Data Security Using Images PPT 1

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

SRI INDU COLLEGE OF ENGINEERING &

TECHNOLOGY

DATA SECURITY USING


IMAGES

PROJECT GUIDE: PRESENTED BY:


ASHOK N.SRUTHI (18D41A1251)
P.V.ABHINAV
(18D41A1247)
V.SAI DINESH
(19D45A1203)
OBJECTIVE
 The main objective of this project is “security” during
file from one end to another end in Internet and private
network.
 The main concept of this Steganography is to Encrypt a
file and hide it in another media to invisible it ,is
maintained by our project.
 The front end screen of this software will be designed in
java.
 The file will be Encrypted and embedded into an image
then the resultant file is send through the network.
CONTENTS
 Introduction
 What is Steganography?

 History of Steganography

 Basic Steganographic model

 LSB Steganography

 Steganographic tools

 Existing System

 Pros and Cons

 Conclusion
INTRODUCTION

 Transferring a file from one point to another through


Internet we need more file secure concepts.
 Ordinary ,file Encryption –Decryption concepts, which
are readily available in java examples are easily captured
by middle way itself.
 This project helps to send a file from one place to
another in a secured manner.
WHAT IS STEGANOGRAPHY?
 Steganography is the art and science of embedding secret
messages in cover messages in such a way that no one
apart from the sender and intended recipient, suspects
the existence of the message.
HISTORY OF STEGANOGRAPHY
It consists of:
o Steganographic Techniques.

o Steganographic Types.

i. Text Steganography
ii. Image Steganography
iii. Audio Steganography
o Characteristics of Steganography.

a. Transparency

b. Robustness

c. Tamper Resistance
BASIC STEGANOGRAPHIC MODEL
LSB STEGANOGRAPHY:

 LSB Steganography involves overwriting the bit with the


lowest arithmetic value.
 To encode the text into image it loads an image and
looks at each pixels in hexadecimal value.
 Converts secret text into bits and stores them in LSB of
pixels bits.
 A delimiter is added to the end of the edited pixel values.
DECODE THE TEXT FROM IMAGE

 LSB consists of Pixels and Bits.


 While retrieving all the 0’s and 1’s extracted until
delimiter is found.
 Extracted bits are converted into string.
EXISTING SYSTEM

 For transmitting a file from one point to another point


many of us are using Encryption only.
 This can’t provide more security.

 While using steganography for embedded a source file to


an another media they are using watermark embedding.
PROS AND CONS
SYSTEM CONFIGURATION

HARDWARE SYSTEM CONFIGURATION:-


PROCESSOR - INTEL CORE I5
SPEED - 1.1 GHZ
RAM - 6GB(MIN)
HARD DISK - 1TB
KEY BOARD - STANDARD WINDOWS
KEYBOARD
MOUSE - 2 OR 3 BUTTON MOUSE
MONITOR - LED
SOFTWARE SYSTEM CONFIGURATION:-
OPERATING SYSTEM - WINDOWS 10
APPLICATION SERVER - TOMCAT5.0/6.0
FRONT END - HTML,JAVA,
BACKEND. - JSP
DATABASE - MYSQL.
DATABASE CONNECTIVITY - JDBC.
CONCLUSION
THANK
YOU

You might also like