Académique Documents
Professionnel Documents
Culture Documents
Nidhi Pandey <nidhip56@gmail.com> Nupur Solanki <nupursolanki99@gmail.com> Nidhi Pare <nidhipare@gmail.com> IT2 (3rd year)
ABSTRACT :
Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Steganography and cryptography are both ways to protect information fromun wanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be amplified by combining it with cryptography.
INTRODUCTION :
Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the Greek words stegos meaning cover and grafia meaning writing defining it as covered writing. In image steganography the information is hidden exclusively in images.
PROBLEM DOMAIN :
This project attempts to make use of the standard steganographic tool and a modified version of standard encryption algorithm to perform the task of data hiding for the purpose of observing privacy. The user should be able to conceal a text message in an video file without any visible alterations to the video as such i.e. there should not be any noticeable changes to the coloring or the position of the various objects in the video.
SYSTEM DOMAIN :
Software Requirement : Windows XP, Pentium dual core processor : 1.96GB RAM 20 GB HD Hardware Requirements :
System Configuration-Pentium(R)Dual Core CPU E5300 @ 2.60GHz 2.60GHz 2.00GB 32 Bit Operating System
APPLICATION DOMAIN :
Steganography is applicable to, but not limited to, the following areas. 1) Confidential communication and secret data storing 2) Protection of data alteration 3) Access control system for digital content distribution 4) Media Database systems
(A) Choose a large vessel, larger the better, compared with the embedding data. (B) Discard the original vessel after embedding. For example, in the case of Qtech Hide & View, it leaves some latent embedding evidence even if the vessel has a very large embedding capacity. You are recommended to embed only 25% or less (for PNG / BMP output) of the maximum capacity, or only 3% of the vessel size (for JPEG output).
(2) On that Webpage the owner explains the contents in depth and publicize worldwide. The contact information to the owner (post mail address, e-mail address, phone number, etc.) will be posted there. (3) The owner may receive an access-request from a customer who watched that Webpage. In that case, the owner may (or may not) creates an access key and provide it to the customer (free or charged). In this mechanism the most important point is, a "selective extraction" is possible or not.
5. EXPECTED OUTCOME :
An application that serves the purpose of data encryption and decryption in and from a video file which is provided by the user along with the data to be hidden in the file.