Professional Documents
Culture Documents
On
ENCO-DECO STEGNOFY
Project course
BACHELOR OF ENGINEERING
S. no TITLE Page no
1 Introduction 3
3 Objective 4
4 Functions 5
5 Methodologies 5
6 DFD 6-10
2
1. INTRODUCTION-
One of the reasons that intruders can be successful is the most of the information they
acquire from a system is in a form that they can read and comprehend. Intruders may
reveal the information to others, modify it to misrepresent an individual or
organization, or use it to launch an attack. One solution to this problem is, through the
use of steganography. Steganography is a technique of hiding information in digital
media. In contrast to cryptography, it is not to keep others from knowing the hidden
information but it is to keep others from thinking that the information even exists.
Steganography become more important as more people join the cyberspace revolution.
Steganography is the art of concealing information in ways that prevents the detection
of hidden messages. Stegranography include an array of secret communication
methods that hide the message from being seen or discovered.
3
2. HARDWARE & SOFTWARE REQUIREMENTS
HARDWARE REQUIRED:
Processor: Preferably 1.0 GHz or Greater.
SOFTWARE REQUIRED:
1. JAVA
2. MySql
3. Netbeans IDE
3. OBJECTIVES OF PROJECT
The main objective of the project Enco-Deco Stegnofy is to embed the text message in
cover image/audio file, using the available methods of image/audio Stegnography
methods .The receiver extracts the message from the carrier image/audio file.
iii) To collect data and evaluate the accuracy of the algorithm by conducting a
study on a survey for the images before and after hidden data .
iv) To act a new stego-analysis approach on the image/audio to evaluate the new
algorithm.
v) To provide security for official credentials and helps to securily send the data.
4
4. FUNCTIONS:
The user will be asked for image stegnography or audio steganography.
The image stegnography is divided in two parts encoding and decoding.
In encoding image and text will be combined and a image is generated which can be
used.
In decoding image will be decoded in image and text. The message can be read.
The audio stegnography is divided in two parts encoding and decoding.
In encoding audio and text will be combined and a sound file is generated which can be
used.
In decoding sound file will be decoded in sound and text. The message can be read.
The user will be able to send mail through the application.
The encoded image or audio can be decoded in this application only.
The user will be able to convert the message in encrypted format which can not be read
by user.
The user will be able to convert the encrypted message in simple text which can be read
by user.
5. METHODOLOGY:
User needs to run the application. The user has two tab options encrypt and decrypt. If
user select encrypt, application give the screen to select image file, information file and
option to save the image file. If user select decrypt, application gives the screen to select
only image file and ask path where user want to save the secrete file.
In encryption the secrete information is hiding in with any type of image file.
5
6. DATA FLOW DIAGRAM
LEVEL-0
LEVEL-1
6
LEVEL-2(A)
LEVEL-2(B)
7
LEVEL-2(C)
LEVEL-2(D)
8
LEVEL-2(E)
LEVEL-2(F)
9
LEVEL-2(G)
10
7. REFERENCE AND BIBLOGRAPHY
1. iNFOSYSSEC. Cryptography, Encryption and Stenography. [online] . Available at
http://www.infosyssec.org/infosyssec/cry2.htm;.
4. Plunt. Steganography (hide and seek) Tutorial. [online] Astalavista Group. Available at
http://www.astalavista.com//data/hide_and_seek.txt;
11