0% found this document useful (0 votes)
44 views37 pages

Image Encryption

image encryption

Uploaded by

wanisanika2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views37 pages

Image Encryption

image encryption

Uploaded by

wanisanika2004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

CNS ISE-3

IMAGE ENCRYPTION
&
STEGANOGRAPHY

FROM ROLL NO: 49-60


Overview

Team Members
Introduction to Image Encryption & Steganography
Image Encryption
Steganography
Comparison of Image Encryption & Steganography
Applications of Image Encryption & Steganography
Case Studies
Future Trends
Conclusion
Team Members

Ved Vora(49) Harikesh Yadav (55)


Atharva Wani(50) Jayprakash Yadav (56)

Sanika Wani(51) Karishma Yadav (57)


Aditya Yadav(52) Rahul Yadav (58)

Deepak Yadav(53) SaurabhYadav (59)


Guddi Yadav (54) Shubham Yadav (60)
Introduction to Image Encryption

Image encryption secures image data by


converting it into an unreadable form using
cryptographic algorithms. This prevents
unauthorized access or tampering during
transmission or storage.
Techniques like AES, RSA, and chaotic
encryption are commonly used. Image
encryption is crucial in safeguarding
sensitive visual information in fields like
communication and surveillance.
Introduction To Stenography

Steganography is the practice of hiding


information within another file, such as an
image, audio, or video, making the
hidden data invisible to casual observers.

Unlike encryption, which scrambles data,


steganography conceals it, ensuring
secrecy by embedding messages within
ordinary-looking files, often used for
secure communication and digital
watermarking.
Why Are Image Encryption And
Steganography Important

Image encryption and steganography are


vital for safeguarding sensitive
information in the digital age.
Encryption protects images from
unauthorized access, ensuring privacy,
while steganography conceals data,
preventing detection of hidden messages.
Together, they enhance security in
communication, defense, and digital
rights management.
IMAGE
ENCRYPTION
Types of Image Encryption Algorithms
Traditional Ciphers

Purpose: To secure image data and prevent unauthorized access or


modification.
Techniques

Substitution: Replacing individual characters or bits with different


characters or bits.
Transposition: Rearranging the order of characters or bits in the
message.
Block Ciphers: Encrypting data in fixed-size blocks using a
combination of substitution and permutation operations.
Stream Ciphers: Encrypting data bit by bit using a pseudo-random
sequence.

Examples:
RC5 RC6 Blowfish Tiny Encryption Algorithm (TEA)DES (Data
Encryption Standard) AES (Advanced Encryption Standard):
Types of Image Encryption Algorithms
Diffusion Algorithms

Definition: Diffusion algorithms are image encryption techniques that spread


the impact of changes in one pixel to other pixels, making it harder for
attackers to analyze the encrypted image.

Purpose: To enhance the security of image encryption by making the


encrypted image more resistant to attacks and analysis.

Techniques:
Least Significant Bit (LSB) Substitution: Replacing the least significant bits of
pixel values with secret information.
Spread Spectrum: Spreading the secret information across multiple pixels
Pixel-Based Diffusion: Modifying pixel values based on neighboring pixels

Examples:
LSB Steganography
Types of Image Encryption Algorithms
DNA Based Algorithm

Purpose: To represent and encrypt image


data using DNA sequences, leveraging the
complexity of biological information.

Techniques: Involve converting image data


into DNA sequences and applying genetic
operations like mutation, crossover, and
inversion to scramble the data.

Examples: DNA sequence-based image


encryption algorithms that use operations like
inversion, transposition, and substitution.
Types of Image Encryption Algorithms
Neural Networks

Definition: Neural network-based image encryption algorithms use


artificial neural networks to learn and adapt to the characteristics of
the image data for encryption.

Purpose: To leverage the learning capabilities of neural networks to


create complex and adaptive encryption patterns.

Techniques:
Training Neural Networks: Training neural networks on large datasets
of images and corresponding encrypted images.
Encryption: Using the trained neural networks to encrypt and decrypt
images.

Examples:
Convolutional Neural Network (CNN)-based image encryption:
Using CNNs to extract features from the image and apply nonlinear
transformations for encryption.
Types Of Image Encryption
Algorithms
How Does Image Encryption Work?

The working of image encryption algorithms follows a similar basic structure to text
encryption, but it must account for the unique characteristics of images, such as
large data size, high redundancy, and pixel correlation.

In image encryption, the image is treated as a matrix of pixels, and each pixel or
group of pixels is encrypted using mathematical transformations to alter the pixel
values in such a way that the resulting encrypted image looks like random noise or
a distorted version of the original image.

The encryption process generally involves two steps: confusion and diffusion.
Confusion refers to making the relationship between the original image and the
encrypted image as complex as possible, while diffusion ensures that small changes
in the original image result in significant changes in the encrypted image.
Advantages and Disadvantages Of Image
Encryption Algorithms
Advantages: AES Data Encryption Standard
Highly secure and efficient (DES)
Strong protection against Advantages:
brute-force attacks Simple to implement
Handles large image sizes well Effective for small images
Disadvantages:
Disadvantages: Weak by modern security
May show patterns in standards (vulnerable to
encrypted images due to brute-force attacks)
image redundancy Poor diffusion, making small
Requires additional processing changes in the input less
for different image formats impactful
(JPEG, PNG)
Advantages and Disadvantages Of Image
Encryption Algorithms
Blowfish RSA (Rivest-Shamir-Adleman)
Advantages: Advantages:
Fast and efficient, Strong security using
especially for small images asymmetric key encryption
Provides good balance Resistant to brute-force
between security and attacks
performance
Disadvantages:
Disadvantages: Slow performance,
Less suitable for large especially for large images
images due to 64-bit block
size
Introduction to
Steganography
Steganography ensures secure data
transmission and storage.
Introduction to Steganography

The art of concealing information within other data.

Definition
Hiding information within a carrier file

Spatial Domain
Modifications within pixels' bits.

Transform Domain
Alterations in frequency coefficients.
Steganography Techniques

Common methods for embedding secret data in images.

LSB
Modifies least significant bits of pixels.

DCT
Hides data in frequency coefficients.
LSB Technique
Simple and effective but susceptible to attacks.

How It Works Advantages Disadvantages

Replaces least Easy Implementation, Vulnerable to


significant bits of minimal distortion analysis, limited
pixels. capacity.
DCT-Based Steganography
Hides data in the frequency domain.

How It Works Advantages Disadvantages

Embeds data within Resistant to Complex


frequency compression, more implementation,
coefficients. robust. requires
specialized tools.
Popular Steganography Tools
Software used to embed and extract hidden messages.

F5 Steganography JSteg EzStego


How Steganography Works
Step-by-step process of hiding and extracting information.

Embedding Extraction Detection


Hide secret data in an Retrieve the hidden Identify the presence
image. data from the image. of hidden
information.
Advantages of Steganography

Provides covert communication and copyright


protection.

Undetectable
Hides data from third parties.

Added Security
Can be used with encryption.

Copyright Protection
Mark ownership for digital assets.
Disadvantages of Steganography

Steganography can be vulnerable and has


limitations.

Limited Security
Less secure without encryption.

Steganalysis
Detection techniques can expose hidden data.

Limited Capacity
Can only hide a small amount of data.
Similarities Of Image Encryption And
Steganography
Both techniques aim to protect sensitive information from
Purpose:
unauthorized access or disclosure.

Both are utilized in the field of information security, especially for


Use in Security:
digital images. They can be applied in contexts like secure
communications, data protection, and privacy.

Digital Media: Both methods are applicable to digital images and can be
used to convey or hide information within image files.

Technological Both rely on mathematical algorithms and


Foundations: computational techniques to manipulate image data.
Comparison Of Image Encryption And
Steganography
Feature Image Encryption Steganography
The process of converting an image into an The technique of hiding secret information
Definition unreadable format using algorithms so that within an image, such that the
only authorized parties can decrypt it. presence of the secret message is not
detectable by casual observers.

Visibility The original image remains visually The original image becomes
unchanged; the hidden information is unrecognizable and unreadable during
embedded within it without altering the encryption process.
its appearance.

Purpose Tosecure data by making it To conceal the existence of the hidden


inaccessible without a decryption key. information rather than securing it.

Output Produces an encrypted image Produces a cover image that looks


that appears as random noise. normal but contains hidden data.
When To Use Image Encryption And When To Use Steganography

Image encryption is ideal when you need high-level security and the data
itself is sensitive. The goal is to make the content completely unreadable to
anyone without the proper key, even if they know the data exists.

Sensitive Images (Medical, Legal, Government): When dealing with


highly confidential images (e.g., medical scans, legal documents, or
classified images), encryption ensures that the data cannot be
accessed or understood by unauthorized parties.

Transmission Over Insecure Networks: When sending images over the


internet or any public network, encrypting the image ensures that, even
if intercepted, the data remains unintelligible.
When To Use Image Encryption And When To Use Steganography

Steganography is useful when you want to hide the existence of the data
itself. The main goal is to communicate without drawing attention, as the
hidden data is embedded inside an ordinary-looking medium (like a
picture or audio file).

Avoiding Detection: Steganography is effective when encryption might


attract unwanted attention. For example, hiding a sensitive image
inside a vacation photo allows you to send information discreetly.

Watermarking or Ownership Verification: For embedding copyright


information or ownership details inside images, steganography allows
you to hide this data without affecting the appearance of the image.
Applications Of Image Encryption And Steganography

ENCRYPTION STEGNOGRAPHY
Covert Communication
Medical Images
Digital Watermarking
social media
Data Hiding
Military Application
File Sharing
CloudStorage
Personal Messaging
Hybrid Application

Combining image encryption and steganography creates a hybrid approach


that enhances data security and confidentiality. This method leverages the
strengths of both techniques, making it particularly effective in various
applications.
Case Studies: Image Encryption and
Steganography

Real-World Examples

Success Stories

Failures

Future Trends

Conclusion
Success Stories

Steganography in WWII
Germans used steganography to hide messages in images, ensuring covert
communication.

Cold War Encryption:


Cryptographic methods were used to secure sensitive military communications.
Failures

The Enigma Machine:


Widely used German encryption device during WWII, ultimately cracked by British
codebreakers, giving Allies an intelligence advantage.

Sony Pictures Hack (2014):


Hackers breached Sony's systems, stealing sensitive data. Despite encryption,
they managed to decrypt stolen data using various techniques.
Future Trends

Emerging Trends
Quantum Cryptography:
Unbreakable encryption leveraging quantum mechanics.

Deep Learning:
AI-driven methods for sophisticated encryption and steganography
algorithms.

Blockchain Technology:

Ensuring data integrity and provenance in image security systems.


Potential Applications

Internet of Things (IoT):

Securing sensitive data transmitted by IoT devices.

Addressing emerging threats

Augmented and Virtual Reality (AR/VR):

Art and Media:

Safeguarding digital art from unauthorized copying and distribution.


Conclusion
Image encryption and steganography are crucial for securing visual data, with
encryption focusing on confidentiality and steganography hiding the existence of
the message.
Both methods have extensive applications in fields like medical imaging, military, e-
commerce, and digital watermarking.
Emerging trends (e.g., quantum cryptography, deep learning, blockchain) are
pushing the boundaries of security but also present new research challenges.
The combination of encryption and steganography offers a robust solution for
ensuring data confidentiality and integrity in the future.
THANK YOU

You might also like