Nis Microproject
Nis Microproject
TSSM’s
Bhivarabai Sawant College of Engineering and Research (Polytechnic), Narhe
MICRO PROJECT
ON
1
MAHARASHTRA STATE
This is to certify that Mr :- Nitesh Gowardhan Borla, Roll No. 50 of VIth Semester of Diploma
in computer engineering of Institute, BSCOER POLYTECHNIC (Code: 1606) has completed the
Micro Project satisfactorily in Subject: Network Information & Security for the academic
2
GROUP DETAILS
Name of guide
Prof. Karanje P.P
3
INDEX
INTRODUCTION
1
ABSTRACT
2
INFORMATION
3
IMPLEMENTATION
4
CONCLUSION
5
6 REFERENCES
ANEEXURE II
8
4
Implement communication system using
steganography, encrypt image & message using any
cryptography technique.
1. INTRODUCTION
Nowadays, security is one of the important issues in our day to day life.
Everywhere such as banks, shops etc. we require security. Secret password is the
main goal of the password. It can be used to access private information. Because of
that data security is one of the most important fields which overcome the problem
of data leakage and its misuse. The proposed technique comes under data security
which can be used to provide more security. Here proposed technique treat the
plaint-text at bit level which is more secure than the compound and intermix
characters. Moreover, the main advantage of the technique is that it has its own key
generation algorithm and same key is used for both encryption and decryption
technique. The encrypted text is after hide behind a carrier using steganography.
Hence, use of two modules i.e. cryptography and steganography makes the
proposed technique more secure.
The information security has become one of the most significant problems in data
communication. So it becomes an inseparable part of data communication. In order
to address this problem, cryptography and steganography can be combined. This
paper proposes a secure communication system. It employs cryptographic
algorithm together with steganography. The jointing of these techniques provides a
robust and strong communication system that able to withstand against attackers.
In this paper, the filter bank cipher is used to encrypt the secret text message, it
provide high level of security, scalability and speed. After that, a discrete wavelet
transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The
performance of the proposed system is evaluated using peak signal to noise ratio
(PSNR) and histogram analysis. The simulation results show that, the proposed
system provides high level of security.
6
3. INFORMATION
The main objective of this paper is to introduce a secure communication system
that employs both cryptography and steganography to encrypt and embed the
secret message to be transmitted over a non secure channel. In this system, the
encryption process is achieved using the filter bank cipher, which presents a high
speed and level of security. The embedding process is achieved using the discrete
wavelet transform based steganography. The proposed system consists from four
stages as shown in Figure 1. Note that the main stages are encryption, embedding,
extraction and decryption.
Algorithm
Begin
1. Message.
2. Encrypting message.
4. Embedding data.
5. Stego image.
8. Decryption.
9. Original Message.
End
7
Encryption and Decryption Process:
The cryptographic algorithm used in this paper is filter bank cipher over
Galois field (GF (28 )) . In this cipher the encryption process consists from
two layers. Firstly, the diffusion layer is represented by the analysis filter
bank to introduce a high diffusion rate. Secondly, the substitution layer
which is represented by the lifting scheme over GF (28 ) to add the required
nonlinearity to increase the resistivity of the cipher against the differential
and linear cryptanalysis attacks. The lifting scheme is shown in Figure 2,
where S is the inverse function over GF (28 ). The filter bank cipher
consists from two rounds to improve its security. Figure 3 International
Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3,
May 2013 128 shows one round filter bank cipher. In this stage, the
message is encrypted using filter bank cipher, where its filters coefficients
are generated from the key .
The decryption process is achieved at the receiver. In this case, the
synthesis filter bank and perfect reconstruction lifting scheme are used to
reconstruct the original message. The perfect reconstruction lifting scheme
is shown in Figure 4. And one Round filter bank cipher decryption System
is shown in Figure 5 which satisfies the perfect reconstruction property to
recover the original message properly.
DWT based steganography is used to hide the message using Haar wavelet.
Wavelet transform converts a spatial domain into frequency domain. In this
case the cover image is decomposed into four sub-images, namely,
approximation coefficients, horizontal detail coefficients, vertical detail
coefficients and diagonal detail coefficients. The embedding process is
achieved at the transmitter to hide the message. In this paper the embedding
process based on the following algorithm.
9
4. IMPLEMENTATION
Hash functions, also called message digests and one- way encryption, are
algorithms that, in some sense, use no key. Hash algorithms are typically
used to provide a digital fingerprint of a file's contents often used to
ensure that the file has not been altered by an intruder or virus.
10
Jiri Fridrich presented an encryption algorithm that adapted
certain invertible chaotic two-dimensional maps to create new
symmetric block encryption schemes. This scheme is especially
useful for encryption of large amount of data, such as digital
images.
11
block again multiply it with involuntary key matrix and find
transpose of it transfer it to destination.
12
8. Choase Based Image Encryption Using Block-Based
Transformation Algorithm
13
This proposed a new encryption scheme as a modification of
AES algorithm based on both ShiftRow Transformations. In this
if the value in the first row and first column is even, the first and
fourth rows are unchanged and each bytes in the second and
third rows of the state are cyclically shifted right over different
number, else the first and third rows are unchanged and each
byte of the second and fourth rows of the state are cyclically
shifted left over different number of bytes..Experimental result
shows that that MAES gives better encryption results in terms of
security against statistical attacks and increased performance.
14
manipulation is presented .this provides fast conversion of
plaintext and images into ciphertext and cipher images.. The
encryption scheme presented here is a block cipher with a block
size of
128bits and key size of 128 bits. Mask Result is also compared
with AES .The performance test results indicate the suitability of
MASK for fast image encryption.
15
have ciphered image portion.the ciphering of image for paper
will be done by using the RGB pixel values of the selected
portion of the images.there are no chages of the bit valuews and
there is no pixel expansion at the end of the encryption
process.instead the numerical values are transposed,reshaped
and concatenated with the RGB values shifted away from its
respective positions aand the RGB values interchanged in order
to obtain the cipher image.This implies that the total change in
the sum of all values in the image is zero.
For the pixel rearrangement, all the pixels of image are first stored in an
array where array sorting is performed. By the sorting method, all the
pixels are get compound sort in ascending order of any value i.e. R, G, B
and the top we gets 0, 0, 0 pixel if present and 255, 255, 255 in the last
position if present. Precedence of sorting is independent of value i.e. R,
G, B because the motivation for sorting was reducing the correlation
between pixel values. This correlation method by arranging the pixel
values in sorting order is better than block shifting as discussed in earlier
section.
16
5. CONCLUSION
A high security model uses both cryptography and Steganography has been
developed. Filter bank cipher is used for encryption the data. Filter bank cipher is a
symmetric block cipher; it provides high level of security, scalability and speed.
The encrypted data is embedded in a cover image using discrete wavelet transform.
The performance of the proposed algorithm has been evaluated using PSNR and
histogram. The results showed that, the PSNR of the proposed system are high,
which ensure the invisibility of the hidden message through the cover image. Also,
the histograms of the stego and cover images are very close to each other, which
ensure the resistivity of the proposed system against the attacks
17
6.Reference
1. https://www.airccse.org/journal/cnc/5313cnc10.pdf
2. https://www.geeksforgeeks.org/image-steganography-in-cryptography/
3. file:///C:/Users/DELL/Downloads/Paper98.pdf
18
WEEKLY PROGRESS REPORT
MICRO PROJECT
19
ANEEXURE II
(Signature of Faculty)
Prof. KARANJE.P.P
20
21