secured secret message passing through video file
TRANSCRIPT
-
8/6/2019 Secured secret message passing through video file
1/42
Secured secret message passing through video file
Chapter 1
INTRODUCTION
Internet communication has become an integral part of the Infrastructure of
todays world. The information communicated comes in numerous forms
and is used in many applications. In a large number of these applications, it
is desired that the communication be done in secrete. Such secret
communication ranges from the obvious cases of bank transfers, corporate
communications, and credit card purchases, on down to a large percentage
of everyday email. With email, many people wrongly assume that their
communication is safe because it is just a small piece of an enormous
amount of data being sent worldwide. After all, who is going to see it? But
in reality, the Internet is not a secure medium, and there are programs out
there which just sit and watch messages go by for interesting information.
This project not only deals with a method of encrypting messages, but
hiding them something else to enable them to pass undetected. The
technique here used is Video Steganography.Video Steganogarphy is a
technique to hide any kind of files in any extension into a carrying Video
file. This project is the application developed to embed any kind of data
(File) in another file, which is called carrier file. The carrier file must be a
video file. It is concerned with embedding information in an innocuous
cover media in a secure and robust manner. This system makes the Files
more secure by using the concepts Steganography and Cryptography.
Steganography, poor cousin of Cryptography is the art of hiding messages
inside other messages such that the very existence of the message is unknown to
third party. The goal of cryptography is to make data unreadable by a third party;
the goal of Steganography is to hide the data from a third party through the use of
advanced computer software.
The cover data should not be significantly degraded by the embedded data,
and the embedded data should be as imperceptible as possible. The embedded datashould be as immune as possible to modifications from intelligent attacks or
GECH, Dept of CS&E 1
-
8/6/2019 Secured secret message passing through video file
2/42
Secured secret message passing through video file
anticipated manipulations. Thus it is necessary that the hidden message should be
encrypted before Steganography.
In the case of using this technique of hiding the data with a video file, thevisibility of the video, resolution or clarity is not being affected. The hidden data
can be of length in size. To the Hacker, only the video is make going to be visible
when previewed and not a trace of the hidden data.
If the video file is opened across a text editor, then also the data is not going
to be visible as the information is stored in an encryption form, which is also
binary. Hence making it difficult for the enclosure to differentiate the data to the
video file.
1.1 PROBLEM STATEMENT
The first step in designing a system was to identify the underlying cause behind
the problems in the existing system. For this purpose, the information was
gathered and checked for the completeness and accuracy of the data. Analyzing
the information involved, identification of components of the system and their
interrelationship is made. Information is collected from the existing machine. The
problem is thoroughly analyzed and a test is done on the technical, social and
economic feasibility of developing the proposed system. The data needed to
develop the system was collected from all these documents and discussing with
the authorities for changes needed to the proposed system. The requirements are
drawn on the basis of the needs of the users through an expert and the developers
experience on the system.
1.2 OBJECTIVE OF THE PROJECTThe objective of steganography is to hide a secret message within a cover-media
in such a way that others cannot discern the presence of the hidden message.
Technically in simple words steganography means hiding one piece of data
within another.
Modern steganography uses the opportunity of hiding information into
digital multimedia files and also at the network packet level.
Hiding information into a media requires following elements
GECH, Dept of CS&E 2
-
8/6/2019 Secured secret message passing through video file
3/42
Secured secret message passing through video file
The cover media that will hold the hidden data
The secret message , may be plain text, cipher text or any type of data
The stego functionand its inverse
An optional stego-key or password may be used to hide and unhide the
message.
1.3 ORGANIZATION OF THE REPORT
This report has been organized into eight chapters. In Chapter 1 we have
Introduction consisting of Problem statement, and Objective of the Project
and Organization of the project. In Chapter 2 we provide Literature surveyconsisting of Existing System, Proposed System. Chapter 3 gives the
information about hardware and software requirements of the system.
Chapter 4 provides information about the input and output design, use case
diagram, activity diagram, system architecture, algorithms related to the
system. Chapter 5 and 6 gives the implementation and testing of the
modules and the corresponding algorithms.
In Chapter 7 we have the results of the tests conducted in the previous
chapter. In Chapter 8 we have the conclusion and future enhancement of our
system and then we conclude it with the references.
GECH, Dept of CS&E 3
-
8/6/2019 Secured secret message passing through video file
4/42
Secured secret message passing through video file
Chapter 2
LITERATURE SURVEY
The proposed system should have the following features. The transactions should
take place in a secured format between various clients in the network. It provides
flexibility to the user to transfer the data through the network very easily. It should
also identify the user and provide the communication according to the prescribed
level of security with transfer of the file requested and run the required process at
the server if necessary. In this system the data will be sending through the network
as a video file. The user who received the file will do the operations like de
embedding, and decryption in their level of hierarchy etc.
Analysis is the process of studying to find the best solution to the problem.
System analysis is the process by which we learnt about the existing problems,
define objects and requirements and evaluates the solutions. System analysis givesthe target for design and development. System analysis is the way of thinking
about the organization and the problem it involves, a set of technologies that helps
in solving these problems.
2.1 EXISTING SYSTEM
Traditionally this was achieved with invisible ink, microfilm or taking the first
letter from each word of a message. This is now achieved by hiding the message
within a graphics or sound file. For instance in a 256-greyscale image, if the least
significant bit of each byte is replaced with a bit from the message then the result
will be indistinguishable to the human eye. An eavesdropper will not even realize
a message is being sent. This is not cryptography however, and although it would
fool a human, a computer would be able to detect this very quickly and reproduce
the original message.
GECH, Dept of CS&E 4
-
8/6/2019 Secured secret message passing through video file
5/42
Secured secret message passing through video file
2.2 PROPOSED SYSTEM
In this work we propose a novel type of digital video encryption that has several
advantages over other currently available digital video encryption schemes.
We also present an extended classification of digital video encryption
algorithms in order to clarify these advantages. We analyze both security and
performance aspects of the proposed method, and show that the method is
efficient and secure from a cryptographic point of view. Even though the method
is currently feasible only for a certain class of video sequences and video codecs,
the method is promising and future investigations might reveal its broader
applicability. Finally, we extend our approach into a novel type of digital video
steganography where it is possible to disguise a given video with another video.
GECH, Dept of CS&E 5
-
8/6/2019 Secured secret message passing through video file
6/42
Secured secret message passing through video file
Chapter 3
REQUIREMENTS SPECIFICATION
The Software Requirements Specifications is produced at the culmination of the
analysis task. The function and performance allocated to software as part of the
system engineering are refined by establishing a complete information description
as functional representation of system behaviour, an indication of performance
requirements and design constraints, appropriate validation criteria.
3.1 SOFTWARE REQUIREMENTS
1. Language: Java Networking
2. Front End Tool: Java J2SDK 1.5, Swing
3. Operating System: Windows XP
3.2 HARDWARE REQUIREMENTS
1. Processor : Pentium
2. Memory Size : 128 MB RAM
3. Hard Disk Drive : 20 GB hard Disk
4. Floppy Disk Drive : 1.44 MB- 3.5Floppy Disk
5. Display : EGA/VGA Color Monitor
600 x 800 Pixels Resolution
High Color (16 Bit)
6. Key Board : TVS Keyboard (104 Keys)
7. Mouse : Logitech scroll mouse.
8. 32 Bit PCI Ethernet Card.
9. LAN connection
GECH, Dept of CS&E 6
-
8/6/2019 Secured secret message passing through video file
7/42
Secured secret message passing through video file
3.3 FUNCTIONAL AND NON FUNCTIONAL
REQUIREMENTS
3.3.1 USE CASES DESCRIPTION
Use case name Encrypt
Participating
actors
Sender
Flow of events The user-selected file will be encrypted with a given key.
Entry
Condition
User must select the file and must give the key for encryption.
Exit condition Successful or Un Successful Encryption of file.
Quality
Requirements
Display proper error messages while Encryption.
Use case name Decrypt
Participating
actors
Receiver
Flow of events The user-selected file will be decrypted with a proper key.
Entry
Condition
User must select the file and must give the key for decryption.
Exit condition Successful or Un Successful Decryption of file.
Quality
Requirements
Display proper error messages while Decryption.
Use case name Embed
Participating
actors
Sender
Flow of events The user-selected encrypted file will be embedding with
selected video file.
Entry Condition User must select the one encrypted file and one video file
for embedding.
Exit condition Successful or Un Successful Embedding process.
Quality
Requirements
Display proper error messages while Embedding two files.
GECH, Dept of CS&E 7
-
8/6/2019 Secured secret message passing through video file
8/42
Secured secret message passing through video file
Use case name De-Embed
Participating
actors
Receiver
Flow of events The user-selected video file will be de-embedding to encrypted
file.
Entry
Condition
User must select the video file for de-embedding.
Exit condition Successful or Un Successful De-embedding of file.
Quality
Requirements
Display proper error messages while De-embedding.
Use case name Send FileParticipating
actors
Sender
Flow of events The user-selected file will be send to the given host.
Entry Condition User must select the file to send and must know the IP
address of the destination host.
Exit condition Successful or Un Successful sending of file to the
destination host.
Quality
Requirements
Display proper error messages while Sending the file.
Chapter 4
SYSTEM DESIGN
Design is a creative process, a good design is the key to effective system. The
system Design is defined as The process of applying various techniques andprinciples for the purpose of defining a process or a system in sufficient detail to
GECH, Dept of CS&E 8
-
8/6/2019 Secured secret message passing through video file
9/42
Secured secret message passing through video file
permit its physical realization. Various design features are followed to develop
the system. The design specification describes the features of the system, the
components or elements of the system and their appearance to end-users.
In system design high-end decisions are taken regarding the basic systemarchitecture platforms and tools to be used. The system design transforms a
logical representation of what a given system is required to be in to the physical
specification. Design starts with the systems requirement specification and
converts it into a physical reality during the development. Important design factors
such as reliability, response time, throughput of the system; maintainability etc
should be taken into account.
4.1 INPUT DESIGN
The input Design is the process of converting the user-oriented inputs in to the
computer-based format. The goal of designing input data is to make the
automation as easy and free from errors as possible. Providing a good input design
for the application easy data input and selection features are adopted.
The input design requirements such as user friendliness, consistent format
and interactive dialogue for giving the right message and help for the user at right
time are also considered for the development of the project.
Input design is a part of overall system design which requires very careful
attention. Often the collection of input data is the most expensive part of the
system, which needs to be route through number of modules. It is the point where
the user ready to send the data to the destination machine along with known IP
address; if the IP address is unknown then it may prone to error. In input design
case there is no chance of corrupting the data has it is one way traffic.
4.2 OUTPUT DESIGN
A quality output is one, which meets the requirements of the end user and
presents the information clearly. In any system results of processing are
communicated to the users and to other systems through outputs. In the output
design it is determined how the information is to be stored in text file. It is most
GECH, Dept of CS&E 9
-
8/6/2019 Secured secret message passing through video file
10/42
Secured secret message passing through video file
important and direct source information to the user. Efficient and intelligent
output improves the systems relationship with source and destination machine.
Outputs from computers are required primarily to get same packet that the
user has send instead of corrupted packet. They are also used to provide topermanent copy of these results for later consultation.
4.3 USE CASE DIAGRAM
4.3.1 SENDER
Sender
Send File
Embed
Encrypt
*
*
**
*
*
Fig 4.3.1: use case diagram (sender)
4.3.2 RECEIVER
GECH, Dept of CS&E 10
-
8/6/2019 Secured secret message passing through video file
11/42
Secured secret message passing through video file
Receiver
De Embed
Decrypt
*
*
*
*
Fig 4.3.2: use case diagram(receiver)
GECH, Dept of CS&E 11
-
8/6/2019 Secured secret message passing through video file
12/42
Secured secret message passing through video file
4.4 ACTIVITY DIAGRAM
4.4.1 ACTIVITY DIAGRAM FOR SENDER
Fig 4.4.1: activity diagram (sender)
GECH, Dept of CS&E 12
-
8/6/2019 Secured secret message passing through video file
13/42
Secured secret message passing through video file
4.4.2 ACTIVITY DIAGRAM FOR RECEIVER
Fig 4.4.2: activity diagram (receiver)
GECH, Dept of CS&E 13
-
8/6/2019 Secured secret message passing through video file
14/42
Secured secret message passing through video file
4.5 SYSTEM ARCHITECTURE
Sender Video Steganography Receiver Input Output
Context Level Diagram
Fig 4.5: System architecture
4.6 ALGORITHM
The Data Encryption Standard (DES) is a block cipherthat uses shared secret key
between sender and receiver. It was selected by theNational Bureau of Standards
as an official Federal Information Processing Standard (FIPS) for the United
States in 1976 and which has subsequently enjoyed widespread use
internationally. It is based on a symmetric-key algorithm that uses a 56-bit key.
DES encrypts and decrypts data in 64-bit blocks, using a key. It takes a 64-
bit block of plaintext as input and outputs a 64-bit block of cipher text. Since it
always operates on blocks of equal size and it uses both permutations and
substitutions in the algorithm.
GECH, Dept of CS&E 14
SYSTEM ARCHITECTURE
http://en.wikipedia.org/wiki/Block_cipherhttp://en.wikipedia.org/wiki/Shared_secrethttp://en.wikipedia.org/wiki/National_Bureau_of_Standardshttp://en.wikipedia.org/wiki/Federal_Information_Processing_Standardhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/Symmetric-key_algorithmhttp://en.wikipedia.org/wiki/Shared_secrethttp://en.wikipedia.org/wiki/National_Bureau_of_Standardshttp://en.wikipedia.org/wiki/Federal_Information_Processing_Standardhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/Symmetric-key_algorithmhttp://en.wikipedia.org/wiki/Block_cipher -
8/6/2019 Secured secret message passing through video file
15/42
Secured secret message passing through video file
Figure: 4.6 DES Block Diagram
DES works on 64 bits of data at a time. Each 64 bits of data is iterated on from
1 to 16 times (16 is the DES standard). For each iteration a 48 bit subset of the 56
bit key is fed into the encryption block represented by the dashed rectangle above.
Decryption is the inverse of the encryption process. The "F" module shown in the
diagram is the heart of DES. It actually consists of several different transforms
and non-linear substitutions.
Block ciphers where the cipher text is calculated from the plain text by
repeated application of the same transformation or round function. In a Feistel
cipher, the text being encrypted is split into two halves. The round function, F, is
applied to one half using a sub key and the output of F is (exclusive-or-ed
(XORed)) with the other half. The two halves are then swapped. Each roundfollows the same pattern except for the last round where there is often no swap.
DES has 16 rounds, meaning the main algorithm is repeated 16 times to
produce the cipher text. It has been found that the number of rounds is
exponentially proportional to the amount of time required to find a key using a
brute-force attack. So as the number of rounds increases, the security of the
algorithm increases exponentially.
GECH, Dept of CS&E 15
-
8/6/2019 Secured secret message passing through video file
16/42
-
8/6/2019 Secured secret message passing through video file
17/42
Secured secret message passing through video file
Fig 4.6.1: Feistel structure of DES
GECH, Dept of CS&E 17
-
8/6/2019 Secured secret message passing through video file
18/42
Secured secret message passing through video file
5. Apply Permuted to K to get the final K[R], where R is the round number we are
on.
6. Increment R by 1 and repeat the procedure until we have all 16 sub keys K[1]-K[16].
Once the key scheduling and plaintext preparation have been completed, the
actual encryption or decryption is performed by the main DES algorithm. The 64-
bit block of input data is first split into two halves, L and R. L is the left-most 32
bits, and R is the right-most 32 bits. The following process is repeated 16 times,
making up the 16 rounds of standard DES. We call the 16 sets of halves L[0]-
L[15] and R[0]-R[15].
.
GECH, Dept of CS&E 18
-
8/6/2019 Secured secret message passing through video file
19/42
Secured secret message passing through video file
Chapter 5
IMPLEMENTATION
5.1 WHY JAVA IS USED?
The main use of Java would be as applets, small Java programs embedded in web
pages. Applets offered the benefit of a fully fledged programming language
allowing developers to embed just about any functionality. Java is a powerful,
portable object oriented (OO) programming language. A program written in Java
on a PC can easily find its way into many different computing platforms. This
makes Java a popular language for application development.
Java programs can do several actions at the same time, called multi-
threading. A well-written Java program can process data in one thread while
waiting for user input in another thread.
The JVM provides a secure runtime environment by managing memory,
providing isolation between executing components in different namespaces, array
bounds checking, etc. The dynamic way in which the JVM allocates the various
memory areas (method area, GC heap, thread stacks) means that it is almost
impossible for a would-be attacker to determine what memory areas to attempt to
insert malicious instructions into. Bounds checking on arrays prevent
unreferenced memory accesses.
5.2 MODULES
The system deals with security during transmission of data. Commonly used
technologies are cryptography. This system deals with implementing security
using Steganography. In this the end user identifies a video, which is going to act
as the carrier of data. The data file is also selected and then to achieve greater
speed of transmission the data file and video file are compressed and sent. Prior to
this the data is embedded into the video and then sent. The video if hacked or
interpreted by a third party user will open up in any video player but not
displaying the data. This protects the data from being invisible and hence be
GECH, Dept of CS&E 19
-
8/6/2019 Secured secret message passing through video file
20/42
Secured secret message passing through video file
secure during transmission. The user in the receiving end uses another piece of
code to retrieve the data from the video.
The Modules of the system are:1 Steganography Module
2 GUI Module
3 Security Module
4 Server Module
5.2.1 STEGANOGRAPHY MODULE
The module deals with identifying the hidden data in the video file. The module
receives the video file that is then browsed to remove the associated data. The data
is then removed from the video file.
Data Embed: This module deals with identifying the data and the image to
embed the data into the image before it can be transmitted. This is then followed
by compression to increase the rate of transfer of files between the networks. The
module opens by prompting the user to identify the file that need to be transmitted
across the network. The file is then selected using the GUI interface provided
through JAVA. The module then prompts to identify the video file, which needs
to house the data file. The developed system will provide support to select and
embed data into .mpeg & .dat files. The selected video file is then played before it
can house the data. The data is then embedded into the video file in such a way
that the video file is not corrupted; at the same time the data is secure. The video if
hacked or interrupted by a third party can be played in any browser without
actually displaying the data.
Data deEmbed: The data on the receivers end is isolated and removed from
the video. The module deals with identifying the hidden data in the video. The
module receives the video file that is decompressed and decompresses it using
JAVA UTILITY PACKAGE. The decompressed file is then played to play the
video file. The video file is then browsed to remove the associated data. The data
is then removed from the video file.
GECH, Dept of CS&E 20
-
8/6/2019 Secured secret message passing through video file
21/42
-
8/6/2019 Secured secret message passing through video file
22/42
-
8/6/2019 Secured secret message passing through video file
23/42
Secured secret message passing through video file
Chapter 6
TESTING
6.1 INTRODUCTION
The process of executing a system with the intent of finding an error is
called testing.
Testing is defined as the process in which defects are identified, isolated,
subjected for rectification and ensured that product is defect free in order
to produce the quality product and hence customer satisfaction.
Quality is defined as justification of the requirements.
Defect is nothing but deviation from the requirements.
Defect is nothing but bug.
Testing --- The presence of bugs.
Testing can demonstrate the presence of bugs, but not their absence.
Debugging and Testing are not the same thing.
Testing is a systematic attempt to break a program or the AUT
Debugging is the art or method of uncovering why the script /program did
not execute properly.
6.2 TESTING METHODOLOGY
1 Black box Testing: is the testing process in which tester can perform testing
on an application without having any internal structural knowledge ofapplication.
Usually Test Engineers are involved in the black box testing.
2 White box Testing: is the testing process in which tester can perform testing
on an application with having internal structural knowledge.
Usually The Developers are involved in white box testing.
3 Gray Box Testing: is the process in which the combination of black box and
white box tonics are used.
GECH, Dept of CS&E 23
-
8/6/2019 Secured secret message passing through video file
24/42
Secured secret message passing through video file
6.3 TEST CASES
T.C.No Description Exp Act Result
Table 6.3: Template for Test Case
6.3.1 GUI Test Cases:
Total no of features that need to be check
Look & Feel
Look for Default values if at all any (date & Time, if at all any require)
Look for spell check
T.C.No Description Expected
value
Actual
value
Result
1
Check for all the
features in the
screen
The screen
must contain
all the features
2
Check for the
alignment of the
objects as per the
validations
The alignment
should be in
proper way
Table 6.3.1: Example for GUI Test cases
6.3.2 Negative Test Cases:
Must have negative perception.
Invalid inputs must be used for test.
T.C.No Description Expected
value
Actual value Result
1 Input username
and password
Login Page Login Page Login Page
Table 6.3.2: Example for Negative Test cases
6.3.3 Positive Test Cases
The positive flow of the functionality must be considered
GECH, Dept of CS&E 24
-
8/6/2019 Secured secret message passing through video file
25/42
Secured secret message passing through video file
Valid inputs must be used for testing
Must have the positive perception to verify whether the requirements are
justified.
The positive flow of the functionality must be considered
Valid inputs must be used for testing
Must have the positive perception to verify whether the requirements are
justified.
T.C.No Description Expected
value
Actual value Result
1 InputUserName and
Password
Redirect toHomePage
Redirect toHome Page
Redirect toHome Page
Table 6.3.3: Example for Positive Test cases
Chapter 7
GECH, Dept of CS&E 25
-
8/6/2019 Secured secret message passing through video file
26/42
Secured secret message passing through video file
RESULTS
7.1 HOME PAGE
Fig 7.1: home page
To start the project batch file much be executed
All the path must be set before executing the batch file
After this batch file is run we obtain the above window having various
options available
7.2 ENCRYPTION: STEP 1
GECH, Dept of CS&E 26
-
8/6/2019 Secured secret message passing through video file
27/42
Secured secret message passing through video file
Fig 7.2: encryption (step 1)
The first step of the project to encrypt the data i.e. the text file
This window appear after clicking over the tab option named security then
selecting encrypt
After specifying the path of the file to be encrypted we need to specify any
key word known to only sender and receiver
After specifying the key word press ok
7.3 ENCRYPTION: STEP 2
GECH, Dept of CS&E 27
-
8/6/2019 Secured secret message passing through video file
28/42
Secured secret message passing through video file
Fig 7.3: encryption (step 2)
after clicking over ok we obtain the above window
this window ask a name for the encrypted file
click over save the file will be saved
7.4 ENCRYPTION: STEP 3
GECH, Dept of CS&E 28
-
8/6/2019 Secured secret message passing through video file
29/42
Secured secret message passing through video file
Fig 7.4: encryption (step 3)
this is the last step of encryption
a dialog box pop ups conforming that the file is encrypted and saved as
shown in the above screenshot
7.5 EMBEDDING: STEP 1
GECH, Dept of CS&E 29
-
8/6/2019 Secured secret message passing through video file
30/42
Secured secret message passing through video file
Fig 7.5: embedding (step 1)
now a video file is to be embed along with the encrypted file
this window is obtained after clicking oversteg utility option provided
we need to browse to the encrypted file as well as to the video file
click over the embed option
GECH, Dept of CS&E 30
-
8/6/2019 Secured secret message passing through video file
31/42
-
8/6/2019 Secured secret message passing through video file
32/42
Secured secret message passing through video file
7.7 SENDING FILE: STEP 1
Fig 7.7: sending file (step 1)
after clicking over the send option IP address will be asked of the system
connected
provide the IP address in the space provided and press ok
GECH, Dept of CS&E 32
-
8/6/2019 Secured secret message passing through video file
33/42
Secured secret message passing through video file
7.8 SENDING FILE: STEP 2
Fig 7.8: sending file (step 2)
after pressing ok this window will be displayed asking for the file to be
send
make sure that you have selected the video file which you have embedded
press open
GECH, Dept of CS&E 33
-
8/6/2019 Secured secret message passing through video file
34/42
Secured secret message passing through video file
7.9 SENDING FILE: STEP 3
Fig 7.9: sending file (step 3)
after clicking over open in the last window this window will appear
confirming the IP address
press yes if correct
GECH, Dept of CS&E 34
-
8/6/2019 Secured secret message passing through video file
35/42
Secured secret message passing through video file
7.10 DE-EMBED: STEP 1
Fig 7.10: de-embed (step 1)
now from here the work at the receiver side starts
this window is obtained after clicking over option steg utility and then de-
embed
you have to specify the path of the received video file
it is always stored in one of the project folder named workspace
press de-embed
GECH, Dept of CS&E 35
-
8/6/2019 Secured secret message passing through video file
36/42
Secured secret message passing through video file
7.11 DE-EMBED: STEP 2
Fig 7.11: de-embed (step 2)
this window confirms the completion of de-embedding process
press ok to proceed
GECH, Dept of CS&E 36
-
8/6/2019 Secured secret message passing through video file
37/42
Secured secret message passing through video file
7.12 DE-ENCRYPTION: STEP 1
Fig 7.12: de-encrypt (step 1)
this is the window which is obtained by clicking over option security and
then decrypt
browse to the encrypted file
you will be asked the key word that you have entered will sending the file
press ok
GECH, Dept of CS&E 37
-
8/6/2019 Secured secret message passing through video file
38/42
Secured secret message passing through video file
7.13 DE-ENCRYPTION: STEP 2
Fig 7.13: de-encrypt (step 2)
this window confirms the completion of the decryption process
press ok
GECH, Dept of CS&E 38
-
8/6/2019 Secured secret message passing through video file
39/42
-
8/6/2019 Secured secret message passing through video file
40/42
Secured secret message passing through video file
Chapter 8
CONCLUSION AND FUTURE ENHANCEMENT
Steganography, especially combined with cryptography, is a powerful tool which
enables people to communicate without possible eavesdroppers even knowing
there is a form of communication.
In our project we have successfully transferred a text file embedded with a
video file hidden from the third party. It is not possible to develop a system that
makes all the requirements of the user. User requirements keep changing as the
system is being used.
Some of the future enhancements that can be done to this system are:
As the technology emerges, it is possible to upgrade the system and can be
adaptable to desired environment.
Because it is based on object-oriented design, any further changes can be
easily adaptable.
Based on the future security issues, security can be improved using
emerging technologies.
GECH, Dept of CS&E 40
-
8/6/2019 Secured secret message passing through video file
41/42
Secured secret message passing through video file
REFERENCES
1) William Stallings, Cryptography and Network Security, Pearson, Fourth
Edition.
2) Herbert Shieldict, Java Complete Reference, TATA-McGraw-HILL, 7th
Edition.
3) Shabadimath.P.C, Modern Dictionary, Book- Depot, Re-Corrected
Edition.
4) Project Management URL: http://www.startwright.com/project.html
5) http://it.toolbLox.com/wiki/index.php/Warehouse_Management
6) http://en.wikipedia.org/wiki/DES
7) http://en.wikipedia.org/wiki/Encrypyion
8) http://en.wikipedia.org/wiki/Steganography
9) Kathy Sierra and Bert Bates, Head First Java, OReilly, 2nd Edition.
10) Project Management URL: http://www.startwright.com/project.htm
11) http://it.toolbLox.com/wiki/index.php/Warehouse_Management
12) Steganography and Steganalysis: Different Approaches by Soumyendu
Das
13) Exploring Steganography: Seeing the Unseen by Neil F. Johnson, Sushil
Jajodia, George Mason University IEEE Computer, February 1998: 26-34.
Available:http://www.jjtc.com/pub/r2026.pdf
GECH, Dept of CS&E 41
-
8/6/2019 Secured secret message passing through video file
42/42
Secured secret message passing through video file