12
SECURE TRANSMISSION THROUGH STEGENOGRAPHY

Secure Transmission Through Stegenography Coll

Embed Size (px)

Citation preview

Page 1: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 1/12

SECURE TRANSMISSION

THROUGH

STEGENOGRAPHY

Page 2: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 2/12

What is STEGENOGRAPHY?

• The word “Steganography” can be defined as covered writing. 

• It is derived from a Greek word

STEGANOS – 

 “Covered” 

GRAPHIE –  “Writing”  • The goal of Steganography is to hide messages inside other

harmless messages.

• In a way that does not allow any enemy to even detect that

there is a second secret message present.

Page 3: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 3/12

A graphical

example:

Page 4: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 4/12

Cryptography

• It is a commonly used technique to protect the secretmessages during transmission.

• Using the classic Cryptography, the encrypted messagebecomes clutter data.

That cannot pass the checkpoint on the network.• Most commonly used cryptography algorithms include IDEA,

RSA, DES, BLOWFISH etc.

• It just Scrambles the data to prevent eavesdroppersunderstanding the content.

Page 5: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 5/12

This is how an encrypted file looks like

Page 6: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 6/12

Why STEGANOGRAPHY?

• We can make use of Steganography to overcome the

difficulties faced when utilizing Cryptography, like :

• The data received by the hackers is encrypted which also is an

indication that there is confidential data.

• Getting rid of the clutter data.

• Free Flow of the data in the network.

• Steganography provides another layer of protection on the

secret message.

• Which will be embedded in another media such that the

transmitted data will be meaningful and innocuous to

everyone.

Page 7: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 7/12

 Proposed System 

• The system to automate security by providing a concept of 

hiding the data in other containers and transferring the

container.

• As hackers can have different intentions where in some of 

them may be interested in the data the others may be

interested to damaged the data.

Page 8: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 8/12

Module Description

This project contains six modules. They are:

• CRC Generation

• Compression

•Embedding

• De-embedding

• De-compression

• CRC verification

Page 9: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 9/12

CRC Generation

• This module is used to generate the checksum value for the

selected file which is to be transmitted over the network. Thechecksum value is appended to the file.

Compression

• This module is used to reduce the size of the file which is to

be transmitted over the network.

• This project uses GZIPOutputStream class of java.util.zip

package to compress the file.

Page 10: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 10/12

Embedding

• This module is used to append the compressed data to a

container file (image, audio, and video). This project uses

Append Binary method to append the data.

De Embedding

• This module is used to extract the compressed data from the

container file.

Page 11: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 11/12

De Compression

• This module is used to extract the compressed data to get the

plain text. This mechanism is achieved using GZIPInputStreamclass of java.util.zip package.

CRC Verification

• This is used to check whether the file is corrupted or not at

the receiving side. The checksum value obtained here is cross

checked with the value appended at the time of CRC

Generation. Both the values need to be same results the file is

not corrupted.

Page 12: Secure Transmission Through Stegenography Coll

8/4/2019 Secure Transmission Through Stegenography Coll

http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 12/12

Thank You