Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Network Security using Steganography
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Network Security using Steganography

[attachment=23692]

Introduction

In today’s world communication is the backbone. Various users uses different means of communication with others. Commonly used modes of communications are the mails, chat, upload, download etc. In all these forms of communication data’s security is exposed. Any hacker can try to view the details and some tends to damage the data as well.
Today’s scenario deals with providing security by using technologies such as cryptography or steganography to protect the data from a hacker. These have their own merits and de-merits. CRC is used to detect damages or alterations in data during transmissions. All the above are independent technology each claiming to be better than the other.
The proposed system utilizes their strengths to combine the technologies to develop a user friendly single product that can address both the hackers. It protects as well as detects data corruption. An added strength would be to include compression and decompression to further strengthen the security.

PLAN FOR ACCOMPLISHMENT

The system to developed will be dealt across the following stages :
1. Analysis  Study of the requirement and collection of raw data, 1 week.
2. Design  Prepare the logical design diagrammatically to propose a solution, 10 days.
3. Implementation  Develop the application using the .Net framework., 6 weeks
4. Testing  Test the implementation., 1 week.
The implementation since uses the .net framework, it involves the OOPS methodology. A bottom up approach is used for the solution. The application revolves in the prototype model.

CONCLUSION

The application can be used by various types of users to prevent their data from being hacked. The users can have security in preventing the data from being read or visible at one end. It can also be used to verify the integrity of the data when transmitted across the network. The product can cater any of the users requirement.

NETWORK SECURITY and CRYPTOGRAPHY USING STEGENOGRAPHY


[attachment=24781]

ABSTRACT

In this age of universal electronic connectivity, of viruses and hackers,
of electronic eavesdropping and electronic fraud, there is indeed no time at
which security of information does not matter. The explosive growth of
computer systems and their interconnections via networks has increased the
dependency on the information stored and communication using these
systems. This has led to a heightened awareness of the need to protect the data
transmitted.
Thus the field of cryptography has got more attention nowadays. More
and more complex techniques for encrypting the information are proposed
every now and then. Some advanced encryption algorithms like RSA, DES,
AES etc. which are extremely hard to crack have been developed. But, as
usual, when a small step is made to improve the security, more work is done in
the opposite direction by the hackers to break it. Thus they are able to attack
most of these algorithms and that too, successfully. Even complex algorithms
like RSA are no exception to this.



STEGANOGRAPHY USING PIXEL REPLACEMENT TECHNIQUE


In today’s world of increased security concern in the Internet due to
hacking, strong cryptography techniques are required. But, unfortunately, most
of the cryptography techniques have become vulnerable to attack by the
snoopers. This applies to some of the advanced encryption methods too. So,
the need of the hour is to find new methods for keeping the information secret.
One such method commonly proposed nowadays is ‘Steganography’.


STEGANOGRAPHY DEFINED

Steganography is the art and science of communicating in a way which
hides the existence of the communication. In contrast to cryptography, where
the "enemy" is allowed to detect, intercept and modify messages without being
able to violate certain security premises guaranteed by a cryptosystem, “ the
goal of steganography is to hide messages inside other harmless messages in a
way that does not allow any enemy to even detect that there is a second secret
message present.”

STEGANOGRAPHY IN IMAGES

In essence, image steganography is about exploiting the limited powers
of the human visual system. Within reason, any plain text, ciphertext, other
images, or anything that can be embedded in a bit stream can be hidden in an
image. The common methods followed for hiding data in images are the
‘Least Significant Bit (LSB) Insertion’ technique in which the LSB of the
pixel values are replaced with the data to be encoded in binary form, the
‘Masking Technique’ in which the original bits are masked with data bits and
the ‘Filtering Technique’ in which certain transformations are done on the
image to hide data. The last two techniques hide data by marking an image in
a manner similar to paper watermarks But, there are some drawbacks with
these methods which hinders their use.



Encrypting the Message & Password

First, the original message and the password are got from the user. Then,
they are encrypted using any of the encryption algorithms like RSA, DES
etc.This encryption step is an additional safety feature added to the technique
to ensure maximum safety.Then, this encrypted message is fed as the input to
the next step.

Choosing a position to hide the character

The actual process of steganography starts here. The Image is scanned
from the top row – wise. First few rows are omitted and a suitable row is
reached. The message is split into individual characters. The following process
is repeated for all the characters in the message. A position for hiding the
character is chosen according to some relation with that character. The relation
can be something like the ASCII value of the character, the order of occurence
of that character in the Alphabetical or Reverse order if it is an alphabet etc.