You are on page 1of 42

Secured secret message passing through video file

Chapter 1

INTRODUCTION
Internet communication has become an integral part of the Infrastructure of todays world. The information communicated comes in numerous forms and is used in many applications. In a large number of these applications, it is desired that the communication be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases, on down to a large percentage of everyday email. With email, many people wrongly assume that their communication is safe because it is just a small piece of an enormous amount of data being sent worldwide. After all, who is going to see it? But in reality, the Internet is not a secure medium, and there are programs out there which just sit and watch messages go by for interesting information. This project not only deals with a method of encrypting messages, but hiding them something else to enable them to pass undetected. The technique here used is Video Steganography.Video Steganogarphy is a technique to hide any kind of files in any extension into a carrying Video file. This project is the application developed to embed any kind of data (File) in another file, which is called carrier file. The carrier file must be a video file. It is concerned with embedding information in an innocuous cover media in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party; the goal of Steganography is to hide the data from a third party through the use of advanced computer software. The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or GECH, Dept of CS&E 1

Secured secret message passing through video file

anticipated manipulations. Thus it is necessary that the hidden message should be encrypted before Steganography. In the case of using this technique of hiding the data with a video file, the visibility of the video, resolution or clarity is not being affected. The hidden data can be of length in size. To the Hacker, only the video is make going to be visible when previewed and not a trace of the hidden data. If the video file is opened across a text editor, then also the data is not going to be visible as the information is stored in an encryption form, which is also binary. Hence making it difficult for the enclosure to differentiate the data to the video file.

1.1 PROBLEM STATEMENT


The first step in designing a system was to identify the underlying cause behind the problems in the existing system. For this purpose, the information was gathered and checked for the completeness and accuracy of the data. Analyzing the information involved, identification of components of the system and their interrelationship is made. Information is collected from the existing machine. The problem is thoroughly analyzed and a test is done on the technical, social and economic feasibility of developing the proposed system. The data needed to develop the system was collected from all these documents and discussing with the authorities for changes needed to the proposed system. The requirements are drawn on the basis of the needs of the users through an expert and the developers experience on the system.

1.2 OBJECTIVE OF THE PROJECT


The objective of steganography is to hide a secret message within a cover-media in such a way that others cannot discern the presence of the hidden message. Technically in simple words steganography means hiding one piece of data within another. Modern steganography uses the opportunity of hiding information into digital multimedia files and also at the network packet level. Hiding information into a media requires following elements GECH, Dept of CS&E 2

Secured secret message passing through video file The cover media that will hold the hidden data The secret message , may be plain text, cipher text or any type of data The stego function and its inverse An optional stego-key or password may be used to hide and unhide the message.

1.3 ORGANIZATION OF THE REPORT


This report has been organized into eight chapters. In Chapter 1 we have Introduction consisting of Problem statement, and Objective of the Project and Organization of the project. In Chapter 2 we provide Literature survey consisting of Existing System, Proposed System. Chapter 3 gives the information about hardware and software requirements of the system. Chapter 4 provides information about the input and output design, use case diagram, activity diagram, system architecture, algorithms related to the system. Chapter 5 and 6 gives the implementation and testing of the modules and the corresponding algorithms. In Chapter 7 we have the results of the tests conducted in the previous chapter. In Chapter 8 we have the conclusion and future enhancement of our system and then we conclude it with the references.

GECH, Dept of CS&E

Secured secret message passing through video file

Chapter 2

LITERATURE SURVEY
The proposed system should have the following features. The transactions should take place in a secured format between various clients in the network. It provides flexibility to the user to transfer the data through the network very easily. It should also identify the user and provide the communication according to the prescribed level of security with transfer of the file requested and run the required process at the server if necessary. In this system the data will be sending through the network as a video file. The user who received the file will do the operations like de embedding, and decryption in their level of hierarchy etc. Analysis is the process of studying to find the best solution to the problem. System analysis is the process by which we learnt about the existing problems, define objects and requirements and evaluates the solutions. System analysis gives the target for design and development. System analysis is the way of thinking about the organization and the problem it involves, a set of technologies that helps in solving these problems.

2.1 EXISTING SYSTEM


Traditionally this was achieved with invisible ink, microfilm or taking the first letter from each word of a message. This is now achieved by hiding the message within a graphics or sound file. For instance in a 256-greyscale image, if the least significant bit of each byte is replaced with a bit from the message then the result will be indistinguishable to the human eye. An eavesdropper will not even realize a message is being sent. This is not cryptography however, and although it would fool a human, a computer would be able to detect this very quickly and reproduce the original message.

GECH, Dept of CS&E

Secured secret message passing through video file

2.2 PROPOSED SYSTEM


In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an extended classification of digital video encryption algorithms in order to clarify these advantages. We analyze both security and performance aspects of the proposed method, and show that the method is efficient and secure from a cryptographic point of view. Even though the method is currently feasible only for a certain class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability. Finally, we extend our approach into a novel type of digital video steganography where it is possible to disguise a given video with another video.

GECH, Dept of CS&E

Secured secret message passing through video file

Chapter 3

REQUIREMENTS SPECIFICATION
The Software Requirements Specifications is produced at the culmination of the analysis task. The function and performance allocated to software as part of the system engineering are refined by establishing a complete information description as functional representation of system behaviour, an indication of performance requirements and design constraints, appropriate validation criteria.

3.1 SOFTWARE REQUIREMENTS


1. Language: Java Networking 2. Front End Tool: Java J2SDK 1.5, Swing 3. Operating System: Windows XP

3.2 HARDWARE REQUIREMENTS


1. Processor

: Pentium : 128 MB RAM : 20 GB hard Disk : EGA/VGA Color Monitor 600 x 800 Pixels Resolution High Color (16 Bit)

2. Memory Size 3. Hard Disk Drive 5. Display

4. Floppy Disk Drive : 1.44 MB- 3.5Floppy Disk

6. Key Board
7. Mouse

: TVS Keyboard (104 Keys) : Logitech scroll mouse.

8. 32 Bit PCI Ethernet Card. 9. LAN connection

GECH, Dept of CS&E

Secured secret message passing through video file

3.3 FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS


3.3.1 USE CASES DESCRIPTION Use case name Participating actors Flow of events Entry Condition Exit condition Quality Requirements Use case name Participating actors Flow of events Entry Condition Exit condition Quality Requirements Use case name Participating actors Flow of events Entry Condition Exit condition Quality Requirements Embed Sender The user-selected encrypted file will be embedding with selected video file. User must select the one encrypted file and one video file for embedding. Successful or Un Successful Embedding process. Display proper error messages while Embedding two files. Decrypt Receiver The user-selected file will be decrypted with a proper key. User must select the file and must give the key for decryption. Successful or Un Successful Decryption of file. Display proper error messages while Decryption. Encrypt Sender The user-selected file will be encrypted with a given key. User must select the file and must give the key for encryption. Successful or Un Successful Encryption of file. Display proper error messages while Encryption.

GECH, Dept of CS&E

Secured secret message passing through video file Use case name Participating actors Flow of events Entry Condition Exit condition Quality Requirements De-Embed Receiver The user-selected video file will be de-embedding to encrypted file. User must select the video file for de-embedding. Successful or Un Successful De-embedding of file. Display proper error messages while De-embedding.

Use case name Participating actors Flow of events Entry Condition Exit condition Quality Requirements

Send File Sender The user-selected file will be send to the given host. User must select the file to send and must know the IP address of the destination host. Successful or Un Successful sending of file to the destination host. Display proper error messages while Sending the file.

Chapter 4

SYSTEM DESIGN
Design is a creative process, a good design is the key to effective system. The system Design is defined as The process of applying various techniques and principles for the purpose of defining a process or a system in sufficient detail to GECH, Dept of CS&E 8

Secured secret message passing through video file permit its physical realization. Various design features are followed to develop the system. The design specification describes the features of the system, the components or elements of the system and their appearance to end-users. In system design high-end decisions are taken regarding the basic system architecture platforms and tools to be used. The system design transforms a logical representation of what a given system is required to be in to the physical specification. Design starts with the systems requirement specification and converts it into a physical reality during the development. Important design factors such as reliability, response time, throughput of the system; maintainability etc should be taken into account.

4.1 INPUT DESIGN


The input Design is the process of converting the user-oriented inputs in to the computer-based format. The goal of designing input data is to make the automation as easy and free from errors as possible. Providing a good input design for the application easy data input and selection features are adopted. The input design requirements such as user friendliness, consistent format and interactive dialogue for giving the right message and help for the user at right time are also considered for the development of the project. Input design is a part of overall system design which requires very careful attention. Often the collection of input data is the most expensive part of the system, which needs to be route through number of modules. It is the point where the user ready to send the data to the destination machine along with known IP address; if the IP address is unknown then it may prone to error. In input design case there is no chance of corrupting the data has it is one way traffic.

4.2 OUTPUT DESIGN


A quality output is one, which meets the requirements of the end user and presents the information clearly. In any system results of processing are communicated to the users and to other systems through outputs. In the output design it is determined how the information is to be stored in text file. It is most

GECH, Dept of CS&E

Secured secret message passing through video file important and direct source information to the user. Efficient and intelligent output improves the systems relationship with source and destination machine. Outputs from computers are required primarily to get same packet that the user has send instead of corrupted packet. They are also used to provide to permanent copy of these results for later consultation.

4.3 USE CASE DIAGRAM


4.3.1 SENDER
Send File

* Embed *

Sender

Encrypt

Fig 4.3.1: use case diagram (sender)

4.3.2 RECEIVER

GECH, Dept of CS&E

10

Secured secret message passing through video file


De Embed

* *

Receiver
* *

Decrypt

Fig 4.3.2: use case diagram(receiver)

GECH, Dept of CS&E

11

Secured secret message passing through video file

4.4 ACTIVITY DIAGRAM


4.4.1 ACTIVITY DIAGRAM FOR SENDER

Fig 4.4.1: activity diagram (sender)

GECH, Dept of CS&E

12

Secured secret message passing through video file

4.4.2 ACTIVITY DIAGRAM FOR RECEIVER

Fig 4.4.2: activity diagram (receiver)

GECH, Dept of CS&E

13

Secured secret message passing through video file

4.5 SYSTEM ARCHITECTURE

Context Level Diagram SYSTEM ARCHITECTURE

Sender

Input

Video Steganography

Output

Receiver

Fig 4.5: System architecture

4.6 ALGORITHM
The Data Encryption Standard (DES) is a block cipher that uses shared secret key between sender and receiver. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. DES encrypts and decrypts data in 64-bit blocks, using a key. It takes a 64bit block of plaintext as input and outputs a 64-bit block of cipher text. Since it always operates on blocks of equal size and it uses both permutations and substitutions in the algorithm.

GECH, Dept of CS&E

14

Secured secret message passing through video file

Figure: 4.6 DES Block Diagram DES works on 64 bits of data at a time. Each 64 bits of data is iterated on from 1 to 16 times (16 is the DES standard). For each iteration a 48 bit subset of the 56 bit key is fed into the encryption block represented by the dashed rectangle above. Decryption is the inverse of the encryption process. The "F" module shown in the diagram is the heart of DES. It actually consists of several different transforms and non-linear substitutions. Block ciphers where the cipher text is calculated from the plain text by repeated application of the same transformation or round function. In a Feistel cipher, the text being encrypted is split into two halves. The round function, F, is applied to one half using a sub key and the output of F is (exclusive-or-ed (XORed)) with the other half. The two halves are then swapped. Each round follows the same pattern except for the last round where there is often no swap. DES has 16 rounds, meaning the main algorithm is repeated 16 times to produce the cipher text. It has been found that the number of rounds is exponentially proportional to the amount of time required to find a key using a brute-force attack. So as the number of rounds increases, the security of the algorithm increases exponentially.

GECH, Dept of CS&E

15

Secured secret message passing through video file

4.6.1 Working principle of DES


The following notation is necessary for our discussion.

Hexadecimal numbers will be subscripted with h, e.g., 10 = 16. h Bitwise Shifts: The logical shift of x by y bits is denoted by x << y. The logical right shift of x by y bits is denoted by x >> y. Bitwise Rotations: A left rotation of x by y bits is denoted by x <<< y. A right rotation of x by y bits is denoted by x >>> y. Exclusive-OR: The operation of addition of n-tuples over the field (also known as 2F exclusive-or) is denoted by xy. The DES is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. The inputs to the encryption algorithm are a plaintext block and a key K

.The plaintext is P = (Left[0], Right[0]) and the cipher text is C = (Left[64], Right[64]). The plaintext block is split into two halves, Left[0] and Right[0]. Each half is used to encrypt the other half over 16 rounds of processing and then combine to produce the cipher text block. Although the input key for DES is 64 bits long, the actual key used by DES is only 56 bits in length. The least significant (right-most) bit in each byte is a parity bit, and should be set so that there are always an odd number of 1s in every byte. These parity bits are ignored, so only the seven most significant bits of each byte are used, resulting in a key length of 56 bits. Now that we have the 56-bit key, the next step is to use this key to generate 16 sub keys, called K[1]-K[16], which are used in the 16 rounds of DES for encryption and decryption. The procedure for generating the sub keys - known as key scheduling, steps are, 1. Set the round number R to 1. 2. Split the current 56-bit key, K, up into two 28-bit blocks, L (the left-hand half) and R (the right-hand half). 3. Rotate L left by the number of bits, and rotate R left by the same number of bits as well. 4. Join L and R together to get the new K. GECH, Dept of CS&E 16

Secured secret message passing through video file

Fig 4.6.1: Feistel structure of DES

GECH, Dept of CS&E

17

Secured secret message passing through video file

5. Apply Permuted to K to get the final K[R], where R is the round number we are on. 6. Increment R by 1 and repeat the procedure until we have all 16 sub keys K[1]K[16]. Once the key scheduling and plaintext preparation have been completed, the actual encryption or decryption is performed by the main DES algorithm. The 64bit block of input data is first split into two halves, L and R. L is the left-most 32 bits, and R is the right-most 32 bits. The following process is repeated 16 times, making up the 16 rounds of standard DES. We call the 16 sets of halves L[0]L[15] and R[0]-R[15].

GECH, Dept of CS&E

18

Secured secret message passing through video file

Chapter 5

IMPLEMENTATION
5.1 WHY JAVA IS USED?
The main use of Java would be as applets, small Java programs embedded in web pages. Applets offered the benefit of a fully fledged programming language allowing developers to embed just about any functionality. Java is a powerful, portable object oriented (OO) programming language. A program written in Java on a PC can easily find its way into many different computing platforms. This makes Java a popular language for application development. Java programs can do several actions at the same time, called multithreading. A well-written Java program can process data in one thread while waiting for user input in another thread. The JVM provides a secure runtime environment by managing memory, providing isolation between executing components in different namespaces, array bounds checking, etc. The dynamic way in which the JVM allocates the various memory areas (method area, GC heap, thread stacks) means that it is almost impossible for a would-be attacker to determine what memory areas to attempt to insert malicious instructions into. Bounds checking on arrays prevent unreferenced memory accesses.

5.2 MODULES
The system deals with security during transmission of data. Commonly used technologies are cryptography. This system deals with implementing security using Steganography. In this the end user identifies a video, which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and video file are compressed and sent. Prior to this the data is embedded into the video and then sent. The video if hacked or interpreted by a third party user will open up in any video player but not displaying the data. This protects the data from being invisible and hence be

GECH, Dept of CS&E

19

Secured secret message passing through video file secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the video. The Modules of the system are:
1

Steganography Module GUI Module Security Module Server Module

2
3 4

5.2.1 STEGANOGRAPHY MODULE The module deals with identifying the hidden data in the video file. The module receives the video file that is then browsed to remove the associated data. The data is then removed from the video file. Data Embed: This module deals with identifying the data and the image to embed the data into the image before it can be transmitted. This is then followed by compression to increase the rate of transfer of files between the networks. The module opens by prompting the user to identify the file that need to be transmitted across the network. The file is then selected using the GUI interface provided through JAVA. The module then prompts to identify the video file, which needs to house the data file. The developed system will provide support to select and embed data into .mpeg & .dat files. The selected video file is then played before it can house the data. The data is then embedded into the video file in such a way that the video file is not corrupted; at the same time the data is secure. The video if hacked or interrupted by a third party can be played in any browser without actually displaying the data. Data deEmbed: The data on the receivers end is isolated and removed from the video. The module deals with identifying the hidden data in the video. The module receives the video file that is decompressed and decompresses it using JAVA UTILITY PACKAGE. The decompressed file is then played to play the video file. The video file is then browsed to remove the associated data. The data is then removed from the video file.

GECH, Dept of CS&E

20

Secured secret message passing through video file

Classes:
1. EmbedForm: This class is used to create a layout for embedding the word

document within the video file.


initComponents() actionPerformed(java.awt.event.ActionEvent evt) jTextFieldActionPerformed(java.awt.event.ActionEvent evt) jButtonActionPerformed(java.awt.event.ActionEvent evt)

2. DembedForm: This class is used to create a layout for de embedding the word document within the video file. initComponents() actionPerformed(java.awt.event.ActionEvent evt) jTextFieldActionPerformed(java.awt.event.ActionEvent evt) jButtonActionPerformed(java.awt.event.ActionEvent evt) String emb(String s, String s1) demb(String s)

3. EmbProcess

5.2.2 GRAPHICAL USER INTERFACE MODULE This project is developed using graphics in java swings. The options available are displayed in a menu format, like in an online editor. Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed, listing all the options available under that menu item and the user can select the needed actions according to their wish.

Classes:
1. MainForm:

5.2.3 SECURITY MODULE This module is used for the encryption and decryption of the word document which is secretly sent along with the video file. The sender will encrypt the word document file along with the video file. It is sent to the receiver and once the

GECH, Dept of CS&E

21

Secured secret message passing through video file receiver receives the file it decrypts the word document and gets back the original word file.

Classes:
1. EncryptionForm setFont setText setDefaultCloseOperation setTitle setResizable(false); setFont setText setDefaultCloseOperation setTitle setResizable(false);

2. DecryptionForm

5.2.4 SERVER MODULE This module is used for the interaction between the sender and the receiver.

Classes:
1. ReceiverClient 2. ReceiverServer 3. ServerThread

GECH, Dept of CS&E

22

Secured secret message passing through video file

Chapter 6

TESTING
6.1 INTRODUCTION
The process of executing a system with the intent of finding an error is called testing. Testing is defined as the process in which defects are identified, isolated, subjected for rectification and ensured that product is defect free in order to produce the quality product and hence customer satisfaction.

Quality is defined as justification of the requirements. Defect is nothing but deviation from the requirements. Defect is nothing but bug. Testing --- The presence of bugs. Testing can demonstrate the presence of bugs, but not their absence. Debugging and Testing are not the same thing. Testing is a systematic attempt to break a program or the AUT Debugging is the art or method of uncovering why the script /program did not execute properly.

6.2 TESTING METHODOLOGY


1 Black box Testing: is the testing process in which tester can perform testing on an application without having any internal structural knowledge of application. Usually Test Engineers are involved in the black box testing. 2 White box Testing: is the testing process in which tester can perform testing on an application with having internal structural knowledge. Usually The Developers are involved in white box testing.
3

Gray Box Testing: is the process in which the combination of black box and white box tonics are used.

GECH, Dept of CS&E

23

Secured secret message passing through video file

6.3 TEST CASES


T.C.No Description Exp Act Result

Table 6.3: Template for Test Case 6.3.1 GUI Test Cases: Total no of features that need to be check Look & Feel Look for Default values if at all any (date & Time, if at all any require) Look for spell check Description Check for all the 1 features in the screen Check for the 2 alignment of the objects as per the Expected value The screen must contain all the features The alignment should be in proper way Actual value Result

T.C.No

validations Table 6.3.1: Example for GUI Test cases 6.3.2 Negative Test Cases: Must have negative perception. Invalid inputs must be used for test. Description Expected value 1 Input username Login Page Login Page Login Page and password Table 6.3.2: Example for Negative Test cases 6.3.3 Positive Test Cases The positive flow of the functionality must be considered 24 Actual value Result

T.C.No

GECH, Dept of CS&E

Secured secret message passing through video file Valid inputs must be used for testing Must have the positive perception to verify whether the requirements are justified. The positive flow of the functionality must be considered Valid inputs must be used for testing Must have the positive perception to verify whether the requirements are justified. T.C.No 1 Description Input Expected value Redirect Actual value to Redirect Home Page Result to

to Redirect Home Page

UserName and HomePage

Password Table 6.3.3: Example for Positive Test cases

Chapter 7
GECH, Dept of CS&E 25

Secured secret message passing through video file

RESULTS
7.1 HOME PAGE

Fig 7.1: home page To start the project batch file much be executed All the path must be set before executing the batch file After this batch file is run we obtain the above window having various options available

7.2 ENCRYPTION: STEP 1

GECH, Dept of CS&E

26

Secured secret message passing through video file

Fig 7.2: encryption (step 1)

The first step of the project to encrypt the data i.e. the text file This window appear after clicking over the tab option named security then selecting encrypt

After specifying the path of the file to be encrypted we need to specify any key word known to only sender and receiver

After specifying the key word press ok

7.3 ENCRYPTION: STEP 2

GECH, Dept of CS&E

27

Secured secret message passing through video file

Fig 7.3: encryption (step 2) after clicking over ok we obtain the above window this window ask a name for the encrypted file click over save the file will be saved

7.4 ENCRYPTION: STEP 3

GECH, Dept of CS&E

28

Secured secret message passing through video file

Fig 7.4: encryption (step 3) this is the last step of encryption a dialog box pop ups conforming that the file is encrypted and saved as shown in the above screenshot

7.5 EMBEDDING: STEP 1

GECH, Dept of CS&E

29

Secured secret message passing through video file

Fig 7.5: embedding (step 1) now a video file is to be embed along with the encrypted file this window is obtained after clicking over steg utility option provided we need to browse to the encrypted file as well as to the video file click over the embed option

GECH, Dept of CS&E

30

Secured secret message passing through video file

7.6 EMBEDDING: STEP 2

Fig 7.6: embedding (step 2) this window confirms that the embedding process is completed successfully

GECH, Dept of CS&E

31

Secured secret message passing through video file

7.7 SENDING FILE: STEP 1

Fig 7.7: sending file (step 1) after clicking over the send option IP address will be asked of the system connected provide the IP address in the space provided and press ok

GECH, Dept of CS&E

32

Secured secret message passing through video file

7.8 SENDING FILE: STEP 2

Fig 7.8: sending file (step 2) after pressing ok this window will be displayed asking for the file to be send make sure that you have selected the video file which you have embedded press open

GECH, Dept of CS&E

33

Secured secret message passing through video file

7.9 SENDING FILE: STEP 3

Fig 7.9: sending file (step 3) after clicking over open in the last window this window will appear confirming the IP address press yes if correct

GECH, Dept of CS&E

34

Secured secret message passing through video file

7.10 DE-EMBED: STEP 1

Fig 7.10: de-embed (step 1) now from here the work at the receiver side starts this window is obtained after clicking over option steg utility and then deembed you have to specify the path of the received video file it is always stored in one of the project folder named workspace press de-embed

GECH, Dept of CS&E

35

Secured secret message passing through video file

7.11 DE-EMBED: STEP 2

Fig 7.11: de-embed (step 2) this window confirms the completion of de-embedding process press ok to proceed

GECH, Dept of CS&E

36

Secured secret message passing through video file

7.12 DE-ENCRYPTION: STEP 1

Fig 7.12: de-encrypt (step 1) this is the window which is obtained by clicking over option security and then decrypt browse to the encrypted file you will be asked the key word that you have entered will sending the file press ok

GECH, Dept of CS&E

37

Secured secret message passing through video file 7.13 DE-ENCRYPTION: STEP 2

Fig 7.13: de-encrypt (step 2) this window confirms the completion of the decryption process press ok

GECH, Dept of CS&E

38

Secured secret message passing through video file 7.14 HELP TEXT INFORMATION

Fig 7.14: help information This window shows the important help information provided

GECH, Dept of CS&E

39

Secured secret message passing through video file

Chapter 8

CONCLUSION AND FUTURE ENHANCEMENT


Steganography, especially combined with cryptography, is a powerful tool which enables people to communicate without possible eavesdroppers even knowing there is a form of communication. In our project we have successfully transferred a text file embedded with a video file hidden from the third party. It is not possible to develop a system that makes all the requirements of the user. User requirements keep changing as the system is being used. Some of the future enhancements that can be done to this system are: As the technology emerges, it is possible to upgrade the system and can be adaptable to desired environment. Because it is based on object-oriented design, any further changes can be easily adaptable. Based on the future security issues, security can be improved using emerging technologies.

GECH, Dept of CS&E

40

Secured secret message passing through video file

REFERENCES
1) William Stallings, Cryptography and Network Security, Pearson, Fourth Edition. 2) Herbert Shieldict, Java Complete Reference, TATA-McGraw-HILL, Edition. 3) Shabadimath.P.C, Modern Dictionary, Book- Depot, Re-Corrected Edition. 4) Project Management URL: http://www.startwright.com/project.html 5) http://it.toolbLox.com/wiki/index.php/Warehouse_Management 6) http://en.wikipedia.org/wiki/DES 7) http://en.wikipedia.org/wiki/Encrypyion 8) http://en.wikipedia.org/wiki/Steganography 9) Kathy Sierra and Bert Bates, Head First Java, OReilly, 2nd Edition. 10) Project Management URL: http://www.startwright.com/project.htm 11) http://it.toolbLox.com/wiki/index.php/Warehouse_Management 12) Steganography and Steganalysis: Different Approaches by Soumyendu Das 13) Exploring Steganography: Seeing the Unseen by Neil F. Johnson, Sushil Jajodia, George Mason University IEEE Computer, February 1998: 26-34. Available: http://www.jjtc.com/pub/r2026.pdf 7th

GECH, Dept of CS&E

41

Secured secret message passing through video file

GECH, Dept of CS&E

42

You might also like