0% found this document useful (0 votes)
17 views22 pages

Nis Micro

The document discusses a micro project on encrypting and decrypting data in an image using cryptography and steganography algorithms. It provides details of the student group, aim of the project, literature review conducted, proposed system architecture and the encryption and embedding phases of the project.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views22 pages

Nis Micro

The document discusses a micro project on encrypting and decrypting data in an image using cryptography and steganography algorithms. It provides details of the student group, aim of the project, literature review conducted, proposed system architecture and the encryption and embedding phases of the project.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

MIT POLYTECHNIC PUNE

MICRO PROJECT

TOPIC: Encrypt And Decrypt Data In Image Using


Cryptography And Steganography Algorithm
Program: Information technology

Program Code: IF6I

Course: Network And Information Security


Course Code: 22620

Name of Guide: Prof.Tushar kolhe.


Certificate

This is to certify that this micro project report titled ‘Encrypt And Decrypt Data In Image Using
Cryptography And Steganography Algorithm’ is the bonafide work of Ms.Avantika Bhatgave of third
year diploma in Information technology for the course ‘Network and Information Security ’ Course
code: 22620 during the academic year 2024- 2025, who carried out the micro project work under my
supervision.

Place: Pune. Enrollment no: 2101480039


Date: Exam Seat No.:

subject teacher Head of Department Principal

(Prof.Mrunal Fatangare) (Prof.Dr.R.S.Kale)


(Prof.Tushar Kolhe)
Certificate

This is to certify that this micro project report titled ‘Encrypt And Decrypt Data In Image Using
Cryptography And Steganography Algorithm’ is the bonafide work of Ms.Prachi Nimbalkar of third
year diploma in Information technology for the course ‘Network and Information Security ’ Course
code: 22620 during the academic year 2024- 2025, who carried out the micro project work under my
supervision.

Place: Pune. Enrollment no: 2101480046


Date: Exam Seat No.:

Subject Teacher Head of Department Principal


(Prof.Tushar Kolhe) (Prof.Mrunal Fatangare) (Prof.Dr.R.S.Kale)
Certificate

This is to certify that this micro project report titled ‘Encrypt And Decrypt Data In Image Using
Cryptography And Steganography Algorithm’ is the bonafide work of Mr.Vaibhav Tadke of third year
diploma in Information technology for the course ‘Network and Information Security ’ Course code:
22620 during the academic year 2024- 2025, who carried out the micro project work under my supervision.

Place: Pune. Enrollment no: 2101480065


Date: Exam Seat No.:

Subject Teacher Head of Department Principal

(Prof.Tushar Kolhe) (Prof.Mrunal Fatangare) (Prof.Dr.R.S.Kale)


Certificate
This is to certify that this micro project report titled ‘Encrypt And Decrypt Data In Image Using
Cryptography And Steganography Algorithm’ is the bonafide work of Ms.Vishakha Poojari of third
year diploma in Information technology for the course ‘Network and Information Security ’ Course
code: 22620 during the academic year 2024- 2025, who carried out the micro project work under my
supervision.

Place: Pune. Enrollment no: 2101480080


Date: Exam Seat No.:

Subject Teacher Head of Department Principal

(Prof.Tushar Kolhe) (Prof.Mrunal Fatangare) (Prof.Dr.R.S.Kale)


MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION

Student/Group Details (if group is applicable):

SR NAME ROLL NO. ENROLLMENT NO. SEAT


NO. NO.

1 Avantika Bhatgave 04 2101480039

2 Prachi Nimbalkar 10 2101480046

3 Vaibhav Tadke 26 2101480065

4 Vishakha Poojari 39 2101480080

Name of Guide: Prof. Tushar Kolhe


ACKNOWLEDGEMEMT

It is with profoundly sense of gratitude that we acknowledge from our guide


Mr.Tushar Kolhe . He has been guide in the true sense of word, a guide who satisfaction from
our word & progress.

We are highly obliged to Mrs. Mrunal Fatangare. .Head of Information Technology


for aberrance &good co-operation given to us for bringing this project to almost standard.
We are grateful to our principal Dr. Rohini Kale for proceeding acknowledgement to
us in the connection of this project concluding. We appreciate the assistance of all staff that
helps us in for their sincere & obliging help to make our project successfully.
TABLEOFCONTENTS
Sr.no Topics PageNo.
PartA
1 Brief Introduction 1

2 Aim Of The Micro Project:

3 Intended Course Outcomes

4 Literature Review 2

5 Action Plan
6 Resources Required: 3

7 Name Of Team Members


PartB
1 Introduction 4
2 Cryptography 5
3 Steganography 6
4 Proposed System Architecture 7
5 Encryption Phase 8
6 Flowchart 9
Fig: Encryption and Decryption process 10
Encryption Process
7
Example
Table1:DetectXValue 11
Table2:Convertplaintextintociphertext
Embedding Phase 12
8
Conclusion 13
9
Skill Development 14
10
Reference
11
Micro Project Proposal
Part-A

“Forensic Accounting in the Fraud Auditing Case”

1. Brief Introduction

Nowadays, communication is one of the most important ways in our daily life for transferring and
sharing information by using telephonically or internet. To maintain the information from intruder
many in secure path ways have been carried out on the information. Steganography and
Cryptography are two methods which could be used to keep the information. Information using
telephonically or internet.

2. Aim Of The Micro Project


This Micro-Project aim sat:
To introduce steganography and cryptography algorithm.

To introduce encryption phase and embedding phase.

3. Intended Course Outcomes


Apply crypto graphics algorithms and protocols to maintain computer security.
Identify ricks related to computer security and information hazardin various situations.

1 |Page
4. Literature Review

To this Network And Information Security project, we searched various sources.


Prominent among the mare google, you-tube, Wikipedia, geekforgeeks
also took the help of our subject teacher in choosing one of the unique
subject. You-tube also helped us clear a lot of concepts regarding our
project as well as also the Google.
Wikipedia helped us in the way we got few data about, and many
more data related to it. We also took help of the book ‘Android’. This
book also helped us a lot. Also, the important support was of our teacher
(Tushar Kolhe Sir).We took their help at each bit where we felt is necessary
to be taken.

5. Action procedure followed

Sr. Planned Planned Name of


Details of activity
no
Start date Finish date Members

1.
Topic Selection
Avantika
Bhatgave

Prachi Nimbalkar
2. Collecting
Information of topic Vaibhav Tadke

Vishakha Poojari
Testing and analysis
4. of
Test result

5. Documentation of
project

2 |Page
6. Resources Required

Sr.
Name of Resource Specification
no
Dell,RAM8GB,
1. Laptop Harddisk1TB,i3 processor

2. Steganography -

3. Microsoft Word 2019version

4. Operating system Windows11

7. Name Of Team Members

Name Roll No
Avantika Bhatgave 04

Prachi Nimbalkar 10

Vaibhav Tadke 26

Vishakha Poojari 39

Mr. Tushar Kolhe


(Micro-projectGuide)
3 |Page
PartB

“Encrypt And Decrypt Cryptography Steganography Algorithm”

Introduction

Nowadays, communication is one of the most important ways in our daily life for
transferring and sharing information by using telephonically or internet. To maintain the
information from intruder many in secure path ways have been carried out on the information.
Steganography and Cryptography are two methods which could be used to keep the information.
information using telephonically or internet.

However at a certain level it’s not safe. Cryptography and steganography are two methods that use
information in order to cipher or cover their existence respectively which could be used to share and
transfer information in a concealed manner. Cryptography is a technique includes modification of a
message for security the secrecy communication.
Nowadays, to encrypt and decrypt data in order to protect the message secret many different
methods have been developed.

In cryptography it’s always clear to inter mediate person that the message is encrypted form by an
encryption key which is known by sender and receiver only and without using encryption key
the message could not be accessed. However, these methods are not enough to protect the
contents of a message secret due to another technique is used with cryptography that is called
steganography.

Steganography is the art and science of invisible communication of message and the secret
message is made to hide in cover image and person can not be seen any message hidden in the
image. The cover image containing the secret data is then transferred to the recipient.
Steganography is a method of hiding secret message in a cover image while communication takes
place between sender and receiver

4 |Page
CRYPTOGRAPHY

It is a mechanism to encode and decode secret messages for protecting message from unauthorized
users to access the messages. In a network environment cryptography is playing a main role in data
protection in applications running. In Greek, cryptography means “hidden Secret”.

Moreover, in the past cryptography was used by the political sectors of intelligence and military
but presently it is commonly utilized in the ATM cards, e-commerce, e-mail, computer password,
and other application.Overtheyearstherearedifferentalgorithmhaveavailableto modify of a
message by an encrypting key which is known by sender and receiver .

The message could not be decrypted without using encrypting key. One of the issue is appeared
with cryptography is that the message always clear to intermediate person that the message is
encrypted form. This means that the sender of the message does not want it to be read by
unauthorized person. Today, there are many cryptography techniques which are capable of
encrypting data, one of the most widely technique is Affine algorithm. Affine has the ability to
convert the information to a form not understandable by the intruder.

5 |Page
STEGANOGRAPHY

Nowadays, various types of networks are used to exchange digital image among users. With the
growth of types of computer network a large amount of digital data has been exchanged over the
network due to many of data must be confidential, private or both. To protect this data from
intruder, the demand for stronger encryption techniques are increased.

Steganography is one of the most important techniques are used to embed the secret message
within an image. This technique is the perfect supplement for encryption that permits a user to
hide information inside an image. As mention at the previous section in cryptography, the
problem with cryptography is that the encrypted message is obvious and everyone known that the
messages are encrypted.

To solve this problem, steganography techniques can be able to provide more additional
protection on a secret message with cryptography so that the information is doubly protected.
Steganography hiding information within an image so it appears that no information is hiding
inside an image.

Thus, users can be transmitted the sensitive information over unsecured channel such as the
internet. There are various methods of steganography are used. In this paper we have used Least
Significant Bit (LSB) method to embed the secret message within an image.

6 |Page
Proposed System Architecture

In this paper, we have proposed new security techniques through using cryptography and
steganography for providing better security to maintain the privacy, accuracy and confidentiality of
the data while transferring from one end to the other end over the network.

The main objective of the system is to hide the message or a secret message into an image before
transmitting to the destination node on the network without any modification of the data inside an
image. The proposed techniques data steganography using Hash based Least Significant Bit (H- LSB)
is used to hide secret message in image file (bmp).

The system was run and compiled on windows10 and tested on University of Sulaimani, Faculty of
Physical & Basic Education-Computer Science Department. This system can be used by users
without knowledge of programming in C# because the Graphic User Interface (GUI) is designed to
be user friendly. This proposed system to input image provides an image platform and different text
box to insert data and showing the encrypt data before embedding the image.

We have used three phases to apply new proposed techniques

7 |Page
Encryption Phase

At the first step to access into the system for hiding the data, the users are needed a user name and
password. After login the system, user can write the message to encrypt the data with the secret keys
before embedding the data into an image as demonstrate in figure 1.

In our system the proposed scheme uses Affine algorithm to encrypt secret information. Affine
cipher is one of the algorithms that have used to encrypt data. In this process where in each letter in
an alphabet is mapped to its numeric equivalent, encrypted using a mathematical function, and
converted back to a letter.

The formula used means that each letter encrypts to one other letter, and back again, meaning the
cipher is essentially a standard substitution cipher with a rule governing which letter goes to which.
This technique provides better security to protect the data user from the unauthorized access over a
network due to which will not be easy to retrieve the data without the recipient key.

After converting the plain text into cipher text by using Affine algorithm we have taken cipher text
and converting each letter into ASCII codes then the ASCII codes have converted into a series of
binary codes to provide higher security. This proposed technique is used to prevent the intruders to
gettherealdatawhentheytrytoretrievethedata.Thisencryptdatawillbe embedded inside the image with
almost zero distortion of the original image.

8 |Page
Flowchart

Fig Flow chart diagram for the encryption and decryption process

9 |Page
Encryption Process
Step One: Choose the secret message

Step Two: Encrypt the message using Affine Cipher Algorithm


Step Three: Convert the encrypt message into ASCII code
Step Four: Convert ASCII code into binary

For Example:-
Input Text: Kurdistan
Encrypt Text: Kofmeilgt
In this process, the alphabet is going to be the letters A through Z.

In this encrypting example, the plaintext to been crypted is “Kurdistan”.

For the numeric values of each letter the following function have been used to encrypt each letter:

E(x)=(ax +b ) modm

Where:

x: is the numerical value of the letter in the plaintext.


m: is the number of letters in the plaintext alphabet and bare the secret
numbers between sender and receiver.
E(x): is the result of transformation.

10 |Page
Table1 Detect X Value

Plaintext K u r d i s t a n

X 10 20 17 3 8 18 19 0 13

Now, take each value of x, and solve the first part of the equation, (3x + 6). After finding the value of
(3x+6) for each character, take the remainder when dividing the result of (3x + 6) by 26. The following
table shows the first four steps of the encrypting process:

Table2 Convert Plain Text into Cipher Text

Plaintext K u R d i s t a n
X 10 20 17 3 8 18 19 0 13
(3x+6) 36 66 57 12 30 60 63 6 45
(3x+6)mode26 10 14 5 12 4 8 11 6 19
Cipher Text K O F m e i l g t

11 |Page
Embedding Phase

After encrypting the secret message we have proposed a method to embedding a encrypt message into
the image. This process is done by using Hash based Least Significant Bit (HLSB) which replaces the
least significant bit. LSB is the most popular steganography method to embedding data in an image file.
This method has applied to hide the encrypt message in the image and then send the image to the
intended receiver.

In this paper cryptography and steganography methods have been proposed to provide better security to
protect data from intruders by using multi-layer of security techniques. The combination of these two
methods will enhance the security of data embedding due to some important data that users want to
secure from others when data transmission over an open channel.

At the start of this process we take encrypt message to be embedded in the cover image, which will be
difficult for any intruder to decrypt it without the recipient private key then hash function has used to
select the positions and the proposed technique takes eight bits of secret data at a time will be embedded
in LSB of RGB (Red, Green and Blue) pixel value in the order of 3, 3, 2 respectively.

According to the techniques that we have used to embed the secret data into the image three bits are
embedded in Red pixel LSB, three bits are embedded in Green pixels and 2 bits are embedded in blue
pixels LSB. These eight bits are inserted in this order because the chromatic influence of blue color to
the human eye is more than red and green colors.

Therefore the distribution pattern chooses the 2bits to be hidden in blue pixel. Thus, the quality of the
image will be not sacrificed. This process is continued till entire message of bits will got embedded into
the cover image. To detect the positions to hide data in LSB of each RGB pixels of the cover image the
following formula is used: K= p % n ..................................... (1)
Where, K is the LSB bit position within the pixel, Prepresents the position of each hidden image pixels
and n is number of bits of LSB which is 4 for the present case.

12 |Page
Conclusion

In this paper, a cryptography and steganography methods have proposed for providing better security
of data in a network environment. With system that we have proposed data can be transferred
between sender and receiver via unsecured network environment.

Obviously, in a network environment this system is one of the best ways of hiding the secret of
message from intruders. The main focus of the paper is to develop a system with extra security
features.

Cryptography method i.e .Affine cipher algorithm has been implemented to encrypt the secret
message and converted into ASCII code before embedding it in the image so that it is not easy to
intruder to break the encryption without the keys and password. In addition, Hash based Least
Significant Bit.

13 |Page
Skill Development

• Presentation skill increased.


• Technical knowledge increased.
• Get more knowledge about operating system.
• Management of time.

Reference

• From TY.CM.TechKnowledge book


• REFERENCES
• https://www.tutorialspoint.com//computer_security/computer_se
curity_quick_guide.html
• http://stylesuxx.github.io/steganography/
• https://smartninja-pgp.appspot.com
• https://www.cyberlawsindia.net/cyber-india.html
• https://cyberlaws.net/cyber-law

You might also like