Nis Micro
Nis Micro
MICRO PROJECT
This is to certify that this micro project report titled ‘Encrypt And Decrypt Data In Image Using
Cryptography And Steganography Algorithm’ is the bonafide work of Ms.Avantika Bhatgave of third
year diploma in Information technology for the course ‘Network and Information Security ’ Course
code: 22620 during the academic year 2024- 2025, who carried out the micro project work under my
supervision.
This is to certify that this micro project report titled ‘Encrypt And Decrypt Data In Image Using
Cryptography And Steganography Algorithm’ is the bonafide work of Ms.Prachi Nimbalkar of third
year diploma in Information technology for the course ‘Network and Information Security ’ Course
code: 22620 during the academic year 2024- 2025, who carried out the micro project work under my
supervision.
This is to certify that this micro project report titled ‘Encrypt And Decrypt Data In Image Using
Cryptography And Steganography Algorithm’ is the bonafide work of Mr.Vaibhav Tadke of third year
diploma in Information technology for the course ‘Network and Information Security ’ Course code:
22620 during the academic year 2024- 2025, who carried out the micro project work under my supervision.
4 Literature Review 2
5 Action Plan
6 Resources Required: 3
1. Brief Introduction
Nowadays, communication is one of the most important ways in our daily life for transferring and
sharing information by using telephonically or internet. To maintain the information from intruder
many in secure path ways have been carried out on the information. Steganography and
Cryptography are two methods which could be used to keep the information. Information using
telephonically or internet.
1 |Page
4. Literature Review
1.
Topic Selection
Avantika
Bhatgave
Prachi Nimbalkar
2. Collecting
Information of topic Vaibhav Tadke
Vishakha Poojari
Testing and analysis
4. of
Test result
5. Documentation of
project
2 |Page
6. Resources Required
Sr.
Name of Resource Specification
no
Dell,RAM8GB,
1. Laptop Harddisk1TB,i3 processor
2. Steganography -
Name Roll No
Avantika Bhatgave 04
Prachi Nimbalkar 10
Vaibhav Tadke 26
Vishakha Poojari 39
Introduction
Nowadays, communication is one of the most important ways in our daily life for
transferring and sharing information by using telephonically or internet. To maintain the
information from intruder many in secure path ways have been carried out on the information.
Steganography and Cryptography are two methods which could be used to keep the information.
information using telephonically or internet.
However at a certain level it’s not safe. Cryptography and steganography are two methods that use
information in order to cipher or cover their existence respectively which could be used to share and
transfer information in a concealed manner. Cryptography is a technique includes modification of a
message for security the secrecy communication.
Nowadays, to encrypt and decrypt data in order to protect the message secret many different
methods have been developed.
In cryptography it’s always clear to inter mediate person that the message is encrypted form by an
encryption key which is known by sender and receiver only and without using encryption key
the message could not be accessed. However, these methods are not enough to protect the
contents of a message secret due to another technique is used with cryptography that is called
steganography.
Steganography is the art and science of invisible communication of message and the secret
message is made to hide in cover image and person can not be seen any message hidden in the
image. The cover image containing the secret data is then transferred to the recipient.
Steganography is a method of hiding secret message in a cover image while communication takes
place between sender and receiver
4 |Page
CRYPTOGRAPHY
It is a mechanism to encode and decode secret messages for protecting message from unauthorized
users to access the messages. In a network environment cryptography is playing a main role in data
protection in applications running. In Greek, cryptography means “hidden Secret”.
Moreover, in the past cryptography was used by the political sectors of intelligence and military
but presently it is commonly utilized in the ATM cards, e-commerce, e-mail, computer password,
and other application.Overtheyearstherearedifferentalgorithmhaveavailableto modify of a
message by an encrypting key which is known by sender and receiver .
The message could not be decrypted without using encrypting key. One of the issue is appeared
with cryptography is that the message always clear to intermediate person that the message is
encrypted form. This means that the sender of the message does not want it to be read by
unauthorized person. Today, there are many cryptography techniques which are capable of
encrypting data, one of the most widely technique is Affine algorithm. Affine has the ability to
convert the information to a form not understandable by the intruder.
5 |Page
STEGANOGRAPHY
Nowadays, various types of networks are used to exchange digital image among users. With the
growth of types of computer network a large amount of digital data has been exchanged over the
network due to many of data must be confidential, private or both. To protect this data from
intruder, the demand for stronger encryption techniques are increased.
Steganography is one of the most important techniques are used to embed the secret message
within an image. This technique is the perfect supplement for encryption that permits a user to
hide information inside an image. As mention at the previous section in cryptography, the
problem with cryptography is that the encrypted message is obvious and everyone known that the
messages are encrypted.
To solve this problem, steganography techniques can be able to provide more additional
protection on a secret message with cryptography so that the information is doubly protected.
Steganography hiding information within an image so it appears that no information is hiding
inside an image.
Thus, users can be transmitted the sensitive information over unsecured channel such as the
internet. There are various methods of steganography are used. In this paper we have used Least
Significant Bit (LSB) method to embed the secret message within an image.
6 |Page
Proposed System Architecture
In this paper, we have proposed new security techniques through using cryptography and
steganography for providing better security to maintain the privacy, accuracy and confidentiality of
the data while transferring from one end to the other end over the network.
The main objective of the system is to hide the message or a secret message into an image before
transmitting to the destination node on the network without any modification of the data inside an
image. The proposed techniques data steganography using Hash based Least Significant Bit (H- LSB)
is used to hide secret message in image file (bmp).
The system was run and compiled on windows10 and tested on University of Sulaimani, Faculty of
Physical & Basic Education-Computer Science Department. This system can be used by users
without knowledge of programming in C# because the Graphic User Interface (GUI) is designed to
be user friendly. This proposed system to input image provides an image platform and different text
box to insert data and showing the encrypt data before embedding the image.
7 |Page
Encryption Phase
At the first step to access into the system for hiding the data, the users are needed a user name and
password. After login the system, user can write the message to encrypt the data with the secret keys
before embedding the data into an image as demonstrate in figure 1.
In our system the proposed scheme uses Affine algorithm to encrypt secret information. Affine
cipher is one of the algorithms that have used to encrypt data. In this process where in each letter in
an alphabet is mapped to its numeric equivalent, encrypted using a mathematical function, and
converted back to a letter.
The formula used means that each letter encrypts to one other letter, and back again, meaning the
cipher is essentially a standard substitution cipher with a rule governing which letter goes to which.
This technique provides better security to protect the data user from the unauthorized access over a
network due to which will not be easy to retrieve the data without the recipient key.
After converting the plain text into cipher text by using Affine algorithm we have taken cipher text
and converting each letter into ASCII codes then the ASCII codes have converted into a series of
binary codes to provide higher security. This proposed technique is used to prevent the intruders to
gettherealdatawhentheytrytoretrievethedata.Thisencryptdatawillbe embedded inside the image with
almost zero distortion of the original image.
8 |Page
Flowchart
Fig Flow chart diagram for the encryption and decryption process
9 |Page
Encryption Process
Step One: Choose the secret message
For Example:-
Input Text: Kurdistan
Encrypt Text: Kofmeilgt
In this process, the alphabet is going to be the letters A through Z.
For the numeric values of each letter the following function have been used to encrypt each letter:
E(x)=(ax +b ) modm
Where:
10 |Page
Table1 Detect X Value
Plaintext K u r d i s t a n
X 10 20 17 3 8 18 19 0 13
Now, take each value of x, and solve the first part of the equation, (3x + 6). After finding the value of
(3x+6) for each character, take the remainder when dividing the result of (3x + 6) by 26. The following
table shows the first four steps of the encrypting process:
Plaintext K u R d i s t a n
X 10 20 17 3 8 18 19 0 13
(3x+6) 36 66 57 12 30 60 63 6 45
(3x+6)mode26 10 14 5 12 4 8 11 6 19
Cipher Text K O F m e i l g t
11 |Page
Embedding Phase
After encrypting the secret message we have proposed a method to embedding a encrypt message into
the image. This process is done by using Hash based Least Significant Bit (HLSB) which replaces the
least significant bit. LSB is the most popular steganography method to embedding data in an image file.
This method has applied to hide the encrypt message in the image and then send the image to the
intended receiver.
In this paper cryptography and steganography methods have been proposed to provide better security to
protect data from intruders by using multi-layer of security techniques. The combination of these two
methods will enhance the security of data embedding due to some important data that users want to
secure from others when data transmission over an open channel.
At the start of this process we take encrypt message to be embedded in the cover image, which will be
difficult for any intruder to decrypt it without the recipient private key then hash function has used to
select the positions and the proposed technique takes eight bits of secret data at a time will be embedded
in LSB of RGB (Red, Green and Blue) pixel value in the order of 3, 3, 2 respectively.
According to the techniques that we have used to embed the secret data into the image three bits are
embedded in Red pixel LSB, three bits are embedded in Green pixels and 2 bits are embedded in blue
pixels LSB. These eight bits are inserted in this order because the chromatic influence of blue color to
the human eye is more than red and green colors.
Therefore the distribution pattern chooses the 2bits to be hidden in blue pixel. Thus, the quality of the
image will be not sacrificed. This process is continued till entire message of bits will got embedded into
the cover image. To detect the positions to hide data in LSB of each RGB pixels of the cover image the
following formula is used: K= p % n ..................................... (1)
Where, K is the LSB bit position within the pixel, Prepresents the position of each hidden image pixels
and n is number of bits of LSB which is 4 for the present case.
12 |Page
Conclusion
In this paper, a cryptography and steganography methods have proposed for providing better security
of data in a network environment. With system that we have proposed data can be transferred
between sender and receiver via unsecured network environment.
Obviously, in a network environment this system is one of the best ways of hiding the secret of
message from intruders. The main focus of the paper is to develop a system with extra security
features.
Cryptography method i.e .Affine cipher algorithm has been implemented to encrypt the secret
message and converted into ASCII code before embedding it in the image so that it is not easy to
intruder to break the encryption without the keys and password. In addition, Hash based Least
Significant Bit.
13 |Page
Skill Development
Reference