SlideShare una empresa de Scribd logo
1 de 12
IMPLEMENTATION OF BPCS-STEGANOGRAPHY

(SYNOPSIS)
ABSTRACT
IMPLEMENTATION OF BPCS-STEGANOGRAPHY

Steganography is a technique to hide secret information in some
other data (we call it a vessel) without leaving any apparent evidence
of data alteration. All of the traditional steganographic techniques have
limited information-hiding capacity. They can hide only 10% (or less)
of the data amounts of the vessel. This is because the principle of
those techniques was either to replace a special part of the frequency
components of the vessel image, or to replace all the least significant
bits of a multivalued image with the secret information. Our new
Steganography uses an image as the vessel data, and we embed
secret information in the bit-planes of the vessel.
This technique makes use of the characteristics of the human vision
system whereby a human cannot perceive any shape information in a
very complicated binary pattern. We can replace all of the “noise-like”
regions in the bit-planes of the vessel image with secret data without
deteriorating the image quality. We termed our Steganography “BPCSSteganography,” which stands for Bit-Plane Complexity Segmentation
Steganography.
INTRODUCTION
INTRODUCTION TO THE AREA
Internet communication has become an integral part of the
Infrastructure of today’s world. The information communicated comes
in numerous forms and is used in many applications. In a large
number of these applications, it is desired that the communication be
done in secrete. Such secret communication ranges from the obvious
cases of bank transfers, corporate communications, and credit card
purchases, on down to a large percentage o

f everyday email. With

email, many people wrongly assume that their communication is safe
because it is just a small piece of an enormous amount of data being
sent worldwide. After all, who is going to see it? But in reality, the
Internet is not a secure medium, and there are programs “out there”
which just sit and watch messages go by for interesting information.
Encryption provides an obvious approach to information security,
and encryption programs are readily available. However, encryption
clearly marks a message as containing “interesting” information, and
the encrypted message becomes subject to attack. Furthermore, in
many cases it is desirable to send information without anyone even
noticing that information has been sent secret information.
Some of them use the least significant bits of the image data to
hide the data. Other programs embed the secret information in a
Steganography presents another approach to information security. In
steganography, data is hidden inside a vessel or container that looks
like it contains only something else. A variety of vessels are possible,
such as digital images, sound clips, and even executable files.
In recent years, several steganographic programs have been
posted on Internet home pages. Most of them use image data for the
container of the specific band of the spatial frequency component of
the carrier Some other programs make use of the sampling error in
image digitization. However, all those steganographic techniques are
limited in terms of information hiding capacity. They can embed only
5-15 % of the vessel image at the best. Therefore, current
steganography is more oriented to water marking of computer data
than to secret person-person communication applications. We have
invented a new technique to hide secret information in a color image.
This is not based on a programming technique, but is based on the
property of human vision system. Its information hiding capacity can
be as large as 50% of the original image data. This could open new
Applications for steganography leading to a more secure Internet
Communication age.
Digital images are categorized as either binary (black-andwhite) or multi-valued pictures despite their actual color. We can
decompose an n-bit image into a set of n binary images by bit-slicing
operations [1][2]. Therefore, binary image analysis is essential to all
digital image processing. Bit slicing is not necessarily the best in the
Pure-Binary Coding system (PBC), but in some cases the Canonical
Gray Coding system (CGC) is much better [3].
TECHNOLOGIES
This project has been developed to work all in SUN platforms for
the client side and it needs APPLET as the server side platform. We
have used JAVA coding AWT and Swing components and we have
implemented these components in JAVA. The windows API calls are
mainly used in all objects to get required systems files.

SECURITY CONSIDERATIONS
THE RSA ALGORITHM
INTRODUCTION:
The RSA scheme is a block cipher in which the plaintext
and cipher text are integers between 0 and n-1 for some n.A typical
size for n is 1024 bits or 309 decimal digits. The RSA scheme has since
that time reigned supreme as the most widely accepted and
implemented general purpose to public key encryption.
DESCRIPTION:
The scheme developed by Rivest, Shamir and
Adleman makes use of an expression with exponentials. Plaintext is
encrypted in blocks, with each block having a binary value less than
some number n.That is, the block size must be less than or equal to
log2(n) ; in practice, the block size is k bits, where 2 k <

n < 2k+1

.Encryption and decryption are of the following form, for some
plaintext block M and cipher text block C:
C = Me mod n
M = Cd mod n = (Me)

d

mod n = Med mod n
Both sender and receiver must know the value of n.The sender knows
the value of e and only the receiver knows the value of d.Thus, this is
a public key encryption algorithm with a public key of KU = {d,n}.
For this algorithm to be satisfactory for public key encryption, the
following requirements to be met :
1. It is possible to find the values of e, d, n such that M ed = M mod n
for all M < n.
2. It is relatively easy to calculate Me and Cd for all values of M < n.
3. It is infeasible to determine d given e and n.
For now,we focus on the first requirement and consider
the other questions later.We need to find a relationship of the form
Med = M mod n
Given two prime numbers and q, and two integers and
m, such that n=pq and 0<m<n, and arbitrary integer k, the following
relationships holds:
Mkφ (n)+1 = mk(p-1)(q-1)+1 = m mod n
Where φ(n) is the euler’s totient function, which is the
number of positive integers less than n and relatively prime to n. it is
shown that for p,q prime,
φ(p,q)=(p-1)(q-1). Thus we can achieve the desired relationship if
ed = kφ(n)+1
This is equivalent to saying:
ed = 1 mod φ(n)
d = e-1 mod φ(n)
That is, e and d are multiplicative inverses mod φ (n). Note that,
according to the rules of modular arithmetic, this is true only if d (and
therefore e) is relatively prime to φ (n). Equivalently, gcd (φ(n),d) =
1.
We are now ready to state the rsa scheme.the ingredients are
the following:
P, q, two prime numbers

(private,

chosen)
n = pq

(public,

calculated)
e, with gcd(φ(n),e) = 1; 1< e < φ(n)

(public,

chosen)
d = e-1mod φ(n)

(private,

calculated)

The private key consist of {d,n} and the public key consists of
{e,n}.suppose that user a has published its public key and that user b
wishes to send the message M to A. then b calculates C = M e (mod n)
and transmits C. on receipt of this cipher text, user a decrypts by
calculating M = Cd (mod n).
It is worthwhile to summarize the justification for this
algorithm. We have chosen e and d such that
d = e-1 mod ø (n)
Therefore,
Ed = 1 mod ø (n)
Therefore,ed is of the form kø(n)+1
So M

ed

= mod n .Now
C = Me mod n
M = Cd mod n = (Me)d mod n = M mod n

The keys were generated as follows:
1. Select two prime numbers p and q
2. Calculate n = pq
3. Calculate ø (n) = (p-1) (q-1)
4. Select e such that e is relatively prime to ø (n) and less than ø(n)
5. Determine d such that de = 1 mod ø (n)
KEY GENERATION
Before the application of the public key cryptosystem, each
participant must generate a pair of keys. This involves the following
tasks:
1. Determining two prime numbers, p and q
2. Selecting either e or d and calculating the other
The procedure for picking a prime number is as follows:
1. Pick an odd integer n at random
2. Pick an integer a < n at random
3. Perform the probabilistic primarily test, such as Miller Rabin. If n
fails the test, reject the value n and go to step 1.
4. If n has passed a sufficient number of tests, accept n; otherwise, go
to step

THE SECURITY OF RSA
Three possible approaches to attacking the RSA algorithm are as
follows :
1. Brute force: This involves trying all possible private keys.
2. Mathematical attacks: There are several approaches, all equivalent
in effect to factoring the product of two primes
3. Timing attacks: These depend on the running time of the decryption
algorithm.

SYSTEM STUDY
EXISTING WORK
•Information send through any network have a chance

to

attack by hackers
•Encryption

provides

an

obvious

approach

to

information

security, and encryption programs are readily available. However,
encryption clearly marks a message as containing “interesting”
information, and the encrypted message becomes subject to attack.
Furthermore, in many cases it is desirable to send information without
anyone

even

information.

noticing

that

information

has

been

sent

secret
OBJECTIVE OF THE PROPOSED SYSTEM
The main objective of this system is we never leave any
information about something will be hided in that vessel.

PROPOSED SYSTEM
•In Steganography, data is hidden inside a vessel or container
that looks like it contains only something else. A variety of vessels are
possible, such as digital images, sound clips, and even executable
files.
•All of the traditional steganographic techniques have limited
information-hiding capacity. They can hide only 10% (or less) of the
data amounts of the vessel.
•This Technique uses an image as the vessel data, and we embed
secret information in the bit-planes of the vessel.
•We can replace all of the “noise-like” regions in the bit-planes
of the vessel image with secret data without deteriorating the image
quality
•We termed our Steganography “BPCS-Steganography,” which
stands for Bit-Plane Complexity Segmentation Steganography
PROPOSED SYSTEM MODULES
 Hider
File Segmentation (8 X 8)
Noise Level Identifier
Complexity Identifier
Gray Converter
Noisy level Revalidator
Secret File Segmentor
Text & Image bits replacer
Image Reproducer
 Retriever
Image Scanner
Image Segmentor (8 x 8)
Complex Plan Identifier
Information Retriever
Process State Identifier
JUSTIFICATION
•In Encryption, Message can be hacked, because some one can
easily detect the encrypted file.
•This technique makes use of the characteristics of the human
vision

system

whereby

a

human

cannot

information in a very complicated binary pattern.

perceive

any

shape
REQUIREMENTS ANALYSIS AND SPECIFICATION
HARDWARE REQUIREMENTS

Processor

:

Pentium Celeron

Processor Speed

:

850 MHZ

Memory Size

:

128MB

Hard Disk Drive

:

40GB

SOFTWARE REQUIREMENTS
Operating System
Front End

: Windows 98/2000/NT
:

JAVA 1.5.0

Más contenido relacionado

La actualidad más candente

Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabMuhammad Saif Ul Islam
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...TELKOMNIKA JOURNAL
 

La actualidad más candente (19)

Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptography
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual...
 

Similar a Implementation of bpsc stegnography ( synopsis)

Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policySM NAZMUS SALEHIN
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...atanuanwesha
 

Similar a Implementation of bpsc stegnography ( synopsis) (20)

Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
F010243136
F010243136F010243136
F010243136
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
D017433134
D017433134D017433134
D017433134
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Rsa
RsaRsa
Rsa
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto System
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...
 

Más de Mumbai Academisc

Más de Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Web based development
Web based developmentWeb based development
Web based development
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Engineering
EngineeringEngineering
Engineering
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Implementation of bpsc stegnography ( synopsis)

  • 2. ABSTRACT IMPLEMENTATION OF BPCS-STEGANOGRAPHY Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information-hiding capacity. They can hide only 10% (or less) of the data amounts of the vessel. This is because the principle of those techniques was either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits of a multivalued image with the secret information. Our new Steganography uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality. We termed our Steganography “BPCSSteganography,” which stands for Bit-Plane Complexity Segmentation Steganography.
  • 3. INTRODUCTION INTRODUCTION TO THE AREA Internet communication has become an integral part of the Infrastructure of today’s world. The information communicated comes in numerous forms and is used in many applications. In a large number of these applications, it is desired that the communication be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases, on down to a large percentage o f everyday email. With email, many people wrongly assume that their communication is safe because it is just a small piece of an enormous amount of data being sent worldwide. After all, who is going to see it? But in reality, the Internet is not a secure medium, and there are programs “out there” which just sit and watch messages go by for interesting information. Encryption provides an obvious approach to information security, and encryption programs are readily available. However, encryption clearly marks a message as containing “interesting” information, and the encrypted message becomes subject to attack. Furthermore, in many cases it is desirable to send information without anyone even noticing that information has been sent secret information. Some of them use the least significant bits of the image data to hide the data. Other programs embed the secret information in a Steganography presents another approach to information security. In
  • 4. steganography, data is hidden inside a vessel or container that looks like it contains only something else. A variety of vessels are possible, such as digital images, sound clips, and even executable files. In recent years, several steganographic programs have been posted on Internet home pages. Most of them use image data for the container of the specific band of the spatial frequency component of the carrier Some other programs make use of the sampling error in image digitization. However, all those steganographic techniques are limited in terms of information hiding capacity. They can embed only 5-15 % of the vessel image at the best. Therefore, current steganography is more oriented to water marking of computer data than to secret person-person communication applications. We have invented a new technique to hide secret information in a color image. This is not based on a programming technique, but is based on the property of human vision system. Its information hiding capacity can be as large as 50% of the original image data. This could open new Applications for steganography leading to a more secure Internet Communication age. Digital images are categorized as either binary (black-andwhite) or multi-valued pictures despite their actual color. We can decompose an n-bit image into a set of n binary images by bit-slicing operations [1][2]. Therefore, binary image analysis is essential to all digital image processing. Bit slicing is not necessarily the best in the Pure-Binary Coding system (PBC), but in some cases the Canonical Gray Coding system (CGC) is much better [3].
  • 5. TECHNOLOGIES This project has been developed to work all in SUN platforms for the client side and it needs APPLET as the server side platform. We have used JAVA coding AWT and Swing components and we have implemented these components in JAVA. The windows API calls are mainly used in all objects to get required systems files. SECURITY CONSIDERATIONS THE RSA ALGORITHM INTRODUCTION: The RSA scheme is a block cipher in which the plaintext and cipher text are integers between 0 and n-1 for some n.A typical size for n is 1024 bits or 309 decimal digits. The RSA scheme has since that time reigned supreme as the most widely accepted and implemented general purpose to public key encryption. DESCRIPTION: The scheme developed by Rivest, Shamir and Adleman makes use of an expression with exponentials. Plaintext is encrypted in blocks, with each block having a binary value less than some number n.That is, the block size must be less than or equal to log2(n) ; in practice, the block size is k bits, where 2 k < n < 2k+1 .Encryption and decryption are of the following form, for some plaintext block M and cipher text block C: C = Me mod n M = Cd mod n = (Me) d mod n = Med mod n
  • 6. Both sender and receiver must know the value of n.The sender knows the value of e and only the receiver knows the value of d.Thus, this is a public key encryption algorithm with a public key of KU = {d,n}. For this algorithm to be satisfactory for public key encryption, the following requirements to be met : 1. It is possible to find the values of e, d, n such that M ed = M mod n for all M < n. 2. It is relatively easy to calculate Me and Cd for all values of M < n. 3. It is infeasible to determine d given e and n. For now,we focus on the first requirement and consider the other questions later.We need to find a relationship of the form Med = M mod n Given two prime numbers and q, and two integers and m, such that n=pq and 0<m<n, and arbitrary integer k, the following relationships holds: Mkφ (n)+1 = mk(p-1)(q-1)+1 = m mod n Where φ(n) is the euler’s totient function, which is the number of positive integers less than n and relatively prime to n. it is shown that for p,q prime, φ(p,q)=(p-1)(q-1). Thus we can achieve the desired relationship if ed = kφ(n)+1 This is equivalent to saying:
  • 7. ed = 1 mod φ(n) d = e-1 mod φ(n) That is, e and d are multiplicative inverses mod φ (n). Note that, according to the rules of modular arithmetic, this is true only if d (and therefore e) is relatively prime to φ (n). Equivalently, gcd (φ(n),d) = 1. We are now ready to state the rsa scheme.the ingredients are the following: P, q, two prime numbers (private, chosen) n = pq (public, calculated) e, with gcd(φ(n),e) = 1; 1< e < φ(n) (public, chosen) d = e-1mod φ(n) (private, calculated) The private key consist of {d,n} and the public key consists of {e,n}.suppose that user a has published its public key and that user b wishes to send the message M to A. then b calculates C = M e (mod n) and transmits C. on receipt of this cipher text, user a decrypts by calculating M = Cd (mod n). It is worthwhile to summarize the justification for this algorithm. We have chosen e and d such that d = e-1 mod ø (n)
  • 8. Therefore, Ed = 1 mod ø (n) Therefore,ed is of the form kø(n)+1 So M ed = mod n .Now C = Me mod n M = Cd mod n = (Me)d mod n = M mod n The keys were generated as follows: 1. Select two prime numbers p and q 2. Calculate n = pq 3. Calculate ø (n) = (p-1) (q-1) 4. Select e such that e is relatively prime to ø (n) and less than ø(n) 5. Determine d such that de = 1 mod ø (n) KEY GENERATION Before the application of the public key cryptosystem, each participant must generate a pair of keys. This involves the following tasks: 1. Determining two prime numbers, p and q 2. Selecting either e or d and calculating the other The procedure for picking a prime number is as follows: 1. Pick an odd integer n at random 2. Pick an integer a < n at random 3. Perform the probabilistic primarily test, such as Miller Rabin. If n fails the test, reject the value n and go to step 1.
  • 9. 4. If n has passed a sufficient number of tests, accept n; otherwise, go to step THE SECURITY OF RSA Three possible approaches to attacking the RSA algorithm are as follows : 1. Brute force: This involves trying all possible private keys. 2. Mathematical attacks: There are several approaches, all equivalent in effect to factoring the product of two primes 3. Timing attacks: These depend on the running time of the decryption algorithm. SYSTEM STUDY EXISTING WORK •Information send through any network have a chance to attack by hackers •Encryption provides an obvious approach to information security, and encryption programs are readily available. However, encryption clearly marks a message as containing “interesting” information, and the encrypted message becomes subject to attack. Furthermore, in many cases it is desirable to send information without anyone even information. noticing that information has been sent secret
  • 10. OBJECTIVE OF THE PROPOSED SYSTEM The main objective of this system is we never leave any information about something will be hided in that vessel. PROPOSED SYSTEM •In Steganography, data is hidden inside a vessel or container that looks like it contains only something else. A variety of vessels are possible, such as digital images, sound clips, and even executable files. •All of the traditional steganographic techniques have limited information-hiding capacity. They can hide only 10% (or less) of the data amounts of the vessel. •This Technique uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. •We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality •We termed our Steganography “BPCS-Steganography,” which stands for Bit-Plane Complexity Segmentation Steganography
  • 11. PROPOSED SYSTEM MODULES  Hider File Segmentation (8 X 8) Noise Level Identifier Complexity Identifier Gray Converter Noisy level Revalidator Secret File Segmentor Text & Image bits replacer Image Reproducer  Retriever Image Scanner Image Segmentor (8 x 8) Complex Plan Identifier Information Retriever Process State Identifier JUSTIFICATION •In Encryption, Message can be hacked, because some one can easily detect the encrypted file. •This technique makes use of the characteristics of the human vision system whereby a human cannot information in a very complicated binary pattern. perceive any shape
  • 12. REQUIREMENTS ANALYSIS AND SPECIFICATION HARDWARE REQUIREMENTS Processor : Pentium Celeron Processor Speed : 850 MHZ Memory Size : 128MB Hard Disk Drive : 40GB SOFTWARE REQUIREMENTS Operating System Front End : Windows 98/2000/NT : JAVA 1.5.0