PROVIDE SECURE AUTHENTICITY FOR PROPAGATING INFORMATION

advertisement
International Journal of Engineering Trends and Technology- May to June Issue 2011
PROVIDE SECURE AUTHENTICITY FOR PROPAGATING
INFORMATION
1
V.Sathya Preiya , 2S.Sathish Kumar, 3M.Shanmuganathan
1
2
Faculty, M.C.A, Panimalar Engineering College, Chennai
PG Scholar, M.C.A, Panimalar Engineering College, Chennai
3
Faculty, M.C.A, Panimalar Engineering College, Chennai
Abstract:
The data transfers using internet via EMail is rapidly growing. So many business people and
individuals using internet to transfer the documents
(e.g., letters, certificates etc.). Security is an important
issue while transferring data using E-mail because any
unauthorized person can hack the data. Consider a
method for preventing E-fraud in which the document
is scanned and generating an image which is formatted
as JPEG or PDF file. The image (scanned document) is
converting in to ciphertext using asymmetric
encryption algorithm. The encrypted information is
then hiding in to a host image using steganography. In
steganography use Least Significant Bit algorithm to
hide the ciphertext in to a host image, this image is
called as stegoimage. The stegoimage is sent as an
attachment to destination through email using Simple
Mail Transfer protocol. It provides higher security to
protect the data from hackers. Then download the
stegoimage from the email, using steganography to
extract the ciphertext from the host image. Decryption
is accompanished by convert the ciphertext in to image
(scanned document). In this project focus the secure
authentication of E-document (eg. letters, certificates)
that are communicated over the internet.
I. Introduction
The aim of this paper is to provide the secure
authentication for E-documents. In the current trends of the
world, the technologies have advanced so much that most
of the individuals prefer using the internet as the primary
medium to transfer data from one end to another across the
world. Most of them use to transmit data using the
internet: via e-mails. The data transition is made very
simple, fast and accurate using the internet.
However, one of the main problems with
sending data over the internet Via e-mail is the security
threat it poses i.e. the personal or confidential data can be
stolen or hacked in many ways. Therefore it becomes very
important to take data security in to consideration, as it is
one of the most essential factors that need attention during
ISSN:2231-5381
the process of data transferring. Data security basically
means protection of data from unauthorized users or
hackers and providing high security to prevent data
modification. This area of data security has gained more
attention over the recent period of time due to the massive
increase in data transfer rate over the internet. In order to
improve the security features in data transfers over the
internet, many techniques have been developed like:
Cryptography, Steganography and digital watermarking.
While Cryptography is a method to conceal information by
encrypting it to cipher texts and transmitting it to the
intended receiver using an unknown key, Steganography
provides further security by hiding the cipher text into a
seemingly invisible image.
Steganography is the art of hiding and
transmitting data through apparently innocuous carriers to
conceal the existence of data. The level of visibility is
decreased using many hiding techniques in Image
Modeling like LSB Manipulation, Masking and filtering.
Cryptography is the art of science used to achieve security
by encoding the data to transform them into non readable
formats so that unauthorized users cannot access to it.
II. Existing System
The weaknesses of all encryption
systems is that the form of the output data (the cipher text),
if intercepted, alerts the intruder to the fact that the
information being transmitted may have some importance
and that it is therefore worth attacking and attempting to
decrypt it. This aspect of cipher text transmission can be
used to propagate disinformation, achieved by encrypting
information that is specifically designed to be intercepted
and decrypted. In this case, we assume that the intercept
will be attacked, decrypted and the information retrieved.
There is no security when transmitting the data from one
end to another.
III. Proposed System
The main objective of the proposed
system is to hide the encrypted message or a secret data in
to an image which further act as a carrier of secret data
- 120 -
IJETT
International Journal of Engineering Trends and Technology- May to June Issue 2011
and to transmit to the destination securely without any
modification. If there are any perceivable changes when
inserting or embedding the information into the image or if
any distortions occur in the image or on its resolution there
may be a chance for an unauthorized person to modify the
data. So, the data encryption into an image and decryption
and steganography is used to protect the data from
unauthorized person, this plays a major role in the project.
The scheme allows for the authentication and selfauthentication of documents such as letters, certificates
and other image based data. The encrypted watermark can
be camouflaged to obfuscate its existence and the
applications to which the method can be applied are
numerous. For example, the self-authentication of edocuments sent as attachments over the internet provides a
unique facility for many legal and financial transactions
that have traditionally relied on paper based documents to
secure authenticity.
IV. Module Description
1. Image Conversion
2. Encryption
3. Hiding Text
Hiding Text
Steganography is the process of hiding the one
information in to other sources of information like text,
image or audio file so that it is not visible to the natural
view. Here, the image is encrypted, then encrypted
information hidden in a host image using least significant
bit algorithm. LSB is a process adjusting least significant
bit pixels of the carrier image. It is a simple approach to
embedding a message in to the image.
The Least Significant Bit insertion varies
according to number of bits in an image. The encrypted
text is hiding in to an 8 bit image (BMP Image); the least
significant bit i.e., the 8thbit of each byte of the image is
changed to the bit of secret message. LSB is effective in
using BMP images since the compression in BMP is
lossless. But for hiding the encrypted information inside an
image of BMP file using LSB algorithm it requires a large
image which is used as a cover. The encrypted information
is hidden in a cover image is called as stegoimage. The
stego key is used to extract the hidden data from a
stegoimage.The stego key is a secret key used to protect
the hidden message in an image. The stegoimage should be
sent as an attachment to destination through the mail using
SMTP protocol.
4. Text Extraction
5. Decryption
Text Extraction
Image Conversion
To convert the image into binary image by
using Quantization Technique. The color Quantization is a
process that reduces the number of distinct colors in an
image. It is a lossy compression technique achieved by
compressing a range of values. When convert an image in
to 1-bit per pixel they have a chance to losing image
quality. By using this technique quality of the image is
maintained. When converting an image in to one bit per
pixel, in signal processing the frequency values may be
vary. If the value is decimal then quality of an image is
loss, by using quantization round off the decimal value for
a quality image.
Encryption
The binary image should be converted in to
block of bytes using serialization. The encrypting data
(block of bytes) using an asymmetric encryption algorithm.
Interpret each pair of bytes as a decimal integer value. Use
the encryption function to encrypt the numeric plaintext
values using the public key. The encrypted function gives
an integer value, and then converts the integer value in to
hexadecimal value. Concatenate the hexadecimal value to
form a cipher text.
ISSN:2231-5381
The stegoimage is downloading from the Email, read the watermarked image from a file. The hidden
text is extracted from the host image using a stego key.
The stego key is used to extract the lowest 1-bit layer from
the image. The stego key finds the 8-bit binary number of
each pixel RGB color. The LSB of each pixel's 8-bit binary
number is one bit of the hidden data file. Extract the one
bit from an image; finally get the secret data and the
hidden message stored in a file.
Decryption
The encrypted information extract from an
image and using a private key to decrypt the hidden
message. Break the ciphertext into small blocks of data
that are the same length as the public key modulus. The
blocks of data containing a hexadecimal string. The
interpret each hexadecimal string as a decimal integer
value. Use the decryption function to decrypt the integer
values using the private key. Represent each decrypted
value as a pair of bytes. By using decryption the
ciphertext convert in to block of bytes .After decryption
the bytes converted in to binary image using
deserialization.The block of bytes are convert in to 1-bit
per pixel by using deserialization.The binary image is
converted in to image by using dequantization.
- 121 -
IJETT
International Journal of Engineering Trends and Technology- May to June Issue 2011
encrypted information is embedded and is protected with a
password which is highly secured. By using this
application the image (scanned document) is securely sent
to the destination through E-mail. The proposed approach
provides higher security and can protect the message from
stego attacks.
By using the Least Significant Bit algorithm in
this project for developing the application which is faster
and reliable and compression ratio is moderate compared
to other algorithms.The major limitation of the application
is designed for bit map images (.bmp). It accepts only bit
map images as a carrier file, and the compression depends
on the document size as well as the carrier image size.
Architectural Design
Sender
VI. Future Enhancement
The future work on this project is to
improve the compression ratio of the image. In future
different types of images are used to hide the encrypted
information. The types of image fomats like .jpeg, .gif,
.jpg, .tif etc. The security using Least Significant Bit
Algorithm is good but we can improve security level in
future to use F5 Algorithm and JSTEG algorithm. As well
as using different algorithm for encryption and decryption.
VII.
Reciever
References
[1] S.Katzenbeisser and F.Petitcolas, “Information Hiding
Techniques for Steganograph and Digital Watermarking”,
Artech House, 2000.
[2] N. F. Johnson, Z. Duric and S. Jajodia, “Information
Hiding: The Steganography and Watermarking - Attacks
and Countermeasures”,Kluwer Academicf Publishers,
2001.
[3] P. R. Marie, “Fractal-Based Models for Internet
Traffic and Their Application to Secure Data
Transmission”, PhD Thesis, Loughborough University,
2007.
[4] W. R. Harwood, “The Disinformation Cycle: Hoaxes,
Delusions, Security Beliefs, and Compulsory Mediocrity” ,
XlibrisCorporation, 2002.
V. Conclusion
Security is an important issue while
transferring the data using internet via E-mail because any
unauthorized person can hack the data. The proposed
approach provides higher security to protect the data. The
proposed approach in this project uses a new
steganographic approach called image steganography,
cryptography
and
quantization
technique.
The
cryptography provides secure solution to convert the image
in to unreadable format. The Quantization provides the
quality image when converting image in to binary image.
The application creates a stego image in which the
ISSN:2231-5381
[5] T. Newark and J. F. Borsarello, “Book of Camouflage
Brassey’s”, 2002.
[6] H. Gerrad and P.D.Antill, Crete 1941: “Germany’s
Lightning Airborne Assault, Osprey Publishing” , 2005.
[7] R. Canetti, C. Dwork, M. Naor and R. Ostrovsky.
“Deniable Encryption, Theory of ryptography Library” ,
ePrint Archive, 1996.
- 122 -
IJETT
Download