08-16-2017, 10:41 PM
Submitted by
Dilgit D
Nishant Nair
Jeffy Jimmy Joseph
Nair Vishnu Unnikrishnan
[attachment=14923]
Now tell your secret publically .
Introduction
This software enables encryption of data into an image and send it
Encryption , process of transforming information using an algorithm to make it unreadable .
The art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message .
This is implemented using two system and a lan-wire
Existing System
The oldest records of encryption or ciphers go back to more than four thousand years.
Digital encryption converts text to binary data and a key.
Encryption is used by military agencies, government and secret service agencies to facilitate secret communication
Disadvantages
Difficult to send data Due to its larger sizes .
some softwares pictures after encryption , looses its quality.
Algorithms since predefined easily available .
Cipher image encryption provided solution for all this problems.
Proposed System
This system has a inbuilt compression technique which reduces the size of the file .
Consumes less time for transmission .
File encrypted and transferred , when hacked will not be any use since they require the algorithm to decode it.
Algorithm change according to the pixels of image .
Module Description
The software has four modules .
1. Encryption
2.Compression
3.Decompression
4 Decryption
Encryption
Data is added by the user , encrypted onto an image then used for transmission.
The password is inserted in the 0th pixel of the image.
Distance is calculated and added into the 10,20,30th pixel of the image.
Number of characters is stored in 40,50,60th pixel .
Data is embedded and added at distance calculated from pixels of the image.
Compression
Data after encryption compressed to reduce the size.
File is converted to ZIP file .
Image is converted to bytes ,input stream is developed using this
This is used for creation of zip file .
Decompression
Reverse of compression .
The zip file is converted back to image .
Input stream is converted to bytes .
Bytes converted to back to image.
Decryption
Its reverse of encryption.
Obtain the key from 0th pixel , compares the key
Distance between words is obtained from 40,50th and 60th pixel.
Then abstract the data from rest of the 7th pixel .
DATA FLOW DIAGRAM
Application
Used for military and secret service agencies .
Many offices can transmit confidential data .
High speed data transmission .
SCREENSHOTS
Conclusion
The new system we use highly protected data transferring method .
Striking feature of this software is compression of data before sending the file .
For better efficiency wireles technology can be used