A Review Based Study of Hybrid Security Schemes

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- July 2013
A Review Based Study of Hybrid Security Schemes
Based on Compression, Encryption and Steganography
Jyoti Gaba#1, Dr Mukesh kumar sharma#2
#1
M.Tech Scholar, CSE Department, T.I.T&S Bhiwani (M.D.U. Rohtak), Haryana, India
#2
Professor, CSE Department, M.D.U. Rohtak, Haryana, India
Abstract— Information exchange over the network is no more
secure. Intruders and eavesdroppers always try to expose the
secret information either to take benefit out of it or just to show
their technical expertise. Encryption has been the tool to shelter
the text for a long time. Its main downside is that it draws
attention of unauthorized people due to the fact that message is
incomprehensible. Steganography avoids attention by hiding the
information behind some digitally representative media, but, it
carries the text as it is. The threats from the attackers have
increased tremendously in recent years and neither of these two
tools is secure enough in solitary. These two tools can be
combined to give the attacker a tough fight in discovering the
text. Lossless compression can be used to trim down the
information before encoding it. It can be united with encryption
and steganography so as to make the task even more complicated
for invader. This paper reviews some algorithms uniting these
techniques.
Keywords— Cryptography, Steganography, Compression
I. INTRODUCTION
the media.
Encryption makes the text unintelligible.
Steganography thwarts suspicion on the presence of data. The rest
of the paper is organized as follows. Section II provides some
background on cryptography, steganography and compression
techniques. Section III reviews some algorithms that combine
these three. Section IV concludes the paper.
II. BACKGROUND
A. Cryptographic Techniques
Three types of algorithms
cryptography:
are
used
generally
in
1) Symmetric Key Cryptography (SKC): Uses an identical
key for both encryption and decryption. These algorithms are
fast to implement. But in these techniques data is secure only
as long as the key is secure so it must be delivered with
utmost security.
2) Asymmetric Key Cryptography (PKC: Uses one key for
encryption and a different for decryption. These are drastically
slow in operation.
Cryptography and steganography are well accepted
techniques intended to enable secure data exchange between
two parties. These techniques use different approaches to
3) Hash Functions: Uses a mathematical transformation to
achieve this objective. The word cryptography is derived from
the Greek word kryptos, meaning ’hidden’. So, cryptography irretrievably "encrypt" information. Therefore, once the plain text
encrypts the text thus changing its meaning and making it is enciphered to generate the cipher text, the process cannot be
unintelligible.
reversed to generate plain text back from cipher text. These are
The word steganography is derived from the Greek words
steganos, meaning ’covered’, and graphy, meaning ’drawing’ generally used in password verification.
or ‘writing’. Steganography is the art and science of hiding
information so that its presence cannot be detected [1]. As a B. Steganography Techniques
result, steganography hides the existence of text and does not
In steganography, information can be hidden behind vast variety
raise suspicion in mind of the intruder [2]. If someone
suspects the presence of information, steganography has failed of media like images, audio, video, text, or some other digitally
to serve its purpose [3]. Compression is the technique used to representative code. There are quite a lot of appropriate carriers
compress plain text to generate compressed text in order to that can be used as the cover-object [4]:
decrease space utilization. Additionally, it reduces the i) Protocols such as TCP, IP and UDP.
ii) Audio files having formats such as midi, avi, mpeg, mpi
bandwidth requirements for transmitting the text.
and voc.
If we follow three steps: Initially, compress the data, then, encrypt
iii) Text files such as html and java.
it and finally, mask it behind some other media, it can provide
iv) File and Disk that can hide and append files by
incredible security. Thus, these three techniques, if combinedcan
using the slack space
can provide unbreakable security of confidential data.
v) Image files such as bmp, gif and jpg, including both color
Compression reduces storage space and bandwidth requirements to
transmit data. Moreover, it requires less data to be hidden behind
and gray-scale.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 3243
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- July 2013
Basically Steganography techniques can be characterized as
follows [8]
1) Text Steganography: It is one of the toughest types of
coding as it involves altering the structure of a text file to hide
secret text. In this case, huge amounts of data are required to
hide the text. Its prevalent techniques are line-shift coding,
word-shift coding, feature coding etc.
Data compression techniques can be grouped into two
categories: lossy and lossless.
1) Lossy Compression techniques: Compresses data at the
cost that data cannot be exactly recovered as it was before
compression. The reason being these techniques remove
redundant information that cannot be reinstated. These are
generally used to compress images, audio, video etc. But these
techniques provide a larger compression ratio than lossless
ones.
2) Lossless Compression: These techniques compress data
such that it can be retrieved as it is after decompression.
Compression ratio achieved by these techniques is usually
smaller and more processing power is required to accomplish
the operation. Text files are generally compressed by this
technique. Various algorithms for lossy compression are run
length encoding, Huffman encoding, LZW encoding etc.
2) Image steganography: In this, the secret text is hidden
behind a cover image by modifying some bits of its pixels. It
is an effective technique because of the limitations of human III. ALGORITHMS C OMBINING C RYPTOGRAPHY, STEGANOGRAPHY AND
eye to identify minute change of colours. Its prevalent
C OMPRESSION
techniques are Least Significant Bits, Masking and filtering,
A. CCS (Compressed Crypto Stegno) Scheme
transformations etc.
To meet the ever increasing security needs G. Manikandan,
N. Sairam and M. Kamarasan proposed CCSM[6]
(Compressed Crypto Stegno Model) that unites three practices
described above. This proposal uses LZW lossless
compression algorithm to compress the data at the initial step.
The data can be perfectly reproduced at the other end due to
the lossless behavior of this algorithm. After compressing the
C. Comparing Cryptography with Steganography
data, it is encoded by BlowFish algorithm. BlowFish is a
Basically, both serve the same purpose. However, they fiestel based symmetric block cipher that comprises of 16
differ significantly. Cryptography hides the contents of a iterative rounds. This approach uses a modified F-function
secret message from malicious people, whereas steganography that substitutes 2 addition operations and one XOR operation
even conceals the existence of the message. Both can be by 2 XOR operations, one addition operation and one circular
shift operation. After enciphering the compressed text, the
contrasted as follows [5]
resultant data is masked behind an image using the LSB
(Least Significant Bit) approach which is a relatively simple
1) Known vs. unknown: Cryptography passes the message
technique. It substitutes the LSB of some selected pixels by a
consciously whereas steganography unsuspectingly.
bit from the cipher text. Thus this technique hides 3 bits in
every 24 bits value of a pixel. This results in a very
2) Detection vs. discovery: Cryptography conceal the contents of
insignificant alteration of the cover image that is
communication thus preventing its discovery whereas
imperceptible to human eye. After performing these three
steps at the sender side, exactly mirror image of these steps is
steganography hides the detection of the communication
performed by the other party. Thus, first extracting the
masked message from the cover image, then, decoding it and
3) Structure of message: Cryptography scrambels the structure
ultimately decompressing it to get the intended plain text. The
of confidential message whereas steganography does not.
following diagram depicts the sender side operations
4)
Technology: Cryptography has a huge range of performed in this model
algorithms and common technology whereas for
steganography technology is still being developed.
3) Audio steganography: In this technique, secret text is
masked behind an audio file. It is also a complex technique as
humans can determine a slight variation in audio quality.
Common techniques under this category are LSB coding,
phase coding, spread spectrum, echo hiding etc.
D. Compression Techniques
ISSN: 2231-5381
http://www.ijettjournal.org
Page 3244
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- July 2013
C.
Information Hiding Using LSB Steganography and
Cryptography
This scheme proposed by S. Gupta, A. Goyal and B.
Bhushan combines public key cryptosystems such as RSA and
Diffie Hellman with LSB steganographic method [9]. The
scheme first encrypts the message with either RSA or Diffie
Hellman and then hides the binary equivalent of the encrypted
message behind Least Significant Bits of the carrier image.
The transmitted image when received at other side is used to
extract the embedded bits of the message from Least
Significant Bits. The same algorithm used for encryption at
the sender side is used at the receiver side to decrypt the
extracted bits. The authors have experimented by hiding
varying number of bits in each pixel of the carrier image. The
results indicate that as the size of the image increases, time
complexity increases proportionally. Moreover, with the
increase in number of bits hidden behind the image,
complexity also increases. RSA provides more security when
united with steganography but increases the time complexity
as compared to Diffie Hellman.
B. CrypSteg Algorithm
This scheme proposed by P. Bharti and R. Soni combines
both cryptography and steganography to satisfy the needs of
secure communication such as security, capacity and
robustness [7].
D. Twelve Square Substitution Cipher And Index Variable
Based Steganography
This approach proposes a new encryption algorithm namely
twelve square [10]. It can be used to encipher alphabets, digits
and special characters too. It uses two different tables
comprising of 6 squares each.
In the encryption process, the key value is concatenated 8
times and first 8 characters are selected. ASCII values of these
chosen characters are added together and the resultant is
divided by 1000 to achieve a three digit number. Let it be
denoted by N1N2N3. 1st ,4th ,7th ……… characters of the
plain text are shifted by N1, 2nd ,5th ,8th ……… characters are
shifted by N2 and 3rd ,6th ,9th ……… characters are shifted by
N3.
In the steganography process, the image is partitioned into
4*4 pixel blocks. The enciphered data is converted to binary
and masked behind Least Significant bits (LSB) of the
diagonal pixels. Thus, 4 bits are hidden behind 4*4 pixel
block. This algorithm is very competent for little amount of
data and for the cases where cover image has its pixels
homogenously scattered.
First table is used to encrypt alphabets and second table for
digits and special characters. For first character square 1st &
4th are used. The position of the character in 1st square is
located and the corresponding character at the same location
in 4th square is substituted for it. For 2nd character, 2nd and 5th
ISSN: 2231-5381
http://www.ijettjournal.org
Page 3245
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- July 2013
squares and for 3rd character, 3rd and 6th squares are used,
wounding to 1st and 4th square for the next character and so on.
After encrypting the text, both the cipher text and the carrier
image are converted to binary form. The number of bytes in
the cipher text is divided by 3 to calculate an index variable
denoted by p. This index variable determines the particular
bits in the pixel behind which the bits of cipher text will be
masked. For p=0, 6th and 7th bits, for p=1, 7th and 8th bits and
for p=2, 6th and 8th bits of the pixel are used to hide the bits of
the cipher text. The value of p is incremented with every pixel.
This method is very much preventive against frequency
analysis attack due to the nature of the twelve square
substitution cipher.
E. Transmitting Cryptographic Data Through Steganography
This technique[11] combines the cryptography and
steganography approaches. To begin with the data is
enciphered with the assistance of a secret key and cipher text
is produced as a result. The encoded text is then embedded
and covered behind the cover-image. Finally, the stego-image
is transmitted to the other party. The other side performs the
reverse process. It first filters the received image and restores
the pixels so as not to alter the original cipher text. Then it
retrieves the plain text by decrypting the cipher text.
F.
A New Horizon in Data Security by Combining
Cryptography And Steganography
This paper designs a new system that comprises of four sub
components[12]
IV. CONCLUSIONS
Looking at the ever growing security requirement, the
cryptography and the steganography techniques are not
sufficient single-handedly to protect the secret data.
Cryptography draws attention towards the incomprehensible
text and attracts the malicious users to break it. Steganography,
though do not arise suspicion but, if compromised, may reveal
the secret data in its original form. These can be treated as one
entity to enhance the protection. They can further be
supplemented with compression to remove redundant data
before hiding the text which will also reduce storage
requirements. This paper provides a review of some common
algorithms and schemes that combine two or all three of these
techniques. Future work may encompass different
combinations of cryptography and steganography techniques
so as to decrease the time complexity and to boost the security.
REFERENCES
[1]
1) Compression component: It compresses the input text by
Huffman encoding scheme
[2]
2) Crypto component: This unit enciphers the compressed
text by using the AES symmetric encryption scheme using
128 bit key. The resultant is converted to hexadecimal form.
[4]
3) Security module: This unit hides the first 7 hex values
and uses the rest of them to produce a key. It adds additional
security to the system
4) Stego-module: To begin with, capture 7 hex values from
above component and jumble these values using 64 bit key.
Now take a gray scale image and calculate its DCT. Hide the
coded text by modifying DCTs. To find stego-image apply
inverse DCT.
[3]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
ISSN: 2231-5381
C . Cachin, “An Information-Theoretic Model for Steganography”, in
proceeding 2nd Information Hiding Workshop, vol. 1525, pp. 306-318,
1998
N.F. Johnson, S. Jajodia, “Staganalysis: The Investigation of Hiding
Information”, IEEE, pp. 113-116, 1998.
D. Artz, “Digital Steganography: Hiding Data within Data”, IEEE
Internet Computing, pp. 75-80, May-Jun 2001.
RA Isbell, “Steganography: Hidden Menace or Hidden Saviour”,
Steganography White Paper, IO May 2002.
M. M Amin, M. Salleh, S . Ibrahim, M.R.K atmin, and M.Z.I.
Shamsuddin, “Information Hiding using Steganography” , in
proceeding 4th
National Conference on Telecommunication
Technology Proceedings, Shah Alam, Malaysia, IEEE, pp. 21-25, 2003
G. Manikandan, N. Sairam and M. Kamarasan, “A Hybrid Approach
for Security Enhancement by Compressed Crypto-Stegno Scheme”,
Research Journal of Applied Sciences, Engineering and Technology,
pp. 608-614, 2012
P. Bharti, R. Soni, “ A New Approach of Data Hiding in Images using
Cryptography and Steganography”, International Journal of Computer
Applications, Volume 58– No.18, pp. 1-4, Nov 2012
M. Nosrati, R. Karimi, M. Hariri, “World Applied Programming”, Vol
(1), No (3),pp. 191-195, Aug 2011
S. Gupta, A. Goyal, B. Bhushan, “Information Hiding Using Least
Significant Bit Steganography and Cryptography”,
I.J. Modern
Education and Computer Science, pp. 27-34, june 2012
G.Swain, S.K Lenka, “Steganography Using the Twelve Square
Substitution Cipher and an Index Variable”, IEEE ,pp. 84-88, Nov.
2011
M.A.Mufti, A. Khan, M.S.H. Khiyal, A. Munir, “Transmitting
Cryptographic data through Steganography”, IJCSI, pp. 283-286 Vol. 9,
Issue 2, No 3, March 2012
D.K. Sarmah, N. Bajpai, “A new horizon in data security by
Cryptography & Steganography”, IJCSIT, pp.212-220, Vol. 1 (4), 2010
http://www.ijettjournal.org
Page 3246
Download