PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

Similar documents
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Steganography using MATLAB

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Implementation of Security in Cloud Systems Based using Encryption and Steganography

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

Cryptography Lesson Plan

A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Random Image Embedded in Videos using LSB Insertion Algorithm

Secret Sharing in Audio Steganography

Text Steganography in SMS Using Similarity of Glyphs in Unicode Characters

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

Network Security Issues and Cryptography

e-commerce Study Guide Test 2. Security Chapter 10

Enhanced LSB Based Audio Steganography

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission

Architectural Design of Multi Level Steganography System for Data Transmission

Secured Way of Ciphering Text Using Audio Steganography

ADVANCES in NATURAL and APPLIED SCIENCES

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Implementing Security in QR Codes by using Blowfish Algorithm

Secure Multiparty Computation

OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY

The Design of an Anonymous and a Fair Novel E-cash System

A Hybrid Method of Hiding The Text Information Using Stegnography

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

A Secure Routing Protocol for Wireless Adhoc Network Creation

Secure Information exchange System

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

A New Approach to Compressed Image Steganography Using Wavelet Transform

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS

Combining TCP and UDP for Secure Data Transfer

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Available Online through

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

ENGR/CS 101 CS Session Lecture 5

Assignment 9 / Cryptography

WLAN Security Overview

Distributed Steganography

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

A Proposed Method for Cryptography using Random Key and Rotation of Text

Multimedia Security: So What s the Big Deal?

A Novel Information Security Scheme using Cryptic Steganography

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

Distributed Systems. Lecture 14: Security. Distributed Systems 1

A Modified Polybius Square Based Approach for Enhancing Data Security

Distributed Systems. Lecture 14: Security. 5 March,

International Journal of Computer Engineering and Applications,

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Chapter 7 Lab A: Exploring Encryption Methods

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Analysis of Steganography as a Security Technique

CHAPTER 3. ENHANCED KERBEROS SECURITY: An application of the proposed system

ISSN: Page 320

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Security. Communication security. System Security

LSB Based Audio Steganography Using Pattern Matching

Cryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building

Security I exercises

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Jeff Hinson CS525, Spring 2010

Study on Computer Network Technology of Digital Library

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

CSC 5930/9010 Cloud S & P: Cloud Primitives

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

CONCEALED CLIENT DATA AGGREGATION FOR DATABASE-AS-SERVICE (DAS)

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Steganography. Brent McClain Rob Carey

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE

5 Tips to Fortify your Wireless Network

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World ( )( )JNTU World

1-7 Attacks on Cryptosystems

Secure Multiparty Computation

Digital Image Steganography Techniques: Case Study. Karnataka, India.

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

CRYPTOGRAPHY. BY, Ayesha Farhin

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

BS801E-BSCS. Cryptography

Cryptographic Concepts

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

A Image Steganography based on Non-uniform Rectangular Partition

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

LECTURE NOTES ON COMPUTER AND DATA SECURITY

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Transcription:

Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME M.Lavanya 1,M. Karpagam 2, R. Lakshmi Priya 3,S. Kanthimathi 4, S. Saravanan 5 School of Computing, SASTRA University, Thanjavur Abstract There are many aspects to security and many applications ranging from payment to private communication and protection of passwords. This paper describes that combining the text steganography and secret sharing scheme will give more security for the passwords. In this method we encrypt the password and the key for decryption is split and sent through the WWW to the end server. At the receiving end the key is once again reconstructed through the threshold secret sharing scheme. Thus the password is protected from malicious access. By using secret sharing scheme the stego key file is split into n packets and sent through the network. At the receiving end using k packets the stego key file is once again reconstructed and this in turn is used to decrypt the encrypted stego file. By using the secret sharing along with steganography the password security is highly enhanced. The k packets for the reconstruction of the key file can be changed periodically to ensure high security. The crackers remain unaware of the k value. This is an added advantage. Keywords: Encryption, Steganography, Threshold Secret sharing method, Cryptanalysis Introduction Nowadays the need to protect one s password and personal credentials is increasing day by day. Awareness tips are given to customers that they are not supposed to entrust someone with their passwords. Various attempts are made by crackers who are in the World Wide Web (WWW)and trying to illegally access our credentials. In order to improve the security level in the process of encryption, we propose a method here based on the combination of text steganography and threshold secret sharing scheme. What actually happens is that the crackers get access to the stego key file sent across the World Wide Web and use them to decrypt the encrypted data. So we are going to implement the secret sharing scheme on the stego key file as given in figure 1. Figure 1. Proposed method of Secret sharing scheme Text Steganography Steganography is the practice of hiding a file within another file and the original content is retrieved using a stego key file. Text steganography involves the process of changing the format 2127

of an existing text. This is the trickiest of all other types since it does not contain redundant information. The basic model of text steganography is in figure 2and contains four main functions: i) Encipher ii) Hide iii) Seek iv) Decipher Figure 2. Basic Block Diagram of Steganography It hides data using text stegnographic techniques. There are already a variety of methods available for text steganography. We can make use of any one of them to hide the password. The available methods include line shift, word shift, syntactic method, white steg, spam text, SMStexting, feature coding etc. Existing Method Various research papers were focusing about steganography, particularly in the field of security. In paper [1], Steganography is the process of concealing a message or a file. Steganography has been widely used, including in recent historical times and the present day. In paper [2], Steganography makes the secret message invisible for any intruder in the network. Various types of steganographic methods are present today to enhance security. They are implemented in places where one cannot afford information leak. In paper [3], Threshold secret sharing method is more efficient when it comes to protecting data. Construction involves an approach in which data is divided into multiple shares and processed at different servers. In paper [4], Information technology tools are used in methodologies to develop simulation exercises and make learning of networking easier. By doing this one gets practical hands on work experience. Packet Tracer6 is one such software that helps us in understanding the networking between various networks. 2128

In paper [5], OTP sent as a message is vulnerable to various attacks along the communication channel. Here, the OTP is encrypted using light weight cryptography and the cipher text is hidden using text steganography and the stego text is sent as SMS to the user mobile. In paper [7], Ciphers can be compared based on their speed in various platforms. Various ciphers are compared in terms of their speed, performance and safety. Since new attack techniques are invented every day, ciphers are constantly under cryptanalysis attacks to increase security. In paper [8], Usually cryptographic algorithms are time consuming and are at times not economical too. Due to these tight constraints the algorithms used for encryption should be efficient and the computational complexity should also be reduced. This is achieved by light weight cryptography. Proposed Method In the proposed method we are using the threshold secret sharing scheme to divide the stego key file at the sending point and reconstruct it at the receiving point. Threshold Secret Sharing Scheme- 2 lines pseudo code Let k and n be positive integers, k n. A (k, n)-threshold scheme is a method of sharing a secret K among a set of n participants in such a way that any k participants can compute the value of the secret, but no group of k 1 or fewer can do so. The above mentioned is the exact definition of the sharing method. What actually happens is that the stego key file is split into n packets and sent through the public network. There is a condition already set that the stego key file can be reconstructed one and only if k packets are received. Once the key is reconstructed the stego cover file can be decrypted. Advantage Of Combining Steganography And Secret Sharing Scheme Text steganography is considered to be the trickiest out of all other types of steganography[6]. So this is a plus point in our proposal. And added to this we are enhancing the security by splitting the key file into various packets and sending through public network (www). All packets will not follow the same path. They tend to follow the path with less distance or network traffic. This depends on the routing system.also if there is any packet loss during the transmission through various networks it doesn t matter much, since we require only a few packets for the reconstruction of the key. One more advantage is that, crackers will find it difficult to find the key. The stego key file is the main thing required by the hackers to decode the password. But we have already split it into packets plus even if they identify that they still cannot find the packets sine each packet passes through various paths. Even if they have access to these packets, they still do not know the exact number (k) of packets required for reconstruction of the key. The value of k can be changed periodically to improve security. Experimental Result 2129

Proposed work has been evaluated by PROOF: Packet tracer 6 tool [9]. The distribution of packets from one server to another through routers is explained using Cisco Packet Tracer 6. Cisco Packet Tracer 6 is an innovative network simulation and visualization tool. This tool helps us to create network topologies and imitate computer networks. Consider the network in figure 3, wherein PC0 and PC2 constitute one network IP (5.0.0.0) and PC1 and PC3 constitute another network (6.0.0.0). Figure 3.Networkpacket details Figure 4. Received packet details The above figure 4 was the result obtained when packets of 8 byte data each was sent from 5.0.0.0 network to 6.0.0.0 network. The packets can either use the path Router 5 6-8 or the path Router 5 7 8. 2130

Hence, the crackers cannot identify all the packets since they cannot guess the path. And the time consumption is also feasible. We are able to get acknowledgement for each packet that has been transferred. Conclusion Hence, the conclusion is that by combining text steganography and threshold secret sharing scheme we improve the security of passwords. The password is encrypted as well as the key for decrypting the password is protected from malicious access through the method of threshold secret sharing. In short the security level is highly enhanced and the loss of packets during a transfer between the sending and receiving ends doesn t cause much damage. The value of k (number of packets required for the reconstruction of key) can be changed periodically from time to time in order to increase password security. Thus the proposed model offers comparatively high security than individual encryptions using steganography and threshold secret sharing scheme. References 1. Savitha D Torvi ; K.B.Shivakumar ; Rupam Das, 2016: An unique data security using text steganography : Article number 7724977, Pages 3834-3838 2. Johri, P ; Mishra, A ; Das, S ; Kumar, A, 2016: Survey on steganography methods (text, image, audio, video, protocol and network steganography : Article number 7724795, Pages 2906-2909 3. Baby, V;Chandra, N.S., 2016: Distributed threshold k-means clustering for privacy preserving data mining : Article number 7724795, Pages 2906-2909 4. Kainz, O ; Cymbalak, D ;Lamer, J ; Michalko, M ; Jakab, F, 2016: Innovative methodology and implementation of simulation exercises to the Computer networks courses : Article number 7558481 5. Sheshasaayee, A ; Sumathy, D, 2016: A framework to enhance security for OTP SMS in E-banking environment using cryptography and text steganography : Volume 469, 2017, Pages 709-717 6. Mekala, R ; 2 Vanitha, S,2014: Privacy Protection Of Medical Datas Using Ecgsteganography, International Journal of Innovations in Scientific and Engineering Research (IJISER),Volume 1,Issue4,PP 300-304 7. Harmouch, Y ; El Kouch, R, 2016: A fair comparison between several ciphers in characteristics, safety and speed test : Volume 520, 2017, Pages 535-547 8. Eisenbarth, T ; Kumar, S ; Paar, C ; Poschmann, A ; Uhsadel, L, 2007: A survey of lightweight-cryptography implementations : Volume 24, Issue 6,Pages 522-533 9. http://www.cs.rpi.edu/~kotfid/packettracer/ 2131

2132