Data hiding system
#1

[attachment=12197]
INTRODUCTION
1.1 PROBLEM DEFINITION
:
We are of the belief that the easiest way to keep something from interfering eyes is to place it right in front of the person looking for it and make it look as innocuous as possible.
Everyone has a taste for a certain kind of music. Hence, it is more than likely that the person will have that kind of music on the storage device of his computer. Also, it is quite common case where people share and transfer different music files to one another. If one were able to hide the message can be.
Our aim is to come up with a technique of hiding the message in the image file in such a way, that there would be no large changes in the image file after the message insertion. At the same time, if the message is hidden were encrypted, the level of security would be raised to quite a satisfactory level. Now, even if the hidden message were to be discovered the person trying to get the message would only be able to lay on his hands on the encrypted message with no way of being able to decrypt it.
CHAPTER 2
LITERATURE REVIEW

2.1 INTRODUCTION
There are several data hiding techniques available today. In each technique,
the host data type is fixed, but the embedded data type can be varied as per requirement. Data hiding technique should be capable of embedding data in a host signal with the following restrictions and features:
 The host signal should be non objectionably degraded and the embedded data should be minimally perceptible. What that means is that the observer should not be able to notice the presence of the data even if it were perceptible.
 The embedded data should be directly encoded into the media rather than into a header or a wrapper so that the data remain intact across varying data file formats.
 The embedded data should be protected to modifications ranging from intentional and intelligent attempts of removal to anticipated manipulations e.g. channel noise, re-sampling, cropping, etc.
 Asymmetrical coding of the embedded data is desirable, since the purpose of data hiding is to keep the data in the host signal but not necessarily to make the data difficult to access.
 The embedded data should be self clocking or arbitrarily re-entrant. This ensures that the embedded data can be recovered even when only fragments of information are available.

2.1.1 Goals of the System
The goal of this project is to embed textual information into a popular media using steganography. It can be assume that the text is relatively short when compared to the media file. A good example of this is the relationship between a recoded song, and its lyrics. The image file containing the recording is much larger than the song lyrics stored as a plain ASCII files. Therefore it is probably safe to assume that the smaller file could be steganographically embedded into the larger one without impacting the quality. Similar argument could be made about video data and close capturing information.
This project concentrates on the song/lyrics dynamics in order to create a steganographically driven karaoke machine. The song lyrics will be impeccably embedded into an image file, and then displayed on the screen when the file is played. This research will include implementation of steganographic algorithm for encoding data inside image files, as it technique to dynamically extract the data and play it back.
CHAPTER 3
SYSTEM ANALYSIS
3.1 EXISTING SYSTEM:

Now a days, several methods are used for communicating confidential messages for defense purposes or in order to ensure the privacy of communication between two parties. So we go for hiding information in ways that prevent its detection.
Some of the methods used for privacy communication are the use of invisible links; covert channels are some of existing systems that are used to convey the messages.
Since at present everything is done manually, it is having a lot of drawbacks. The major Drawback of the present system is the bulk amount of physical volume of the data making information search and retrieval is tedious Process. There are chances for damage of papers containing information. So this process is time consuming process.
Drawbacks
• Increased time
• Low accuracy
• High labour charges
• Increased uncertainty
• Data security is les
3.2 PROPOSED SYSTEM:
The proposed system uses Image file as a carrier medium which add another step in security. The objective of the newly proposed system is to create a system that makes it very difficult for an opponent to detect the existence of a secret message by encoding carrier medium as a function of some secret key and that remains as the advantage of this system.
This system have several advantages over the existing system. They are
1. Data security is high.
2. It avoids data redundancy and ensures data integrity.
3. It doesn’t take more labour time.
3.2.1 Feasibility study:
The feasibility of the project is analyzed in this phase and business proposal is set forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential.
Three key considerations involved in the feasibility analysis are
1. Economical feasibility
2. Technical feasibility
3. Social feasibility
1. Economical feasibility:
This study is carried out to check the economic impact for the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved ,because most of the technologies used are freely available. Only the customized products had to be purchased.

2. Technical feasibility:
If study is carried out to check about the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modern requirement, as only minimal or null changes are required for implementing this system.
3. Social feasibility:
The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised ,so that also able to make some constructive criticism, as he is the final user of the system
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: lyrics to, lyrics to interjections schoolhouse, unnamed hymn lyrics, lyrics for who is, www kormo song stan com, this is me lyrics, schoolly d lyrics,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,084 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic To 1 768 14-02-2017, 04:15 PM
Last Post: jaseela123d
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 679 14-02-2017, 11:35 AM
Last Post: ijasti
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,850 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,668 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,836 06-11-2015, 02:27 PM
Last Post: seminar report asees
  DATA LEAKAGE DETECTION project topics 16 13,117 31-07-2015, 02:59 PM
Last Post: seminar report asees
  Privacy Preservation in Data Mining sajidpk123 3 2,974 13-11-2014, 10:48 PM
Last Post: jaseela123d
  projects on data mining? shakir_ali 2 2,047 05-11-2014, 09:30 PM
Last Post: jaseela123d
  data mining full report project report tiger 25 171,236 07-10-2014, 09:10 PM
Last Post: ToPWA

Forum Jump: