A Novel Data Hiding Technique with Hybrid Approach II. RELATED WORK

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 4 - Apr 2014
A Novel Data Hiding Technique with Hybrid Approach
U.V.Chandra Sekhar, N.Sai sunitha, M.Prasanna
1
1,2,3
Asst Professor,2,3Student
Computer science and engineering, Raghu Engineering College, Visakhapatnam
Abstract: Even though Various approaches available
for transferring the data over networks, data
confidentiality and data sensitivity are still important
factors. In this paper we are proposing a novel hybrid
mechanism for secure transmission of data through the
images which are rotated by specific angles.
Experimental results shoes efficient key can be
generated by the Diffie Hellan key exchange protocol
and data can be encrypted by the DES algorithm ,data
can embed into the LSBs of the image and rotated by
specific angles.
I. INTRODUCTION
Three different aspects in information-hiding
systems contend with each other: capacity, security, and
robustness. Capacity refers to the amount of information
that can be hidden in the cover medium, security to an
eavesdropper’s inability to detect hidden information, and
robustness to the amount of modification the stego medium
can withstand before an adversary can destroy hidden
information. Information hiding generally relates to both
watermarking and steganography. A watermarking
system’s primary goal is to achieve a high level of
robustness—that is, it should be impossible to remove a
watermark without degrading the data object’s quality.
Steganography, on the other hand, strives for high security
and capacity, which often entails that the hidden
information is fragile. Even trivial modifications to the
stego medium can destroy it[1].
Internet users frequently need to store, send, or
receive private information. The most common way to do
this is to transform the data into a different form. The
resulting data can be understood only by those who know
how to return it to its original form. This method of
protecting information is known as encryption. A major
drawback to encryption is that the existence of data is not
hidden. Data that has been encrypted, although unreadable,
still exists as data. If given enough time, someone could
eventually unencrypt the data. A solution to this problem is
steganography. The ancient art of hiding messages so that
they are not detectable. No substitution or permutation was
used. The hidden message is plain, but unsuspecting to the
reader. Steganography's intent is to hide the existence of
the message, while cryptography scrambles a message so
that it cannot be understood[2].
ISSN: 2231-5381
II. RELATED WORK
Cryptography is the methods that allows
information to be sent in a secure form in such a way that
the only receiver is able to retrieve the information. Nowa-days, cryptography has many commercial applications. It
provides high level of privacy for individuals and groups.
However, the main purpose of the cryptography is not only
to provide confidentiality but also provide solutions for
other problems like: data integrity, authentication, nonrepudiation. Presently continuous researches on the new
cryptographic algorithms are going on. However, it is very
difficult to find out the specific algorithm they must
consider various factors like: security, the features of
algorithm, the time complexity and space complexity[1][2]
.
Visual Cryptography (VC) is a new technique of
cryptographic scheme, which can decrypt encrypted images
without any mathematical computations but with the help
of Human Visual System (HVS). Visual cryptography
scheme has many applications like secret sharing scheme,
Copyright
protection,
Half-toning
process
and
Watermarking. There are various schemes of Visual
Cryptography. Visual Cryptography scheme can also be
used for authentication and identification process (visual
authentication and identification)
III. PROPOSED APPROACH
We are proposing a novel and empirical model of data
hiding technique with image rotation,key exchange
protocol and cryptographic technique.Intially a key an
generated by the both the users using the diffie hellman key
exchange protocol and data can be converted to cipher
information and cipher data can be embedded into least
significant bits of the cover image and image can be
converted and forwarded to the receiver.
Receiver Initially de-rotate the image which is received
from the sender and extract the cipher information from the
lease significant bit positions of the image and decode the
cipher information using the DES algorithm and same key
which is generated by diffie hellman protocol and plain text
can be extracted .
http://www.ijettjournal.org
Page 205
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 4 - Apr 2014
Cover Image
Stego Image
Rotated Image
Cipher Text
Plain Text
Diffie-Hellaman &
DES
A) Architecture
DES:
DES is the one of the simple and efficient
cryptographic technique for secure transmission of data
over network .This cryptographic technique is a symmetric
key approach because sender and receiver uses the same
later, puplic key cryptography provides a solution to this.
Secret Key (K)
key for encryption and decryption. This would have to be
communicated over some secure channel which,
unfortunately, is not that easy to achieve. As will be seen
later, puplic key cryptography provides a solution to this.
One of the main problems with secret key cryptography is
key distribution. For this form of cryptography to work,
both parties must have a copy of the secret key. This would
have to be communicated over some secure channel which,
unfortunately, is not that easy to achieve. As will be seen
• Initially they are agree on two public prime
numbers p and g from the both ends. gis also
known as the generator
•
E {P,K}
Plain Text (P)
Alice selects a secret integer ‘a’ and calculates and
calculates
•
and forwards the x to Bob
Cipher Text (P)
•
D {C,K}
Secret Key (K)
x = ga mod p
Similarly Bob selects a secret integer
calculates
•
Plain Text (P)
y = gb mod p
and forwards the y to Alice
B) Key Exchange protocol
•
Diffie-Hellman is the one of the most efficient key
exchange algorithm is used where users are expecting data
confidentiality and security during the transmission of the
data .In this protocol of example we are considering two
users Alice and Bob.
Now alice calculates the below with the received
Y from Bob to achieve final session key
•
•
Ya mod p
Bob calculates the below with the received X to
achieve final session key at Bod end
•
ISSN: 2231-5381
‘b’ and
http://www.ijettjournal.org
Xb mod q
Page 206
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 4 - Apr 2014
Steganography and Cryptography are closely related
constructs. The hidden or embedded image, audio or a
video files act as carriers to send the private messages to
the destination without any security breach. Steganography
techniques can be implemented on various file formats
such as audio („.mp3‟, „.wmv.‟, etc.), video(„.mpeg‟,
„.dat‟, etc.) and images („.jpeg‟, „.bmp‟, etc.). However,
the images are the most preferred file format for this
technique. At present, there are a lot of algorithms that help
in executing the steganography software.
Data Replacement in LSB:
To hide the data in cover image initially convert the data
into binary and extract the least significant bit positions of
the image and place the binary information(i.e bit by bit)
in the LSBs. LSB (Least Significant Bit) substitution is the
process of adjusting the least significant bit pixels of the
cover image and it is a simple and efficient approach for
embedding message and the image. The Least Significant
Bit insertion varies according to number of bits in an
image. For an 8 bit image, the least significant bit i.e., the 8
th bit of each byte of the image is changed with the bit of
cipher text. For a 24 bit image, the colors of each
component like RGB (red, green and blue) are changed.
LSB is effective in using BMP images since the
compression in BMP is lossless.
four angles, noise will be added. It obviously leads to the
incorrect extraction of values at the receiver end during the
de-rotation of the image.
Our experiental results shows the cover image (Fig
1),stego image(Fig 2) and rotated image(Fig 3) as follows
Figure 1 (Cover Image)
C) Image Rotation Analysis
Stego image can be rotated with specific angle in
clockwise direction from the sender end with specific angle
for rotation of the image we considered the four angles
(90,180,270 and 360) other than these angles noise can be
added to the stego image. Receiver de-rotate the image in
anti-clockwise direction with required angle and retrieve
the de-rotated image and can easily extract the information
in the image.
Figure 2 (Stego Image)
D) Experimental Analysis
During the experimental investigation while embedding
the data into the images , we tested on the ASCII set of
characters(Alphabets,Numbers and special symbols),that
leads to the successful transactions, but it does not work
with other language set of characters,because while we are
converting the characters ,We are converting the each
character to respective ascii codes for binary conversion
before embedding the data in to the least significant bits
Figure 3 (Rotated Image)
IV.CONCLUSION
One more issue while Image rotation, In our proposed
approach, we had shown the rotation of the image with
specific four angles statically, we cannot rotate the image
with user specified angle because ,if angle not in the list of
ISSN: 2231-5381
We are concluding our research issue with efficient
cryptography, steganography and image rotation analysis.
Information can be efficiently encrypted by using DES
http://www.ijettjournal.org
Page 207
International Journal of Engineering Trends and Technology (IJETT) – Volume 10 Number 4 - Apr 2014
algorithm by using the key which is generated from the
diffie hellman key exchange protocol and image can be
rotated with specific angles and forwards to the receiver
and receiver de-rotate the image and extract the
information from the stego image
REFERENES
[1] Hide and Seek: An Introduction to Steganography.by NIELS and
provos and peter honeymman
[2] Steganography- A Data Hiding Technique aravind kumar and pooja.
[3] J Hoffstein., et al, " An Introduction to Mathematical Cryptography ",
First Edition. Springer Science & Business Media, (2008):, Germany.
[4] H.Kenneth, " Elementary Number Theory and Its Applications " Third
Edition. Addison-Wesley,
(1992): Germany.
[5] M.Lucas, " Thomas Jefferson wheel cipher ", Monticello Research
Department, Thomas Jefferson Foundation, Charlottesville, (1995):, VA.
[6] Steganography and steganalysis-Robert Krenn, Internet Publication,
March 2004
ISSN: 2231-5381
[7] Steganographic Techniques and their use in an Open-Systems
Environment-Bret Dunbar, The Information Security Reading Room,
SANS Institute 2002.
[8] Steganography Primer - Ruid, Computer Academic underground,2004
[9] Image Compression and Discrete Cosine Transform - Ken Cabeen and
Peter Gent,Math 45 College of the Redwoods,1998
[10] Practical Data Hiding in TCP/IP - Kamran Ahsan and Deepa Kundur
Multimedia and Security Workshop at ACM Multimedia,Juan-les-Pins,
France, Friday, Dec 6th, 2002
BIOGRAPHIES
U.V.Chandra Sekhar completed his MTech
and currently pursuing ph.D and working
as Assistant professor in the department of
CSE,
Raghu
Engineering
College
Dakammari, Visakhapatnam,AP,India. His
research
interests
are
Network
security,Data mining and image-processing
http://www.ijettjournal.org
Page 208
Download