INTRODUCTION
Steganography is a subject, which is rarely touched upon by most IT security Enthusiasts. Steganography is the practice of hiding private or sensitive information within an ordinary message.Steganography comes from the Greek words stegeno(covered) and Graptos(writing). The most important use of Steganography is to hide a file inside another file.
WORKING OF SYSTEM
There has been some work done in the field of audio Steganograpy, particularly in binary encoding. One scheme to encode binery information in a WAV file involves encoding each bit of the message in the lowest bit of several bit of several carried “block” in file. According to the scheme, one out of every few sample will carry one bit of the message in its lowest bit. We extended the scheme and implemented our own version of it.
• As the rate cyber crime has increased in the world of computer transfer confidential data has become very insecure.
• Our system aims at providing High end security by transferring data from source Lachine to destination Machine.
• Our system can be considered reliable because we are storing data in every unique manner in a sound file sending large amount of information.
• Some security systems break the data into smaller fragments and then transfer the data from one location to another. This strategy is implied because even if the data falls on wrong hands they will not possess the complete data.
•
By considering the above requirements
we are trying to design a system which is reliable as well as allow user to
transmit large amount of data in a secure manner over the network.
Advantage Of New System
• A watermark is embedded into the original image
• Watermark is extract at the receiver to help retrieving the lost image content
• Watermark embedding and image restoration must satisfy the best
• compromise of three main parameters
• The quality of the watermarked image (PSNR)
• The quality of restored image in tampered area (PSNR)
•
Tolerable tampering rate (percent)
· Steganography is different than cryptography and watermarking although they all have overlapping usages in the information hiding processes. Steganography security hides the knowledge that there is information in the cover medium, where cryptography revels this knowledge but encodes the data as cipher-text and disputes decoding it without permission; i.e., cryptography concentrate the challenge on the decoding process while steganography adds the search of detecting if there is hidden information or not.
· Watermarking is different from steganography in its main goal. Watermarking aim is to protect the cover medium from any modification with no real emphasis on secrecy. It can be observed as steganography that is concentrating on high robustness and very low or almost no security.
To hide confidential information steganography can be effectively used. The objective of any Steganography method is to hide maximum secret information.
Which is immune to external attacks and also should not convey the fact that the cover medium is carry secret information. This thesis has used LSB substitution technique for time domain and different transforms for frequency domain.
However, there are a few situations where using the other encoding methods could be advantageous. Since steganography relies on security through obscurity, the novelty of the non-binary method makes it desirable in terms of keeping a loaded cover discrete.
Can do
ReplyDelete