0% found this document useful (0 votes)
951 views

Nis Microproject

1. The document describes implementing a secure communication system using steganography and cryptography. It encrypts a message using a filter bank cipher cryptography technique and hides the encrypted message in a cover image using discrete wavelet transform steganography. 2. The encryption process uses a filter bank cipher over Galois field GF(28) for diffusion and substitution. Steganography embeds the encrypted data in the cover image by modifying wavelet coefficients. 3. The proposed system provides security through four stages - encryption, embedding, extraction, and decryption. It encrypts the message, embeds it in an image, extracts the encrypted data, decrypts it to obtain the original message.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
951 views

Nis Microproject

1. The document describes implementing a secure communication system using steganography and cryptography. It encrypts a message using a filter bank cipher cryptography technique and hides the encrypted message in a cover image using discrete wavelet transform steganography. 2. The encryption process uses a filter bank cipher over Galois field GF(28) for diffusion and substitution. Steganography embeds the encrypted data in the cover image by modifying wavelet coefficients. 3. The proposed system provides security through four stages - encryption, embedding, extraction, and decryption. It encrypts the message, embeds it in an image, extracts the encrypted data, decrypts it to obtain the original message.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

TSSM’s
Bhivarabai Sawant College of Engineering and Research (Polytechnic), Narhe

Academic year: 2022-23

MICRO PROJECT

ON

Implement communication system using


steganography, encrypt image & message using
any cryptography technique

Program: Computer Engg. Program code: CO6I

Course: NIS Course code: 22620

1
MAHARASHTRA STATE

BOARD OF TECHNICAL EDUCATION Certificate

This is to certify that Mr :- Nitesh Gowardhan Borla, Roll No. 50 of VIth Semester of Diploma

in computer engineering of Institute, BSCOER POLYTECHNIC (Code: 1606) has completed the

Micro Project satisfactorily in Subject: Network Information & Security for the academic

year 2021- 2022 as prescribed in the curriculum.

Place: - Pune Enrollment No: 2016060144

Date: ……………………… Exam Seat No: 262675

Subject Teacher Head of the Department Principal

2
GROUP DETAILS

Sr.No Name of group members Roll No Enrollment No Seat No

1 Nitesh Gowardhan Borla 50 2016060144 262675

Name of guide
Prof. Karanje P.P

3
INDEX

Sr. No. Contents Page No.

INTRODUCTION
1

ABSTRACT
2

INFORMATION
3

IMPLEMENTATION
4

CONCLUSION
5

6 REFERENCES

WEEKLY PROGRESS REPORT


7

ANEEXURE II
8

4
Implement communication system using
steganography, encrypt image & message using any
cryptography technique.

1. INTRODUCTION

The security of data transmission is a vital problem in communication networks. A


communication system is reliable as long as it provides high level of security.
Usually, users exchange personal sensitive information or important documents. In
this case; security, integrity, authenticity and confidentiality of the exchanged data
should be provided over the transmission medium. Nowadays, internet multimedia
is very popular; a significant amount of data is exchanged every second over a non
secured channel, which may not be safe. Therefore, it is essential to protect the
data from attackers. To protect the data; cryptography and steganography
techniques can be used.
In this project, we added two different modules and provide more security to the
data. Steganography and cryptography both are different because in case of
steganography it involves hiding of data and preventing non-intended observers
from learning about its existence while in case of cryptography it involves
converting of message to secret message or in unreadable format. In cryptography
while using symmetric key new feature to the existing techniques is added. In
proposed technique cryptographic key is generated instead of memorizing or
providing the separated security mechanism for key transmission. Here we can
make the key flexible or be able to change. Steganography is another module
which will hide the encrypted message under a cover medium. In proposed
technique we used LSB method for steganography. Image, audio and video all
cover medium are used. Steganographic algorithm will change as per the cover
medium which is used to hide the information. Each carrier has its own capacity to
carry a secret message without making detectable by an attacker. Hence success of
steganographic technique is depended on capacity of a carrier and technique. In
proposed technique we used both cryptography as well as steganography to hide
secret communication.
5
2. ABSTRACT

Nowadays, security is one of the important issues in our day to day life.
Everywhere such as banks, shops etc. we require security. Secret password is the
main goal of the password. It can be used to access private information. Because of
that data security is one of the most important fields which overcome the problem
of data leakage and its misuse. The proposed technique comes under data security
which can be used to provide more security. Here proposed technique treat the
plaint-text at bit level which is more secure than the compound and intermix
characters. Moreover, the main advantage of the technique is that it has its own key
generation algorithm and same key is used for both encryption and decryption
technique. The encrypted text is after hide behind a carrier using steganography.
Hence, use of two modules i.e. cryptography and steganography makes the
proposed technique more secure.
The information security has become one of the most significant problems in data
communication. So it becomes an inseparable part of data communication. In order
to address this problem, cryptography and steganography can be combined. This
paper proposes a secure communication system. It employs cryptographic
algorithm together with steganography. The jointing of these techniques provides a
robust and strong communication system that able to withstand against attackers.
In this paper, the filter bank cipher is used to encrypt the secret text message, it
provide high level of security, scalability and speed. After that, a discrete wavelet
transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The
performance of the proposed system is evaluated using peak signal to noise ratio
(PSNR) and histogram analysis. The simulation results show that, the proposed
system provides high level of security.

6
3. INFORMATION
The main objective of this paper is to introduce a secure communication system
that employs both cryptography and steganography to encrypt and embed the
secret message to be transmitted over a non secure channel. In this system, the
encryption process is achieved using the filter bank cipher, which presents a high
speed and level of security. The embedding process is achieved using the discrete
wavelet transform based steganography. The proposed system consists from four
stages as shown in Figure 1. Note that the main stages are encryption, embedding,
extraction and decryption.

The following algorithm describes these stages.

Algorithm

Input: Embed the message.

Output: Message is embedded safely in an image and reconstructed properly.

Begin

1. Message.

2. Encrypting message.

3. Implementing DWT based steganography

4. Embedding data.

5. Stego image.

6. Extraction of embedded message.

7. Encrypted message generation.

8. Decryption.

9. Original Message.

End

7
Encryption and Decryption Process:

The cryptographic algorithm used in this paper is filter bank cipher over
Galois field (GF (28 )) . In this cipher the encryption process consists from
two layers. Firstly, the diffusion layer is represented by the analysis filter
bank to introduce a high diffusion rate. Secondly, the substitution layer
which is represented by the lifting scheme over GF (28 ) to add the required
nonlinearity to increase the resistivity of the cipher against the differential
and linear cryptanalysis attacks. The lifting scheme is shown in Figure 2,
where S is the inverse function over GF (28 ). The filter bank cipher
consists from two rounds to improve its security. Figure 3 International
Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3,
May 2013 128 shows one round filter bank cipher. In this stage, the
message is encrypted using filter bank cipher, where its filters coefficients
are generated from the key .
The decryption process is achieved at the receiver. In this case, the
synthesis filter bank and perfect reconstruction lifting scheme are used to
reconstruct the original message. The perfect reconstruction lifting scheme
is shown in Figure 4. And one Round filter bank cipher decryption System
is shown in Figure 5 which satisfies the perfect reconstruction property to
recover the original message properly.

Figure 1. Block Diagram of the proposed system.

Figure 2. Lifting scheme.


8
Figure 3. One Round Filter Bank Encryption cipher.

Figure 4. Perfect reconstruction lifting scheme.

Figure 5. One Round filter bank cipher decryption System.

Embedding and Extraction Process

DWT based steganography is used to hide the message using Haar wavelet.
Wavelet transform converts a spatial domain into frequency domain. In this
case the cover image is decomposed into four sub-images, namely,
approximation coefficients, horizontal detail coefficients, vertical detail
coefficients and diagonal detail coefficients. The embedding process is
achieved at the transmitter to hide the message. In this paper the embedding
process based on the following algorithm.

9
4. IMPLEMENTATION

1. Secret key cryptography is also known as symmetric key cryptography.


With this type of cryptography, both the sender and the receiver know the
same secret code, called the key. Messages are encrypted by the sender
using the key and decrypted by the receiver using the same key.

Public key cryptography, also called asymmetric key cryptography, uses a


pair of keys for encryption and decryption. With public key cryptography,
keys work in pairs of matched public and private keys.

Hash functions, also called message digests and one- way encryption, are
algorithms that, in some sense, use no key. Hash algorithms are typically
used to provide a digital fingerprint of a file's contents often used to
ensure that the file has not been altered by an intruder or virus.

Cryptography technique is used when secret message are transferred from


one party to another over a communication line. Cryptography technique
needs some algorithm for encryption of data.

Nowadays when more and more sensitive information is stored on


computers and transmitted over the Internet, we need to ensure
information security and safety. Image is also an important part of our
information .Therefore its very important to

protect our image from unauthorized access.

To ensure this there are so many algorithams available to protect the


images from unauthorized intruders.

2. Image Encryption Techniques

In this section, a few newly proposed techniques for image encryption,


has been introduced.

1. A New Block Image Encryption Algorithm by Fridrich, 1997

10
Jiri Fridrich presented an encryption algorithm that adapted
certain invertible chaotic two-dimensional maps to create new
symmetric block encryption schemes. This scheme is especially
useful for encryption of large amount of data, such as digital
images.

2. A Technique for Image Encryption using Digital Signatures,


2003

Aloka Sinha and Kehar Singh have proposed a new technique to


encrypt an image for secure image transmission. The digital
signature of the original

image is added to the encoded version of the original image.


Image encoding is done by using an appropriate error control
code, such as a Bose-Chaudhuri Hochquenghem (BCH) code. At
the receiver end, after the decryption of the image, the digital
signature has been used to verify the authenticity of the image.

3. A Technique for Image Encryption using multi level and image


dividing technique, 2003

Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha- Wmn


Lee, and SmJmng Kim[16] proposed image encryption by using
binary exclusive OR operation and image dividing technique.
They converted binary images to binary phase encoding and
then encrypt these images with binary random phase images by
binary phase XOR operation. Encrypted gray image was then
obtained by combining each binary encrypted images.

4. Image Encryption Using Advanced Hill Cipher Algorithm

In this paper, we have proposed an advanced Hill (AdvHill)


cipher algorithm which uses an Involutory key matrix for
encryption The objective of this paper is to overcome the
drawback of using a random key matrix in Hill cipher algorithm
for encryption, where we may not be able to decrypt the
encrypted message, if the key matrix is not invertible. Divide the
image into blocks apply the involutory key matrix to each block
and create a temporary block using the ith pixel value of each

11
block again multiply it with involuntary key matrix and find
transpose of it transfer it to destination.

5. Image Encryption Using Block-Based Transformation


Algorithm,2006

In this paper the original image is divided into random number


of blocks the original image is divided into a random number of
blocks that are then shuffled within the image. The generated (or
transformed) image is then fed to the Blowfish encryption
algorithm.

6. H-S-X Cryptosystem and Its Application to Image Encryption,


2009

In this paper, we have proposed a novel technique which is a


modified version of Hill cipher algorithm for image encryption
named H-S-X (Hill-Shift-XOR) which can be applied to any
type of imags whether they are colour or gray. First color image
is decomposed into (R-G-B) components. Second, encrypt each
component (R-G-B) separately by the algorithm. Finally,
concatenate the encrypted components together to get the
encrypted color image.

7. Image Encryption Using DCT and Stream Cipher, 2009

The proposed method based on the idea of decomposing the


image into 8×8 blocks, these blocks are transformed from the
spatial domain to frequency domain by the DCT. Then, the DCT
coefficients correlated to the higher frequencies of the image
block are encrypted using Non-Linear Shift Back. The concept
behind encrypting only some selective DCT coefficients based
on the fact that the image details are situated in the higher
frequencies, while the human eye is most sensitive to lower
frequencies than to higher frequencies. Encrypt the selected
coefficients by XORing the generated bit stream from the
NLFSR +Key with the coefficient bits, the sign bit of the
selected coefficients will not be encrypted.

12
8. Choase Based Image Encryption Using Block-Based
Transformation Algorithm

The proposed algorithm is for image compression and


encryption. The proposed algorithm with block size of 8- bit
applies wavelet transform for each block for image compression
and 256-bit secret key used for image encryption.The key is
used to generate a pad that is then merged with the plaintext a
byte at a time.

9. Fast encryption algorithm(FEAL)

The Fast Encryption Algorithm (FEAL) is a symmetric


encryption algorithm, also called as Japanese Encryption
algorithm.It is implemented using MATLAB. . For encryption,
the input image is split into 16 sub-images of size 16×16 pixel
resolution each. The

sub images are encrypted separately and combined to get the


actual encrypted image. Same process is used for decryption
also. During decryption procedure, cipher image are converted
into 16×16 pixel sub-images and the performed decryption key
substitution.

10.A visual cryptographic encryption technique to secure medical


images

In this encryption process, an input image which was

a plain image was operated on by a function to generate a secret


key from it. The key was then used to encrypt the image by
shuffling the pixels of the plain image based on an algorithm.
The ciphered image was obtained at the end and it can either be
stored or transmitted over a communication network. The
received image was then operated on again by a function to
obtain the key in order to decrypt the image.

11.A New Modified Version of Advanced Encryption Standard


Based Algorithm for Image Encryption 2010

13
This proposed a new encryption scheme as a modification of
AES algorithm based on both ShiftRow Transformations. In this
if the value in the first row and first column is even, the first and
fourth rows are unchanged and each bytes in the second and
third rows of the state are cyclically shifted right over different
number, else the first and third rows are unchanged and each
byte of the second and fourth rows of the state are cyclically
shifted left over different number of bytes..Experimental result
shows that that MAES gives better encryption results in terms of
security against statistical attacks and increased performance.

12.An Efficient Encryption Algorithm Based on Image


Reconstruction 2009

An efficient image encryption algorithm is proposed, based on


image reconstruction using some adjacent pixel characteristics.
According to the different characteristics of different bit level
binary images, the proposed encryption scheme reconstructs the
image at the bit level. Two parts of information, the significant
one and the unimportant one, are treated differently and
processed separately. Simulations and cryptanalysis both show
that the proposed image encryption scheme is more efficient and
yields better level of security.

13.Digital Image Encryption Algorithm Based on Chaos and


Improved DES 2009

This paper is based on the chaotic encryption and improved DES


encryption and a combination of image encryption algorithm is
used to find the gaps.In this paper new encryption logistic Map
produced pseudo random sequence on RGB image and make
double times encryption with improved DES . Combination of
Chaos And improved DES makes the final algorithm more
secure ,faster and more suitable for digital image encryption.

14.Matrix based Cryptographic Procedure for Efficient Image


Encryption 2011

In this paper a fast symmetric key encryption procedure,Matrix


Array symmetric Key Encryption (MASK) based on matrix

14
manipulation is presented .this provides fast conversion of
plaintext and images into ciphertext and cipher images.. The
encryption scheme presented here is a block cipher with a block
size of

128bits and key size of 128 bits. Mask Result is also compared
with AES .The performance test results indicate the suitability of
MASK for fast image encryption.

15.An Efficient Chaos-based Image Encryption Scheme Using


Affine Modular Maps 2012

An efficient image encryption scheme based on affine modular


maps is proposed in the paper. The proposed scheme can shuffle
the plain-image efficiently in the permutation process. An
effective two-way diffusion process is also presented to change
the gray values of the whole image pixels. All the experimental
results show that encryption scheme is secure, its highly
sensitivity to the cipher keys and plain-images. It is easy to
manipulate and can be applied to any images with unequal width
and height as well J. Rui liu, Xiaoping tian

16.New algorithm for color image encryption using chaotic map


and spatial bit level permutation 2012 This proposed a new
algorithm for color image encryption using chaotic map and
spatial bit-level permutation (SBLP).Firstly, use Logistic chaotic
sequence to shuffle the positions of image pixels, then transform
it into a binary matrix and permute the matrix at bit-level by the
scrambling mapping generated by SBLP. then use another
Logistic chaotic sequence to rearrange the position of the current
image pixels. Experimental results show that the proposed
algorithm can achieve good encryption result and low time
complexity, This makes it suitable for securinvideo surveillance
systems, multimedia applications and real- time applications
such as mobile phone services.

17.A cryptographic technique of facial blurring of images

In this method,the facial selected portion of image used will


have their RGB colors are extracted from and then encrypted to

15
have ciphered image portion.the ciphering of image for paper
will be done by using the RGB pixel values of the selected
portion of the images.there are no chages of the bit valuews and
there is no pixel expansion at the end of the encryption
process.instead the numerical values are transposed,reshaped
and concatenated with the RGB values shifted away from its
respective positions aand the RGB values interchanged in order
to obtain the cipher image.This implies that the total change in
the sum of all values in the image is zero.

18.Image encryption with combination of pixel rearrangement

For the pixel rearrangement, all the pixels of image are first stored in an
array where array sorting is performed. By the sorting method, all the
pixels are get compound sort in ascending order of any value i.e. R, G, B
and the top we gets 0, 0, 0 pixel if present and 255, 255, 255 in the last
position if present. Precedence of sorting is independent of value i.e. R,
G, B because the motivation for sorting was reducing the correlation
between pixel values. This correlation method by arranging the pixel
values in sorting order is better than block shifting as discussed in earlier
section.

16
5. CONCLUSION

In this project, proposed technique is consisting of two main modules. One is


enhanced cryptography and another one is steganography. Here cryptography is
enhanced as it is differ from the existing one because it has its own key generation
algorithm. Hence no need to provide the separate security for key transmission.
Encrypted message is further hide behind a carrier file such as image, audio or
video. Hence proposed technique provides a two level of security. It simply goes
beyond of embedding a normal data but also embed the encrypted data.

A high security model uses both cryptography and Steganography has been
developed. Filter bank cipher is used for encryption the data. Filter bank cipher is a
symmetric block cipher; it provides high level of security, scalability and speed.
The encrypted data is embedded in a cover image using discrete wavelet transform.
The performance of the proposed algorithm has been evaluated using PSNR and
histogram. The results showed that, the PSNR of the proposed system are high,
which ensure the invisibility of the hidden message through the cover image. Also,
the histograms of the stego and cover images are very close to each other, which
ensure the resistivity of the proposed system against the attacks

17
6.Reference
1. https://www.airccse.org/journal/cnc/5313cnc10.pdf

2. https://www.geeksforgeeks.org/image-steganography-in-cryptography/

3. file:///C:/Users/DELL/Downloads/Paper98.pdf

18
WEEKLY PROGRESS REPORT

MICRO PROJECT

SR.NO WEEK ACTIVITY PERFORMED SIGN OF DATE


. GUIDE

1. 1st Discussion and finalization of topic

2. 2nd Preparation and submission of Abstract

3. 3rd Collection of Data

4. 4th Discussion and outline of Content

5. 5th Formulation of Content

6. 6th Editing and proof Reading of Content

7. 7th Compilation of Report and Presentation

8. 8th Seminar / Viva voce

9. 9th Final submission of Micro Project

Sign of the student Sign of the faculty

19
ANEEXURE II

Evaluation Sheet for the Micro Project


Academic Year: 2022-23 Name of the Faculty: Prof. KARANJE.P.P
Course: NIS Course code: 22620
Semester: VI

Title of the project: Implement communication system using steganography,


encrypt image & message using any cryptography technique.
CO’s addressed by the Micro Project:
Apply the various Steganography and Cryptography concept .

Major Learning outcomes achieved by students by doing the Project:


(b)Unit Outcomes in cognitive Domain
2a.  Identify risks related to Computer security and Information hazard in various
situations.
2b.  Apply cryptographic algorithms and protocols to maintain Computer Security.
(c)Outcomes in affective Domain
2b. A high security model uses both cryptography and Steganography

3b. cryptography and steganography techniques can be used.

Marks out of 6 Marks out of


for performance 4for
Roll Student Name in group activity performance in Total out of
No (D5 Col.8) oral/ 10
presentation
(D5 Col.9)
50 Nitesh Gowardhan
Borla

(Signature of Faculty)
Prof. KARANJE.P.P

20
21

You might also like