Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Roll No.
Ronak Bhatia
06
Pawan Jagtap
20
Ashish Gupta
in partial fulfilment of Bachelor of Engineering of Mumbai University in the Department of
Information Technology, Pillais Institute of Information Technology, Engineering, Media
Studies & Research, New Panvel during the academic year 2015 2016.
Internal guide ________________
Principal _________________
(Dr. R. I. K. Moorthy)
A PROJECT SYNOPSIS ON
ACKNOWLEDGEMENT
Dedication, determination plays a key role in success of human life as well as
inspiration and motivation plays a key role in success of any venture. At this level of
understanding it is difficult to understand the wide spectrum of knowledge without proper
guidance and advice.
We would like to take this opportunity to express our sincere thanks to, Dr.
Madhumita A. Chatterjee (H.O.D) and our project guide Prof. Dipti Lawand who have
shown us the way all throughout the venture. Her kind co-operation & encouragement has
helped us in doing the project. We are indebted to her for spending her valuable time in
guiding us with minute details of our project.
We would like to express our gratitude and appreciation to all those who gave us the
possibility to complete this report. A special thanks to our final year project coordinators,
Prof. Madhu Nashipudi, and Prof. Sushopti Gawade whose help, stimulating suggestions
helped us especially in writing this report.
Also this is the best opportunity to thank our Dr. R. I. K. Moorthy for his timely help
and guidance.
Our special thanks to the college faculty members, without their guidance our
embarking on this project would not have been successful. We would take this opportunity to
thank the staff of the IT department for providing us literature.
Ronak Bhatia
Pawan Jagtap
Ashish Gupta
INDEX
i Abstract
1.
Introduction 1
1.1 Aims and objectives
1.2 Problem Statement
1.3 Scope
2. Literature Survey
3 Existing system (if any)
4 Proposed System
Methodology (your approach to solve the problem)
5 Analysis
Details of Hardware & Software
6 Design details
7 Implementation Plan for next semester
8 References
(Books, Papers, Websites referenced)
ABSTRACT
The field steganography is a very popular technique for sending secret messages and a lot of
researches are going on it. We intend to do something on separable and reversible encrypted
data hiding in encrypted image using Rijndael algorithm which is an iterated block cipher
algorithm that uses encryption or decryption of a block of data that is accomplished by the
iteration of a specific transformation. As input, Rijndael accepts 1-D 8-bit byte arrays that
create data blocks. The plaintext is input and then mapped onto state bytes. The cipher key is
also a 1-D 8-bit byte array. The design of Rijndael is based on easily understandable
mathematical concepts including finite field mathematics and linear algebra and matrix
manipulation. Using an encryption key, the person which has information to send encrypts the
original image. Then a user may compress the least significant bits of the image which are
going to be encrypted using a data-hiding key, to create a sparse space for occupying some
data. With an encrypted image containing data, if a receiver has the data-hiding key, he can
extract the data without knowing the content of the image. The receiver cannot extract the data
by just having an encryption key, but by having this key, he can decrypt to obtain an image
similar to the original one. If the receiver has both the data-hiding key and the encryption key,
he can extract the additional data to recover the original content without any error by
exploiting the spatial correlation in natural image when the amount of additional data is not too
large.
Chapter 1
Introduction
In the current trends of the world, the technologies have advanced so much that most of
the individuals prefer using the internet as the primary medium to transfer data from one
end to another across the world. There are many possible ways to transmit data using the
internet: via emails, chats, etc. The data transition is made very simple, fast and accurate
using the internet. However, one of the main problems with sending data over the internet
is the security threat it poses i.e. the personal or confidential data can be stolen or hacked
in many ways. Therefore it becomes very important to take data security into
consideration, as it is one of the most essential factors that need attention during the
process of data transferring. Data security basically means protection of data from
unauthorized users or hackers and providing high security to prevent data modification.
This area of data security has gained more attention over the recent period of time due to
the massive increase in data transfer rate over the internet. In order to improve the
security features in data transfers over the internet, many techniques have been developed
like: Cryptography, Steganography. While Cryptography is a method to conceal
information by encrypting it to cipher texts and transmitting it to the intended receiver
using an unknown key, Steganography provides further security by hiding the cipher text
into a seemingly invisible image or other formats.
1.1
which is not only unique to the (user) client, but also makes him feel that he has loyal
attachment to the system and approaches us whenever he/she needs. To achieve better
results and success by implement computerized process instead of manual process.
The previous existing system deals with transmission of a message or data without allowing
unauthorized access over the internet but with lesser security using the basic approach of
steganography technique.
1. If any one key is lost while transmission we cant extract the data.
2. If the mail doesnt reach the expected client.
3. If the mail used is corporate mail ID.
1.3 SCOPE
It can be used in banking sector where ATM pin is hidden inside image and the image is
encrypted with credentials along with password to decrypt the image and retrieve the relevant
data from it and send to the user through mail. At the user side, user decrypt the image with
the appropriate password provided by the Bank and also decrypt the File in which they
provide additional password to extract the ATM pin from image. If users provide a valid data
hiding key then he get the relevant ATM pin from the image.
Chapter 2
Literature Review
STEGANOGRAPHY:
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message, a form of
security through obscurity. The word Steganography is of Greek origin and means "concealed
writing" meaning "covered or protected", Generally, messages will appear to be something
else: images, articles, shopping lists, or some other cover text and, classically, the hidden
message may be in invisible ink between the visible lines of a private letter. It is high security
technique for long data transmission. Steganography is the process of hiding the one
information into other sources of information like text, image so that it is not visible to the
natural view. There are varieties of stenographic techniques available to hide the data
depending upon the carriers we use.
Chapter 3
Existing System
In the existing system reversible data hiding technique the image is compressed [3] and
encrypted by using the encryption key and the data to hide is embedded in to the image by
using the data hiding key. At the receiver side he first need to extract the image using the
encryption key in order to extract the data and after that hell use data hiding key to extract
the embedded data. It is a serial process and is not a separable process.
Image Encryption
The sender selects the file and applies his encryption algorithm to encrypt the image.
Encryption is the method of applying or changing some of the attributes of the original image
to form every different image. Nobody can read the exact image if he is unknown of the
changed done by the content owner.
Data Embedding
After encrypting the image the sender embed some additional data behind the selected part of
the image before transmission. Any type of image can be selected for the encryption like
JPEG, PNG or BMP.
Data Extraction
This is the action performed at the receiver side. After receiving the data the main task of the
receiver is to extract the original data hide behind the image. This technique is known as data
extraction.
Image Recovery
Image recovery is the technique of decrypting the received image. The main task is to
generate the image same as the original image. And this is done by the reversibly perform the
encryption
action
i.e.
by
using
the
decryption
key.
Disadvantages:
Principal content of the image is revealed before data extraction.
If someone has the data hiding key but not the encryption key he cannot extract any
information from the encrypted image containing additional data.
Chapter 4
Proposed System
The proposed scheme is made up of image encryption, data embedding and dataextraction/image-recovery phases. The content owner encrypts the original uncompressed
image [2] using an encryption key to produce an encrypted image. Then, the data-hider
compresses the least significant bits (LSB) of the encrypted image using a data-hiding [12]
key to create a sparse space to accommodate the additional data. Since the data embedding
only affects the LSB, a decryption with the encryption key can result in an image similar to
the original version. When using both of the encryption and data-hiding keys, the embedded
additional data can be successfully extracted and the original image can be perfectly
recovered by exploiting the spatial correlation in natural image.
Image Encryption
The sender selects the file and applies his encryption algorithm to encrypt the image.
Encryption is the method of applying or changing some of the attributes of the original image
to form a very different image. Nobody can read the exact image if he is unknown of the
changed done by the content owner.
Data Embedding
After encrypting the image the sender embed some additional data behind the selected part of
the image before transmission. Any type of image can be selected for the encryption like
JPEG, PNG or BMP.
Data Encryption
In data Encryption we protect the text with password and write in a file then encrypt the file
with the additional password so that at decryption time first he should decrypt the file with
the proper credentials and then access that file to read the password and use that password to
extract the data hidden in the image.
Data Extraction
This is the action performed at the receiver side. After receiving the data the main task of the
receiver is to extract the original data hide behind the image. This technique is known as data
extraction.
Image Recovery
Image recovery is the technique of decrypting the received image. The main task is to
generate the image same as the original image. And this is done by the reversibly perform the
encryption action i.e. by using the decryption key.
Data Decryption
In data Decryption the receiver or user decrypts the file with the relevant password to retrieve
the data hiding key to extract the data from the image.
Advantages:
If the receiver has only the data-hiding key, he can extract the additional data though he does
not know the image content.
If he has only the encryption key, he can decrypt the received data to obtain an image similar
to the original one, but cannot extract the embedded additional data.
If he receiver has both the data-hiding key and the encryption key, he can extract the
additional data and recover the original image without any error when the amount of
additional data is not too large.
Chapter 5
Analysis
5.1 HARDWARE AND SOFTWARE REQUIREMENTS
5.1.1 Hardware Requirements:
The hardware required is given below:
Main processor
: 128 MB
: 40GB
Cache memory
: 512 MB
: Matlab
Operating system
: WINDOWS-XP
Chapter 6
Design Details
6.1 FEASIBILITY ANALYSIS
6.1.1 System Feasibility
The very first phase in any system developing life cycle is preliminary investigation. In the
preliminary investigations we examine the project feasibility, the likelihood of the system
being useful to automate homes.
Safety requirements:
The data handled in this system is very vital. The system should always be confirmed to run
properly and the data are saved to the database at consecutive intervals. Power is a significant
feature and the power supply should be always taken care of. An Uninterrupted Power Supply
is always recommended.
Adaptability
This software is adaptable in any environment.
Usability requirements:
The system will provide a well-structured help facility. It will display informative error
messages when necessary. It will have consistent and easy to learn graphical user interfaces.
Chapter 7
Implementation Plan for Next Semester
1. Algorithm Implementation.
2. Coding.
3. Testing.
4. Deployment.
Chapter 8
References
X. Zhang, Reversible data hiding in encrypted image, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012
Separable Reversible Data Hiding In Encrypted Image accessed on 15 July 2015 available
online https://www.youtube.com/watch?v=BK_StE54pMs