SlideShare a Scribd company logo
1 of 23
VLSI Realization of a Secure
Cryptosystem
and Steganography in Image
Encryption and Decryption
by
VANMATHI.R
&
PRABAVATHI.M 1
Abstract
♦ In this paper I present a technique that allows
cryptography to inherit some features from
steganography in such a way that the information
is encrypted as well as hidden. The proposed
solution is to use image cryptography to hide
textual data. The process is to transfer encrypted
textual data but in image format..
2
Literature Survey
Image Steganography
♦ Methods
– Replacing Least Significant Bit: The Embedding data is
hidden by replacing the least significant bit (LSB) of
each pixel in the cover image
– Replacing Moderate Significant Bit: The Embedding
data is hidden by replacing the moderate significant bit
(MSB) of each pixel in the cover image
– Transformation Domain Techniques: Other familiar
data hiding techniques use the transformation domain
of digital media to hide information. These methods
hide the messages in the significant areas of the cover
image which makes them robust against compression,
cropping and other image processing attacks
3
4
Cryptography
♦ In Cryptography, the meaning of the message is
hidden, not its existence
– Kryptos = “hidden” in Greek
– Cryptography is the fundamental technique to counter
these threats because the outsider does not understand
the meaning of messages
♦ Cryptanalyst: Person working for unauthorized
interceptor
♦ Cryptographer: Person working for legitimate
sender or receiver
♦ Cryptology: Study of encryption and decryption,
including cryptography and cryptanalysis
5
Modern Encryption Principles
♦ An encryption scheme has 5 ingredients
– Plaintext, Encryption Algorithm, Key, Ciphertext, and
Decryption Algorithm
– Security depends on secrecy of the key, not algorithm
Proposed Conceptual Framework
6
Selection of image area for
hiding textual data
♦ In this step we propose to insert the secret text on
the selected image. We have two basic
assumptions in this step:
– firstly, the sender and the receiver know which image is
being transmitted and
– secondly, the area in the image that is used for hiding
secret data. Selecting a proper portion in the image is a
very essential step because we are going to modify the
pixels in the spatial domain. After selecting a proper
portion in an image the text can be inserted.
7
Information hiding by modifying
image within the Spatial Domain
♦ In this step i propose to use:
♦ Replacing Least Significant Bit: The Embedding data is
hidden by replacing the least significant bit (LSB) of each
pixel in the cover image
8
Advanced Encryption Standard (AES)
♦ The Advanced Encryption Standard (AES) specifies a
approved cryptographic algorithm that can be used to
protect electronic data.
♦ The AES algorithm is a symmetric block cipher that can
encrypt (encipher) and decrypt (decipher) information.
♦ Encryption converts data to an unintelligible form called
ciphertext.
♦ Decrypting the ciphertext converts the data back into its
original form, called plaintext.
♦ The AES algorithm is capable of using cryptographic keys
of 128, 192, and 256 bits to encrypt and decrypt data in
blocks of 128
9
10
There a four basic step, called layers, that are used to
form the rounds:
(1) The ByteSub (SB) Transformation: This non-
linear layer is for resistance to differential and
linear cryptanalysis attacks.
(2) The ShiftRow (SR) Transformation: This linear
mixing step causes diffusion of the bits over
multiple rounds.
(3) The MixColumn (MC) Transformation: This
layer has a purpose similar to ShiftRow.
(4) AddRoundKey (ARK) Transformation: The
round key is XORed with the result of the above
layer.
Decryption
Each of the steps Byte Sub, Shift Row, Mix Column, and
AddRoundKey is inversible:
(1) The inverse of Byte Sub is another lookup table, called
InvByteSub (IBS).
(2) The inverse of Shift Row is obtained by shifting the rows
to the right instead of to the left, yielding InvShiftRow
(ISR)
(3) The transformation InvMixColumn (IMC) is given by
multiplication by the matrix
(4) AddRoundKey is its own inverse.
11
AES Encryption Algorithm Flow
12
Basics of Modern
SteganographySteganography
13
fE:      steganographic function "embedding"
fE-1:   steganographic function "extracting"
cover:  cover data in which emb will be 
hidden
emb:    message to be hidden
key:    parameter of fE
stego:  cover data with the hidden message 
Steganalysis meets Cryptanalysis
♦ Knowing the steganography program used to hide
the message can be extremely handy when
attempting to reveal the actual hidden message
♦ Identifying and cracking the algorithm
– Unfortunately, some of these programs use strong
encryption 256-bit or stronger
♦ Reveal or Crack the password, seed, or secret key
– Practically all Steganography programs use a
password to hide the message
14
Steganalysis meets Cryptanalysis
Cryptanalysis
♦ As stated previously, in Steganography
the goal is to hide the message, NOT
encrypt it
♦ Cryptography provides the means to
encrypt the message
15
Steganography – Modern Day
16
Anomaly – Visual Detection
♦ Can you see a difference in these two
pictures?
17
Result Analysis
♦ If the encrption and decryption key is 
wrong,then the output of hidden text will be 
a display  unknown text.
♦ To view original hidden message, keys or 
password should be loaded correctly in both 
encryption and decryption sides.
18
19
20
If the key or password loaded is wrong then
the output of the decrypted emmbedded text
will be wrong as follows in below simulation
analysis..
21
Conclusion
♦ In this paper i proposed a new technique of
using image as a cover medium for
concealing cryptographic communication.
♦ This is a new technique, which can be used
to disguise the use of encrypted
communication as well as keep the hidden
information secret
22
23

More Related Content

What's hot

AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMIJNSA Journal
 
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSICS Design
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferIEEEFINALYEARPROJECTS
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...ijfcstjournal
 
Presentation overview of neural & kernel based clustering
Presentation overview of neural & kernel based clustering Presentation overview of neural & kernel based clustering
Presentation overview of neural & kernel based clustering Shubham Vijay Vargiy
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 

What's hot (14)

AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
6119ijcsitce01
6119ijcsitce016119ijcsitce01
6119ijcsitce01
 
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
cvpr-final
cvpr-finalcvpr-final
cvpr-final
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
JACT 5-3_Christakis
JACT 5-3_ChristakisJACT 5-3_Christakis
JACT 5-3_Christakis
 
R094108112
R094108112R094108112
R094108112
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...Soft computing based cryptographic technique using kohonen's selforganizing m...
Soft computing based cryptographic technique using kohonen's selforganizing m...
 
Presentation overview of neural & kernel based clustering
Presentation overview of neural & kernel based clustering Presentation overview of neural & kernel based clustering
Presentation overview of neural & kernel based clustering
 
I017425763
I017425763I017425763
I017425763
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 

Viewers also liked

VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption
VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption DecryptionVLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption
VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption DecryptionHardik Manocha
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...
Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...
Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...Saiff Solutions, Inc.
 

Viewers also liked (10)

VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption
VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption DecryptionVLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption
VLSI DESIGN Conference 2016, Kolkata- Authenticated Encryption Decryption
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...
Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...
Encore Session - Motivate and Empower Globally-Competitive Teams of Content P...
 

Similar to VLSI Realization of a Secure Cryptosystem and Steganography in Image Encryption and Decryption

Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionIEEEFINALYEARPROJECTS
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESIJERD Editor
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 

Similar to VLSI Realization of a Secure Cryptosystem and Steganography in Image Encryption and Decryption (20)

Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Steganography
SteganographySteganography
Steganography
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Bj31416421
Bj31416421Bj31416421
Bj31416421
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 

More from Association of Scientists, Developers and Faculties

More from Association of Scientists, Developers and Faculties (20)

Core conferences bta 19 paper 12
Core conferences bta 19 paper 12Core conferences bta 19 paper 12
Core conferences bta 19 paper 12
 
Core conferences bta 19 paper 10
Core conferences bta 19 paper 10Core conferences bta 19 paper 10
Core conferences bta 19 paper 10
 
Core conferences bta 19 paper 8
Core conferences bta 19 paper 8Core conferences bta 19 paper 8
Core conferences bta 19 paper 8
 
Core conferences bta 19 paper 7
Core conferences bta 19 paper 7Core conferences bta 19 paper 7
Core conferences bta 19 paper 7
 
Core conferences bta 19 paper 6
Core conferences bta 19 paper 6Core conferences bta 19 paper 6
Core conferences bta 19 paper 6
 
Core conferences bta 19 paper 5
Core conferences bta 19 paper 5Core conferences bta 19 paper 5
Core conferences bta 19 paper 5
 
Core conferences bta 19 paper 4
Core conferences bta 19 paper 4Core conferences bta 19 paper 4
Core conferences bta 19 paper 4
 
Core conferences bta 19 paper 3
Core conferences bta 19 paper 3Core conferences bta 19 paper 3
Core conferences bta 19 paper 3
 
Core conferences bta 19 paper 2
Core conferences bta 19 paper 2Core conferences bta 19 paper 2
Core conferences bta 19 paper 2
 
CoreConferences Batch A 2019
CoreConferences Batch A 2019CoreConferences Batch A 2019
CoreConferences Batch A 2019
 
International Conference on Cloud of Things and Wearable Technologies 2018
International Conference on Cloud of Things and Wearable Technologies 2018International Conference on Cloud of Things and Wearable Technologies 2018
International Conference on Cloud of Things and Wearable Technologies 2018
 
ICCELEM 2017
ICCELEM 2017ICCELEM 2017
ICCELEM 2017
 
ICSSCCET 2017
ICSSCCET 2017ICSSCCET 2017
ICSSCCET 2017
 
ICAIET 2017
ICAIET 2017ICAIET 2017
ICAIET 2017
 
ICICS 2017
ICICS 2017ICICS 2017
ICICS 2017
 
ICACIEM 2017
ICACIEM 2017ICACIEM 2017
ICACIEM 2017
 
A Typical Sleep Scheduling Algorithm in Cluster Head Selection for Energy Eff...
A Typical Sleep Scheduling Algorithm in Cluster Head Selection for Energy Eff...A Typical Sleep Scheduling Algorithm in Cluster Head Selection for Energy Eff...
A Typical Sleep Scheduling Algorithm in Cluster Head Selection for Energy Eff...
 
Application of Agricultural Waste in Preparation of Sustainable Construction ...
Application of Agricultural Waste in Preparation of Sustainable Construction ...Application of Agricultural Waste in Preparation of Sustainable Construction ...
Application of Agricultural Waste in Preparation of Sustainable Construction ...
 
Survey and Research Challenges in Big Data
Survey and Research Challenges in Big DataSurvey and Research Challenges in Big Data
Survey and Research Challenges in Big Data
 
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

VLSI Realization of a Secure Cryptosystem and Steganography in Image Encryption and Decryption

  • 1. VLSI Realization of a Secure Cryptosystem and Steganography in Image Encryption and Decryption by VANMATHI.R & PRABAVATHI.M 1
  • 2. Abstract ♦ In this paper I present a technique that allows cryptography to inherit some features from steganography in such a way that the information is encrypted as well as hidden. The proposed solution is to use image cryptography to hide textual data. The process is to transfer encrypted textual data but in image format.. 2
  • 3. Literature Survey Image Steganography ♦ Methods – Replacing Least Significant Bit: The Embedding data is hidden by replacing the least significant bit (LSB) of each pixel in the cover image – Replacing Moderate Significant Bit: The Embedding data is hidden by replacing the moderate significant bit (MSB) of each pixel in the cover image – Transformation Domain Techniques: Other familiar data hiding techniques use the transformation domain of digital media to hide information. These methods hide the messages in the significant areas of the cover image which makes them robust against compression, cropping and other image processing attacks 3
  • 4. 4 Cryptography ♦ In Cryptography, the meaning of the message is hidden, not its existence – Kryptos = “hidden” in Greek – Cryptography is the fundamental technique to counter these threats because the outsider does not understand the meaning of messages ♦ Cryptanalyst: Person working for unauthorized interceptor ♦ Cryptographer: Person working for legitimate sender or receiver ♦ Cryptology: Study of encryption and decryption, including cryptography and cryptanalysis
  • 5. 5 Modern Encryption Principles ♦ An encryption scheme has 5 ingredients – Plaintext, Encryption Algorithm, Key, Ciphertext, and Decryption Algorithm – Security depends on secrecy of the key, not algorithm
  • 7. Selection of image area for hiding textual data ♦ In this step we propose to insert the secret text on the selected image. We have two basic assumptions in this step: – firstly, the sender and the receiver know which image is being transmitted and – secondly, the area in the image that is used for hiding secret data. Selecting a proper portion in the image is a very essential step because we are going to modify the pixels in the spatial domain. After selecting a proper portion in an image the text can be inserted. 7
  • 8. Information hiding by modifying image within the Spatial Domain ♦ In this step i propose to use: ♦ Replacing Least Significant Bit: The Embedding data is hidden by replacing the least significant bit (LSB) of each pixel in the cover image 8
  • 9. Advanced Encryption Standard (AES) ♦ The Advanced Encryption Standard (AES) specifies a approved cryptographic algorithm that can be used to protect electronic data. ♦ The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. ♦ Encryption converts data to an unintelligible form called ciphertext. ♦ Decrypting the ciphertext converts the data back into its original form, called plaintext. ♦ The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 9
  • 10. 10 There a four basic step, called layers, that are used to form the rounds: (1) The ByteSub (SB) Transformation: This non- linear layer is for resistance to differential and linear cryptanalysis attacks. (2) The ShiftRow (SR) Transformation: This linear mixing step causes diffusion of the bits over multiple rounds. (3) The MixColumn (MC) Transformation: This layer has a purpose similar to ShiftRow. (4) AddRoundKey (ARK) Transformation: The round key is XORed with the result of the above layer.
  • 11. Decryption Each of the steps Byte Sub, Shift Row, Mix Column, and AddRoundKey is inversible: (1) The inverse of Byte Sub is another lookup table, called InvByteSub (IBS). (2) The inverse of Shift Row is obtained by shifting the rows to the right instead of to the left, yielding InvShiftRow (ISR) (3) The transformation InvMixColumn (IMC) is given by multiplication by the matrix (4) AddRoundKey is its own inverse. 11
  • 14. Steganalysis meets Cryptanalysis ♦ Knowing the steganography program used to hide the message can be extremely handy when attempting to reveal the actual hidden message ♦ Identifying and cracking the algorithm – Unfortunately, some of these programs use strong encryption 256-bit or stronger ♦ Reveal or Crack the password, seed, or secret key – Practically all Steganography programs use a password to hide the message 14
  • 15. Steganalysis meets Cryptanalysis Cryptanalysis ♦ As stated previously, in Steganography the goal is to hide the message, NOT encrypt it ♦ Cryptography provides the means to encrypt the message 15
  • 17. Anomaly – Visual Detection ♦ Can you see a difference in these two pictures? 17
  • 19. 19
  • 20. 20 If the key or password loaded is wrong then the output of the decrypted emmbedded text will be wrong as follows in below simulation analysis..
  • 21. 21
  • 22. Conclusion ♦ In this paper i proposed a new technique of using image as a cover medium for concealing cryptographic communication. ♦ This is a new technique, which can be used to disguise the use of encrypted communication as well as keep the hidden information secret 22
  • 23. 23