Visual Cryptography and BPCS Steganography for Data Shielding

advertisement
Visual Cryptography and BPCS Steganography for Data
Shielding
Prashant Lahane1, Yashashri Kumbhar2, Suraj Patil3, Swati More4, Meenali Barse5
Pune University, Department of Computer Engineering,
MIT College Of Engineering, Pune-38, India
ABSTRACT
The information is used for communication in
many applications which are in a secrete format.
Security is one of the most vital factors for
transferring different types of important
documents. For transfer of documents internet is
easy medium, it has wide range of applications.
But in reality the internet is not a secure form.
So we are suggesting use of VC method which
is simple, fast and provide security while
sharing secretes documents over the internet.
These documents are presented in a BMP
images. They are then extended it into two
encoded shares which can be transferred to the
receiver in a cover image using Bit Plane
Complexity Segmentation technology through
email. The segmentation method is used to store
data and data will be stored at higher
complexity. In steganography, data is hidden
into vessel image. Existing technique can hide
up to 15% of data amount of vessel image. But
hiding capacity of BPCS technique ranges up to
50 – 60%. Hence, the final image can be
obtained only when the shares are combined
together at receiving side. By using VC and
BPCS technologies together provides data
security to all forms of documents while
transferring over internet.
Keywords
VC (Visual Cryptography), Steganography,
vessel image, BPCS (Bit Plane Complexity
Segmentation), SI (Secrete Image), Information
Hiding, Encryption, Decryption, Complexity,
Bit plane, Segmentation.
INTRODUCTION
With the rapid improvement of network
technology,
multimedia
information
is
transmitted using the Internet easily. Various
confidential data such as military maps and
commercial identifications are transmitted over
the Internet. For transferring the documents
internet is used. So security is one of the most
important factors to be considered while
transferring different kinds of data. But in
reality internet is not secure medium because
one can easily hack confidential information in
document.
Due to the security problems of secret
images, various image secret sharing methods
have been developed. Visual cryptography is
introduced for the first time in 1994 by Noar and
Shamir [1]. Visual Cryptography is a special
encryption technique for providing security with
images. In this technique, using pixel expansion
method the Secret Image is expanded into
shares. So by overlapping shares original secret
image
can
be
obtained
back.Visual
cryptography scheme helps to eliminate
complex computation problem in decryption
process. Therefore visual cryptography is useful
for the low computation load requirement.
Steganography is another method
towards obtaining data security. The word
steganography has Greek origin. It means
“Covered Writing”. Steganography is technique
of data hiding technique in which secret data is
hidden into vessel image. The hiding capacity of
steganographic technique ranges up to 50 –
60%. A Stego-key is used to control the hiding
process for restricting detection and/or recovery
of the embedded data. LSB is one of the
techniques of steganography in which important
information is stored at LSB position. So
anyone can detect data easily. Capacity of data
vessel is nearly 5-10%.
So we invented new technique and this
technique is called Bit Plane Complexity
Segmentation (BPCS) Steganography which is
used to hide secret information in the form of
color image. It will store large amount of
information in the image. The data is stored in
highly complicated regions or segments. Hence
due to this maximum data storage, it is feasible
for using it in information security. For this
BPCS
BMP
image
format
is
compatible.Therefore, the final image can be
obtained only when the number of shares is
combined together on the receiving end. Thus
using a combination of VC and BPCS
technology provides data security to all forms of
documents during transfer over internet.
too. The performance measures of visual
cryptography method totally depends on
contrast, security, pixel expansion algorithm,
accuracy in the shares generation, computational
complexity, generated shares are significant or
not significant, types of images (either
monochrome or 24-bit image) and number of
secret images(either single or multiple)
encrypted by the VC algorithm. Visual
cryptography scheme is used to divide the image
into two parts such as each pixel is divided in to
two using pixel expansion algorithm and these
two parts of secret image are called as shares.
Black and white image: each pixel divided in 4
sub-pixels
White pixel: shared into two similar sub-pixel
layouts
Black pixel: shared into two corresponding
opposite (complementary) sub-pixel layouts.
RELATED WORK
Least Significant Bit Steganography and
Cryptography. Wilscy proposed improving the
Reliability of Detection of LSB Replacement
Steganography. Mangarao , proposed a Secure
and
Image Steganography with
LSB
Replacement Methods Using Image Contrast
scheme.
Capacity of vessel using LSB method is just 1020%. Also by using the LSB algorithm the
graying effect in the cover image still remains.
Main -drawback of LSB technique is hacker can
detect data in the cover image so easily. So Noar
and Shamir introduced Visual Cryptography
which uses pixel expansion algorithm. So this
new cryptographic scheme which can decode
concealed images without any cryptographic
computations. But all above schemes supports
only less number of image hiding, which results
into image distortion means the real image may
be widen or stretched.
Fig1: Visual Cryptography
For Perfect Security
-Layout was randomly chosen
-pixels have two black and white sub-pixels for
pixel expansion so that we can exclude pixel
distortion.
3. PROPOSED SCHEME
3.1. Visual Cryptography
In 1994, Naor and Shamir presented a new
cryptographic paradigm based at the pixel level.
They termed this as visual cryptography (VC)
and used this visual cryptography method to
encrypt text notes, pictures, videos, some voice
Fig 2: Visual Cryptography
• If the pixel is black
=
+
• If the pixel is white
=
+
Fig 3: Architecture of VC and BPCS
So like this there are 16 possible combinations
of pixel expansion for each white and black
pixel and algorithm of visual cryptography will
choose any random one to expand the pixel.
3.2.
BPCS
(Bit
Plane
Complexity
Segmentation)
Eiji Kawaguchi and Richard O introduced
BPCS steganography technique. For overcome
the short comings of traditional steganography
techniques such as Least Significant Bit (LSB)
technique, masking technique this BPCS is very
ideal. Previously Least Significant Bit (LSB)
technique has limited information-hiding vessel
capacity like 10-15%.But after applying BPCS
technique 60-65% Data can be hidden. This
technique is called Bit Plane Complexity
Segmentation
(BPCS)
Steganography.
Characteristic of scotopic vision is used in
BPCS technique. In BPCS technique, the cover
image is divided into region/blocks according to
the complexity value of block using
segmentation technique and the secret data is
hidden in noise blocks means blocks with high
complexity of vessel image without damaging
the image quality. In LSB technique, data is not
hidden in whole bits but it is stored only in the
last LSB bits. But in BPCS technique, data is
hidden in most significant bit (MSB) means all
the bits of the bit planes, provided secret data is
hidden in complex region.
• In Visual cryptography and as well as in Bit
Plane Complexity Segmentation BMP format
images are used because BMP image can store a
large amount of data and BMP image format is
also simple to develop for programmer it is easy
to read and have less header value. By using
conversion algorithm we first convert the secret
text in to secret BMP monochrome image and
use this secret image as input to visual
cryptography and we make two shares of this
secret image. Again we apply BPCS on those
shares means take 24-bit BMP color image as
input in BPCS and, make bit planes of this color
image and then again by applying the
segmentation on each bit plane we calculate
complexity of each block. According to the
complexity value we store our secret share in
those blocks which are having complexity value
more than threshold value. Threshold value
means we can give any value so as to store data
in the respective segments. Threshold value is
needed when most important data is to be sent
so we can store data in segments those are
having high complexity value that is high
complexity value proportional to high security.
Send these cover images via Emails to the
receiver, at receiver side same complementary
operations are done to retrieve data means
decryption process is done. Confidential
communication between organizations and
secret data storing. A business transaction that
does not have be licked. Data alteration is also
protected e.g. military message that should not
be changed by hackers. It is really hard for
hackers to eavesdrop the bank transactions. E.g.
Security codes can be shared with protection
these are the applications of this technique.
Method of doing BSCS
• Take 24-bit image as input and one share that
we want to hide behind the 24-bit image.
This is
24-bit
colour
image
• Read the image and covert byte data into bit
data and then make 24 bit planes of the image.
• Then make segments of all the bit planes.
Calculate complexity of each segment.
• And store share in that.
0
• The aim of BPCS steganography technique is
to Store secret messages inside a cover image in
a way that does not allow any "enemy" to even
detect that there is a secret message present.
Due to this technique there is no data alteration.
Randomization of bits so as that it is nearly
impossible for hacker to restore information,
and as well large amount of information can be
hidden 60-65% of vessel.
3.3. Calculating the Complexity
Segmentation tells us about in which block we
should store data according to complexity value.
Data will be stored in highly complex segments.
Here using BPCS technology we use 24-bit
color image. The image is of 54 byte header
format which is divided in to number of bit
planes. Bit plane is a group of bits of particular
position of particular color. For example,
consider bit plane 0 of red color and divide the
pixel into RGB format which are of 8-bits for
each color means total 24 bits. We apply
segments algorithm on each bit plane and then
calculate the complexity of segment.
Complexity of Segment= (Number of bit change
in block of bit plane)/(number of bits in the
block of bit plane)
7
Bit
plan
e
0
23
15
Bit
plane
1
Bit
pla
ne
2
Fig 4: Making bit planes from color image.
Conclusion
In this way we conclude that, we have presented
a feasible solution for Image Steganography that
takes the advantage of segmentation method by
which we can find the position of the bits and
retrieve data from the bit plane.It also makes use
of complex mathematical calculations which
bring down the computational time very less
making it a very effective method for Image
Steganography.
Results
• It can be very useful if can install it on web.
Means if we make it web based then there will
be no need of installing application on every
computer.
• By increasing the threshold value we can
increase the security of data. We can also
decrease the image distortion and greying
effects.
References
[1] Information Hiding Using Least Significant
Bit
Steganography
and
Cryptography,
Shailender Gupta,Ankur Goyssal, June 2012
[2] Department of Applied Math and Computer
Science, Weizmann Institute, Rehovot, 76100,
Israel.
e-mail: {naor,shamir}@wisdom.weizmann.ac.il.
[3] IMPROVING THE RELIABILITY OF
DETECTION
OF
LSBREPLACEMENT
STEGANOGRAPHY Shreelekshmi , Wilscy
and C E Veni Madhavan, October 2010.
[4] A Secure and Lossless Adaptive Image
Steganography with Mod-4 LSB Replacement
Methods Using Image Contrast, K. Devi
Lavanya, Nittala. Raviteja, Katta. Mangarao,
January 2014.
Download