This action might not be possible to undo. Are you sure you want to continue?
Presented by: 1. Vijay S. Kakade. 2. Sanjeevani S. Ingle. 3. Kavita V. Sonavale.
etc. This can be achieved by concealing the existence of information within seemingly harmless carriers or cover Carrier: text.What is Steganography? Greek Words: STEGANOS – “Covered” GRAPHIE – “Writing” Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Stegosaurus: a covered lizard (but not a type of cryptography) . video. image. audio.
Data hiding process consists of following two steps i. Identification of redundant bits in a cover-file ii. . It is concerned with embedding information in an innocuous cover media in a secure and robust manner.Types of Steganography Classification is based on type of cover medium used. To embed the secret information in the cover file Video Steganography Carrier file : any type of video file Popularity of sending & receiving files over network. Audio Steganography Carrier file : any type of audio file Recipient decodes information by using easily.
Use of Steganography Secure data transmission over the network Offer deniable storage of information To store information on desired location banking information some military secrets Used to implement watermarking Provides a secure yet simple interface for hiding information 4 .
Existing System Existing System of Audio i. Parity coding Disadvantages Selection of audio formats is restricted to one message length is restricted to 500 characters Lack in good user interface Consume much time to encode and decode User needs to understand better to know the operations . Phase coding ii.
Non-provision of choosing the key. More encode-decode time consumption.Existing System continued. Unavailability of programs for particular operating system.. . Existing System Of video Embed hidden messages in multimedia objects Disadvantages Lack of good user interface.
Problem Statement Digitization Digital media can be transmitted conveniently over the network. . to make the information hiding simpler and user friendly. For hiding secret information in audio and video there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. So we prepare this application.
Scope of Project Scope of the project is implementation of steganography tools for hiding information includes any type of information file within another file Provide better security when transmitting or transferring the data or messages from one end to another Provide confidentiality and data integrity which requires to protect against unauthorized access and use .
Proposed System Least Significant bit (LSB) Modification Method Modifications are made to the least significant bits of the carrier file’s individual pixels Example of LSB substitution (00100111 11101001 11001000) (00100111 11001000 11101001) (11001000 00100111 11101001) Letter 'A' is represented in ASCII format as the binary string 10000011 (00100111 11101000 11001000) (00100110 11001000 11101000) (11001001 00100111 11101001) 9 Advantages .
Proposed system of Audio Least Significant Bit (LSB) coding method is the simplest way to embed secret information in a digital audio file by replacing the least significant bit of audio file with a binary message. retrieving the hidden data from the video using LSB modification method Advantage over Existing system LSB coding method is a very high watermark channel bit rate and a low computational complexity 10 . Proposed system of Video Hiding data in the video image. Advantages over existing system.
SAMPLE OUTPUT Steganography.Select Text file and Audio file 11 .
Select Text file and Video file 12 .SAMPLE OUTPUT Steganography.
Design Details Basic Architecture .
THANK YOU .