Professional Documents
Culture Documents
CERTIFICATE
This is to certify that Project report entitled “Encrypt And Decrypt Data Using
Cryptography Steganography Algorithm” is submitted in the partial fulfilment of
requirement for the award of the Diploma in Computer Engineering by Maharashtra State
Board of Technical Education as record of students' own work carried out by them under
the guidance and supervision at DY Patil School Of Engineering (Charholi), during the
academic year 2022-23.
5 Action Plan
6 Resources Required: 3
2 Cryptography 5
3 Steganography 6
4 Proposed System Architecture 7
5 Encryption Phase 8
6 Flowchart 9
7 Encryption Process
Example
Table 1: Detect X Value 11
9 Conclusion 13
10 Skill Development 14
11 Reference
Micro Project
Proposal Part A
“Forensic Accounting in the Fraud Auditing Case”
1. Brief Introduction
1|Page
4. Literature Review
To this Network And Information Security project, we searched various sources.
Prominent among them are google, you-tube, Wikipedia, geekforgeeks
also took the help of our subject teacher in choosing one of the unique
subject. You-tube also helped us clear a lot of concepts regarding our
project as well as also the Google.
Wikipedia helped us in the way we got few data about, and many
more data related to it. We also took help of the book ‘Android’. This
book also helped us a lot. Also, the important support was of our teacher
(Dipika Pangudwale Ma’am). We took their help at each bit where we felt is
necessary to be taken.
1.
Topic Selection
Akash Lad
Prathamesh Bhil
2. Collecting
information of topic Sanket Biradar
Samruddhi Kale
Testing and analysis
4. of
test result
5. Documentation of
project
2|Page
6. Resources Required
Sr.
Name of Resource Specification
no
Dell, RAM 8 GB,
1. Laptop Harddisk 1 TB, i3
processor
2. Steganography -
Name Roll No
Akash Lad 01
Prathamesh Bhil 13
Sanket Biradar 36
Samruddhi Kale 39
Miss.Sandya Chavan
(Micro-project Guide)
3|Page
Part B
Introduction
CRYPTOGRAPHY
The message could not be decrypted without using encrypting key. One
of the issue is appeared with cryptography is that the message always
clear to intermediate person that the message is encrypted form. This
means that the sender of the message does not want it to be read by
unauthorized person. Today, there are many cryptography techniques
which are capable of encrypting data, one of the most widely technique is
Affine algorithm. Affine has the ability to convert the information to a
form not understandable by the intruder.
5|Page
STEGANOGRAPHY
6|Page
Proposed System Architecture
The main objective of the system is to hide the message or a secret message
into an image before transmitting to the destination node on the network
without any modification of the data inside an image. The proposed
techniques data steganography using Hash based Least Significant Bit (H-
LSB) is used to hide secret message in image file (bmp).
The system was run and compiled on windows 10 and tested on University
of Sulaimani, Faculty of Physical & Basic Education-Computer Science
Department. This system can be used by users without knowledge of
programming in C# because the Graphic User Interface (GUI) is designed
to be user friendly. This proposed system to input image provides an image
platform and different text box to insert data and showing the encrypt data
before embedding the image.
7|Page
Encryption Phase
At the first step to access into the system for hiding the data, the users are
needed a user name and password. After login the system, user can write
the message to encrypt the data with the secret keys before embedding the
data into an image as demonstrate in figure 1.
In our system the proposed scheme uses Affine algorithm to encrypt secret
information. Affine cipher is one of the algorithms that have used to
encrypt data. In this process wherein each letter in an alphabet is mapped to
its numeric equivalent, encrypted using a mathematical function, and
converted back to a letter.
The formula used means that each letter encrypts to one other letter, and
back again, meaning the cipher is essentially a standard substitution cipher
with a rule governing which letter goes to which. This technique provides
better security to protect the data user from the unauthorized access over a
network due to which will not be easy to retrieve the data without the
recipient key.
After converting the plain text into cipher text by using Affine algorithm
we have taken cipher text and converting each letter into ASCII codes then
the ASCII codes have converted into a series of binary codes to provide
higher security. This proposed technique is used to prevent the intruders to
get the real data when they try to retrieve the data. This encrypt data will be
embedded inside the image with almost zero distortion of the original
image.
8|Page
Flowchart
Fig : Flow chart diagram for the encryption and decryption process
9|Page
Encryption Process
Step One: Choose the secret message
Step Two: Encrypt the message using Affine Cipher Algorithm
Step Three: Convert the encrypt message into ASCII code
Step Four: Convert ASCII code into binary
For Example:-
Input Text: Kurdistan
Encrypt Text: Kofmeilgt
In this process, the alphabet is going to be the letters A through Z.
In this encrypting example, the plaintext to be encrypted is “Kurdistan”.
For the numeric values of each letter the following function have been
used to encrypt each letter:
Where:
x: is the numerical value of the letter in the plaintext.
m: is the number of letters in the plaintext alphabet
a and b are the secret numbers between sender and receiver.
E(x): is the result of transformation.
10 | P a g e
Table 1 Detect X Value
Plaintext K u r d i s t a n
X 10 20 17 3 8 18 19 0 13
Now, take each value of x, and solve the first part of the equation, (3x + 6).
After finding the value of (3x + 6) for each character, take the remainder when
dividing the result of (3x + 6) by 26. The following table shows the first four
steps of the encrypting process:
Plaintext K u r d i s t a n
X 10 20 17 3 8 18 19 0 13
(3x + 6) 36 66 57 12 30 60 63 6 45
(3x+6) mode 26 10 14 5 12 4 8 11 6 19
Cipher Text K O f m e i l g t
11 | P a g e
Embedding Phase
According to the techniques that we have used to embed the secret data into
the image three bits are embedded in Red pixel LSB, three bits are embedded
in Green pixels and 2 bits are embedded in blue pixels LSB. These eight bits
are inserted in this order because the chromatic influence of blue color to the
human eye is more than red and green colors.
Therefore the distribution pattern chooses the 2 bits to be hidden in blue pixel.
Thus, the quality of the image will be not sacrificed. This process is continued
till entire message of bits will got embedded into the cover image. To detect
the positions to hide data in LSB of each RGB pixels of the cover image the
following formula is used: K= p % n ………. (1)
12 | P a g e
Where, K is the LSB bit position within the pixel, P represents the position of
each hidden image pixels and n is number of bits of LSB which is 4 for the
present case.
Conclusion
13 | P a g e
Skill Development
• Presentation skill increased.
• Technical knowledge increased.
• Get more knowledge about operating system.
• Management of time.
Reference
Miss,Sandya Chavan
(Guide of Project)
14 | P a g e