You are on page 1of 34

PROJECT REPORT

on
DATA ENCRYPTION & SECURITY
USING IMAGE PROCESSING
(A Project Report submitted in partial fulfillment of the requirements of
Bachelor of Technology in Information Technology of the West Bengal
University of Technology, West Bengal)

Submitted by

SAPTAPARNA BHOWMICK-10200215039
TANMOY SAHA-10200215048
ABHINANDAN BHATTACHARYA-10200215002
ASHFAQUE ALI KHAN-10200215010

Under the guidance of

Assistant Professor

Mrs. Manisha Barman

Dept. of Information Technology

Kalyani Government Engineering College


(Affiliated to West Bengal University of Technology)
Kalyani - 741235, Nadia, WB
2018-2019

Certificate of Approval

This is to certify that ​Saptaparna Bhowmick, Tanmoy Saha, Abhinandan


Bhattacharya, Ashfaque Ali Khan​ has done final year project work entitled ​Image
Processing on Data Encryption & Security ​under my direct supervision and he/she has
fulfilled all the requirements of relating to the Final Year Project. It is also certified that
this project work being submitted, fulfills the norms of academic standard for B. Tech
Degree in Information Technology of The West Bengal University of Technology and it
has not been submitted for any degree whatsoever by him/her or anyone else previously.

………………………………………… ……………………………………………..
Head Supervisor
Department of Information Technology Department of Information Technology
Kalyani Government Engineering College Kalyani Government Engineering College

………………………………………… ………………………………………………
Project Coordinator Examiner
Department of Information Technology
Kalyani Government Engineering College
ACKNOWLEDGEMENTS

The success and final outcome of this project required a lot of


guidance and assistance from many people and I am extremely privileged to
have got this all along the completion of my project. All that I have done is
only due to such supervision and assistance and I would not forget to thank
them.

I respect and thank ​Mrs. Manisha Barman ma’am​, our Project guide
and mentor, for providing me an opportunity to do the project work and
giving us all support and guidance which made me complete the project
duly. I am extremely thankful to him for providing such essential support,
guidance and above all, a great learning experience.

I am thankful to and fortunate enough to get constant encouragement,


support and guidance from all Teaching staffs of Kalyani Government
Engineering College, Department of Information Technology, who helped us
in successfully completing our project work. Also, I would like to extend our
sincere esteems to all staff in laboratory for their timely support.

SAPTAPARNA BHOWMICK _______________________


(University Roll No.​10200215039​)

TANMOY SAHA _------------------------------------------- _


(University Roll No.​10200215048​)

ABHINANDAN BHATTACHARYA ---------------------------------


(University Roll No.​10200215002​)

ASHFAQUE ALI KHAN ______________________________


(University Roll No.​10200215010​)
ABSTRACT

Using image stitching and image steganography security can be


provided to any image which has to be sent over the network or transferred
using any electronic mode. There is a message and a secret image that has to
be sent. The secret image is divided into parts. The first phase is the
Encrypting Phase, which deals with the process of converting the actual
secret message into ciphertext using the AES algorithm. In the second phase
which is the Embedding Phase, the cipher text is embedded into any part of
the secret image that is to be sent. Third phase is the Hiding Phase, where
steganography is performed on the output image of Embedding Phase and
other parts of the image where the parts are camouflaged by another image
using least significant bit replacement. These individual parts are sent to the
concerned receiver. At the receiver’s end decryption of Hiding phase and
Embedding Phase takes place respectively. The parts obtained are stitched
together using k nearest method. Using SIFT features the quality of the
image is improved.
CONTENTS

CHAPTER 1
1.1 Introduction
1.2 History
1.3 Motivation
1.4 Background Work
1.5 Software Used
1.6 Software Requirement
1.7 Hardware Requirement

CHAPTER 2
2.1 Method and Implementation
2.2 Basic Concept of AES Algorithm
2.3 Basic Concept of STEGANOGRAPHY
2.4 Steps Involving Image Encryption
2.5 Proposed Methodology

CHAPTER 3
3.1 Encrypting Phase
3.2 Steps involving Image Decryption
3.3 Decrypting Phase

CHAPTER 4
4.1 Development Process
4.2 Planning
4.3 Designing
4.4 Implementation and Testing
4.5 Proposed Work

CHAPTER 5
5.1 Result And Output

CHAPTER 6
6.1 Future Scope

CHAPTER 7
​Conclusion

CHAPTER 8
​References
Chapter 1

1. Introduction

Recently with the greater demand in digital signal transmission and big loss
of data illegally data security has become a critical and impressive issue in data
transmission applications In order to protect valuable information from undesirable
readers or other illegal modification or reading various types of cryptographic schemes
are used the two types of cryptographic schemes are:
1.symmetric cryptography
2.asymetric cryptography
In symmetric scheme uses the same key for encryption and decryption Two keys
are used in asymmetric cryptography one for encryption known as public key and other
for decryption known as private key Asymmetric cryptography is often in key distribution
and digital signature for its slow processing speed.
The symmetric cryptography is normally used to encrypt private data for its high
performance. Moreover, the most used symmetric ciphering systems like AES, DES,
IDEA algorithm make use of the most recent developments in information processing
technology. In our project we have used to encrypt our image and text with the help of
AES algorithm. The more popular and widely adopted symmetric encryption algorithm is
the Advanced Encryption Standard (AES). It is found at least six time faster than triple
DES algorithm. In present day cryptography, AES is widely adopted and supported in
both hardware and software. Till date, no practical cryptanalytic attacks against AES has
been discovered. Additionally, AES has built-in flexibility of key length, which allows a
degree of ‘future-proofing’ against progress in the ability to perform exhaustive key
searches. To hide the text inside the image we are using steganography employ LSB
substitution technique for hiding of the data into cover image. Cryptography technique
provides encryption to the original content thereby changing the representation of the
information, which becomes difficult to understand by the attacker or intruder. In our
paper, we make use of AES encryption standard to provide cryptography. Hence, the
paper involves a combination of Steganography and Cryptography which will certainly be
more robust for the information security of the data which is being transmitted. In today’s
world of growing technology security is of utmost concern. With the increase in
cybercrime, providing only network security is not sufficient. Security provided to images
like blue print of company projects, secret images of concern to the army or of company’s
interest, using image steganography and stitching is beneficial. As the text message is
encrypted using AES algorithm and embedded in a part of the image the text message is
difficult to find. More over since the secret image is broken down into parts and then sent
to the receiver. This makes it difficult for the trespassers to get access to all the parts of
the images at once. Thus, increasing the security to a much-needed higher level. This
makes it becomes highly difficult for the intruder to detect the and decode the document.
There is no limitation on the image format that can be used right from bmp to a gif image
can be used. It can be grey scale or colored images. The size of the message needs to be
of only 140 characters.
​2.History

​ Visual cryptography is a cryptographic technique which allows visual


information (pictures, text, etc.) to be encrypted in such a way that the decrypted
information appears as a visual image. One of the best-known techniques has been
credited to Moni Naor and Adi Shamir, who developed it in 1994. They demonstrated a
visual secret sharing scheme, where an image was broken up into n shares so that only
someone with all n shares could decrypt the image, while any n − 1 shares revealed no
information about the original image. Each share was printed on a separate transparency,
and decryption was
performed by overlaying the shares. When all n shares were overlaid, the original image
would appear. There are several generalizations of the basic scheme including k-out-of-n
visual cryptography. Using a similar idea, transparencies can be used to implement a
one-time pad encryption, where one transparency is a shared random pad, and another
transparency acts as the ciphertext. Normally, there is an expansion of space requirement
in visual cryptography. But if one of the two shares is structured recursively, the
efficiency of visual cryptography can be increased to 100%.The Advanced Encryption
Standard (AES), also known by its original name Rijndael is a specification for the
encryption of electronic data established by the U.S. National Institute of Standards and
Technology (NIST) in 2001. AES is a subset of the Rijndael block cipher developed by
two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a
proposal to NIST during the AES selection process. Rijndael is a family of ciphers with
different key and block sizes. For AES, NIST selected three members of the Rijndael
family, each with a block size of 128 bits, but three different key lengths: 128, 192 and
256 bits. The algorithm described by AES is a symmetric-key algorithm, meaning the
same key is used for both encrypting and decrypting the data. Steganography comes from
the Greek steganos (covered or secret) and -graphy (writing or drawing). Steganography
can be defined as the hiding of information by embedding messages within other,
seemingly harmless messages, graphics or sounds. The first steganographic technique was
developed in ancient Greece around 440 B.C. The Greek ruler Histaeus employed an
early version of steganography which involved: shaving the head of a slave, tattooing the
message on the slave’s scalp, waiting for the growth of hair to disclose the secret
message, and sending the slave on his way to deliver the message. The recipient would
have the slave’s head to uncover the message. The recipient would reply in the same form
of steganography. In the same time period, another early form of steganography
was employed. This method involved Demerstus, who wrote a message to the Spartans
warning of eminent invasions from Xerxes. The message was carved on the wood of wax
tablet, and then covered with a fresh layer of wax. This seemingly blank tablet was
delivered with its hidden message successfully. Steganography continued development in
the early 1600s as Sir Francis Bacon used a variation in type face to carry each bit of the
encoding.
3.Motivation

​We’ve entered a time when the conveniences of widespread connectivity,


including the cloud, have put us at more risk than ever of getting hacked. When data does
fall into the wrong hands, the consequences can be devastating. High-profile data
breaches and ransomware attacks have organizations and individuals on red alert for the
best ways to safeguard their data and networks, both now and for the future. While good
IT security strategies can be very effective in protecting networks—essentially letting the
good guys in and keeping the bad guys out—how do you account for all of the data that’s
traveling across the airwaves between mobile devices, browsers, databases, and the
cloud? There’s a time-tested science that is increasingly becoming a crucial link in the
security chain: encryption. Encryption scrambles text to make it unreadable by anyone
other than those with the keys to decode it, and it’s becoming less of an added option and
more of a must-have element in any security strategy for its ability to slow down and even
deter hackers from stealing sensitive information. If good encryption is capable of
hindering investigations by FBI experts, consider what it could do for you and your
company’s sensitive information. If you’ve been putting off adopting encryption as a part
of your security policy, delay no more. Here’s a guide to the science of encryption, and
how you can begin implementing an encryption strategy today.

4. Background Work

While IT security seeks to protect our physical assets—networked


computers, databases, servers, etc.—encryption protects the data that lives on
and between those assets. It’s one of the most powerful ways to keep your
data safe, and while it isn’t impenetrable, it’s a major deterrent to hackers.
Even if data does end up getting stolen, it will be unreadable and nearly
useless if it’s encrypted.

How does it work? Encryption—based on the ancient art of


cryptography—uses computers and algorithms to turn plain text into an
unreadable, jumbled code. To decrypt that ciphertext into plaintext, you need
an encryption key, a series of bits that decode the text. The key is something
only you or the intended recipient has in their possession. Computers are
capable of breaking encrypted code by guessing an encryption key, but for
very sophisticated algorithms like an elliptic curve algorithm, this could take
a very, very long time.

Here’s a very simple example. Say you want to encrypt this sentence:

“Protect your data with encryption.”


If you use a 39-bit encryption key, the encrypted sentence would look like
this:
“EnCt210a37f599cb5b5c0db6cd47a6da0dc9b728e2f8c10a37f599cb5b5c0db
6cd47asQK8W/ikwIb97tVolfr9/Jbq5NU42GJGFEU/N5j9UEuWPCZUyVA
sZQisvMxl9h9IwEmS.”

You can send that encrypted message to someone, separately share the key,
then they’re able to decrypt it and read the original sentence.

If you send an encrypted email, only the person with the encryption key can
read it. If you’re using an encrypted internet connection to shop online, your
information and credit card number are hidden from unauthorized users, like
hackers, illegal surveillance, or identity thieves. If you encrypt data before
syncing it with the cloud, the cloud—or anyone breaking into it—can’t read
that data. Even iPhones are encrypted to protect their data if they’re lost or
stolen—something that has made headlines when organizations like the FBI
or the NSA need access to them for investigations.

5. Software Used

A number of Software and Application are used to build the current program The
program are listed below.

● MATLAB (2009b)
● MICROSOFT WORD 2016

6. Software Requirement

● A COMPUTER WITH A 1.4 GHz PENTIUM 4


● CPU(MINIMUM)
● MICROSOFT WINDOWS OR VISTA
● MATLAB
● DIGITAL IMAGE

7. Hardware Requirement

● Processor Intel Pentium Dual Core 2.20 Ghz or Above


● Clock speed: 500 MHZ
● System Bus: 32 bit
● RAM: 2048 MB
● HDD: 320 GB or higher
● Monitor: LCD or LED
● Keyboard: Qwerty Keyboard
● Mouse: Optical mouse

Chapter 2

Method and Implementation

1. Theory

With the increase in data communication over the network, security of the data is
of major concern and hence is the theme of our paper. Digital data can be transmitted over
the network with little error and least interference, however to ensure unauthorized access
of the data, we need to preserve confidentiality and data integrity of the message which is
being transmitted. Steganography techniques are used to protect information by
concealing secret data. We employ LSB substitution technique for hiding of the data into
cover image. Cryptography technique provides encryption to the original content thereby
changing the representation of the information, which becomes difficult to understand by
the attacker or intruder. In our paper, we make use of AES encryption standard to provide
cryptography. Hence, the paper involves a combination of Steganography and
Cryptography which will certainly be more robust for the information security of the data
which is being transmitted. In this paper, we present a combination of both these
techniques wherein the text is first hidden into some form of cover image using Least
significant bit (LSB) hiding method and then encryption using Advanced Encryption
Standard (AES) is performed on to the stego image. The combination of both these
algorithms will certainly ensure high degree of security, integrity, capacity and robustness
to the embedded data. Using GUI based MATLAB simulation, a comparative analysis is
being made by employing different formats of the images for learning variations in
performance evaluation parameters such as delay, Peak Signal to Noise Ratio (PSNR),
Mean Square Error (MSE), and Absolute Mean Square Error (AMSE). The objectives of
this paper are to provide security against visual as well as statistical attacks and to ensure
better quality of received information.​ ​Information security​ is the most common word
uttered by any man any device or any peripheral since past two centuries. Protection from
malicious sources has become a part of the invention or the discovery cycle. Myriad
methods of protection are used ranging from a simple authentication password to most
complex Cryptography or Steganography algorithms for hiding the extreme sensitive
data. The other useful information security scheme for proving the ownership is through
watermarking .One such exclusive method for the data security and protection is the
image encryption .The definition is quite simple from the terms, encryption meaning the
data or bits of any particular source are changed in a definite pattern which is known to
only sender and receiver.

2. Basic Concept of AES algorithm

The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen


by the U.S. government to protect classified information and is implemented in software
and hardware throughout the world to encrypt sensitive data. AES is an iterative instead
of Feistel cipher. It is based on two common techniques to encrypt and decrypt data
knowns as substitution and permutation network (SPN). SPN is a number of
mathematical operations that are carried out in block cipher algorithms. AES has the
ability to deal with 128 bits (16 bytes) as a fixed plaintext block size. These 16 bytes are
represented in 4x4 matrix and AES operates on a matrix of bytes. In addition, another
crucial feature in AES is number of rounds. The number of rounds is relied on the length
of key. There are three different key sizes are used by AES algorithm to encrypt and
decrypt data such as (128, 192 or 256 bits). The key sizes decide to the number of rounds
such as AES uses 10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds
for 256-bit keys.

A. Substitute Bytes Transformation

The first stage of each round starts with Sub Bytes transformation. This stage is
depending on nonlinear S-box to substitute a byte in the state to another byte.
According to diffusion and confusion Shannon’s principles for cryptographic
algorithm design it has important roles to obtain much more security [12]. For
example, in AES if we have hexa 53 in the state, it has to replace to hexa ED. ED
created from the intersection of 5 and 3. For remaining bytes of the state have to
perform this operation.
Fig.1 Substitute byte transformation
B. Shift Rows Transformation

The next step after Sub Byte that perform on the state is Shift Row. The main idea
behind this step is to shift bytes of the state cyclically to the left in each row rather
than row number zero. In this process the bytes of row number zero remains and does
not carry out any permutation. In the first row only one byte is shifted circular to left.
The second row is shifted two bytes to the left. The last row is shifted three bytes to
the left. The size of new state is not changed that remains as the same original size 16
bytes but shifted the position of the bytes in state as illustrated in fig.2.
Fig.2 Shift Rows

C. Mix Columns Transformation

Another crucial step occurs of the state is Mix


Column. The multiplication is carried out of the
state. Each byte of one row in matrix
transformation multiply by each value (byte) of the
state column. In another word, each row of matrix
transformation must multiply by each column of
the state. The results of these multiplication are
used with XOR to produce a new four bytes for the
next state. In this step the size of state is not
changed that remained as the original size 4x4 as
shown in fig.3.
​ Fig.3 Multiplication Matrix

D​. ​Add Round Key Transformation

Add Round Key is the most vital stage in AES algorithm. Both the key and the input
data (also referred to as the state) are structured in a 4x4 matrix of bytes. Fig. 4 shows
how the 128-bit key and input data are distributed into the byte matrices. Add Round Key
has the ability to provide much more security during encrypting data. This operation is
based on creating the relationship between the key and the cipher text. The cipher text is
coming from the previous stage. The Add Round Key output exactly relies on the key
that is indicated by users. Furthermore, in the stage the subkey is also used and combined
with state. The main key is used to derive the subkey in each round by using Rindael's
key schedule. The size of subkey and state is the same. The subkey is added by
combining each byte of the state with the corresponding byte of the subkey using bitwise
XOR.

Fig.4 Add Round Key


Inputs for Single AES Round

3. Basic Concept Of​ STEGANOGRAPHY

Steganography relies on hiding message in unsuspected multimedia and is


generally used in secret communication between acknowledged parties . The technique of
Steganography takes advantage of the psycho visual redundancy of the Human Visual
System (H. V. S.) that is taking advantage of the fact that human eye cannot distinguish
between two highly correlated pixels. This can be easily accomplished if the carrier to
hide the text is in the form of digital image, wherein adjacent pixels are highly correlated.
Any Steganography system model must satisfy the following three properties:

● Invisibility:​ The secret data must be invisible with the naked eye view.
● Capacity: ​A cover image must hold more embedded secret data, consequently
image quality is degraded, and hence there is a trade-off between image quality
and capacity

● Robustness: ​The stego image must hold the secret data even after some noise gets
added to it.

The above 3 conditions are the qualitative measures which indicates how much is our
system model capable to handle the various attacks

Flow Chart of the proposed method

Steganography is divided into two main categories:

● Spatial domain approach: In this method, the secret message is directly hidden by
modifying the pixels of the image. Advantage of this technique is high data
embedding capacity. Examples are LSB substitution technique, watermarking etc.

● Transform domain approach: In this method, the secret message is indirectly


embedded by taking some type of transforms such as DCT, DWT, etc. Advantage
of this technique is more robustness.

The important concepts such as LSB inserting, followed by the types of cryptosystem etc.
are discussed in the following sections.
LSB substitution method of Steganography: LSB substitution is the most adapted method
to increase the capacity of data hiding by making some compromise in the image quality.
The LSB in the 8bit grey level image contains very less significant information, while the
MSB of the image contains significant information. LSB bit substitution technique makes
the use of this bit position and smartly replaces LSB of image with the secret data. The
mathematical representation of LSB method can be given as:

x i’ = xi-xi mod (2k) +mi.


In the above equation, xi denotes the I th pixel value of the stego image. mi denotes the
decimal value of the I th block in the secret image. k is the number of LSB substituted.

On the other hand, the mathematical representation of extracted image is given as


mi = xi’ mod 2​k

Now, if desire choice is capacity then even the last second bit can be substituted but this
will result in degradation of the image quality. Hence, there is a trade-off between image
quality and capacity of data hiding.

4. Steps Involving Image Encryption

We employ AES standard of symmetric cryptosystem. AES is a block cipher


technique with a data block length of 128 bits.

AES allows for three different key length sizes such as 128 bits, 192 bits, 256 bits.
Depending upon the key length different numbers of processing rounds are required for
any AES algorithm.

Data block length: 128bits.


Key length: 128bits, 192bits or 256bits.
AES is an iterative algorithm in which single complete iteration is called as “Round”. The
total number of rounds Nr depends upon the key length N​k.

The 128 bit data is divided into 16 Bytes. These bytes are mapped to a 4*4 array called as
the state and all operations of AES are performed on this state.

Each round involves four steps namely:

● Byte substitution step


● Row wise permutation step
● Column wise mixing step
● Addition of Round key
AES encryption block diagram different steps which are
performed based upon N​r​ and N​k​.

The following are the variations of the key size and their corresponding rounds:
AES parameters
If the key length is less than the required number of bits for a specific AES algorithm then
it must be expanded by zero padding method to bring it to desired length. However, if the
required key length is more than the data bits as in AES-192, AES-256 than the key
expansion algorithm is used to expand the key length.

5. PROPOSED METHODOLOGY

We perform the combination of both Steganography and Cryptography thereby


ensuring high degree of security for the data. For the steganography we employ LSB
substitution technique and then carrying out encryption using AES technique which
involves 128 bit block size of data and 128 bit block size of the key.
The process of hiding text into the image is done using the spatial domain approach
named as LSB substitution technique, wherein LSB of the cover image is being replaced
by the data. This method ensures larger data holding capacity with negligible compromise
on the image quality. This is because in an image there is high degree of redundant
information as adjacent pixels are highly correlated and HVS cannot distinguish among
correlated pixels.

1. Steganography Implementation Using LSB Substitution

The complete algorithm of data hiding in an image is given in as follows:


Let C be the original 8-bit greyscale cover-image of

For embedding the n-bit secret message M into the k rightmost LSBs of the cover-image
C, the secret message M is rearranged to form a conceptually k-bit virtual image M’
which is represented as,

A subset of n’ pixels {xl1, xl2 ,………. xln} is chosen from the cover-image C in a
predefined sequence. The embedding process is completed by replacing the k LSBs of xli
by m’i. Mathematically, the pixel value xli of the chosen pixel for storing the k-bit
message m’i is modified to form the stego-pixel x’li as follows:

Also, Algorithm for LSB Based extracting process is given as: In the extraction process,
given the stego-image S, the embedded messages can be directly extracted. Using the
same sequence as in the embedding process, the set of pixels {xl1,xl2 ,……….xln}storing
the secret message bits are selected from the stego-image. The k LSBs of the selected
pixels are extracted and lined up to reconstruct the secret message bits.
2. Implementation of Encryption using AES method Designing Steps

​State array
The input to the encryption algorithm is a single 128 bit block; now this block is
required to be copied into a state array. State Array is a square matrix of bytes. This state
array is modified at each stage of encryption.

Key Expansion
This stage is the most important stage for both encryption as well as decryption.
The AES key expansion algorithm takes as input a 4-word key and produces a linear
array of 44 words. Each round uses 4 of these words as shown in Fig. 4. Each word
contains 32 bytes which means each sub key is 128 bits long.

Key Expansion

Add Round Key Expansion


The 128 bits of State array are bitwise XORed with the 128bits of the round
key(4 words of the expanded key).The operation is viewed as a column wise operation
between the 4 bytes of the State array column and one word of the round key
Add Round Key Expansion
S-Box Substitution

AES defines a 16 x 16 matrix of byte values, called an S-box which contains a


permutation of all possible 256 8bit values. Each byte of State array is mapped into a new
byte in the following way: The leftmost 4 bits of the byte are used as a row designated
value and the leftmost 4 bits are used as a column designated value. These row and
column designated values serve as indexes into the S-box to select a unique 8-bit output
value.

S-Box Substitution

Row Shifting

For the second row, a 1-byte circular left shift is performed. For the third row, a 2-
byte circular left shift is performed. For the third row, a 3- byte circular left shift is
performed. For the first row, no shifting is performed.

Column Mixing

It operates on each column individually. Each byte of a column is mapped into a


new value that is a function of all four bytes in the column. The transformation can be
defined by following matrix multiplication on State array.
Chapter 3

1 Encrypting Phase

1. Choose the secret message

2. Calculate the length of the secret message

3. Convert the text into binary


4. Apply the AES Algorithm for encrypting the text

5. Embed the encrypted text into an image

6. Send the Embedded Image to the Sender8


2. Steps Involving Image Decryption

The decryption is the process to obtain the original data that was encrypted. This
process is based on the key that was received from the sender of the data. The decryption
processes of an AES is similar to the encryption process in the reverse
order and both sender and receiver have the same key to encrypt and decrypt data. The
last round of a decryption stage consists of three stages such as Inv Shift Rows, Inv Sub
Bytes, and Add Round Key as illustrated below

Decryption Processes
3. Decrypting Phase

I. Choose the encrypted Image

II. Extract the Encrypted text from the Image

III. Decrypt the text into Binary using AES algorithm


IV. Convert the binary data into Original text
Chapter 4

DEVELOPMENT AND COMPUTATION

1. DEVELOPMENT PROCESS:

The whole process of building software does not involve writing and
expectation of codes. Any proper software development process is composed of certain
sequence of steps. These steps include:

I. Proper planning
II. Accurate designing
III. Correct Implementation
IV. Final testing

All these parameters should be checked before finally delivering the exact result

2. PLANNING:

This forms the initial stage of the development process. The foremost step has
been established of the idea behind the project. Then it was necessary to carry of the
feasibility study. The next task was to assign a plan of action for computing the idea.
Estimation of required resource is done.

3. DESIGNING:

Once the planning was done it was time for moving forward into technical
details. At this stage the total work was divided into various modules. Each module was
set with certain targets. They reflected the functional aspects of the system Designing
involved laying the technical modeled. The design of the
coding detailed was also adopted.

4. IMPLEMENTATION AND TESTING:

Following the design, implementation was the major work to be done. This
phase involved the building the code base for the product. The source code was written in
function, every time a fragment of the code was written, it was individually tested and
verified. Once it was done such fragments were with already such developed fragments to
form larger functions. Hence implementation and testing were carried out almost at the
same time.
5. PROPOSED WORK:

In this section, we summarized the related work to our proposed research as


follows:

1. Inserting a text and converting it into its corresponding binary value:

Convert text into binary. Computers store all characters as numbers stored as
binary data. Binary code uses the digits of 0 and 1 (binary numbers) to represent
computer instructions or text. Each instruction or symbol gets a bit string assignment. The
strings can correspond to instructions, letters, or symbols. In computing, these codes are
used for encoding data. This base-2 or binary numeral system is used in mathematics and
computer science. The system represents values using just the two symbols. The values in
the binary systems are typically called binary numbers. In digital electronics and more
specifically in digital electronic circuits that use logic gates (with values of 0 and 1),
computers use the binary system internally. Computer based devices use the binary
system as well with this including mobile phones. You can convert to and from binary
and the base-10 system typically used by humans. You can also convert to and from
binary and hexadecimal where you need four digits of binary to represent one digit of
hex. Converting to and from binary and octal is another possibility. It takes three binary
digits to represent an octal digit. Binary 000 is octal digit 0. With binary code you use the
binary numbering system to represent text or instructions.

2. Converting the text to cipher text using AES Algorithm:

In cryptography programming you have to be very careful to differentiate


between binary data and what we'll refer to here as text data. 'Text' consists of readable,
printable characters we expect to see on our computer screen or in a book. It might
consist of simple US-ASCII/ANSI characters or it could be Unicode or DBCS oriental
character strings. Text is usually stored in a string type of some kind. 'Binary' data is a
string of bits that we conventionally store as bytes or octets. The input to an encryption
process must be 'binary' data, i.e. a 'bit string'. We need to convert the text we want to
encrypt into 'binary' format first and then encrypt it. The results of encryption are always
binary. Do not attempt to treat raw ciphertext as 'text' or put it directly into a String type.
Store ciphertext either as a raw binary file or convert it to base64 or hexadecimal format.
You can safely put data in base64 or hexadecimal format in a String. When you decrypt,
always start with binary data, decrypt to binary data, and then and only then, convert back
to text, if that is what you are expecting. You can devise your own checks to make sure
the decrypted ciphertext is what you expect before you do the final conversion.
3. inserting the text inside an image using steganography:

To a computer, an image is a collection of numbers that constitute different light


intensities in different areas of the image. This numeric representation forms a grid and
the individual points are referred to as pixels. Most images on the Internet consists of a
rectangular map of the image’s pixels (represented as bits) where each pixel is located
and its color. These pixels are displayed horizontally row by row. The number of bits in a
color scheme, called the bit depth, refers to the number of bits used for each pixel. The
smallest bit depth in current color schemes is 8, meaning that there are 8 bits used to
describe the color of each pixel. Monochrome and greyscale images use 8 bits for each
pixel and are able to display 256 different colors or shades of grey. Digital color images
are typically stored in 24-bit files and use the RGB color model, also known as true color
All color variations for the pixels of a 24-bit image are derived from three primary colors:
red, green and blue and each primary color is represented by 8 bits. Thus, in one given
pixel, there can be 256 different quantities of red, green and blue, adding up to more than
16 million combinations, resulting in more than 16-million colors. Not surprisingly the
larger amount of colors that can be displayed, the larger the file size.
Chapter 5

Results & Output:

Sender Window
Receiver Window
Chapter 6

6. FUTURE SCOPE:

Implementation of Steganography and Cryptography together were performed


with text and images, but this method can be further be extended to audio, video as well
thereby adding up the security in the audio and video processing. Our ability to discover
hidden information during our investigations is vital, especially as new and innovative
methods continue to evolve.

During the past decade, data hiding technologies have advanced from limited
use to ubiquitous deployment. With the rapid advancement of smart mobile devices, the
need to protect valuable proprietary information has generated a plethora of new methods
and technologies for both good and evil. Most dangerous among these are those that
employ hiding methods along with cryptography, thus providing a way to both conceal
the existence of hidden information while strongly protecting the information even if the
channel is discovered.

Many vendors provide excellent technologies for protecting the privacy of


information for the desktop. In addition, many of the latest smart mobile platforms
(Android and iPhone) include built-in cryptographic capabilities. What is more dangerous
and difficult to discover/decipher are data hiding methods that exploit multimedia and
protocol weaknesses to both hide and communicate covertly. These new techniques
provide hybrid solutions that combine the best of cryptography with the best of
steganography. The interest, innovation, and advancement of these threats continue to go
unchecked for the most part.

7. CONCLUSION

​The proposed scheme is developed to ensure the more image security during
transmission by facilitating the quick image transfers. Also, the processing image security
mechanism had to be effective in the terms of elapsed time. Elapsed time is the term used
for time taken for the image processing during various transform operations. The image
quality has been measured using various performance parameters like Peak signal to noise
ratio (PSNR) and mean squared error (MSE). The proposed scheme consisted of three
components: compression,
encryption and steganography. For the compression, the discrete wavelet transform is
modified for robust image compression, whereas the blowfish algorithm has been selected
for the image encryption. The image encryption hides the image details by performing
mathematical computation on image data. The steganography is the process of hiding one
image into another image to fool the hackers and to deliver the secret data without any
visual data transmission details. The proposed algorithm has been designed to ensure the
image security during the transmission over the image sharing enabled social media
applications. These applications usually do not have strong security mechanisms to
protect the user data. The proposed algorithm is designed to fill that certain gap of
stronger security mechanism for image sharing based social media applications. The
results of the proposed algorithm have shown that the proposed algorithm have performed
more strong and lossless compression on the images in comparison with the existing
compression system. The overall system performance has been evaluated with four
performance parameters: Peak signal to noise ratio (PSNR), mean squared error (MSE),
Elapsed time (ET) and Compression Ratio (CR). The overall system performance has
shown that the new system is robust, quick and effective for the image security. The
proposed system has been tested on a classified image dataset. The image dataset is
shortlisted to five six categories. The results on all of the six categories have proved the
proposed system better than the existing system.

8. References

​1.” Automatic Panoramic Image Stitching using Invariant Features”, Matthew Brown
and David G. Lowe of Computer Science, University of British Columbia, Vancouver,
Canada.
2.” High payload using mixed codebooks of Vector Quantization”, H. B. Kekre,
Tanuja K. Sarode, Archana Athawale, Kalpana Sagvekar
3.” Steganography Using Dictionary Sort on Vector Quantized Codebook. H.B. Kekre,
Archana Athawale, Tanuja Sarode, Sudeep Thepade & Kalpana Sagvekar International
Journal of Computer Science and Security (IJCSS), Volume (4): Issue (4) 392
4. ”H.B. Kekre, Archana Athawale and Pallavi N.Halarnkar,”Polynomial
Transformation to improve Capacity of Cover Image For Information Hiding in Multiple
LSBs ”,International Journal of Engineering Research and Industrial
Applications(IJERIA),Ascent Publications ,Volume 2,March 2009,Pune

You might also like