BNM Institute of Technology: Department of Electronics & Communication Engineering
BNM Institute of Technology: Department of Electronics & Communication Engineering
Project Work
An Autonomous (18ECP78)
Institution under VTU
Batch No: B8
1. Sanjan Raj.S 1BG19EC092
2. Surya Kaushik.PK 1BG19EC112
3. Vikas P 1BG19EC122
Contents
• Introduction
• Motivation
• Objectives
• Literature survey
• Methodology with Block diagram
• Hardware and software details
• Conclusion
• References
INTRODUCTION:
MOTIVATION:
The motivation behind the project is to develop a secure and
efficient encryption method for protecting sensitive image data
during transmission or storage. Image encryption is a critical task in
many applications, including medical imaging, military imaging,
and e-commerce. The primary goal of image encryption is to
provide confidentiality, integrity, and authenticity of the image data .
The objective of the project is to develop a secure method for encrypting images. The primary goal is to protect the
confidentiality and integrity of the image data during transmission or storage, ensuring that unauthorized parties
cannot access or modify the image.
The scope of the project includes the following:
Developing a Vigenere and Polybius cipher-based encryption algorithm that can be applied to digital images.
Implementing the encryption algorithm using a suitable programming language.
Testing the encryption algorithm with various digital image formats to evaluate its performance in terms of security
and efficiency.
Analyzing the encryption algorithm using cryptographic techniques to assess its resistance to known attacks.
Comparing the performance of the proposed encryption algorithm with other existing encryption techniques to
evaluate its effectiveness.
Dept. of ECE, BNMIT
10/04/2023 5
2022-23
LITERATURE SURVEY:
Sl PAPER TITLE AUTHOR DESCRIPTION
NO
A Systematic Taufik Hidayata, Based on keyword for searching relevant paper, authors get interesting result. AES algorithm to
secure data sharing on cloud can be explored deeply and then well implemented. From what
01. Literature Review Rahutomo authors believed on 3 trusted libraries, only few papers discuss on AES algorithm for cloud data
Method On AES Mahardikob, security. Those papers discussed that data security on cloud not only could impact to data
Algorithm for Data authenticity, but also could prevent any unauthorized person. The use of SLR can help to get
Sharing Encryption better suggestion for further research. In addition, it may contribute to new science in future.
On Cloud Computing
Medical image Ammar Odeh, It is critical to protect medical data against forgeries and fraud in today’s technological
environment with high-speed communication. It is becoming more difficult to transfer large
02. encryption Qasem Abu Al- amounts of medical data as internet users grow. Because this (medical data) is frequently utilized
techniques: a Haija for various diagnostic reasons, the information in medical photographs must be safeguarded. It is
technical survey and a legal responsibility to protect patient privacy and medical records. Traditional encryption
potential challenges approaches cannot deal with the vast volume of medical imaging
data and its unique statistical features.
A Systematic Review Gopal Ghosha , This paper presents the literature review on image encryption techniques. Using chaotic
sequence and wavelet transform, the image encryption techniques were applied. The analysis of
03. on Image Encryption Kavitab , Divyaa , the paper indicates that the techniques for protecting the security of the image. This paper
Techniques Sahil Vermab , demonstrated the encryption techniques that are used on an insecure network to encrypt the
M N Talibc , image. To encrypt the image, this paper proposes a new encryption technique. The suggested
Mudassar Hussain approach encrypts the image using Wavelet Transform, the Chaotic Mechanism, along with the
production of the image fingerprint using the Hash function to be sent to the recipient. Finally,
Shahd recent studies in Image Encryption Techniques are tabulated
Dept. of ECE, BNMIT
6
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION
BLOCK DIAGRAM:
Implementation:
Use the plaintext and the key letter to select a row and a column in the Vigenere table.
The first letter of the plaintext is the first row and the key is the first column. For example, if the plaintext is INTELLIPAAT and the
key is R, then the first row will be the one that starts with I, and the column will be the one that starts with R.
The first letter of the ciphertext will be the letter where the first row and column intersect. In the case of our example that will be
the letter Z.
Create the 5x5 grid by writing the letters of the alphabet (excluding "J") in a 5x5 grid, starting with "A" in the top left
corner and ending with "Y" in the bottom right corner. The letters are usually written in uppercase.
AB C DE Polybius Encryption:
FGHIK
LMNOP
To encode a message, first convert all the letters to uppercase and remove any
spaces and punctuation
For each letter in the message, find its row and column in the grid. The row is
the first digit of the code, and the column is the second digit.For example, the
letter "A" would be encoded as "11" (the first row and the first column), and
the letter "B" would be encoded as "12" (the first row and the second column).
Concatenate the codes for each letter in the message to create the encoded
message. For example, the message "HELLO" would be encoded as "23 15 31 31
43".
Encryption Algorithm:
Define the plaintext message to be encrypted.
Define the Vigenere key, which should be a string of characters that is shorter than the plaintext message.
Define the Polybius square, which is a 5x5 grid of letters (excluding "J") and their corresponding row/column
numbers.
Dept. of ECE, BNMIT
10/04/2023 12
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION
Convert the plaintext to a list of pairs of numbers using the Polybius square.
Convert the Vigenere key to a list of numbers, where each number corresponds to the
alphabetical index of the letter in the key.
Iterate through the list of pairs of numbers and the list of numbers from the Vigenere key
simultaneously, adding the corresponding numbers together and taking the result modulo 25 to
get a new number.
Convert the new numbers back into pairs of numbers using the Polybius square.
Decryption Algorithm:
Define the encrypted message to be decrypted.
Convert the encrypted message from a string of numbers to a list of pairs of numbers
using the Polybius square.
Convert the Vigenere key to a list of numbers, where each number corresponds to the
alphabetical index of the letter in the key.
Iterate through the list of pairs of numbers and the list of numbers from the
Vigenere key simultaneously, subtracting the corresponding numbers and
taking the result modulo 25 to get a new number.
Convert the new numbers back into pairs of numbers using the Polybius
square.
Replace any "I" characters in the decrypted pairs of numbers with "J"
characters.
CONCLUSION:
• In modern cryptography, the Vigenere and Polybius ciphers are not
commonly used for encryption as they have been replaced by more
advanced encryption techniques such as block ciphers and stream
ciphers.
• Here we have encrypted and decrypted the plain text using Vigenere
and Polybius ciphers and we look to improvise it using Image as an
input and improve the security for sending images.
Dept. of ECE, BNMIT
10/04/2023 17
2022-23
DESIGN AND ANALYSIS OF CRYPTOGRAPHIC TECHNIQUE FOR IMAGE ENCRYPTION
REFRENCES
1.International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181
IJERTV6IS010223 (This work is licensed under a Creative Commons Attribution 4.0 International
License.) Published by : Vol. 6 Issue 01, January-2017 http://www.ijert.org.
2. International Journal of Engineering & Technology, 7 (2.2) (2018) 62-64 International Journal of
Engineering & Technology Website: www.sciencepubco.com/index.php/IJET.
3. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com
(ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 5, May 2013).
4. International Journal of Pure and Applied Mathematics Volume 118 No. 24 2018 ISSN: 1314-3395
(on-line version) url: http://www.acadpubl.eu/hub/ .
THANK YOU