You are on page 1of 21

Data Minder using

Steganography :
Technology of Data
Encryption

Guided by,
Mrs. BISMI A S Presented by,
AP, Dept. of CSE BIBIN BABU
Date : 15/07/2014 S7, CSE
Roll no: R11U005

1
CONTENTS
 INTRODUCTION
 BACKGOUND/ RELATED WORK
 SYSTEM OVERVIEW
 EXISTING SYSTEM
 PROPOSED SYSTEM
 ALGORITHMS USED IN STEGANOGRAPHY
 TYPES OF STEGANOGRAPHY
 ADVANTAGES & LIMITATIONS
 APPLICATIONS
 CONCLUSION
 FUTURE WORK
 REFERENCES

2
INTRODUCTION

Steganography – Greek origin


means “ Covered or Hidden writing ”

Process of hiding confidential information within any media.

Confused with cryptography


difference – appearance in processed output

Steganalysis – detecting steganography

Cover object – used as carrier to embed messages into

Stego object – object which carry a hidden message


3
BACKGROUND / RELATED WORK
 Images – widely used media to transmit hidden messages.

 Raster data that defines the image stored either by ,


 Simple compression – Graphics Interchange Format(GIF)
 Amenable compression – Joint Photographic Experts Group(JPEG)

 GIF image format uses table based representation.

 JPEG representation allows compression of data to varying


degrees.

 In digital steganography – messages represented as bits

4
BACKGROUND / RELATED WORK

5
WORKING
 Basis of steganography - hiding bits of message among bits of
image
 The message is undetectable, but
 Recoverable by intended recipients

6
WORKING (Contd..)

The modern formulation of steganography is often given in terms of


the prisoner's problem.

7
SYSTEM OVERVIEW

 This System includes three main parts

 Administrator - creates the monitor accounts

 Encryption - uses the service of the system & authenticates


the user

 Decryption – used to decrypt data

8
SYSTEM OVERVIEW (Contd..)
Administrator :
 Create, and monitor accounts of authorities.

 The created user should be assigned with a Primary Unique-ID.

 Authorize the user to perform various operations as provided by


the system.

 Should properly handle Encryption and Decryption phases.

 For every individual encrypted file a encryption stegnographed


pattern should be assigned.
9
SYSTEM OVERVIEW (Contd..)
Encryption :
 Users - create new account, login to existing accounts
give authority to use the services provided by the system.

 Authenticated users
encrypt the important and essential data.

During encryption phase user provide a Carrier image and the data that
is to be encrypted.

User download the stegnographed file

User can share the encrypted file with other users.


10
SYSTEM OVERVIEW (Contd..)
Decryption :
Users can log-in to their accounts as created by
administrator.

Authenticated users should be able to decrypt the


important essential data.

Upload the encrypted file for further decryption.

11
SYSTEM OVERVIEW (Contd..)

12
EXISTING SYSTEM
Mostly data stored in consequent pixel bits of the cover image.

If at all random pixels used data can be decrypted by any unauthorized
user by the using same application.

High risk of data loss or data sniffing while communication over the
network.

Restriction of file size of the data as compared to the cover image, data
size should be smaller than the cover image.

Encrypted data cannot be shared by the user.

Cannot manage his files and data that were previously encrypted by the
particular user.
13
PROPOSED SYSTEM
 Data stored in random pixel bits of the cover image.

 Only authorized personals by using his Unique-ID can upload the


particular encrypted file and decrypt the data.

 While communicating with the server over the network, eliminating


the risk of sniffing and data loss.

 Large data can be encrypted irrespective of the cover image.

 User can very well share his encrypted data without worrying about
the security.
14
ADVANTAGES
 Covert communication using images (secret message is hidden
in a carrier image)

 Ownership of digital images, authentication, copyright

 Data integrity, fraud detection, self-correcting images

 Traitor-tracing (fingerprinting video-tapes)

 Copy control (secondary protection for DVD)

15
ADVANTAGES (Contd..)

 Adding captions to images, additional information, such


as subtitles, to video, embedding subtitles or audio tracks
to video (video-in-video)

Intelligent browsers, automatic copyright information,


viewing a movie in a given rated version

16
APPLICATIONS
 Access control system for digital content distribution.

 Media Database systems.

 Fields where this technique will definitely be highly benefited


include
 Music
 Film
 Ministry
 Military

17
CONCLUSION
 Steganography means “ Covered or Hidden writing ”

 Different medias have been used as the cover media such as: image,
audio, text, protocol and video.

 Images – widely used media to transmit hidden messages.

 Basis of steganography - hiding bits of message among bits of image.

 Communication and secret data storing.

 Protection of data alteration.

18
FUTURE WORK

 The future work in steganalysis - employment of advanced bio-


inspired metaheuristic algorithms, such as

 Genetic Algorithms
 Ant Colony Optimization
 Particle Swarm Optimization
 Artificial Immune Systems

 In future system be more robust and efficient.


 utilize the entire image for embedding the message.

19
REFERENCES
 A Randomized Secure Data Hiding Algorithm Using
File Hybridization for Information Security.

 European Journal of Scientific Research ISSN 1450-216X Vol.40 No.2


(2010), pp.223-231 © EuroJournals
Publishing, Inc. 2010http://www.eurojournals.com/ejsr.htm.

 Kodovský, J and Fridrich, J.(2012). Ensemble Classifiers for


Steganalysis of Digital Media, ieee transactions on information
forensics and security, VOL. 7, NO. 2, pp.432-444, ISBN: 1556-6013

 Public–Key Steganography Based on Matching Method.

 Exploring Steganography: Seeing the Unseen.


 Neil F. Johnson Sushil Jajodia George Mason University.
20
THANKYOU ALL
FOR LISTENING

21

You might also like