Synopsis: B.Tech
Synopsis: B.Tech
ON
B.TECH
In
COMPUTER SCIENCE AND ENGINEERING
Submitted By
ParulKantharia 1216410832
Assisstant Professor
CSE Dept
October-2015
Synopsis
Title: USING VARIOUS CRYPTOGRAPHY
Problem Specification :
The problem is to hide a message in image so that it can be transferred over a network
without loosing its integrity and confidentiality, The content of the message is made to hide
inside an image in such a way that it become unintelligent for the third party. After Unhiding
the hidden text the orginal text should be recovered without any loss of information or
values.
Introduction
One of the reasons that intruders can be successful is the most of the information they acquire
from a system is in a form that they can read and comprehend. Intruders may reveal the
information to others, modify it to misrepresent an individual or organization, or use it to
launch an attack. One solution to this problem is, through the use of steganography.
Steganography is a technique of hiding information in digital media. In contrast to
cryptography, it is not to keep others from knowing the hidden information but it is to keep
others from thinking that the information even exists.
Steganography become more important as more people join the cyberspace revolution.
Steganography is the art of concealing information in ways that prevents the detection of
hidden messages. Stegranography include an array of secret communication methods that
hide the message from being seen or discovered.
Due to advances in ICT, most of information is kept electronically. Consequently, the security
of information has become a fundamental issue. Besides cryptography, streganography can be
employed to secure information. In cryptography, the message or encrypted message is
embedded in a digital host before passing it through the network, thus the existence of the
message is unknown. Besides hiding data for confidentiality, this approach of information
hiding can be extended to copyright protection for digital media: audio, video and images.
The growing possibilities of modern communications need the special means of security
especially on computer network. The network security is becoming more important as the
number of data being exchanged on the internet increases. Therefore, the confidentiality and
data integrity are requires to protect against unauthorized access and use. This has resulted in
an explosive growth of the field of information hiding
Using bitmap pictures for hiding secret information is one of most popular choices for
Steganography. Many types of software built for this purpose, some of these software use
password protection to encrypting information on picture. To use these software you must
have a BMP format of a pictures to use it, but using other type of pictures like JPEG,
GIF or any other types is rather or never used, because of algorithm of BMP pictures for
Steganography is simple. Also we know that in the web most popular of image types are
JPEG and other types not BPM, so we should have a solution for this problem.
This software provide the solution of this problem, it can accept any type of image to hide
information file, but finally it give the only BMP image as an output that has hidden file
inside it.
2)Bitmap Steganography:
Bitmap type is the simplest type of picture because that it doesnt have any technology for
decreasing file size. Structure of these files is that a bitmap image created from pixels that
any pixel created from three colors( red, green and blue said RGB) each color of a pixel is
one byte information that shows the density of that color. Merging these three color makes
every color that we see in these pictures. We know that every byte in computer science is
created from 8 bit that first bit is Most-Significant-Bit (MSB) and last bit Least-SignificantBit (LSB), the idea of using Steganography science is in this place; we use LSB bit for
writing our security information inside BMP pictures. So if we just use last layer (8st layar)
of information, we should change the last bit of pixels, in other hands we have 3 bits in each
pixel so we have 3*height*width bits memory to write our information. But before writing
our data we must write name of data(file), size of name of data & size of data. We can do this
by assigning some first bits of memory (8st layer).
Our project is inspired by the research work in which message encryption is presented using
steganographic technique so that it become secure over the network .We will use different
cryptography algorithm to hide the message and when we unhide the message it is received
as in the original form.
Requirements :
Hardware Requirements
1. Processor
2. RAM
: 512 MB or Greater.
Software Requirements
Operating system
: Windows 7
Front End
References
JAVA JDK1.6,Swing
[1] Websites
Following websites are referring to create this project reports.
http://www.google.com
http://www.microsoft.com
http://www.programmer2programmer.net
http://www.codeproject.com