scs image encryption
Post on 10-Apr-2018
237 Views
Preview:
TRANSCRIPT
-
8/8/2019 Scs Image Encryption
1/14
-
8/8/2019 Scs Image Encryption
2/14
Table of Contents1.Introduction
2.Overall Description
3.External Interface Requirements
4.System Features
5.Other Non-Funtional Requirements
6.DFD
7.Conclusion and Future scope
8.References
-
8/8/2019 Scs Image Encryption
3/14
INTRODUCTIONy Steganography is a form ofsecurity through obscurity
y
Image steganography is the most widely used form ofsteganography.
y Two issues regarding steganographic algorithm
y Image distortion followed by steganographic process
y Complexity of the linear transforms used
y SCS image encryption is used to over come these issues
-
8/8/2019 Scs Image Encryption
4/14
SCSImage Encryptiony It is a steganographic technique based on KL transform.
y Input data is compressed using KLT.
- To achieve higher concealing capacity.
y It is hidden in the LSB of carrier object.
y KLT require a great amount of processing time on larger set ofdata.
y This problem is resolved by dividing digital image in to blocks
-
8/8/2019 Scs Image Encryption
5/14
Carrier & Stego Images
y Carrier image is the image chosen for encrypting the secret message(Pay load).
y Stego image is the image formed after encryption.
y Recovered message is the message recovered by the reciever.
-
8/8/2019 Scs Image Encryption
6/14
-
8/8/2019 Scs Image Encryption
7/14
External Interface Requirementsy User Interface
y Contains various screens like Initial screen , login screen, main form,help modules etc.
y Hardware Interfacey 256 Mb of RAM is recommended with a 15 mb of hard disk free space for
running this software.
y Software interfacey Java Run Time environment (JRE 1.5) version for running and operating
systems windows XP or higher is supported.
y Communication interfacey Sending side modules and receiving side modules using TCP/IP protocol are
also developing for safe and secure transmission.
-
8/8/2019 Scs Image Encryption
8/14
System Featuresy Sender side
y Segmentation: Secret message is segmented before compression toachieve concealing capacity and execution time.
y Compression: KL transform based compression technique is usedfor compressing the segmented image. This reduces the energyloses as in the case of DCT.
y Hide image:
-
8/8/2019 Scs Image Encryption
9/14
System Features.Contdy Receiver Side
y Retrieve Message: The receiving module in the receiver side receivesthe sent message and passed for decryption
y Decryption: Decryption is exactly the reverse process of hidingprocess. Extract the hidden data from the LSB of stego image.
-
8/8/2019 Scs Image Encryption
10/14
Other Non Functional
requirementsy Performance
y RAM should be 128 MB, 256 MB is recommended with a minium freespace of 15 MB is required for storage and execution.
y Safetyy The size of the secret message will not exceed the maximum limit,
otherwise the extra data will be truncated.y Security
y First administrator account is created and then admin can create otheruser account. Password reset mechanism is also provided.
y Software quality attributesy Software is developed such that its easy to extend and the software
should be user friendly.y Business rules
y User must satisfy the terms and conditions of the software. It should beused for intended purposes only.
-
8/8/2019 Scs Image Encryption
11/14
Data Flow Diagram
-
8/8/2019 Scs Image Encryption
12/14
Data Flow DiagramLevel 2 DFD
-
8/8/2019 Scs Image Encryption
13/14
Conclusion and Future scopey The SCSA is a powerful algorithm in terms of
y Execution time, concealing capacity, compression rate, stego imageand recovered message quality.
y It is a good candidate for the use on multicore architecture
y It is beneficial in implementing algorithm on mobile deviceswith video and image processing capabilities.
y The algorithm is applicable only to images.
-
8/8/2019 Scs Image Encryption
14/14
Referencesy http://www.jjtc.com/steganography
y en.wikipedia.org/wiki/steganography
y http://www.garykessler.net/library/steganography.html
y http://www.computerworld.com
y Segment Compression Steganographic AlgorithmDaniela Stanescu,Ioan-Gabriel Bucur, Mircea Stratulat,IEEE International JointConferences on Computational Cybernetics and Technical Informatics(ICCC-CONTI 2010) May 27-29, 2010 Timisora, Romania.
top related