VideoStegnography (Synopsis) @mumbai Academics
VideoStegnography (Synopsis) @mumbai Academics
VideoStegnography (Synopsis) @mumbai Academics
ABSTRACT
Project name:
Video Stegnography
The project entitled Video Stegnography is the application developed to embed an video file in another video signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Stegnography and Cryptography. Stegnography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of Stegnography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of Stegnography.
The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations. Thus it is necessary that the hidden message should be encrypted.
STEGNOGRAPHY Stenography is not actually a method of encrypting messages, but hiding them within something else to enable them to pass undetected. Traditionally this was achieved with invisible ink, microfilm or taking the first letter from each word of a message. This is now achieved by hiding the message within a graphics or sound file. For instance in a 256-greyscale image, if the least significant bit of each byte is replaced with a bit from the message then the result will be indistinguishable to the human eye. An eavesdropper will not even realize a message is being sent. This is not cryptography however, and although it would fool a human, a computer would be able to detect this very quickly and reproduce the original message. In the case of using this technique of hiding the data with an image file, the visibility of the image, resolution or clarity is not being affected. The hidden data can be of length in size. To the Hacker, only the image is make going to be visible when previewed and not a trace of the hidden data. If the image file is opened across a text editor, then also the data is not going to be visible as the information is stored in an encryption form, which is also binary. Hence making it difficult for the enclosure to differentiate the data to the image file.
Existing System
In the traditional architecture there existed only the server and the client. In most cases the server was only a data base server that can only offer data. Therefore majority of the business logic i.e., validations etc. had to be placed on the clients system. This makes maintenance expensive. Such clients are called as fat clients. This also means that every client has to be trained as to how to use the application and even the security in the communication is also the factor to be considered.
Since the actual processing of the data takes place on the remote client the data has to be transported over the network, which requires a secured format of the transfer method. How to conduct transactions is to be controlled by the client and advanced techniques implementing the cryptographic standards in the executing the data transfer transactions. Present day transactions are
considered to be "un-trusted" in terms of security, i.e. they are relatively easy to be hacked. And also we have to consider the transfer the large amount of data through the network will give errors while transferring. Nevertheless, sensitive data transfer is to be carried out even if there is lack of an alternative. Network security in the existing system is the motivation factor for a new system with higher-level security standards for the information exchange.
Proposed System The proposed system should have the following features. The transactions should take place in a secured format between various
clients in the network. It provides flexibility to the user to transfer the data through the network very easily. It should also identify the user and provide the communication according to the prescribed level of security with transfer of the file requested and run the required process at the server if necessary. In this system the data will be sending through the network as a video file. The user who received the file will do the operations like de embedding, and decryption in their level of hierarchy etc.
The system deals with security during transmission of data. Commonly used technologies are cryptography. This system deals with implementing security using Stegnography. In this the end user identifies an image, which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent. The image if hacked or interpreted by a third party user will open up in any image previewed but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image. Module Description
The Tiny Encryption Algorithm (TEA) is a cryptographic algorithm designed to minimize memory footprint and maximize speed. It is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. This research presents the cryptanalysis of the Tiny Encryption Algorithm. In this research we inspected the most common methods in the cryptanalysis of a block cipher algorithm. TEA seems to be highly resistant to differential cryptanalysis, and achieves complete diffusion (where a one bit difference in the plaintext will cause approximately 32 bit differences in the cipher text) after only six rounds. Time performance on a modern desktop computer or workstation is very impressive. As computer systems become more pervasive and complex, security is increasingly important. Cryptographic algorithms and protocols constitute the central component of systems that protect network transmissions and store data. The security of such systems greatly depends on the methods used to manage, establish, and distribute the keys employed by the cryptographic techniques. Even if a cryptographic algorithm is ideal in both theory and implementation, the strength of the algorithm will be rendered useless if the relevant keys are poorly managed. The following notation is necessary for our discussion. Hexadecimal numbers will be subscripted with h, e.g., 10 = 16. h Bitwise Shifts: The logical shift of x by y bits is denoted by x << y. The logical right shift of x by y bits is denoted by x >> y. Bitwise Rotations: A left rotation of x by y bits is denoted by x <<< y. A right rotation of x by y bits is denoted by x >>> y.
Exclusive-OR: The operation of addition of n-tuples over the field (also known as 2F exclusive-or) is denoted by xy. The Tiny Encryption Algorithm is a Feistel type cipher that uses operations from mixed (orthogonal) algebraic groups. A dual shift causes all bits of the data and key to be mixed repeatedly. The key schedule algorithm is simple; the 128-bit key K is split into four 32-bit blocks K = ( K[0], K[1], K[2], K[3]). TEA seems to be highly resistant to differential cryptanalysis and achieves complete diffusion (where a one bit difference in the plaintext will cause approximately 32 bit differences in the cipher text). Time performance on a workstation is very impressive. Block ciphers where the cipher text is calculated from the plain text by repeated application of the same transformation or round function. In a Feistel cipher, the text being encrypted is split into two halves. The round function, F, is applied to one half using a sub key and the output of F is (exclusive-or-ed (XORed)) with the other half. The two halves are then swapped. Each round follows the same pattern except for the last round where there is often no swap. The focus of this thesis is the TEA Feistel Cipher.
The inputs to the encryption algorithm are a plaintext block and a key K .The plaintext is P = (Left[0], Right[0]) and the cipher text is C = (Left[64], Right[64]). The plaintext block is split into two halves, Left[0] and Right[0]. Each half is used to encrypt the other half over 64 rounds of processing and then combine to produce the cipher text block.
Each round i has inputs Left[i-1] and Right[i-1], derived from the previous round, as well as a sub key K[i] derived from the 128 bit overall K. The sub keys K[i] are different from K and from each other. The constant delta =(51/2-1)*231 =9E3779B h , is derived from the golden number ratio to ensure that the sub keys are distinct and its precise value has no cryptographic significance. The round function differs slightly from a classical Fiestel cipher structure in that integer addition modulo 2 is used instead of exclusiveor as the combining operator.
Above Figure presents the internal details of the ith cycle of TEA. The round function, F, consists of the key addition, bitwise XOR and left and right shift operation. We can describe the output (Left[i +1] , Right[i +1] ) of the ith cycle of TEA with the input (Left[i] ,Right[i] ) as follows Left [i+1] = Left[i] F ( Right[i], K [0, 1], delta[i] ), Right [i +1] = Right[i] F ( Right[i +1], K [2, 3], delta[i] ), delta[i] = (i +1)/2 * delta, The round function, F, is defined by
F(M, K[j,k], delta[i] ) = ((M << 4) K[j]) (M delta[i] ) ((M >> 5) K[k]). The round function has the same general structure for each round but is parameterized by the round sub key K[i]. The key schedule algorithm is simple; the 128-bit key K is split into four 32-bit blocks K = ( K[0], K[1], K[2], K[3]). The keys K[0] and K[1] are used in the odd rounds and the keys K[2] and K[3] are used in even rounds.
Decryption is essentially the same as the encryption process; in the decode routine the cipher text is used as input to the algorithm, but the sub keys K[i] are used in the reverse order. Figure presents the structure of the TEA decryption routine. The intermediate value of the decryption process is equal to the corresponding value of the encryption process with the two halves of the value swapped. For example, if the output of the nth encryption round is ELeft[i] || ERight[i] (ELeft[i] concatenated with ERight[i]). Then the corresponding input to the (64-i)th decryption round is DRight[i] || DLeft[i] (DRight[i] concatenated with DLeft[i]).
After the last iteration of the encryption process, the two halves of the output are swapped, so that the cipher text is ERight[64] || ELeft[64], the output of that round is the final cipher text C. Now this cipher text is used as the input to the decryption algorithm. The input to the first round is ERight[64] || ELeft[64], which is equal to the 32-bit swap of the output of the 64th round of the encryption process. Stegnography Module:
Stegnography is art of hiding information in ways that prevent the detection of hidden messages. Stegnography derived from Greek, literally means Covered Writing. It includes a vast array of secret communications methods that conceal the messages very existence. Theses methods are including invisible inks, microdots, character arrangement, digital signature, and covert channels and spread spectrum communications. In this technology, the end user identifies an video file, which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and video file are sent. Prior to this the data is embedded into the video and then sent. The image if hacked or interpreted by a third party user will open up in any video player but not displaying the data. This protects the data from being invisible and hence is secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the video file.
The module deals with identifying the hidden data in the video file. The module receives the video file that is then browsed to remove the associated data. The data is then removed from the video file. Data Embed: This module deals with identifying the data and the image to embed the data into the image before it can be transmitted. This is then followed by compression to increase the rate of transfer of files between the networks. The module opens by prompting the user to identify the file that need to be transmitted across the network. The file is then selected using the GUI interface provided through JAVA. The module then prompts to identify the image file, which needs to house the data file. The developed system will provide support to select and embed data into .bmp & .jpg files. The selected image file is then previewed before it can house the data. The data is then embedded into the image file in such a way that the image file is not corrupted; at the same time the data is secure. The image if hacked or interrupted by a third party can be viewed in any browser without actually displaying the data. The data on the receivers end is isolated and removed from the image. The module deals with identifying the hidden data in the image. The module receives the image file that is decompressed and decompresses it using JAVA UTILITY PACKAGE. The decompressed file is then previewed to view the image file. The image file is then browsed to remove the associated data. The data is then removed from the image file. Graphical User Interface:
This project is developed using graphics in java swings. The options available are displayed in a menu format, like in an online editor. Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed, listing all the options available under that menu item and the user can select the needed actions according to their wish.
SOFTWARE REQUIREMENT
System Configuration
Software Requirements:
Operating System Windows NT/2000 (Client/Server). Software requirements
HARDWARE REQUIREMENT
Hardware Requirements: System Configuration Pentium III Processor with 700 MHz Clock Speed 256 MB RAM 20 GB HDD, 32 Bit PCI Ethernet Card.