SlideShare a Scribd company logo
1 of 27
STEGANOGRAPHY




SUBMITTED BY:-
REG NO :- 10803554 & 10804870
Group No :-G005CSE490BKD07 (KD07)
ABOUT JAVA:-
 Java is simple programming language because it
  has to work on the electronic devices where less
  memory is available.
 Example : - concepts of pointers used in C or C ++
  has been completely eliminated in java.
 More over it is pure Oops language



   it is secure ,system independent,portable,high
    performance, multi-threaded

   Here JVM plays major role it is heart of entire    2

    java program. Execution process.
3
3-Tier Architecture
WHAT IS STEGANOGRAPHY??
   From the Greek word STEGANOS meaning
    “covered And Greek word GRAPHIE meaning
    “writing”

   Steganography is the branch of science .it is
    used for writing hidden messages in such a way
    that no one can able to read the message only the
    sender and receiver can read.



                                                        5
STEGANOGRAPHY TERMS:
   Carrier File – A file which has hidden
    information inside of it.

   Steganalysis – The process of detecting hidden
    information inside of a file.

   Stego-Medium – The medium in which the
    information is hidden.



                                                     6
ACTIVITY DIAGRAM:




                    7
DFD :




        8
ALGORITHM FOR HIDING MESSAGE
BEHIND IMAGE :-
 Suppose my message is “hello” with the password
  “12345”.
 String p ,m;

 Convert it into the binary form.

 By using the pixel grabber class it take each pixel
  of the image.
 Which we will store in the in the array say a[ ].

 Converting it into binary form it gives 32-bit.

 Then we remove 8-bits which is of sign bit.


                                                        9
ALGORITHM FOR HIDING MESSAGE
BEHIND IMAGE :-
   Then after removing 2-bit more to add the bits of
    password and the message then to know that the
    bits has been finished we take 111111 at the last.

    The for un-hiding the message behind from the
    image we go through for same steps.




                                                         10
WORKING OF ALGORITHM:




                        11
DES (Symmetric Encryption)
ALGORITHM FOR ENCRYPTION:-




                             13
Decryption DES
Data Compression Types
ZIP Algorithm Working

Probabilistic compression methods: Uses bits to represent different character
parameters


Lempel-Ziv-Welch Compression Algorithm: It analyses a file's content,
therefore producing higher compression ratios. LZW works by building a
dictionary of phrases (groups of one or more bytes) from the file. When a new
phrase is found, the compression mechanism checks to see if that phrase is
already in the dictionary. If not, the phrase is added to the dictionary and a token
that identifies the phrase's position in the dictionary is output. If the phrase was
already in the dictionary, then the compression mechanism simply outputs the
token for the existing phrase.

Other Algorithms: Huffman Code & Shannon- Fano Code: Work on the source
symbols probability and arranges them in such a way that their is reduced
redundancy
TYPES OF STEGANOGRAPHY:
   SECRET MESSAGE IS HIDDEN IN
    DIFFERENT FORM..

 Steganography In Images
 Steganography In Audio

 Steganography In Video

 Steganography In Documents




                                  17
STEGANOGRAPHY TOOLS:
 Steganos
 S-Tools (GIF, JPEG)

 StegHide (WAV, BMP)

 Invisible Secrets (JPEG)

 JPHide

 Camouflage

 Hiderman

 Many others…




                             18
Snap Shots Of Code
(Hiding)
Hiding- Message
Un-hide
Encryption (DES)
Decryption (DES)
Compress/Decompress
ADVANTAGES:
   It is used in a way of hiding, not the
    Information but the password to reach that
    Information.

   Basically used in Intelligent Services.

   Can be applied differently in digital image, audio
    & video file.

   It can be done faster with the varying no of
    software's, using different algorithms.
                                                         25
DISADVANTAGES:
   Huge data = huge file size, so some one can
    suspect about it.

   During sending and receiving information can be
    spoofed.

   The confidentiality of information is maintained
    by the algorithms, and if the algorithms are
    known then its all over.

   The software can be misused if it goes in wrongs
    hands ie., people with wrong intentions.           26
CONCLUSION:
   The basic modular aim of the project transpires
    around the security systems of data which are in
    this product of Steganography are obtained by
    hiding and encrypting the data to be transferred.
    The data encryption involves around the making
    the data unintelligible in order to fool the
    intruder in case the hidden image fails to hide
    the data. The keys working with the encryption
    are the basis of secrecy.


                                                        27

More Related Content

What's hot

Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar reportTejas_srinivas
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Steganography
SteganographySteganography
SteganographyPREMKUMAR
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Edureka!
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Steganography
SteganographySteganography
SteganographySonam M
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 

What's hot (20)

Audio Steganography synopsis
Audio Steganography synopsisAudio Steganography synopsis
Audio Steganography synopsis
 
Technical seminar report
Technical seminar reportTechnical seminar report
Technical seminar report
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganoghraphy
 Steganoghraphy Steganoghraphy
Steganoghraphy
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
Steganography Tutorial | How To Hide Text Inside The Image | Cybersecurity Tr...
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 

Viewers also liked

Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and SteganographyPratik Poddar
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and SteganographyPreeti Yadav
 

Viewers also liked (10)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
File000133
File000133File000133
File000133
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Steganography

Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingnandhu_m08
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit DebnathSatyajit Debnath
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java projectTutorial Learners
 

Similar to Steganography (20)

Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Steganography
SteganographySteganography
Steganography
 
Robust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hidingRobust video data hiding using forbidden data hiding
Robust video data hiding using forbidden data hiding
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
H41034449
H41034449H41034449
H41034449
 
Steganograpy
SteganograpySteganograpy
Steganograpy
 
Steganography by Satyajit Debnath
Steganography by Satyajit DebnathSteganography by Satyajit Debnath
Steganography by Satyajit Debnath
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
review.pptx
review.pptxreview.pptx
review.pptx
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Steganography
SteganographySteganography
Steganography
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Stegnography
StegnographyStegnography
Stegnography
 
HACKING
HACKINGHACKING
HACKING
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 

Steganography

  • 1. STEGANOGRAPHY SUBMITTED BY:- REG NO :- 10803554 & 10804870 Group No :-G005CSE490BKD07 (KD07)
  • 2. ABOUT JAVA:-  Java is simple programming language because it has to work on the electronic devices where less memory is available.  Example : - concepts of pointers used in C or C ++ has been completely eliminated in java.  More over it is pure Oops language  it is secure ,system independent,portable,high performance, multi-threaded  Here JVM plays major role it is heart of entire 2 java program. Execution process.
  • 3. 3
  • 5. WHAT IS STEGANOGRAPHY??  From the Greek word STEGANOS meaning “covered And Greek word GRAPHIE meaning “writing”  Steganography is the branch of science .it is used for writing hidden messages in such a way that no one can able to read the message only the sender and receiver can read. 5
  • 6. STEGANOGRAPHY TERMS:  Carrier File – A file which has hidden information inside of it.  Steganalysis – The process of detecting hidden information inside of a file.  Stego-Medium – The medium in which the information is hidden. 6
  • 8. DFD : 8
  • 9. ALGORITHM FOR HIDING MESSAGE BEHIND IMAGE :-  Suppose my message is “hello” with the password “12345”.  String p ,m;  Convert it into the binary form.  By using the pixel grabber class it take each pixel of the image.  Which we will store in the in the array say a[ ].  Converting it into binary form it gives 32-bit.  Then we remove 8-bits which is of sign bit. 9
  • 10. ALGORITHM FOR HIDING MESSAGE BEHIND IMAGE :-  Then after removing 2-bit more to add the bits of password and the message then to know that the bits has been finished we take 111111 at the last.  The for un-hiding the message behind from the image we go through for same steps. 10
  • 16. ZIP Algorithm Working Probabilistic compression methods: Uses bits to represent different character parameters Lempel-Ziv-Welch Compression Algorithm: It analyses a file's content, therefore producing higher compression ratios. LZW works by building a dictionary of phrases (groups of one or more bytes) from the file. When a new phrase is found, the compression mechanism checks to see if that phrase is already in the dictionary. If not, the phrase is added to the dictionary and a token that identifies the phrase's position in the dictionary is output. If the phrase was already in the dictionary, then the compression mechanism simply outputs the token for the existing phrase. Other Algorithms: Huffman Code & Shannon- Fano Code: Work on the source symbols probability and arranges them in such a way that their is reduced redundancy
  • 17. TYPES OF STEGANOGRAPHY:  SECRET MESSAGE IS HIDDEN IN DIFFERENT FORM..  Steganography In Images  Steganography In Audio  Steganography In Video  Steganography In Documents 17
  • 18. STEGANOGRAPHY TOOLS:  Steganos  S-Tools (GIF, JPEG)  StegHide (WAV, BMP)  Invisible Secrets (JPEG)  JPHide  Camouflage  Hiderman  Many others… 18
  • 19. Snap Shots Of Code (Hiding)
  • 25. ADVANTAGES:  It is used in a way of hiding, not the Information but the password to reach that Information.  Basically used in Intelligent Services.  Can be applied differently in digital image, audio & video file.  It can be done faster with the varying no of software's, using different algorithms. 25
  • 26. DISADVANTAGES:  Huge data = huge file size, so some one can suspect about it.  During sending and receiving information can be spoofed.  The confidentiality of information is maintained by the algorithms, and if the algorithms are known then its all over.  The software can be misused if it goes in wrongs hands ie., people with wrong intentions. 26
  • 27. CONCLUSION:  The basic modular aim of the project transpires around the security systems of data which are in this product of Steganography are obtained by hiding and encrypting the data to be transferred. The data encryption involves around the making the data unintelligible in order to fool the intruder in case the hidden image fails to hide the data. The keys working with the encryption are the basis of secrecy. 27