0% found this document useful (0 votes)
28 views

BNM Institute of Technology: Department of Electronics & Communication Engineering

The document describes a student project to design and analyze a cryptographic technique for image encryption. The project aims to develop a secure encryption method using Vigenere and Polybius ciphers. The objectives are to encrypt digital images while protecting confidentiality and integrity. The methodology involves designing an encryption algorithm that can be implemented in a programming language and tested on various image formats. The performance will be analyzed using cryptographic techniques and compared to other encryption methods.

Uploaded by

Vikas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

BNM Institute of Technology: Department of Electronics & Communication Engineering

The document describes a student project to design and analyze a cryptographic technique for image encryption. The project aims to develop a secure encryption method using Vigenere and Polybius ciphers. The objectives are to encrypt digital images while protecting confidentiality and integrity. The methodology involves designing an encryption algorithm that can be implemented in a programming language and tested on various image formats. The performance will be analyzed using cryptographic techniques and compared to other encryption methods.

Uploaded by

Vikas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

BNM Institute of Technology

Project Work
An Autonomous (18ECP78)
Institution under VTU

Department of Electronics & Communication Engineering


Project Work 2022-2023Phase-2

DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE


ENCRYPTION

Batch No: B8
1. Sanjan Raj.S 1BG19EC092
2. Surya Kaushik.PK 1BG19EC112
3. Vikas P 1BG19EC122

Guide:Dr. Priya R Sankpal


Ast.Professor

Dept. of ECE, BNMIT


10/04/2023 1
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

Contents
• Introduction
• Motivation
• Objectives
• Literature survey
• Methodology with Block diagram
• Hardware and software details
• Conclusion
• References

Dept. of ECE, BNMIT


10/04/2023 2
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE
ENCRYPTION

INTRODUCTION:

Cryptographic techniques are used to secure communication and protect sensitive


information from unauthorized access. Cryptography involves the use of mathematical
algorithms to convert information into an unreadable format, known as cipher text. Only
authorized parties who possess the appropriate key or password can decipher the cipher
text and access the original information, known as plain text.
The Vigenere cipher is an algorithm that is used to encrypting and decrypting the text.
The Vigenere cipher is an algorithm of encrypting an alphabetic text that uses a series of
interwoven Caesar ciphers. It is based on a keyword's letters. It is an example of a
polyalphabetic substitution cipher.
A Polybius Square is a table that allows someone to convert letters into numbers. To make
the encryption little harder, this table can be randomized and shared with the recipient.

Dept. of ECE, BNMIT


10/04/2023 3
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

MOTIVATION:
The motivation behind the project is to develop a secure and
efficient encryption method for protecting sensitive image data
during transmission or storage. Image encryption is a critical task in
many applications, including medical imaging, military imaging,
and e-commerce. The primary goal of image encryption is to
provide confidentiality, integrity, and authenticity of the image data .

Dept. of ECE, BNMIT


10/04/2023 4
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

OBJECTIVE AND SCOPE:

The objective of the project is to develop a secure method for encrypting images. The primary goal is to protect the
confidentiality and integrity of the image data during transmission or storage, ensuring that unauthorized parties
cannot access or modify the image.
The scope of the project includes the following:
 Developing a Vigenere and Polybius cipher-based encryption algorithm that can be applied to digital images.
 Implementing the encryption algorithm using a suitable programming language.
 Testing the encryption algorithm with various digital image formats to evaluate its performance in terms of security
and efficiency.
 Analyzing the encryption algorithm using cryptographic techniques to assess its resistance to known attacks.
 Comparing the performance of the proposed encryption algorithm with other existing encryption techniques to
evaluate its effectiveness.
Dept. of ECE, BNMIT
10/04/2023 5
2022-23
LITERATURE SURVEY:
Sl PAPER TITLE AUTHOR DESCRIPTION
NO

A Systematic Taufik Hidayata, Based on keyword for searching relevant paper, authors get interesting result. AES algorithm to
secure data sharing on cloud can be explored deeply and then well implemented. From what
01. Literature Review Rahutomo authors believed on 3 trusted libraries, only few papers discuss on AES algorithm for cloud data
Method On AES Mahardikob, security. Those papers discussed that data security on cloud not only could impact to data
Algorithm for Data authenticity, but also could prevent any unauthorized person. The use of SLR can help to get
Sharing Encryption better suggestion for further research. In addition, it may contribute to new science in future.
On Cloud Computing
Medical image Ammar Odeh, It is critical to protect medical data against forgeries and fraud in today’s technological
environment with high-speed communication. It is becoming more difficult to transfer large
02. encryption Qasem Abu Al- amounts of medical data as internet users grow. Because this (medical data) is frequently utilized
techniques: a Haija for various diagnostic reasons, the information in medical photographs must be safeguarded. It is
technical survey and a legal responsibility to protect patient privacy and medical records. Traditional encryption
potential challenges approaches cannot deal with the vast volume of medical imaging
data and its unique statistical features.

A Systematic Review Gopal Ghosha , This paper presents the literature review on image encryption techniques. Using chaotic
sequence and wavelet transform, the image encryption techniques were applied. The analysis of
03. on Image Encryption Kavitab , Divyaa , the paper indicates that the techniques for protecting the security of the image. This paper
Techniques Sahil Vermab , demonstrated the encryption techniques that are used on an insecure network to encrypt the
M N Talibc , image. To encrypt the image, this paper proposes a new encryption technique. The suggested
Mudassar Hussain approach encrypts the image using Wavelet Transform, the Chaotic Mechanism, along with the
production of the image fingerprint using the Hash function to be sent to the recipient. Finally,
Shahd recent studies in Image Encryption Techniques are tabulated
Dept. of ECE, BNMIT
6
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

BLOCK DIAGRAM:

Dept. of ECE, BNMIT


10/04/2023 7
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

Implementation:

Vigenere Cipher Algorithm:


The steps involved are as follows:

 Write the plaintext.

 Use the plaintext and the key letter to select a row and a column in the Vigenere table.

 The first letter of the plaintext is the first row and the key is the first column. For example, if the plaintext is INTELLIPAAT and the
key is R, then the first row will be the one that starts with I, and the column will be the one that starts with R.

 The first letter of the ciphertext will be the letter where the first row and column intersect. In the case of our example that will be
the letter Z.

Dept. of ECE, BNMIT


10/04/2023 8
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE
ENCRYPTION
• Now, this process is continued till the entire plaintext is turned into a ciphertext. For
INTELLIPAAT, that will be ZVGXPWTXPAT
•The first letter is selected using the priming key.
•The first letter of the ciphertext is located in this row.
•The first letter of the plaintext will be the letter where the first row and column intersect.
•This process is followed until the entire ciphertext is deciphered.
Vigenere Encryption:

The encryption formula is:


Ei = (Pi + Ki) mod 26
The decryptin formula is:
Di = (Ei – Ki) mod 26
Vigenere decryption:

Dept. of ECE, BNMIT


10/04/2023 9
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE
ENCRYPTION

Polybius Cipher Algorithm:


The Polybius cipher is a substitution cipher that uses a 5x5 grid to encode letters of the alphabet. The algorithm for
encoding a message using the Polybius cipher is as follows:

 Create the 5x5 grid by writing the letters of the alphabet (excluding "J") in a 5x5 grid, starting with "A" in the top left
corner and ending with "Y" in the bottom right corner. The letters are usually written in uppercase.

AB C DE Polybius Encryption:
FGHIK

LMNOP

QRSTU Polybius decription:


VWXYZ

Dept. of ECE, BNMIT


10/04/2023 10
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE
ENCRYPTION

 To encode a message, first convert all the letters to uppercase and remove any
spaces and punctuation

 For each letter in the message, find its row and column in the grid. The row is
the first digit of the code, and the column is the second digit.For example, the
letter "A" would be encoded as "11" (the first row and the first column), and
the letter "B" would be encoded as "12" (the first row and the second column).
Concatenate the codes for each letter in the message to create the encoded
message. For example, the message "HELLO" would be encoded as "23 15 31 31
43".

Dept. of ECE, BNMIT


10/04/2023 11
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE
ENCRYPTION

Algorithm for Combined vigenere and polybius cipher:


The combination of Vigenere and Polybius ciphers can provide an added layer of security to encrypted messages.
Here is an algorithm for encrypting and decrypting a message using both ciphers:

Encryption Algorithm:
 Define the plaintext message to be encrypted.

 Define the Vigenere key, which should be a string of characters that is shorter than the plaintext message.

 Define the Polybius square, which is a 5x5 grid of letters (excluding "J") and their corresponding row/column
numbers.

 Replace any "J" characters in the plaintext with "I" characters.

 
  Dept. of ECE, BNMIT
10/04/2023 12
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

 Convert the plaintext to a list of pairs of numbers using the Polybius square.

 Convert the Vigenere key to a list of numbers, where each number corresponds to the
alphabetical index of the letter in the key.

 Iterate through the list of pairs of numbers and the list of numbers from the Vigenere key
simultaneously, adding the corresponding numbers together and taking the result modulo 25 to
get a new number.

 Convert the new numbers back into pairs of numbers using the Polybius square.

 Combine the pairs of numbers into a single string of numbers.

 The encrypted message is the string of numbers obtained from step 9.

Dept. of ECE, BNMIT


10/04/2023 13
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

Decryption Algorithm:
 Define the encrypted message to be decrypted.

 Define the Vigenere key used to encrypt the message.

 Define the Polybius square used to encrypt the message.

 Convert the encrypted message from a string of numbers to a list of pairs of numbers
using the Polybius square.

 Convert the Vigenere key to a list of numbers, where each number corresponds to the
alphabetical index of the letter in the key.

Dept. of ECE, BNMIT


10/04/2023 14
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

 Iterate through the list of pairs of numbers and the list of numbers from the
Vigenere key simultaneously, subtracting the corresponding numbers and
taking the result modulo 25 to get a new number.

 Convert the new numbers back into pairs of numbers using the Polybius
square.

 Replace any "I" characters in the decrypted pairs of numbers with "J"
characters.

 Combine the pairs of numbers into a single string of letters.

 The decrypted message is the string of letters obtained from step 9.


Dept. of ECE, BNMIT
10/04/2023 15
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE
RESULT: ENCRYPTION

Dept. of ECE, BNMIT


10/04/2023 16
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

CONCLUSION:
• In modern cryptography, the Vigenere and Polybius ciphers are not
commonly used for encryption as they have been replaced by more
advanced encryption techniques such as block ciphers and stream
ciphers.
• Here we have encrypted and decrypted the plain text using Vigenere
and Polybius ciphers and we look to improvise it using Image as an
input and improve the security for sending images.
Dept. of ECE, BNMIT
10/04/2023 17
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

REFRENCES
1.International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181
IJERTV6IS010223 (This work is licensed under a Creative Commons Attribution 4.0 International
License.) Published by : Vol. 6 Issue 01, January-2017 http://www.ijert.org.
2. International Journal of Engineering & Technology, 7 (2.2) (2018) 62-64 International Journal of
Engineering & Technology Website: www.sciencepubco.com/index.php/IJET.
3. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com
(ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 5, May 2013).
4. International Journal of Pure and Applied Mathematics Volume 118 No. 24 2018 ISSN: 1314-3395
(on-line version) url: http://www.acadpubl.eu/hub/ .

Dept. of ECE, BNMIT


10/04/2023 18
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION

THANK YOU

Dept. of ECE, BNMIT


10/04/2023 19
2022-23

You might also like