Vous êtes sur la page 1sur 12

SECURE TRANSMISSION THROUGH STEGENOGRAPHY

What is STEGENOGRAPHY?
The word Steganography can be defined as covered writing. It is derived from a Greek word STEGANOS Covered GRAPHIE Writing The goal of Steganography is to hide messages inside other harmless messages. In a way that does not allow any enemy to even detect that there is a second secret message present.

A graphical example:

Cryptography
It is a commonly used technique to protect the secret messages during transmission. Using the classic Cryptography, the encrypted message becomes clutter data. That cannot pass the checkpoint on the network. Most commonly used cryptography algorithms include IDEA, RSA, DES, BLOWFISH etc. It just Scrambles the data to prevent eavesdroppers understanding the content.

This is how an encrypted file looks like

Why STEGANOGRAPHY?
We can make use of Steganography to overcome the difficulties faced when utilizing Cryptography, like : The data received by the hackers is encrypted which also is an indication that there is confidential data. Getting rid of the clutter data. Free Flow of the data in the network. Steganography provides another layer of protection on the secret message. Which will be embedded in another media such that the transmitted data will be meaningful and innocuous to everyone.

Proposed System
The system to automate security by providing a concept of hiding the data in other containers and transferring the container. As hackers can have different intentions where in some of them may be interested in the data the others may be interested to damaged the data.

Module Description
This project contains six modules. They are: CRC Generation Compression Embedding De-embedding De-compression CRC verification

CRC Generation
This module is used to generate the checksum value for the selected file which is to be transmitted over the network. The checksum value is appended to the file.

Compression
This module is used to reduce the size of the file which is to be transmitted over the network. This project uses GZIPOutputStream class of java.util.zip package to compress the file.

Embedding
This module is used to append the compressed data to a container file (image, audio, and video). This project uses Append Binary method to append the data.

De Embedding
This module is used to extract the compressed data from the container file.

De Compression
This module is used to extract the compressed data to get the plain text. This mechanism is achieved using GZIPInputStream class of java.util.zip package.

CRC Verification
This is used to check whether the file is corrupted or not at the receiving side. The checksum value obtained here is cross checked with the value appended at the time of CRC Generation. Both the values need to be same results the file is not corrupted.

Thank You

Vous aimerez peut-être aussi