0% found this document useful (0 votes)
362 views19 pages

Nis Microproject

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
362 views19 pages

Nis Microproject

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

PDEA’s

INSTITUTE OF TECHNOLOGY

HADAPSAR, PUNE-28

DEPARTMENT OF COMPUTER ENGINEERING

THIRD YEAR COMPUTER ENGINEERING

SUBJECT: NETWORK AND INFORMATION SECURITY (22620)

TOPIC: - PROJECT REPORT ON ENCRYPT AND DECRYPT


DATA IN IMAGE USING CRYPTOGRAPHY AND
STEGANOGRAPHY ALGORITHM

GROUP MEMBERS: -
1) Aditya Gaikwad [29]

2) Vijay Pawar [30]

GUIDED BY: -
MRS. SHAH A V
Annexure-IA

P.D.E.A.’S
INSTITUTE OF TECHNOLOGY
PART A-Plan (About 2-3 Pages)
Format for Micro Project Proposal

REPORT ON ENCRYPT AND DECRYPT DATA IN IMAGE USING


CRYPTOGRAPHY AND STEGANOGRAPHY ALGORITHM
1.0 Brief Introduction: -
Nowadays, communication is one of the most important ways in our
daily life for transferring and sharing information by using
telephonically or internet. To maintain the information from intruder
many in secure path ways have been carried out on the information.
Steganography and Cryptography are two methods which could be
used to keep the information. Information using telephonically or
internet.

2.0 Aim of The Micro project:-


1. To introduce steganography and cryptography algorithm.
2. To introduce encryption phase and embedding phase.

3.0 Action Plan:


Sr. Details of activity Planned Planned Name of
No. start dated finished dated Responsible
Team Members
1 Finalizing Name Of Micro Project

2 Collecting information of Micro Aditya Gaikwad


Project Topic.
3 We analyse the information.
4 After Collecting information we
plan to prepare a report on it.
5 We crossed checked our report by
teacher.
Vijay Pawar
6 We make changes in our report as
per teacher said.
7 We prepare a report & get print of
it.
8 After all these completion we
submit the Micro Project.
4.0 Resources Required:

S. Name of Resource/material Specifications Qty Remarks


No.
1 Computer system Any computer system with 1
basic configuration
2 Operating system Windows operating system 1

3 Microsoft word For making word report. 1

4 a
Antivirus software Any 1
n
Annexure -IIA

P.D.E.A.’S
INSTITUTE OF TECHNOLOGY
PART B -Plan (Outcomes After Execution)
Format for Micro Project Report

REPORT ON ENCRYPT AND DECRYPT DATA IN IMAGE USING


CRYPTOGRAPHY AND STEGANOGRAPHY ALGORITHM

1.0 Brief Description:


Nowadays, communication is one of the most important ways in our daily life
for transferring and sharing information by using telephonically or internet.
To maintain the information from intruder many in secure path ways have
been carried out on the information. Steganography and Cryptography are two
methods which could be used to keep the information. Information using
telephonically or internet.

2.0 Aim of Micro Project:


1. To introduce steganography and cryptography algorithm.
2. To introduce encryption phase and embedding phase.
3.0 Course Outcomes Integrated:

a) Apply crypto graphics algorithms and protocols to maintain computer


security.
b) Identify ricks related to computer security and information hazard in
various situations.
4.0 Actually Procedure followed
Sr. Details of activity Planned Planned Name of Responsible
No. start dated finished Team Members
dated
1 Finalizing Name Of Micro Project

2 Collecting information of Micro Project Aditya Gaikwad


Topic.
3 We analyse the information.
4 After Collecting information we plan to
prepare a report on it.
5 We crossed checked our report by
teacher. Vijay Pawar
6 We make changes in our report as per
teacher said.
7 We prepare a report & get print of it.

8 After all these completion we submit


the Micro Project.

5.0 Actual Resources used:


S. Name of Specifications Qty Remarks
No. Resource/material
1 Computer system Any computer system with 1
basic configuration
2 Operating system Windows operating system 1

3 Microsoft word For making word report. 1

4 Antivirus software Any 1

6.0 Outcomes of the Micro Project:


The Project Report is done.
ANNEXURE II
Evaluation Sheet
for the Micro
Project

Academic Year-2020-2021 Name of Faculty: Mrs.SHAH A.V.

Course: Computer Engineering Course Code: I Semester: VI

Title of the Project: REPORT ON ENCRYPT AND DECRYPT DATA IN


IMAGE USING CRYPTOGRAPHY AND STEGANOGRAPHY
ALGORITHM

COs addressed by the Micro Project:

a) Apply crypto graphics algorithms and protocols to maintain computer


security.
b) Identify ricks related to computer security and information hazard in
various situations.

Major Learning Outcomes achieved by students by doing the Project:


Unit Outcomes in Cognitive domain –
UO3, UO4, UO5.

Comments/Suggestions about tea m work/leadership/inter-personal


communication (if any)- Nil

Roll Student Name Marks out of for Marks out of 4 for Total
No. performance in performance in oral I out
group activity presentation of 10
(D5 Col. 9)

29 Aditya Gaikwad

30 Vijay Pawar

(Name & Signature of faculty)


CONTENT

1. ACKNOWLEDGMENT
2. AB0STRACT
3. INTRODUCTION
4. INTRODUCTION OF CRYPTOGRAPHY
5. INTRODUCTION OF STEGANOGRAPHY
6. PROPOSED SYSTEM ARCHITECTURE
7. ENCRYPTION PHASE
8. FLOWCHART , ENCRYPTION PROCESS , EXAMPLE
9. EMBEDDING PHASE
10. CONCLUSION
11. REFERENCES
ABSTRACT
With the growth different types of network digital images are being exchanged
over the networks. The basic need of every growing area today’s world is
communication. Everyone wants to protect the information of work to be secret
and safe. The rise of the internet, the most important factors of information
technology and communication has been the security of information .In our day
life we have used many insecure pathways for sharing and transferring

The receiver is able to extract the message with the retrieving process and secret
key provided by the sender. This paper proposes a new system to embed a secret
message in a cover image using Hash based (3, 3, 2) LSB insertion method with
Affine cipher algorithm. Our system is designed to encrypt data and hide all the
data in patted within the message to keep the privacy of the data.

Then, the system has been developed based on the cryptography and
steganography algorithm. The rest of the paper is organized as follows: reviews
the related work is discussed in section 2. Section 3 descripting the Cryptography
and Steganography. Describe proposed system architecture in section 4.
Experimental results and discussion is explained in section 5. Section 6 presents
conclusions.
ACKNOWLEDGMENT
The success and final outcome of this project required a lot of guidance and
assistance from many people and I am extremely privileged to have got this all
along the completion of my project. All that I have done is only due to such
supervision and assistance and I would not forget to thank them.
I respect and thank Ms. Shah A.V for providing me an opportunity to do the
project work and giving us all support and guidance which made me complete the
project duly. I am extremely thankful to Shah Madam for providing such a nice
support and guidance, although he had busy schedule managing the corporate
affairs.
I heartily thank our internal project guide, Shah A.V. Computer Department for
her guidance and suggestions during this project work.
INTRODUCTION
Nowadays, communication is one of the most important ways in our daily life for
transferring and sharing information by using telephonically or internet. To
maintain the information from intruder many in secure path ways have been
carried out on the information. Steganography and Cryptography are two methods
which could be used to keep the information. information using telephonically or
internet.

However at a certain level it’s not safe. Cryptography and steganography are two
methods that use information in order to cipher or cover their existence
respectively which could be used to share and transfer information in a concealed
manner. Cryptography is a technique includes modification of a message for
security the secrecy communication. Nowadays, to encrypt and decrypt data in
order to protect the message secret many different methods have been developed.

In cryptography it’s always clear to intermediate person that the message is


encrypted form by an encryption key which is known by sender and receiver only
and without using encryption key the message could not be accessed. However,
these methods are not enough to protect the contents of a message secret due to
another technique is used with cryptography that is called steganography.

Steganography is the art and science of invisible communication of message and


the secret message is made to hide in cover image and person cannot be seen any
message hidden in the image. The cover image containing the secret data is then
transferred to the recipient. Steganography is a method of hiding secret message
in a cover image while communication takes place between sender and receiver.
CRYPTOGRAPHY

it is a mechanism to encode and decode secret messages for protecting message


from unauthorized users to access the messages. In a network environment
cryptography is playing a main role in data protection in applications running. In
Greek, cryptography means “hidden Secret”.

Moreover, in the past cryptography was used by the political sectors of


intelligence and military but presently it is commonly utilized in the ATM cards,
e-commerce, e-mail, computer password, and other application. Over the years
there are different algorithm have available to modify of a message by an
encrypting key which is known by sender and receiver .

The message could not be decrypted without using encrypting key. One of the
issue is appeared with cryptography is that the message always clear to
intermediate person that the message is encrypted form. This means that the
sender of the message does not want it to be read by unauthorized person. Today,
there are many cryptography techniques which are capable of encrypting data,
one of the most widely technique is Affine algorithm. Affine has the ability to
convert the information to a form not understandable by the intruder.
STEGANOGRAPHY

Nowadays, various types of networks are used to exchange digital image among
users. With the growth of types of computer network a large amount of digital
data has been exchanged over the network due to many of data must be
confidential, private or both. To protect this data from intruder, the demand for
stronger encryption techniques are increased.

Steganography is one of the most important techniques are used to embed the
secret message within an image. This technique is the perfect supplement for
encryption that permits a user to hide information inside an image. As mention
at the previous section in cryptography, the problem with cryptography is that the
encrypted message is obvious and everyone known that the messages are
encrypted.

To solve this problem, steganography techniques can be able to provide more


additional protection on a secret message with cryptography so that the
information is doubly protected. Steganography hiding information within an
image so it appears that no information is hiding inside an image.

Thus, users can be transmitted the sensitive information over unsecured channel
such as the internet. There are various methods of steganography are used. In this
paper we have used Least Significant Bit (LSB) method to embed the secret
message within an image.
PROPOSED SYSTEM ARCHITECTURE

In this paper, we have proposed new security techniques through using


cryptography and steganography for providing better security to maintain the
privacy, accuracy and confidentiality of the data while transferring from one end
to the other end over the network.

The main objective of the system is to hide the message or a secret message into
an image before transmitting to the destination node on the network without any
modification of the data inside an image. The proposed techniques data
steganography using Hash based Least Significant Bit (H-LSB) is used to hide
secret message in image file (bmp).

The system was run and compiled on windows 10 and tested on University of
Sulaimani, Faculty of Physical & Basic Education-Computer Science
Department. This system can be used by users without knowledge of
programming in C# because the Graphic User Interface (GUI) is designed to be
user friendly. This proposed system to input image provides an image platform
and different text box to insert data and showing the encrypt data before
embedding the image.

We have used three phases to apply new proposed techniques


ENCRYPTION PHASE

At the first step to access into the system for hiding the data, the users
are needed a user name and password. After login the system, user can
write the message to encrypt the data with the secret keys before
embedding the data into an image as demonstrate in figure 1.
In our system the proposed scheme uses Affine algorithm to encrypt
secret information. Affine cipher is one of the algorithms that have used
to encrypt data. In this process wherein each letter in an alphabet is
mapped to its numeric equivalent, encrypted using a mathematical
function, and converted back to a letter.
The formula used means that each letter encrypts to one other letter,
and back again, meaning the cipher is essentially a standard substitution
cipher with a rule governing which letter goes to which. This technique
provides better security to protect the data user from the unauthorized
access over a network due to which will not be easy to retrieve the data
without the recipient key.
After converting the plain text into cipher text by using Affine
algorithm we have taken cipher text and converting each letter into
ASCII codes then the ASCII codes have converted into a series of
binary codes to provide higher security. This proposed technique is
used to prevent the intruders to get the real data when they try to
retrieve the data. This encrypt data will be embedded inside the image
with almost zero distortion of the original image.
FLOWCHART

Encryption Process
Step One: Choose the secret message

Step Two: Encrypt the message using Affine Cipher Algorithm

Step Three: Convert the encrypt message into ASCII code

Step Four: Convert ASCII code into binary

For Example:-
Input Text: Kurdistan

Encrypt Text: Kofmeilgt

In this process, the alphabet is going to be the letters A through Z.

In this encrypting example, the plaintext to be encrypted is “Kurdistan”. For the


numeric values of each letter the following function have been used to encrypt
each letter:

E(x) = (ax + b) mod m


Where:

x: is the numerical value of the letter in the plaintext.

m: is the number of letters in the plaintext alphabet

a and b are the secret numbers between sender and receiver.

E(x): is the result of transformation.

Now, take each value of x, and solve the first part of the equation, (3x
+ 6). After finding the value of (3x + 6) for each character, take the
remainder when dividing the result of (3x + 6) by 26. The following
table shows the first four steps of the encrypting process:
EMBEDDING PHASE

After encrypting the secret message we have proposed a method to embedding a


encrypt message into the image. This process is done by using Hash based Least
Significant Bit (HLSB) which replaces the least significant bit. LSB is the most
popular steganography method to embedding data in an image file. This method
has applied to hide the encrypt message in the image and then send the image to
the intended receiver.

In this paper cryptography and steganography methods have been proposed to


provide better security to protect data from intruders by using multi-layer of
security techniques. The combination of these two methods will enhance the
security of data embedding due to some important data that users want to secure
from others when data transmission over an open channel.

At the start of this process we take encrypt message to be embedded in the cover
image, which will be difficult for any intruder to decrypt it without the recipient
private key then hash function has used to select the positions and the proposed
technique takes eight bits of secret data at a time will be embedded in LSB of
RGB (Red, Green and Blue) pixel value in the order of 3, 3, 2 respectively.

According to the techniques that we have used to embed the secret data into the
image three bits are embedded in Red pixel LSB, three bits are embedded in
Green pixels and 2 bits are embedded in blue pixels LSB. These eight bits are
inserted in this order because the chromatic influence of blue color to the human
eye is more than red and green colors.

Therefore the distribution pattern chooses the 2 bits to be hidden in blue pixel.
Thus, the quality of the image will be not sacrificed. This process is continued till
entire message of bits will got embedded into the cover image. To detect the
positions to hide data in LSB of each RGB pixels of the cover image the following
formula is used: K= p % n ………. (1)

Where, K is the LSB bit position within the pixel, P represents the position of
each hidden image pixels and n is number of bits of LSB which is 4 for the present
case.
CONCLUSION
In this paper, a cryptography and steganography methods have
proposed for providing better security of data in a network
environment. With system that we have proposed data can be
transferred between sender and receiver via unsecured network
environment.
Obviously, in a network environment this system is one of the best
ways of hiding the secret of message from intruders. The main focus of
the paper is to develop a system with extra security features.
Cryptography method i.e. Affine cipher algorithm has been
implemented to encrypt the secret message and converted into ASCII
code before embedding it in the image so that it is not easy to intruder
to break the encryption without the keys and password. In addition,
Hash based Least Significant Bit.
REFERENCES

1) https://www.tutorialspoint.com//computer_security/computer_sec
urity_quick_guide.html
2) http://stylesuxx.github.io/steganography/
3) https://smartninja-pgp.appspot.com
4) https://www.cyberlawsindia.net/cyber-india.html
5) https://cyberlaws.net/cyber-law/

You might also like