secured secret message passing through video file

Upload: avin-raj

Post on 07-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/6/2019 Secured secret message passing through video file

    1/42

    Secured secret message passing through video file

    Chapter 1

    INTRODUCTION

    Internet communication has become an integral part of the Infrastructure of

    todays world. The information communicated comes in numerous forms

    and is used in many applications. In a large number of these applications, it

    is desired that the communication be done in secrete. Such secret

    communication ranges from the obvious cases of bank transfers, corporate

    communications, and credit card purchases, on down to a large percentage

    of everyday email. With email, many people wrongly assume that their

    communication is safe because it is just a small piece of an enormous

    amount of data being sent worldwide. After all, who is going to see it? But

    in reality, the Internet is not a secure medium, and there are programs out

    there which just sit and watch messages go by for interesting information.

    This project not only deals with a method of encrypting messages, but

    hiding them something else to enable them to pass undetected. The

    technique here used is Video Steganography.Video Steganogarphy is a

    technique to hide any kind of files in any extension into a carrying Video

    file. This project is the application developed to embed any kind of data

    (File) in another file, which is called carrier file. The carrier file must be a

    video file. It is concerned with embedding information in an innocuous

    cover media in a secure and robust manner. This system makes the Files

    more secure by using the concepts Steganography and Cryptography.

    Steganography, poor cousin of Cryptography is the art of hiding messages

    inside other messages such that the very existence of the message is unknown to

    third party. The goal of cryptography is to make data unreadable by a third party;

    the goal of Steganography is to hide the data from a third party through the use of

    advanced computer software.

    The cover data should not be significantly degraded by the embedded data,

    and the embedded data should be as imperceptible as possible. The embedded datashould be as immune as possible to modifications from intelligent attacks or

    GECH, Dept of CS&E 1

  • 8/6/2019 Secured secret message passing through video file

    2/42

    Secured secret message passing through video file

    anticipated manipulations. Thus it is necessary that the hidden message should be

    encrypted before Steganography.

    In the case of using this technique of hiding the data with a video file, thevisibility of the video, resolution or clarity is not being affected. The hidden data

    can be of length in size. To the Hacker, only the video is make going to be visible

    when previewed and not a trace of the hidden data.

    If the video file is opened across a text editor, then also the data is not going

    to be visible as the information is stored in an encryption form, which is also

    binary. Hence making it difficult for the enclosure to differentiate the data to the

    video file.

    1.1 PROBLEM STATEMENT

    The first step in designing a system was to identify the underlying cause behind

    the problems in the existing system. For this purpose, the information was

    gathered and checked for the completeness and accuracy of the data. Analyzing

    the information involved, identification of components of the system and their

    interrelationship is made. Information is collected from the existing machine. The

    problem is thoroughly analyzed and a test is done on the technical, social and

    economic feasibility of developing the proposed system. The data needed to

    develop the system was collected from all these documents and discussing with

    the authorities for changes needed to the proposed system. The requirements are

    drawn on the basis of the needs of the users through an expert and the developers

    experience on the system.

    1.2 OBJECTIVE OF THE PROJECTThe objective of steganography is to hide a secret message within a cover-media

    in such a way that others cannot discern the presence of the hidden message.

    Technically in simple words steganography means hiding one piece of data

    within another.

    Modern steganography uses the opportunity of hiding information into

    digital multimedia files and also at the network packet level.

    Hiding information into a media requires following elements

    GECH, Dept of CS&E 2

  • 8/6/2019 Secured secret message passing through video file

    3/42

    Secured secret message passing through video file

    The cover media that will hold the hidden data

    The secret message , may be plain text, cipher text or any type of data

    The stego functionand its inverse

    An optional stego-key or password may be used to hide and unhide the

    message.

    1.3 ORGANIZATION OF THE REPORT

    This report has been organized into eight chapters. In Chapter 1 we have

    Introduction consisting of Problem statement, and Objective of the Project

    and Organization of the project. In Chapter 2 we provide Literature surveyconsisting of Existing System, Proposed System. Chapter 3 gives the

    information about hardware and software requirements of the system.

    Chapter 4 provides information about the input and output design, use case

    diagram, activity diagram, system architecture, algorithms related to the

    system. Chapter 5 and 6 gives the implementation and testing of the

    modules and the corresponding algorithms.

    In Chapter 7 we have the results of the tests conducted in the previous

    chapter. In Chapter 8 we have the conclusion and future enhancement of our

    system and then we conclude it with the references.

    GECH, Dept of CS&E 3

  • 8/6/2019 Secured secret message passing through video file

    4/42

    Secured secret message passing through video file

    Chapter 2

    LITERATURE SURVEY

    The proposed system should have the following features. The transactions should

    take place in a secured format between various clients in the network. It provides

    flexibility to the user to transfer the data through the network very easily. It should

    also identify the user and provide the communication according to the prescribed

    level of security with transfer of the file requested and run the required process at

    the server if necessary. In this system the data will be sending through the network

    as a video file. The user who received the file will do the operations like de

    embedding, and decryption in their level of hierarchy etc.

    Analysis is the process of studying to find the best solution to the problem.

    System analysis is the process by which we learnt about the existing problems,

    define objects and requirements and evaluates the solutions. System analysis givesthe target for design and development. System analysis is the way of thinking

    about the organization and the problem it involves, a set of technologies that helps

    in solving these problems.

    2.1 EXISTING SYSTEM

    Traditionally this was achieved with invisible ink, microfilm or taking the first

    letter from each word of a message. This is now achieved by hiding the message

    within a graphics or sound file. For instance in a 256-greyscale image, if the least

    significant bit of each byte is replaced with a bit from the message then the result

    will be indistinguishable to the human eye. An eavesdropper will not even realize

    a message is being sent. This is not cryptography however, and although it would

    fool a human, a computer would be able to detect this very quickly and reproduce

    the original message.

    GECH, Dept of CS&E 4

  • 8/6/2019 Secured secret message passing through video file

    5/42

    Secured secret message passing through video file

    2.2 PROPOSED SYSTEM

    In this work we propose a novel type of digital video encryption that has several

    advantages over other currently available digital video encryption schemes.

    We also present an extended classification of digital video encryption

    algorithms in order to clarify these advantages. We analyze both security and

    performance aspects of the proposed method, and show that the method is

    efficient and secure from a cryptographic point of view. Even though the method

    is currently feasible only for a certain class of video sequences and video codecs,

    the method is promising and future investigations might reveal its broader

    applicability. Finally, we extend our approach into a novel type of digital video

    steganography where it is possible to disguise a given video with another video.

    GECH, Dept of CS&E 5

  • 8/6/2019 Secured secret message passing through video file

    6/42

    Secured secret message passing through video file

    Chapter 3

    REQUIREMENTS SPECIFICATION

    The Software Requirements Specifications is produced at the culmination of the

    analysis task. The function and performance allocated to software as part of the

    system engineering are refined by establishing a complete information description

    as functional representation of system behaviour, an indication of performance

    requirements and design constraints, appropriate validation criteria.

    3.1 SOFTWARE REQUIREMENTS

    1. Language: Java Networking

    2. Front End Tool: Java J2SDK 1.5, Swing

    3. Operating System: Windows XP

    3.2 HARDWARE REQUIREMENTS

    1. Processor : Pentium

    2. Memory Size : 128 MB RAM

    3. Hard Disk Drive : 20 GB hard Disk

    4. Floppy Disk Drive : 1.44 MB- 3.5Floppy Disk

    5. Display : EGA/VGA Color Monitor

    600 x 800 Pixels Resolution

    High Color (16 Bit)

    6. Key Board : TVS Keyboard (104 Keys)

    7. Mouse : Logitech scroll mouse.

    8. 32 Bit PCI Ethernet Card.

    9. LAN connection

    GECH, Dept of CS&E 6

  • 8/6/2019 Secured secret message passing through video file

    7/42

    Secured secret message passing through video file

    3.3 FUNCTIONAL AND NON FUNCTIONAL

    REQUIREMENTS

    3.3.1 USE CASES DESCRIPTION

    Use case name Encrypt

    Participating

    actors

    Sender

    Flow of events The user-selected file will be encrypted with a given key.

    Entry

    Condition

    User must select the file and must give the key for encryption.

    Exit condition Successful or Un Successful Encryption of file.

    Quality

    Requirements

    Display proper error messages while Encryption.

    Use case name Decrypt

    Participating

    actors

    Receiver

    Flow of events The user-selected file will be decrypted with a proper key.

    Entry

    Condition

    User must select the file and must give the key for decryption.

    Exit condition Successful or Un Successful Decryption of file.

    Quality

    Requirements

    Display proper error messages while Decryption.

    Use case name Embed

    Participating

    actors

    Sender

    Flow of events The user-selected encrypted file will be embedding with

    selected video file.

    Entry Condition User must select the one encrypted file and one video file

    for embedding.

    Exit condition Successful or Un Successful Embedding process.

    Quality

    Requirements

    Display proper error messages while Embedding two files.

    GECH, Dept of CS&E 7

  • 8/6/2019 Secured secret message passing through video file

    8/42

    Secured secret message passing through video file

    Use case name De-Embed

    Participating

    actors

    Receiver

    Flow of events The user-selected video file will be de-embedding to encrypted

    file.

    Entry

    Condition

    User must select the video file for de-embedding.

    Exit condition Successful or Un Successful De-embedding of file.

    Quality

    Requirements

    Display proper error messages while De-embedding.

    Use case name Send FileParticipating

    actors

    Sender

    Flow of events The user-selected file will be send to the given host.

    Entry Condition User must select the file to send and must know the IP

    address of the destination host.

    Exit condition Successful or Un Successful sending of file to the

    destination host.

    Quality

    Requirements

    Display proper error messages while Sending the file.

    Chapter 4

    SYSTEM DESIGN

    Design is a creative process, a good design is the key to effective system. The

    system Design is defined as The process of applying various techniques andprinciples for the purpose of defining a process or a system in sufficient detail to

    GECH, Dept of CS&E 8

  • 8/6/2019 Secured secret message passing through video file

    9/42

    Secured secret message passing through video file

    permit its physical realization. Various design features are followed to develop

    the system. The design specification describes the features of the system, the

    components or elements of the system and their appearance to end-users.

    In system design high-end decisions are taken regarding the basic systemarchitecture platforms and tools to be used. The system design transforms a

    logical representation of what a given system is required to be in to the physical

    specification. Design starts with the systems requirement specification and

    converts it into a physical reality during the development. Important design factors

    such as reliability, response time, throughput of the system; maintainability etc

    should be taken into account.

    4.1 INPUT DESIGN

    The input Design is the process of converting the user-oriented inputs in to the

    computer-based format. The goal of designing input data is to make the

    automation as easy and free from errors as possible. Providing a good input design

    for the application easy data input and selection features are adopted.

    The input design requirements such as user friendliness, consistent format

    and interactive dialogue for giving the right message and help for the user at right

    time are also considered for the development of the project.

    Input design is a part of overall system design which requires very careful

    attention. Often the collection of input data is the most expensive part of the

    system, which needs to be route through number of modules. It is the point where

    the user ready to send the data to the destination machine along with known IP

    address; if the IP address is unknown then it may prone to error. In input design

    case there is no chance of corrupting the data has it is one way traffic.

    4.2 OUTPUT DESIGN

    A quality output is one, which meets the requirements of the end user and

    presents the information clearly. In any system results of processing are

    communicated to the users and to other systems through outputs. In the output

    design it is determined how the information is to be stored in text file. It is most

    GECH, Dept of CS&E 9

  • 8/6/2019 Secured secret message passing through video file

    10/42

    Secured secret message passing through video file

    important and direct source information to the user. Efficient and intelligent

    output improves the systems relationship with source and destination machine.

    Outputs from computers are required primarily to get same packet that the

    user has send instead of corrupted packet. They are also used to provide topermanent copy of these results for later consultation.

    4.3 USE CASE DIAGRAM

    4.3.1 SENDER

    Sender

    Send File

    Embed

    Encrypt

    *

    *

    **

    *

    *

    Fig 4.3.1: use case diagram (sender)

    4.3.2 RECEIVER

    GECH, Dept of CS&E 10

  • 8/6/2019 Secured secret message passing through video file

    11/42

    Secured secret message passing through video file

    Receiver

    De Embed

    Decrypt

    *

    *

    *

    *

    Fig 4.3.2: use case diagram(receiver)

    GECH, Dept of CS&E 11

  • 8/6/2019 Secured secret message passing through video file

    12/42

    Secured secret message passing through video file

    4.4 ACTIVITY DIAGRAM

    4.4.1 ACTIVITY DIAGRAM FOR SENDER

    Fig 4.4.1: activity diagram (sender)

    GECH, Dept of CS&E 12

  • 8/6/2019 Secured secret message passing through video file

    13/42

    Secured secret message passing through video file

    4.4.2 ACTIVITY DIAGRAM FOR RECEIVER

    Fig 4.4.2: activity diagram (receiver)

    GECH, Dept of CS&E 13

  • 8/6/2019 Secured secret message passing through video file

    14/42

    Secured secret message passing through video file

    4.5 SYSTEM ARCHITECTURE

    Sender Video Steganography Receiver Input Output

    Context Level Diagram

    Fig 4.5: System architecture

    4.6 ALGORITHM

    The Data Encryption Standard (DES) is a block cipherthat uses shared secret key

    between sender and receiver. It was selected by theNational Bureau of Standards

    as an official Federal Information Processing Standard (FIPS) for the United

    States in 1976 and which has subsequently enjoyed widespread use

    internationally. It is based on a symmetric-key algorithm that uses a 56-bit key.

    DES encrypts and decrypts data in 64-bit blocks, using a key. It takes a 64-

    bit block of plaintext as input and outputs a 64-bit block of cipher text. Since it

    always operates on blocks of equal size and it uses both permutations and

    substitutions in the algorithm.

    GECH, Dept of CS&E 14

    SYSTEM ARCHITECTURE

    http://en.wikipedia.org/wiki/Block_cipherhttp://en.wikipedia.org/wiki/Shared_secrethttp://en.wikipedia.org/wiki/National_Bureau_of_Standardshttp://en.wikipedia.org/wiki/Federal_Information_Processing_Standardhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/Symmetric-key_algorithmhttp://en.wikipedia.org/wiki/Shared_secrethttp://en.wikipedia.org/wiki/National_Bureau_of_Standardshttp://en.wikipedia.org/wiki/Federal_Information_Processing_Standardhttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/United_Stateshttp://en.wikipedia.org/wiki/Symmetric-key_algorithmhttp://en.wikipedia.org/wiki/Block_cipher
  • 8/6/2019 Secured secret message passing through video file

    15/42

    Secured secret message passing through video file

    Figure: 4.6 DES Block Diagram

    DES works on 64 bits of data at a time. Each 64 bits of data is iterated on from

    1 to 16 times (16 is the DES standard). For each iteration a 48 bit subset of the 56

    bit key is fed into the encryption block represented by the dashed rectangle above.

    Decryption is the inverse of the encryption process. The "F" module shown in the

    diagram is the heart of DES. It actually consists of several different transforms

    and non-linear substitutions.

    Block ciphers where the cipher text is calculated from the plain text by

    repeated application of the same transformation or round function. In a Feistel

    cipher, the text being encrypted is split into two halves. The round function, F, is

    applied to one half using a sub key and the output of F is (exclusive-or-ed

    (XORed)) with the other half. The two halves are then swapped. Each roundfollows the same pattern except for the last round where there is often no swap.

    DES has 16 rounds, meaning the main algorithm is repeated 16 times to

    produce the cipher text. It has been found that the number of rounds is

    exponentially proportional to the amount of time required to find a key using a

    brute-force attack. So as the number of rounds increases, the security of the

    algorithm increases exponentially.

    GECH, Dept of CS&E 15

  • 8/6/2019 Secured secret message passing through video file

    16/42

  • 8/6/2019 Secured secret message passing through video file

    17/42

    Secured secret message passing through video file

    Fig 4.6.1: Feistel structure of DES

    GECH, Dept of CS&E 17

  • 8/6/2019 Secured secret message passing through video file

    18/42

    Secured secret message passing through video file

    5. Apply Permuted to K to get the final K[R], where R is the round number we are

    on.

    6. Increment R by 1 and repeat the procedure until we have all 16 sub keys K[1]-K[16].

    Once the key scheduling and plaintext preparation have been completed, the

    actual encryption or decryption is performed by the main DES algorithm. The 64-

    bit block of input data is first split into two halves, L and R. L is the left-most 32

    bits, and R is the right-most 32 bits. The following process is repeated 16 times,

    making up the 16 rounds of standard DES. We call the 16 sets of halves L[0]-

    L[15] and R[0]-R[15].

    .

    GECH, Dept of CS&E 18

  • 8/6/2019 Secured secret message passing through video file

    19/42

    Secured secret message passing through video file

    Chapter 5

    IMPLEMENTATION

    5.1 WHY JAVA IS USED?

    The main use of Java would be as applets, small Java programs embedded in web

    pages. Applets offered the benefit of a fully fledged programming language

    allowing developers to embed just about any functionality. Java is a powerful,

    portable object oriented (OO) programming language. A program written in Java

    on a PC can easily find its way into many different computing platforms. This

    makes Java a popular language for application development.

    Java programs can do several actions at the same time, called multi-

    threading. A well-written Java program can process data in one thread while

    waiting for user input in another thread.

    The JVM provides a secure runtime environment by managing memory,

    providing isolation between executing components in different namespaces, array

    bounds checking, etc. The dynamic way in which the JVM allocates the various

    memory areas (method area, GC heap, thread stacks) means that it is almost

    impossible for a would-be attacker to determine what memory areas to attempt to

    insert malicious instructions into. Bounds checking on arrays prevent

    unreferenced memory accesses.

    5.2 MODULES

    The system deals with security during transmission of data. Commonly used

    technologies are cryptography. This system deals with implementing security

    using Steganography. In this the end user identifies a video, which is going to act

    as the carrier of data. The data file is also selected and then to achieve greater

    speed of transmission the data file and video file are compressed and sent. Prior to

    this the data is embedded into the video and then sent. The video if hacked or

    interpreted by a third party user will open up in any video player but not

    displaying the data. This protects the data from being invisible and hence be

    GECH, Dept of CS&E 19

  • 8/6/2019 Secured secret message passing through video file

    20/42

    Secured secret message passing through video file

    secure during transmission. The user in the receiving end uses another piece of

    code to retrieve the data from the video.

    The Modules of the system are:1 Steganography Module

    2 GUI Module

    3 Security Module

    4 Server Module

    5.2.1 STEGANOGRAPHY MODULE

    The module deals with identifying the hidden data in the video file. The module

    receives the video file that is then browsed to remove the associated data. The data

    is then removed from the video file.

    Data Embed: This module deals with identifying the data and the image to

    embed the data into the image before it can be transmitted. This is then followed

    by compression to increase the rate of transfer of files between the networks. The

    module opens by prompting the user to identify the file that need to be transmitted

    across the network. The file is then selected using the GUI interface provided

    through JAVA. The module then prompts to identify the video file, which needs

    to house the data file. The developed system will provide support to select and

    embed data into .mpeg & .dat files. The selected video file is then played before it

    can house the data. The data is then embedded into the video file in such a way

    that the video file is not corrupted; at the same time the data is secure. The video if

    hacked or interrupted by a third party can be played in any browser without

    actually displaying the data.

    Data deEmbed: The data on the receivers end is isolated and removed from

    the video. The module deals with identifying the hidden data in the video. The

    module receives the video file that is decompressed and decompresses it using

    JAVA UTILITY PACKAGE. The decompressed file is then played to play the

    video file. The video file is then browsed to remove the associated data. The data

    is then removed from the video file.

    GECH, Dept of CS&E 20

  • 8/6/2019 Secured secret message passing through video file

    21/42

  • 8/6/2019 Secured secret message passing through video file

    22/42

  • 8/6/2019 Secured secret message passing through video file

    23/42

    Secured secret message passing through video file

    Chapter 6

    TESTING

    6.1 INTRODUCTION

    The process of executing a system with the intent of finding an error is

    called testing.

    Testing is defined as the process in which defects are identified, isolated,

    subjected for rectification and ensured that product is defect free in order

    to produce the quality product and hence customer satisfaction.

    Quality is defined as justification of the requirements.

    Defect is nothing but deviation from the requirements.

    Defect is nothing but bug.

    Testing --- The presence of bugs.

    Testing can demonstrate the presence of bugs, but not their absence.

    Debugging and Testing are not the same thing.

    Testing is a systematic attempt to break a program or the AUT

    Debugging is the art or method of uncovering why the script /program did

    not execute properly.

    6.2 TESTING METHODOLOGY

    1 Black box Testing: is the testing process in which tester can perform testing

    on an application without having any internal structural knowledge ofapplication.

    Usually Test Engineers are involved in the black box testing.

    2 White box Testing: is the testing process in which tester can perform testing

    on an application with having internal structural knowledge.

    Usually The Developers are involved in white box testing.

    3 Gray Box Testing: is the process in which the combination of black box and

    white box tonics are used.

    GECH, Dept of CS&E 23

  • 8/6/2019 Secured secret message passing through video file

    24/42

    Secured secret message passing through video file

    6.3 TEST CASES

    T.C.No Description Exp Act Result

    Table 6.3: Template for Test Case

    6.3.1 GUI Test Cases:

    Total no of features that need to be check

    Look & Feel

    Look for Default values if at all any (date & Time, if at all any require)

    Look for spell check

    T.C.No Description Expected

    value

    Actual

    value

    Result

    1

    Check for all the

    features in the

    screen

    The screen

    must contain

    all the features

    2

    Check for the

    alignment of the

    objects as per the

    validations

    The alignment

    should be in

    proper way

    Table 6.3.1: Example for GUI Test cases

    6.3.2 Negative Test Cases:

    Must have negative perception.

    Invalid inputs must be used for test.

    T.C.No Description Expected

    value

    Actual value Result

    1 Input username

    and password

    Login Page Login Page Login Page

    Table 6.3.2: Example for Negative Test cases

    6.3.3 Positive Test Cases

    The positive flow of the functionality must be considered

    GECH, Dept of CS&E 24

  • 8/6/2019 Secured secret message passing through video file

    25/42

    Secured secret message passing through video file

    Valid inputs must be used for testing

    Must have the positive perception to verify whether the requirements are

    justified.

    The positive flow of the functionality must be considered

    Valid inputs must be used for testing

    Must have the positive perception to verify whether the requirements are

    justified.

    T.C.No Description Expected

    value

    Actual value Result

    1 InputUserName and

    Password

    Redirect toHomePage

    Redirect toHome Page

    Redirect toHome Page

    Table 6.3.3: Example for Positive Test cases

    Chapter 7

    GECH, Dept of CS&E 25

  • 8/6/2019 Secured secret message passing through video file

    26/42

    Secured secret message passing through video file

    RESULTS

    7.1 HOME PAGE

    Fig 7.1: home page

    To start the project batch file much be executed

    All the path must be set before executing the batch file

    After this batch file is run we obtain the above window having various

    options available

    7.2 ENCRYPTION: STEP 1

    GECH, Dept of CS&E 26

  • 8/6/2019 Secured secret message passing through video file

    27/42

    Secured secret message passing through video file

    Fig 7.2: encryption (step 1)

    The first step of the project to encrypt the data i.e. the text file

    This window appear after clicking over the tab option named security then

    selecting encrypt

    After specifying the path of the file to be encrypted we need to specify any

    key word known to only sender and receiver

    After specifying the key word press ok

    7.3 ENCRYPTION: STEP 2

    GECH, Dept of CS&E 27

  • 8/6/2019 Secured secret message passing through video file

    28/42

    Secured secret message passing through video file

    Fig 7.3: encryption (step 2)

    after clicking over ok we obtain the above window

    this window ask a name for the encrypted file

    click over save the file will be saved

    7.4 ENCRYPTION: STEP 3

    GECH, Dept of CS&E 28

  • 8/6/2019 Secured secret message passing through video file

    29/42

    Secured secret message passing through video file

    Fig 7.4: encryption (step 3)

    this is the last step of encryption

    a dialog box pop ups conforming that the file is encrypted and saved as

    shown in the above screenshot

    7.5 EMBEDDING: STEP 1

    GECH, Dept of CS&E 29

  • 8/6/2019 Secured secret message passing through video file

    30/42

    Secured secret message passing through video file

    Fig 7.5: embedding (step 1)

    now a video file is to be embed along with the encrypted file

    this window is obtained after clicking oversteg utility option provided

    we need to browse to the encrypted file as well as to the video file

    click over the embed option

    GECH, Dept of CS&E 30

  • 8/6/2019 Secured secret message passing through video file

    31/42

  • 8/6/2019 Secured secret message passing through video file

    32/42

    Secured secret message passing through video file

    7.7 SENDING FILE: STEP 1

    Fig 7.7: sending file (step 1)

    after clicking over the send option IP address will be asked of the system

    connected

    provide the IP address in the space provided and press ok

    GECH, Dept of CS&E 32

  • 8/6/2019 Secured secret message passing through video file

    33/42

    Secured secret message passing through video file

    7.8 SENDING FILE: STEP 2

    Fig 7.8: sending file (step 2)

    after pressing ok this window will be displayed asking for the file to be

    send

    make sure that you have selected the video file which you have embedded

    press open

    GECH, Dept of CS&E 33

  • 8/6/2019 Secured secret message passing through video file

    34/42

    Secured secret message passing through video file

    7.9 SENDING FILE: STEP 3

    Fig 7.9: sending file (step 3)

    after clicking over open in the last window this window will appear

    confirming the IP address

    press yes if correct

    GECH, Dept of CS&E 34

  • 8/6/2019 Secured secret message passing through video file

    35/42

    Secured secret message passing through video file

    7.10 DE-EMBED: STEP 1

    Fig 7.10: de-embed (step 1)

    now from here the work at the receiver side starts

    this window is obtained after clicking over option steg utility and then de-

    embed

    you have to specify the path of the received video file

    it is always stored in one of the project folder named workspace

    press de-embed

    GECH, Dept of CS&E 35

  • 8/6/2019 Secured secret message passing through video file

    36/42

    Secured secret message passing through video file

    7.11 DE-EMBED: STEP 2

    Fig 7.11: de-embed (step 2)

    this window confirms the completion of de-embedding process

    press ok to proceed

    GECH, Dept of CS&E 36

  • 8/6/2019 Secured secret message passing through video file

    37/42

    Secured secret message passing through video file

    7.12 DE-ENCRYPTION: STEP 1

    Fig 7.12: de-encrypt (step 1)

    this is the window which is obtained by clicking over option security and

    then decrypt

    browse to the encrypted file

    you will be asked the key word that you have entered will sending the file

    press ok

    GECH, Dept of CS&E 37

  • 8/6/2019 Secured secret message passing through video file

    38/42

    Secured secret message passing through video file

    7.13 DE-ENCRYPTION: STEP 2

    Fig 7.13: de-encrypt (step 2)

    this window confirms the completion of the decryption process

    press ok

    GECH, Dept of CS&E 38

  • 8/6/2019 Secured secret message passing through video file

    39/42

  • 8/6/2019 Secured secret message passing through video file

    40/42

    Secured secret message passing through video file

    Chapter 8

    CONCLUSION AND FUTURE ENHANCEMENT

    Steganography, especially combined with cryptography, is a powerful tool which

    enables people to communicate without possible eavesdroppers even knowing

    there is a form of communication.

    In our project we have successfully transferred a text file embedded with a

    video file hidden from the third party. It is not possible to develop a system that

    makes all the requirements of the user. User requirements keep changing as the

    system is being used.

    Some of the future enhancements that can be done to this system are:

    As the technology emerges, it is possible to upgrade the system and can be

    adaptable to desired environment.

    Because it is based on object-oriented design, any further changes can be

    easily adaptable.

    Based on the future security issues, security can be improved using

    emerging technologies.

    GECH, Dept of CS&E 40

  • 8/6/2019 Secured secret message passing through video file

    41/42

    Secured secret message passing through video file

    REFERENCES

    1) William Stallings, Cryptography and Network Security, Pearson, Fourth

    Edition.

    2) Herbert Shieldict, Java Complete Reference, TATA-McGraw-HILL, 7th

    Edition.

    3) Shabadimath.P.C, Modern Dictionary, Book- Depot, Re-Corrected

    Edition.

    4) Project Management URL: http://www.startwright.com/project.html

    5) http://it.toolbLox.com/wiki/index.php/Warehouse_Management

    6) http://en.wikipedia.org/wiki/DES

    7) http://en.wikipedia.org/wiki/Encrypyion

    8) http://en.wikipedia.org/wiki/Steganography

    9) Kathy Sierra and Bert Bates, Head First Java, OReilly, 2nd Edition.

    10) Project Management URL: http://www.startwright.com/project.htm

    11) http://it.toolbLox.com/wiki/index.php/Warehouse_Management

    12) Steganography and Steganalysis: Different Approaches by Soumyendu

    Das

    13) Exploring Steganography: Seeing the Unseen by Neil F. Johnson, Sushil

    Jajodia, George Mason University IEEE Computer, February 1998: 26-34.

    Available:http://www.jjtc.com/pub/r2026.pdf

    GECH, Dept of CS&E 41

  • 8/6/2019 Secured secret message passing through video file

    42/42

    Secured secret message passing through video file