Professional Documents
Culture Documents
Introduction:
The system deals with security during transmission of data.
Commonly used technologies are Cryptography. This system deals
with implementing security using Steganography. In this end user
identifies an image which is going to act as the carrier of data. The
data file is also selected and then to achieve greater speed of
transmission the data file and image file are compressed and sent.
Prior to this the data is embedded into the image and then sent.
The image if hacked or interpreted by a third party user will open
up in any image previewed but not displaying the data. This
protects the data from being invisible and hence be secure during
transmission. The user in the receiving end uses another piece of
code to retrieve the data from the image.
STEGANOGRAPHY
Steganography is not actually a method of encrypting messages, but
hiding them within something else to enable them to pass undetected.
Traditionally this was achieved with invisible ink, microfilm or taking the
first letter from each word of a message. This is now achieved by hiding
the message within a graphics or sound file. For instance in a 256greyscale image, if the least significant bit of each byte is replaced with a
bit from the message then the result will be indistinguishable to the
human eye. An eavesdropper will not even realize a message is being
sent. This is not Cryptography however, and although it would fool a
human, a computer would be able to detect this very quickly and
reproduce the original message.
In the case of using this technique of hiding the data with an image file,
the visibility of the image, resolution or clarity is not being affected. The
hidden data can be of length in size. To the Hacker, only the image is
make going to be visible when previewed and not a trace of the hidden
data.
If the image file is opened across a text editor, then also the data is not
going to be visible as the information is stored in an Encryption form,
which is also binary. Hence making it difficult for the enclosure to
differentiate the data to the image file.
Proposed System:
The algorithms present in the existing system was some what
complicated. In Cryptography, the meaning of data has been
changed. So, it makes intention to the hacker to hack or destroy the
data. In our proposed system, we implement a new technology
called Steganography for Network security. It not only change the
meaning of data but also hides the presence of data from the
hackers.
Modules
MODULES DESCRIPTION:
This project contains five modules. They are:
There are many utilities that perform CRC checks on other but
most of these are external programs that are usually run only once,
if at all. The CRC generated by these utilities must be compared to
a value in an external file; if the values match, the program is not
infected.
about 15%. The compressed file will have the same name of the text
file with the .CMP extension. The package simulates the
compression process with the help of progress bar and gives the
detailed report about the compression (i.e., Source file name,
Destination file name, sizes, compression ratios etc.,)
This module deals with identifying the Data and the Image to
embed the data into the Image before it can be transmitted. This is
followed after Compression to increase the rate of transfer of files
between the networks.
The module opens by prompting the user to identify the file that
need to be transmitted across the network. The file is then selected
using the GUI interface provided through JAVA. The module then
prompts to identify the Image File, which needs to hide the data file.
The developed system will provide support to select and embed data
into .bmp & .jpeg files. The selected Image File is then previewed
before it can hide the data. The data is then Embedded into the
Image File in such a way that the Image File is not corrupted; at the
same time the data is secure. The image if hacked or interrupted by
a third party can be viewed in any browser without actually
displaying the data. The data on the receivers end is isolated and
removed from the image.0.his is the final module, which consists of
integration of Visual cryptography implementation module into
interface design using applet viewer. Then we need to test with
various images and formation of transparencies. The transparencies
should be able to save and load into the user interface.
Software Requirements:
Front end:
Back end:
Browser:
Operating System:
Window XP (Minimum).
Hardware Requirements:
CPU:
Pentium 4.
RAM:
256 MB.
Space on HD:
5 MB.
Display:
CRT, LCD.