Vous êtes sur la page 1sur 32

STEGANOGRAPHY

By: G.Soujanya Reddy (08QC1A1243) T.Swarna Rekha (08QC1A1247) D.V.Vineela Swathi(08QC1A1253)

INTRODUCTION

Steganography What is Steganography? History Steganography today Steganography tools Conclusions Whats in the Future? Other tools in the wild References

Steganography - Definition
Steganography
from the Greek word steganos meaning covered and the Greek word graphie meaning writing

Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination Anyone else viewing the message will fail to know it contains hidden/encrypted data

Steganography - History

Greek history warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank. Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated. Invisible Ink is also a form of steganography

Steganography

Modern digital steganography


data is encrypted then inserted and hidden, using a special algorithm which may add and/or modify the contents of the file This technique may simply append the data to the file, or disperse it throughout Carefully crafted programs apply the encrypted data such that patterns appear normal.

Steganography Modern Day

Steganography Carrier Files


Steganography Carrier Files bmp jpeg gif wav mp3 Amongst others

Steganography - Tools
Steganography Tools Steganos S-Tools (GIF, JPEG) StegHide (WAV, BMP) Invisible Secrets (JPEG) JPHide Camouflage Hiderman Many others

Steganography
Popular sites for Steganography information
http://www.ise.gmu.edu/~njohnson/Steganography http://www.rhetoric.umn.edu/Rhetoric/misc/dfrank/stegsoft.html http://www.topology.org/crypto.html

Anomaly Visual Detection


Detecting Steganography by viewing it

Can you see a difference in these two pictures? (I cant!)

In this we have 2 modules Steg module UnSteg module

Module Description

Steg Module: In this module User need to write any secret information in Text area provided and need to select an Image file to which User wants to append the Secret Information Text. After Selecting the Image the processing of adding Secret Information to Image file takes place. In Steg Module only the Secret Text Information and Image to which Secret Text Information will be selected and the remaining process go on based on the pixels of image and Text given. UnSteg Module: In UnSteg module the Encrypted Image will be selected and Steganography Application will start decrypting it with each and every pixel of the Image and displays the output i. e. Secret Text Information. UnSteg module will be accepting only the Image which has the hidden text message in it. After decrypting the Image the Secret Text Info- rmation will be displayed from the Image by UnSteg Module.

Technological Requirements
Software Requirements: Java 2 Standard Edition, Java Swings Microsoft Windows, Linux or Mac any version Hardware Requirements: P2 above processor, 128MB+ of main memory (RAM) and 100MB hard disk and data base memory. LAN connection or internet connection.

SCOPE Steganography provides some very useful and commercially important functions in the digital world, most notably digital watermarking. In this application, a user can embed a hidden message in a file so that ownership of intellectual property can later be asserted and/or to ensure the integrity of the content. An artist, for example, could post original artwork on a Website. If someone else steals the file and claims the work as his or her own, the artist can later prove ownership because only he/she can recover the watermark.

Existing System
Developed for any one Operating System. Supports any one either command mode or graphical mode only. Usually available as a built in utility in the system. Should be applicable for any kind of Image Size for Steganography.

Proposed System
Steganography is supposed to run with Java runtime environments version 1.4 and higher. This has the advantage of working under most operating systems in use today. Write the code to execute as Command mode and Graphical Interface Provide interactive interface through which user can interact with different types of Images, Image Sizes and Text Messages.

DATA FLOW DIAGRAMS


Level 0 DFD for Users

Level-1 Subsystem Level

Level-2: Detailed Level

UML Diagrams
Use Case:

UML Diagrams Class Diagrams

UML Diagrams Sequence Diagram

OUTPUT SCREENS

OUTPUT SCREENS

OUTPUT SCREENS

OUTPUT SCREENS

OUTPUT SCREENS

OUTPUT SCREENS

OUTPUT SCREENS

CONCLUSION S
Steganography today, however, is significantly more sophisticated than the examples above suggest, allowing a user to hide large amounts of information within image and audio files. These forms of steganography often are used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the information (an often difficult task in and of itself) and then decrypt it. Steganography is a really interesting subject and outside of the mainstream cryptography and system administration that most of us deal with day after day. But it is also quite real; this is not just something that's used in the lab or an arcane subject of study in academia. Steg may, in fact, be all too real there have been several reports that the terrorist organization behind the September 11 attacks in New York City, Washington, D.C., and outside of Pittsburgh used steganography as one of their means of communication.

Questions & Answers

THANK YOU

Encoding
public boolean encode(String path, String original, String ext1, String stegan, String message) public String decode(String path, String name) private String image path(String path, String name, String ext) private BufferedImage getImage(String f) private boolean setImage(BufferedImage image, File file, String ext) private BufferedImage add text(BufferedImage image, String text) private BufferedImage user space(BufferedImage image) private byte[] get_byte_data(BufferedImage image) byte byte3 = (byte)((i & 0xFF000000) >>> 24); //0 byte byte2 = (byte)((i & 0x00FF0000) >>> 16); //0 byte byte1 = (byte)((i & 0x0000FF00) >>> 8 ); //0 byte byte0 = (byte)((i & 0x000000FF) );

Vous aimerez peut-être aussi