Science Project Topics

Design and Implementation of Digital Image Crypto System With Adaptive Steganography (a Case Study of Office of This Hod Computer Science. Fpno)

Design and Implementation of Digital Image Cypto System With Adaptive Steganography (a Case Study of Office of This Hod Computer Science. Fpno)

Design and Implementation of Digital Image Crypto System With Adaptive Steganography (a Case Study of Office of This Hod Computer Science. Fpno)

CHAPTER ONE

AIM AND OBJECTIVES OF THE STUDY

The objectives of this study are as follows:

  • To create a DIGITAL STEGNOGRAPHY  as a security measure to avoid unauthorized access to a file  that will not only be efficient in monitoring databut enhance secrecy
  • Reduce fraud, insecurity, andemployee privacy system. Based on inputting the vital data, a digital stenography as a security measure
  • Resource Protection: This ensures that only authorized users can access resources on the system.
  • To secure all types of system resources is a system’s strength. The different categories of files that can access one system are defined and what access authorization that should be given to these group of files as part of creating security policy.

CHAPTER TWO

REVIEW OF RELATED LITERATURE

INTRODUCTION

STEGANOGRAPHY UNDER VARIOUS MEDIA

In the following three sections we will try to show how steganography can and is being used through the media of text, images, and audio. Often, although it is not necessary, the hidden messages will be encrypted. This meets a requirement posed by the “Kerckhoff principle” in cryptography. This principle states that the security of the system has to be based on the assumption that the enemy has full knowledge of the design and implementation details of the steganographic system. The only missing information for the enemy is a short, easily exchangeable random number sequence, the secret key. Without this secret key, the enemy should not have the chance to even suspect that on an observed communication channel, hidden communication is taking place. Most of the software that we will discuss later meets this principle.

When embedding data, it is important to remember the following restrictions and features:

1 The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. (This does not mean the embedded data needs to be invisible; it is possible for the data to be hidden while it remains in plain sight.)

2 The embedded data should be directly encoded into the media, rather than into a header or wrapper, to maintain data consistency across formats.

3 The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations such as filtering and resampling.

4 Some distortion or degradation of the embedded data can be expected when the cover data is modified. To minimize this, error correcting codes should be used.

5 The embedded data should be self-clocking or arbitrarily re-entrant. This ensures that the embedded data can still be extracted when only portions of the cover data are available. For example, if only a part of image is available, the embedded data should still be recoverable.

 

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

INTRODUCTION

 Methodology is the study of how to perform scientific research. It is the part of any analysis or research that is used to find to find out about the type of data that is to be maintained, how it is found and how it is recorded. To achieve these SSADM was used which means structured system analysis and design methodology which is an internationally accepted software engineering model mainly used in most result oriented analysis. With this structured system analysis and design methodology which is an internationally accepted software engineering model, I was able to achieve a wonderful and a successful software design and database design which was one of my main purpose of embarking on this project.

Systems are created to solve problems.  One can think of the system approach as an organized way of dealing with a problem.  One can think of the system approach as an organized way of dealing with a problem.  In this dynamic world, the subject system analysis and design mainly deals with the software and development activities.  In system analysis more emphasis is given to understand the details of an existing system or a proposed one and then deciding whether the proposed system is desirable or not and whether the existing system needs improvements.  Thus, system analysis is the process of investigating a system, identifying problems and using the information to recommend improvements to the system.

CHAPTER FOUR

SYSTEM IMPLEMENTATION  

INTRODUCTION

This chapter depicts how the system is designed; it shows the input and output requirement of the system, the hardware and software requirement and other requirements.  It shows a system flowchart that shows how operations are carried out. There is also the training of the staff on how to use the new system that is to be implemented, its documentation, valuation and maintenance.

CHAPTER FIVE: SUMMARY, CONCLUSION AND RECOMMENDATION

SUMMARY

This project provides a GUI, a user friendlier system, where secret information can easily be hided with in a picture file. It attains all futures. It is platform independent so that it can be used in any OS. Thus secret information can be transferred to the intended user without giving any suspicion to the unintended user.

CONCLUSION

Methods of message detection and understanding the thresholds of current technology are under investigation. Success in steganographic secrecy results from selecting the proper mechanisms. However, a stegomedium which seems innocent enough may, upon further investigation, actually broadcast the existence of embedded information. Development in the area of covert data management communications and steganography will continue. Research in building more robust methods that can survive image manipulation and attacks continues to grow. The more information is placed in the public’s reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to recover seemingly destroyed information and steganalysis techniques will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Most data-hiding systems take advantage of human perceptual weaknesses, but have weaknesses of their own. For now, it seems that no system of data-hiding is totally immune to attack.

However, steganography has its place in security. It in no way can replace cryptography, but is intended to supplement it. Its application in watermarking and fingerprinting, for use in detection of unauthorized, illegally copied material, is continually being realized and developed.

RECOMMENDATION

As steganography becomes more widely used in computing there are issues that need to be resolved. There are a wide variety of different techniques with their own advantages and disadvantages.

Many currently used techniques are not robust enough to prevent detection and removal of embedded data. The use of benchmarking to evaluate techniques should become more common and a more standard definition of robustness is required to help overcome this.

REFERENCES

  • Adeqa- Oguban S, E & Iyamu O.,S., 2005. Using Information and Communication Technology in Secondary Schools in Nigeria: Problems and Prospect. Education Technology and Society, 8(1) 104-122. Retrieved from www.ifets.info/journals/8-1/13.pdf on 15the september,2007.
  • Ajadi, T.O et al 2008. E-learning and Distance Education in Nigeria School of Education, National Open University of Nigeria. The Turkish Online journal of Education technology- TOSET October 2008 ISSN. 1303-6521 volume 7 issue 4 article7. Retrieved from www.tozet.net/articles/747.pdf on 3rd May, 2010.
  • Ani, C., O., 2003. Programming with Microsoft Basic. Immaculate publication limited 2 Akus street, Oguii New Layout, Enugu C++ language Tutorial. Published by Juan Soulie. Retrieved from www.eplusplus.com/doc.tutorial on 25th February, 2008.
  • Caurtain, R 2001. The Effectiveness of Streaming video in web-based Instruction Published Doctoral Dissertation. The University of Alabama. In kahn, D.,2002. How Effective is Multimedia in Online train? Retrieved from www.e-leraninggguru.com/papers/multimedie.pdf
  • Former, L.,S., J., 2009. Meeting: 214 e-learning SIG, world library and information congress: 75th IFLA general conference and council, 23-27 August2009, Millian, Italy retrieved from www. Ifi.org/fils/hp/oaoers/ifia75/214-farmer-enpdf on3rd May 2010.
  • Hedgi,N., & Heyward l., 2004. University e-learning Contribution to life-long learning in a networked world. E-learning 1:128-145. Retrieved from www.nationmaster.com.country/internet on 3rd May,2010
  • Kahu, D., 2002. How Effective is Multimedia in an Online Training? Retrieved from www.e-learningguru.com/wpaper/multimedia.pdf
  • Khoo.C.,C., 1994. Interactive Multimedia for Teaching learning and Presentation Retrieved from http:/ww.ascilite.or.all/asses-archives/confs/iims/1994/km/khoo.html on 30th May,2008.