in the image . For a more secure approach, the project it allows user to choose the bits for
replacement instead of LSB replacement from the image. sender select the cover image with
the secret text or text file and hide it in to the image with the bit replacement choice, it help
to generate the secure stego image .the stego image is sent to the destination with the help of
private or public communication network . on the other side i.e. receiver. receiver download
the stego image and using the software retrieve the secret text hidden in the stego image .
Contents
1 INTRODUCTION 1
1.1 What Is Steganography? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 LITERATURE REVIEW 5
2.1 Cryptography Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Basics Of Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3 Steganography With LSB Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 7
3 REQUIREMENTS ANALYSIS 8
3.1 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2 Non-Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.3 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3.1 Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.3.2 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 IMAGE STEGANOGRAPHY 10
4.1 Types of Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.1.1 Text Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.1.2 Image Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.1.3 Audio Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.1.4 Video Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.2 STEGANOGRAPHY IN IMAGE . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5 HOW IT WORKS? 14
5.1 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.1.1 Technical Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.1.2 The Encoding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
iii
5.1.3 Creation of User Space . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.1.4 The Decoding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6 BRIEF ALGORITHM IMPLEMENTATION 16
6.1 LSB(Least Significant Bit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.1.1 Spatial Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
6.1.2 Masking and filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
7 SYSTEM DESIGN 21
7.1 Usecase Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
7.2 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.3 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
7.4 State Chart Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.5 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.6 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
7.7 DFD Level 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
7.8 DFD Level 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7.9 DFD Level 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
8 SYSTEM IMPLEMENTATION 34
9 APPLICATION OF SYSTEM 43
9.1 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
9.2 Disadvantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
9.3 Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
10 FUTURE SCOPE 45
List of Figures
1.1 PORCESS OF STEGANOGRAPHY . . . . . . . . . . . . . . . . . . . . . 2
4.1 COMMUNICATION THROUGH STEGANOGRAPHY . . . . . . . . . 12
5.1 LSB Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6.1 Encryption Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.2 Decryption Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
7.1 Usecase Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
7.2 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.3 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
7.4 State Chart Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
7.5 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
7.6 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
7.7 Level 0 Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
7.8 Level 1 Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
7.9 Level 2 Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
8.1 HOMEPAGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
8.2 MENU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
8.3 ENCODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
8.4 DECODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
8.5 PRINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
8.6 HELP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
8.7 ABOUT US . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
8.8 MAIL SERVICES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
8.9 STEGO SOCIAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
v
Chapter 1
INTRODUCTION
1.1 What Is Steganography?
Steganography is a Greek word which means concealed writing. The word steganos means
covered and graphial means writing . Thus, steganography is not only the art of hiding data
but also hiding the fact of transmission of secret data. Steganography hides the secret data in
another file in such a way that only the recipient knows the existence of message. In ancient
time, the data was protected by hiding it on the back of wax, writing tables, stomach of rabbits
or on the scalp of the slaves. But todays most of the people transmit the data in the form of text,
images, video, and audio over the medium. In order to safely transmission of confidential data,
the multimedia object like audio, video, images are used as a cover sources to hide the data.
Steganography is defined as the study of invisible communication. Steganography usually deals
with the ways of hiding the existence of the communicated data in such a way that it remains
confidential. It maintains secrecy between two communicating parties. In image steganography,
secrecy is achieved by embedding data into cover image and generating a stego-image. There are
different types of steganography techniques each have their strengths and weaknesses. In this
paper, we review the different security and data hiding techniques that are used to implement
a steganography such as LSB, ISB, MLSB etc.
In todays world, the communication is the basic necessity of every growing area. Everyone
wants the secrecy and safety of their communicating data. In our daily life, we use many secure
pathways like internet or telephone for transferring and sharing information, but it’s not safe
at a certain level. In order to share the information in a concealed manner two techniques
could be used. These mechanisms are cryptography and steganography. . In cryptography,
the message is modified in an encrypted form with the help of encryption key which is known
1
STEGANOGRAPHY Dept. of Information Technology
Figure 1.1: PORCESS OF STEGANOGRAPHY
to sender and receiver only. The message cannot be accessed by anyone without using the
encryption key. However, the transmission of encrypted message may easily arouse attackers
suspicion, and the encrypted message may thus be intercepted, attacked or decrypted violently.
In order to overcome the shortcomings of cryptographic techniques, steganography techniques
have been developed. Steganography is the art and science of communicating in such a way
that it hides the existence of the communication. Thus, steganography hides the existence of
data so that no one can detect its presence. In steganography the process of hiding information
content inside any multimedia content like image , audio, video referred as a Embedding. For
increasing confidentiality of communicating data both techniques may combined. Application
of Steganeography:
i)Confidential Communication
ii) Protection of Data Alteration
iii) Access Control System for Digital Content Distribution
iv) E-Commerce
v) Media
vi) Database Systems.
2 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
vii) digital watermarking.
viii)Secret Data Storing
1.2 History
The first recorded uses of steganography can be traced back to 440 BC when Herodotus
mentions two examples in his Histories.Histiaeus sent a message to his vassal, Aristagoras,
by shaving the head of his most trusted servant, ”marking” the message onto his scalp, then
sending him on his way once his hair had regrown, with the instruction, When thou art come
to Miletus, bid Aristagoras shave thy head, and look thereon.” Additionally, Demaratus sent
a warning about a forthcoming attack to Greece by writing it directly on the wooden backing
of a wax tablet before applying its beeswax surface. Wax tablets were in common use then
as reusable writing surfaces, sometimes used for shorthand. Steganography has been widely
used for centuries. Here are some examples Hidden messages within a wax tablet: in ancient
Greece, people wrote messages on wood and covered it with wax that bore an innocent covering
message. Hidden messages on messenger’s body were also used in ancient Greece. Herodotus
tells the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the
hair that afterwards grew over it, and exposed by shaving the head. The message allegedly
carried a warning to Greece about Persian invasion plans. The method has obvious drawbacks,
such as delayed transmission while waiting for the slave’s hair to grow and restrictions on the
number and the size of messages that can be encoded on one person’s scalp.
Hidden messages on paper written in secret inks, under other messages or on the blank parts of
other messages Messages written in Morse code on yarn and then knitted into a piece of clothing
worn by a courier. Messages written on envelopes in the area covered by postage stamps. In
the early days of the printing press, it was common to mix different typefaces on a printed
page because the printer did not have enough copies of some letters in one typeface. Thus,
a message could be hidden by using two or more different typefaces, such as normal or italic.
During both world wars, female spies used knitted codes so new knitted patterns were banned
during both wars.During and after World War II, espionage agents used photographically-
produced microdots to send information back and forth. Microdots were typically minute (less
than the size of the period produced by a typewriter). World War II microdots were embedded
in the paper and covered with an adhesive, such as collodion. That was reflective and so
3 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
was detectable by viewing against glancing light. Alternative techniques included inserting
microdots into slits cut into the edge of postcards.
During World War II, Velvalee Dickinson, a spy for Japan in New York City, sent information
to accommodation addresses in neutral South America. She was a dealer in dolls, and her
letters discussed the quantity and type of doll to ship. The stegotext was the doll orders,
and the concealed ”plaintext” was itself encoded and gave information about ship movements,
etc. Her case became somewhat famous and she became known as the Doll Woman. During
World War II, photosensitive glass was declared secret, and used for transmitting information
to Allied armies. Jeremiah Denton repeatedly blinked his eyes in Morse code during the 1966
televised press conference that he was forced into as an American prisoner-of-war by his North
Vietnamese captors, spelling out ”T-O-R-T-U-R-E”. That confirmed for the first time to the
US Naval Intelligence and other Americans that the North Vietnamese were torturing American
prisoners-of-war. In 1968, crew members of the USS Pueblo intelligence ship, held as prisoners
by North Korea, communicated in sign language during staged photo opportunities, to inform
the United States that they were not defectors but captives of the North Koreans. In other
photos presented to the US, crew members gave ”the finger” to the unsuspecting North Koreans,
in an attempt to discredit photos that showed them smiling and comfortable.
4 DR.B.A.Tech.University
Chapter 2
LITERATURE REVIEW
Electronic communication is the lifeblood of many organizations.
Much of the information communicated on a daily basis must be kept confidential. Informa-
tion such as financial reports, employee data and medical records needs to be communicated
in a way that ensures confidentiality and integrity. This makes good business sense and may
even be regulated by legislation like the Health Insurance Portability and Accountability Act
(HIPAA). The problem of unsecure communication is compounded by the fact that much of
this information is sent over the public Internet and may be processed by third parties, as in
e-mail or instant messaging (IM).
2.1 Cryptography Basics
Cryptography can be used to provide message confidentiality and integrity and sender ver-
ification. The basic functions of cryptography are encryption, decryption and cryptographic
hashing. In order to encrypt and decrypt messages, the sender and recipient need to share a
secret. Typically this is a key, like a password, that is used by the cryptographic algorithm.
The key is used by the sender to encrypt the message (transform it into cipher text) and by the
recipient to decrypt the message (reverse the cipher text back to clear text). This process can
be done on a fixed message, such as an e-mail, or a communications stream, such as a TCP/IP
connection. Cryptographic hashing is the process of generating a fixed-length string from a
message of arbitrary length. If the sender provides a cryptographic hash with the message, the
recipient can verify its integrity. Modern cryptographic systems are based on complex mathe-
matical relationships and processes. Lets focus on the common cryptography standards used
to secure computer communications and how they are used.
5
STEGANOGRAPHY Dept. of Information Technology
The three basic types of cryptography in common use are symmetric key, asymmetric (public)
key systems and cryptographic hash functions. Typically, the strength of a crypto system is
directly related to the length of the key. This assumes that there is no inherent weakness
in the algorithm and that the keys are chosen in a way that fully utilizes the key space (the
number of possible keys). There are many kinds of attacks that can be used against crypto
systems, but these are beyond our scope here. That said, if you use public algorithms with no
known vulnerabilities, use reasonable key lengths (most defaults are fine) and choose good keys
(which are normally chosen for you), your communications will be very secure. Cryptography
Drawbacks
Apart from the four fundamental elements of information security, there are other issues
that affect the effective use of information:
• A strongly encrypted, authentic, and digitally signed information can be difficult to access
even for a legitimate user at a crucial time of decision-making. The network or the
computer system can be attacked and rendered non-functional by an intruder.
• High availability, one of the fundamental aspects of information security, cannot be en-
sured through the use of cryptography. Other methods are needed to guard against the
threats such as denial of service or complete breakdown of information system.
• Another fundamental need of information security of selective access control also cannot
be realized through the use of cryptography. Administrative controls and procedures are
required to be exercised for the same.
• Cryptography does not guard against the vulnerabilities and threats that emerge from
the poor design of systems, protocols, and procedures. These need to be fixed through
proper design and setting up of a defensive infrastructure.
• Cryptography comes at cost. The cost is in terms of time and money 1. Addition of
cryptographic techniques in the information processing leads to delay. 2. The use of
public key cryptography requires setting up and maintenance of public key infrastructure
requiring the handsome financial budget.
• The security of cryptographic technique is based on the computational difficulty of mathe-
matical problems. Any breakthrough in solving such mathematical problems or increasing
the computing power can render a cryptographic technique vulnerable.
6 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
2.2 Basics Of Steganography
Steganography aims to hiding information in a cover data in such a way that non-participating
persons are not able to detect the presence of this information by analyzing the information
detection. Unlike watermarking, steganography does not intended to prevent the hidden in-
formation by opponents of removing or changing the hidden message, which is embedded in
the cover data but it emphasizes on remains it undetectable. Steganography is particularly
interesting for applications in which the encryption can not used to protect the communication
of confidential information.
2.3 Steganography With LSB Algorithm
bytes of pixels are sufficient to hold one message byte. Rest of the bits in the pixels remains
the same. Steganography is the art and science of communicating in a way which hides the ex-
istence of the communication. Steganography plays an important role in information security.
It is the art of invisible communication by concealing information inside other information. The
term steganography is derived from Greek and literally means covered writing. A Steganogra-
phy system consists of three elements: coverimage (which hides the secret message),the secret
message and the stegano-image(which is the cover object with message embedded inside it).
A digital image is described using a 2-D matrix of the color intestines at each grid point (i.e.
pixel). Typically gray images use 8 bits, whereas colored utilizes 24 bits to describe the color
model, such as RGB model. The Steganography system which uses an image as the cover,
there are several techniques to conceal information inside cover-image. The spatial domain
techniques manipulate the cover-image pixel bit values to embed the secret information. The
secret bits are written directly to the cover image pixel bytes. Consequently, the spatial domain
techniques are simple and easy to implement. The Least Significant Bit (LSB) is one of the
main techniques in spatial domain image Steganography.
The concept of LSB Embedding is simple. It exploits the fact that the level of precision in
many image formats is far greater than that perceivable by average human vision. Therefore,
an altered image with slight variations in its colors will be indistinguishable from the original
by a human being, just by looking at it. In conventional LSB technique, which requires eight
bytes of pixels to store 1byte of secret data but in proposed LSB technique.
7 DR.B.A.Tech.University
Chapter 3
REQUIREMENTS ANALYSIS
3.1 Functional Requirements
Functional requirements are the requirements that that define specific behavior or function of
the system.
• Login: Login function will authenticate the sender if username and password ares correct
Otherwise it will exit the system.
• Secret Text Message File: In this file you will have to write secret message to hide or you
can select any text file of secret message.
• Cover Image: Cover Image is the image is to be selected in which secret text message can
be hidden.
• Stego Encryption LSB implementation is performed on cover image to hide secret text
message by replacing bits of cover image by the bits of message.
• Sender In this Sender send this stego image file to intended recipient to which he does
want to communicate.
• Receiver In this receiver receives the stego image and opens in decryption option for
getting hidden text message inside that image.
3.2 Non-Functional Requirements
• Safety Requirements:
8
STEGANOGRAPHY Dept. of Information Technology
Sender and Receiver should make sure that only they are having the same software to
encrypt and decrypt data inside image. Both should take care of eavesdropping.
• Security Requirements:
We are going to develop a software in which embedding secret text data in image.Only
sender and receiver should be aware of encrypted file. User should not unfold the message
regarding sent image as well as receiver information.
• Software Quality Attributes:
The Quality of the software is maintained in such a way that only sender and receiver
can communicate through image.There is no probability of knowing secret image.
3.3 System Requirements
3.3.1 Software Requirements
• Operating System:Windows 7.
• Front End :JAVA.
• Tool:Netbeans.
• PhotoshopCC.
3.3.2 Hardware Requirements
• INTEL I5 2.50 GHZ 4 GB RAM
• Minimum Hardware Requirement:
Pentium 3 166 MHZ Or Higher 128 mb RAM
9 DR.B.A.Tech.University
Chapter 4
IMAGE STEGANOGRAPHY
4.1 Types of Steganography
4.1.1 Text Steganography
It consists of hiding information inside the text files. In this metho, the secret data is hidden
behind every nth letter of every words of text message. Numbers of methods are available for
hiding data in text file. These methods are: i) Format Based Method
ii) Random and Statistical Method
iii) Linguistics Method
Text steganography can be achieved by altering the text formatting, or by altering certain
characteristics of textual elements (e.g., characters). The goal in the design of coding methods
is to develop alterations that are reliably decodable (even in the presence of noise) yet largely
indiscernible to the reader. These criteria, reliable decoding and minimum visible change, are
somewhat conflicting; herein lies the challenge in designing document marking techniques. The
three coding techniques that we propose illustrate different approaches rather than form an
exhaustive list of document marking techniques. The techniques can be used either separately
or jointly. These are following:
1.Line-Shift Coding: This is a method of altering a document by vertically shifting the locations
of text lines to encode the document uniquely.
2.Word-Shift Coding: This is a method of altering a document by horizontally shifting the
locations of words within text lines to encode the document uniquely.
3.Feature Coding: This is a coding method that is applied either to a format file or to a bitmap
image of a document.
10
STEGANOGRAPHY Dept. of Information Technology
4.1.2 Image Steganography
Hiding the data by taking the cover object as image is referred as image steganography. In image
steganography pixel intensities are used to hide the data. In digital steganography, images are
widely used cover source because there are number of bits pres ents in digital representation of
an image.
4.1.3 Audio Steganography
In audio steganography, secret message is embedded into digitized audio signal which result
slight altering of binary sequence of the corresponding audio file. There are several methods
are available for audio steganography. We are going to have a brief introduction on some of
them. It involves hiding data in audio files. This method hides the data in WAV, AU and MP3
sound files. There are different methods of audio steganography. These methods are i) Low Bit
Encoding
ii) Phase Coding
iii) Spread Spectrum.
4.1.4 Video Steganography
It is a technique of hiding any kind of files or data into digital video format. In this case
video (combination of pictures) is used as carrier for hiding the data. Generally discrete cosine
transform (DCT) alter the values (e.g., 8.667 to 9) which is used to hide the data in each of
the images in the video, which is unnoticeable by the human eye. H.264, Mp4, MPEG, AVI
are the formats used by video steganography.
In all of these methods, the basic principle of steganography is that a secret message is to
be embedded in another cover object which may not be of any significance in such a way that
the encrypted data would finally display only the cover data. So it cannot be detected easily
to be containing hidden information unless proper decryption is used.
4.2 STEGANOGRAPHY IN IMAGE
Hiding information inside images is a popular technique nowadays. An image with a secret
message inside can easily be spread over the World Wide Web or in newsgroups. The use
of steganography in newsgroups has been researched by German steganographic expert Niels
11 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Provos, who created a scanning cluster which detects the presence of hidden messages inside
images that were posted on the net. However, after checking one million images, no hidden
messages were found, so the practical use of steganography still seems to be limited.Image
Steganography is the technique of hiding the data within the image in such a way that prevents
the unintended user from the detection of the hidden messages or data.
Figure 4.1: COMMUNICATION THROUGH STEGANOGRAPHY
To hide a message inside an image without changing its visible properties, the cover source
can be altered in noisy areas with many color variations, so less attention will be drawn to
the modifications. The most common methods to make these alterations involve the usage
of the least-significant bit or LSB, masking, filtering and transformations on the cover image.
These techniques can be used with varying degrees of success on different types of image files
The project deals with learning about the various types of steganography available. Image
steganography is performed for images and the concerning data is also decrypted to retrieve
the message image. Since this can be done in several ways, image steganography is studied and
one of the methods is used to demonstrate it. Image steganography refers to hiding information
i.e. text, images or audio files in another image or video files. The current project aims to use
12 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
steganography for an image with another image using spatial domain technique. This hidden
information can be retrieved only through proper decoding technique. This encryption and
decryption of the images is done using java codes.
13 DR.B.A.Tech.University
Chapter 5
HOW IT WORKS?
5.1 Implementation
5.1.1 Technical Details
o Using java.awt.Image, ImageIO
o The package contains all the necessary classes and methods along with interfaces that are
necessary for the manipulation of the images.
5.1.2 The Encoding Process
The steganography technique used is LSB coding. The offset of the image is retrieved from its
header. That offset is left as it is to preserve the integrity of the header, and from the next
byte, we start our encoding process. For encoding, we first take the input carrier file i.e. an
image file and then direct the user to the selection of the text file.
5.1.3 Creation of User Space
o User Space is created for preserving the original file, so that all the modifications are done in
the user space.
o In the object of BufferedImage, using ImageIO.read method we take the original image.
o Using createGraphics and drawRenderedImage method of Graphics class, we create our user
space in BufferedImage object.
The text file is taken as input and separated in stream of bytes. Now, each bit of these bytes
is encoded in the LSB of each next pixel. And, finally we get the final image that contains
the encoded message and it is saved, at the specified path given by user, in PNG format using
14
STEGANOGRAPHY Dept. of Information Technology
Figure 5.1: LSB Operation
ImageIO.write method. This completes the encoding process.
5.1.4 The Decoding Process
The offset of the image is retrieved from its header. Create the user space using the same pro-
cess as in the Encoding. Using getRaster() and getDataBuffer() methods of Writable Raster
and DataBufferByte classes. The data of image is taken into byte array. Using above byte
array, the bit stream of original text file is retrieved into the another byte array. And above
byte array is written into the decoded text file, which leads to the original message.
15 DR.B.A.Tech.University
Chapter 6
BRIEF ALGORITHM
IMPLEMENTATION
6.1 LSB(Least Significant Bit)
There are two different methods for image steganography:
1. Spatial methods
2. Transform methods
But we are using Spatial Methods.
6.1.1 Spatial Method
In spatial method, the most common method used is LSB substitution method. Least signif-
icant bit (LSB) method is a common, simple approach to embedding information in a cover
file. In steganography, LSB substitution method is used. I.e. since every image has three
components (RGB). This pixel information is stored in encoded format in one byte. The first
bits containing this information for every pixel can be modified to store the hidden text. For
this, the preliminary condition is that the text to be stored has to be smaller or of equal size
to the image used to hide the text. LSB based method is a spatial domain method. But this
is vulnerable to cropping and noise. In this method, the MSB (most significant bits) of the
message image to be hidden are stored in the LSB (least significant bits) of the image used as
the cover image. It is known that the pixels in an image are stored in the form of bits. In a
grayscale image, the intensity of each pixel is stored in 8 bits (1byte). Similarly for a colour
(RGB-red, green, blue) image, each pixel requires 24 bits (8bits for each layer).
The Human visual system (HVS) cannot detect changes in the colour or intensity of a pixel
16
STEGANOGRAPHY Dept. of Information Technology
when the LSB bit is modified. This is psycho-visual redundancy since this can be used as an
advantage to store information in these bits and yet notice no major difference in the image.
Algorithm of LSB method of steganography.There might be two different phases of LSB
method, embedding phase and extracting phase. Algorithms of both of the phases are given
below:
A.Embedding phase Procedure:
Step 1: Extract all the pixels from the given image and store them in some array named
(imagearray).
Step 2: Extract all the characters from the given text file(message file) and store it in the
array called (messagearray).
Step 3: Retrieve the characters from the Stego key and store them in a array called Keyarray.
A stego- key is used to control the hiding process so as to restrict detection and/or recovery of
the embedded data.
Step 4: Take first pixel and characters from Key- array and place it in first component of
pixel. If there are more characters in Key array, then place rest in the first component of next
pixels.
Step 5:Place some terminating symbol to indicate end of the key. 0 has been used as a termi-
nating symbol in this algorithm.
Step 6: Place characters of message Array in each component of next pixels by replacing it.
Step 7: Repeat step 6 till all the characters has been embedded.
Step 8: Again place some terminating symbol to indicate end of data.
Step 9: Obtained image will hide all the characters that input.
The simplest steganography techniques embed the bits of the message directly into least signif-
icant bit plane of the cover image in a deterministic sequence. Modulating the least significant
bit does not result in human-perceptible difference because the amplitude of the change is
small. To hide a secret message inside an image, a proper cover image is needed. Because
this method uses bits of each pixel in the image, it is necessary to use a lossless compression
format, otherwise the hidden information will get lost in the transformations of a lossy com-
pression algorithm. When using a 24-bit color image, a bit of each of the red, green and blue
color components can be used, so a total of 3 bits can be stored in each pixel. For example,
the following grid can be considered as 3 pixels of a 24-bit color image, using 9 bytes of memory:
(00100111 11101001 11001000)
(00100111 11001000 11101001)
17 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
(11001000 00100111 11101001)
When the character A, which binary value equals 10000001, is inserted, the following grid
results:
(00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001000 00100111 11101001)
In this case, only three bits needed to be changed to insert the character successfully. On
average, only half of the bits in an image will need to be modified to hide a secret message
using the maximal cover size. The result changes that are made to the least significant bits
are too small to be recognized by the human visual system (HVS), so the message is effectively
hidden. As you see, the least significant bit of third color is remained without any changes.
It can be used for checking the correctness of 8 bits which are embedded in these 3 pixels. In
other words, it could be used as parity bit.
18 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 6.1: Encryption Diagram
19 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 6.2: Decryption Diagram
6.1.2 Masking and filtering
Masking and filtering techniques, usually restricted to 24 bits or grayscale images, take a differ-
ent approach to hiding a message. These methods are effectively similar to paper watermarks,
creating markings in an image. This can be achieved for example by modifying the luminance
of parts of the image. While masking does change the visible properties of an image, it can
be done in such a way that the human eye will not notice the anomalies. Since masking uses
visible aspects of the image, it is more robust than LSB modification with respect to compres-
sion, cropping and different kinds of image processing. The information is not hidden at the
noise level but is inside the visible part of the image, which makes it more suitable than LSB
modifications in case a lossy compression algorithm like JPEG is being used.
20 DR.B.A.Tech.University
Chapter 7
SYSTEM DESIGN
7.1 Usecase Diagram
Figure 7.1: Usecase Diagram
A Use Case Diagram at its simplest is a representation of a user’s interaction with the
21
STEGANOGRAPHY Dept. of Information Technology
system. First user writes secret text then he selects cover image and data gets hidden inside
image, then user sends stego image to receiver through image. At the receiver side, user selects
the stego image and applies decryption on stego image. After that he can get text hidden in
the text.
22 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.2 Activity Diagram
Figure 7.2: Activity Diagram
Purpose: An example of UML activity diagram describing behavior of the Stego System
for Secure Communication.
Summary: Activity is started by opening stego software. Stego software asks for authen-
tication by entering username and passwords. If username and passwords are correct Stego
software authenticates user. Four options get available front of user as 1. Generate stego
image. 2. Get secret code. 3. Send image 4. About 5. Help.
• User can generate stego image by hiding secret data in it.
• User can get his secret code by decoding image.
• User can send stego image to another user by send image option.
• User can know about software by clicking on about option.
23 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
• User can look for help in case he needs it.
• User can terminate stego software by clicking on log out.
24 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.3 Class Diagram
Figure 7.3: Class Diagram
There are four following classes:
1. Stego module
2. Encryption
3. Unstego module
4. Decryption
• Stego module: secret module consists of two attributes secret text and cover image as
well as two operations as select secret text() and select cover image().
• Encryption: Encryption is the process of hiding secret text into cover image.
• Ustego Module: It takes input from stego image that is stego image.
25 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
• Decryption: It separates the secret text from the image.
26 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.4 State Chart Diagram
Figure 7.4: State Chart Diagram
System is in the Idle state, when user open it, After login correctly state changes
from login to stego module where user writes secret code. After writing secret code
state passes to Fetch Image in which secret code is embedded inside image. For
decoding image state changes from Fetch image to Unstego module. User can exit
system successfully after decryption of image.
27 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.5 Sequence Diagram
Figure 7.5: Sequence Diagram
Sequence diagrams are a popular dynamic modeling solution in UML because they
specifically focus on lifelines, or the processes and objects that live simultaneously,
and the messages exchanged between them to perform a function before the lifeline
ends in which there are five lifelines :
1. User
2. Steg Module
3. Encryption
4. Unsteg
5. Decryption.
∗ The user selects cover image and text to be hide by LSB algorithm.
28 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
∗ In which algorithm is implements on that cover image and hides the secret text.
∗ After completion of process the system takes input for newly generated image.
∗ As user gives input, image is saved in respective directory.
∗ Saved image in directory is opened and Unsteg operation is performed on the
image and original message is obtained.
29 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.6 Component Diagram
Figure 7.6: Component Diagram
There are six components of the system with the help of that user can use system
efficiently.In which each components has its own functions. They perform function
as per the class diagram. Components of this system are interconnected to each
other.
30 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.7 DFD Level 0
Figure 7.7: Level 0 Diagram
Steganography system takes inputs as secret text message as well as cover image and
generates stego image.
31 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.8 DFD Level 1
Figure 7.8: Level 1 Diagram
In DFD Level 1 the main task that is performed that is secret text message is added
to the image by replacing some of the bits and it is sent to the receiver side through
email.
32 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
7.9 DFD Level 2
Figure 7.9: Level 2 Diagram
Secret text is added to the image by replacing Least Significant Bits(LSB) in which
least significant bits are replaced and stego file is created. For decrypting image to
get secret message.
33 DR.B.A.Tech.University
Chapter 8
SYSTEM IMPLEMENTATION
Figure 8.1: HOMEPAGE
This is the image of the Home Page of steganography system. On this homepage user
has to login with username and password. System authenticates user if username
and passwords are correct.
34
STEGANOGRAPHY Dept. of Information Technology
Figure 8.2: MENU
This is the second frame of the system in which there are three options are available
as
1. Generate Stego System
2. Get your secret system
3. Send using email.
To encrypt and decrypt image and send that image through email system.
35 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 8.3: ENCODE
This frame prompts you to enter secret message or secret text file and the cover
image to hide secret code or secret code file.
36 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 8.4: DECODE
This window is about to decrypt image by choosing secret code file or secret code.
37 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 8.5: PRINT
This window represents to print window to prints secret message.
38 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 8.6: HELP
This frame represents steganography help that in case user needs any help.
39 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 8.7: ABOUT US
This window represents about software regarding steganography, group member etc.
40 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 8.8: MAIL SERVICES
This window represents Mail Services Where encrypted message can be sent by above
different mail providers.
41 DR.B.A.Tech.University
STEGANOGRAPHY Dept. of Information Technology
Figure 8.9: STEGO SOCIAL
Blog and facebook page have been developed for future scope, help community.
42 DR.B.A.Tech.University
Chapter 9
APPLICATION OF SYSTEM
9.1 Advantages
∗ The main advantages of this system is Security that it provides security to your
messages without knowing to third party.
∗ Number of bits have been replaced according to user or sender, therefore third
party can not quess password.
∗ Normal network user cant guess image.
∗ In steganography anyone cant jump on suspect by looking images.
∗ It is Reliable.
∗ Easy to use.
∗ Easy Maintenance.
∗ System have been secured by password authentication.
9.2 Disadvantages
∗ Images can have attacks like diluting, nosing, contrast changes and so on.
∗ Number bits of pixel should be replaced by equal bits of message.
∗ If someone is eavesdropping then then there is probability of message get unfold.
∗ If more than two people having same steganography software then hidden mas-
sage can acquire.
∗ This software has been implemented by java, which is open source, therefore
code is readable so anyone with bad mentality can make software perform inverse
43
STEGANOGRAPHY Dept. of Information Technology
operation.
∗ Only unintended user may know the actual working of software.
∗ Intruder may penetrate suspecting images to get hidden data.
9.3 Application
i) Confidential Communication and Secret Data Storing.
ii) Protection of Data Alteration.
iii) Access Control System for Digital Content Distribution.
iv) E-Commerce.
v) Media.
vi) Database Systems.
vii) Digital Watermarking.
44 DR.B.A.Tech.University
Chapter 10
FUTURE SCOPE
Steganography, though is still a fairly new idea. There are constant advancements
in the computer field, suggesting advancements in the field of steganography as well.
It is likely that there will soon be more efficient and more advanced techniques for
Steganalysis. A hopeful advancement is the improved sensitivity to small messages.
Knowing how difficult it is to detect the presence of a fairly large text file within an
image, imagine how difficult it is to detect even one or two sentences embedded in
an image! It is like finding a microscopic needle in the ultimate haystack. What is
scary is that such a small file of only one or two sentences may be all that is needed
to commence a terrorist attack. In the future, it is hoped that the technique of
Steganalysis will advance such that it will become much easier to detect even small
messages within an image. In this work it explores only a small part of the science
of steganography. As a new displine, there is a great deal more research and devel-
opment to do. The following section describe areas for research which were offshoots
of, or tangential to,our main objectives.
1. Detecting Steganography in Image Files:
Can steganography be detected in images files? This is difficult question. It may
be possible to detect a simple Steganographic technique by simple analyzing the low
order bits of the image bytes. If the Steganographic algorithm is more complex,
however, and spreads the embedded data over the image is random way or encrypts
the data before embedding, it may be nearly impossible to detect.
2.Steganography on the World Wide Web:
The world wide web(www) makes extensive use of inline images.There are literally
millions of images on various web pages worldwide. It may be possible to develop
45
STEGANOGRAPHY Dept. of Information Technology
an application to serve as a web browser to retrieve data embedded in web page
images. This stego-web could operate on top of the existing WWW and be a means
of covertly disseminating information.
3.Steganography in printed media:
If the data is embedded in an image, the image printed, then scanned and stored in
a file can the embedded data be recovered?
This would require a special form of a steganography to which could allow for in
accuracies in the printing and scanning equipment.
46 DR.B.A.Tech.University
CONCLUSION
It is observed that through LSB Substitution Steganographic method, the results
obtained in data hiding are pretty impressive as it utilizes the simple fact that any
image could be broken up to individual bit-planes each consisting of different levels
of information. It is to be noted that as discussed earlier, this method is only ef-
fective for bitmap images as these involve lossless compression techniques.But this
process can also be extended to be used for color images where, bitplane slicing is to
be done individually for the top four bit-planes for each of R, G, B of the message
image.
It is also important to discuss that though steganography was once undetected, with
the various methods currently used, it is not only easy to detect the presence but
also retrieving them is easier. For instance, without having to use a software or
complex tools for detection, simple methods to observe if an image file has been
manipulated are: 1. Size of the image: A Steganographic image has a huge storage
size when compared to a regular image of the same dimensions. I.e. if the original
image storage size would be few KBs, the Steganographic image could be several
MBs in size. This again varies with the resolution and type of image used. 2. Noise
in image: A Steganographic image has noise when compared to a regular image.
This is the reason why initially little noise is added to the cover image, so that the
Steganographic image doesnt appear very noisy when compared to the original cover
image.
47
Bibliography
[1] Literature Survey,
http://www.ijetajournal.org/volume-2/issue-5.
[2] Design Realated Research,
https://www.researchgate.net/publication/314116270ImageSteganography.ImageSteagan
http : //repository.root − me.org/Stganoraphy
[3][3] Programming Tutorial
www.dreamincode.net
Book Names:
1. Advanced Java By Uttam K. Roy.
2. Advanced Java By Gajendra Gupta.
48

More Related Content

What's hot

Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
A project report on chat application
A project report on chat applicationA project report on chat application
A project report on chat applicationKumar Gaurav
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithmRuchi Maurya
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Chat Application | RSD
Chat Application | RSDChat Application | RSD
Chat Application | RSDRajon
 

What's hot (20)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
A project report on chat application
A project report on chat applicationA project report on chat application
A project report on chat application
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Taxonomy for bugs
Taxonomy for bugsTaxonomy for bugs
Taxonomy for bugs
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Food donation project report II
Food donation project report IIFood donation project report II
Food donation project report II
 
Steganography
Steganography Steganography
Steganography
 
Chat Application | RSD
Chat Application | RSDChat Application | RSD
Chat Application | RSD
 

Similar to Steganography final report

steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdfsteganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdfssusere02009
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMManish Negi
 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security ManagerShahrikh Khan
 
digiinfo website project report
digiinfo website project reportdigiinfo website project report
digiinfo website project reportABHIJEET KHIRE
 
Distributed Mobile Graphics
Distributed Mobile GraphicsDistributed Mobile Graphics
Distributed Mobile GraphicsJiri Danihelka
 
Specification of the Linked Media Layer
Specification of the Linked Media LayerSpecification of the Linked Media Layer
Specification of the Linked Media LayerLinkedTV
 
Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)Priyanka Kapoor
 
Smart Street System
Smart Street SystemSmart Street System
Smart Street SystemLibin Thomas
 
Project report on Eye tracking interpretation system
Project report on Eye tracking interpretation systemProject report on Eye tracking interpretation system
Project report on Eye tracking interpretation systemkurkute1994
 
iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportiGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportNandu B Rajan
 
ImplementationOFDMFPGA
ImplementationOFDMFPGAImplementationOFDMFPGA
ImplementationOFDMFPGANikita Pinto
 
Qgis 1.7.0 user-guide_en
Qgis 1.7.0 user-guide_enQgis 1.7.0 user-guide_en
Qgis 1.7.0 user-guide_enxp5000
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
QBD_1464843125535 - Copy
QBD_1464843125535 - CopyQBD_1464843125535 - Copy
QBD_1464843125535 - CopyBhavesh Jangale
 
Work Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel BelaskerWork Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel BelaskerAdel Belasker
 

Similar to Steganography final report (20)

steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdfsteganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security Manager
 
digiinfo website project report
digiinfo website project reportdigiinfo website project report
digiinfo website project report
 
document
documentdocument
document
 
Distributed Mobile Graphics
Distributed Mobile GraphicsDistributed Mobile Graphics
Distributed Mobile Graphics
 
thesis
thesisthesis
thesis
 
Specification of the Linked Media Layer
Specification of the Linked Media LayerSpecification of the Linked Media Layer
Specification of the Linked Media Layer
 
Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)
 
Smart Street System
Smart Street SystemSmart Street System
Smart Street System
 
Project report on Eye tracking interpretation system
Project report on Eye tracking interpretation systemProject report on Eye tracking interpretation system
Project report on Eye tracking interpretation system
 
iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportiGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - Report
 
Sanskrit Parser Report
Sanskrit Parser ReportSanskrit Parser Report
Sanskrit Parser Report
 
ImplementationOFDMFPGA
ImplementationOFDMFPGAImplementationOFDMFPGA
ImplementationOFDMFPGA
 
MSc_Thesis
MSc_ThesisMSc_Thesis
MSc_Thesis
 
Qgis 1.7.0 user-guide_en
Qgis 1.7.0 user-guide_enQgis 1.7.0 user-guide_en
Qgis 1.7.0 user-guide_en
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
QBD_1464843125535 - Copy
QBD_1464843125535 - CopyQBD_1464843125535 - Copy
QBD_1464843125535 - Copy
 
Fraser_William
Fraser_WilliamFraser_William
Fraser_William
 
Work Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel BelaskerWork Measurement Application - Ghent Internship Report - Adel Belasker
Work Measurement Application - Ghent Internship Report - Adel Belasker
 

More from ABHIJEET KHIRE

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVSABHIJEET KHIRE
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST  , EVS 1 Worksheet Primary class kv ENGLIST  , EVS
1 Worksheet Primary class kv ENGLIST , EVS ABHIJEET KHIRE
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...ABHIJEET KHIRE
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionABHIJEET KHIRE
 

More from ABHIJEET KHIRE (20)

PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDFPUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
PUNE BUSES MSRTC TIME TABLE LAL PARI ORDINARY BUSES PDF
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
1 Worksheet Primary class kv ENGLIST , EVS
1 Worksheet Primary class kv ENGLIST  , EVS 1 Worksheet Primary class kv ENGLIST  , EVS
1 Worksheet Primary class kv ENGLIST , EVS
 
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...Kv  cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
Kv cbsc class 3 hindi paractice set question answares सीबीएसई कक्षा तीसरी हि...
 
kv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 questionkv cbsc class 3 mathematics practice set of 100 question
kv cbsc class 3 mathematics practice set of 100 question
 
Test resume
Test resumeTest resume
Test resume
 
Ddl
DdlDdl
Ddl
 
Create
CreateCreate
Create
 
All questions
All questionsAll questions
All questions
 
2 q on groups
2 q on groups2 q on groups
2 q on groups
 
1 q on operators
1 q on operators1 q on operators
1 q on operators
 
Q on subquery
Q on subqueryQ on subquery
Q on subquery
 
Q on joins
Q on joinsQ on joins
Q on joins
 
Q on functions
Q on functionsQ on functions
Q on functions
 
SQL QUERY PRACTICE
SQL QUERY PRACTICE SQL QUERY PRACTICE
SQL QUERY PRACTICE
 

Recently uploaded

COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementNuwan Dias
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 

Recently uploaded (20)

COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API Management
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 

Steganography final report

  • 1. A B. TECH PROJECT REPORT on “STEGANOGRAPHY” Submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Technology in Information Technology Submitted by Mr. Abhijeet Harihar Khire (Roll No. 20140759) Ms. Shweta Sanjay Mahadik (Roll No. 20140760) Mr. Madhav Vyankatrao Solanke (Roll No. 20130756) Mr. Suraj Shivaji Panavkar (Roll No. 20150785) Under the guidance of Prof. S.R.Hivre Prof. P.P.Jadhav DEPARTMENT OF INFORMATION TECHNOLOGY DR.BABASAHEB AMBEDKAR TECHNLOGICAL UNIVERSITY, LONERE,RAIGAD-MAHARASHTRA, INDIA-402103 2017-2018
  • 2. DR.BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY Lonere,Raigad-Maharashtra,India-402103 DEPARTMENT OF INFORMATION TECHNOLOGY Certificate This is to certify that the final year project entitled on Steganography is submitted by Mr. Abhijeet Harihar Khire (Roll No.20140759) , Ms.Shweta Sanjay Mahadik (Roll No.20140760) , Mr.Madhav Vyankatrao Solanke (Roll No.20130756), Mr.Suraj Shivaji Panavkar (Roll No.20150785) for the partial fulfilment of the requirements of the degree of Bachelor of Technology in Informa- tion Technology of the Dr.Babasaheb Ambedkar Technological University,Lonere is a bonafide work carried out during the academic year 2017-2018. Prof.S.R.Hivre Prof.P.P.Jadhav Dr.S.M.Jadhav (Project Guide) (Head of Department) Information Technology Information Technology Examiners: 1) 2). Date: Place:Vidyavihar, Lonere- 402103
  • 3. ACKNOWLEDGEMENT We are pleased to present this Project report entitled STEGNAOGRAHY. It is indeed a great pleasure and a moment of immense satisfaction for us to express our sense of profound gratitude and indebtedness towards our guide Prof.S.R.Hivre and Prof. P.P.Jadhav whose en- thusiasm are the source of inspiration for us. We are extremely thankful for the guidance and untiring attention, which she bestowed on me right from the beginning. Her valuable and timely suggestions at crucial stages and above all her constant encouragement have made it possible for us to achieve this work. Would also like to give our sincere thanks to Dr. S.M. JADHAV Head of Department of INFORMATION TECHNOLOGY for necessary help and providing us the required facilities for completion of this project report. We would like to thank the entire Teaching staff who are directly or indirectly involved in the various data collection and soft- ware assistance to bring forward this seminar report. We express our deep sense of gratitude towards our parents for their sustained cooperation and wishes, which have been a prime source of inspiration to take this project work to its end without any hurdles. Last but not the least, We would like to thank all our B.Tech. colleagues for their co-operation and useful suggestion and all those who have directly or indirectly helped us in completion of this project work. Mr. Abhijeet Khire (Roll No.20140759) Ms.Shweta Mahadik (Roll No.20140760) Mr. Madhav Solanke (Roll No.20130756) Mr.Suraj Panavkar (Roll No.20150785) Date: Place:Lonere
  • 4. ABSTRACT Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different appli- cations have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project hides the message with in the image . For a more secure approach, the project it allows user to choose the bits for replacement instead of LSB replacement from the image. sender select the cover image with the secret text or text file and hide it in to the image with the bit replacement choice, it help to generate the secure stego image .the stego image is sent to the destination with the help of private or public communication network . on the other side i.e. receiver. receiver download the stego image and using the software retrieve the secret text hidden in the stego image .
  • 5. Contents 1 INTRODUCTION 1 1.1 What Is Steganography? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2 LITERATURE REVIEW 5 2.1 Cryptography Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Basics Of Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.3 Steganography With LSB Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 7 3 REQUIREMENTS ANALYSIS 8 3.1 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.2 Non-Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 3.3 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.3.1 Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.3.2 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4 IMAGE STEGANOGRAPHY 10 4.1 Types of Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.1.1 Text Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.1.2 Image Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4.1.3 Audio Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4.1.4 Video Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4.2 STEGANOGRAPHY IN IMAGE . . . . . . . . . . . . . . . . . . . . . . . . . . 11 5 HOW IT WORKS? 14 5.1 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 5.1.1 Technical Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 5.1.2 The Encoding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 iii
  • 6. 5.1.3 Creation of User Space . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 5.1.4 The Decoding Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 6 BRIEF ALGORITHM IMPLEMENTATION 16 6.1 LSB(Least Significant Bit) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 6.1.1 Spatial Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 6.1.2 Masking and filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 7 SYSTEM DESIGN 21 7.1 Usecase Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 7.2 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 7.3 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 7.4 State Chart Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 7.5 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 7.6 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.7 DFD Level 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 7.8 DFD Level 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 7.9 DFD Level 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 8 SYSTEM IMPLEMENTATION 34 9 APPLICATION OF SYSTEM 43 9.1 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 9.2 Disadvantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 9.3 Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 10 FUTURE SCOPE 45
  • 7. List of Figures 1.1 PORCESS OF STEGANOGRAPHY . . . . . . . . . . . . . . . . . . . . . 2 4.1 COMMUNICATION THROUGH STEGANOGRAPHY . . . . . . . . . 12 5.1 LSB Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 6.1 Encryption Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 6.2 Decryption Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 7.1 Usecase Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 7.2 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 7.3 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 7.4 State Chart Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 7.5 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 7.6 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.7 Level 0 Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 7.8 Level 1 Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 7.9 Level 2 Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 8.1 HOMEPAGE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 8.2 MENU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 8.3 ENCODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 8.4 DECODE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 8.5 PRINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 8.6 HELP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 8.7 ABOUT US . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 8.8 MAIL SERVICES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 8.9 STEGO SOCIAL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 v
  • 8. Chapter 1 INTRODUCTION 1.1 What Is Steganography? Steganography is a Greek word which means concealed writing. The word steganos means covered and graphial means writing . Thus, steganography is not only the art of hiding data but also hiding the fact of transmission of secret data. Steganography hides the secret data in another file in such a way that only the recipient knows the existence of message. In ancient time, the data was protected by hiding it on the back of wax, writing tables, stomach of rabbits or on the scalp of the slaves. But todays most of the people transmit the data in the form of text, images, video, and audio over the medium. In order to safely transmission of confidential data, the multimedia object like audio, video, images are used as a cover sources to hide the data. Steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. There are different types of steganography techniques each have their strengths and weaknesses. In this paper, we review the different security and data hiding techniques that are used to implement a steganography such as LSB, ISB, MLSB etc. In todays world, the communication is the basic necessity of every growing area. Everyone wants the secrecy and safety of their communicating data. In our daily life, we use many secure pathways like internet or telephone for transferring and sharing information, but it’s not safe at a certain level. In order to share the information in a concealed manner two techniques could be used. These mechanisms are cryptography and steganography. . In cryptography, the message is modified in an encrypted form with the help of encryption key which is known 1
  • 9. STEGANOGRAPHY Dept. of Information Technology Figure 1.1: PORCESS OF STEGANOGRAPHY to sender and receiver only. The message cannot be accessed by anyone without using the encryption key. However, the transmission of encrypted message may easily arouse attackers suspicion, and the encrypted message may thus be intercepted, attacked or decrypted violently. In order to overcome the shortcomings of cryptographic techniques, steganography techniques have been developed. Steganography is the art and science of communicating in such a way that it hides the existence of the communication. Thus, steganography hides the existence of data so that no one can detect its presence. In steganography the process of hiding information content inside any multimedia content like image , audio, video referred as a Embedding. For increasing confidentiality of communicating data both techniques may combined. Application of Steganeography: i)Confidential Communication ii) Protection of Data Alteration iii) Access Control System for Digital Content Distribution iv) E-Commerce v) Media vi) Database Systems. 2 DR.B.A.Tech.University
  • 10. STEGANOGRAPHY Dept. of Information Technology vii) digital watermarking. viii)Secret Data Storing 1.2 History The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples in his Histories.Histiaeus sent a message to his vassal, Aristagoras, by shaving the head of his most trusted servant, ”marking” the message onto his scalp, then sending him on his way once his hair had regrown, with the instruction, When thou art come to Miletus, bid Aristagoras shave thy head, and look thereon.” Additionally, Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. Steganography has been widely used for centuries. Here are some examples Hidden messages within a wax tablet: in ancient Greece, people wrote messages on wood and covered it with wax that bore an innocent covering message. Hidden messages on messenger’s body were also used in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the hair that afterwards grew over it, and exposed by shaving the head. The message allegedly carried a warning to Greece about Persian invasion plans. The method has obvious drawbacks, such as delayed transmission while waiting for the slave’s hair to grow and restrictions on the number and the size of messages that can be encoded on one person’s scalp. Hidden messages on paper written in secret inks, under other messages or on the blank parts of other messages Messages written in Morse code on yarn and then knitted into a piece of clothing worn by a courier. Messages written on envelopes in the area covered by postage stamps. In the early days of the printing press, it was common to mix different typefaces on a printed page because the printer did not have enough copies of some letters in one typeface. Thus, a message could be hidden by using two or more different typefaces, such as normal or italic. During both world wars, female spies used knitted codes so new knitted patterns were banned during both wars.During and after World War II, espionage agents used photographically- produced microdots to send information back and forth. Microdots were typically minute (less than the size of the period produced by a typewriter). World War II microdots were embedded in the paper and covered with an adhesive, such as collodion. That was reflective and so 3 DR.B.A.Tech.University
  • 11. STEGANOGRAPHY Dept. of Information Technology was detectable by viewing against glancing light. Alternative techniques included inserting microdots into slits cut into the edge of postcards. During World War II, Velvalee Dickinson, a spy for Japan in New York City, sent information to accommodation addresses in neutral South America. She was a dealer in dolls, and her letters discussed the quantity and type of doll to ship. The stegotext was the doll orders, and the concealed ”plaintext” was itself encoded and gave information about ship movements, etc. Her case became somewhat famous and she became known as the Doll Woman. During World War II, photosensitive glass was declared secret, and used for transmitting information to Allied armies. Jeremiah Denton repeatedly blinked his eyes in Morse code during the 1966 televised press conference that he was forced into as an American prisoner-of-war by his North Vietnamese captors, spelling out ”T-O-R-T-U-R-E”. That confirmed for the first time to the US Naval Intelligence and other Americans that the North Vietnamese were torturing American prisoners-of-war. In 1968, crew members of the USS Pueblo intelligence ship, held as prisoners by North Korea, communicated in sign language during staged photo opportunities, to inform the United States that they were not defectors but captives of the North Koreans. In other photos presented to the US, crew members gave ”the finger” to the unsuspecting North Koreans, in an attempt to discredit photos that showed them smiling and comfortable. 4 DR.B.A.Tech.University
  • 12. Chapter 2 LITERATURE REVIEW Electronic communication is the lifeblood of many organizations. Much of the information communicated on a daily basis must be kept confidential. Informa- tion such as financial reports, employee data and medical records needs to be communicated in a way that ensures confidentiality and integrity. This makes good business sense and may even be regulated by legislation like the Health Insurance Portability and Accountability Act (HIPAA). The problem of unsecure communication is compounded by the fact that much of this information is sent over the public Internet and may be processed by third parties, as in e-mail or instant messaging (IM). 2.1 Cryptography Basics Cryptography can be used to provide message confidentiality and integrity and sender ver- ification. The basic functions of cryptography are encryption, decryption and cryptographic hashing. In order to encrypt and decrypt messages, the sender and recipient need to share a secret. Typically this is a key, like a password, that is used by the cryptographic algorithm. The key is used by the sender to encrypt the message (transform it into cipher text) and by the recipient to decrypt the message (reverse the cipher text back to clear text). This process can be done on a fixed message, such as an e-mail, or a communications stream, such as a TCP/IP connection. Cryptographic hashing is the process of generating a fixed-length string from a message of arbitrary length. If the sender provides a cryptographic hash with the message, the recipient can verify its integrity. Modern cryptographic systems are based on complex mathe- matical relationships and processes. Lets focus on the common cryptography standards used to secure computer communications and how they are used. 5
  • 13. STEGANOGRAPHY Dept. of Information Technology The three basic types of cryptography in common use are symmetric key, asymmetric (public) key systems and cryptographic hash functions. Typically, the strength of a crypto system is directly related to the length of the key. This assumes that there is no inherent weakness in the algorithm and that the keys are chosen in a way that fully utilizes the key space (the number of possible keys). There are many kinds of attacks that can be used against crypto systems, but these are beyond our scope here. That said, if you use public algorithms with no known vulnerabilities, use reasonable key lengths (most defaults are fine) and choose good keys (which are normally chosen for you), your communications will be very secure. Cryptography Drawbacks Apart from the four fundamental elements of information security, there are other issues that affect the effective use of information: • A strongly encrypted, authentic, and digitally signed information can be difficult to access even for a legitimate user at a crucial time of decision-making. The network or the computer system can be attacked and rendered non-functional by an intruder. • High availability, one of the fundamental aspects of information security, cannot be en- sured through the use of cryptography. Other methods are needed to guard against the threats such as denial of service or complete breakdown of information system. • Another fundamental need of information security of selective access control also cannot be realized through the use of cryptography. Administrative controls and procedures are required to be exercised for the same. • Cryptography does not guard against the vulnerabilities and threats that emerge from the poor design of systems, protocols, and procedures. These need to be fixed through proper design and setting up of a defensive infrastructure. • Cryptography comes at cost. The cost is in terms of time and money 1. Addition of cryptographic techniques in the information processing leads to delay. 2. The use of public key cryptography requires setting up and maintenance of public key infrastructure requiring the handsome financial budget. • The security of cryptographic technique is based on the computational difficulty of mathe- matical problems. Any breakthrough in solving such mathematical problems or increasing the computing power can render a cryptographic technique vulnerable. 6 DR.B.A.Tech.University
  • 14. STEGANOGRAPHY Dept. of Information Technology 2.2 Basics Of Steganography Steganography aims to hiding information in a cover data in such a way that non-participating persons are not able to detect the presence of this information by analyzing the information detection. Unlike watermarking, steganography does not intended to prevent the hidden in- formation by opponents of removing or changing the hidden message, which is embedded in the cover data but it emphasizes on remains it undetectable. Steganography is particularly interesting for applications in which the encryption can not used to protect the communication of confidential information. 2.3 Steganography With LSB Algorithm bytes of pixels are sufficient to hold one message byte. Rest of the bits in the pixels remains the same. Steganography is the art and science of communicating in a way which hides the ex- istence of the communication. Steganography plays an important role in information security. It is the art of invisible communication by concealing information inside other information. The term steganography is derived from Greek and literally means covered writing. A Steganogra- phy system consists of three elements: coverimage (which hides the secret message),the secret message and the stegano-image(which is the cover object with message embedded inside it). A digital image is described using a 2-D matrix of the color intestines at each grid point (i.e. pixel). Typically gray images use 8 bits, whereas colored utilizes 24 bits to describe the color model, such as RGB model. The Steganography system which uses an image as the cover, there are several techniques to conceal information inside cover-image. The spatial domain techniques manipulate the cover-image pixel bit values to embed the secret information. The secret bits are written directly to the cover image pixel bytes. Consequently, the spatial domain techniques are simple and easy to implement. The Least Significant Bit (LSB) is one of the main techniques in spatial domain image Steganography. The concept of LSB Embedding is simple. It exploits the fact that the level of precision in many image formats is far greater than that perceivable by average human vision. Therefore, an altered image with slight variations in its colors will be indistinguishable from the original by a human being, just by looking at it. In conventional LSB technique, which requires eight bytes of pixels to store 1byte of secret data but in proposed LSB technique. 7 DR.B.A.Tech.University
  • 15. Chapter 3 REQUIREMENTS ANALYSIS 3.1 Functional Requirements Functional requirements are the requirements that that define specific behavior or function of the system. • Login: Login function will authenticate the sender if username and password ares correct Otherwise it will exit the system. • Secret Text Message File: In this file you will have to write secret message to hide or you can select any text file of secret message. • Cover Image: Cover Image is the image is to be selected in which secret text message can be hidden. • Stego Encryption LSB implementation is performed on cover image to hide secret text message by replacing bits of cover image by the bits of message. • Sender In this Sender send this stego image file to intended recipient to which he does want to communicate. • Receiver In this receiver receives the stego image and opens in decryption option for getting hidden text message inside that image. 3.2 Non-Functional Requirements • Safety Requirements: 8
  • 16. STEGANOGRAPHY Dept. of Information Technology Sender and Receiver should make sure that only they are having the same software to encrypt and decrypt data inside image. Both should take care of eavesdropping. • Security Requirements: We are going to develop a software in which embedding secret text data in image.Only sender and receiver should be aware of encrypted file. User should not unfold the message regarding sent image as well as receiver information. • Software Quality Attributes: The Quality of the software is maintained in such a way that only sender and receiver can communicate through image.There is no probability of knowing secret image. 3.3 System Requirements 3.3.1 Software Requirements • Operating System:Windows 7. • Front End :JAVA. • Tool:Netbeans. • PhotoshopCC. 3.3.2 Hardware Requirements • INTEL I5 2.50 GHZ 4 GB RAM • Minimum Hardware Requirement: Pentium 3 166 MHZ Or Higher 128 mb RAM 9 DR.B.A.Tech.University
  • 17. Chapter 4 IMAGE STEGANOGRAPHY 4.1 Types of Steganography 4.1.1 Text Steganography It consists of hiding information inside the text files. In this metho, the secret data is hidden behind every nth letter of every words of text message. Numbers of methods are available for hiding data in text file. These methods are: i) Format Based Method ii) Random and Statistical Method iii) Linguistics Method Text steganography can be achieved by altering the text formatting, or by altering certain characteristics of textual elements (e.g., characters). The goal in the design of coding methods is to develop alterations that are reliably decodable (even in the presence of noise) yet largely indiscernible to the reader. These criteria, reliable decoding and minimum visible change, are somewhat conflicting; herein lies the challenge in designing document marking techniques. The three coding techniques that we propose illustrate different approaches rather than form an exhaustive list of document marking techniques. The techniques can be used either separately or jointly. These are following: 1.Line-Shift Coding: This is a method of altering a document by vertically shifting the locations of text lines to encode the document uniquely. 2.Word-Shift Coding: This is a method of altering a document by horizontally shifting the locations of words within text lines to encode the document uniquely. 3.Feature Coding: This is a coding method that is applied either to a format file or to a bitmap image of a document. 10
  • 18. STEGANOGRAPHY Dept. of Information Technology 4.1.2 Image Steganography Hiding the data by taking the cover object as image is referred as image steganography. In image steganography pixel intensities are used to hide the data. In digital steganography, images are widely used cover source because there are number of bits pres ents in digital representation of an image. 4.1.3 Audio Steganography In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. There are several methods are available for audio steganography. We are going to have a brief introduction on some of them. It involves hiding data in audio files. This method hides the data in WAV, AU and MP3 sound files. There are different methods of audio steganography. These methods are i) Low Bit Encoding ii) Phase Coding iii) Spread Spectrum. 4.1.4 Video Steganography It is a technique of hiding any kind of files or data into digital video format. In this case video (combination of pictures) is used as carrier for hiding the data. Generally discrete cosine transform (DCT) alter the values (e.g., 8.667 to 9) which is used to hide the data in each of the images in the video, which is unnoticeable by the human eye. H.264, Mp4, MPEG, AVI are the formats used by video steganography. In all of these methods, the basic principle of steganography is that a secret message is to be embedded in another cover object which may not be of any significance in such a way that the encrypted data would finally display only the cover data. So it cannot be detected easily to be containing hidden information unless proper decryption is used. 4.2 STEGANOGRAPHY IN IMAGE Hiding information inside images is a popular technique nowadays. An image with a secret message inside can easily be spread over the World Wide Web or in newsgroups. The use of steganography in newsgroups has been researched by German steganographic expert Niels 11 DR.B.A.Tech.University
  • 19. STEGANOGRAPHY Dept. of Information Technology Provos, who created a scanning cluster which detects the presence of hidden messages inside images that were posted on the net. However, after checking one million images, no hidden messages were found, so the practical use of steganography still seems to be limited.Image Steganography is the technique of hiding the data within the image in such a way that prevents the unintended user from the detection of the hidden messages or data. Figure 4.1: COMMUNICATION THROUGH STEGANOGRAPHY To hide a message inside an image without changing its visible properties, the cover source can be altered in noisy areas with many color variations, so less attention will be drawn to the modifications. The most common methods to make these alterations involve the usage of the least-significant bit or LSB, masking, filtering and transformations on the cover image. These techniques can be used with varying degrees of success on different types of image files The project deals with learning about the various types of steganography available. Image steganography is performed for images and the concerning data is also decrypted to retrieve the message image. Since this can be done in several ways, image steganography is studied and one of the methods is used to demonstrate it. Image steganography refers to hiding information i.e. text, images or audio files in another image or video files. The current project aims to use 12 DR.B.A.Tech.University
  • 20. STEGANOGRAPHY Dept. of Information Technology steganography for an image with another image using spatial domain technique. This hidden information can be retrieved only through proper decoding technique. This encryption and decryption of the images is done using java codes. 13 DR.B.A.Tech.University
  • 21. Chapter 5 HOW IT WORKS? 5.1 Implementation 5.1.1 Technical Details o Using java.awt.Image, ImageIO o The package contains all the necessary classes and methods along with interfaces that are necessary for the manipulation of the images. 5.1.2 The Encoding Process The steganography technique used is LSB coding. The offset of the image is retrieved from its header. That offset is left as it is to preserve the integrity of the header, and from the next byte, we start our encoding process. For encoding, we first take the input carrier file i.e. an image file and then direct the user to the selection of the text file. 5.1.3 Creation of User Space o User Space is created for preserving the original file, so that all the modifications are done in the user space. o In the object of BufferedImage, using ImageIO.read method we take the original image. o Using createGraphics and drawRenderedImage method of Graphics class, we create our user space in BufferedImage object. The text file is taken as input and separated in stream of bytes. Now, each bit of these bytes is encoded in the LSB of each next pixel. And, finally we get the final image that contains the encoded message and it is saved, at the specified path given by user, in PNG format using 14
  • 22. STEGANOGRAPHY Dept. of Information Technology Figure 5.1: LSB Operation ImageIO.write method. This completes the encoding process. 5.1.4 The Decoding Process The offset of the image is retrieved from its header. Create the user space using the same pro- cess as in the Encoding. Using getRaster() and getDataBuffer() methods of Writable Raster and DataBufferByte classes. The data of image is taken into byte array. Using above byte array, the bit stream of original text file is retrieved into the another byte array. And above byte array is written into the decoded text file, which leads to the original message. 15 DR.B.A.Tech.University
  • 23. Chapter 6 BRIEF ALGORITHM IMPLEMENTATION 6.1 LSB(Least Significant Bit) There are two different methods for image steganography: 1. Spatial methods 2. Transform methods But we are using Spatial Methods. 6.1.1 Spatial Method In spatial method, the most common method used is LSB substitution method. Least signif- icant bit (LSB) method is a common, simple approach to embedding information in a cover file. In steganography, LSB substitution method is used. I.e. since every image has three components (RGB). This pixel information is stored in encoded format in one byte. The first bits containing this information for every pixel can be modified to store the hidden text. For this, the preliminary condition is that the text to be stored has to be smaller or of equal size to the image used to hide the text. LSB based method is a spatial domain method. But this is vulnerable to cropping and noise. In this method, the MSB (most significant bits) of the message image to be hidden are stored in the LSB (least significant bits) of the image used as the cover image. It is known that the pixels in an image are stored in the form of bits. In a grayscale image, the intensity of each pixel is stored in 8 bits (1byte). Similarly for a colour (RGB-red, green, blue) image, each pixel requires 24 bits (8bits for each layer). The Human visual system (HVS) cannot detect changes in the colour or intensity of a pixel 16
  • 24. STEGANOGRAPHY Dept. of Information Technology when the LSB bit is modified. This is psycho-visual redundancy since this can be used as an advantage to store information in these bits and yet notice no major difference in the image. Algorithm of LSB method of steganography.There might be two different phases of LSB method, embedding phase and extracting phase. Algorithms of both of the phases are given below: A.Embedding phase Procedure: Step 1: Extract all the pixels from the given image and store them in some array named (imagearray). Step 2: Extract all the characters from the given text file(message file) and store it in the array called (messagearray). Step 3: Retrieve the characters from the Stego key and store them in a array called Keyarray. A stego- key is used to control the hiding process so as to restrict detection and/or recovery of the embedded data. Step 4: Take first pixel and characters from Key- array and place it in first component of pixel. If there are more characters in Key array, then place rest in the first component of next pixels. Step 5:Place some terminating symbol to indicate end of the key. 0 has been used as a termi- nating symbol in this algorithm. Step 6: Place characters of message Array in each component of next pixels by replacing it. Step 7: Repeat step 6 till all the characters has been embedded. Step 8: Again place some terminating symbol to indicate end of data. Step 9: Obtained image will hide all the characters that input. The simplest steganography techniques embed the bits of the message directly into least signif- icant bit plane of the cover image in a deterministic sequence. Modulating the least significant bit does not result in human-perceptible difference because the amplitude of the change is small. To hide a secret message inside an image, a proper cover image is needed. Because this method uses bits of each pixel in the image, it is necessary to use a lossless compression format, otherwise the hidden information will get lost in the transformations of a lossy com- pression algorithm. When using a 24-bit color image, a bit of each of the red, green and blue color components can be used, so a total of 3 bits can be stored in each pixel. For example, the following grid can be considered as 3 pixels of a 24-bit color image, using 9 bytes of memory: (00100111 11101001 11001000) (00100111 11001000 11101001) 17 DR.B.A.Tech.University
  • 25. STEGANOGRAPHY Dept. of Information Technology (11001000 00100111 11101001) When the character A, which binary value equals 10000001, is inserted, the following grid results: (00100111 11101000 11001000) (00100110 11001000 11101000) (11001000 00100111 11101001) In this case, only three bits needed to be changed to insert the character successfully. On average, only half of the bits in an image will need to be modified to hide a secret message using the maximal cover size. The result changes that are made to the least significant bits are too small to be recognized by the human visual system (HVS), so the message is effectively hidden. As you see, the least significant bit of third color is remained without any changes. It can be used for checking the correctness of 8 bits which are embedded in these 3 pixels. In other words, it could be used as parity bit. 18 DR.B.A.Tech.University
  • 26. STEGANOGRAPHY Dept. of Information Technology Figure 6.1: Encryption Diagram 19 DR.B.A.Tech.University
  • 27. STEGANOGRAPHY Dept. of Information Technology Figure 6.2: Decryption Diagram 6.1.2 Masking and filtering Masking and filtering techniques, usually restricted to 24 bits or grayscale images, take a differ- ent approach to hiding a message. These methods are effectively similar to paper watermarks, creating markings in an image. This can be achieved for example by modifying the luminance of parts of the image. While masking does change the visible properties of an image, it can be done in such a way that the human eye will not notice the anomalies. Since masking uses visible aspects of the image, it is more robust than LSB modification with respect to compres- sion, cropping and different kinds of image processing. The information is not hidden at the noise level but is inside the visible part of the image, which makes it more suitable than LSB modifications in case a lossy compression algorithm like JPEG is being used. 20 DR.B.A.Tech.University
  • 28. Chapter 7 SYSTEM DESIGN 7.1 Usecase Diagram Figure 7.1: Usecase Diagram A Use Case Diagram at its simplest is a representation of a user’s interaction with the 21
  • 29. STEGANOGRAPHY Dept. of Information Technology system. First user writes secret text then he selects cover image and data gets hidden inside image, then user sends stego image to receiver through image. At the receiver side, user selects the stego image and applies decryption on stego image. After that he can get text hidden in the text. 22 DR.B.A.Tech.University
  • 30. STEGANOGRAPHY Dept. of Information Technology 7.2 Activity Diagram Figure 7.2: Activity Diagram Purpose: An example of UML activity diagram describing behavior of the Stego System for Secure Communication. Summary: Activity is started by opening stego software. Stego software asks for authen- tication by entering username and passwords. If username and passwords are correct Stego software authenticates user. Four options get available front of user as 1. Generate stego image. 2. Get secret code. 3. Send image 4. About 5. Help. • User can generate stego image by hiding secret data in it. • User can get his secret code by decoding image. • User can send stego image to another user by send image option. • User can know about software by clicking on about option. 23 DR.B.A.Tech.University
  • 31. STEGANOGRAPHY Dept. of Information Technology • User can look for help in case he needs it. • User can terminate stego software by clicking on log out. 24 DR.B.A.Tech.University
  • 32. STEGANOGRAPHY Dept. of Information Technology 7.3 Class Diagram Figure 7.3: Class Diagram There are four following classes: 1. Stego module 2. Encryption 3. Unstego module 4. Decryption • Stego module: secret module consists of two attributes secret text and cover image as well as two operations as select secret text() and select cover image(). • Encryption: Encryption is the process of hiding secret text into cover image. • Ustego Module: It takes input from stego image that is stego image. 25 DR.B.A.Tech.University
  • 33. STEGANOGRAPHY Dept. of Information Technology • Decryption: It separates the secret text from the image. 26 DR.B.A.Tech.University
  • 34. STEGANOGRAPHY Dept. of Information Technology 7.4 State Chart Diagram Figure 7.4: State Chart Diagram System is in the Idle state, when user open it, After login correctly state changes from login to stego module where user writes secret code. After writing secret code state passes to Fetch Image in which secret code is embedded inside image. For decoding image state changes from Fetch image to Unstego module. User can exit system successfully after decryption of image. 27 DR.B.A.Tech.University
  • 35. STEGANOGRAPHY Dept. of Information Technology 7.5 Sequence Diagram Figure 7.5: Sequence Diagram Sequence diagrams are a popular dynamic modeling solution in UML because they specifically focus on lifelines, or the processes and objects that live simultaneously, and the messages exchanged between them to perform a function before the lifeline ends in which there are five lifelines : 1. User 2. Steg Module 3. Encryption 4. Unsteg 5. Decryption. ∗ The user selects cover image and text to be hide by LSB algorithm. 28 DR.B.A.Tech.University
  • 36. STEGANOGRAPHY Dept. of Information Technology ∗ In which algorithm is implements on that cover image and hides the secret text. ∗ After completion of process the system takes input for newly generated image. ∗ As user gives input, image is saved in respective directory. ∗ Saved image in directory is opened and Unsteg operation is performed on the image and original message is obtained. 29 DR.B.A.Tech.University
  • 37. STEGANOGRAPHY Dept. of Information Technology 7.6 Component Diagram Figure 7.6: Component Diagram There are six components of the system with the help of that user can use system efficiently.In which each components has its own functions. They perform function as per the class diagram. Components of this system are interconnected to each other. 30 DR.B.A.Tech.University
  • 38. STEGANOGRAPHY Dept. of Information Technology 7.7 DFD Level 0 Figure 7.7: Level 0 Diagram Steganography system takes inputs as secret text message as well as cover image and generates stego image. 31 DR.B.A.Tech.University
  • 39. STEGANOGRAPHY Dept. of Information Technology 7.8 DFD Level 1 Figure 7.8: Level 1 Diagram In DFD Level 1 the main task that is performed that is secret text message is added to the image by replacing some of the bits and it is sent to the receiver side through email. 32 DR.B.A.Tech.University
  • 40. STEGANOGRAPHY Dept. of Information Technology 7.9 DFD Level 2 Figure 7.9: Level 2 Diagram Secret text is added to the image by replacing Least Significant Bits(LSB) in which least significant bits are replaced and stego file is created. For decrypting image to get secret message. 33 DR.B.A.Tech.University
  • 41. Chapter 8 SYSTEM IMPLEMENTATION Figure 8.1: HOMEPAGE This is the image of the Home Page of steganography system. On this homepage user has to login with username and password. System authenticates user if username and passwords are correct. 34
  • 42. STEGANOGRAPHY Dept. of Information Technology Figure 8.2: MENU This is the second frame of the system in which there are three options are available as 1. Generate Stego System 2. Get your secret system 3. Send using email. To encrypt and decrypt image and send that image through email system. 35 DR.B.A.Tech.University
  • 43. STEGANOGRAPHY Dept. of Information Technology Figure 8.3: ENCODE This frame prompts you to enter secret message or secret text file and the cover image to hide secret code or secret code file. 36 DR.B.A.Tech.University
  • 44. STEGANOGRAPHY Dept. of Information Technology Figure 8.4: DECODE This window is about to decrypt image by choosing secret code file or secret code. 37 DR.B.A.Tech.University
  • 45. STEGANOGRAPHY Dept. of Information Technology Figure 8.5: PRINT This window represents to print window to prints secret message. 38 DR.B.A.Tech.University
  • 46. STEGANOGRAPHY Dept. of Information Technology Figure 8.6: HELP This frame represents steganography help that in case user needs any help. 39 DR.B.A.Tech.University
  • 47. STEGANOGRAPHY Dept. of Information Technology Figure 8.7: ABOUT US This window represents about software regarding steganography, group member etc. 40 DR.B.A.Tech.University
  • 48. STEGANOGRAPHY Dept. of Information Technology Figure 8.8: MAIL SERVICES This window represents Mail Services Where encrypted message can be sent by above different mail providers. 41 DR.B.A.Tech.University
  • 49. STEGANOGRAPHY Dept. of Information Technology Figure 8.9: STEGO SOCIAL Blog and facebook page have been developed for future scope, help community. 42 DR.B.A.Tech.University
  • 50. Chapter 9 APPLICATION OF SYSTEM 9.1 Advantages ∗ The main advantages of this system is Security that it provides security to your messages without knowing to third party. ∗ Number of bits have been replaced according to user or sender, therefore third party can not quess password. ∗ Normal network user cant guess image. ∗ In steganography anyone cant jump on suspect by looking images. ∗ It is Reliable. ∗ Easy to use. ∗ Easy Maintenance. ∗ System have been secured by password authentication. 9.2 Disadvantages ∗ Images can have attacks like diluting, nosing, contrast changes and so on. ∗ Number bits of pixel should be replaced by equal bits of message. ∗ If someone is eavesdropping then then there is probability of message get unfold. ∗ If more than two people having same steganography software then hidden mas- sage can acquire. ∗ This software has been implemented by java, which is open source, therefore code is readable so anyone with bad mentality can make software perform inverse 43
  • 51. STEGANOGRAPHY Dept. of Information Technology operation. ∗ Only unintended user may know the actual working of software. ∗ Intruder may penetrate suspecting images to get hidden data. 9.3 Application i) Confidential Communication and Secret Data Storing. ii) Protection of Data Alteration. iii) Access Control System for Digital Content Distribution. iv) E-Commerce. v) Media. vi) Database Systems. vii) Digital Watermarking. 44 DR.B.A.Tech.University
  • 52. Chapter 10 FUTURE SCOPE Steganography, though is still a fairly new idea. There are constant advancements in the computer field, suggesting advancements in the field of steganography as well. It is likely that there will soon be more efficient and more advanced techniques for Steganalysis. A hopeful advancement is the improved sensitivity to small messages. Knowing how difficult it is to detect the presence of a fairly large text file within an image, imagine how difficult it is to detect even one or two sentences embedded in an image! It is like finding a microscopic needle in the ultimate haystack. What is scary is that such a small file of only one or two sentences may be all that is needed to commence a terrorist attack. In the future, it is hoped that the technique of Steganalysis will advance such that it will become much easier to detect even small messages within an image. In this work it explores only a small part of the science of steganography. As a new displine, there is a great deal more research and devel- opment to do. The following section describe areas for research which were offshoots of, or tangential to,our main objectives. 1. Detecting Steganography in Image Files: Can steganography be detected in images files? This is difficult question. It may be possible to detect a simple Steganographic technique by simple analyzing the low order bits of the image bytes. If the Steganographic algorithm is more complex, however, and spreads the embedded data over the image is random way or encrypts the data before embedding, it may be nearly impossible to detect. 2.Steganography on the World Wide Web: The world wide web(www) makes extensive use of inline images.There are literally millions of images on various web pages worldwide. It may be possible to develop 45
  • 53. STEGANOGRAPHY Dept. of Information Technology an application to serve as a web browser to retrieve data embedded in web page images. This stego-web could operate on top of the existing WWW and be a means of covertly disseminating information. 3.Steganography in printed media: If the data is embedded in an image, the image printed, then scanned and stored in a file can the embedded data be recovered? This would require a special form of a steganography to which could allow for in accuracies in the printing and scanning equipment. 46 DR.B.A.Tech.University
  • 54. CONCLUSION It is observed that through LSB Substitution Steganographic method, the results obtained in data hiding are pretty impressive as it utilizes the simple fact that any image could be broken up to individual bit-planes each consisting of different levels of information. It is to be noted that as discussed earlier, this method is only ef- fective for bitmap images as these involve lossless compression techniques.But this process can also be extended to be used for color images where, bitplane slicing is to be done individually for the top four bit-planes for each of R, G, B of the message image. It is also important to discuss that though steganography was once undetected, with the various methods currently used, it is not only easy to detect the presence but also retrieving them is easier. For instance, without having to use a software or complex tools for detection, simple methods to observe if an image file has been manipulated are: 1. Size of the image: A Steganographic image has a huge storage size when compared to a regular image of the same dimensions. I.e. if the original image storage size would be few KBs, the Steganographic image could be several MBs in size. This again varies with the resolution and type of image used. 2. Noise in image: A Steganographic image has noise when compared to a regular image. This is the reason why initially little noise is added to the cover image, so that the Steganographic image doesnt appear very noisy when compared to the original cover image. 47
  • 55. Bibliography [1] Literature Survey, http://www.ijetajournal.org/volume-2/issue-5. [2] Design Realated Research, https://www.researchgate.net/publication/314116270ImageSteganography.ImageSteagan http : //repository.root − me.org/Stganoraphy [3][3] Programming Tutorial www.dreamincode.net Book Names: 1. Advanced Java By Uttam K. Roy. 2. Advanced Java By Gajendra Gupta. 48