SlideShare a Scribd company logo
Atm Security System
Using Steganography
SUBNITTED BY :- ROHIT MALAV SUBNITTED TO :- LAVISHA SAHU
NETWORK SECURITY LAB
PROJECT PRESENTATION II
Introduction
 While transferring a file from one point to another through
Intranet and Internet we need more file secure concepts.
 Ordinary, file Encryption-Decryption Concepts, which are
readily available in java examples are easily captured by
middle way itself.
 This project helps to send a file from one place to another in
a secured manner
Objective
The main objective of this project is SECURITY during file transmission
from one end to another end both in Internet and private network. The main
concept of Steganography, i.e. Encrypt a file and hide it in another media to
invisible it, is maintained by our project such that our target file will be
encrypted and embedded into an audio or video file then the resultant video
file is send through the network. The front-end screen of this software will be
designed in Java using Swing Concepts.
Steganography is the practice of hiding private or sensitive information
within something that appears to be nothing out of the usual.
Steganography is often confused with cryptography because the two are
similar in the way that they both are used to protect important information.
Steganography comes from the Greek words Steganós (Covered) and
Graptos (Writing).
Steganography
 The art of detecting Steganography is referred to as Steganalysis.
 Steganalysis does not deal with trying to decrypt the hidden information
inside of a file, just discovering it.
 To put it simply Steganalysis involves detecting the use of Steganography
inside of a file.
 The most common use of Steganography is to hide a file inside another
file.
Existing System
 For Transmitting a file from one point to another many of us are using Encryption only.
This will not give that much of security.
 While using Steganography for embedding a source file to an another media they are using
watermark embedding. It is also have its own disadvantages. The resultant file of this
techniques will be change from the source file. Watermark embedding is easily decrypted
by the hackers.
 Encryption and Embedding only is not give that much of security to our communication.
Proposed System
 In our system we are not following the regular encryption, decryption techniques.
 We are Introducing a new algorithm Bit-Shift in Random Cycle Order. I.e. totally 4
different types of Bit-Shift algorithms are used randomly to encrypt the data
 This Encryption is embedded into an Audio or VideoFile.
 Again It will be embedded into another media. This double embedding increases the level
of security.
 Password Protection of this entire works give an additional security.
Module
s
 Connection managerModule
 Merger Module
 Extractor Module
 Result window Module
Merger Module
This Module is front end module and it is designed using
swing. This module gets the inputs from sender. The inputs are
Audio/ video, Image/Text and secret message file with password.
Then merge the all requirements and then send to receiver.
Connection manager Module
The merged file can send from sender or
server to receiver. The UDP protocol can be use
for that networking process.
Extractor Module
This module gets the merged file after a
password verification. Then extract the merged
file and call the result window module to open
extracted file.
Result window Module
This module displays the original secret file
and covered Audio/Video file .
Architecture for Encoding - Transmission
Steganography-Transmission Flow
Steganography - Reception Flow
Hardware Requirements
- PENTIUM III PROCESSOR
- 40 GB
- 15” COLORMONITOR
- 256 MB
- 104 KEYS
 CPU
 HARD DISK SPACE
 DISPLAY
 MAIN MEMORY
 KEYBOARD
 CLOCK-SPEED
 MONITOR -
- 2.6 GHZ
15 ″ SVGACOLOR
Software Requirements
 OPERATING SYSTEM
 BACKEND
 FRONT END
- WINDOWS NT/XP
- MS SQL SERVER 2000
- JAVA(jdk1.6)
Merger
Audio File Select
Video File Select
Text File Select
File Embedding
Client Embedded File Received
Type Password For Encrypted File
Encrypted File Displayed
Atm Security System Using  Steganography Nss ptt by (rohit malav)

More Related Content

DOCX
Web Vulnerability Scanner project Report
PPT
Cloud Computing Security Challenges
PPTX
Directory implementation and allocation methods
PPTX
Off the-shelf components (cots)
PDF
06 Computer Image Verification and Authentication - Notes
PPTX
Digital Data to Digital Signal Conversion
PPTX
Software reverse engineering
PPTX
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
Web Vulnerability Scanner project Report
Cloud Computing Security Challenges
Directory implementation and allocation methods
Off the-shelf components (cots)
06 Computer Image Verification and Authentication - Notes
Digital Data to Digital Signal Conversion
Software reverse engineering
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx

What's hot (20)

PDF
Chapter 4 software project planning
PDF
CSI-503 - 11.Distributed Operating System
PPTX
Iterative model
PPTX
Formal Approaches to SQA.pptx
PPT
Unit 4
DOC
Online Shopping System Test case Writing
PPT
Software Process Improvement
PPTX
Computer Networks - Error Detection & Error Correction
PPT
Designing applications with multimedia capabilities
PPTX
IOT - Design Principles of Connected Devices
PDF
5 job adda doc 2
PDF
Software testing and introduction to quality
PPT
distributed shared memory
PPTX
Implement iot using python
PDF
Experiment no. 1,2 and assignment no.1 cn
PDF
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
PPTX
Network Security Architecture
PPTX
Rain technology
PPTX
Waterfall Model PPT in Software Engineering
Chapter 4 software project planning
CSI-503 - 11.Distributed Operating System
Iterative model
Formal Approaches to SQA.pptx
Unit 4
Online Shopping System Test case Writing
Software Process Improvement
Computer Networks - Error Detection & Error Correction
Designing applications with multimedia capabilities
IOT - Design Principles of Connected Devices
5 job adda doc 2
Software testing and introduction to quality
distributed shared memory
Implement iot using python
Experiment no. 1,2 and assignment no.1 cn
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Network Security Architecture
Rain technology
Waterfall Model PPT in Software Engineering
Ad

Similar to Atm Security System Using Steganography Nss ptt by (rohit malav) (20)

PPTX
Data Security Using Steganography
PPTX
STEGANO FIN RVW with the most efforts to make the final report look good
DOCX
gyu.docx
PDF
PPTX
HACKING
PDF
Data Security Using Audio Steganography
DOC
Multimedia
PDF
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
DOC
Audio Steganography java project
PDF
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
PPTX
“Multimedia Steganography with Cipher Text and Compression ppt.
PPT
Steganography
PPT
83747965 steganography
PPTX
Fyp1 slide presentation 2.1
PPTX
Fyp1 slide presentation 2.1
PPT
Steganography
PDF
Review of Role of Digital Video in Information Security
PDF
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
PDF
Secure Message Transmission using Image Steganography on Desktop Based
PPTX
Fyp1 slide presentation 2
Data Security Using Steganography
STEGANO FIN RVW with the most efforts to make the final report look good
gyu.docx
HACKING
Data Security Using Audio Steganography
Multimedia
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Audio Steganography java project
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
“Multimedia Steganography with Cipher Text and Compression ppt.
Steganography
83747965 steganography
Fyp1 slide presentation 2.1
Fyp1 slide presentation 2.1
Steganography
Review of Role of Digital Video in Information Security
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Secure Message Transmission using Image Steganography on Desktop Based
Fyp1 slide presentation 2
Ad

More from Rohit malav (20)

PPTX
Aca lab project (rohit malav)
PPTX
operating system calls input and output by (rohit malav)
PPTX
Python pandas liberary
PPTX
Presentation by purshotam verma
PPTX
Deep learning in python by purshottam verma
DOCX
Samba server Pts report pdf by Rohit malav
PPTX
System calls operating system ppt by rohit malav
PPTX
A project on spring framework by rohit malav
PPTX
android text encryption Network security lab by rohit malav
PPTX
samba server setup Pts ppt (rohit malav)
PPTX
Spring frame work by rohit malav(detailed)
PPTX
spring framework ppt by Rohit malav
PPTX
Samba server linux (SMB) BY ROHIT MALAV
PPTX
Payroll system ppt1 (rohit malav)
PPTX
Payroll system ppt2 (rohit malav) version point 2
PPTX
ONLINE STUDENT MANAGEMENT SYSTEM
PPTX
digital unlock power point slide
PDF
Rohit android lab projects in suresh gyan vihar
DOCX
Snake report ROHIT MALAV
PPTX
Gyan vihar app
Aca lab project (rohit malav)
operating system calls input and output by (rohit malav)
Python pandas liberary
Presentation by purshotam verma
Deep learning in python by purshottam verma
Samba server Pts report pdf by Rohit malav
System calls operating system ppt by rohit malav
A project on spring framework by rohit malav
android text encryption Network security lab by rohit malav
samba server setup Pts ppt (rohit malav)
Spring frame work by rohit malav(detailed)
spring framework ppt by Rohit malav
Samba server linux (SMB) BY ROHIT MALAV
Payroll system ppt1 (rohit malav)
Payroll system ppt2 (rohit malav) version point 2
ONLINE STUDENT MANAGEMENT SYSTEM
digital unlock power point slide
Rohit android lab projects in suresh gyan vihar
Snake report ROHIT MALAV
Gyan vihar app

Recently uploaded (20)

PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
737-MAX_SRG.pdf student reference guides
PDF
Design Guidelines and solutions for Plastics parts
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPT
Total quality management ppt for engineering students
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PPTX
Software Engineering and software moduleing
Management Information system : MIS-e-Business Systems.pptx
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
737-MAX_SRG.pdf student reference guides
Design Guidelines and solutions for Plastics parts
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
Amdahl’s law is explained in the above power point presentations
Categorization of Factors Affecting Classification Algorithms Selection
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Information Storage and Retrieval Techniques Unit III
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Total quality management ppt for engineering students
CyberSecurity Mobile and Wireless Devices
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
Software Engineering and software moduleing

Atm Security System Using Steganography Nss ptt by (rohit malav)

  • 1. Atm Security System Using Steganography SUBNITTED BY :- ROHIT MALAV SUBNITTED TO :- LAVISHA SAHU NETWORK SECURITY LAB PROJECT PRESENTATION II
  • 2. Introduction  While transferring a file from one point to another through Intranet and Internet we need more file secure concepts.  Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself.  This project helps to send a file from one place to another in a secured manner
  • 3. Objective The main objective of this project is SECURITY during file transmission from one end to another end both in Internet and private network. The main concept of Steganography, i.e. Encrypt a file and hide it in another media to invisible it, is maintained by our project such that our target file will be encrypted and embedded into an audio or video file then the resultant video file is send through the network. The front-end screen of this software will be designed in Java using Swing Concepts.
  • 4. Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect important information. Steganography comes from the Greek words Steganós (Covered) and Graptos (Writing). Steganography
  • 5.  The art of detecting Steganography is referred to as Steganalysis.  Steganalysis does not deal with trying to decrypt the hidden information inside of a file, just discovering it.  To put it simply Steganalysis involves detecting the use of Steganography inside of a file.  The most common use of Steganography is to hide a file inside another file.
  • 6. Existing System  For Transmitting a file from one point to another many of us are using Encryption only. This will not give that much of security.  While using Steganography for embedding a source file to an another media they are using watermark embedding. It is also have its own disadvantages. The resultant file of this techniques will be change from the source file. Watermark embedding is easily decrypted by the hackers.  Encryption and Embedding only is not give that much of security to our communication.
  • 7. Proposed System  In our system we are not following the regular encryption, decryption techniques.  We are Introducing a new algorithm Bit-Shift in Random Cycle Order. I.e. totally 4 different types of Bit-Shift algorithms are used randomly to encrypt the data  This Encryption is embedded into an Audio or VideoFile.  Again It will be embedded into another media. This double embedding increases the level of security.  Password Protection of this entire works give an additional security.
  • 8. Module s  Connection managerModule  Merger Module  Extractor Module  Result window Module
  • 9. Merger Module This Module is front end module and it is designed using swing. This module gets the inputs from sender. The inputs are Audio/ video, Image/Text and secret message file with password. Then merge the all requirements and then send to receiver.
  • 10. Connection manager Module The merged file can send from sender or server to receiver. The UDP protocol can be use for that networking process.
  • 11. Extractor Module This module gets the merged file after a password verification. Then extract the merged file and call the result window module to open extracted file.
  • 12. Result window Module This module displays the original secret file and covered Audio/Video file .
  • 13. Architecture for Encoding - Transmission
  • 16. Hardware Requirements - PENTIUM III PROCESSOR - 40 GB - 15” COLORMONITOR - 256 MB - 104 KEYS  CPU  HARD DISK SPACE  DISPLAY  MAIN MEMORY  KEYBOARD  CLOCK-SPEED  MONITOR - - 2.6 GHZ 15 ″ SVGACOLOR
  • 17. Software Requirements  OPERATING SYSTEM  BACKEND  FRONT END - WINDOWS NT/XP - MS SQL SERVER 2000 - JAVA(jdk1.6)
  • 24. Type Password For Encrypted File