CYBER
project SECURITY
Steganography for Secure File
Transmission using LSB algorithm
and MD5Sum Hashing Method
Presentation by GROUP 50
CYBER SECURITY
Meet our team
Member 1
Details
Member 2
Details
Member 3
Details
Member 4 Guided by: Name of Teacher
Details Assistant Professor Senior
Index
Introduction 1
Problem statement 2
Objective 3
Literature Review 4
Proposed works 8
Real-Time usage 9
Hardware & software requirements 10
Simulation 11
Why ours is better 17
WHAT IS FILE ENCRYPTION?
Companies work with files every day.
Cybercrime affects about 32% of companies
every year .
To combat this risk, you need powerful
security features that integrate well with
your existing platforms and fit into your
company budget.
File encryption is a way of encoding files,
including the sensitive data they contain, to
send them securely.
The encoding prevents unauthorized access
and tampering by malicious methods. Page 01
Present issue
A used public channel can be deliberately monitored
by an intruder during the transmission process,
which is an attempt to try and carry out a random
assault.
Our method makes use of encryption algorithm to
encrypt the file .
This helps to drastically increase the scope of
establishing a secure communication line.
Page 02
OBJECTIVE
To introduce a new mode of secure communication
over the internet by using a steganographic and
personal encryption methods that integrates an
innocuous-looking image which is password protected
and will be used to hide the text file containing the
sensitive data.
Page 03
Literature Review
STEGANOS
means to hide something
GRAYPFIA means writing
This project aims to explain the basic steps of file security using image as a cover
and encryption for the hidden file
Page 04
Literature Review (Cont..)
ENCRYPTION IS ONE OF THE MOST EFFECTIVE APPROACHES
TO ACHIEVING DATA SECURITY AND PRIVACY.
THE ORIGINAL INFORMATION IS RECOVERED ONLY THROUGH
USING A PASSWORD, WHICH IS KNOWN AS THE DECRYPTION
PROCESS.
THE OBJECTIVE OF THE ENCRYPTION IS TO SECURE OR PROTECT
DATA FROM UNAUTHORIZED ACCESS IN TERMS OF VIEWING OR
MODIFYING THE DATA.
ENCRYPTION CAN BE IMPLEMENTED BY USING SOME SUBSTITUTE
TECHNIQUE, SHIFTING TECHNIQUE, OR MATHEMATICAL
OPERATIONS.
Page 05
SEVERAL SYMMETRIC KEY BASE ALGORITHMS
HAVE BEEN DEVELOPED IN THE PAST YEAR.
IN THE PAPER AN EFFICIENT RELIABLE
SYMMETRIC KEY-BASED ALGORITHM TO
ENCRYPT AND DECRYPT THE TEXT DATA HAS
BEEN PROPOSED.
THE METHOD USES 8 BIT CODE VALUE OF THE
ALPHABET AND PERFORM SOME SIMPLE
CALCULATION LIKE LOGICAL NOT AND
SIMPLE BINARY DIVISION TO PRODUCE. THE
PROPOSED METHOD IS EASY TO UNDERSTAND
AND EASY TO IMPLEMENT.
Page 06
Proposed Work
The conception is that it's a cover object(image) that's used to hide the initial file
containing sensitive data that needs to be encrypted.
The image file will be protected using a password and the file within the image file will
be encrypted, thereby providing two levels of protection.
One algorithm will be used for encrypting the file contents from plain text to a unique
encrypted value. So, if a third-party member were to find the contents in the text file it
would still be uninterpretable to the intruder.
A file key is generated using MD5 hashing and it is added to the end of file using the
append insertion method.
Page 07
Proposed Work (Cont...)
The encrypted text file is embedded into the image file using LSB Algorithm.
The image will be password protected and to identify the password for the respective
image , filename is added to the password string after a backslash('\').
The password generated is encrypted using AES Algorithm.
The password protected image and the encrypted password is sent to the receiver
The receiver will decode the password and open the image file to view the text file in it.
Page 07
File .txt Encrypted File
Image .jpg
ENCRYPTION
LSB Algorithm
Hashing MD5Sum
Transmission
File Key
Sender's Append Insertion Embedded
End Image .jpg
Encrypted Password+'\'
Password
Value +FileName
AES
Algorithm
Password Protected
RECEIVER
Image .jpg
Password Protected
Image .jpg
FileName
Embedded
Password+'\' Password Image .jpg
Encrypted Value
Decryption +FileName
of AES
Transmission
Algorithm Decryption of LSB
Receiver's Algorithm
Encrypted File
End File .txt
DECRYPTION
Image .jpg
Hashing MD5Sum Removing the file key
File Key File Key
MD5Sum
Md5sum is a hashing method that
calculates and verifies 128-bit hash.
Md5sum is used to verify the
integrity of files, as virtually any
change to a file will cause its MD5
hash to change.
Most commonly, md5sum is used to
verify that a file has not changed as
a result of a faulty file transfer or Fig 1
Courtesy:https://imgs.search.brave.com/xFeBH1zztf9yIS_68X2NvT7kyNwLzM0QdxEHzmjiELQ/rs:fit:474:225:1/g:ce/
aHR0cHM6Ly90c2Uy/Lm1tLmJpbmcubmV0/L3RoP2lkPU9JUC40/cEVGbGZHbDRfWjJm/eko0U0MtbHJ3SGFI/YSZ
waWQ9QXBp
non-malicious meddling.
LSB Algorithm
Least significant bit (LSB) insertion is a
common and simple method to embed
data in an image file.
This technique operate well for image
steganography. For hiding data within
the images, the LSB (Least Significant
Byte) approach is generally used.
Fig 1
Courtesy:https://imgs.search.brave.com/xFeBH1zztf9yIS_68X2NvT7kyNwLzM0QdxEHzmjiELQ/rs:fit:474:225:1/g:ce/
aHR0cHM6Ly90c2Uy/Lm1tLmJpbmcubmV0/L3RoP2lkPU9JUC40/cEVGbGZHbDRfWjJm/eko0U0MtbHJ3SGFI/YSZ
waWQ9QXBp
LSB-STEGANOGRAPHY IS A STEGANOGRAPHY
TECHNIQUE IN WHICH WE HIDE MESSAGES
INSIDE AN IMAGE BY REPLACING LEAST
SIGNIFICANT BIT OF IMAGE WITH THE BITS
OF MESSAGE TO BE HIDDEN.
BY MODIFYING ONLY THE FIRST MOST
RIGHT BIT OF AN IMAGE WE CAN INSERT
OUR SECRET MESSAGE AND IT ALSO MAKE
THE PICTURE UNNOTICEABLE, BUT IF OUR
MESSAGE IS TOO LARGE IT WILL START
MODIFYING THE SECOND RIGHT MOST BIT
AND SO ON .
AES Algortithm
It is based on a ‘substitution–
permutation network’.
It comprises a series of linked
operations, some of which involve
replacing inputs with specific outputs
(substitutions) and others shuffling bits
around (permutations).
AES performs all its computations on
Fig 2
bytes rather than bits. Courtesy:https://imgs.search.brave.com/xFeBH1zztf9yIS_68X2NvT7kyNwLzM0QdxEHzmjiELQ/rs:fit:
474:225:1/g:ce/aHR0cHM6Ly90c2Uy/Lm1tLmJpbmcubmV0/L3RoP2lkPU9JUC40/cEVGbGZHbDRfWj
Jm/eko0U0MtbHJ3SGFI/YSZwaWQ9QXBp
How to prevent the file from being
renamed?
A user is able to delete or rename your
files only because they get the option to
do so in File Explorer.
Prevent is a small application that allows
you to disable certain options in File
Explorer on your computer.
It lets you disable options like Rename,
Delete, Cut, and Copy so no one can
touch or modify your chosen files.
Download, install, and launch the Prevent app on your
Windows PC.
When the app launches, you’ll see that there’s only one
option you can configure.
It’s called Define Hotkey and it allows you to specify a
keyboard shortcut that stops the app from running. Use
any of the available keyboard shortcuts and then click on
Activate.
The app will start running, and when you right-click on
your file, you’ll find that the options mentioned above are
grayed out. You can’t click or use them. The app disables
the physical buttons for those actions as well.
real time usage
CYBER SECURITY
Real time usage of File Encryption
File encryption and decryption has applications in internet
communication, multimedia systems, medical imaging, telemedicine,
nc r y
military communication.
eE
p t i on
F i l
Since these files may carry highly confidential information.And to
provide such security and privacy to the user, File encryption is
essential to protect from unauthorized user access.
This file encryption allows transfers of data from one country to
another from agencys such as RAW, NIA and FBI.
Page 08
CYBER software SECURITY
Softwares
Python
Kali Linux
Visual Studio Code
PyCharm
IDLE Python
Prevent
Page 09
ED BOZY HASH
Algorithm
THEN ADDING
SPLIT THE FILE
THE INDEX
FILE CONTENTS AND
VALUES WITH A
CONTENTS FINDS THEIR
"/"
INDEX VALUES
EG:12/IINI
rit
go
hm
Al
THE LIST IS
RANDOMIZED RANDOMIZED SAVED IN A
VALUES ARE USING LIST
WRITTEN TO A RANDOM
NEW TEXT FILE MODULE
FILE
CONTENTS Page 10
ENCRYPTED
Python Code 1
This is a basic Encrytion
algorithm in which we convert
the file contents into random
numbers and letters.
Page 11
Algorithm
THE THEY ARE
ENCRYPTE VALUES ARRANGED
D VALUES ARE BY THE
SIMPLY NUMBERS IN
ARRANGED FRONT OF
EACH VALUE
"\N" rit
CHARACTERS
AFTER go
hm
AO F TR EDRE RT IHNAGT
Al
ARE
TT HH EE YN AT RH EE
RECOGNIZED
INAD L LE X
AND GIVEN
V
AA RR LU AE N GAENDD
AS NEW LINE
W I "T/ H" OI SU T
T HREERME OI V N EDDE X
DECRYPTED V A L FU RE O S MA N D
SUCCESSFU E "A/ C" H
LLY VALUES
Page 12
ED BOZY
DECRYPTION Code HASH
In this decryption algorithm, the
encrypted contents are converted
back to the normal text in their
original forms using simple
techniques.
Page 13
ED PHA250 HASH
Algorithm 3
PASSWORD ASCII
/PIN VALUE OCTAL
CONCATENATE
LIST rit
RANDOM VALUE go
hm
(ALPHANUMERIC CONVERT
Al
FROM
DICTIONARY VALUES) TO STRING
HASH
GENERATED
Page 14
ED PHA250
Python Code 3 HASH
This hashing algorithm converts
the password into alphanumeric
values and octal numbers.
Page 15
Hashing and Appending
LSB and AES
Decryption Process
Verifying the hash
Decrypting LSB
Encryption Process
Decryption Process - I
Decryption Process - II
conclusion
Conclusion
CYBER SECURITY
Thus, the project entitled "Steganography for Secure
File Transmission using LSB algorithm and MD5Sum
Hashing Method."was completed. By the end of the
project, we have gained valuable skills including a
grounding in how to interact with the operating
system, file handling in python, optimizing algorithms,
calculating the efficiencies, and learning how to
form and manipulate images.
Page 17
References
https://link.springer.com/chapter/10.1007/978-3-642-27948-5_23
https://www.engpaper.net/data-encryption.html
https://www.researchgate.net/publication/320149845_A_Secure_
and_Fast_Approach_for_Encryption_and_Decryption_of_Message
_Communication
https://stackoverflow.com/questions/18569784/python-
password-protection
https://roytuts.com/how-to-encrypt-pdf-as-password-protected-
file-in-python/
Page 18
CYBER SECURITY
THANK YOU
nc r y
pt n
f i le e
presentation by
io
Group 50
Page 19