Published on Sep 03, 2023
The system deals with security during transmission of data. Commonly used technology is cryptography. This system deals with implementing security-using Steganography.
In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent.
The image if hacked or interpreted by a third party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image.
Steganography is the art and science of hiding that communication is happening. Classical Steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e.g. a secret key. Because of their invasive nature, steganography systems leave detectable traces within a medium's characteristics.
This allows an eavesdropper to detect media that has been modified, revealing that secret communication is taking place. Although the secrecy of the information is not degraded, its hidden nature is revealed, defeating the main purpose of Steganography.
For JPEG images, Outguess preserves statistics based on frequency counts. As a result, statistical tests based on frequency counts are unable to detect the presence of steganographic content. Before embedding data into an image, Outguess can determine the maximum message size that can be hidden while still being able to maintain statistics based on frequency counts.
Outguess uses generic iterators object to select which bits in the data should be modified. A seed can be used to modify the behavior of the iterators. It is embedded in the data along with the rest of the message. By altering the seed, Outguess tries to find a sequence of bits that minimizes the number of changes in the data that have to be made.
Compression reduces the average code length used to represent the symbols of an alphabet. Symbols of the source alphabet which occur frequently are assigned with short length codes. The general strategy is to allow the code length to vary from character to character and to ensure that the frequently occurring character have shorter codes. In Radix64 compression technique, maps arbitrary input into printable character output.
Graphical User Interface
Data Embed and Retrieve
Compression and Decompression
CRC generation.
CRC Verification
• Minimum 1.1 GHz PROCESSOR should be on the computer .
• 128 MB RAM.
• 20 GB HDD.
• 1.44 MB FDD.
• 52x CD-ROM Drive .
• MONITORS at 800x600 minimum resolution at 256 colors minimum.
• I/O, One or two button mouse and standard 101-key keyboard.
Operating System : window 2000 or XP
Software : jdk 1.4 or above