0% found this document useful (0 votes)
4 views

File Transfer Encryption

The document presents a project on secure file transmission using steganography with the LSB algorithm and MD5 hashing. It outlines the problem of cybercrime affecting companies, the objective of enhancing secure communication, and the proposed method that involves embedding encrypted files within images. The project concludes with the skills gained in file handling, algorithm optimization, and image manipulation.

Uploaded by

johnlad333
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

File Transfer Encryption

The document presents a project on secure file transmission using steganography with the LSB algorithm and MD5 hashing. It outlines the problem of cybercrime affecting companies, the objective of enhancing secure communication, and the proposed method that involves embedding encrypted files within images. The project concludes with the skills gained in file handling, algorithm optimization, and image manipulation.

Uploaded by

johnlad333
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

CYBER

project SECURITY

Steganography for Secure File


Transmission using LSB algorithm
and MD5Sum Hashing Method
Presentation by GROUP 50
CYBER SECURITY

Meet our team


Member 1
Details
Member 2
Details
Member 3
Details
Member 4 Guided by: Name of Teacher
Details Assistant Professor Senior
Index
Introduction 1
Problem statement 2
Objective 3
Literature Review 4
Proposed works 8
Real-Time usage 9
Hardware & software requirements 10
Simulation 11
Why ours is better 17
WHAT IS FILE ENCRYPTION?
Companies work with files every day.
Cybercrime affects about 32% of companies
every year .
To combat this risk, you need powerful
security features that integrate well with
your existing platforms and fit into your
company budget.
File encryption is a way of encoding files,
including the sensitive data they contain, to
send them securely.
The encoding prevents unauthorized access
and tampering by malicious methods. Page 01
Present issue
A used public channel can be deliberately monitored
by an intruder during the transmission process,
which is an attempt to try and carry out a random
assault.
Our method makes use of encryption algorithm to
encrypt the file .
This helps to drastically increase the scope of
establishing a secure communication line.

Page 02
OBJECTIVE
To introduce a new mode of secure communication
over the internet by using a steganographic and
personal encryption methods that integrates an
innocuous-looking image which is password protected
and will be used to hide the text file containing the
sensitive data.
Page 03
Literature Review

STEGANOS
means to hide something

GRAYPFIA means writing


This project aims to explain the basic steps of file security using image as a cover
and encryption for the hidden file
Page 04
Literature Review (Cont..)
ENCRYPTION IS ONE OF THE MOST EFFECTIVE APPROACHES
TO ACHIEVING DATA SECURITY AND PRIVACY.

THE ORIGINAL INFORMATION IS RECOVERED ONLY THROUGH


USING A PASSWORD, WHICH IS KNOWN AS THE DECRYPTION
PROCESS.

THE OBJECTIVE OF THE ENCRYPTION IS TO SECURE OR PROTECT


DATA FROM UNAUTHORIZED ACCESS IN TERMS OF VIEWING OR
MODIFYING THE DATA.

ENCRYPTION CAN BE IMPLEMENTED BY USING SOME SUBSTITUTE


TECHNIQUE, SHIFTING TECHNIQUE, OR MATHEMATICAL
OPERATIONS.

Page 05
SEVERAL SYMMETRIC KEY BASE ALGORITHMS
HAVE BEEN DEVELOPED IN THE PAST YEAR.
IN THE PAPER AN EFFICIENT RELIABLE
SYMMETRIC KEY-BASED ALGORITHM TO
ENCRYPT AND DECRYPT THE TEXT DATA HAS
BEEN PROPOSED.

THE METHOD USES 8 BIT CODE VALUE OF THE


ALPHABET AND PERFORM SOME SIMPLE
CALCULATION LIKE LOGICAL NOT AND
SIMPLE BINARY DIVISION TO PRODUCE. THE
PROPOSED METHOD IS EASY TO UNDERSTAND
AND EASY TO IMPLEMENT.
Page 06
Proposed Work
The conception is that it's a cover object(image) that's used to hide the initial file
containing sensitive data that needs to be encrypted.

The image file will be protected using a password and the file within the image file will
be encrypted, thereby providing two levels of protection.

One algorithm will be used for encrypting the file contents from plain text to a unique
encrypted value. So, if a third-party member were to find the contents in the text file it
would still be uninterpretable to the intruder.

A file key is generated using MD5 hashing and it is added to the end of file using the
append insertion method.
Page 07
Proposed Work (Cont...)
The encrypted text file is embedded into the image file using LSB Algorithm.

The image will be password protected and to identify the password for the respective
image , filename is added to the password string after a backslash('\').

The password generated is encrypted using AES Algorithm.

The password protected image and the encrypted password is sent to the receiver

The receiver will decode the password and open the image file to view the text file in it.

Page 07
File .txt Encrypted File

Image .jpg
ENCRYPTION
LSB Algorithm
Hashing MD5Sum
Transmission
File Key
Sender's Append Insertion Embedded
End Image .jpg
Encrypted Password+'\'
Password
Value +FileName
AES
Algorithm

Password Protected
RECEIVER
Image .jpg
Password Protected
Image .jpg
FileName
Embedded
Password+'\' Password Image .jpg
Encrypted Value
Decryption +FileName
of AES
Transmission
Algorithm Decryption of LSB
Receiver's Algorithm
Encrypted File
End File .txt

DECRYPTION

Image .jpg
Hashing MD5Sum Removing the file key

File Key File Key


MD5Sum
Md5sum is a hashing method that
calculates and verifies 128-bit hash.
Md5sum is used to verify the
integrity of files, as virtually any
change to a file will cause its MD5
hash to change.
Most commonly, md5sum is used to
verify that a file has not changed as
a result of a faulty file transfer or Fig 1
Courtesy:https://imgs.search.brave.com/xFeBH1zztf9yIS_68X2NvT7kyNwLzM0QdxEHzmjiELQ/rs:fit:474:225:1/g:ce/
aHR0cHM6Ly90c2Uy/Lm1tLmJpbmcubmV0/L3RoP2lkPU9JUC40/cEVGbGZHbDRfWjJm/eko0U0MtbHJ3SGFI/YSZ
waWQ9QXBp

non-malicious meddling.
LSB Algorithm
Least significant bit (LSB) insertion is a
common and simple method to embed
data in an image file.

This technique operate well for image


steganography. For hiding data within
the images, the LSB (Least Significant
Byte) approach is generally used.
Fig 1
Courtesy:https://imgs.search.brave.com/xFeBH1zztf9yIS_68X2NvT7kyNwLzM0QdxEHzmjiELQ/rs:fit:474:225:1/g:ce/
aHR0cHM6Ly90c2Uy/Lm1tLmJpbmcubmV0/L3RoP2lkPU9JUC40/cEVGbGZHbDRfWjJm/eko0U0MtbHJ3SGFI/YSZ
waWQ9QXBp
LSB-STEGANOGRAPHY IS A STEGANOGRAPHY
TECHNIQUE IN WHICH WE HIDE MESSAGES
INSIDE AN IMAGE BY REPLACING LEAST
SIGNIFICANT BIT OF IMAGE WITH THE BITS
OF MESSAGE TO BE HIDDEN.

BY MODIFYING ONLY THE FIRST MOST


RIGHT BIT OF AN IMAGE WE CAN INSERT
OUR SECRET MESSAGE AND IT ALSO MAKE
THE PICTURE UNNOTICEABLE, BUT IF OUR
MESSAGE IS TOO LARGE IT WILL START
MODIFYING THE SECOND RIGHT MOST BIT
AND SO ON .
AES Algortithm
It is based on a ‘substitution–
permutation network’.
It comprises a series of linked
operations, some of which involve
replacing inputs with specific outputs
(substitutions) and others shuffling bits
around (permutations).
AES performs all its computations on
Fig 2

bytes rather than bits. Courtesy:https://imgs.search.brave.com/xFeBH1zztf9yIS_68X2NvT7kyNwLzM0QdxEHzmjiELQ/rs:fit:


474:225:1/g:ce/aHR0cHM6Ly90c2Uy/Lm1tLmJpbmcubmV0/L3RoP2lkPU9JUC40/cEVGbGZHbDRfWj
Jm/eko0U0MtbHJ3SGFI/YSZwaWQ9QXBp
How to prevent the file from being
renamed?
A user is able to delete or rename your
files only because they get the option to
do so in File Explorer.
Prevent is a small application that allows
you to disable certain options in File
Explorer on your computer.
It lets you disable options like Rename,
Delete, Cut, and Copy so no one can
touch or modify your chosen files.
Download, install, and launch the Prevent app on your
Windows PC.

When the app launches, you’ll see that there’s only one
option you can configure.

It’s called Define Hotkey and it allows you to specify a


keyboard shortcut that stops the app from running. Use
any of the available keyboard shortcuts and then click on
Activate.

The app will start running, and when you right-click on


your file, you’ll find that the options mentioned above are
grayed out. You can’t click or use them. The app disables
the physical buttons for those actions as well.
real time usage
CYBER SECURITY

Real time usage of File Encryption


File encryption and decryption has applications in internet
communication, multimedia systems, medical imaging, telemedicine,
nc r y
military communication.

eE

p t i on
F i l
Since these files may carry highly confidential information.And to
provide such security and privacy to the user, File encryption is
essential to protect from unauthorized user access.
This file encryption allows transfers of data from one country to
another from agencys such as RAW, NIA and FBI.
Page 08
CYBER software SECURITY

Softwares
Python
Kali Linux
Visual Studio Code
PyCharm
IDLE Python
Prevent

Page 09
ED BOZY HASH
Algorithm

THEN ADDING
SPLIT THE FILE
THE INDEX
FILE CONTENTS AND
VALUES WITH A
CONTENTS FINDS THEIR
"/"
INDEX VALUES
EG:12/IINI

rit
go

hm
Al
THE LIST IS
RANDOMIZED RANDOMIZED SAVED IN A
VALUES ARE USING LIST
WRITTEN TO A RANDOM
NEW TEXT FILE MODULE

FILE
CONTENTS Page 10
ENCRYPTED
Python Code 1

This is a basic Encrytion


algorithm in which we convert
the file contents into random
numbers and letters.

Page 11
Algorithm

THE THEY ARE


ENCRYPTE VALUES ARRANGED
D VALUES ARE BY THE
SIMPLY NUMBERS IN
ARRANGED FRONT OF
EACH VALUE

"\N" rit
CHARACTERS
AFTER go

hm
AO F TR EDRE RT IHNAGT

Al
ARE
TT HH EE YN AT RH EE
RECOGNIZED
INAD L LE X
AND GIVEN
V
AA RR LU AE N GAENDD
AS NEW LINE
W I "T/ H" OI SU T
T HREERME OI V N EDDE X
DECRYPTED V A L FU RE O S MA N D
SUCCESSFU E "A/ C" H
LLY VALUES
Page 12
ED BOZY
DECRYPTION Code HASH

In this decryption algorithm, the


encrypted contents are converted
back to the normal text in their
original forms using simple
techniques.

Page 13
ED PHA250 HASH
Algorithm 3

PASSWORD ASCII
/PIN VALUE OCTAL

CONCATENATE
LIST rit
RANDOM VALUE go

hm
(ALPHANUMERIC CONVERT

Al
FROM
DICTIONARY VALUES) TO STRING

HASH
GENERATED
Page 14
ED PHA250
Python Code 3 HASH

This hashing algorithm converts


the password into alphanumeric
values and octal numbers.

Page 15
Hashing and Appending
LSB and AES
Decryption Process
Verifying the hash
Decrypting LSB
Encryption Process
Decryption Process - I
Decryption Process - II
conclusion
Conclusion
CYBER SECURITY

Thus, the project entitled "Steganography for Secure


File Transmission using LSB algorithm and MD5Sum
Hashing Method."was completed. By the end of the
project, we have gained valuable skills including a
grounding in how to interact with the operating
system, file handling in python, optimizing algorithms,
calculating the efficiencies, and learning how to
form and manipulate images.

Page 17
References
https://link.springer.com/chapter/10.1007/978-3-642-27948-5_23
https://www.engpaper.net/data-encryption.html
https://www.researchgate.net/publication/320149845_A_Secure_
and_Fast_Approach_for_Encryption_and_Decryption_of_Message
_Communication
https://stackoverflow.com/questions/18569784/python-
password-protection
https://roytuts.com/how-to-encrypt-pdf-as-password-protected-
file-in-python/
Page 18
CYBER SECURITY

THANK YOU
nc r y

pt n
f i le e
presentation by

io
Group 50

Page 19

You might also like