Date post: | 07-Apr-2018 |
Category: |
Documents |
Upload: | ankit-singhal |
View: | 225 times |
Download: | 0 times |
of 34
8/4/2019 Steganography (Final)1
1/34
Submitted To :Nirupama Kurmi
(H.O.D)
Submitted By :Ankit Shrivastav
Ankit Chaturvedi
Gaurav Sharan Goyal
8/4/2019 Steganography (Final)1
2/34
Steganography
8/4/2019 Steganography (Final)1
3/34
INTRODUCTION
Stegosaurus: a covered lizard(but not a type of cryptography)
Greek Words:STEGANOSCovered
GRAPHIEWriting
Steganography is the art and science
of writing hidden messages in such a
way that no one apart from the
intended recipient knows of the
existence of the message.
This can be achieve by concealing the
existence ofinformation withinseemingly harmless carriers or cover
Carrier: text, image, video, audio, etc.
8/4/2019 Steganography (Final)1
4/34
DIAGRAM REPRESENTATION
8/4/2019 Steganography (Final)1
5/34
PROBLEM DOMAIN
In today's scenario there is a huge need of efficient
data security. Thus there is a huge responsibility for
protecting and hosting the vast majority
of the data. More than 30% of the information created
today from patient care records to personal financialinformation, already requires high standard
of protection.
A malicious program or a hacker may corrupt the data
in order to make it unrecoverable or unusual.Similarly , encrypted operating systems can be
corrupted by a malicious program or a hacker, making
the system unusable.
8/4/2019 Steganography (Final)1
6/34
In recent years there have been numerous report
of confidential data such as customer's personal
records being exposed through loss or theft of
laptops or backup drives. Encrypting such files
at rest helps protect them should physical
security measures fail.
Du to the above situation there is a strong need
of a highly secure data transmission system.
8/4/2019 Steganography (Final)1
7/34
SOLUTION DOMAIN
The stated problems can be resolved by changing the
form of data or changing the medium information with
encrypting or hiding data while transferring.
The data can be sent by hiding it in an image or
audio/video visuals. The advantage of steganography,over cryptography alone , is that msgs do not attract
attention to themselves
8/4/2019 Steganography (Final)1
8/34
Plainly visible msgs - no matter how unbreakable -
will arouse suspicion,
and may in themselves be incriminating in countries
where encryption is illegal.
Thus our project would be n efficient & secure way totransfer confidential data. There are a wide variety of
mediums available for hiding the data
i.e. images, audio and video files.
8/4/2019 Steganography (Final)1
9/34
FORMS
The Steganography Software have following Forms :-
LOGIN FORMOPTION FORM
DATA FORM
DATA HIDING FORM
DATA RETRIEVAL FORM
8/4/2019 Steganography (Final)1
10/34
LOGIN FORM
8/4/2019 Steganography (Final)1
11/34
OPTION FORM
8/4/2019 Steganography (Final)1
12/34
DATA FORM
8/4/2019 Steganography (Final)1
13/34
DATA HIDING FORM
8/4/2019 Steganography (Final)1
14/34
DECRYPTION FORM
8/4/2019 Steganography (Final)1
15/34
TECHNOLOGY USED
FRONTEND
Java is a programming language originally
developed by James Gosling at Sun Microsystems
and released in 1995 as a core component of Sun
Microsystems' Java platform. The language derives
much of its syntax from C and C++ but has a
simpler object model and fewer low-level facilities.
Java applications are typically compiled to bytecode(class file) that can run on any Java Virtual Machine
(JVM) regardless of computer architecture.
HARDWARE SOFTWARE
8/4/2019 Steganography (Final)1
16/34
HARDWARE,SOFTWAREREQUIREMENT
Apart from the recommended configuration no other specific
hardware is required to run the
software.
Recommended:Processor Intel Core2duoProcessor Speed 1.2 GHz
RAM 2 GBHard Disk 250 GB
HARDWARE INTERFACE :-
8/4/2019 Steganography (Final)1
17/34
The JRE is required to run the software.
The JRE version should be 1.5 or higher.
The other software required is the Windows media
player to play the video,audio files.
The image viewer is required to view image file
SOFTWARE INTERFACE :-
8/4/2019 Steganography (Final)1
18/34
ARCHITECTURE
1-Tier Architecture:-
1-Tier Architecture is the simplest, single
tier on single user, and is the equivalent of running an
application on a personal computer. All the requiredcomponent to run the application are located within it.
User interface, business logic, and data storage are all
located on the same machine. They are the easiest to
design, but the least scalable. Because they are not part ofa network, they are useless for designing web
applications. The final application tier is the data tier.
8/4/2019 Steganography (Final)1
19/34
MODEL USED
INCREMENTAL MODEL:
The incrementalbuild model is a method of software
development where the model is designed, implemented
and tested incrementally (a little more is added each time)
until the product is finished. It involves both development
and maintenance. The product is defined as finished when it
satisfies all of its requirements. This model combines the
elements of the waterfall model with the iterative
philosophy of prototyping.
8/4/2019 Steganography (Final)1
20/34
STEPS
BLOCK DIAGRAM OF
8/4/2019 Steganography (Final)1
21/34
BLOCK DIAGRAM OFINCREMENTAL MODEL
8/4/2019 Steganography (Final)1
22/34
UML DIAGRAMS
In software engineering, a use case diagram in the Unified
Modeling Language (UML) is a type of behavioral diagram
defined by and created from a Use-case analysis. Its purposeis to present a graphical overview of the functionality
provided by a system in terms of actors, their goals
(represented as use cases), and any dependencies between
those use cases.The main purpose of a use case diagram is to show what
system functions are performed for which actor. Roles of the
actors in the system can be depicted.
USE CASE DIAGRAM :-
8/4/2019 Steganography (Final)1
23/34
Actor :-
An actor defines the system boundary. It is always outside
the system being modeled. An actor is a person, a system or
some external entity linked to one or more system use cases.
An actor is a non-overlapping logical grouping of use cases.The actor is the source of the incoming event that is the first
line in the use case. It is always outside the system being
defined. An actor is a role defined by the set of use cases
with which it is associated. The actor that starts the use caseis the primary actor for that use case.
ACTOR
8/4/2019 Steganography (Final)1
24/34
Hide file
Retriew file
user
USE CASE DIAGRAM
8/4/2019 Steganography (Final)1
25/34
SEQUENCE DIAGRAM
A sequence diagram in Unified Modeling Language
(UML) is a kind of interaction diagram that shows how
processes operate with one another and in what order. It is a
construct of a Message Sequence Chart.Sequence diagrams are sometimes called Event-trace
diagrams, event scenarios, and timing diagram.
A sequence diagram shows, as parallel vertical lines
("lifelines"), different processes or objects that livesimultaneously, and, as horizontal arrows, the messages
exchanged between them, in the order in which they occur.
This allows the specification of simple runtime scenarios in
a graphical manner.
SEQUENCE DIAGRAM
8/4/2019 Steganography (Final)1
26/34
: user: user
select dataselect data select carrier
file
select carrier
file
insert keyinsert key carrier file with
hidden message
carrier file with
hidden messagestorage mediastorage media
key not inserted
select data to be hidden
select carrier file
insert key
hide data
store data
SEQUENCE DIAGRAM(HIDING DATA)
SEQUENCE DIAGRAM
8/4/2019 Steganography (Final)1
27/34
: user: user
select carrier file with
hidden message
select carrier file with
hidden message
insert keyinsert key reveal datareveal data storage mediastorage media
wrong key inserted(reinsert)
select data to be hidden
insert key
original data revealed
store file
SEQUENCE DIAGRAM(RETRIEVE DATA)
8/4/2019 Steganography (Final)1
28/34
Activity Diagram Description:Activity diagrams are typically used for
business process modeling, for modeling the logic captured by a
single use case or usage scenario, or for modeling the detailed logic ofabusiness rule. Although UML activity diagrams could potentially
model the internal logic of a complex operation it would be far better to
simply rewrite the operation so that it is simple enough that you dont
require an activity diagram. In many ways UML activity diagrams are the
object-oriented equivalent offlow charts and data flow diagrams
(DFDs) from structured development.
ACTIVITY DIAGRAM
http://www.agilemodeling.com/artifacts/systemUseCase.htmhttp://www.agilemodeling.com/artifacts/businessRule.htmhttp://www.agilemodeling.com/artifacts/flowChart.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/dataFlowDiagram.htmhttp://www.agilemodeling.com/artifacts/flowChart.htmhttp://www.agilemodeling.com/artifacts/businessRule.htmhttp://www.agilemodeling.com/artifacts/systemUseCase.htmhttp://www.agilemodeling.com/artifacts/systemUseCase.htm8/4/2019 Steganography (Final)1
29/34
select carrier file with
hidden message
insert key
reveal data
revealed data
save file
login incorrect
id/password
enter correctid/password
start
ACTIVITY DIAGRAM(HIDING DATA)
ACTIVITY DIAGRAM
8/4/2019 Steganography (Final)1
30/34
start
select
image
select
song select
video
hide data
carrier file with hidden data
select file/data to
be hidden
insert key
save file
login incorrect
enter correct
id/password
ACTIVITY DIAGRAM(RETRIEVE DATA)
LIMITATION AND
8/4/2019 Steganography (Final)1
31/34
LIMITATION ANDCONCLUSION
Limitation with the size of object being used to hide
the data.
In order for steganography to be useful the message
should be hidden without any major changes to theobject it is being embedded in.
LIMITATION:
8/4/2019 Steganography (Final)1
32/34
Steganography is a really interesting subject and outside
of the mainstream cryptography and system
administration that most of us deal with day after day.
Steganography has its place in security. It is notintended to replace cryptography but supplement it.
Hiding a message with steganography methods reduces
the chance of a message being detected. However, if
that message is also encrypted, if discovered, it must
also be cracked (yet another layer of protection).
CONCLUSION:
REFERENCES AND
8/4/2019 Steganography (Final)1
33/34
REFERENCES ANDBIBLIOGRAPHY
en.wikipedia.org/wiki/Steganography
www.garykessler.net/library/steganography.htmlwww.steganography.org
http://mozaiq.org/
ONLINE DOCUMENTATION :-
http://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.htmlhttp://www.steganography.org/http://www.steganography.org/http://www.steganography.org/http://mozaiq.org/http://mozaiq.org/http://www.steganography.org/http://www.steganography.org/http://www.steganography.org/http://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.htmlhttp://www.garykessler.net/library/steganography.html8/4/2019 Steganography (Final)1
34/34
ANY QUERY?
THANK YOU ALL