SlideShare a Scribd company logo
1 of 14
CRYPEGANGRAPHY
A secure communication
technique using steganography
and cryptography Tushar Totla
ABSTRACT
With increase in the data transmission and data
exchange in daily life, along with the increasing
data thefts and other adversary snooping, the
security and privacy of data has become an
important thing to be concerned about.
Throughout the years many different
approaches, ideas, algorithms and protocols
have been developed to protect the data from
snoopers and adversaries and ensure secure
communication. Each approach has its own
pros and cons. This project is an attempt to
combine two different approaches of data
protection- (Steganography and Cryptography)
to develop a powerful and secured method for
data exchange.
20XX Crypegangraphy 2
CRYPTOGRAPH
Y
Cryptography is basically a method in which you will be hiding or encrypting a
message that a user wants to send it to someone. This method allows us to
form an encrypted text (cipher text) that hides the message.
The working of cryptography is done via following steps:
• Firstly, the textual confidential data which the user wants to send is
converted to numerical form.
• Secondly, this numeric form that has the message, is applied into the
algorithm along with the encryption key, which we can say, is like a string of
bits.
• Together, when applied into the encryption algorithm, it forms cipher-text.
The cipher-text that is generated is then sent to the receiver through the
network.
• Reaching the other side, the receiver then decrypts the cipher-text in a
similar way. Here, he uses the cipher-text and decryption key as the inputs
for the decryption algorithm and decrypts it back to the numeric form.
• Finally in the end the numeric form is converted to the intended message
Crypegangraphy 3
STEGANOGRAP
HY
Steganography is a method in which you hide the
message intended to send to someone in an image.
The image might look the same after using
steganography but a point to remember is that it has
the message. Steganography hides the identity of the
message in the cover.
The confidential data is taken as input from the user
along with the cover image in which the data is to be
hidden.
These act as an input for the Steganographic Encoder
which encodes the given message into the cover file,
resulting the output as the STEGO-IMAGE.
Now the receiver is provided with stego-image which
he/she decodes it with the Steganographic Decoder
and finally gets the intended message.
Crypegangraphy 4
ALGORITHMS
RS
A
LSB
AE
S
ASYMMETRIC
CRYPTOGRAPHIC
ALGORITHM
A
STEGANOGRAPHI
C ALGORITHM
SYMMETRIC
CRYPTOGRAPHIC
ALGORITHM
Crypegangraphy 5
ALGORITHMS
AES
A symmetric algorithm where
the key is the same for both
the sender and the receiver. It
works on block cipher
technique which means that
size of the plain text and
cipher text must be the same.
Here an input key is given
into the algorithm which is of
the same size as the plain
text.
LSB
LSB steganography
technique, the information
hider embeds the secret
information in the least
significant bits of a media file.
RSA
A block-cipher type algorithm
that converts plain text to
cipher text. It is an asymmetric
cryptography algorithm; this
means that it uses a public key
and a private key. As their
names suggest, a public key is
shared publicly, while a private
key is secret and must not be
shared with anyone.
Crypegangraphy 6
ARCHITECTURE AND MODULE
DESCRIPTION
ENCRYPTION MODULE
This module encrypts plain text to
cipher text. In this model we have used
the AES and RSA encryption algorithm
DECRYPTION MODULE
This module performs AES/RSA
decryption by using the private key and
extracts the plain text from the cipher text.
ENCODING MODULE
This module is responsible for hiding
the cipher text to the cover image by
the use of steganography techniques
DECODING MODULE
This module extracts the hidden
cipher text from the stego image
which is sent by the sender.
Crypegangraphy 7
ARCHITECTURE DIAGRAM
Crypegangraphy 8
IMPLEMENTATION
Crypegangraphy 9
• ENCRYPT:
• SYMMETRIC ENCRYPTION
• ASYMMETRIC ENCRYPTION
• SYMMETRIC ENCRYPTION WITH
STEGANOGRPAHY
• ASYMMETRIC ENCRYPTION
• WITH STEGANOGRAPHY
• DECRYPT
• KEYS
• WITH KEY SIZE=2048
• WITH KEY SIZE=3072
• WITH KEY SIZE=4096
• WITH KEY SIZE=8192
• MAILS
RESULTS
Crypegangraphy 10
PERFORMANCE ANALYSIS
PEAK SIGNAL TO NOISE RATIO [PSNR]
Crypegangraphy 11
IMAGE PSNR VALUE
PIC1 83.68325325
PIC2 92.5770748712
PIC3 90.22543984536
PIC4 85.95438621
For evaluation of the proposed steganography technique a
performance metric known as PSNR was used to evaluate
the distortion between the image before and after the
image were encoded with the secret text. Peak signal to
noise ratio is used to compute how well the algorithm
performed.
TESTING PICS
PIC 1
OR IGINAL IMAGE
Crypegangraphy 12
PIC 2
OR IGINAL IMAGE
PIC 3
OR IGINAL IMAGE
PIC 4
OR IGINAL IMAGE
EN C RYPTED
EN C RYPTED IMAGE
EN C RYPTED
EN C RYPTED IMAGE
EN C RYPTED
EN C RYPTED IMAGE
EN C RYPTED
EN C RYPTED IMAGE
CONCLUSION AND
FUTURE WORK
From the whole study, we conclude that using both
steganography and cryptography together refers to secure
information and communication technique. The GUI
implementation for the whole system giving choice to the
user to choose his preferable technique for secure
communication is added as a part of innovative idea to it.
Considering the future work, the application can be further
improved by adding some more utilities and designing
abetter UI. Some features like providing more crypto
algorithms like DES, Blowfish, SA etc. for encryption of the
message can provide more utilities to the application.
Overall, the present application is very handy, secured and
interactive providing sufficient utilities to the users.
Crypegangraphy 13
THANK YOU 
Crypegangraphy 14

More Related Content

Similar to Crypegangraphy.pptx

Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...AIRCC Publishing Corporation
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniquestheijes
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 

Similar to Crypegangraphy.pptx (20)

J m paper
J m paperJ m paper
J m paper
 
R04405103106
R04405103106R04405103106
R04405103106
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
K0815660
K0815660K0815660
K0815660
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
G018143943
G018143943G018143943
G018143943
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 

Recently uploaded

latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

Crypegangraphy.pptx

  • 1. CRYPEGANGRAPHY A secure communication technique using steganography and cryptography Tushar Totla
  • 2. ABSTRACT With increase in the data transmission and data exchange in daily life, along with the increasing data thefts and other adversary snooping, the security and privacy of data has become an important thing to be concerned about. Throughout the years many different approaches, ideas, algorithms and protocols have been developed to protect the data from snoopers and adversaries and ensure secure communication. Each approach has its own pros and cons. This project is an attempt to combine two different approaches of data protection- (Steganography and Cryptography) to develop a powerful and secured method for data exchange. 20XX Crypegangraphy 2
  • 3. CRYPTOGRAPH Y Cryptography is basically a method in which you will be hiding or encrypting a message that a user wants to send it to someone. This method allows us to form an encrypted text (cipher text) that hides the message. The working of cryptography is done via following steps: • Firstly, the textual confidential data which the user wants to send is converted to numerical form. • Secondly, this numeric form that has the message, is applied into the algorithm along with the encryption key, which we can say, is like a string of bits. • Together, when applied into the encryption algorithm, it forms cipher-text. The cipher-text that is generated is then sent to the receiver through the network. • Reaching the other side, the receiver then decrypts the cipher-text in a similar way. Here, he uses the cipher-text and decryption key as the inputs for the decryption algorithm and decrypts it back to the numeric form. • Finally in the end the numeric form is converted to the intended message Crypegangraphy 3
  • 4. STEGANOGRAP HY Steganography is a method in which you hide the message intended to send to someone in an image. The image might look the same after using steganography but a point to remember is that it has the message. Steganography hides the identity of the message in the cover. The confidential data is taken as input from the user along with the cover image in which the data is to be hidden. These act as an input for the Steganographic Encoder which encodes the given message into the cover file, resulting the output as the STEGO-IMAGE. Now the receiver is provided with stego-image which he/she decodes it with the Steganographic Decoder and finally gets the intended message. Crypegangraphy 4
  • 6. ALGORITHMS AES A symmetric algorithm where the key is the same for both the sender and the receiver. It works on block cipher technique which means that size of the plain text and cipher text must be the same. Here an input key is given into the algorithm which is of the same size as the plain text. LSB LSB steganography technique, the information hider embeds the secret information in the least significant bits of a media file. RSA A block-cipher type algorithm that converts plain text to cipher text. It is an asymmetric cryptography algorithm; this means that it uses a public key and a private key. As their names suggest, a public key is shared publicly, while a private key is secret and must not be shared with anyone. Crypegangraphy 6
  • 7. ARCHITECTURE AND MODULE DESCRIPTION ENCRYPTION MODULE This module encrypts plain text to cipher text. In this model we have used the AES and RSA encryption algorithm DECRYPTION MODULE This module performs AES/RSA decryption by using the private key and extracts the plain text from the cipher text. ENCODING MODULE This module is responsible for hiding the cipher text to the cover image by the use of steganography techniques DECODING MODULE This module extracts the hidden cipher text from the stego image which is sent by the sender. Crypegangraphy 7
  • 9. IMPLEMENTATION Crypegangraphy 9 • ENCRYPT: • SYMMETRIC ENCRYPTION • ASYMMETRIC ENCRYPTION • SYMMETRIC ENCRYPTION WITH STEGANOGRPAHY • ASYMMETRIC ENCRYPTION • WITH STEGANOGRAPHY • DECRYPT • KEYS • WITH KEY SIZE=2048 • WITH KEY SIZE=3072 • WITH KEY SIZE=4096 • WITH KEY SIZE=8192 • MAILS
  • 11. PERFORMANCE ANALYSIS PEAK SIGNAL TO NOISE RATIO [PSNR] Crypegangraphy 11 IMAGE PSNR VALUE PIC1 83.68325325 PIC2 92.5770748712 PIC3 90.22543984536 PIC4 85.95438621 For evaluation of the proposed steganography technique a performance metric known as PSNR was used to evaluate the distortion between the image before and after the image were encoded with the secret text. Peak signal to noise ratio is used to compute how well the algorithm performed.
  • 12. TESTING PICS PIC 1 OR IGINAL IMAGE Crypegangraphy 12 PIC 2 OR IGINAL IMAGE PIC 3 OR IGINAL IMAGE PIC 4 OR IGINAL IMAGE EN C RYPTED EN C RYPTED IMAGE EN C RYPTED EN C RYPTED IMAGE EN C RYPTED EN C RYPTED IMAGE EN C RYPTED EN C RYPTED IMAGE
  • 13. CONCLUSION AND FUTURE WORK From the whole study, we conclude that using both steganography and cryptography together refers to secure information and communication technique. The GUI implementation for the whole system giving choice to the user to choose his preferable technique for secure communication is added as a part of innovative idea to it. Considering the future work, the application can be further improved by adding some more utilities and designing abetter UI. Some features like providing more crypto algorithms like DES, Blowfish, SA etc. for encryption of the message can provide more utilities to the application. Overall, the present application is very handy, secured and interactive providing sufficient utilities to the users. Crypegangraphy 13