You are on page 1of 20







Images are the most widespread carrier medium. The sender (or embedder) embeds the secret message to be sent into a graphic file (the cover image or the carrier). When the message is hidden in the carrier a stego-carrier is formed for example a stego-image. Steganography is defined as the art and science of communicating in a way which hides the existence of the communication. The word Steganography or Stego as it is often referred to in the IT community. Cryptography and steganography are different. The recipient (or extractor) extracts the message from the carrier image. text files. They are used for steganography in the following way. Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. information can be hidden in carriers such as images. Using steganography. If a cryptographic message is discovered it is generally known to be a piece of hidden information (anyone intercepting it will be suspicious) but it is scrambled so that it is difficult or impossible to understand and de-code. Cryptographic techniques can be used to scramble a message so that if it is discovered it cannot be read. "covered writing" which is derived from the Greek language. This results in the production of what is called a stego-image. The 3 . but result if successful in no discernible change to the carrier. The stego-image is then transmitted to the recipient.Steganography deals with information hiding. videos and data transmissions. The message may firstly be encrypted. as opposed to encryption. audio files. Computer based steganography allows changes to be made to what are known as digital carriers such as images or sounds. The objective of steganography is to send a message through some innocuous carrier to a receiver while preventing anyone else from knowing that a message is being sent at all. The changes represent the hidden message. Hopefully it will be perceived to be as close as possible to the original carrier or cover image by the human senses. literally means.

as soon as it starts create a Buffer and associate this buffer to some homogeneous data environment.message can only be extracted if there is a shared secret between the sender and the recipient. While the Encryption and Decryption is done the application should confirm the standards of authentication and authorization of the user. The key should be designed in such a way that it prevents the unauthorized persons from stealing the information at any point of time. The figure below shows the steganographic system. The Application should be designed in such a way that. The Overall system should provide proper menu based navigation for easier navigation and operation. such that it is not altered and tampered and sending the in video format is most secured way to transfer the data through the network. The major task of the Video Stegnography is to provide the user the flexibility of passing the information implementing the encryption standards as per the specification and algorithms proposed and store the information in a form that is unreadable. which makes it possible for the users to have a smooth flow while working under the environment. The Video Stegnography is software. The Entire application should strive to achieve a user friendly Graphical User Interface. And the other way of securing the data is using Steganography in which 4 . the application should ask the user for the Encryption Key details and should start its functionality upon the logistics that are provided with in this key. This is some part of securing the data from third party people. which need to be in a self-learning mode for the end user. which tries to alter the originality of the file into some encrypted form and embed the file into an video file. Encryption of data plays a vital role in the real time environment to keep the data out of reach of unauthorized people. The Application should have a reversal process as of which should be in a position to de embed the data file from video file and decrypt the data to its original format upon the proper request by the user. The System Should provide all the functional standards of proper navigation with in the environment.

which are above the general standards of security. Decryption should be a reverse process at the other end and should be translated only when the receiver of the data applies the proper reversal key. therefore it is easy to implement. This algorithm has been used because it requires less memory. The Decryption process should have a log-based methodology that will take care of any errors that may be encountered while the system is under utilization and should record all those events. It uses only simple operations. This algorithm is a 64-bit block cipher with a variable length key. The application of De-embedding. If any one track that file they only see the video file not the data. ABSTRACT 5 .embedding the encrypted file in to a video file. This system basically uses the Tiny Encryption Algorithm to encrypt the passwords.

A number of algorithms were developed and implemented to achieve Steganography in images and audio. The transparency bits of the pixels are not disturbed. While Cryptography scrambles a message so that it can not be understood. An attempt is being made to implement a new technique . image and audio files. for image encoding in steganography. The fact that we are embedding the plain text into the two LSB bits enables the recipient to get the original image without any distortions. The bits of the plain text into the two LSB bits of the RGB values in the image. This hiding of data can be done in three different media such as text.Steganography is the art of hiding information. firstly the pixels values (RGB values) of the image in which the plain text is to be embedded are extracted. Many new algorithms are coming and each of them uses a unique method of making life of a Steg-Analyst more miserable everyday. In this technique. It is extensively used in Digital Water marking. we are first encrypting the message using DES algorithm and then cipher text as the input to our technique and the same message will be extracted and decrypted at the receiver end. entitled “Steganographic Application Tool”. It provides more security for data transfer on Internet and other networks. Though there are variety of image formats to implement the algorithms used in this system. we use the JPEG format to embed the Plain text as it contains the compressed image format. communication within closed community with additional degrees of security. Using Steganography a secret message can be transmitted without the fact of the transmission being discovered. In order to provide more security. Our intention is to hide the existence of the message. Problem statement 6 . There are a large number of Steganographic methods used in different applications. Steganography is really interesting subject and the applications using Steganography are increasing day-by-day.

where the cipher was used as a hash function.r. prevention of unauthorized access and/or handling of information. they can easily take advantage of a Distributed computing architecture by means of replicated computation Using sets of untrusted 1(or fallible) processors. Because of these weaknesses.r. provision of data integrity and confidentiality ).t. safety (w. with 232 time complexity. Some Algo is especially bad as a cryptographic hash function.t. Some of these attributes (reliability/availability and security) are often considered separately because the Techniques used to achieve them are usually perceived as being Mutually antagonistic.r. continuity of service).r. it suffers from equivalent keys—each key is equivalent to three others. avoidance of catastrophic Consequences on the environment ) security (w. including: availability (w. reliability (w. These techniques will Of necessity involve space and/or time redundancy. Firstly.r.t.e.a generic concept –defined as the trustworthiness of a computer system such that reliance can Justifiably be placed on the service it delivers – may be viewed w. As a result.t. or that remain despite attempts at fault prevention durin the system design process. which means that the effective key size is only 126 bits.Dependability . Some Algo is also susceptible to a related-key attack which requires 223 chosen plaintexts under a related-key pair. This weakness led to a method for hacking Microsoft's Xbox game console. Most notably.. different properties and so enables the definition of a number of different dependability attributes . readiness for usage ). i.t. reliability and availability are generally Achieved by Incorporating mechanisms for Tolerating any Faults (especially accidental faults) tha occur. the TEA cipher was designed. OBJECTIVE 7 .

2. re.implemented for this tool. it should be able to evaluate the degradation of an image. The tool should be easy to use. To create a tool that can be used to hide data inside a 24 bit color image. 7. The analysis used will consist of existing watermarking measures. The tool should be able to encrypt the message before embedding it. and should be able to retrieve this message afterwards. The tool should be able to provide some information as to the effectiveness of the hiding i. to theoretically more effectively hide the message. and should use a graphical user interface. 4. The technique should fall under the category of Secret Key Steganography -where without the key the hidden message cannot be retrieved.The project has the following objectives: 1. 8 . The tool should effectively hide a message using an image degradation approach. The tool should work cross-platform. 5.e. 8. 6. The tool should take into account the original content. 3.

Time performance on a modern desktop computer or workstation is very impressive. and achieves complete diffusion (where a one bit difference in the plaintext will cause approximately 32 bit differences in the cipher text) after only six rounds. Each round follows the same pattern except for the 9 . The round function. The two halves are then swapped. Block ciphers where the cipher text is calculated from the plain text by repeated application of the same transformation or round function. is applied to one half using a sub key and the output of F is (exclusive-or-ed (XORed)) with the other half. This research presents the cryptanalysis of the Tiny Encryption Algorithm. In this research we inspected the most common methods in the cryptanalysis of a block cipher algorithm. It is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. In a Feistel cipher. TEA seems to be highly resistant to differential cryptanalysis. F.RESEARCH PART Tiny Encryption Algorithm: The Tiny Encryption Algorithm (TEA) is a cryptographic algorithm designed to minimize memory footprint and maximize speed. the text being encrypted is split into two halves.

10 . The focus of this thesis is the TEA Feistel Cipher.last round where there is often no swap.

such as in 24-bit bitmaps. due to the convention in positional notation of writing less significant digit further to the right. That's usually an effective technique in cases where the LSB substitution doesn't cause significant quality degradation. It is analogous to the least significant digit of a decimal integer. that is. The LSB represents a value of 1. The MSB in an 8-bit binary number represents a value of 128 decimal. For example. you can set the LSB of each byte like this: 10010010 01010011 10011011 11010010 10001010 00000010 01110010 00101011 11 . The binary representation of decimal 149. the least significant bit (LSB) is the bit position in a binary integer giving the unitsvalue. which is 01100001) inside eight bytes of a cover. In computing.LSB CODING A very popular methodology is the LSB (Least Significant Bit) algorithm. The LSB is sometimes referred to as the right-most bit. determining whether the number is even or odd. with the LSB highlighted. to hide the letter "a" (ASCII code 97. which is the digit in the ones (right-most) position. which replaces the least significant bit in some bytes of the cover file to hide a sequence of bytes containing the hidden data.

The application decoding the cover reads the eight Least Significant Bits of those bytes to recreate the hidden byte—that is 0110001—the letter "a. 12 . and to the government for information systems security and for covert communications . There are many reasons to hide data but most important is to prevent unauthorized persons from becoming aware of the existence of a message. It can also be used in forensic applications for inserting hidden data into audio files for the authentication of spoken words and other sounds. The least significant column of the audio file is replaced by the bit stream of sectet information ‘HEY’. Terrorists can also use Audio data hiding to keep their communications secret and to coordinate attacks. in other words. The resulting file after embedding secret information ‘HEY’ is called Stego-file. In the business world Audio data hiding can be used to hide a secret chemical formula or plans for a new invention . The International Journal of Multimedia & Its Applications (IJMA) method. First the secret information ‘HEY’ and the audio file are converted into bit stream. is of interest for the protection of copyrighted digital media. half the time. HEY is to be embedded inside the audio file. and in the music business for the monitoring of the songs over broadcast radio. Data hiding in video and audio. AUDIO STEGANOGRAPHIC APPLICATIONS Audio data hiding can be used anytime you want to hide data." As you may realize. In the project ARTUS1 which aims to embed animation parameters into audio and video contents . the bit doesn't change. Note that there's a fifty percent chance that the bit you're replacing is the same as its replacement. Here the secret information is ‘HEY’ and the cover file is audio file. which helps to minimize quality degradation. using this technique let you hide a byte every eight bytes of the cover. Audio data hiding can also be used in the non commercial sector to hide information that someone wants to keep private.

and noise audibility and then select the method that best fits their specifications.  For example. bandwidth. A party that wishes to communicate can rank the importance of factors such as data transmission rate. a large corporation wishing to protect its intellectual property from "digital pirates" may consider a more sophisticated method such as phase coding. or echo hiding. robustness. two individuals who just want to send the occasional secret message back and forth might use the LSB coding method that is easily implemented. SS. 13 .Evaluation of Audio Steganography ADVANTAGES :  Audio based Steganography has the potential to conceal more information:  Audio files are generally larger than images  Our hearing can be easily fooled  Slight changes in amplitude can store vast amounts of information  The flexibility of audio Steganography is makes it very potentially powerful :  The methods discussed provide users with a large amount of choice and makes the technology more accessible to everyone. On the other hand.

P2P software. spatial scaling. Consequently.  Users no longer have to rely on one method alone.g. and the need for a secure broadcasting scheme that can maintain the secrecy of the transmitted information.) cannot be implemented against audio Steganography schemes.  Audio Steganography in particular addresses key issues brought about by the MP3 format. and surveillance increases. etc. geometrical distortions. privacy protection. embedding information into audio seems more secure due to less steganalysis techniques for attacking to audio. 14 . it can be hidden altogether.  Many sources and types makes statistical analysis more difficult :  Greater amounts of information can be embedded without audible degradation  Security :  Many attacks that are malicious against image Steganography algorithms (e. Another aspect of audio Steganography that makes it so attractive is its ability to combine with existing cryptography technologies. Steganography will continue to grow in importance as a protection mechanism. even when passing through insecure channels.  As emphasis placed on the areas of copyright protection. Not only can information be encrypted.

This will also remove any frequencies that are used by a Steganography system which hides information in that part of the spectrum.  Compressing an audio file with lossy compression will result in loss of the hidden message as it will change the whole structure of a file.3GHz or faster or AMD Ram 512 MB DDR-Win XP 2GB DDR. The specification of the PC is: Processor Intel Pentium 4-1.  Commercialized audio Steganography have disadvantages that the existence of hidden messages can be easily recognized visually and only certain sized data can be hidden.Vista Business or 15 . Hardware & Software Requirement Hardware requirement: The hardware needed for this project are listed below.  Robustness: Copyright marks hidden in audio samples using substitution could be easily manipulated or destroyed if a miscreant comes to know that information is hidden this way. Also.DISADVANTAGES:  Embedding additional information into audio sequences is a more tedious task than that of images. due to dynamic supremacy of the HAS over human visual system. several lossy compression schemes use the limits of the human ear to their advantage by removing all frequencies that cannot be heard.

Encryption and hide message form the modules. Front End: JDK. many software are needed.Secret key can be used for encryption of the message to be hidden. which shall be the operating system for the project to be developed. hide message. Encryption can be done by passing a secret key. retrieve message and decryption.It provides security by converting it into a cipher text. these include Microsoft Windows XP.9 and Above Backend: MySql MODULE DESCRIPTION The project consists of mainly four modules encryption.which will be difficult for hackers to 16 . Encryption Encryption includes a message or a file encrypting. Java IDE : Netbeans 6. Encryption involves converting the message to be hidden into a cipher text.Hard drive Vista Ultimate 1 GB Memory 512 MB Monitor Any standard monitor Software requirement: In order to carry out the development of this project. retrieve message and decryption form the modules .

This message has to be converted into the suitable output file format. and these values often range from 0-255. Hide Message Hiding message is the most important module of steganography. one each for red. Once the message has been retrieved it has to be converted into original message or file.the retriever has to enter the correct password for viewing the message. Retrieve Message It involves retrieving the embed message from the file independent of the file format. Decryption Decryption includes a message or a file decrypting. Secret key can be used for 17 .then while retrieving message.It involves embedding the message into the cover text. The read data will be in the bytes format. Decryption can be done by passing a secret key. Decryption involves converting the cipher text into decrypted format. This can be done by reading the embedded data from the master file. and blue is first converted into byte format and stored in a byte array. Each pixel typically has three numbers associated with it. Moreover if the message is password protected. The least significant (rightmost) bit of each 8-bit byte has been co-opted to hide a text message.In order to hide the message. green.The message is then encrypted and then embed each bits into the LSB position of each pixel position.

CONCLUSION The entire project has been developed and deployed as per the requirements stated by the user.decryption of the message that is hidden. which are planned to be developed in near future. into the original data message or file . the retriever has to enter the correct password for viewing the message. Moreover if the message is password protected. The system at present does not take care of lower level check constraints in accessing 18 the file types in . it is found to be bug free as per the testing standards that is implemented. then while retrieving message. It provides security by converting the cipher text. Any specification-untraced errors will be concentrated in the coming versions.

distributed environments. REFERENCES BOOKS AND MANUALS :1. which is to be considered in the future up gradations.JAVA-2 Complete-Reference 19 . As per the present status the project developed is well equipped to handle the Central file system of an organization in a server and provide access to the users with various privileges as prescribed by the higher authorities in the password file.

System Analysis & Designing Author : Publisher : James A.Author : Publisher : Patric Norton & Herberlt Schild Tata McGraw Hill 2. senn Tata McGraw Hill 3. 20 .Software Engineering Concepts Author Publisher : : Fairley Tata McGraw Hill Publication.3rd Edition.