srs for image encryption and decryption
#1

i want srs for image encryption and decryption
Reply
#2
srs for image encryption and decryption

ABSTRACT
Paranoia allows an average user to securely transfer text messages by hiding them in a digital image file. A combination of steganography and encryption algorithms provides a strong backbone to Paranoia’s security. Paranoia features innovative techniques for using the digital image file by hiding text in it or even using it as a key for the encryption.

RATIONALE
This project is feasible for several reasons. First, there is a lot of research that has been done in the field of steganography and encryption, so we will be able to reference pre-existing models. Also, Java has an extensive API that will serve the purpose of this project. We will use Java to program the user interface, which will greatly simplify creation of an easy-to-use GUI. Java is a good choice also because it has built-in capabilities for encryption and decryption. This program would be valuable and innovative because of its intuitive interface and the format of the key as an image. Similar applications exist, but none of them use images as keys. This feature makes our application distinct because it adds an extra level of security. The idea of looking for a key in an image is not very obvious, and the hacker would need to have both images and Paranoia in order to easily check whether there is any hidden text. The user will only need to select the input files without any knowledge of underlying technologies.
The project contains several challenges that make it interesting to develop. The central task is to research available steganography and encryption algorithms to pick the ones that offer the best combination of strong encryption, usability, and performance as it applies to Paranoia. Another
important aspect of the assignment is to create a simple, compact, and powerful GUI because it will play a large role in the success of the application. The GUI will include a walkthrough, which will be similar to a wizard to help first-time users. The user will also have a number of options – for example, he will be able to turn encryption on or off. The program window will be informative in general, since it will include image previews and a text box. The program should also gracefully handle errors, giving the user meaningful error messages. Another important goal is to make sure that the changes in the image are unnoticeable to human eyes and largely undetectable to programs designed to look for repetitive and obvious patterns.

INTENDED AUDIENCE
The application is primarily intended to be used to inconspicuously hide confidential and proprietary information by anyone seeking to hide information. This software has an advantage over other information security systems because both the key and the hidden text are in the form
of images, which are not obvious text information carriers.

Because of its user-friendly interface, the application can also be used by anyone who wants to securely transmit private information. The main advantage of this program for individuals is that they do not have to have any knowledge about steganography or encryption. The visual way to
encode the text, plus the visual key makes it easy for average users to navigate within the program.

SYSTEM REQUIREMENTS
Paranoia will be developed using Java Development Kit (JDK) 1.4.2. Any device that can support a Java Virtual Machine for JDK 1.4, along with the necessary memory and disk storage space will be able to execute our application.

SECURITY ASPECTS
Paranoia deals with secure communication between two parties – mainly hiding and recovering text that are embedded within a digital image file. Paranoia takes three steps to hide the data such that it is virtually impossible for a third party without a key to view or edit the information
within the image.

1. Steganography (Steganography algorithm)
Our main tool of hiding text is steganography. Steganography is defined as the hiding of a secret message within another message in such a way that others do not discern the presence or contents of the hidden message - in our case, we hide a text message into a larger digital image file. This is achieved by hiding the text into the least significant bits (LSBs) of the larger image file. Because an image file whose LSBs have been changed still retains its functionality and is visibly similar to the original, steganography does a good job of hiding the data over an unconventional format. If no one is looking for the data, it’s very hard to notice it.

2. Security through obscurity (Bit-placement algorithm)
We add another level of security by placing the sequential bits of the steganography algorithm in a random order. For example, if we had 4 bits to hide and there was a space of 10 bits available on the image file, we would not hide our 4 bits in bits 0 1 2 3, but rather create a pseudorandom bit placement such as bits 9 3 0 7 and use this for the first four bits.

3. Encryption (Encryption algorithm)
The last level and strongest level of security comes from encryption. Before we input our text message into the algorithms above, we encrypt it into ciphertext first. Paranoia will follow an encryption algorithm given by the Advanced Encryption Standard (AES) to guarantee that our
encryption is strong, reliable, and unbreakable through practical means. Through the use of the three security algorithms above Paranoia will secure the communication between the two parties. In addition, Paranoia is based on using unconventional formats for keys and the medium of communication, and hence another level of security is added in that most people will neither suspect an incoming secret message embedded in an image nor a key generated from an image. Conclusively, Paranoia will be a secure tool for communication as the three algorithms in conjunction would be very hard if not impossible for a keyless third party to break.

DESCRIPTION OF MAIN FUNCTIONALITY
Paranoia is a platform-independent stand-alone application that combines steganography and encryption to enhance the confidentiality of intended message. The user’s intended message is first encrypted to create unintelligible cipher text. Then the cipher text will be hidden within an image file in such a way as to minimize the perceived loss in quality. The recipient of the image is able to retrieve the hidden message back from the image with Paranoia

ENCODING
In order to hide text in an image, the user must provide the text and a Target Image in which it is to be hidden. Optionally, users may enter or load a text key or generate a key from an image file. When a user key is not provided, a default key is used. To make choosing images easier, an image bar is provided for the user. The user may set the source directory, whose contents are displayed as thumbnails in the image bar located on the
bottom panel of application. These thumbnails are automatically generated from the specified source directory. The user then selects a target image and loads it for use as the Key Image or the Target Image. The user may also open the Target Image by selecting Open Image under File menu. Additionally, the Key Image may be opened with the Open Image Key command on the Tools menu.

The user may enter the text to be embedded in several ways. He or she may type it directly into the text window, open a text file, or paste text from another application. The user may also open a text file by selecting Open Text under the File menu or use the Edit menu to paste from the clipboard.
Loading a text key can be done from the Open Text Key selection on the Tools menu. When user has specified both the target image, and text body, Paranoia is ready to hide the text body within the image. The user may then select Embed Text from the Tools menu. The key image will then be hashed into an appropriate Key Value. This value will be used for the encryption of the users plaintext to produce ciphertext. The ciphertext and key value will then be input into the steganography and bit placement algorithms, and the Output Image will be generated. After the application has generated the image, the user may then inspect it by selecting the Image tab on the main panel. The user is then able to compare the encrypted target image with the original target image located on the right box of the main window. The user may wish to save the generated image by selecting Save Image or Save Image As… under File menu.

DECODING
In order to retrieve the hidden text from a source image, the user needs to provide a Source Image and any Keys used when the Source Image was generated. Loading the Source Image file is done similarly to the process of opening a Target Image. If the sender has used the default key, the recipient need not load any keys to the application.If a non-default key was used in text hiding process, the receiving party must have prearranged
knowledge of the key for use in retrieving the text. This key could be an image, text file or a key string. If the agreed upon key was an image, the user can load it from the image browser into the key image box on the right. If the key is a text file, the user may load the key by selecting Open Text Key from the Tools menu. Lastly, the user may simply type in the key by activating the Text tab of the key panel and entering it into the text box there. After the Source Image and any required Keys are loaded into the application, the hidden text can be retrieved by selecting Extract Text from the Tools menu. The key image will be hashed into an appropriate Key Value. This key value will be used to recover the hidden ciphertext from the Source Image. The key will then be used for the decryption of the ciphertext to produce plaintext. The plaintext will finally be displayed in the text box on the Text tab of the main panel. After the application has generated the text, the user may wish to save the generated text by selecting Save Text under the File menu. The application is not able to identify the presence of the hidden message in images until the actual decoding process is attempted, as the image files are virtually indistinguishable from normal images.\

THE USER WALKTHROUGH
A portion of the main GUI is devoted to the user walkthrough. This walkthrough will lead first time users through the process of encoding and decoding images and in its final step initiate the actual encoding or decoding of the user’s text. The user may prepare for and perform encoding and decoding at any time without the use of the walkthrough. Consult the following flow chart and corresponding description of states to understand the
walkthrough process.

FUNCTIONALITY DETAILS
The fine details of the functionality that the end user should expect are given in this section. Main points are in bold with bullets, and sub-points are in normal text.
• Platform Independence
The program will use Java and will be platform independent.
• Start, Exit and Minimize the application
Start: The user invokes the program from the operating system with the aid of the Java virtual machine (VM). The program is initialized with no open files (i.e., no keys, images, etc.) Exit: If the user selects Exit from the File menu, the program will begin exiting. If any extracted text has not been saved, or if an embedded image has not been saved, a dialog will pop up asking the user, if he or she wants to save the relevant data. Min: If the user minimizes the window, it will be minimized by the operating system. Should the window be reactivated again, the program will return to the same state as before it was minimized.
• Start Over
If the user selects Start Over from the File menu, then the program should return to its initial state (i.e., the same state as when the program was initially started). If any extracted text has not been saved, or if an embedded image has not been saved, a dialog will pop up warning the user or asking if he or she wants to save the relevant data.
• Import/Edit Text
File: Using the option Open Text from the File menu, text can be loaded from a file into the large text box. A dialog will pop up asking the user to indicate the input file.
Kybd: The keyboard can also be used to enter text directly into the text box. Paste: The Paste command from the Edit menu can be used to import text from the clipboard.
Edit: The text can be edited using the standard Copy, Cut, and Paste commands from the Edit menu.
Scroll: If the text is longer than the box, then the box should be scrollable so that the user can see and edit the entirety of the text.
• Export Text
The same as for Import Text.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: image encryption and decryption project report pdf, image encryption and decryption, matlab code image encryption and decryption, encryption and decryption for digital image matlab source code, srs on a cake shoper image processing, modules of image encryption and decryption, er diagram of image encryption and decryption,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  srs on textile management system 2 2,447 25-12-2018, 08:03 PM
Last Post: Selva lakshmi
  dwt code in java for image 2 6,352 24-03-2018, 10:06 PM
Last Post: Guest
  ppt on design and implementation of intelligent campus security tracking system based on rfid and zigbee 7 16,052 09-02-2018, 02:20 PM
Last Post: udaya
Smile physics investigatory projects for class 12 cbse to set up a common base transistor circuit and to study its input and o 3 25,141 20-12-2017, 09:44 AM
Last Post: jaseela123d
  srs on traffic management system 3 2,793 12-09-2017, 09:38 AM
Last Post: jaseela123d
  matlab code brain tumor feature extraction from image 1 1,768 27-04-2017, 09:17 PM
Last Post: rohit111222344
  aco matlab code for image segmentation 1 936 13-04-2017, 04:51 PM
Last Post: jaseela123d
  speed detection and image capture 1 791 13-04-2017, 04:48 PM
Last Post: jaseela123d
  Biomedical and image processing topics 1 934 13-04-2017, 02:56 PM
Last Post: jaseela123d
  srs for blood donation system pdf 1 1,422 13-04-2017, 11:51 AM
Last Post: jaseela123d

Forum Jump: