Atm MINI PROJECT EDITED
Atm MINI PROJECT EDITED
Chapter 1
INTRODUCTION
1.1 INTRODUCTION
Digital communication witnesses a noticeable and continuous development in
many applications in the Internet. Hence, secure communication sessions must
be provided. The security of data transmitted across a global network has
turned into a key factor on the network performance measures. So, the
confidentiality and the integrity of data are needed to prevent eavesdroppers
from accessing and using transmitted data. Steganography and Cryptography
are two important techniques that are used to provide network security. The aim
of this project is to develop a new approach to hiding a secret information in an
image, by taking advantage of benefits of combining cryptography and
steganography.
1.1.1 Cryptography
The technique of Secret key encryption can also be known as the symmetric-
key, shared key, single-key, and eventually private-key encryption. The
technique of private key uses for all sides encryption and decryption of secret
data. The original information or plaintext is encrypted with a key by the sender
side also the similarly key is used by the receiver to decrypt a message to obtain
the plaintext. the key will be known only by a people who are authorized to the
encryption/decryption. However, the technique affords the good security for
transmission but there is a difficulty with the distribution of the key. If one stole
or explore the key he can get whole data without any difficulty. An example of
Symmetric-Key is DES Algorithm.
when we use the private key, there are no possibilities to obtain the data or
simply discover the other key. The key used for encryption is stored public
therefore it’s called public key, and the decryption key is stored secret and
called private key. An example of Asymmetric-Key Algorithm is RSA.
A. Text Files
The technique of embedding secret data inside a text is identified as
text stego. Text cryptography needs a low memory because this type
of file can only store text files. It affords fast transfer or
communication of files from a sender to receiver.
B. Image Files
It is the procedure in which we embed the information inside the
pixels of image. So, that the attackers cannot observe any change in
the cover image. LSB approach is a common image cryptography
algorithm.
C. Audio Files
The type of operation used for transforming plain text to cipher text:
1.2 History
The word cryptography traces back to the Greek roots kryptos, meaning
"hidden," and graphein, meaning "to write".The first known evidence of
cryptography can be traced to the use of 'hieroglyph'. Some 4000 years ago, the
Egyptians used to communicate by messages written in hieroglyphs. In
Cryptography the techniques which are use to protect information are obtained
from mathematical concepts and a set of rule based calculations known as
algorithms to convert messages in ways that make it hard to decode it. These
algorithms are used for cryptographic key generation, digital signing,
verification to protect data privacy, web browsing on internet and to protect
confidential transactions such as credit card and debit card transactions. 8
Earlier cryptography was effectively synonymous with encryption but
nowadays cryptography is mainly based on mathematical theory and computer
science practice. Cryptography is used in many applications like banking
transactions cards, computer passwords, and e- commerce transactions,
The purpose of this project is to provide the correct data with security to the
users. For some of the users the data might be lost during the transmission
process in the network and for some, the data might be changed by the
unauthorized person in the network and there are some other security problems
in the network. Our application will give you more Security to the data present
in the network and there will be able to reduce the loss of data in the network
which will be transmitted from the sender to the receiver using the latest
technologies. Only the Authorized persons i.e., who are using our application
will be 8 there in the Network. The proposed algorithm is to hide the audio data
effectively in an image without any suspicion of the data being hidden in the
image. It is to work against the attacks by using a distinct new image that isn’t
possible to compare.
We used a method for hiding the data in a distinct image file in order to securely
send over the network without any suspicion the data being hidden. This
algorithm, though requires a distinct image which we can use as a carrier and
hide the data which is well within the limits of the threshold that the image can
hide, that will secure the data.
The aim of the project cryptography is to study and implement techniques for
secure communication in the presence of adversaries. Cryptography involves
the use of mathematical algorithms and principles to protect information,
ensuring confidentiality, integrity, authenticity, and non-repudiation.
2. Integrity: Designing mechanisms to verify that data has not been tampered
with or modified during transmission or storage.
1.5 Objective
That is the encrypted message can be decrypted only if all the 2n+1 parts of the
private key is known. Here our objective is to unable the intruder identify the
message even if he succeeds in calculating one or some of the parts of the
private key because the calculation of all 2n+1 parts of the private key is a
difficult task.
1.6 Methodology
An iterative lifecycle model[5] does not attempt to start with a full specification
of requirements. Instead, development begins by specifying and implementing
just part of the software, which can then be reviewed in order to identify further
requirements. This process is then repeated, producing a new version of the
software for each cycle of the model. Consider an iterative lifecycle model
which consists of repeating the following five phases in sequence:
3.Sequence Diagram
A Requirements phase in which the requirements for the software are gathered
and analyzed. Iteration should eventually result in a requirements phase that
produces a complete and final specification of requirements.A Design phase, in
which a software solution to meet the xxix requirements is designed. This may
be a new design or an extension of earlier design.An Implementation and Test
phase, when the software is coded, integrated and tested.A Review phase, in
which the software is evaluated, the current requirements are reviewed, and
changes and addition to the system proposed. For each cycle of the model, a
decision has to be made as to whether the software produced by the cycle will
be discarded, or kept as a starting point for the next cycle (sometimes referred to
as incremental prototyping). Eventually a point will be reached where the
requirements are complete and the software can be delivered, or it becomes
impossible to enhance the software as required, and a fresh start has to be made.
Chapter 2
LITERATURE SURVEY
There has been a continuous rise in the number of data security threats in the
recent past and it has become a matter of concern for the security experts.
Cryptography is the best techniques to nullify this threat. The researchers today
are proposing a blended approach of both techniques because a higher level of
security is achieved when both techniques are used together.
secret information. They utilized a least significant bit method to accomplish the
digital image steganography.
At the receiver’s side, the secret data is retrieved through the decoding process.
Thus, a three-level security has been rendered for them a secret message to be
transferred.
Chapter 3
SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 13
CRYPTOGRAPHY
SOFTWARE SPECIFICATION
Windows XP
Chapter 4
SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 14
CRYPTOGRAPHY
SYSTEM DESIGN
ALGORITHM
6) Using the Secret Key the receiver can view the data hidden in the image.
FLOWCHART
import javax.swing.JButton;
import javax.swing.JFileChooser;
import javax.swing.JFrame;
import javax.swing.JOptionPane;
import javax.swing.JTextField;
import java.awt.FlowLayout;
import java.awt.Font;
import java.io.File;
import java.io.FileInputStream;
import java.io.FileOutputStream;
fileChooser.showOpenDialog(null);
File file=fileChooser.getSelectedFile();
//file FileInputStream
try
fis.read(data);
int i=0;
for(byte b:data)
System.out.println(b);
data[i]=(byte)(b^key);
i++;
fos.write(data);
fos.close();
fis.close();
JOptionPane.showMessageDialog(null, "Done");
}catch(Exception e)
e.printStackTrace();
System.out.println("this is testing");
f.setTitle("File Operation");
f.setSize(400,400);
f.setLocationRelativeTo(null);
f.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
//Creating Button
button.setText("Open File");
button.setFont(font);
textField.setFont(font);
button.addActionListener(e->{
System.out.println("button clicked");
String text=textField.getText();
SITS,Narhe,Pune-41(Electronics & Telecommunication) Page 19
CRYPTOGRAPHY
int temp=Integer.parseInt(text);
operate(temp);
});
f.setLayout(new FlowLayout());
f.add(button);
f.add(textField);
f.setVisible(true);
Testing process
Chapter 5
ADVANTAGES
8. Secure Storage: Cryptography can be used to protect data at rest, such as stored
files or databases. Encrypting data before storage ensures that even if
unauthorized individuals gain access to the storage medium, the encrypted data
remains unreadable without the decryption key.
Chapter 6
CONCLUSION
This work presents a scheme that can transmit large quantities of secret
information and provides secure communication between two private parties.
Both steganography and cryptography can be woven in this scheme to make the
detection more complicated. Any kind of text data can be employed as secret
msg. The secret message employing the concept of steganography is sent over
the network. In addition, the proposed procedure is simple and easy to
implement.
The Embedding of data is done such as Audio, Video, Image is done in the
image, by choosing a distinct and new image, we can prevent the chance for the
attacker to detect the data being hidden. Results achieved indicate that our
proposed method is encouraging in terms of security, and robustness.
FUTURE SCOPE
REFERENCES
[4] Mr. Vikas Tyagi(2012), “Data Hiding in Image Using least significant bit
with cryptography”, International Journal of Advanced Research in computer
science and Software Engineering, Volume 2, Issue 4.