DESIGN AND IMPLEMENTATION OF A DATA PRIVACY SYSTEM USING STEGANOGRAPHY

ABSTRACT 
Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security of data using Steganography. In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is encrypted and authenticated. This message is hidden in the image. The image if hacked or intercepted by a third party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image. 

CHAPTER ONE 
INTRODUCTION 
1.1 BACKGROUND TO THE STUDY 
As a result of the continuously growing number of internet users, complexities have surfaced about the mechanisms to securely store and/or transmit such enormous user data, facing more challenges in terms of data storage and transmission over the internet, for example information like Account number, Bank Verification Number (BVN), password etc. Hence, in order to provide a better security mechanism, this project work proposed a data hiding technique called steganography along with the technique of encryption-decryption. 

Steganography is the art and science of hiding data into different carrier files such as text, audio, images, video, etc. (Goudar, Prashant, Aniket, Sanyog & Abhay, 2012). 

The need to send a message as securely and as safely as possible has been the point of discussion since long time. Information is the assets of any association. This makes security-issues main concern to an association dealing with secret information. Whatever is the process we select for the security point, the strong concern is the level of security. Steganography is the ability of covered or hidden writing (Rucha & Amit, 2014). 

The word steganography is derived from the Greek words 

“stegos” meaning “cover” and “grafia” meaning “writing”. 

The art of hiding a message, image, or file within another message, image, file or video is known as Steganography. Steganography is used to reveal the information which is hidden in an audio or video file. To control the hiding process a stego-key is used so as to limit the detection or recovery of fixed data (Harleen & Surinder, 2015). 

Fig. 1.1 Basic Steganography Model 

The basic model of steganography consists of cover object, message, embedding algorithm and Stego key. The model for steganography is shown in Figure 1. 

Cover object is also known as a carrier, which hides the message and serves to hide its presence. Digital images, videos, sound files, and other PC files that hold perceptually irrelevant or redundant information can be used as ―covers or carriers to hide secret data. After embedding a secret data into the cover-object, a so-called stego- object is obtained. At the receiver end, by applying an extraction algorithm we can retrieved the secrete message from stego object (Rucha & Amit, 2014). 

In this project work using the technique of hiding the data with an image file, the visibility of the image, resolution or clarity is not being affected. The hidden data can be of length in size. To the hacker, only, the image is going to be visible when previewed and not a trace of the hidden data. If the image file is opened across a text editor, then also the data is not going to be visible as the information is stored in an encryption form, which is also binary, hence making it difficult for the enclosure to differentiate the data to the image file (Ravi & Murti, 2011). 

PROBLEM STATEMENT 
Since hiding messages using cryptography seems to be prone to ‘ease’ of cryptanalysis (although, relatively), it becomes very important that we employ a more secure mechanism (steganography in this case) which hides texts in carriers such as pictures. This work is about the implementation of image steganography for a more secure data transfer, especially over the internet using Least Significant Bit (LSB) technique. Using this technique to implement image steganography is believed to be a sure antidote and feasible panacea to the security challenges posed by cryptography. 

AIM AND OBJECTIVES 
• To carry out a critical review of the concept of information security. 

• To carry out a thorough survey of the various steganography types we have. 

• To carry out an elaborate investigation into image steganography. 

SIGNIFICANCE OF THE PROJECT 
Due to the incessant problem of security breach faced during information exchange (between a sender and a receiver), there is a need to devise a means of communicating secretly which will help in overcoming this menace of insecurity encountered during data transfer. 

With steganography, it will take an intruder a life time trying to reveal the message protected by the user. In other words, the security of the message is unarguably guaranteed. 

SCOPE AND LIMITATION OF THE STUDY 
This application hides data or information inside images (in a process called steganography) using Bitmap image (.bmp format) or JPG (.jpg) or gif format as its carrier file. 

However; 

• Only texts can be hid using this method; while other data forms may not work with it. 

• Password have to be shared which can be hacked and used. 

• Have to manually send the image to receiver. 

DEFINITION OF TERMS/ACRONYMS USED 
Audio/Video: is similar to the two techniques above, only that is uses audio/video as a cover object to hide the existence of data. 

Images Steganography: is the widely used as a cover object to hide data due to high redundancy number of bits. 

LSB: Least Significant Bits 

Protocol: this is the techniques of hiding the existence of data by embedding the data within a message and network protocols used in network transmission. 

ORGANIZATION OF REPORT 
This project work is divided into five (5) chapters and the descriptions of each are given below: 

Chapter one: This seeks to give an introduction to the above topic of consideration. 

• Chapter two: This chapter contains the literature review. 

• Chapter three: This is the general analysis of the system and the methodology employed. 

• Chapter four: This embodies the implementation and documentation of the newly designed system 

• Chapter five: This chapter contains the summary of the entire project, recommendation and conclusion.

For more Computer Science Projects click here
================================================================
Item Type: Project Material  |  Size: 58 pages  |  Chapters: 1-5
Format: MS Word   Delivery: Within 30Mins.
================================================================

Share:

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.

Search for your topic here

See full list of Project Topics under your Department Here!

Featured Post

HOW TO WRITE A RESEARCH HYPOTHESIS

A hypothesis is a description of a pattern in nature or an explanation about some real-world phenomenon that can be tested through observ...

Popular Posts