The main objective of this project is to prevent e-Fraud in which a image is
encrypted with a floating point cipher using a convolution operation and then
output will generate in a image cipher text.
The output is then ‘embedded’ in a host image to hide the encrypted
information.
Decryption is accomplished by: (i) extracting the binary image from the host
image; (li) correlating the result with the original cipher.
In principle, any cipher generator can be used for this purpose and the
method has been designed to operate with images.
The approach has a variety of applications and in this paper, we focus on the
authentication and self-authentication of e-dacuments (letters and certificates,
for example) thal are communicated over the Internet and are thereby
vulnerable to e-Fraud (e.g. modification, editing, counterfeiting etc.).
Existing system
= We have several encryption systems in which the information to be
transmitted is encrypted using an algorithm with an appropriate key.
= In this , the information to be transmitted (plain text) is converted into
encrypted information(cipher text).
Problems in Existing System
= The weaknesses of all encryption systems is that the form of the output data (the
cipher text), if intercepted. alerts the intruder to the fact that the information being
transmitted may have some importance and that it is therefore worth attacking and
attempting to decrypt it.
= This aspect of cipher text transmission can be used to propagate disinformation,
achieved by encrypting information that is specifically designed to be intercepted
and decrypted.
= In this case, we assume that the intercept will be attacked, decrypted and the
information retrieved.
= There is no security when transmitting the data from one end to another.
Proposed System
Advantages of Proposed System
= Hides the encrypted message or a secret data in to an image .
= If there are any perceivable changes ‚there may be a chance for an
unauthorized person to modify the data.So, the data encryption into an
image and decryption and steganography is used to protect the data from
unauthorized person.
= The scheme allows for the self authentication of documents such as
letters, certificates and other image based data.
Operating system : - Windows XP.
Coding Language : JAVA
Modules
= File Upload And Encryption
Hiding Text
Text Extraction
= Decryption
File Upload And Encryption
= Admin upload the files using filename and field. The user will search the uploaded
files and select file and send request to admin.
= The key will encrypt using an encryption algorithm. Use the encryption function to
encrypt the numeric plaintext values using the public key.
Hiding Text
= Steganography is the process of hiding the one information in to other sources of
information like text, image or audio file so that it is not visible to the natural view.
Here, the image is encrypted, then encrypted information hidden in a host image It
is a simple approach to embedding a message in to the image.
Text Extraction:
= The stegoimage can view using the image upload path. The hidden text is
extracted from the host image using a stego key. The stego key is used to extract
the text from the image. The stego key finds the text hidden in image file. Extract
the text from an image; finally get the secret data and the hidden message stored
in a file.
Decryption:
= The encrypted information extract from an image and using a private key to
decrypt the hidden message. Break the cipher text into small blocks of data that
are the same length as the public key modulus. The blocks of data containing a
hexadecimal string. The interpret each hexadecimal string as a decimal integer
value. Use the decryption function to decrypt the integer values using the private
kay.
Output Screens
= Home Page
e-Fraud Prevention Based On The Self-Authentication
maun Of e-Documents
| Steganography
= Registration Page
e-Fraud Prevention Based On The Self-Authentication
FRAUD Of e-Documents
Registration
en
= Login Page
e-Fraud Prevention Based On The Self-Authentication
raus Of e-Documents
= Admin Page
e-Fraud Prevention Based On The Self-Authentication
Of e-Documents
= User Login
e-Fraud Prevention Based On The Self-Authentication
enaus Of e-Dacuments
+ Ah earch hun Pen
+ Let View Magenta
Conclusion
Security is an important issue while transferring the data using internet via E-
mail because any unauthorized person can hack the data. The proposed
approach provides higher security to protect the data.