0% found this document useful (0 votes)
120 views28 pages

Secure Data Transmission Techniques

This document discusses secure data transmission using client-server architecture and steganography. It introduces the need for secure transmission due to vulnerable communication channels. The goals are to securely transmit data and defend against attacks. Methodologies used include creating a secure transmitting channel, cryptography, and steganography. Client-server architecture partitions tasks between clients that initiate requests and servers that respond. Sockets enable communication between clients and servers. Steganography conceals messages within images by hiding information in pixel values. The techniques were experimentally tested using Python scripts. Encrypted data was successfully embedded and transmitted within cover images.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views28 pages

Secure Data Transmission Techniques

This document discusses secure data transmission using client-server architecture and steganography. It introduces the need for secure transmission due to vulnerable communication channels. The goals are to securely transmit data and defend against attacks. Methodologies used include creating a secure transmitting channel, cryptography, and steganography. Client-server architecture partitions tasks between clients that initiate requests and servers that respond. Sockets enable communication between clients and servers. Steganography conceals messages within images by hiding information in pixel values. The techniques were experimentally tested using Python scripts. Encrypted data was successfully embedded and transmitted within cover images.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

SECURE DATA

TRANSMISSION
PRESENTED BY -
OMVEER SINGH
DEORA
PRIYA RANJAN
PAWAN JHA
INTRODUCTION
Why Security is needed in
transmission ?

Nowadays communication has become the most desired


requirement for each and every one and for this desire, we
need a channel through which the information can be passed
upon due to the growing importance of the communication
channel it becomes vulnerable to a large variety of attacks.
Our main task is to defend the transmission passage against
all sorts of attacks and transmit our information safely to the
receiver. For this purpose, we are using Secure Channel for
communication which accepts only those connections which
are authorized.
OUR PROJECT GOAL
 Secure Data Transmission in
Client Server Architecture
 Secure Data Transmission
using Stenography
METHODOLOGY

There are many methods for securing data transmission


such as by creating secure transmitting channel,
cryptography, steganography and many more.
In this project we mainly use above three mentioned
method for transmitting data.
Client server
Architecture
The client–server model is a distributed application
structure that partitions tasks or workloads between the
providers of a resource or service, called servers, and
service requesters, called clients
Client (SENDER)
 Always initiates requests to servers.
 Waits for replies.
 Receives replies.
 Usually connects to a small number of servers at one
time.
Server (Receiver)

•Always wait for a request from one of the clients.


•Serve clients requests then replies with requested data to the
clients.
•A server may communicate with other servers in order to serve a
client request.
•If additional information is required to process a request (or
security is implemented), a server may request additional data
(passwords) from a client before processing a request.
Client server model using python

 Python provides two levels of access to


network services. At a low level, you can
access the basic socket support in the
underlying operating system, which allows
you to implement clients and servers for both
connection-oriented and connectionless
protocols.
 Python also has libraries that provide higher-
level access to specific application-level
network protocols, such as FTP, HTTP, and
Sockets
 Sockets are the endpoints of a bidirectional
communications channel. Sockets may communicate
within a process, between processes on the same machine,
or between processes on different continents.
 Sockets may be implemented over a number of different
channel types: Unix domain sockets, TCP, UDP, and so
on. The socket library provides specific classes for
handling the common transports as well as a generic
interface for handling the rest.
CLIENT Socket Methods

[Link] Method & Description

1 [Link]()
This method actively initiates TCP server connection.
Server Socket Methods
[Link] Method & Description

1 [Link]()
This method binds address (hostname, port number pair) to socket.

2 [Link]()
This method sets up and start TCP listener.

3 [Link]()
This passively accepts TCP client connection, waiting until connection
arrives (blocking).
General Socket Methods
[Link] Method & Description

1 [Link]()
This method receives TCP message

2 [Link]()
This method transmits TCP message

3 [Link]()
This method closes socket
Simple image Stego-Image
Simple image Stego-Image
Simple image Stego-Image
Steganography
Introduction

Steganography is the practice of concealing a file,


message, image, or video within another file, message,
image, or video. The word steganography combines the
Greek words steganos meaning "covered, concealed, or
protected," and graphein meaning "writing".
TYPES OF STEGANOGRAPHY

Steganography

Image Audio Video


IMAGE BASED STEGANOGRAPHY
Hiding information inside images is a popular technique
nowadays. An image with a secret message inside can easily
be spread over the World Wide Web or in newsgroups. The use
of steganography in newsgroups has been researched by
German steganography expert Niels Provos, who created a
scanning cluster which detects the presence of hidden
messages inside images that were posted on the net. However,
after checking one million images, no hidden messages were
found, so the practical use of steganography still seems to be
limited.
IMAGE BASED STEGANOGRAPHY
Hiding information inside images is a popular technique
nowadays. An image with a secret message inside can easily
be spread over the World Wide Web or in newsgroups. The use
of steganography in newsgroups has been researched by
German steganography expert Niels Provos, who created a
scanning cluster which detects the presence of hidden
messages inside images that were posted on the net. However,
after checking one million images, no hidden messages were
found, so the practical use of steganography still seems to be
limited.
EXPERIMENT ALANALYSIS
The proposed method was experimented using python. The
plain text is first encrypted to generate the cipher text using
any cipher method. A key is used in the encryption which is
based on symmetric cryptosystem where same key is used
for both encryption and decryption process.
Then the cipher text is embedded inside the PNG image file
using python script. The generated stego-image is sent over
to the intended recipient. The whole idea of the proposed
method is to model a technique that enables secure data
communication between sender and receiver. By this
approach the messages were successfully embedded into the
cover images
EXPERIMENT ALANALYSIS

Simple image Stego-Image


Simple image Stego-Image
Simple image Stego-Image
conclusion
The work performed in this thesis provides a overview for
‘Secure Data Transmission’ through techniques like creating
secure channel in Client Server model and Steganography.
This methods are used to transmits data in secure way to the
correct location. The user is provided with the unique key
which is only way to understand the data transmitted. The
encrypted data look like the garbage until it is decrypted. So,
it is not possible for any one to look over the data during the
transmission. In steganography we hide the data in pixels of
image and than transmit the image. So, by encode the data
with image pixels we transmit data in secure way.
references
 [1]link:[Link]
 [2]link:[Link]
 [3]link:[Link]
 [4]link:[Link]
 [5]link:[Link]
 [6]link:[Link]
 [7]link:[Link]
 [8]link:[Link]
 [9]link:[Link]
 [10]link:[Link]
 [11]“Identity and Data Security for Web Development”by Tim Messerschmitt, Jonathan LeBlanc
 [12]“An efficient secure data transmission based on visual steganography”
link:[Link]

Common questions

Powered by AI

Steganography involves concealing the existence of a message within another medium, such as an image, audio, or video, making the communication invisible. Cryptography, in contrast, transforms data into an unreadable format (ciphertext) that is decipherable only with a key. While cryptography focuses on securing the content, steganography focuses on hiding the communication .

The document recognizes the vulnerability of communication channels to various attacks as a primary challenge. These are addressed using secure channels that authorize only legitimate connections, cryptographic techniques to encrypt data, and steganography to conceal messages within inconspicuous files. Collectively, these methods deter unauthorized access and enhance overall communication security .

Python provides both low and high-level access to network services for implementing client-server communication. It allows socket programming for connection-oriented and connectionless protocols and offers libraries for high-level protocols like FTP and HTTP. Python also supports embedding encrypted messages into files as part of the steganography process, facilitating the secure transmission of data .

Security in data transmission is ensured through a two-pronged approach involving encryption and steganography. Initially, the plaintext is encrypted into ciphertext using a symmetric cryptosystem. This encrypted data is then embedded into a PNG image, which is transmitted. The image format obscures the presence of the encrypted message, thereby ensuring secure data exchange .

The encryption process involves converting plaintext into ciphertext using a symmetric cryptosystem, where the same key encrypts and decrypts the message. This step is crucial as it turns readable data into an unintelligible format for unauthorised users. The encryption ensures that only recipients with the key can decipher the message, maintaining confidentiality and security during transmission .

In the experimental analysis, a simple image becomes a stego-image by embedding encrypted text within its pixel data. A Python script facilitates this process by encoding the ciphertext inside the image, enabling it to carry hidden information across transmission networks securely. This method ensures that the underlying message remains obscured until decoded .

Steganography enhances data security by hiding information within other non-sensitive files like images or audio, making the existence of the message unknown to unauthorized entities. By embedding the data into image pixels, it conceals the content during transmission, which only reveals itself after proper decoding using a key .

In a Python client-server model, sockets are endpoints for bidirectional communication channels between a client and a server. They permit data exchange over various protocols such as TCP and UDP. Python's socket library provides methods for both clients and servers to initiate and accept connections, transmit messages, and manage communications independently .

The document discusses three main methods for securing data transmission: secure channels, cryptography, and steganography. In a Client-Server architecture, the client initiates requests to the server waiting passively. Secure channels ensure only authorized connections, cryptography is used to encrypt data making it unreadable without a key, and steganography hides messages within images, video, or audio to prevent detection .

Niels Provos's research concluded that the practical use of steganography in newsgroups might be limited. He developed a scanning cluster that could detect hidden messages in images posted on the internet; however, after scanning a million images, no hidden messages were found. This suggests limited real-world application or detection issues .

You might also like