MS.C PROJECT PPT PRESENTATION.( ANAJE AUGUSTINE CHUKWUNEDUM, NOU144632096).pptx

rasheedmumuni3 9 views 15 slides Mar 05, 2025
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

THESIS WORK


Slide Content

DIGITAL IMAGE CRYPTOSYSTEM WITH ADAPTIVE STEGANOGRAPHY     BY   ANAJE AUGUSTINE CHUKWUNEDUM NOU144632096     A PROJECT SUBMITTED TO THE DEPARTMENT OF INFORMATION TCHNOLOGY,   FACULTY OF SCIENCE, NATIONAL OPEN UNIVERSITY OF NIGERIA (ABEOKUTA STUDY CENTER) OGUN STATE IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF MASTERS OF SCIENCE IN INFORMATION TECHNOLOGY   JUNE , 2022.

PROJECT TOPIC DIGITAL IMAGE CRYPTOSYSTEM WITH ADAPTIVE STEGANOGRAPHY.

INTRODUCTION : Information security has been one of the most important aspects of information and communication technology since the dawn of the Internet. As the number of Internet users grows, the need for Internet security becomes more and more urgent. Encryption is a mechanism that makes transmitted data unreadable, obfuscated, or incomprehensible by encrypting content.

A trusted encryption method or private key is used by an image encryption system to convert or encrypt a secret image into an encrypted image. The photo encoded behind the encrypted image can only be decrypted by authorized users. These are designed to minimize the amount of fake user reviews. Spatial and transform domain techniques are considered typical data masking techniques. .

What is Steganography : Steganography is a Greek word which implies the secured composing. This is a method of hiding information from various cover sources, while steganography analysis is a technique and science that detects signals masked by steganography .

Objectives of the Study To develop an efficient algorithm for cryptographic analysis. In light of this, a method has been developed for keeping cover image marginal statistics. Steganography techniques that modify the cover image and the secret image in the spatial domain are known as spatial domain methods. It involves encoding at the LSBs level. Least Significant Bit Substitution (LSB) [3] is the most commonly used stenographic technique.

Specific Objectives includes : To design an algorithm for steganography to preserve the marginal statistics of the cover image . 2. To implement the algorithm design on a platform

SCOPE OF STUDY This project incorporates cryptographic analysis and recording in addition to fundamental cryptosystem procedures. Image encoding, decoding, message embedding, and message extraction are among the procedures. The digital image encryption technology will improve user-to-user communication and safeguard sensitive information.

Physical System Design Physical design is concerned with the system's real input and output activities. This pertains to how the user enters information into the device as well as how the device proposes information to the user. In "" Cryptosystem, I present a description of how the device interacts with the user while receiving processed data, including screen shots of the device's input. The photos below demonstrate the device's user interface for data encoding

input. User Interface Screen for Embedding of Data using the Cryptosystem.

Output screen after a successful data embedding

User interface screen for decrypting of embedded data using the cryptosystem

CONCLUSION In summary, the cryptosystem as a security has a stealth way of guaranteeing the security of information . it was designed for any organization, users, firms etc. who engages in data transfer, within and outside their establishment.

THANK YOU. ANAJE AUGUSTINE CHUKWUNEDUM MATRIC NUMBER: NOU144632096 COURSE: MS.C. INFORMATION TECHNOLOGY STUDY CENTRE: ABEOKUTA, OGUN STATE.
Tags