Professional Documents
Culture Documents
OVERVIEW
INTRODUCTION
EXISTING SYSTEM
PROPOSED SYSTEM ADVANTAGES APPLICATIONS CONCLUSION
FUTURE SCOPE
REFERENCES
INTRODUCTION
VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES
Advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding.
CRYPTOGRAPHY
What is Cryptography ?
Plain text Plain Text Encryption Decryption Cipher text Channel
Plain text
Encryption
Key
Encrypted Message
Decryption
TYPES OF CRYPTOGRAPHY:
STEGANOGRAPHY
Steganography- meaning concealed writing Definition- security through obscurity Advantage of steganography Visual steganography- Secure, implemented in
image files
STEGANOGRAPHIC MODEL
STEGANOGRAPHY
Commonly used techniques for image
steganography
Bit Insertion where the LSB of a pixel can be
modified. Modified Bit Encoding Technique each pixel will store one byte of data. Spread Spectrum Patch Work JPEG Compression, etc
frame. Images are made up of various regions consisting of pixels. Pixels consist of three basic colors R (red), G (green) and B (blue). The pixel values (R, G, B values) can be manipulated to hide data in the images. The image can serve as a cover for the information to achieve steganography.
etc.
PROPOSED SYSTEM
The data will be encrypted into a cipher
(Cryptography). The cipher will be hidden into a multimedia image file in encrypted format (steganography). Traditional cryptographic techniques to achieve data encryption Visual steganography algorithms will be used to hide the encrypted data.
reference grids. Grids will have 3-d representation of encoding schema Characters will be represented by specific number
Encryption Algorithm
The message will first be encrypted The pixel values of the image are truncated Then a specific number which corresponds
to the 3-D representation of the character in the cipher code sequence can be added to this number
the receiver In the first few lines of image properties, the attributes of the image will be encrypted and saved The edited image will be transmitted to the receiver
Decryption Algorithm
The message can be decoded using the
receivers private key. The receivers private key is used to identify the reference grid from the reference database. The x and y components can define the block that has been used to encrypt the message. RGB value-point to the data in the block
The cipher is retrieved by obtaining the difference in the pixel value This cipher can now be decrypted using an inverse function of the DEA algorithm to get the message text
APPLICATIONS
in military and navy to make their
communication secure in payment gate way. in medical production system for secret products in business dealing and settlement contracts in electronic mail communication
FUTURE SCOPE
Video files and image streams can also be
be sent in each image. This will increase the security of the system, however the time consumption will increase in this case.
REFERENCES