Professional Documents
Culture Documents
Kyaw Thet Win (6CE-15)
Kyaw Thet Win (6CE-15)
GRADUATION THESIS
TITLE DEFENSE
1
Introduction
• Now a day the sharing of multimedia over network is increasing in large numbers.
• Therefore, the confidentiality and data integrity requires protecting against
unauthorized access and use.
• Data hiding is a technique that is used to hide information in digital media such as
images, video etc.
• First the data that is to be hidden in the image is encrypted using encryption
algorithm. This encrypted data is then hidden in the image. The image with the
hidden data is then encrypted again.
• Thus the user with the decryption key of both image and data will be able to
retrieve the data and image in its original form.
2
Aim and Objectives
To maintain privacy or security
To protect sensitive data before transmission or
distribution
To secure secret information
To protect multimedia and secret information from
unauthorized person
3
Theory
• There are two types of cryptographic algorithms:
1. Symmetric (private key encryption)
2. Asymmetric (public key cryptography)
4
Theory
AES Encryption
- AES has 10 rounds for 128-bit keys.
5
Theory
RSA Algorithm(Rivest–Shamir–dleman)
Choose two distinct large random prime numbers p & q , such that p ≠ q.
Compute n= p × q.
Calculate: phi (n) = (p-1) (q-1).
Choose an integer e such that 1<e<phi(n)
Compute d to satisfy the congruence relation d ×e = 1 mod phi (n); d is kept as
private key exponent.
The public key is (n, e) and the private key is (n, d).Keep all the values d, p, q and
phi secret.
Encryption
Plaintext: P < n
Ciphertext: C= Pe mod n.
Decryption
Ciphertext: C
Plaintext: P=Cd mod n.
6
System Design
11
Limitations
This system can’t allow long video file and long message.
In this system, multimedia is intended for images and videos.
12
Conclusion
13