Sunteți pe pagina 1din 10

Implementation of LSB Steganography Using Image, Audio, and video combination

ABSTRACT:
Steganography is derived from the Greek word steganos which literally means
Covered and graphy means Writing, i.e. covered writing. Steganography refers to the
science of invisible communication. For hiding secret information in various file formats,
there exists a large variety of steganographic techniques some are more complex than others
and all of them have respective strong and weak points. The Least Significant Bit (LSB)
embedding technique suggests that data can be hidden in the least significant bits of the cover
image ,Audio ,Video and the human eye would be unable to notice the hidden in the cover
file. This technique can be used for hiding images in image, Audio , video combination
ORGANIZATION PROFILE
Kbros Web Solutions is an offshore web development and software development
company in India that makes your communication and transaction on the Internet more
effective and useful. We ensure this through appropriate content and suitable Internet tools,
sufficient enough to reach far and wide markets. Our services leverage deep domain expertise
in the Industry, technical expertise in leading Internet technologies and a cost-effective global
solutions delivery model. The services are provided under the aegis of our communications
and e-business practices. We have been extending creative and cost-effective services to the
International markets.

At Kbros can look for an array of web based services and development support, which
may include consultation, software development and maintenance. With an excellent track
record in the global market and our presence in the domestic market is equally laudable.

We are focusing on quality and customer satisfaction. If you are looking for custom
quality solution, we can create it by integrating a team of creative designers; technical
writers, experienced programmers, marketing experts and the top management team who
work along with you to give you desired results. A Kbros Web Solution is a professional
company providing reliable quality solutions using a unique approach to give you an online
success. Services leverage deep domain expertise in the Industry, technical expertise in
leading Internet technologies and a cost-effective global solutions delivery model.



Hardware Specification
. Processor : Pentium IV
. RAM : 256 MB
. CPU Clock : 1.6 GHz
Software Specification
. Front End : JAVA
. Back End : MS-Access
. Platform : Windows XP/7
. Web Server : TOMCAT
SYSTEM STUDY
2.1 FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is put forth
with a very general plan for the project and some cost estimates. During system analysis
the feasibility study of the proposed system is to be carried out. This is to ensure that the
proposed system is not a burden to the company. For feasibility analysis, some
understanding of the major requirements for the system is essential.

Three key considerations involved in the feasibility analysis are

ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY

ECONOMICAL FEASIBILITY

This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research and
development of the system is limited. The expenditures must be justified. Thus the developed
system as well within the budget and this was achieved because most of the technologies
used are freely available. Only the customized products had to be purchased.

TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand on the
available technical resources. This will lead to high demands on the available technical
resources. This will lead to high demands being placed on the client. The developed system
must have a modest requirement, as only minimal or null changes are required for
implementing this system.

SOCIAL FEASIBILITY

The aspect of study is to check the level of acceptance of the system by the user. This
includes the process of training the user to use the system efficiently. The user must not feel
threatened by the system, instead must accept it as a necessity. The level of acceptance by the
users solely depends on the methods that are employed to educate the user about the system
and to make him familiar with it. His level of confidence must be raised so that he is also able
to make some constructive criticism, which is welcomed, as he is the final user of the system.

EXISTING SYSTEM:
Image compression techniques are extensively used in steganography. Among the two types
of image compressions, lossy compression and loss less compression; lossless compression
formats offer more promises. Lossy compression compression may not maintain the original
images integrity. Lossless compression maintains the original image data exactly, hence it is
prefered. Example of Lossy compression format is JPEG format files. Examples of Lossless
compression formats are GIF[3] and BMP formats.
PROPOSED SYSTEM:
The Data Hiding in Audio Files mainly developed to embed or extract the messages
into image, audio,video files. This project basically deals with two important network
security concepts namely steganography and encryption. For encryption AES algorithm is
used. The plaintext is given as input. The plaintext is encrypted using AES algorithm. The
ciphertext is given as output. The output ciphertext is hidden into the audio files using
Seganography. For steganography LSB algorithm is used. The audio file is in the wave
format is the chosen medium to conceal and transmit the secret information. Since the audio
file is in ASCII format, the contents of the text file are also converted to the bit stream. The
encrypted file is now embedded behind the audio file by mixing the contents together using
LSB algorithm. Video hiding will used in the RSA,DES, TRIPLE At the other end, the
encrypted file is separated from audio file. The encrypted file is then decrypted and the
original text file contents are then viewed.
SYSTEM IMPLEMENTATION:
There are two types of Implementation
Implementation of a computer system to replace a manual one.
Implementation of a new computer system to replace an existing one.
AES:

The Advanced Encryption Standard (AES Algorithm) is a computer security standard that
became effective on May 26, 2002 by NIST to replace DES. The cryptography scheme is a
symmetric block cipher that encrypts and decrypts 128-bit blocks of data. Lengths of 128,
192, and 256 bits are standard key lengths used by AES Algorithm. The algorithm consists of
four stages that make up a round which is iterated 10 times for a 128-bit length key, 12 times
for a 192-bit key, and 14 times for a 256-bit key. The first stage "SubBytes" transformation is
a non-linear byte substitution for each byte of the block. The second stage "Shift Rows"
transformation cyclically shifts (permutes) the bytes within the block. The third stage "Mix
Columns" transformation groups 4-bytes together forming 4-term polynomials and multiplies
the polynomials with a fixed polynomial mod (x^4+1). The fourth stage "AddRoundKey"
transformation adds the round key with the block of data. In most ciphers, the iterated
transform (or round) usually has a Feistel Structure. Typically in this structure, some of the
bits of the intermediate state are transposed unchanged to another position (permutation).
AES Algorithm does not have a Feistel structure but is composed of three distinct invertible
transforms based on the Wide Trial Strategy design method. The Wide Trial Strategy design
method provides resistance against linear and differential cryptanalysis. In the Wide Trail
Strategy, every layer has its own function: The linear mixing layer: guarantees high diffusion
over multiply rounds.The non-linear layer: parallel application of S-boxes that have the
optimum worst-case non-linearity properties.
LSB:
Data hiding in the least significant bits (LSBs) of audio samples in the time domain is one of
the simplest algorithms with very high data rate of additional information. The LSB
watermark encoder usually selects a subset of all available host audio samples chosen by a
secret key. The substitution operation on the LSBs is performed on this subset, where the bits
to be hidden substitute the original bit values. Extraction process simply retrieves the
watermark by reading the value of these bits from the audio stego object. Therefore, the
decoder needs all the samples of the stego audio that were used during the embedding
process. The random selection of the samples used for embedding introduces low power
additive white Gaussian noise (AWGN). It is well known from the psychoacoustics literature
[6] that the human auditory system (HAS) is highly sensitive to AWGN. That fact limits the
number of LSB that can be imperceptibly modified during watermark embedding. As the
number of used LSBs during LSB coding increases or, equivalently, depth of the modified
LSB layer becomes larger, perceptual transparency of stego objects is decreased. Therefore,
there is a limit for the depth of the used LSB layer in each sample of host audio that can be
used for data hiding. Subjective listening test showed that, in average, the maximum LSB
depth that can be used for LSB based watermarking without causing noticeable perceptual
distortion is the fourth LSB layer when 16 bits per sample audio sequences are used. The
tests were performed with a large collection of audio samples and individuals with different
background and musical experience. None of the tested audio sequences had perceptual
artifacts when the fourth LSB has been used for data hiding, although in certain music styles,
the limit is even higher than the fourth LSB layer. Robustness of the watermark, embedded
using the LSB coding method, increases with increase of the LSB depth used for data hiding.
Therefore, improvement of watermark robustness obtained by increase of depth of the used
LSB layer is limited by perceptual transparency bound, which is the fourth LSB layer for the
standard LSB coding algorithm.
DES:
This module consists of same as Encryption and Decryption part using DES algorithm. The
Data Encryption Standard (DES) is a block cipher that uses shared secret encryption.
Triple DES:
This module consists of same as Encryption and Decryption part using Triple DES algorithm.
Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA or Triple
DEA) block cipher, which applies the Data Encryption Standard (DES) cipher algorithm
three times to each data block.
RSA:
This module consists of same as Encryption and Decryption part using RSA algorithm. RSA
is the first algorithm known to be suitable for signing as well as encryption, and was one of
the first great advances in public key cryptography. RSA is widely used in electronic
commerce protocols, and is believed to be sufficiently secure given sufficiently long keys and
the use of up-to-date implementations.










SYSTEM REQUIREMENTS:

MODULE:
This project consists of developing two main modules and some sub-modules also. The main
module are one is encryption module and the decryption module. These two modules are the
main core for the application.
MODULES
Input Module :
ENCRYPTION MODULE
DECRYPTION MODULE
DES
Triple DES
RSA
Modules Description:
Input Module:
The Input Module is designed as such a way that the proposed system must be capable of
handling any type of data formats, such as if the user wishes to hide any image format then it
must be compatible with all usual image formats such as jpg, gif, bmp, it must be also
compatible with video formats such as .avi, .flv, .wmf etc.. And also it must be compatible
with various document formats, so that the user can be able to user any formats to hide the
secret data.
Encryption Module:
In Encryption module, it consists of Key file part, where key file can be specified with the
password as a special security in it. Then the user can type the data or else can upload the
data also though the browse button, when it is clicked the open file dialog box is opened and
where the user can select the secret message. Then the user can select the image or video file
through another open file dialog box which is opened when the cover file button is clicked.
Where the user can select the cover file and then the Hide button is clicked so that the secret
data or message is hidden in cover file using Forbidden Zone Data Hiding Technique.
Decryption Module:
This module is the opposite as such as Encryption module where the Key file should be also
specified same as that of encryption part. Then the user should select the encrypted cover file
and then should select the extract button so that the hidden message is displayed in the text
area specified in the application or else it is extracted to the place where the user specifies it.
DES:
This module consists of same as Encryption and Decryption part using DES algorithm. The
Data Encryption Standard (DES) is a block cipher that uses shared secret encryption.
Triple DES:
This module consists of same as Encryption and Decryption part using Triple DES algorithm.
Triple DES is the common name for the Triple Data Encryption Algorithm (TDEA or Triple
DEA) block cipher, which applies the Data Encryption Standard (DES) cipher algorithm
three times to each data block.
RSA:
This module consists of same as Encryption and Decryption part using RSA algorithm. RSA
is the first algorithm known to be suitable for signing as well as encryption, and was one of
the first great advances in public key cryptography. RSA is widely used in electronic
commerce protocols, and is believed to be sufficiently secure given sufficiently long keys and
the use of up-to-date implementations.

















TABLES STRUCTURE
Table Name: Login
Fieldname Data Type Length Key
Username Varchar 20 Primary key
Password Varchar 25 -

Table Name: Registration
Fieldname Data Type Length Key
Name Varchar 20 -
Username Varchar 20 Primary key
Password Varchar 20 -
Secret question Varchar 50 -
Answer Varchar 50 -

Table Name: status
Fieldname Data Type Length Key
files Varchar 15 Primary Key
encryption Varchar 15 -
decryption Varchar 15 -
save Varchar 15 -

S-ar putea să vă placă și