You are on page 1of 16

University of Technology (Yatanarpon Cyber City)

Faculty of Information and Communication Technology


Department of Computer Engineering
2018-2019 ACADEMIC YEAR

GRADUATION THESIS

TITLE DEFENSE

Encrypted Multimedia with Hidden Data


Presented By
Mg Kyaw Thet Win 30.1.2019
6CE-15 (Wednesday)
Outline

Abstract

Introduction

Aim and Objectives

Theory

System Design

Application Areas

Limitations

Conclusion
Abstract
• Steganography is the art of hiding the fact where
communication is taking place, by hiding information in
other information.
• The proposed system adds security to both the data hidden
and the image/video that carries the information.
• Security is provided by encrypting the data that is sent in the
image/video and again encrypting the image/video that
carries the information using encryption algorithm.
• This encryption of the data and image thus provides double
security layer.

1
Introduction
• Now a day the sharing of multimedia over network is increasing in large numbers.
• Therefore, the confidentiality and data integrity requires protecting against
unauthorized access and use.
• Data hiding is a technique that is used to hide information in digital media such as
images, video etc.
• First the data that is to be hidden in the image is encrypted using encryption
algorithm. This encrypted data is then hidden in the image. The image with the
hidden data is then encrypted again.
• Thus the user with the decryption key of both image and data will be able to
retrieve the data and image in its original form.

2
Aim and Objectives


To maintain privacy or security

To protect sensitive data before transmission or
distribution

To secure secret information

To protect multimedia and secret information from
unauthorized person

3
Theory
• There are two types of cryptographic algorithms:
1. Symmetric (private key encryption)
2. Asymmetric (public key cryptography)

• Symmetric encryption algorithm


• AES encryption (for secret information)

• Asymmetric encryption algorithm


• RSA encryption (for multimedia encryption)

4
Theory
AES Encryption
- AES has 10 rounds for 128-bit keys.

5
Theory
RSA Algorithm(Rivest–Shamir–dleman)
Choose two distinct large random prime numbers p & q , such that p ≠ q.
Compute n= p × q.
Calculate: phi (n) = (p-1) (q-1).
Choose an integer e such that 1<e<phi(n)
Compute d to satisfy the congruence relation d ×e = 1 mod phi (n); d is kept as
private key exponent.
The public key is (n, e) and the private key is (n, d).Keep all the values d, p, q and
phi secret.

Encryption
Plaintext: P < n
Ciphertext: C= Pe mod n.
Decryption
Ciphertext: C
Plaintext: P=Cd mod n.
6
System Design

General Structure of AES


7
System Design

General Structure of RSA


8
System Design

Structure of video encryption and decryption


9
System Design

Structure of proposed system


10
Application Area

 The person with proper authentication will be able to retrieve


both the original data and the image.
 Criminals use many different means to hide evidence on
computers from law enforcement mainly through encryption
and other such methods like steganography, digital
compression etc. 
 To more secure secret from the danger of cracker.
 When you want to transfer secret data with electronic mails,
you can use this application.

11
Limitations


This system can’t allow long video file and long message.

In this system, multimedia is intended for images and videos.

12
Conclusion

 Encryption algorithm plays very important role in communication


security.
 Encryption is a way to enhance the security of a message and
multimedia file by scrambling the contents so that it can be read
only by someone who has the right encryption key to unscramble it.
 Steganography is the art and science of invisible communication.

13

You might also like