In this traditional world the issues of providing the higher security to the information have been emerging a lot of various (miscellaneous) activities that has lead the corporate world to many serious problems. In this corporate world the main security must be provided to the private information from being manipulated during the transmission or the communication rather than the hardware parts. These emerging miscellaneous activities may cause a lot of damage to the data which may lead to the loss of the corporate companies. In order to provide security for the data in this project I am using a new concept called the STEGNOGRAPHY that is derived from a Greek word which actually means hidden data transmission. This is achieved by hiding one type of file format into the other type of file format. As I am developing this project as a web application, the source will be in the JAVA language. The implementation of this project at the end have met all the basic and main aims of the security and is proven to be suited perfectly for the issues concerning to the information security. As the project has been successfully implemented, I gained a complete and good knowledge on this subject.
Table of contents
ABSTRACT2
SYNOPSIS6
CHAPTER 17
1.0Introduction7
1.1 Background7
1.2 Methods8
1.3 Aim and Objectives of the Project8
AIM8
1.4 OBJECTIVES9
Chapter 210
LITERATURE SURVEY10
2.0 Types of Steganograpy Techniques10
2.1 DIGITAL WATERMARKING IN STEGANOGRAPY10
2.1.2 LSB MODULATIONS IN STEGANOGRAPY10
2.1.3 DATA HIDDEN USING AN AUDIO FILE IN STEGANOGRAPY10
2.1.4 ECHO HIDING IN STEGANOGRAPY10
2.1.5 HIDING DATA IN IP (INTERNET PROTOCOLS)11
2.1.6 HIDING DATA IN VIDEO FILES IN STEGANOGRAPY11
2.2 WORKING OF STEGANOGRAPHY12
2.2.1 FINDING A HIDDEN “LSB STEGANOGRAPHY”12
2.2.2 WORKING OF STEGANOGRAPHY IN DIGITAL IMAGES12
2.2.3 WORKING OF STEGANOGRAPHY FOR JPEG IMAGES12
2.2.4 BLIND STEGANALYSIS12
2.2.5 WORKING ON KEYS FOR STEGANOGRAPHY12
2.3 PROBLEM AND EXPLOITATIONS IN STEGANOGRAPHY13
2.3.1 Problem13
2.3.2 EXPLOITATION13
2.4 THE VIGENERE ALGORITHM13
2.5 CREATION OF JAVA14
2.5.1 JAVA SERVLETS14
2.5.2 (JSP) JAVA SERVER PAGES14
2.5.3 APACHE15
2.5.5 TOMCAT15
2.5.6 JAVA SERVER FACES15
2.5.7 TECHNOLOGY OF JAVA SERVER FACES15
2.5.8 MYFACE/ TOMAHAWK15
2.5.9 CSS15
2.5.10 ANT16
2.5.11 HTML16
2.5.12 RESOURCE BUNDLES16
2.5.13 STEGANOGRAPHIC METHODS16
2.5.15 EXAMPLES OF PALETTE SIGNATURE21
2.5.16 DESTROYING STEGANOGRAPHY AND WATERMARKS21
CHAPTER 326
3.0 PROJECT DESCRIPTION26
3.1 DETAILS OF MODULE26
3.1.1 DATA EMBEDDING AND DE-EMBEDDING26
3.1.2 DATA COMPRESSION AND DECOMPRESSION29
3.1.3 WEB APPLICATION29
System Analysis29
4.0 Present system29
4.1 PROPOSED SYSTEM30
4.1.1 DESCRIPTION OF STEGNOGRAPHY30
4.2 FEASIBILITY STUDY31
4.2.1 ANALYSIS OF THE FEASIBILITY OF STEGNOGRAPHY31
4.2.2 ANALYSIS FEASIBILITY IN CASE OF ECONOMY32
CHAPTER 534
DATA FLOW DIAGRAMS34
5.0 INTRODUCTION34
5.1 DATA FLOW DIAGRAM34
CHAPTER 636
SYSTEM IMPLEMENTATION36
6.0 IMPLEMENTING SOFTWARES36
6.0.1 Web Applications36
6.0.2 Embed36
6.0.3 DE-EMBED36
6.0.4 COMPRESSION36
6.0.5 DE-COMPRESSION36
6.0.6 HELP37
6.1 DIFFERENT FORMATS FOR STEGENOGRAPHY37
6.1.1 BMP IMAGE FILE IN STEGENOGRAPHY37
6.1.2 JPEG IMAGE FILE IN STEGENOGRAPHY37
6.1.3 COMPRESSING DATA IN STEGENOGRAPHY38
CHAPTER 739
7.0 STEGANOGRAPHY WORKING39
CHAPTER 855
8.0 TESTING THE SOFTWARE55
8.0.1 UNIT TESTING55
8.0.3 TOP-TO-DOWN INTEGRATION55
8.0.4 BOTTOM-UP INTEGRATION55
8.0.5 VALIDATION TESTING55
8.0.6 SYSTEM TESTING55
8.1 SUPPORT THE MAINTENANCE OF THE SOFTWARE56
CHAPTER 957
9.1 IMPLEMENTATION OF MINE58
CHAPTER 1059
10. CONCLUSION59
REFERENCES60
Synopsis
My project provides a high level security to the data that is being transmitted from place to the other place. In my project I have used a new method called “Stegnography”. In the method of cryptography the security is provided by just encrypting the data using any encryption algorithms. Where as in the case of Stegnography besides encryption the data is also hidden ...