Nis Microproject
Nis Microproject
INSTITUTE OF TECHNOLOGY
HADAPSAR, PUNE-28
GROUP MEMBERS: -
1) Aditya Gaikwad [29]
GUIDED BY: -
MRS. SHAH A V
Annexure-IA
P.D.E.A.’S
INSTITUTE OF TECHNOLOGY
PART A-Plan (About 2-3 Pages)
Format for Micro Project Proposal
4 a
Antivirus software Any 1
n
Annexure -IIA
P.D.E.A.’S
INSTITUTE OF TECHNOLOGY
PART B -Plan (Outcomes After Execution)
Format for Micro Project Report
Roll Student Name Marks out of for Marks out of 4 for Total
No. performance in performance in oral I out
group activity presentation of 10
(D5 Col. 9)
29 Aditya Gaikwad
30 Vijay Pawar
1. ACKNOWLEDGMENT
2. AB0STRACT
3. INTRODUCTION
4. INTRODUCTION OF CRYPTOGRAPHY
5. INTRODUCTION OF STEGANOGRAPHY
6. PROPOSED SYSTEM ARCHITECTURE
7. ENCRYPTION PHASE
8. FLOWCHART , ENCRYPTION PROCESS , EXAMPLE
9. EMBEDDING PHASE
10. CONCLUSION
11. REFERENCES
ABSTRACT
With the growth different types of network digital images are being exchanged
over the networks. The basic need of every growing area today’s world is
communication. Everyone wants to protect the information of work to be secret
and safe. The rise of the internet, the most important factors of information
technology and communication has been the security of information .In our day
life we have used many insecure pathways for sharing and transferring
The receiver is able to extract the message with the retrieving process and secret
key provided by the sender. This paper proposes a new system to embed a secret
message in a cover image using Hash based (3, 3, 2) LSB insertion method with
Affine cipher algorithm. Our system is designed to encrypt data and hide all the
data in patted within the message to keep the privacy of the data.
Then, the system has been developed based on the cryptography and
steganography algorithm. The rest of the paper is organized as follows: reviews
the related work is discussed in section 2. Section 3 descripting the Cryptography
and Steganography. Describe proposed system architecture in section 4.
Experimental results and discussion is explained in section 5. Section 6 presents
conclusions.
ACKNOWLEDGMENT
The success and final outcome of this project required a lot of guidance and
assistance from many people and I am extremely privileged to have got this all
along the completion of my project. All that I have done is only due to such
supervision and assistance and I would not forget to thank them.
I respect and thank Ms. Shah A.V for providing me an opportunity to do the
project work and giving us all support and guidance which made me complete the
project duly. I am extremely thankful to Shah Madam for providing such a nice
support and guidance, although he had busy schedule managing the corporate
affairs.
I heartily thank our internal project guide, Shah A.V. Computer Department for
her guidance and suggestions during this project work.
INTRODUCTION
Nowadays, communication is one of the most important ways in our daily life for
transferring and sharing information by using telephonically or internet. To
maintain the information from intruder many in secure path ways have been
carried out on the information. Steganography and Cryptography are two methods
which could be used to keep the information. information using telephonically or
internet.
However at a certain level it’s not safe. Cryptography and steganography are two
methods that use information in order to cipher or cover their existence
respectively which could be used to share and transfer information in a concealed
manner. Cryptography is a technique includes modification of a message for
security the secrecy communication. Nowadays, to encrypt and decrypt data in
order to protect the message secret many different methods have been developed.
The message could not be decrypted without using encrypting key. One of the
issue is appeared with cryptography is that the message always clear to
intermediate person that the message is encrypted form. This means that the
sender of the message does not want it to be read by unauthorized person. Today,
there are many cryptography techniques which are capable of encrypting data,
one of the most widely technique is Affine algorithm. Affine has the ability to
convert the information to a form not understandable by the intruder.
STEGANOGRAPHY
Nowadays, various types of networks are used to exchange digital image among
users. With the growth of types of computer network a large amount of digital
data has been exchanged over the network due to many of data must be
confidential, private or both. To protect this data from intruder, the demand for
stronger encryption techniques are increased.
Steganography is one of the most important techniques are used to embed the
secret message within an image. This technique is the perfect supplement for
encryption that permits a user to hide information inside an image. As mention
at the previous section in cryptography, the problem with cryptography is that the
encrypted message is obvious and everyone known that the messages are
encrypted.
Thus, users can be transmitted the sensitive information over unsecured channel
such as the internet. There are various methods of steganography are used. In this
paper we have used Least Significant Bit (LSB) method to embed the secret
message within an image.
PROPOSED SYSTEM ARCHITECTURE
The main objective of the system is to hide the message or a secret message into
an image before transmitting to the destination node on the network without any
modification of the data inside an image. The proposed techniques data
steganography using Hash based Least Significant Bit (H-LSB) is used to hide
secret message in image file (bmp).
The system was run and compiled on windows 10 and tested on University of
Sulaimani, Faculty of Physical & Basic Education-Computer Science
Department. This system can be used by users without knowledge of
programming in C# because the Graphic User Interface (GUI) is designed to be
user friendly. This proposed system to input image provides an image platform
and different text box to insert data and showing the encrypt data before
embedding the image.
At the first step to access into the system for hiding the data, the users
are needed a user name and password. After login the system, user can
write the message to encrypt the data with the secret keys before
embedding the data into an image as demonstrate in figure 1.
In our system the proposed scheme uses Affine algorithm to encrypt
secret information. Affine cipher is one of the algorithms that have used
to encrypt data. In this process wherein each letter in an alphabet is
mapped to its numeric equivalent, encrypted using a mathematical
function, and converted back to a letter.
The formula used means that each letter encrypts to one other letter,
and back again, meaning the cipher is essentially a standard substitution
cipher with a rule governing which letter goes to which. This technique
provides better security to protect the data user from the unauthorized
access over a network due to which will not be easy to retrieve the data
without the recipient key.
After converting the plain text into cipher text by using Affine
algorithm we have taken cipher text and converting each letter into
ASCII codes then the ASCII codes have converted into a series of
binary codes to provide higher security. This proposed technique is
used to prevent the intruders to get the real data when they try to
retrieve the data. This encrypt data will be embedded inside the image
with almost zero distortion of the original image.
FLOWCHART
Encryption Process
Step One: Choose the secret message
For Example:-
Input Text: Kurdistan
Now, take each value of x, and solve the first part of the equation, (3x
+ 6). After finding the value of (3x + 6) for each character, take the
remainder when dividing the result of (3x + 6) by 26. The following
table shows the first four steps of the encrypting process:
EMBEDDING PHASE
At the start of this process we take encrypt message to be embedded in the cover
image, which will be difficult for any intruder to decrypt it without the recipient
private key then hash function has used to select the positions and the proposed
technique takes eight bits of secret data at a time will be embedded in LSB of
RGB (Red, Green and Blue) pixel value in the order of 3, 3, 2 respectively.
According to the techniques that we have used to embed the secret data into the
image three bits are embedded in Red pixel LSB, three bits are embedded in
Green pixels and 2 bits are embedded in blue pixels LSB. These eight bits are
inserted in this order because the chromatic influence of blue color to the human
eye is more than red and green colors.
Therefore the distribution pattern chooses the 2 bits to be hidden in blue pixel.
Thus, the quality of the image will be not sacrificed. This process is continued till
entire message of bits will got embedded into the cover image. To detect the
positions to hide data in LSB of each RGB pixels of the cover image the following
formula is used: K= p % n ………. (1)
Where, K is the LSB bit position within the pixel, P represents the position of
each hidden image pixels and n is number of bits of LSB which is 4 for the present
case.
CONCLUSION
In this paper, a cryptography and steganography methods have
proposed for providing better security of data in a network
environment. With system that we have proposed data can be
transferred between sender and receiver via unsecured network
environment.
Obviously, in a network environment this system is one of the best
ways of hiding the secret of message from intruders. The main focus of
the paper is to develop a system with extra security features.
Cryptography method i.e. Affine cipher algorithm has been
implemented to encrypt the secret message and converted into ASCII
code before embedding it in the image so that it is not easy to intruder
to break the encryption without the keys and password. In addition,
Hash based Least Significant Bit.
REFERENCES
1) https://www.tutorialspoint.com//computer_security/computer_sec
urity_quick_guide.html
2) http://stylesuxx.github.io/steganography/
3) https://smartninja-pgp.appspot.com
4) https://www.cyberlawsindia.net/cyber-india.html
5) https://cyberlaws.net/cyber-law/