The project entitled Video Stegnography is the application developed to embed
video file in another video signal. It is concerned with embedding information
in an innocuous cover Speech in a secure and robust manner. This system
makes the Files more secure by using the concepts Stegnography and
Stegnography, poor cous
in of Cryptography is the art of hiding messages inside
other messages such that the very existence of the message is unknown to third
party. The goal of cryptography is to make data unreadable by a third party, the
goal of Stegnography is to hide the data
from a third party Through the use of
advanced computer software, authors of images and software can place a hidden
trademark in their product, allowing them to keep a check on piracy. This is
commonly known as watermarking. Hiding serial numbers or a set
that distinguishes an object from a similar object is known as finger printing.
Together, these two are intended to fight piracy. The latter is used to detect
copyright violators and the former is used to prosecute them. But these are only
xamples of the much wider field of Stegnography.
The cover data should not be significantly degraded by the embedded data, and
the embedded data should be as imperceptible as possible. The embedded data
should be as immune as possible to modifications fr
om intelligent attacks or
anticipated manipulations. Thus it is necessary that the hidden message should
Stenography is not actually a method of encrypting messages, but hiding them
within something else to enable them to pass un
detected. Traditionally this was
achieved with invisible ink, microfilm or taking the first letter from each word of
a message. This is now achieved by hiding the message within a graphics or
sound file. For instance in a 256
greyscale image, if the least
significant bit of
each byte is replaced with a bit from the message then the result will be
indistinguishable to the human eye. An eavesdropper will not even realize a
message is being sent. This is not cryptography however, and although it would
fool a h
uman, a computer would be able to detect this very quickly and
reproduce the original message.
In the case of using this technique of hiding the data with an image file, the
visibility of the image, resolution or clarity is not being affected. The hidden d
can be of length in size. To the Hacker, only the image is make going to be
visible when previewed and not a trace of the hidden data.
If the image file is opened across a text editor, then also the data is not going to
be visible as the information is
stored in an encryption form, which is also
binary. Hence making it difficult for the enclosure to differentiate the data to the
In the traditional architecture there existed only the server and the client. In
the server was only a data base server that can only offer data.
Therefore majority of the business logic i.e., validations etc. had to be placed on
the clients system. This makes maintenance expensive. Such clients are called
as ‘fat clients’. This also m
eans that every client has to be trained as to how to
use the application and even the security in the communication is also the factor
to be considered.
Since the actual processing of the data takes place on the remote client the data
has to be transporte
d over the network, which requires a secured format of the
transfer method. How to conduct transactions is to be controlled by the client
and advanced techniques implementing the cryptographic standards in the
executing the data transfer transactions. Pres
ent day transactions are
considered to be "un
trusted" in terms of security, i.e. they are relatively easy to
be hacked. And also we have to consider the transfer the large amount of data
through the network will give errors while transferring. Nevertheles
data transfer is to be carried out even if there is lack of an alternative.
security in the existing system is the motivation factor for a new system with
level security standards for the information exchange.
e proposed system should have the following features. The transactions
should take place in a secured format between various clients in the network. It
provides flexibility to the user to transfer the data through the network very
easily. It should also id
entify the user and provide the communication according
to the prescribed level of security with transfer of the file requested and run the
required process at the server if necessary. In this system the data will be
sending through the network as a video
file. The user who received the file will
do the operations like de embedding, and decryption in their level of hierarchy
SYSTEM REQUIREMENT SPECIFICATION
The system deals with security during transmission of data. Commonly used
cryptography. This system deals with implementing security
using Stegnography. In this the end user identifies an image, which is going to
act as the carrier of data. The data file is also selected and then to achieve
greater speed of transmission the dat
a file and image file are compressed and
sent. Prior to this the data is embedded into the image and then sent.
The image if hacked or interpreted by a third party user will open up in any
image previewed but not displaying the data. This protects the data
invisible and hence be secure during transmission.
The user in the receiving end uses another piece of code to retrieve the data
from the image.
The Modules of the system are:
1) Tiny Algorithm Implementation Module
3) GUI Module
Tiny Encryption Algorithm:
The Tiny Encryption Algorithm (TEA) is a cryptographic algorithm designed to
minimize memory footprint and maximize speed. It is a Feistel
type cipher that
uses operations from mixed (orthogonal) algebraic groups. This research
presents the cryptanalysis of the Tiny Encryption Algorithm. In this research we
inspected the most common methods in the cryptanalysis of a block cipher
EA seems to be highly resistant to differential cryptanalysis, and
achieves complete diffusion (where a one bit difference in the plaintext will
cause approximately 32 bit differences in the cipher text) after only six rounds.
Time performance on a modern
desktop computer or workstation is very
As computer systems become more pervasive and complex, security is
increasingly important. Cryptographic algorithms and protocols constitute the
central component of systems that protect network transmiss
ions and store
data. The security of such systems greatly depends on the methods used to
manage, establish, and distribute the keys employed by the cryptographic
techniques. Even if a cryptographic algorithm is ideal in both theory and
strength of the algorithm will be rendered useless if the
relevant keys are poorly managed.
The following notation is necessary for our discussion.
• Hexadecimal numbers will be subscripted with “
,” e.g., 10 = 16.
Bitwise Shifts: The logical shift of
bits is denoted by
x << y
. The logical
right shift of
bits is denoted by
x >> y.
Bitwise Rotations: A left rotation of
bits is denoted by
x <<< y
. A right
bits is denoted by
x >>> y.
OR: The operation of a
ddition of n
tuples over the field (also known as
or) is denoted by
The Tiny Encryption Algorithm is a Feistel type cipher that uses operations from
mixed (orthogonal) algebraic groups. A dual shift causes all bits of the data and
be mixed repeatedly. The key schedule algorithm is simple; the 128
key K is split into four 32
bit blocks K = ( K, K, K, K). TEA seems to
be highly resistant to differential cryptanalysis and achieves complete diffusion
(where a one bit dif
ference in the plaintext will cause approximately 32 bit
differences in the cipher text). Time performance on a workstation is very
Block ciphers where the cipher text is calculated from the plain text by repeated
application of the same trans
formation or round function. In a Feistel cipher, the
text being encrypted is split into two halves. The round function, F, is applied to
one half using a sub key and the output of F is (exclusive
ed (XORed)) with
the other half. The two halves are then
swapped. Each round follows the same
pattern except for the last round where there is often no swap. The focus of this
thesis is the TEA Feistel Cipher.
The inputs to the encryption algorithm are a plaintext block and a key K .The
plaintext is P = (Left
, Right) and the cipher text is C = (Left,
Right). The plaintext block is split into two halves, Left and Right.
Each half is used to encrypt the other half over 64 rounds of processing and then
combine to produce the cipher text block.
• Each round
has inputs Left[
1] and Right[
1], derived from the previous
round, as well as a sub key K[
] derived from the 128 bit overall K.
• The sub keys K[
] are different from K and from each other.
• The constant delta =(5
h , is derived from the golden
number ratio to ensure that the sub keys are distinct and its precise value has
no cryptographic significance.
• The round function differs slightly from a classical Fiestel cipher structure in
that integer addition modulo
2³² is used instead of exclusive
or as the combining
Above Figure presents the internal details of the
th cycle of TEA. The round
function, F, consists of the key addition, bitwise XOR and left and right shift
operation. We can describe the
+1] , Right[
+1] ) of the
of TEA with the input (Left[
] ) as follows
1] = Left[
] F ( Right[
], K [0, 1], delta[
+1] = Right[
] F ( Right[
+1], K [2, 3], delta[
] = (
+1)/2 * delta,
The round function, F, is defined by
] ) = ((M << 4) K[
((M >> 5) K[
The round function has the same general structure for each round but is
parameterized by the round sub key K[
]. The key schedule algorithm is simple;
bit key K is split into four 32
bit blocks K = ( K, K, K, K).
The keys K and K are used in the odd rounds and the keys K and K
are used in even rounds.
Decryption is es
sentially the same as the encryption process; in the decode
routine the cipher text is used as input to the algorithm, but the sub keys K[
are used in the reverse order.
Figure presents the structure of the TEA decryption routine. The intermediate
of the decryption process is equal to the corresponding value of the
encryption process with the two halves of the value swapped. For example, if the
output of the nth encryption round is
] || ERight[
] concatenated with ERight[
the corresponding input to the (64
)th decryption round is
] || DLeft[
] concatenated with DLeft[
After the last iteration of the encryption process, the two halves of the output
are swapped, so that the cipher text is ERight
|| ELeft, the output of
that round is the final cipher text C. Now this cipher text is used as the input to
the decryption algorithm. The input to the first round is ERight || ELeft,
which is equal to the 32
bit swap of the output of the 64
round of the
Stegnography is art of hiding information in ways that prevent the detection of
hidden messages. Stegnography
derived from Greek, literally means “Covered
Writing”. It includes a vast array of secret communications methods that conceal
the message’s very existence. Theses methods are including invisible inks,
microdots, character arrangement, digital signature, a
nd covert channels and
spread spectrum communications.
In this technology, the end user identifies an video file, which is going to act as
the carrier of data. The data file is also selected and then to achieve greater
speed of transmission the data file a
nd video file are sent. Prior to this the data
is embedded into the video and then sent. The image if hacked or interpreted by
a third party user will open up in any video player but not displaying the data.
This protects the data from being invisible and
hence is secure during
transmission. The user in the receiving end uses another piece of code to
retrieve the data from the video file.
The module deals with identifying the hidden data in the video file. The module
receives the video file that is then bro
wsed to remove the associated data. The
data is then removed from the video file.
This module deals with identifying the data and the image to embed the data
into the image before it can be transmitted. This is then followed by compression
increase the rate of transfer of files between the networks.
The module opens by prompting the user to identify the file that need to be
transmitted across the network. The file is then selected using the GUI interface
provided through JAVA. The module the
n prompts to identify the image file,
which needs to house the data file. The developed system will provide support to
select and embed data into .bmp & .jpg files. The selected image file is then
previewed before it can house the data. The data is then em
bedded into the
image file in such a way that the image file is not corrupted; at the same time
the data is secure. The image if hacked or interrupted by a third party can be
viewed in any browser without actually displaying the data. The data on the
vers end is isolated and removed from the image.
The module deals with identifying the hidden data in the image. The module
receives the image file that is decompressed and decompresses it using JAVA
UTILITY PACKAGE. The decompressed file is then previewed
to view the image
file. The image file is then browsed to remove the associated data. The data is
then removed from the image file.
Graphical User Interface:
This project is developed using graphics in java swings. The options available
are displayed in a menu format, like in an online editor. Clicking on any
particular menu item through mouse or through keyboard a dropdown menu is
displayed, listing all the o
ptions available under that menu item and the user can
select the needed actions according to their wish.
Windows NT/2000 (Client/Server).
end: Java J2SDK 1.5, Swings.
Pentium III Processor with 700 MHz Clock Speed
256 MB RAM 20 GB HDD, 32 Bit PCI Ethernet Card.