0% found this document useful (0 votes)
27 views

Secure Data Transmission: Presented by - Omveer Singh Deora Priya Ranjan Pawan Jha

This document discusses secure data transmission using client-server architecture and steganography. It introduces the need for secure transmission due to vulnerable communication channels. The goals are to securely transmit data and defend against attacks. Methodologies used include creating a secure transmitting channel, cryptography, and steganography. Client-server architecture partitions tasks between clients that initiate requests and servers that respond. Sockets enable communication between clients and servers. Steganography conceals messages within images by hiding information in pixel values. The techniques were experimentally tested using Python scripts. Encrypted data was successfully embedded and transmitted within cover images.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Secure Data Transmission: Presented by - Omveer Singh Deora Priya Ranjan Pawan Jha

This document discusses secure data transmission using client-server architecture and steganography. It introduces the need for secure transmission due to vulnerable communication channels. The goals are to securely transmit data and defend against attacks. Methodologies used include creating a secure transmitting channel, cryptography, and steganography. Client-server architecture partitions tasks between clients that initiate requests and servers that respond. Sockets enable communication between clients and servers. Steganography conceals messages within images by hiding information in pixel values. The techniques were experimentally tested using Python scripts. Encrypted data was successfully embedded and transmitted within cover images.
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

SECURE DATA

TRANSMISSION
PRESENTED BY -
OMVEER SINGH
DEORA
PRIYA RANJAN
PAWAN JHA
INTRODUCTION
Why Security is needed in
transmission ?

Nowadays communication has become the most desired


requirement for each and every one and for this desire, we
need a channel through which the information can be passed
upon due to the growing importance of the communication
channel it becomes vulnerable to a large variety of attacks.
Our main task is to defend the transmission passage against
all sorts of attacks and transmit our information safely to the
receiver. For this purpose, we are using Secure Channel for
communication which accepts only those connections which
are authorized.
OUR PROJECT GOAL
 Secure Data Transmission in
Client Server Architecture
 Secure Data Transmission
using Stenography
METHODOLOGY

There are many methods for securing data transmission


such as by creating secure transmitting channel,
cryptography, steganography and many more.
In this project we mainly use above three mentioned
method for transmitting data.
Client server
Architecture
The client–server model is a distributed application
structure that partitions tasks or workloads between the
providers of a resource or service, called servers, and
service requesters, called clients
Client (SENDER)
 Always initiates requests to servers.
 Waits for replies.
 Receives replies.
 Usually connects to a small number of servers at one
time.
Server (Receiver)

•Always wait for a request from one of the clients.


•Serve clients requests then replies with requested data to the
clients.
•A server may communicate with other servers in order to serve a
client request.
•If additional information is required to process a request (or
security is implemented), a server may request additional data
(passwords) from a client before processing a request.
Client server model using python

 Python provides two levels of access to


network services. At a low level, you can
access the basic socket support in the
underlying operating system, which allows
you to implement clients and servers for both
connection-oriented and connectionless
protocols.
 Python also has libraries that provide higher-
level access to specific application-level
network protocols, such as FTP, HTTP, and
Sockets
 Sockets are the endpoints of a bidirectional
communications channel. Sockets may communicate
within a process, between processes on the same machine,
or between processes on different continents.
 Sockets may be implemented over a number of different
channel types: Unix domain sockets, TCP, UDP, and so
on. The socket library provides specific classes for
handling the common transports as well as a generic
interface for handling the rest.
CLIENT Socket Methods

Sr.No Method & Description

1 s.connect()
This method actively initiates TCP server connection.
Server Socket Methods
Sr.No Method & Description

1 s.bind()
This method binds address (hostname, port number pair) to socket.

2 s.listen()
This method sets up and start TCP listener.

3 s.accept()
This passively accepts TCP client connection, waiting until connection
arrives (blocking).
General Socket Methods
Sr.No Method & Description

1 s.recv()
This method receives TCP message

2 s.send()
This method transmits TCP message

3 s.close()
This method closes socket
Simple image Stego-Image
Simple image Stego-Image
Simple image Stego-Image
Steganography
Introduction

Steganography is the practice of concealing a file,


message, image, or video within another file, message,
image, or video. The word steganography combines the
Greek words steganos meaning "covered, concealed, or
protected," and graphein meaning "writing".
TYPES OF STEGANOGRAPHY

Steganography

Image Audio Video


IMAGE BASED STEGANOGRAPHY
Hiding information inside images is a popular technique
nowadays. An image with a secret message inside can easily
be spread over the World Wide Web or in newsgroups. The use
of steganography in newsgroups has been researched by
German steganography expert Niels Provos, who created a
scanning cluster which detects the presence of hidden
messages inside images that were posted on the net. However,
after checking one million images, no hidden messages were
found, so the practical use of steganography still seems to be
limited.
IMAGE BASED STEGANOGRAPHY
Hiding information inside images is a popular technique
nowadays. An image with a secret message inside can easily
be spread over the World Wide Web or in newsgroups. The use
of steganography in newsgroups has been researched by
German steganography expert Niels Provos, who created a
scanning cluster which detects the presence of hidden
messages inside images that were posted on the net. However,
after checking one million images, no hidden messages were
found, so the practical use of steganography still seems to be
limited.
EXPERIMENT ALANALYSIS
The proposed method was experimented using python. The
plain text is first encrypted to generate the cipher text using
any cipher method. A key is used in the encryption which is
based on symmetric cryptosystem where same key is used
for both encryption and decryption process.
Then the cipher text is embedded inside the PNG image file
using python script. The generated stego-image is sent over
to the intended recipient. The whole idea of the proposed
method is to model a technique that enables secure data
communication between sender and receiver. By this
approach the messages were successfully embedded into the
cover images
EXPERIMENT ALANALYSIS

Simple image Stego-Image


Simple image Stego-Image
Simple image Stego-Image
conclusion
The work performed in this thesis provides a overview for
‘Secure Data Transmission’ through techniques like creating
secure channel in Client Server model and Steganography.
This methods are used to transmits data in secure way to the
correct location. The user is provided with the unique key
which is only way to understand the data transmitted. The
encrypted data look like the garbage until it is decrypted. So,
it is not possible for any one to look over the data during the
transmission. In steganography we hide the data in pixels of
image and than transmit the image. So, by encode the data
with image pixels we transmit data in secure way.
references
 [1]link:https://www.tutorialspoint.com/data_communication_computer_network/client_server_model.htm
 [2]link:https://www.tutorialspoint.com/python/python_networking.htm
 [3]link:http://whatis.techtarget.com/definition/algorithm
 [4]link:http://whatis.techtarget.com/definition/pixel
 [5]link:http://searchmicroservices.techtarget.com/definition/JPEG-Joint-Photographic-Experts-Group
 [6]link:https://youtu.be/q3eOOMx5qoo
 [7]link:https://docs.python.org/2/library/intro.html
 [8]link:https://docs.python.org/2/library/stringio.html
 [9]link:http://docs.python.org/3/
 [10]link:http://ieeexplore.ieee.org/document/7530163/
 [11]“Identity and Data Security for Web Development”by Tim Messerschmitt, Jonathan LeBlanc
 [12]“An efficient secure data transmission based on visual steganography”
link:http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7755681

You might also like