You are on page 1of 7

CERTIFICATE OF APPROVAL

The minor project synopsis entitled


Secure Data
Transmission Tool being submitted by SAJAL SAXENA,
PARVEEN KRISHNANTREY AND AMIT KHANDOOJA
has been examined by us and is hereby approved for the
award of degree BACHELOR OF ENGINEERING
(Computer Science and Engineering), for which it has
been submitted. It is understood that by this approval the
undersigned do not necessarily endorse or approve any
statement made, opinion expressed or conclusion drawn
therein, but approve the research work only for the
purpose for which it has been submitted.

Date:
Signature

PURPOSE
The purpose of the project is to create a medium to transfer
data securely from one individual to another . In this project we
embed the message to be passed in to a image using the secure
data transmission tool after encrypting it. Then the image is
passed to where we want the message to be sent. Then the
receiver can retrieve the embedded message from the image.
Secure Data Transmission Tool hides a secret message with in an
image in such a way that others cannot discern the presence or
contents of the hidden message. To others , it just appears as a
normal image . Only the receiver can decrypt the embedded
message using the same tool which hence ensures increased
security measures.

SCOPE
The growing possibilities of modern communications need
the special means of security especially on computer network.
The network security is becoming more important as the amount
of data being exchanged on the Internet is increasing. Security
requirements are necessary both at the final user level and at the
enterprise level, especially since the massive utilization of
personal computers, networks, and the Internet with its
global availability. Due to advances in technology, most of
information is kept electronically. Consequently, the security of
information has become a fundamental issue. One solution to this
problem is,
through the use of secure data transmission tool.

EXISTING SYSTEM
One method of secure data transmission often used in conjunction
with PKI (public key infrastructure) to encrypt and authenticate
large data files, is secure file transfer protocol (FTP). However, it is
not used for transmission between individuals. The technology is
readily available and recommended for organizations transmitting
large amounts of data, such as claims transactions and electronic
remittance advices through clearinghouses. Through the secure
data transmission tool , even individuals can send and receive
important data in the form of encrypted images.

PROPOSED SYSTEM
Secured Data Transmission Tool uses steganography for hiding a
secret message with in an image in such a way that others cannot
discern the presence or contents of the hidden message. A
message might be hidden within an image by changing Least
Significant Bit to be the message bits. Then the image can be
transmitted through Network. LSB based steganography is
perhaps the most simple and straight forward approach. In this
project we embed the message in to the least significant bit
planes of the image. Since this will only affect each pixel by +/- 1,

if at all, it is generally assumed with good reason that degradation


caused by this embedding process would perceptually
transparent.

OBJECTIVE
The project has the following objectives:
1. To create a tool that can be used to hide data inside an
image.
2. The tool should be easy to use and should have a graphical
user interface.
3. The tool should work cross-platform.
4. The tool should be able to retrieve this message afterwards.

APPLICATIONS OF TOOL
Following are some applications of the proposed tool :
1. Web based applications
2. Steganographic Printers
3. Intelligence Services

4. Digital Watermarking
5. Defense

REQUIREMENTS

HARDWARE REQUIREMENTS
The minimum hardware requirements are as follows :
Processor

Pentium IV/AMD Athelon (1.6

RAM
Hard Disk
Monitor

:
:
:

512MB RAM
10GB
Standard Color Monitor

Keyboard
Mouse

GHz)

Standard Keyboard
Standard Mouse

SOFTWARE REQUIREMENTS
The minimum software requirements are as follows :

Operating System
Presentation layer

TOOLS AND TECHNOLOGY USED

:
:

Window 2000, XP
Java awt, Swings

The software tool will be developed in JAVA using Eclipse as the


development environment. The process of implementation will
follow the bottom up approach. So the initial steps will emphasize
on the encryption and decryption . Other functions shall be added
later on. During the implementation process several experiments
will take place giving essential information of the performance
evaluation of finished parts.

GENERAL APPROACH OF THE PROPOSED SYSTEM

REFERENCE
[1] H. Wu , H.Wang , C. Tsai and C. Wang , Reversible image
steganographic
scheme via predictive coding (2010),
ISSN: 01419382 , 35-43.
[2]

J. Corproation , Steganography

http://www.webopedia.com/TERM/S/steganography.html.2005
[3] N Ghoshal , J K Mandal - A steganographic scheme for color
image
authentication ,Recent Trends in IRCTIT 2011, 826831
[4]
Of

E. Cole , Hiding In Plane Sight : Steganography And The Art


Communication, Indianapolis Wiley Publishing , 2003

You might also like