An Improved Pixel Transpose Technique over Images Menda.VasudhaRani

advertisement

International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014

An Improved Pixel Transpose Technique over Images

Menda.VasudhaRani

1

, JayanthiRao Madina

2

1 Final M.Tech Student, 2 Head of the Department

1, 2 Dept of CSE, Sarada Institute of Science, Technology And Management(SISTAM), Srikakulam, Andhra Pradesh

Abstract:In this proposed work we are emphasis on data privacy along with data embedding an extraction of data from and to image, for secure transmission of data we are proposing a simple and secure cryptography technique. In this paper we are proposed technique for image encryption and compression along with data confidentiality; with this technique we can also increase the efficiency of the system.In initial phase before transferring image through network we can hide data into image, prior to that, data into can be encrypted with AES algorithm and hide into image, followed by a image encryption with POTT (pixels xor transpose technique). In this paper we can also use arithmetic coding technique for image compression and decompression. By providing those techniques we can improve efficiency and more security of given system.

I.INTRODUCTION

Present days there is increase in network usage.

Many users are communicating and exchanging information through network. Due to rapid increase of the data exchange there is increase in malicious users also. For reducing the malicious attacks there are many researches done and still the researches are going on for increasing security over the network. But many of the methods are failed to reduce and defend over the network. Researchers focused on many issues such as the data embedding, image quality, data transferring, and data receiving, extracting message from the image. [1][2]

Coming to data embedding it is also referred as data hiding in image there so many techniques such as encrypting of the message before embedding. In this concept cryptographic methods are introduced in steganography techniques. Initially the researchers introduced a public key cryptographic technique. In this technique users have to execute key exchanging protocol. After generating secret keys encrypt the text message and embed in image pixels.

In previous days transfer the image and data through network in form of plain format. So that transferring data and image in form of plain is will loss the security in a network. So that we can provide the security the

Transferring image and data can be sent in form of unknown format. So that by convert data and image into unknown format we can encrypt image by using any technique.[1,5]

The main aim of encoding or encryption is to provide the confidentiality over the communication and storage process. In present days the usage is considered as particular devices that consider extra features those are calculations over authorized computers. For this use unauthorized nodes is only the encoded version of the data in the process. The nodes will calculation on the encoded data without having any knowledge on the real value.

Lastly the data send back and decrypt the data. [4]

The most well-known cryptosystems are deterministic: for a fixed encryption key, a given plain text will always be encrypted in the same cipher text. This may lead to some drawbacks.RSA is a good example to illustrate this point:

(i) Particular plain texts may be encrypted in a too much structured way: with RSA, messages 0 and 1 are always encrypted as 0 and 1, respectively;

(ii) it may be easy to compute partial information about the plaintext: with RSA, the cipher text c leaks one bit of information about the plain text m, namely, the so called

Jacobi symbol;

(iii) when using a deterministic encryption scheme, it is easy to detect when the same message is sent twice while processed with the same key.

II. RELATEDWORK

In recent studies the digital signaling is enabled in many number of applications. It is introduced in multimedia systems and these services are using in secret communication. Present technical solutions are secure modifications of the data using cryptographic methods using secure network layer techniques. That is for protecting data at the time of transferring the data. This tends to the cryptographic layer features by generating to protect the unauthorized access of the users. It is for providing the authorize access in the network for data access.[7,8]

It is clear that the availability of signal processing algorithms that work directly on encrypted signals would be of great help for application scenarios where signals must be produced, processed, or exchanged securely.

ISSN: 2231-5381 http://www.ijettjournal.org

Page 280

International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014

2. Read Image

Sender

3. en cr yp t

Im

1.Encrypt Data

POTT

7. retrieve data and decrypt

AES

6.De

cryp t ima ge

8. get plain text and original image

Receiver

4.Compress image

Whereas the development of tools capable of processing encrypted signals may seem a formidable task, some recent, still scattered, studies, spanning from secure embedding and detection of digital watermarks and secure content distribution to compression of encrypted data and access to encrypted databases, have shown that performing signal processing operations in encrypted content is indeed possible.[6]

Coming to security issues the encryption schemes are formatted for initial time and it introduced an author

Shannon that is best method to provide perfect secrecy which the encoding methods are not given any information about plain text or about key. In this method it is proved that one time pad that is successfully protected under some particular conditions.

This model has allowed the study of the security level for numerous asymmetric ciphers. Recent works show that we are now able to perform proofs in a more realistic model called the standard model. From [2] to [3], a lot of papers compared these two models, discussing the gap between them. In parallel with this formal estimation of the security level, an empirical one is performed in any case, and new symmetric and asymmetric schemes are evaluated according to published attacks.

III.PROPOSED SYSTEM

Arithmetic coding

5. de co m pr es s

In this proposed architecture Sender forwards the plain data to encoder to convert into cipher information and embeds the cipher information into the image ,then image can be encrypted and followed by compression of image and reverse process can be done at the receiver end.

Now day steganography places an important role for provide more security in the network. In this paper we are propose concepts of data hiding, image encryption and compression of image.So using those techniques we can improve the efficiency and security of given system. The following are over all description of given system.

Data hide into Image:

In this module the sender will hide data into sent image by using LSB technique. Before stored data into image we can encrypt by using AES algorithm. After encrypting the data the sender will get cipher text and convert into binary format. After converting binary format the user get the sent image and get the pixel from the image. In that pixel take the LSB bit and put the data in that place.This process will continue up to the completion of data. After hiding the data into pixel and generate data hide image.

Pixel xor Transpose Technique:

In this module the image should be encrypt and decryptby using pixel xor transpose technique.In this the sender will encrypt the image before sending it. The sender

ISSN: 2231-5381 http://www.ijettjournal.org

Page 281

International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014 will take the data hide image and encrypt by using following procedure.

Encryption process:

(i) First of all select whole image and give named as I.

(ii) Then stored all the pixels value of I in two dimensional array named as P like every image have rows or column wise pixels.

(iii) Firstly row wise XOR all the bits of pixel from top to bottom like as firstly XOR first and second row and then store first row as XOR

Result and second rows as it is than XOR second and third rows and store as according to previous operation and then apply to all the rows.

(iv) A square grid of required size constructed by taking binary data from the xor data.

( V) Now grid transposition applied by reading data diagonally and writing it down on row basis from left to right.

(Vi) A new grid generated after transposition.

(vii) The new grid is converted into ASCII sequence and written into Image file.

Decryption process:

After decompression of image the image can be converted into pixel and perform the decryption process.

(i) A square grid of required size constructed by taking binary data from the

(ii)

Image file.

Now grid transposition applied by reading data diagonally and writing it

Down on row basis from left to right.

(iii) A new grid generated after transposition.

(iv) After column wise XOR all the bits of pixel

(v) from right to left like as firstly XOR last and lase second column until completion of reverse process encryption. After column xor again perform the row wise from right to left.

Then stored all the pixels value of I in two dimensional array named as P

And getting original image.

Compression and DecompressionImage:

After completion image encryption the sender will compress the sent image. The compression of image can be done by using arithmetic coding technique. The completion of image compression the sender will send to receiver. The receiver will retrieve the compressed image and decompress that image using arithmetic coding technique.By performing this technique we can improve efficiency of given system.

IV. CONCLUSION

The main objective of steganography is to provide more security for transferring image and data. In this paper we are proposed concepts for data hiding, image encryption and decryption. Another concept for improving the efficiency of given system is image compression and decompression.By proposing those concepts we can provide more security and efficiency of given system. In this the concept hiding data into image we are using LSB technique. After hiding data we can encrypt the data hided image by using POTT technique. After completion of encryption process we can compressed and sent to receiver.

The receiver will receive the compressed image and perform reverse process getting the original plain text and image. So that by proposing those concepts we improve the efficiency of the given system.

References :

[1] “Methods for subjective determination of transmission quality,” ITU-R Recommendation P.800, 1996.

[2] “Methodology for the subjective assessment of the quality of television pictures,” ITU-R Recommendation

BT.500-11, 2002.

[3] I. Avcibas, B. Sankur, and K. Sayood, “Statistical evaluation of image quality measures,” Journal of

Electronic Imaging, vol. 11, no. 2, pp. 206–223, 2002.

[4] G. Chen, Y.Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos,

Solitonsand Fractals, vol. 21, no. 3, pp. 749–761, 2004.

[5] S.-G. Cho, Z. Bojkovic, D. Milovanovic, J. Lee, and J.-

J.Hwang, “Image quality evaluation: Jpeg 2000 versus intraonlyh.264/avc high profile,” FactaUniversitatis, Nis,

Series: Electronics and Energetics, vol. 20, no. 1, pp. 71–

83, 2007.

ISSN: 2231-5381 http://www.ijettjournal.org

Page 282

International Journal of Engineering Trends and Technology (IJETT) – Volume17 Number6–Nov2014

[6] J. Daemen and V. Rijmen, The Design of Rijndael:

AES—The Advanced Encryption Standard, Springer, New

York, NY, USA,2002.

[7] A. M. Eskicioglu, “Quality measurement for monochrome compressed images in the past 25 years,” in

Proceedings of IEEEInternational Conference on

Acoustics, Speech and Signal Processing(ICASSP ’00), vol. 4, pp. 1907–1910, Istanbul, Turkey,June 2000.

[8] J. Fridrich, “Symmetric ciphers based on twodimensional chaotic maps,” International Journal of

Bifurcation and Chaosin Applied Sciences and

Engineering, vol. 8, no. 6, pp. 1259–1284, 1998.

[9] B. Furht and D. Kirovski, Eds.,Multimedia Security

Handbook,CRC Press, Boca Raton, Fla, USA, 2005.

[10] M. Gschwandtner, A. Uhl, and P. Wild, “Compression of encrypted visual data,” in Proceedings of the 10th IFIP

International Conference on Communications and

Multimedia Security(CMS ’06), H. Leitold and E.

Markatos, Eds., vol. 4237 of Lecture Notes on Computer

Science, pp. 141–150, Springer, Crete, Greece, October

2006.

BIOGRAPHIES

Menda.VasudhaRani is a student of

M.Tech(CSE) in Sarada Institute of science

Technology And Management, Srikakulam. I received my B.Tech(IT) from Aditya

Institute of Technology And

Management(AITAM),Tekkali. My interesting areas are Information Security, Network

Security,Java.

JayanthiRaoMadina is working as a

HODin Sarada Institute of Science,

TechnologyAnd Management(SISTAM),

Srikakulam,Andhra Pradesh. He received his M.Tech(CSE) from Aditya Institute of

Technology And Management(AITAM),

Tekkali. Andhra Pradesh. His research areas include Image Processing, Computer Networks,

DataMining, Distributed Systems. He published six papers ininternational journals and he attended for threeconferences.

ISSN: 2231-5381 http://www.ijettjournal.org

Page 283

Download