Skip to main content

IMAGE STEGANOGRAPHY using visual basic 2010 express (vb.net) bca mca projects

INTRODUCTION

Steganography   is  a  subject,  which  is  rarely  touched  upon  by  most  IT  security  Enthusiasts.  Steganography  is  the  practice  of  hiding  private  or  sensitive information  within  an  ordinary  message.
 Steganography   involves  hiding  information  so  it  appears  that  no  information  is  hidden  at  all.  If  a  person  or  person  view  the  object  that  the  information  is  hidden  of  he  or will  have  no  idea  that  there  is  any  hidden  information  therefore  the  person  will  not  attempt  decrypt  the  information.

Steganography comes from the Greek words stegeno(covered) and Graptos(writing). The most important use of Steganography is to hide a file inside another file.



WORKING OF SYSTEM

There has been some work done in the field of audio Steganograpy, particularly in binary encoding. One scheme to encode binery information in a WAV file involves encoding each bit of the message in the lowest bit of several bit of several carried “block” in file. According to the scheme, one out of every few sample will carry one bit of the message in its lowest bit. We extended the scheme and implemented our own version of it.


                         NEED OF THE SYSTEM


  As the rate cyber crime has increased in the world of computer transfer confidential data has become very insecure.

     Our system aims at providing High end security by transferring data from source Lachine to destination Machine.

     Our system can be considered reliable because we are storing data in every unique manner in a sound file sending large amount of information.

     Some security systems break the data into smaller fragments and then transfer the data from one location to another. This strategy is implied because even if the data falls on wrong hands they will not possess the complete data.

     By considering the above requirements we are trying to design a system which is reliable as well as allow user to transmit large amount of data in a secure manner over the network.

                     


             Advantage Of New System    


        A watermark is embedded into the original image

        Watermark is extract at the receiver to help retrieving the lost image content

        Watermark embedding and image restoration must satisfy the best

        compromise of three main parameters 

        The quality of the watermarked image (PSNR)

        The quality of restored image in tampered area (PSNR)

        Tolerable tampering rate (percent)

 

              Problem Definition                        
 
 
·       Steganography is different than cryptography and watermarking although they all have overlapping usages in the information hiding processes. Steganography security hides the knowledge that there is information in the cover medium, where cryptography revels this knowledge but encodes the data as cipher-text and disputes decoding it without permission; i.e., cryptography concentrate the challenge on the decoding process while steganography adds the search of detecting if there is hidden information or not.
·       Watermarking is different from steganography in its main goal. Watermarking aim is to protect the cover medium from any modification with no real emphasis on secrecy. It can be observed as steganography that is concentrating on high robustness and very low or almost no security. 
 
                                             Conclusion
 

To hide confidential information steganography can be effectively used. The objective of any Steganography method is to hide maximum secret information.
 
Which is immune to external attacks and also should not convey the fact that the cover medium is carry secret information. This thesis has used LSB substitution technique for time domain and different transforms for frequency domain.
 
However, there are a few situations where using the other encoding methods could be advantageous. Since steganography relies on security through obscurity, the novelty of the non-binary method makes it desirable in terms of keeping a loaded cover discrete.


get link by you tube tutorial..........

Comments

Post a Comment

Popular posts from this blog

Make a Simple Antivirus using vb.net

Introduction A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The term "virus" is also commonly used, albeit erroneously, to refer to many different types of malware and adware programs. The original virus may modify the copies, or the copies may modify themselves, as occurs in a metamorphic virus. anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. There are two common methods that an anti-virus software application uses to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. They are heuristic analysis and signature scanning. In signature scanning only single virus can be detected at a time where as in The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-...

Food world supermarket system project doc vb.net

Introduction • It is easy to manage mini markets as the customers entering such stores are less and the items in the inventory too is less. Even with few human resource deployment and paper works, small supermarkets or mini-markets can be effectively managed. But, the case is no so with big supermarkets with tens of thousands of items in various inventories and high traffic flow of customers and retailers. • Gone are those days when a shop owner used to manage all his sales and accounts on paper. This job is now performed with these management tools which not only record the sales but also notify the retailer about the items low in stock. • The reordering of items is also provided by Super Market System. It has an interface to communicate with vendors providing the required goods. • Now let me tell you what happens when the reordered items reach the warehouse. The item is added into the warehouse by reading its bar code through a bar-code scanner and its quan...