SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 674
Encrypting and Decrypting Message via Image Slicing
Sudeshna Khedekar [1], Digvij Akre [2], Vishakha Mulik [3], Prof. Bhavna Arora [4]
[1], [2], [3]Student, Department of Computer Engineering, Atharva College of Engineering, Mumbai
[4]Professor, Department of Computer Engineering, Atharva College of Engineering, Mumbai
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Communication via message has become a
major and effective part of our day-to-day life. Even
though it is convenient to send messages and receive data.
One of the main problems that we face these days is Data
Security. That is where encryption and decryption of the
data comes into play and there exists multiple encryption
and decryption algorithms to serve the purpose. But, using
only one algorithm for this, is generally not secure enough.
So, by using effectives encryption and decrypting
standards for effective approach to provide Message
encryption
Key Words: Cryptography, Steganography, Encryption,
Decryption, AES (Advanced encryption standard), LSB
(least significant bit).
1. INTRODUCTION
In today’s world, we use many types of digital data. The
information between mobile devices and computers is
transmitted via one network in various form. But, do you
think your confidential information and the security of
that data over the internet are secure? No, the confidential
data and information in today’s advanced world are not
safely transferred via the network. And Our data is stolen
by unauthorized users on daily basis. Hence, ensuring the
Security and Confidentiality of data transmission is a very
important and current necessity. This security can be
achieved by different techniques. One of the techniques is
Steganography and Cryptography.
Cryptography techniques can be described into two types’
Symmetric- key cryptography and Asymmetric-key
cryptography. [11]Under Symmetric-key cryptography, only
one key is carried out process between the sender and the
receiver. Whereas In Asymmetric-key cryptography we
have two different keys one is a public key and another
one is the private key. A public key is revealed to all, and a
private key is secretly known to the authorized recipient
of that data. In the Cryptography technique, even if the
data is sent securely, it gives the clue of the existence of
secret data to the third-party source. However, In the
Steganography technique, there is no such clue given that
will unintended recipient as the secret data is hidden
inside another data.
1.1 MOTIVATION OF PROJECT
As per the knowledge the technology is going advanced
and growing day by day. Our main motto is to send data
securely over the internet. The idea behind our project
can be used by many sectors like financial services,
defence, detective agencies, government sectors.
1.2 BASIC CONCEPT
Our solution is to transfer the data securely via image. To
Securely carry out the process of hiding the data in image.
Algorithm like image slicing, image stitching, AES, LSB are
used. To maintain real time integrity and authenticity of
the process it will asked to enter a 16-bit AES key to
encrypt the data and same key is used by receiver to
decrypt the data in between this process LSB, image
slicing and image stitching techniques will be applied to
securely encrypt and decrypt the data.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 675
2. BACKGROUND STUDY
The basic ideology of this project came from a background
study of [5] Information hiding in images using a
steganography technique paper written by Ramadhan
Mstafa and Christian Bach. Where they have used
steganography and different watermarking technique for
securely transferring the data and from other paper [3]
Image Security using Image Encryption and Image
Stitching paper written by Jyoti T.G. Kankonkar and Prof.
Nitesh Naik, where image stitching techniques are used to
securely transfer the data. So, in an effort to make the
process more secure, our idea of using image slicing and
image stitching with cryptography and steganography
techniques to provide more security of data that is to be
transmitted over an internet.
3. OVERVIEW OF ALGORITHMS:
1. ADVANCED ENCRYPTION STANDARD (AES)
The advanced encryption standard (AES) is a symmetric-
key block cipher that was published by the (NIST)
National Institute of Standards and Technology in
December 2001.[9] AES is a non – Feistel cipher. It encrypts
and decrypts 128 bits data blocks. How many rounds will
be carried out will depend on the key length i.e. If the key
length is 128 bits it has 10 rounds, if the key length is 192
bits there are 12 rounds to carry out. Whereas if the key
length is 256 it has bit 14 rounds.
[4] AES has three different AES versions: AES-128, AES-192,
and AES-256. Every round has sub bytes, shift rows, mix
columns and add round key. In the sub bytes, we interpret
the byte as two hexadecimal digits. Where the row defines
the left digits and the column that defines the right digit.
The function of the two hexadecimal digits of the row and
column is the new bytes. Shift rows are shifting to the left.
In the Mix column step, it is to mix the column matrix. In
add round key step it adds the round keyword with every
state column matrix
1.1 CIPHER-BLOCK CHAINING (CBC) MODE
The CBC mode is as for including XOR to every plaintext
block to the cipher text block that was created prior.
Keeping the use of same approach where cipher algorithm
used for encrypting the result. The first block act as
resultant block of cipher text, every following block of
plaintext is then XOR with the preceding block of cipher
text prior to encryption, the action perform is termed as
chaining that comes in cipher block chaining. To keep
away from making identical output cipher text blocks from
identical plaintext data this mode is being implied for
encryption in CBC mode i.e. Cipher block chaining mode
which will only be done using one thread.
Despite this disadvantage, this could be a really common
approach that makes use of block ciphers. CBC mode is
used in lots of applications. all through decrypting of a
cipher text block, one should add XOR the output data
acquired from the decoding(decrypting) algorithms to the
preceding cipher text block. due to the receiver is aware of
all of the cipher text blocks simply when getting the
encrypted message, he's going to decipher the message by
the use of numerous threads on the same time.
Decryption in the CBC mode works in the opposite order.
while decrypting the final block of cipher text, the ensuing
data is XOR'd with the preceding block of cipher text to
recover the initial plaintext.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 676
2. LEAST SIGNIFICANT BIT
LSB steganography is one technique that merge the hidden
data inside an image. In a Gray scale image, every pixel is
represented in 8 bits. The last bit of the pixel is called as
Least Significant bit as its value will affect the pixel value
only by “1”. [7] In short LSB technique is used to hide the
data in the image. If someone considered the last two bits
as a LSB bits it will affect the pixel value only by “3”. This
helps in hiding extra data.
LSB steganography is a technique where the last bit of any
selected image is replaced with a data bit. As this method
is vulnerable to steganalysis so as to make it more secure,
we first encrypt that data in a raw manner. Before merging
the data in the image. While it increases time complexity
during encryption process, it provides higher security also.
This approach is very simple. In this method, the LSB bits
of some or all of the bytes present within an image are
replaced with bits of the secrete message. [2] To hide
message with in several multimedia carrier data by using
one of the basic techniques called LSB approach. LSB
embedding may even applied in specific data domains - to
give an example, embedding a hidden message into the
color values of RGB bitmap data, or inside the frequency
coefficients of a JPEG image. We can also applied LSB
embedding approach to a variety of data formats and
types. Therefore, Nowadays LSB embedding is a primarily
important and popular steganography technique.
3. IMAGE SLICING
Image slicing is method is simple process of cutting the
images into pieces without any changing in dimension or
changing any features of the image image is slide into
matrix form by increasing size of matrix number of sliced
images can be increased
4. IMAGE STITCHING
[4] Image stitching is the process which is carried out
where the image is stitched without changing any
dimension or changing any features of the image it is an
opposite of image slicing process
4. PROPOSED SYSTEM
4.1 IMPLEMENTATION
Process flow is as follow:
Sender side:
Step 1: The data which is shared over the internet is
unsafe and easy to access. To protect them using key,
which will be in the 128-bit format. The key is shared
between only sender and receiver to access the
confidential data.
Step 2: After entering plain text it will get encrypted by
using AES algorithm. Advance Encryption Standard
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 677
algorithm is used to encrypt the plain text which is
entered by the sender using key. It converts original data
to an unreadable format so that stranger or attacker is not
able to read or understand the original data. The plain text
if hard to read is known as cipher text.
Step 3: After converting the data into cipher text It will
hide inside cover medium using LSB steganography. [8]
The cover medium can be in various form like audio,
image, video or text document. The size of the image is
depending on the amount of data which is entered by the
sender. After done with all process the image called as
stego image.
Step 4: Image Slicing is simple process of cutting the
images into pieces without any changing in dimension or
changing any features of the image. Image is slide into
matrix form. By increasing size of matrix number of sliced
images can be increased.
Step 5: Finally, receiver received the data via stego image
in slices without any changing in dimension or changing
any features of the image. By increasing size of matrix
number of sliced images can be increased.
Receiver side:
Step 1: Receiver received the data via stego image in slices
without any changing in dimension or changing any
features of the image. Now, the image in slices will get
stitched using image stitching process. process where the
image is stitched without changing any dimension or
changing any features of the image. It is an opposite of
Image Slicing process. After this process the entire image
is called as stego image.
Step 2: We got the image then apply the LSB decoded
algorithm. For the algorithm we used the image got after
image stitching apply the algorithm then we find the
cipher text which is hidden inside the stego image.
Step 3: Using this cipher text and 128-bits key which is
shared between sender and receiver as input we apply
AES decode algorithm to get the original data file. The
process of decryption of an AES cipher text is opposite to
the AES encryption process. Each round consists of the
four processes conducted in the reverse order 1. Add
round key, 2. Mix columns, 3. Shift rows, 4. Byte
substitution.
Step 4: Finally, receiver received the confidential data
safely without any anonyms attack.
4.2 SYSTEM DESIGN
5. DESIGN DETAIL
5.1 SENDERS FLOWCHART
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 678
5.2 RECEIVER FLOWCHART
5.3 CLASS DIAGRAM
6. FUTURE SCOPE
This idea and approach that we have implemented does
not end here. There can be a future scope for development
we can extend this particular project into multiple
platforms. Particularly, we can incorporate additional
algorithm together to make is more appealing.
One other scope of improvement in expanding the idea
hiding the data into a video format so that the application
can be more secure so that different sector can use this to
secure the way of communication between the user and
themself. As specially, since the sensitive data can be
stored without anyone knowing about it. Such that storing
sensitive data won’t be a problem it as we add higher level
of security.
7. CONCLUSION
In this project we have combine different data security
technique to share data on an unreliable channel. This
Hybrid technique consist of AES Cryptography, LSB
Steganography, Image slicing and image stitching process.
Using this Hybrid technique, we are able to retrieve the
data at receiver end without any Data loss. so, we believe
various sector and entity can greatly benefit from our
application in the current scenario, also maintaining
authenticity and integrity of the entire
REFERENCES
[1] Wafaa Mustafa Abduallah and Abdul Monem S.
Rahma,“A Review on Steganography Techniques”,
American Scientific Research Journal for Engineering,
Technology, and Sciences (ASRJETS), ISSN (Print)
2313-4410, ISSN (Online) 2313-4402
[2] Rajarathnam Chandramouli and Nasir D. Memon,
“Analysis of LSB based image steganography
techniques”, 2001 International Conference onVolume:
3, DOI: 10.1109/ICIP.2001.958299
[3] Jyoti T.G.Kankonkar and Prof. Nitesh Naik,“Image
Security using Image Encryption and Image Stitching”,
Proceedings of the IEEE 2017 International Conference
on Computing Methodologies and Communication
[4] Ako Muhammad Abdullah, “Advanced Encryption
Standard (AES) Algorithm to Encrypt and Decrypt
Data”
[5] Ramadhan J. Mstafa and Christian Bach, “Information
Hiding in Images Using Steganography Techniques”,
Northeast Conference of the American Society for
Engineering Education (ASEE)At: Norwich University
David Crawford School of Engineering,
DOI:10.13140/RG.2.1.1350.9360
[6] Nikhil Patel and Shweta Meena, “LSB based image
steganography using dynamic key cryptography”, 2016
International Conference on Emerging Trends in
Communication Technologies (ETCT),
DOI:10.1109/ETCT.2016.7882955
[7] Arun Kumar Singh, Juhi Singh and Dr. Harsh Vikram
Singh, “Steganography in Images Using LSB
Technique”, International Journal of Latest Trends in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 679
Engineering and Technology (IJLTET), ISSN: 2278-
621X
[8] Dr. Amarendra K, Venkata Naresh Mandhala, B.Chetan
gupta, G.Geetha Sudheshna, V.Venkata Anusha, “Image
Steganography Using LSB”, international journal of
scientific & technology research volume 8, issue 12,
december 2019, issn 2277-8616
[9] M.Pitchaiah, Philemon Daniel and Praveen,
“Implementation of Advanced Encryption Standard
Algorithm”, International Journal of Scientific &
Engineering Research Volume 3, Issue 3, March -
2012,ISSN 2229-5518
[10] M. Pavani1, S. Naganjaneyulu, C. Nagaraju, ”A Survey on
LSB Based Steganography Methods” International
Journal Of Engineering And Computer Science
ISSN:2319-7242 Volume 2 Issue 8 August, 2013 Page
No. 2464-2467
[11] Akshay Kekunnaya, Rajeshwari Gundla , Siddharth
Nanda, “A research Paper for Symmetric and
asymmetric cryptography”, ijrece vol. 7 issue 2 (april-
june 2019), issn: 2393-9028 (print) | issn: 2348-2281
(online)

More Related Content

Similar to Encrypting and Decrypting Message via Image Slicing

IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalIRJET Journal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm witheSAT Publishing House
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an  encryption using LSB repl...Advanced technique for video steganography with an  encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...IRJET Journal
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 

Similar to Encrypting and Decrypting Message via Image Slicing (20)

IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier SignalEncryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
R04405103106
R04405103106R04405103106
R04405103106
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an  encryption using LSB repl...Advanced technique for video steganography with an  encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Encrypting and Decrypting Message via Image Slicing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 674 Encrypting and Decrypting Message via Image Slicing Sudeshna Khedekar [1], Digvij Akre [2], Vishakha Mulik [3], Prof. Bhavna Arora [4] [1], [2], [3]Student, Department of Computer Engineering, Atharva College of Engineering, Mumbai [4]Professor, Department of Computer Engineering, Atharva College of Engineering, Mumbai ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Communication via message has become a major and effective part of our day-to-day life. Even though it is convenient to send messages and receive data. One of the main problems that we face these days is Data Security. That is where encryption and decryption of the data comes into play and there exists multiple encryption and decryption algorithms to serve the purpose. But, using only one algorithm for this, is generally not secure enough. So, by using effectives encryption and decrypting standards for effective approach to provide Message encryption Key Words: Cryptography, Steganography, Encryption, Decryption, AES (Advanced encryption standard), LSB (least significant bit). 1. INTRODUCTION In today’s world, we use many types of digital data. The information between mobile devices and computers is transmitted via one network in various form. But, do you think your confidential information and the security of that data over the internet are secure? No, the confidential data and information in today’s advanced world are not safely transferred via the network. And Our data is stolen by unauthorized users on daily basis. Hence, ensuring the Security and Confidentiality of data transmission is a very important and current necessity. This security can be achieved by different techniques. One of the techniques is Steganography and Cryptography. Cryptography techniques can be described into two types’ Symmetric- key cryptography and Asymmetric-key cryptography. [11]Under Symmetric-key cryptography, only one key is carried out process between the sender and the receiver. Whereas In Asymmetric-key cryptography we have two different keys one is a public key and another one is the private key. A public key is revealed to all, and a private key is secretly known to the authorized recipient of that data. In the Cryptography technique, even if the data is sent securely, it gives the clue of the existence of secret data to the third-party source. However, In the Steganography technique, there is no such clue given that will unintended recipient as the secret data is hidden inside another data. 1.1 MOTIVATION OF PROJECT As per the knowledge the technology is going advanced and growing day by day. Our main motto is to send data securely over the internet. The idea behind our project can be used by many sectors like financial services, defence, detective agencies, government sectors. 1.2 BASIC CONCEPT Our solution is to transfer the data securely via image. To Securely carry out the process of hiding the data in image. Algorithm like image slicing, image stitching, AES, LSB are used. To maintain real time integrity and authenticity of the process it will asked to enter a 16-bit AES key to encrypt the data and same key is used by receiver to decrypt the data in between this process LSB, image slicing and image stitching techniques will be applied to securely encrypt and decrypt the data.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 675 2. BACKGROUND STUDY The basic ideology of this project came from a background study of [5] Information hiding in images using a steganography technique paper written by Ramadhan Mstafa and Christian Bach. Where they have used steganography and different watermarking technique for securely transferring the data and from other paper [3] Image Security using Image Encryption and Image Stitching paper written by Jyoti T.G. Kankonkar and Prof. Nitesh Naik, where image stitching techniques are used to securely transfer the data. So, in an effort to make the process more secure, our idea of using image slicing and image stitching with cryptography and steganography techniques to provide more security of data that is to be transmitted over an internet. 3. OVERVIEW OF ALGORITHMS: 1. ADVANCED ENCRYPTION STANDARD (AES) The advanced encryption standard (AES) is a symmetric- key block cipher that was published by the (NIST) National Institute of Standards and Technology in December 2001.[9] AES is a non – Feistel cipher. It encrypts and decrypts 128 bits data blocks. How many rounds will be carried out will depend on the key length i.e. If the key length is 128 bits it has 10 rounds, if the key length is 192 bits there are 12 rounds to carry out. Whereas if the key length is 256 it has bit 14 rounds. [4] AES has three different AES versions: AES-128, AES-192, and AES-256. Every round has sub bytes, shift rows, mix columns and add round key. In the sub bytes, we interpret the byte as two hexadecimal digits. Where the row defines the left digits and the column that defines the right digit. The function of the two hexadecimal digits of the row and column is the new bytes. Shift rows are shifting to the left. In the Mix column step, it is to mix the column matrix. In add round key step it adds the round keyword with every state column matrix 1.1 CIPHER-BLOCK CHAINING (CBC) MODE The CBC mode is as for including XOR to every plaintext block to the cipher text block that was created prior. Keeping the use of same approach where cipher algorithm used for encrypting the result. The first block act as resultant block of cipher text, every following block of plaintext is then XOR with the preceding block of cipher text prior to encryption, the action perform is termed as chaining that comes in cipher block chaining. To keep away from making identical output cipher text blocks from identical plaintext data this mode is being implied for encryption in CBC mode i.e. Cipher block chaining mode which will only be done using one thread. Despite this disadvantage, this could be a really common approach that makes use of block ciphers. CBC mode is used in lots of applications. all through decrypting of a cipher text block, one should add XOR the output data acquired from the decoding(decrypting) algorithms to the preceding cipher text block. due to the receiver is aware of all of the cipher text blocks simply when getting the encrypted message, he's going to decipher the message by the use of numerous threads on the same time. Decryption in the CBC mode works in the opposite order. while decrypting the final block of cipher text, the ensuing data is XOR'd with the preceding block of cipher text to recover the initial plaintext.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 676 2. LEAST SIGNIFICANT BIT LSB steganography is one technique that merge the hidden data inside an image. In a Gray scale image, every pixel is represented in 8 bits. The last bit of the pixel is called as Least Significant bit as its value will affect the pixel value only by “1”. [7] In short LSB technique is used to hide the data in the image. If someone considered the last two bits as a LSB bits it will affect the pixel value only by “3”. This helps in hiding extra data. LSB steganography is a technique where the last bit of any selected image is replaced with a data bit. As this method is vulnerable to steganalysis so as to make it more secure, we first encrypt that data in a raw manner. Before merging the data in the image. While it increases time complexity during encryption process, it provides higher security also. This approach is very simple. In this method, the LSB bits of some or all of the bytes present within an image are replaced with bits of the secrete message. [2] To hide message with in several multimedia carrier data by using one of the basic techniques called LSB approach. LSB embedding may even applied in specific data domains - to give an example, embedding a hidden message into the color values of RGB bitmap data, or inside the frequency coefficients of a JPEG image. We can also applied LSB embedding approach to a variety of data formats and types. Therefore, Nowadays LSB embedding is a primarily important and popular steganography technique. 3. IMAGE SLICING Image slicing is method is simple process of cutting the images into pieces without any changing in dimension or changing any features of the image image is slide into matrix form by increasing size of matrix number of sliced images can be increased 4. IMAGE STITCHING [4] Image stitching is the process which is carried out where the image is stitched without changing any dimension or changing any features of the image it is an opposite of image slicing process 4. PROPOSED SYSTEM 4.1 IMPLEMENTATION Process flow is as follow: Sender side: Step 1: The data which is shared over the internet is unsafe and easy to access. To protect them using key, which will be in the 128-bit format. The key is shared between only sender and receiver to access the confidential data. Step 2: After entering plain text it will get encrypted by using AES algorithm. Advance Encryption Standard
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 677 algorithm is used to encrypt the plain text which is entered by the sender using key. It converts original data to an unreadable format so that stranger or attacker is not able to read or understand the original data. The plain text if hard to read is known as cipher text. Step 3: After converting the data into cipher text It will hide inside cover medium using LSB steganography. [8] The cover medium can be in various form like audio, image, video or text document. The size of the image is depending on the amount of data which is entered by the sender. After done with all process the image called as stego image. Step 4: Image Slicing is simple process of cutting the images into pieces without any changing in dimension or changing any features of the image. Image is slide into matrix form. By increasing size of matrix number of sliced images can be increased. Step 5: Finally, receiver received the data via stego image in slices without any changing in dimension or changing any features of the image. By increasing size of matrix number of sliced images can be increased. Receiver side: Step 1: Receiver received the data via stego image in slices without any changing in dimension or changing any features of the image. Now, the image in slices will get stitched using image stitching process. process where the image is stitched without changing any dimension or changing any features of the image. It is an opposite of Image Slicing process. After this process the entire image is called as stego image. Step 2: We got the image then apply the LSB decoded algorithm. For the algorithm we used the image got after image stitching apply the algorithm then we find the cipher text which is hidden inside the stego image. Step 3: Using this cipher text and 128-bits key which is shared between sender and receiver as input we apply AES decode algorithm to get the original data file. The process of decryption of an AES cipher text is opposite to the AES encryption process. Each round consists of the four processes conducted in the reverse order 1. Add round key, 2. Mix columns, 3. Shift rows, 4. Byte substitution. Step 4: Finally, receiver received the confidential data safely without any anonyms attack. 4.2 SYSTEM DESIGN 5. DESIGN DETAIL 5.1 SENDERS FLOWCHART
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 678 5.2 RECEIVER FLOWCHART 5.3 CLASS DIAGRAM 6. FUTURE SCOPE This idea and approach that we have implemented does not end here. There can be a future scope for development we can extend this particular project into multiple platforms. Particularly, we can incorporate additional algorithm together to make is more appealing. One other scope of improvement in expanding the idea hiding the data into a video format so that the application can be more secure so that different sector can use this to secure the way of communication between the user and themself. As specially, since the sensitive data can be stored without anyone knowing about it. Such that storing sensitive data won’t be a problem it as we add higher level of security. 7. CONCLUSION In this project we have combine different data security technique to share data on an unreliable channel. This Hybrid technique consist of AES Cryptography, LSB Steganography, Image slicing and image stitching process. Using this Hybrid technique, we are able to retrieve the data at receiver end without any Data loss. so, we believe various sector and entity can greatly benefit from our application in the current scenario, also maintaining authenticity and integrity of the entire REFERENCES [1] Wafaa Mustafa Abduallah and Abdul Monem S. Rahma,“A Review on Steganography Techniques”, American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), ISSN (Print) 2313-4410, ISSN (Online) 2313-4402 [2] Rajarathnam Chandramouli and Nasir D. Memon, “Analysis of LSB based image steganography techniques”, 2001 International Conference onVolume: 3, DOI: 10.1109/ICIP.2001.958299 [3] Jyoti T.G.Kankonkar and Prof. Nitesh Naik,“Image Security using Image Encryption and Image Stitching”, Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication [4] Ako Muhammad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data” [5] Ramadhan J. Mstafa and Christian Bach, “Information Hiding in Images Using Steganography Techniques”, Northeast Conference of the American Society for Engineering Education (ASEE)At: Norwich University David Crawford School of Engineering, DOI:10.13140/RG.2.1.1350.9360 [6] Nikhil Patel and Shweta Meena, “LSB based image steganography using dynamic key cryptography”, 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), DOI:10.1109/ETCT.2016.7882955 [7] Arun Kumar Singh, Juhi Singh and Dr. Harsh Vikram Singh, “Steganography in Images Using LSB Technique”, International Journal of Latest Trends in
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 679 Engineering and Technology (IJLTET), ISSN: 2278- 621X [8] Dr. Amarendra K, Venkata Naresh Mandhala, B.Chetan gupta, G.Geetha Sudheshna, V.Venkata Anusha, “Image Steganography Using LSB”, international journal of scientific & technology research volume 8, issue 12, december 2019, issn 2277-8616 [9] M.Pitchaiah, Philemon Daniel and Praveen, “Implementation of Advanced Encryption Standard Algorithm”, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March - 2012,ISSN 2229-5518 [10] M. Pavani1, S. Naganjaneyulu, C. Nagaraju, ”A Survey on LSB Based Steganography Methods” International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 8 August, 2013 Page No. 2464-2467 [11] Akshay Kekunnaya, Rajeshwari Gundla , Siddharth Nanda, “A research Paper for Symmetric and asymmetric cryptography”, ijrece vol. 7 issue 2 (april- june 2019), issn: 2393-9028 (print) | issn: 2348-2281 (online)