You are on page 1of 11

Synopsis

On

ENCO-DECO STEGNOFY

- THE STEGNOGRAPHY TOOL

Submitted for the requirement of

Project course

BACHELOR OF ENGINEERING

COMPUTER SCIENCE & ENGINEERING

Submitted to Submitted by:


Ms. Ayesha Neeraj Patel (15BCS1677)
Assistant pofessor Aman Kumar (15BCS1678)
Chandigarh University Manmeet Kaur (15BCS1680)

DEPARTMENT OF APPLIED SCIENCE & ENGINEERING


CHANDIGARH UNIVERSITY
GHARUAN, MOHALI, PUNJAB, INDIA-140413
Table of contents

S. no TITLE Page no

1 Introduction 3

2 Software and Hardware Requirements 4

3 Objective 4

4 Functions 5

5 Methodologies 5

6 DFD 6-10

7 References and bibliography 11

2
1. INTRODUCTION-

One of the reasons that intruders can be successful is the most of the information they
acquire from a system is in a form that they can read and comprehend. Intruders may
reveal the information to others, modify it to misrepresent an individual or
organization, or use it to launch an attack. One solution to this problem is, through the
use of steganography. Steganography is a technique of hiding information in digital
media. In contrast to cryptography, it is not to keep others from knowing the hidden
information but it is to keep others from thinking that the information even exists.

Steganography become more important as more people join the cyberspace revolution.
Steganography is the art of concealing information in ways that prevents the detection
of hidden messages. Stegranography include an array of secret communication
methods that hide the message from being seen or discovered.

Due to advances in ICT, most of information is kept electronically. Consequently, the


security of information has become a fundamental issue. Besides cryptography,
streganography can be employed to secure information. In cryptography, the message
or encrypted message is embedded in a digital host before passing it through the
network, thus the existence of the message is unknown. Besides hiding data for
confidentiality, this approach of information hiding can be extended to copyright
protection for digital media: audio, video and images.

The growing possibilities of modern communications need the special means of


security especially on computer network. The network security is becoming more
important as the number of data being exchanged on the internet increases. Therefore,
the confidentiality and data integrity are requires to protect against unauthorized
access and use. This has resulted in an explosive growth of the field of information
hiding.

3
2. HARDWARE & SOFTWARE REQUIREMENTS

HARDWARE REQUIRED:
Processor: Preferably 1.0 GHz or Greater.

RAM : 512 MB or Greater.

Hard disk : 20GB or above

SOFTWARE REQUIRED:
1. JAVA
2. MySql
3. Netbeans IDE

3. OBJECTIVES OF PROJECT
The main objective of the project Enco-Deco Stegnofy is to embed the text message in
cover image/audio file, using the available methods of image/audio Stegnography
methods .The receiver extracts the message from the carrier image/audio file.

MAIN OBJECTIVES ARE:

i) To formulate an algorithm based on data hidden technique in the image/audio


to higher the quantity of hidden data without affecting the quality of
images/audio.

ii) To develop a system based on the algorithm established above.

iii) To collect data and evaluate the accuracy of the algorithm by conducting a
study on a survey for the images before and after hidden data .

iv) To act a new stego-analysis approach on the image/audio to evaluate the new
algorithm.

v) To provide security for official credentials and helps to securily send the data.

4
4. FUNCTIONS:
The user will be asked for image stegnography or audio steganography.
The image stegnography is divided in two parts encoding and decoding.
In encoding image and text will be combined and a image is generated which can be
used.
In decoding image will be decoded in image and text. The message can be read.
The audio stegnography is divided in two parts encoding and decoding.
In encoding audio and text will be combined and a sound file is generated which can be
used.
In decoding sound file will be decoded in sound and text. The message can be read.
The user will be able to send mail through the application.
The encoded image or audio can be decoded in this application only.
The user will be able to convert the message in encrypted format which can not be read
by user.
The user will be able to convert the encrypted message in simple text which can be read
by user.

5. METHODOLOGY:
User needs to run the application. The user has two tab options encrypt and decrypt. If
user select encrypt, application give the screen to select image file, information file and
option to save the image file. If user select decrypt, application gives the screen to select
only image file and ask path where user want to save the secrete file.

This project has two methods Encrypt and Decrypt.

In encryption the secrete information is hiding in with any type of image file.

Decryption is getting the secrete information from image file.

5
6. DATA FLOW DIAGRAM
LEVEL-0

LEVEL-1

6
LEVEL-2(A)

LEVEL-2(B)

7
LEVEL-2(C)

LEVEL-2(D)

8
LEVEL-2(E)

LEVEL-2(F)

9
LEVEL-2(G)

10
7. REFERENCE AND BIBLOGRAPHY
1. iNFOSYSSEC. Cryptography, Encryption and Stenography. [online] . Available at
http://www.infosyssec.org/infosyssec/cry2.htm;.

2. Wikipedia - The Free Encyclopedia. Steganography. [online]. Available at


http://en.wikipedia.org/wiki/Steganography;

3. Wikipedia - The Free Encyclopedia. Stegotext. [online]. Available at


http://en.wikipedia.org/wiki/Stegotext;

4. Plunt. Steganography (hide and seek) Tutorial. [online] Astalavista Group. Available at
http://www.astalavista.com//data/hide_and_seek.txt;

5. Kahn, D. The Codebreakers. The Macmillan Company. New York. 1967.

6. Johnson, N. F., Duric, Z., Jajodia, S. Information Hiding: Steganography and


Watermarking - Attacks and Countermeasures. Kluwer Academic Press. Norwrll, MA,
New York, The Hague, London, 2000.

11

You might also like