Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP

Posts: 2,492
Joined: Mar 2010
22-04-2010, 11:02 AM

.doc   Steganography.doc (Size: 87.5 KB / Downloads: 238)

Steganography is the art and science of communicating in a way which hides the existence of the communication , which is the art of hiding information in ways that prevent the detection of hidden messages . Steganography , derived from Greek , literally means " covered writing " . It includes a vast array of secret communications methods that conceal the message's very existence . These methods include invisible inks , microdots , character arrangement, digital signatures, covert channels , and spread spectrum communications.

Steganography and Cryptography are cousins in the spy craft family. A message in cipher text , for instance , might arouse suspicion on the part of the recipient while an " invisible " message created with Steganography methods will not. In contrast to Cryptography ,where the " enemy " is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a Cryptosystem ,the goal of Steganography is to hide messages inside other " harmless " messages in a way that does not allow any " enemy " to even detect that there is a second secret message present.

Now Steganography is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Steganography in images has truly come of age with the invention of fast ,powerful computers. The most popular technique in image Steganography is Least Significant Bit Insertion . More precisely , as Kuhn puts it :

The goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to detect that there is a second secret message present.

The advantage of Steganography is that it can be used to secretly
transmit messages without the fact of the transmission being discovered .Often, using encryption might identify the sender or receiver as somebody with some-thing to hide . For example ,that picture of your cat could conceal the plans for your company's latest technical innovation. However ,Steganography has a number of disadvantages as well .Unlike encryption ,it generally requires a lot of overhead to hide a relatively few bits of information . However , there are ways around this . Also, once a Steganographic system is discovered , it is rendered useless. This problem, too , can be overcome if the hidden data depends on some sort of key for its insertion and extraction.

The next chapter presents a detailed discription about the what the whole project and implimentation is all about and how it is implemented.

Object oriented analysis is basically concerned with the decomposition of a problem into its component parts and establishing a logical model to describe the system functions. We follow this analysis as for the project and implimentation.
3.1 Object Oriented Analysis ( OOA ) approach consists of the following steps :
1) Understanding the problem :

This is the first step in the analysis process . The problem statement should be refined and redefined in terms of computer system engineering that could suggest a computer based solution . The problem statement should be stated , as far as possible , in a single , grammatically correct sentence . The problem statement provides the basis for drawing the requirements specification of both the user and the software .
Therefore the problem statement is
This project and implimentation attempts to make use of the standard steganographic tool and some modified version of standard encryption algorithm to perform the task of data hiding for the purpose of observing privacy .
3.2 Requirements Specifications :
Once the problem is clearly defined , the next step is to understand what the proposed to do. Based on the user requirements , the specification for the software should be drawn . The developer should state clearly
What outputs are required ?
A set of screens displaying the output of data hiding and retrieval of hidden data .
What inputs are necessary ?
Various interactive inputs that take the user through the different stages encountered during the execution of the application .
What processes are involved to produce these outputs ?

Entering the text , choosing the picture , encoding , decoding
display .

Processor : Pentium.
RAM : 64 MB.
Hard Disk : 2 GB.
Cache : 512 KB.
Monitor : SVGA Color Monitor.
Keyboard : 101 keys.
Mouse : 2 buttons.

A multimedia PC running a windows 98 , 2000 or XP operating system .
3.2.3 TOOLS
3.3 Identification of objects :
Objects can often be identified in terms of the real world objects as well as the abstract objects . Their applications can be best analyzed by using the data flow diagrams.
Design is concerned with the mapping of objects in the problem space into objects in the solution space and creating an overall structure and computational models for the system . This stage normally uses the bottom - up approach to build the structure of the system and the top- down functional decomposition approach to design the class member functions that provides services .
The steganographic process basically involves encoding , decoding and checking if encodable . These are the basic functions of the class codec and the pic codec class . The encryption process is handled by the crypt and objects .The remaining objects are the various dialogs for display and interaction with the user .
3.4 The main aim:
The user should be able to conceal a text message in an image file without any visible alterations to the image as such. I.e. there should not be any noticeable changes to the coloring or the position of the various objects in the image.

3.4.1 Sub: aims:
It is preferred that we use a windows based front end.
The user should be able to pick out the image file he wants to use in the hiding process.

The format of the image files which can be used for the hiding process should be 24-bit bitmap.
User should be able to enter the text message he wants to hide.

User should be able to view the image before and after the hiding process is complete. It is preferable that a new image be created and displayed with the old image which will allow the user to compare the original image with the new one which will help him to decide whether his choice of image file was appropriate or whether he needs a new one.

User should be able to transfer the image freely without any problems. I.e. he should be able to copy the new image file. Send or trade it with others without any special hardware requirements other than the normal communication systems available with a computer.

There should be a encryption process to encrypt the text for better security.
The user must be able to save the image in which the message is hidden in any desired folder.
The user should be able to select and view the picture from which to decode.
When the decode is demanded the encryption key should be demanded and when entered the decrypted text displayed.
He should be able to save the decrypted text message in a file.

The picture inside picture option should have all the above qualities like view both, compare and decide whether to proceed, and also have an option to save the new image where the user chooses.
To retrieve the picture the user must be able to view it, and then retrieve and
save the picture





Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
seminar addict
Super Moderator

Posts: 6,592
Joined: Jul 2011
19-01-2012, 10:06 AM

to get information about the topic steganography project and implimentation full report ,ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: problem statement least significant bit steganography, hardware and software requirement for cryptography and steganography, use case diagrams for a lsb steganography project, problem statement in steganography, use case diagram for steganographic system, software requirements for video steganography, image steganography problem statement,
Popular Searches: functional requirements of steganography in images, activity diagram of steganography project, activity diagram for image steganography, software and hardware requirement for the project mobile phone tracking, cryptography and steganography, dfd diagrams for image steganography project, computer seminar topics prerequisites,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Enhanced Image Steganography Abstract seminar projects maker 0 397 19-09-2013, 03:40 PM
Last Post: seminar projects maker
Last Post: study tips
  Steganography With Region Based on Matching Method Report study tips 0 311 28-06-2013, 03:59 PM
Last Post: study tips
  Steganography implemented in Java science projects buddy 15 15,051 06-05-2013, 09:27 AM
Last Post: study tips
  FPGA Hardware of the LSB Steganography Method pdf study tips 0 538 20-04-2013, 04:10 PM
Last Post: study tips
  A Short Survey on Image Steganography and Steganalysis Techniques pdf study tips 0 407 27-02-2013, 12:50 PM
Last Post: study tips
  Steganography Application pdf study tips 0 373 25-02-2013, 03:18 PM
Last Post: study tips
  Online Voting System Powered By Biometric Security Using Steganography Report study tips 0 445 14-02-2013, 02:22 PM
Last Post: study tips
  Edge Adaptive Image Steganography Based on LSB Matching Revisited pdf study tips 0 384 14-02-2013, 09:39 AM
Last Post: study tips
  Stego Machine – Video Steganography using Modified LSB Algorithm pdf project girl 0 333 23-01-2013, 04:53 PM
Last Post: project girl