8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 1/12
SECURE TRANSMISSION
THROUGH
STEGENOGRAPHY
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 2/12
What is STEGENOGRAPHY?
• The word “Steganography” can be defined as covered writing.
• It is derived from a Greek word
STEGANOS –
“Covered”
GRAPHIE – “Writing” • The goal of Steganography is to hide messages inside other
harmless messages.
• In a way that does not allow any enemy to even detect that
there is a second secret message present.
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 3/12
A graphical
example:
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 4/12
Cryptography
• It is a commonly used technique to protect the secretmessages during transmission.
• Using the classic Cryptography, the encrypted messagebecomes clutter data.
•
That cannot pass the checkpoint on the network.• Most commonly used cryptography algorithms include IDEA,
RSA, DES, BLOWFISH etc.
• It just Scrambles the data to prevent eavesdroppersunderstanding the content.
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 5/12
This is how an encrypted file looks like
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 6/12
Why STEGANOGRAPHY?
• We can make use of Steganography to overcome the
difficulties faced when utilizing Cryptography, like :
• The data received by the hackers is encrypted which also is an
indication that there is confidential data.
• Getting rid of the clutter data.
• Free Flow of the data in the network.
• Steganography provides another layer of protection on the
secret message.
• Which will be embedded in another media such that the
transmitted data will be meaningful and innocuous to
everyone.
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 7/12
Proposed System
• The system to automate security by providing a concept of
hiding the data in other containers and transferring the
container.
• As hackers can have different intentions where in some of
them may be interested in the data the others may be
interested to damaged the data.
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 8/12
Module Description
This project contains six modules. They are:
• CRC Generation
• Compression
•Embedding
• De-embedding
• De-compression
• CRC verification
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 9/12
CRC Generation
• This module is used to generate the checksum value for the
selected file which is to be transmitted over the network. Thechecksum value is appended to the file.
Compression
• This module is used to reduce the size of the file which is to
be transmitted over the network.
• This project uses GZIPOutputStream class of java.util.zip
package to compress the file.
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 10/12
Embedding
• This module is used to append the compressed data to a
container file (image, audio, and video). This project uses
Append Binary method to append the data.
De Embedding
• This module is used to extract the compressed data from the
container file.
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 11/12
De Compression
• This module is used to extract the compressed data to get the
plain text. This mechanism is achieved using GZIPInputStreamclass of java.util.zip package.
CRC Verification
• This is used to check whether the file is corrupted or not at
the receiving side. The checksum value obtained here is cross
checked with the value appended at the time of CRC
Generation. Both the values need to be same results the file is
not corrupted.
8/4/2019 Secure Transmission Through Stegenography Coll
http://slidepdf.com/reader/full/secure-transmission-through-stegenography-coll 12/12
Thank You
Top Related