0% found this document useful (0 votes)
811 views

Information Transmission in Crime Branch Using Steganography

This document discusses using steganography and RSA encryption to securely transmit information between crime branches. It describes hiding encrypted messages in the least significant bit of image pixel colors. The system uses double authentication with an encryption key and validation code stored in a history database. It implements RSA encryption to generate public/private keys and encrypt messages before combining with steganography. The front end is ASP.NET with C# and the back end uses SQL Server Express.

Uploaded by

Indira Varma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
811 views

Information Transmission in Crime Branch Using Steganography

This document discusses using steganography and RSA encryption to securely transmit information between crime branches. It describes hiding encrypted messages in the least significant bit of image pixel colors. The system uses double authentication with an encryption key and validation code stored in a history database. It implements RSA encryption to generate public/private keys and encrypt messages before combining with steganography. The front end is ASP.NET with C# and the back end uses SQL Server Express.

Uploaded by

Indira Varma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Information Transmission in Crime Branch Using Steganography and

RSA Algorithm
Aim:
To provide the security for the information transmit over the internet between one
crime branch to the another using Steganography and using, asymmetric cryptography
RSA Algorithm with latest recommended standards
Steganography:
Steganography is the term used for hiding secret messages within an image. Any
color pixel is made of a combination of RED-GREEN-BLUE (RGB) wherein each RGB
components consists of 8 bits. If the letters in ASCII are to be represented within the
color pixels, the rightmost digit, called the Least Significant Bit (LSB), can be altered.
Any variation in the value of this bit leads to minimal variation in color.
This project contains DOUBLE SECURITY where TWO LEVEL
AUTHENTICATION is required- the ENCRYPTION KEY and VALIDATION CODE.
If you have lost the Encryption Key or Validation code then users can refer HISTORY
DATABASE- where the encryption key and the validation code is recorded. This code
uses SAFE HIDING where no modification is done the so
Urce image. After hiding secret messages you can also Test the Images to verify that the
image is corrupt or not.
The RSA algorithm
The RSA algorithm can be used for both public key encryption and digital
signatures. Its security is based on the difficulty of factoring large integers. RSA
algorithm segregated into three parts:
• Key Generation Algorithm (Used to create strong keys)
• Encryption Algorithm (Converting the original text into cipher text)
• Decryption Algorithm (Converting the cipher text into original text)
Module:
Admin Module:
User Registration, Login etc.
Stenography Module:
Steganography is the term used for hiding secret messages within an image. Any
color pixel is made of a combination of RED-GREEN-BLUE (RGB) wherein each RGB
components consists of 8 bits. If the letters in ASCII are to be represented within the
color pixels, the rightmost digit, called the Least Significant Bit (LSB), can be altered.
Any variation in the value of this bit leads to minimal variation in color.
Sender Side:
• Encrypting the information
• Embedding the encrypted information in the Image
• Sending the image
• Receiving Side:
• Extracting the information
• Decrypting the information using validation key
The RSA Module:
Creating Public Key and Private key for the user and encrypted message going to
merge with stenography
Software:
Front End: ASP.NET with C#.net
Back End: SQL Server Express
Hardware Requirements:
 Hard Disk : 40 GB

 Ram : 256 MB

 Main Processor: Pentium IV

 Display Type : High Color 800 by 600

You might also like