Synopsis -Video Steganography

Only available on StudyMode
  • Download(s) : 599
  • Published : April 28, 2012
Open Document
Text Preview
VEDIO-STEGNOGRAPHY
Nidhi Pandey <nidhip56@gmail.com> Nupur Solanki <nupursolanki99@gmail.com> Nidhi Pare <nidhipare@gmail.com> IT2 (3rd year)

Name of the Supervisor : Sonal Dubey

ABSTRACT :

Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Steganography and cryptography are both ways to protect information fromun wanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be amplified by combining it with cryptography.

INTRODUCTION :

Since the rise of the Internet one of the most important factors of information technology and communication has been the security of information. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the Greek words “stegos” meaning cover and “grafia” meaning writing defining it as covered writing. In image steganography the information is hidden exclusively in images.  

PROBLEM DOMAIN :
This project attempts to make use of the standard steganographic tool and a modified version of standard encryption algorithm to perform the task of data hiding for the purpose of observing privacy. The user should be able to conceal a text message in an video file without any visible alterations to the video as such i.e. there should not be any noticeable changes to the coloring or the position of the various objects in the video.

SYSTEM DOMAIN :

Software Requirement :
Windows XP, Pentium dual core processor : 1.96GB RAM 20 GB HD

Hardware Requirements :
System Configuration-Pentium(R)Dual Core CPU E5300 @ 2.60GHz 2.60GHz 2.00GB
32 Bit Operating System

APPLICATION DOMAIN :

Steganography is applicable to, but not limited to, the following areas.    1) Confidential communication and secret data storing
   2) Protection of data alteration
   3) Access control system for digital content distribution    4) Media Database systems

1. Confidential communication and secret data storing
The "secrecy" of the embedded data is essential in this area. Historically, steganography have been approached in this area. Steganography provides us with (A) Potential capability to hide the existence of confidential data, (B) Hardness of detecting the hidden (i.e., embedded) data, and (C) Strengthening of the secrecy of the encrypted data.

In practice, when you use some steganography, you must first select a vessel data according to the size of the embedding data. The vessel should be innocuous. Then, you embed the confidential data by using an embedding program (which is one component of the steganography software) together with some key. When extracting, you (or your party) use an extracting program (another...
tracking img