Professional Documents
Culture Documents
Introduction
1.1 Introduction
The key concepts on which the following project is based are anti-plagiarism
and Steganography.
Plagiarism is the "use or close imitation of the language and thoughts of
another author and the representation of them as one's own original work."
Plagiarism is not copyright infringement. While both terms may apply to a
particular act, they are different transgressions. Copyright infringement is a
violation of the rights of a copyright holder, when material protected by
copyright is used without consent. On the other hand, plagiarism is
concerned with the unearned increment to the plagiarizing author's
reputation that is achieved through false claims of authorship.
Steganography is the art of communicating a message by embedding into
multimedia data. The purpose is to send maximum hidden information while
preserving security against detection by an unauthorized person. A
Steganography system is perfectly secure when the statistics of the ‘cover
data’ (multimedia file) and ‘stegodata’ (encrypted message) are identical.
Experimental results with existing technology gave small video distortions
after hiding some information. The proposed system is aimed without losing
quality and size.
1.2 Previous Related Work
The first recorded uses of stegnography can be traced back to 440 BC when
Herodotus mentions two examples of stegnography in The Histories of
Herodotus. Demaratus sent a warning about a forthcoming attack to Greece
by writing it directly on the wooden backing of a wax tablet before applying
its beeswax surface. Wax tablets were in common use then as reusable
writing surfaces, sometimes used for shorthand. Another ancient example is
that of Histiaeus, who shaved the head of his most trusted slave and tattooed
a message on it. After his hair had grown the message was hidden. The
purpose was to instigate a revolt against the Persians.
A ready video can be broken into subsequent frames and then the key is
hidden behind each frame. Then the frames are then re-combined to form
a video.
This key is unique for each copy that is created and distributed. Once the
hiding of key behind each frame is done, the frames are converted into a
movie. It also maintains a record of the keys and the owners who bought the
CD with the corresponding key on it. It maintains a record of who (customer
name) bought the CD and the corresponding unique key associated or hidden
in it. This record helps in tracing the source of piracy.
Conclusion
F5 Algorithm
Design of Algorithm
Discrete F5
Cosine Embedding Inverse
Quantization Permutation Permutation
Transform function
Bitmap Quality
Message Huffma
Carrier n
Encoder
Steganogram
(JPEG)
The F5 steganographic algorithm was introduced by German researchers
Pfitzmann and Westfeld in 2001. The goal of their research was to develop
concepts and a practical embedding method for JPEG images that would
provide high steganographic capacity without sacrificing security. Guided by
their χ2 attack, they challenged the paradigm of replacing bits of information
in the cover-image with the secret message while proposing a different
paradigm of incrementing image components to embed message bits.
• Start
• Accept an mpeg file as an input for encrypting purpose.
• Divide the movie into frames.
• Generate the key using the key generator.
• Save it in a file
• With the help of Steganography algorithm insert a compact disk [CD]
key behind the frames.
• After the inserting the key behind the frames, re-group the frames to
form the movie again.
• This movie is given as the output.
• Accept this movie as the input for decrypting purpose.
• Again divide the movie into frames.
• With the help of the Steganography algorithm derive the hidden key
from the frames.
• Stop.
2. Literature Survey
Introduction
In colloquial use, the term "code" is often used to mean any method of
encryption or concealment of meaning. However, in cryptography, code has
a more specific meaning. It means the replacement of a unit of plaintext (i.e.,
a meaningful word or phrase) with a code word (for example, apple pie
replaces attack at dawn). Codes are no longer used in serious cryptography
—except incidentally for such things as unit designations (e.g., Bronco
Flight or Operation Overlord) —- since properly chosen ciphers are both
more practical and more secure than even the best codes and also are better
adapted to computers.
Literature Domain
Encryption is the process of converting normal data or plaintext to
something incomprehensible or cipher-text by applying mathematical
transformations. These transformations are known as encryption algorithms
and require an encryption key. Decryption is the reverse process of getting
back the original data from the cipher-text using a decryption key. The
encryption key and the decryption key could be the same as in symmetric or
secret key cryptography, or different as in asymmetric or public key
cryptography.
Algorithms
A number of encryption algorithms have been developed over time for both
symmetric and asymmetric cryptography. The ones supported by the default
providers in J2SE v1.4 are: DES, TripleDES, Blowfish,
PBEWithMD5AndDES, and PBEWithMD5AndTripleDES. Note that these
are all symmetric algorithms.
DES keys are 64 bits in length, of which only 56 are effectively available as
one bit per byte is used for parity. This makes DES encryption quite
vulnerable to brute force attack. TripleDES, an algorithm derived from DES,
uses 128-bit keys (112 effective bits) and is considered much more secure.
Blowfish, another symmetric key encryption algorithm, could use any key
with size up to 448 bits, although 128-bit keys are used most often. Blowfish
is faster than TripleDES but has a slow key setup time, meaning the overall
speed may be less if many different keys are used for small segments of data.
Algorithms PBEWithMD5AndDES and PBEWithMD5AndTripleDES take
a password string as the key and use the algorithm specified in PKCS#5
standard.
Program Language Features
The project is implemented using JAVA as front end.
Introduction to Java
The java language was developed by sun Microsystems in 1992.sun begin a
project to run TV&VCR sets, interactive TV and VCR .in 1991, a group of
Sun Engineers, led by Patrick Naught on and Sun fellow James Gosling
wanted to design a small language which could be for interactive consumer
devices. In September 1992, the James Gosling office. However, since there
was already a language name “Oak” existing, Sun named it Java. It is a
trademark of Sun Microsystems.
Sun released the first version of java in early 1996. Java 1.3 a couple of
months followed it later. In 1998,Sun Microsystems released the latter
version as Java 1.3,which replaces the early toy-like GUI and graphics
toolkits with sophisticated and scalable versions that come closer to the
promise of “Write once, Run anywhere!” then their predecessors.
Features
Java is one of the easiest programming languages in the
world now.
Java is Object Oriented Language.
Java is portable and architecturally neutral.
Java is Distributed Language.
Java provides high security
Java is robust
Java is a Multithread Langua
3. System Design
Introduction
The design phase is the one, where the technical problems are really
solved that makes the project a reality. In this phase the relationship of
the code, database, user interface, and classes begin to take shape in
the minds of the project team.
ENCRYPTING
USER
DECRYPTING
Form Design
Main Form
×
FILE OPTIONS
VIDEO SECURITY
Select Options Screen
Generate Key
Embedding
Generate Key
Generate Key
Close
SELECT OPTIONS
ENCRYPTING DECRYPTING
ENTER KEY
EXTRACT KEY
ENCRYPTING DECRYPTING
user
Enter key
EXTRACT KEY
HARDWARE CONFIGURATION:
PROCESSOR : PENTIUM IV
HARD DISK CAPACITY : 40 GB
INTERNAL MEMORY CAPACITY : 128 MB
SOFTWARE CONFIGURATION:
The system is highly scalable and user friendly. Almost all the system
objectives have been met. The system has been tested under all criteria. The
system minimizes the problem arising in the existing manual system and it
eliminates the human errors to zero level.
All phases of development were conceived using methodologies. The
software executes successfully by fulfilling the objectives of the project.
Further extensions to this system can be made required with minor
modifications.
Module Description
Brief Description
1. Main Module
This module provides the user interface to start the project
It is a frame with menu bar with menus for selecting options
and exiting from the software
2. Select Options
This module provides with two options
Generate Key
Embedding
3. Generate Key
This module is used to generate the key. The key is displayed in
a textbox and saved in a file (“key.txt”)
4. Embedding
This module provides the user interface for selecting the video
file and dividing it into frames and hiding key inside the
frame .Also a retrieve button is added to extract data from the
video.
4 Future Work
The project hides the key behind the frames and the the key is extracted
5. References
Books
[1] Patrick Naughton, Herbert Schildt, “Java™ 2: The Complete Reference”,
Third Edition, Tata McGraw-Hill Publishing Company Limited.
[2] David Flanagan, “Java in a Nutshell”, 2nd Edition, May 1997
[3] Dietel & Deitel, Java How to Program, BPB Publishers, New Delhi,
2000.
[4] O’reilly, Java Swings, Tata McGraw Hill, Fifth Edition, 2002.
[5] Broukshickle, Thinking in Java, Calgotia Publishers, New Delhi, 2001