SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3555
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL
CRYPTOGRAPHY TECHNIQUE
Prof. H. P. Bhabad*1, Kirtan Patel*2, Pranav Mankar*3, Pradhyum Khairnar*4
*1,2,3,4 Department Of Computer Engineering Sandip Institute Of Engineering And
Management, Nashik, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Digital data, especially when transmitted
through insecure methods/streams, is becoming
increasingly vulnerable in the modern world. In order to
prevent patients' medical data and information from being
manipulated, medical data and information should be kept
confidential. Patients are put at risk when they send
sensitive data via the internet or other means. Our next
thought was to use encryption and decryption techniques to
encrypt and decrypt data, which then could be transmitted
to the receiver. With images, it can encrypt the data and
send it to the receiver.
Key Words: Visual Cryptography, Encryption,
Decryption, AES, LSB, Security.
1. INTRODUCTION
The purpose of steganography is to hide sensitive or
secret information from prying eyes within digital media
in order to maintain security. The information is
converted into an incoherent or scrambled form so that it
cannot be understood by anyone but the intended
recipient, who holds the key to decipher it. Data is
reticulated in a clear media to prevent intruders from
seeing it. Steganography and cryptography are combined
as part of this paper's dual-layer security mechanisms. A
cover image is a picture in which data is hidden, and a
Stego image is a picture that contains encrypted secret
data. Data is hidden largely so that uninvited individuals
cannot discover the existence of the message.
2. LITERATURE SURVEY
1. Implementation and usage of visual cryptography:
By encrypting visual information in some way, visual
cryptography makes it possible to decrypt it without using
a computer, thus enabling visual cryptography to be used
without a computer. Poorly designed systems and
protocols, as well as procedures, do not protect against
cryptography's vulnerabilities. Our paper looked at the
various applications of Visual Cryptography and how they
can be fixed through proper mechanical design and
defensive infrastructure settings. Message digests and
hashing algorithms are used in visual cryptography to
ensure the integrity of data. From research papers and
journals which discuss some of the most significant
applications of visual cryptography, we have gained an
understanding of four different application areas of visual
cryptography in this article.
2. Using a novel approach to hide secret data programs in
files:
A large amount of documentation files is generated as a
result of all software development projects and large-size
programs, regardless of their application. Documentation
is a very important aspect of fall styles for software and
programs. It gives other programmers an idea of what the
program does, how it works, and what it does for them.
Your work is better understood by others and your team
members through documentation. Through this work, we
will study a system for hiding important and confidential
information in software documents and programs with
different layers of security. In this way, the stego file is
undoubtedly capable of being sent anywhere via any
channel. Experimental results indicate that the proposed
method is usable and feasible.
3. Using Random Grids to hide Recursive Data:
This article presents the strategy of recursive data hiding
of secret images by using random grids, which hides the
extra secret data within the shares of the comparatively
larger secret in an exceedingly recursive way. Data
conveyed per bit as a result of the proposed method is
nearly a hundred percent higher and the size of each tiny
share is the same as the size of the original secret image
without requiring any expansion. Compared to large
shares, the shares are much more suitable for further
processing, such as storage and distribution. Visual
Cryptography Scheme (VCS), which breaks a secret image
into shared images after encrypting it using recursive
visual cryptography, may be a perfectly secure method
that allows authenticating images using recursive visual
cryptography. The advantage and uniqueness of VCS is
that they can be decoded without complex computational
methods and hardware. By applying the recursive image
clipping scheme to a recursive VCS (RVCS) Grant decode
aguruparan and Kak reinforced the embedding
information efficiency of the key near hundred percent by
concealing the key images, as explained in the previous
article.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3556
3. METHODOLOGY
1. Advanced Encryption Standard (AES) :
Federal Information Processing Standard (FIPS) 192
defines AES, also known as Advanced Encryption
Standard, as a United States encryption standard. As of
December 31, 2015, AES is the only algorithm for federal
government use approved in the United States. As of
December 31, 2015, AES is the only algorithm for federal
government use approved in the United States. The AES
algorithm is the only one approved for federal government
use as of December 31, 2015. AES uses blocks of 128 bits
of data. Since the same key is used for encryption and
decryption, the only secret needed for security is the key.
Despite its symmetric nature, AES uses the same key to
both encrypt and decrypt data. An AES key can have a
length of 128 bits, 192 bits, or 256 bits. The key length is
specified in the AES standard, and the algorithms are
named based on the key length. It has been a long time
since the Data Encryption Standard (DES) was developed.
New encryption standards such as AES have been
developed in response to the disadvantages of DES. These
parameters are explicitly defined in this standard,
including key lengths (Nk), block sizes (Nb), and round
count (Nr).
Operation of AES :
Multi-linked operations are used to replace inputs with
specific output substitutions and to shuffle bits around
during another operation. Instead of bits, all computations
are carried out using bytes. Matrix processing requires
128 bits arranged in four columns and four rows for a
plaintext block. Comparatively to DES, AES uses more
rounds because of its length.
The schematic structure of AES is given in the following
illustration (Fig. 1).
Fig.1: Operation of AES.
2. Least Significant Bit (LSB) :
Information can be embedded into an image by using LSB
substitution. Steganographic methods also include
masking and filtering. By encoding three bits per pixel in a
24-bit image, the LSB technique enables 24-bit images to
have three bits per pixel. The image's hidden information
can however be destroyed during processing. LSB encodes
three bits into each pixel since each pixel is represented by
three bytes.
Using the least significant bit (LSB) embedding method,
steganography strategies can easily be implemented.
Using this technique, bits of information in each pixel are
replaced with information from the image data.
Steganography embeds the data and transforms it into an
invisible cover that cannot be detected by a casual
observer. By embedding data into an image using least
significant bits, regardless of the bit-plane on which it lies,
data is embedded regardless of the bit-plane on which it
lies.
4. MODELING AND ANALYSIS
There are two ways to secure data transmission:
steganography and cryptography. Both have their own
advantages and techniques, but combining them will
result in a more advanced method. Our method combines
AES and LSB in order to transmit data in a secure manner.
In this method, secret data is encrypted with 256-bit keys,
then hidden in images by LSB using encrypted data. AES is
used to encrypt secret data and LSB is used to hide
encrypted data.
Encryption :
Below is an illustration of the encryption algorithm for the
proposed system (Fig. 2):
1. Put in your secret message.
2. AES should be used with a strong 256-bit key to encrypt
the secret message.
3. Create a byte array from the encrypted message.
4. Upload the cover image.
5. Calculate the resolution of the cover image.
6. Determine each pixel's RGB value.
7. Set the LSB to 0 in every pixel.
8. Get the encrypted message bits and hide them in the
low-order bits of pixels.
9. Repeat steps 8 and 9 until the entire encrypted message
is hidden within the cover image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3557
Fig.2: Encryption
Decryption :
Below is an illustration of the decryption algorithm for the
proposed system (Fig. 3):
1. Put the stego image in.
2. Determine the pixel value of the stego image.
3. Count all the consecutive zeros in the image until one
finds the 8th consecutive zero.
4. To create a byte array, get the LSB from each pixel.
5. By using a 256-bit key and AES encryption, decrypt the
byte array.
Fig.3: Decryption
5. RESULTS AND DISCUSSION
Data is highly hidden by the proposed method, and a high
level of security is provided. The implementation was
done
in Java. Each image is chosen at random. An experiment
was conducted using a variety of images. We then add a
cover image to the secret message and the encrypted
image based on LSB. A higher resolution should be used
for the cover images than for the secret images.
6. CONCLUSION
Personal data, and sensitive data in general, should not be
transferred in the hands of third-parties, where they are
susceptible to attacks and misuse. Instead, users should
own and control their data without compromising security
or limiting companies and authorities ability to provide
personalized services. Through our system, we combine a
method of encryption and decryption in order to provide a
more secure process than before. Even sending over the
internet will be secure. This is because no one will ever be
aware that what you shared was a secret message buried
under the image file.
7. FUTURE SCOPE
1. It is certain that this application will improve security
while sharing data between different systems, such as
medical, security, and many others.
2. Furthermore, we can work on different file formats and
make it more extensible to other extensions.
3. In fact, we can actually design an application to share
media as a more advanced version of this application with
the aid of recent technology.
ACKNOWLEDGEMENT
Our college, the Sandip Institute of Engineering and
Management, reviewed our proposal and supported us
throughout the data collection process. Thank you for your
prompt support and guidance in answering our questions,
which you provided with your years of experience in this
industry. Dr. K. C. Nalavade (HOD) of the Computer
Engineering Department, along with Prof. H. P. Bhabad,
are our project guides. We found them to be a ray of hope
on our journey.
In appreciation of the valuable input and advice you
provided us throughout the development of this project,
we would like to thank all our faculty members. Their
contributions are so significant in so many ways that it is
difficult to recognize them individually.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3558
REFERENCES
[1] Shyamalendu Kandar, Arnab Maiti and Bibhas Chandra
Dhara, Visual Cryptography Scheme for Color Image Using
Random Number with Enveloping by Digital
Watermarking, IJCSI International Journal of Computer
Science Issues, vol.8, issue 3, no.1, May 2011.
[2] Som S., Banerjee Mandira, (2013) Cryptographic
Technique Using Substitution Through Circular Path
Followed By Genetic Function, International Journal of
Computer Applications (IJCA), ISSN: 0975 8887, Impact
Factor: 2.0973, ISBN: 97393- 80873-34-0
CCSN2012/Number 4, March 2013.
[3] Ibrahim F. Elashry, Osama S. Faragallah, Alaa M. Abbas,
S. ElRabaieFathi E. Abd El-Samie, A New Method for
Encrypting Images with Few Details Using Rijndael and
RC6 Block Ciphers in the Electronic Code Book Mode,
Information Security Journal: A Global Perspective, 21:4,
193-205, 5 June 2012.
[4] Sachin Kumar and R. K. Sharma, Recursive Information
Hiding of Secrets by Random Grids, Cryptologia, 37:2, 154-
161, 1 April 2013.
[5] Hsien-Chu Wu, Hao-Cheng Wang and Rui-Wen Yu,
(2008), ”Color Visual Cryptography Scheme Using
Meaningful Shares,” in Intelligent Systems Design and
Applications, 2008. ISDA ’08. Eighth International
Conference, vol.3, pp.173-178, 26-28 Nov. 2008.
[6] Rajesh Kumar Tiwari G. Sahoo, A Novel Methodology
for Data Hiding in PDF Files, Information Security Journal:
A Global Perspective, 20:1, 45-57, 7 July 2013.
[7] Ching-Nung Yang Tse-Shih Chen,Security Analysis of
Authentication of Images Using Recursive Visual
Cryptography, Cryptologia, 32:2, 131-136, 19 May 2014.
[8] Amit Phadikar Santi P. Maity, On Security of
Compressed Gray Scale Image Using Joint Encryption and
Data Hiding, Information Security Journal: A Global
Perspective, 20:6, 274289, 11 Nov. 2011.
[9] Nuh Aydin, Enhancing Undergraduate Mathematics
Curriculum Via Coding Theory and Cryptography, PRIMUS,
19:3, 296309, 29 April 2013.
[10] Kirtan Patel, Pradhyum Khairnar and Pranav Mankar,
Activity Spotter During Medical Treatment Using Visual
Cryptography Technique, International Research Journal
of Modernization in Engineering Technology and Science
(IRJMETS), ISSN: 2582-5208, Volume:
04/Issue:01/January-2022.

More Related Content

Similar to ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE

IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an  encryption using LSB repl...Advanced technique for video steganography with an  encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web applicationAlexander Decker
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
IRJET Journal
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 

Similar to ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE (20)

IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an  encryption using LSB repl...Advanced technique for video steganography with an  encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 
It3116411644
It3116411644It3116411644
It3116411644
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3555 ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE Prof. H. P. Bhabad*1, Kirtan Patel*2, Pranav Mankar*3, Pradhyum Khairnar*4 *1,2,3,4 Department Of Computer Engineering Sandip Institute Of Engineering And Management, Nashik, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Digital data, especially when transmitted through insecure methods/streams, is becoming increasingly vulnerable in the modern world. In order to prevent patients' medical data and information from being manipulated, medical data and information should be kept confidential. Patients are put at risk when they send sensitive data via the internet or other means. Our next thought was to use encryption and decryption techniques to encrypt and decrypt data, which then could be transmitted to the receiver. With images, it can encrypt the data and send it to the receiver. Key Words: Visual Cryptography, Encryption, Decryption, AES, LSB, Security. 1. INTRODUCTION The purpose of steganography is to hide sensitive or secret information from prying eyes within digital media in order to maintain security. The information is converted into an incoherent or scrambled form so that it cannot be understood by anyone but the intended recipient, who holds the key to decipher it. Data is reticulated in a clear media to prevent intruders from seeing it. Steganography and cryptography are combined as part of this paper's dual-layer security mechanisms. A cover image is a picture in which data is hidden, and a Stego image is a picture that contains encrypted secret data. Data is hidden largely so that uninvited individuals cannot discover the existence of the message. 2. LITERATURE SURVEY 1. Implementation and usage of visual cryptography: By encrypting visual information in some way, visual cryptography makes it possible to decrypt it without using a computer, thus enabling visual cryptography to be used without a computer. Poorly designed systems and protocols, as well as procedures, do not protect against cryptography's vulnerabilities. Our paper looked at the various applications of Visual Cryptography and how they can be fixed through proper mechanical design and defensive infrastructure settings. Message digests and hashing algorithms are used in visual cryptography to ensure the integrity of data. From research papers and journals which discuss some of the most significant applications of visual cryptography, we have gained an understanding of four different application areas of visual cryptography in this article. 2. Using a novel approach to hide secret data programs in files: A large amount of documentation files is generated as a result of all software development projects and large-size programs, regardless of their application. Documentation is a very important aspect of fall styles for software and programs. It gives other programmers an idea of what the program does, how it works, and what it does for them. Your work is better understood by others and your team members through documentation. Through this work, we will study a system for hiding important and confidential information in software documents and programs with different layers of security. In this way, the stego file is undoubtedly capable of being sent anywhere via any channel. Experimental results indicate that the proposed method is usable and feasible. 3. Using Random Grids to hide Recursive Data: This article presents the strategy of recursive data hiding of secret images by using random grids, which hides the extra secret data within the shares of the comparatively larger secret in an exceedingly recursive way. Data conveyed per bit as a result of the proposed method is nearly a hundred percent higher and the size of each tiny share is the same as the size of the original secret image without requiring any expansion. Compared to large shares, the shares are much more suitable for further processing, such as storage and distribution. Visual Cryptography Scheme (VCS), which breaks a secret image into shared images after encrypting it using recursive visual cryptography, may be a perfectly secure method that allows authenticating images using recursive visual cryptography. The advantage and uniqueness of VCS is that they can be decoded without complex computational methods and hardware. By applying the recursive image clipping scheme to a recursive VCS (RVCS) Grant decode aguruparan and Kak reinforced the embedding information efficiency of the key near hundred percent by concealing the key images, as explained in the previous article.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3556 3. METHODOLOGY 1. Advanced Encryption Standard (AES) : Federal Information Processing Standard (FIPS) 192 defines AES, also known as Advanced Encryption Standard, as a United States encryption standard. As of December 31, 2015, AES is the only algorithm for federal government use approved in the United States. As of December 31, 2015, AES is the only algorithm for federal government use approved in the United States. The AES algorithm is the only one approved for federal government use as of December 31, 2015. AES uses blocks of 128 bits of data. Since the same key is used for encryption and decryption, the only secret needed for security is the key. Despite its symmetric nature, AES uses the same key to both encrypt and decrypt data. An AES key can have a length of 128 bits, 192 bits, or 256 bits. The key length is specified in the AES standard, and the algorithms are named based on the key length. It has been a long time since the Data Encryption Standard (DES) was developed. New encryption standards such as AES have been developed in response to the disadvantages of DES. These parameters are explicitly defined in this standard, including key lengths (Nk), block sizes (Nb), and round count (Nr). Operation of AES : Multi-linked operations are used to replace inputs with specific output substitutions and to shuffle bits around during another operation. Instead of bits, all computations are carried out using bytes. Matrix processing requires 128 bits arranged in four columns and four rows for a plaintext block. Comparatively to DES, AES uses more rounds because of its length. The schematic structure of AES is given in the following illustration (Fig. 1). Fig.1: Operation of AES. 2. Least Significant Bit (LSB) : Information can be embedded into an image by using LSB substitution. Steganographic methods also include masking and filtering. By encoding three bits per pixel in a 24-bit image, the LSB technique enables 24-bit images to have three bits per pixel. The image's hidden information can however be destroyed during processing. LSB encodes three bits into each pixel since each pixel is represented by three bytes. Using the least significant bit (LSB) embedding method, steganography strategies can easily be implemented. Using this technique, bits of information in each pixel are replaced with information from the image data. Steganography embeds the data and transforms it into an invisible cover that cannot be detected by a casual observer. By embedding data into an image using least significant bits, regardless of the bit-plane on which it lies, data is embedded regardless of the bit-plane on which it lies. 4. MODELING AND ANALYSIS There are two ways to secure data transmission: steganography and cryptography. Both have their own advantages and techniques, but combining them will result in a more advanced method. Our method combines AES and LSB in order to transmit data in a secure manner. In this method, secret data is encrypted with 256-bit keys, then hidden in images by LSB using encrypted data. AES is used to encrypt secret data and LSB is used to hide encrypted data. Encryption : Below is an illustration of the encryption algorithm for the proposed system (Fig. 2): 1. Put in your secret message. 2. AES should be used with a strong 256-bit key to encrypt the secret message. 3. Create a byte array from the encrypted message. 4. Upload the cover image. 5. Calculate the resolution of the cover image. 6. Determine each pixel's RGB value. 7. Set the LSB to 0 in every pixel. 8. Get the encrypted message bits and hide them in the low-order bits of pixels. 9. Repeat steps 8 and 9 until the entire encrypted message is hidden within the cover image.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3557 Fig.2: Encryption Decryption : Below is an illustration of the decryption algorithm for the proposed system (Fig. 3): 1. Put the stego image in. 2. Determine the pixel value of the stego image. 3. Count all the consecutive zeros in the image until one finds the 8th consecutive zero. 4. To create a byte array, get the LSB from each pixel. 5. By using a 256-bit key and AES encryption, decrypt the byte array. Fig.3: Decryption 5. RESULTS AND DISCUSSION Data is highly hidden by the proposed method, and a high level of security is provided. The implementation was done in Java. Each image is chosen at random. An experiment was conducted using a variety of images. We then add a cover image to the secret message and the encrypted image based on LSB. A higher resolution should be used for the cover images than for the secret images. 6. CONCLUSION Personal data, and sensitive data in general, should not be transferred in the hands of third-parties, where they are susceptible to attacks and misuse. Instead, users should own and control their data without compromising security or limiting companies and authorities ability to provide personalized services. Through our system, we combine a method of encryption and decryption in order to provide a more secure process than before. Even sending over the internet will be secure. This is because no one will ever be aware that what you shared was a secret message buried under the image file. 7. FUTURE SCOPE 1. It is certain that this application will improve security while sharing data between different systems, such as medical, security, and many others. 2. Furthermore, we can work on different file formats and make it more extensible to other extensions. 3. In fact, we can actually design an application to share media as a more advanced version of this application with the aid of recent technology. ACKNOWLEDGEMENT Our college, the Sandip Institute of Engineering and Management, reviewed our proposal and supported us throughout the data collection process. Thank you for your prompt support and guidance in answering our questions, which you provided with your years of experience in this industry. Dr. K. C. Nalavade (HOD) of the Computer Engineering Department, along with Prof. H. P. Bhabad, are our project guides. We found them to be a ray of hope on our journey. In appreciation of the valuable input and advice you provided us throughout the development of this project, we would like to thank all our faculty members. Their contributions are so significant in so many ways that it is difficult to recognize them individually.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3558 REFERENCES [1] Shyamalendu Kandar, Arnab Maiti and Bibhas Chandra Dhara, Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking, IJCSI International Journal of Computer Science Issues, vol.8, issue 3, no.1, May 2011. [2] Som S., Banerjee Mandira, (2013) Cryptographic Technique Using Substitution Through Circular Path Followed By Genetic Function, International Journal of Computer Applications (IJCA), ISSN: 0975 8887, Impact Factor: 2.0973, ISBN: 97393- 80873-34-0 CCSN2012/Number 4, March 2013. [3] Ibrahim F. Elashry, Osama S. Faragallah, Alaa M. Abbas, S. ElRabaieFathi E. Abd El-Samie, A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode, Information Security Journal: A Global Perspective, 21:4, 193-205, 5 June 2012. [4] Sachin Kumar and R. K. Sharma, Recursive Information Hiding of Secrets by Random Grids, Cryptologia, 37:2, 154- 161, 1 April 2013. [5] Hsien-Chu Wu, Hao-Cheng Wang and Rui-Wen Yu, (2008), ”Color Visual Cryptography Scheme Using Meaningful Shares,” in Intelligent Systems Design and Applications, 2008. ISDA ’08. Eighth International Conference, vol.3, pp.173-178, 26-28 Nov. 2008. [6] Rajesh Kumar Tiwari G. Sahoo, A Novel Methodology for Data Hiding in PDF Files, Information Security Journal: A Global Perspective, 20:1, 45-57, 7 July 2013. [7] Ching-Nung Yang Tse-Shih Chen,Security Analysis of Authentication of Images Using Recursive Visual Cryptography, Cryptologia, 32:2, 131-136, 19 May 2014. [8] Amit Phadikar Santi P. Maity, On Security of Compressed Gray Scale Image Using Joint Encryption and Data Hiding, Information Security Journal: A Global Perspective, 20:6, 274289, 11 Nov. 2011. [9] Nuh Aydin, Enhancing Undergraduate Mathematics Curriculum Via Coding Theory and Cryptography, PRIMUS, 19:3, 296309, 29 April 2013. [10] Kirtan Patel, Pradhyum Khairnar and Pranav Mankar, Activity Spotter During Medical Treatment Using Visual Cryptography Technique, International Research Journal of Modernization in Engineering Technology and Science (IRJMETS), ISSN: 2582-5208, Volume: 04/Issue:01/January-2022.