You are on page 1of 4

1.

Statement of the problem


SECURING DATA TRANSMISSION IN NETWORKS
THROUGH DIGITAL IMAGE CRYPTOSYSTEM WITH
ADAPTIVE STEGANOGRAPHY

SECURING DATA TRANSMISSION IN NETWORKS


THROUGH ADAPTIVE STEGANOGRAPHY TECHNIQUE.
The problem of data hiding has been attacked from two directions. The
first approach tries to overcome the Targeted Steganalytic Attacks
The second approach aims at resisting Blind Steganalytic Attacks
especially the Calibration based Blind Attacks which try to estimate a
model of the cover image from the stego image
. Comparison results show that the proposed algorithm can successfully
resist the calibration based blind attacks and some non-calibration based
attacks as well.

Why choice of topic and problem


The vast collection of computer networks has formed and act
as a single huge network for transport of data and messages
across distances which can be anywhere from the same
office to anywhere in the world.
By design, the Internet is an open network which facilitates
the flow of information between computers. Technologies are
available so the Internet may be used for secure electronic
commerce transactions, but failure to review and address
the inherent risk factors increases the likelihood of system or
data compromise.

Network security consists of the policies adopted to


prevent and monitor authorized access, misuse,
modification, or denial of a computer network and networkaccessible resources. Network security involves the
authorization of access to data in a network, which is
controlled by the network administrator. Users choose or are
assigned an ID and password or other authenticating
information that allows them access to information and
programs within their authority
1. Purpose and Objective
Purpose
Secure data transfer in networks by ensuringBasic
fundamentals of securirity
Communicating parties can identify each other
(authentication).
Unintended parties cannot read information exchanged
between parties (confidentiality).
Unauthorized parties cannot alter data (integrity).
Participating parties cannot repudiate transactions
(accountability).
Objective
a) To produce security tool based on stenographic techniques.
b) To explore techniques of hiding data using steganography

2. How you propose to solve the problem


Secure data transmission or information hiding system is to
be developed to provide confidentiality security service
through steganography. Steganography replaces unneeded
bits in image and sound files with secret data. And it's

undetectable under traditional traffic-pattern analysis. The


important messages we can send in an image file as a
carrier to hide a message and focuses on least significant bit
as one of the steganography technique, it does not reveal
the any difference in attributes like size, content etc. from
that of the original file. It is difficult find for someone to find
out that this image contains a message.
Combine Cryptography and steganography to come up a
datahiding technique
If the hacker wants to extract the embedded message in
image file he must and should the following algorithms:
a) Algorithm to extract the message from the image
(Stego_algorithm)
b) Encryption algorithm,
c) Correct password for algorithm
d) Message process algorithm for check integrity of
message.
This is useful in a security and sensitive conditions to send
message to the destination. With these increased levels of
protection using encryption algorithm, making the proposed
system for steganography is stronger from attacks.
3. Expected project outcome and their potential impacts
A stenographic system that is able to conceal data making it
secure to send sensitive data via the internet. This will help

secure data making it safer to use networks for


communication of sensitive data.

You might also like