Steganography is a technique for hiding secret messages within other non-secret files like images, audio, or video. It works by embedding messages into the least significant bits of pixel data in an image or by masking digital signatures in portions of audio or video files. The document discusses steganography tools and algorithms for hiding data in images using techniques like LSB insertion and encryption algorithms like DES. It also covers data compression methods like Lempel-Ziv-Welch used for reducing file sizes.
2. ABOUT JAVA:-
Java is simple programming language because it
has to work on the electronic devices where less
memory is available.
Example : - concepts of pointers used in C or C ++
has been completely eliminated in java.
More over it is pure Oops language
it is secure ,system independent,portable,high
performance, multi-threaded
Here JVM plays major role it is heart of entire 2
java program. Execution process.
5. WHAT IS STEGANOGRAPHY??
From the Greek word STEGANOS meaning
“covered And Greek word GRAPHIE meaning
“writing”
Steganography is the branch of science .it is
used for writing hidden messages in such a way
that no one can able to read the message only the
sender and receiver can read.
5
6. STEGANOGRAPHY TERMS:
Carrier File – A file which has hidden
information inside of it.
Steganalysis – The process of detecting hidden
information inside of a file.
Stego-Medium – The medium in which the
information is hidden.
6
9. ALGORITHM FOR HIDING MESSAGE
BEHIND IMAGE :-
Suppose my message is “hello” with the password
“12345”.
String p ,m;
Convert it into the binary form.
By using the pixel grabber class it take each pixel
of the image.
Which we will store in the in the array say a[ ].
Converting it into binary form it gives 32-bit.
Then we remove 8-bits which is of sign bit.
9
10. ALGORITHM FOR HIDING MESSAGE
BEHIND IMAGE :-
Then after removing 2-bit more to add the bits of
password and the message then to know that the
bits has been finished we take 111111 at the last.
The for un-hiding the message behind from the
image we go through for same steps.
10
16. ZIP Algorithm Working
Probabilistic compression methods: Uses bits to represent different character
parameters
Lempel-Ziv-Welch Compression Algorithm: It analyses a file's content,
therefore producing higher compression ratios. LZW works by building a
dictionary of phrases (groups of one or more bytes) from the file. When a new
phrase is found, the compression mechanism checks to see if that phrase is
already in the dictionary. If not, the phrase is added to the dictionary and a token
that identifies the phrase's position in the dictionary is output. If the phrase was
already in the dictionary, then the compression mechanism simply outputs the
token for the existing phrase.
Other Algorithms: Huffman Code & Shannon- Fano Code: Work on the source
symbols probability and arranges them in such a way that their is reduced
redundancy
17. TYPES OF STEGANOGRAPHY:
SECRET MESSAGE IS HIDDEN IN
DIFFERENT FORM..
Steganography In Images
Steganography In Audio
Steganography In Video
Steganography In Documents
17
25. ADVANTAGES:
It is used in a way of hiding, not the
Information but the password to reach that
Information.
Basically used in Intelligent Services.
Can be applied differently in digital image, audio
& video file.
It can be done faster with the varying no of
software's, using different algorithms.
25
26. DISADVANTAGES:
Huge data = huge file size, so some one can
suspect about it.
During sending and receiving information can be
spoofed.
The confidentiality of information is maintained
by the algorithms, and if the algorithms are
known then its all over.
The software can be misused if it goes in wrongs
hands ie., people with wrong intentions. 26
27. CONCLUSION:
The basic modular aim of the project transpires
around the security systems of data which are in
this product of Steganography are obtained by
hiding and encrypting the data to be transferred.
The data encryption involves around the making
the data unintelligible in order to fool the
intruder in case the hidden image fails to hide
the data. The keys working with the encryption
are the basis of secrecy.
27