IMPLEMENTATION OF IMAGE AND AUDIO DATA USING KUDOS & COMPRESSION TECHNIQUES

Similar documents
Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation

Digital Image Steganography Using Bit Flipping

Vol. 1, Issue VIII, Sep ISSN

A Combined Encryption Compression Scheme Using Chaotic Maps

Layer Based Image Encryption Using Kist Algorithm

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

ANALYSIS OF AES ENCRYPTION WITH ECC

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Implementation of Random Byte Hiding algorithm in Video Steganography

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS

II. LITERATURE SURVEY

Bit Plane Encoding and Encryption

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

A COMPRESSION TECHNIQUES IN DIGITAL IMAGE PROCESSING - REVIEW

IMAGE ENCRYPTION BASED ON ARNOLD TRANSFORMATION

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

PERFORMANCE ANALYSIS OF IMAGE SECURITY BASED ON ENCRYPTED HYBRID COMPRESSION

A Reversible Data Hiding Scheme for BTC- Compressed Images

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Descrambling Privacy Protected Information for Authenticated users in H.264/AVC Compressed Video

A New hybrid method in watermarking using DCT and AES

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Fundamentals of Video Compression. Video Compression

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Digital Image Processing

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E

Steganography using MATLAB

An Application of Graph Theory in Cryptography

Security. Communication security. System Security

JPEG. Table of Contents. Page 1 of 4

Novel Lossy Compression Algorithms with Stacked Autoencoders

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

Webpage: Volume 5, Issue VII, July 2017 ISSN

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

CHAPTER 6. 6 Huffman Coding Based Image Compression Using Complex Wavelet Transform. 6.3 Wavelet Transform based compression technique 106

Enhanced LSB Based Audio Steganography

International Journal of Computer Engineering and Applications,

Gray Level Image Encryption

A Novel Image Stream Cipher Based On Dynamic Substitution

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

Welcome Back to Fundamentals of Multimedia (MR412) Fall, 2012 Lecture 10 (Chapter 7) ZHU Yongxin, Winson

International Journal of Advanced Research in Computer Science and Software Engineering

Secret Key Algorithms (DES)

Text Steganography Using Compression and Random Number Generators

An Image Encryption Algorithm based on 3D Lorenz map

LOSSLESS COMPRESSION OF ENCRYPTED GREY-LEVEL AND COLOR IMAGES

CHAPTER 6. SYMMETRIC CIPHERS C = E(K2, E(K1, P))

Introduction to Modern Symmetric-Key Ciphers

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

AN EFFICIENT VLSI IMPLEMENTATION OF IMAGE ENCRYPTION WITH MINIMAL OPERATION

Efficient Image Steganography Using Integer Wavelet Transform

Computer Security 3/23/18

Delineation of Trivial PGP Security

ECE 533 Digital Image Processing- Fall Group Project Embedded Image coding using zero-trees of Wavelet Transform

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications

MPEG-2 and ECC Security in DCT Domain

A New Approach to Compressed Image Steganography Using Wavelet Transform

IMAGE COMPRESSION TECHNIQUES

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

Volume 2, Issue 9, September 2014 ISSN

Assignment 9 / Cryptography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

Image coding and compression

Adaptive data hiding based on VQ compressed images

DATA hiding [1] and watermarking in digital images

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

Steganography by using Logistic Map Function and Cellular Automata

Outline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

A Simple Lossless Compression Heuristic for Grey Scale Images

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission

Implementation of ContourLet Transform For Copyright Protection of Color Images

A New Approach to Fractal Image Compression Using DBSCAN

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Watermarking Moble Phone Color Images With Error Correction Codes

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

IMAGE PROCESSING USING DISCRETE WAVELET TRANSFORM

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication

About MPEG Compression. More About Long-GOP Video

MEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

A SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS

K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

Keywords Data compression, Lossless data compression technique, Huffman Coding, Arithmetic coding etc.

CS 335 Graphics and Multimedia. Image Compression

Compression of Image Using VHDL Simulation

ISSN: An Efficient Fully Exploiting Spatial Correlation of Compress Compound Images in Advanced Video Coding

Transcription:

IMPLEMENTATION OF IMAGE AND AUDIO DATA USING KUDOS & COMPRESSION TECHNIQUES Vandana Chandel M.Tech (CSE) Student Bahra University, Solan (H.P) Astt.Prof. Miss Nidhi Sood Bahra University, Solan (H.P)

Abstract - Cryptography can be defined as the art or science of altering information or change it to a chaotic state, so that the real information is hard to extract during transfer over any unsecured channel. The prime goal of this paper is applying kudos method to image and audio file data along with the compression technique and will analyze the parameters of algorithm such as encryption time, decryption time and compression time. Index Terms- Cryptography, decryption, encryption, keyless, kudos, sequence counter. 1. INTRODUCTION Cryptography can be defined as the art or science of altering information or change it to a chaotic state, so that the real information is hard to extract during transfer over any unsecured channel. Latest advancements in technology and new concepts like quantum cryptography have added a complete new dimension to data security. The cryptography algorithms are categorized into two types on the basis of key management:- Key-Oriented Encryption Algorithm. Keyless Encryption Algorithm Key-oriented algorithms are very efficient but they were very bulky to manage as key handling must be done. Due to the great overhead, keyless algorithms seem an attractive option. But what about security by keyless, the solution-kudos encryption, which is a keyless security algorithm to provide ultimate security at the one level above of key-oriented. The proposed Algorithm is known as Keyless User Defined Optimal Security (KUDOS). As the name suggests, KUDOS algorithm is keyless because there is no key involved in the encryption process. Only sequence counters are used. The sequence counters

have a definite start point and a particular increment value. The sequences are merged with the actual data at a particular level and encrypted data then replaces original data [1]. 2. LITERATURE REVIEW KaushikAkhil,Satvika,BarnelaManoj,KumarAnant [1] proposed an algorithm in this paper is Keyless User Defined Optimal Security Encryption (KUDOS) is based on the concept of user customization. The algorithm doesn t use the traditional approach of using an encryption key; but defines a series of sequence-counters for encoding. The cryptographic algorithm is based partially on both stream and block encryption, hence the output of same input block over same input sequence-counter is dissimilar and provides enhanced security. S.S. Maniccam and N.G. Bourbakis [2] have presented a new methodology which performs both lossless compression and encryption of binary and gray-scale images. The compression and encryption schemes are based on SCAN patterns generated by the SCAN methodology. They achieved compression ratio of 1.6353 on Lena Image. The SCAN method takes about 50 seconds to compress-encrypt and about 10 seconds to decompress-decrypt a 512 512 gray scale image. Nikolaos G. Bourbakis [3] presented an image data compression-encryption scheme by using the words (patterns, or orders) produced by an image processing language called SCAN. The SCAN is a formal language-based two-dimensional spatial-accessing methodology which can efficiently specify and generate a wide range of scanning paths or space filling curves. The proposed methodology can compress

and encrypt both binary and grey level images. Compression is based on Genetic Algorithm approach using fractal based language G-SCAN. Encryption is carried out using transposition cipher based on SCAN. It is based on permutation of N N image i.e. N Ni. D. Maheswari, V. Radha [4] employed lossless compression using a novel layer based compound image compression technique that uses XML compression and JPEG to compress data. The FG layer is compressed using an XML compressor and BG layer is compressed using JPEG 2000. The encryption scheme, called, Shuffle Encryption Algorithm (SEA), proposed by Yahiya and Abdalla (2008), is used. The average total time (compression time + decompression time) taken by XMLCC to compress an image was 0.79 seconds for compression and 0.68 seconds for decompression. But these results are still slower than DjVu. However, the XMLCC technique is superior to JPEG. Anil Kumar A, Anamitra Makur[5] suggested that compression of encrypted data is possible by using distributed source coding. They considered the encryption, followed by lossless compression of gray scale and color images. They also proposed to apply encryption on the prediction errors instead of directly applying on the images and use distributed source coding for compressing the cipher texts. Decompression and decryption are performed in a single phase. They achieved compression ratios varying from 1.5 to 2.5 despite encryption. On Lena image they obtained the compression result as 5.39 bits per pixel.

3. PROBLEM DEFINITION This paper will describe a new approach to implement the KUDOS (Keyless User Defined Optimal Security Encryption) method to image or audio file data along with the compression technique. Encryption at three levels i.e. blocks level, character level and binary level that gives safety three times popular then other algorithms. This algorithm is faster because of optimization techniques employed in the programing. The user can increase or decrease security and speed depending upon his/her needs. Data compression can also be used for in-network processing technique in order to save energy because it reduces the amount of data in order to reduce data transmitted and/or decreases transfer time because the size of data is reduced. Transformation algorithm does not compress data but rearrange or change data to optimize input for the next sequence of transformation or compression algorithm. Most compression methods are physical and logical. 4. OBJECTIVES The objective of this dissertation is to implement KUDOS method to image or audio file data along with the compression technique and will analyses the parameters of algorithm such as encryption and decryption time, compression time. The objectives are:- To make data more securable. To encrypt or compress audio and image data. There is no key involved in the encryption process. Only sequence counter are used. It used both stream cipher and block cipher to enhance the security. 5. RESEARCH METHODOLOGY

Methodology of constructing the proposed system will consists of various modules. Each module uses different techniques and algorithms to perform its specific tasks. After a particular module completes its task, its output will become input for the next module. In the end the combined effort of each module will be displayed. Symmetric Key Algorithm:- The KUDOS cryptographic algorithm falls under the symmetric encryption, i.e. the same key is used at both ends to encrypt and decrypt the data. However, KUDOS actually depends on the sequence counter instead of the encryption key. The major benefit of using KUDOS over other encryption algorithms is its power of customization. The user can manipulate the sequence counter according to his needs; whether he wants it to be simple and faster or hard to crack and secure.

Figure 2. KUDOS Encryption Process The algorithm is implemented in java programming language. JAVA technology is both a programming language and a platform. The Java programming language is the language in which Java applications, applets, servers, and components are written. The Java platform is the predefined set of Java classes that exist on every Java installation; these classes are available for use by all Java programs. The Java platform is also sometimes referred to as the Java runtime environment or the core Java APIs (application programming interfaces). Features of Java are follows:

Simple Object Oriented Robust Security 8. REFERENCES [1] KaushikAkhil, Satvika, BarnelaManoj, KumarAnant Keyless User Defined Optimal Security Encryption International Journal Of Computer And Electrical Engineering Vol.4, No.2.April2012 [2] S. S. Maniccam, and N. G. Bourbakis SCAN Based Lossless Image Compression and Encryption IEEE 0-7695-0446-9/99, pp. 490-499, 1999 [3] Nikolaos G. Bourbakis, Image Data Compression-Encryption Using G-Scan Patternsǁ IEEE 0-7803- 4053-1/97, pp. 117-1120, 1997 [4] D. Maheswari, V.Radha, Secure Layer Based Compound Image Compression using XML Compressionǁ 978-1-4244-5967-4/IEEE, 2010 [5] Anil Kumar A and AnamitraMakur, Distributed Source Coding based Encryption and Lossless Compression of Gray Scale and Color Imagesǁ,IEEE978-1-4244-2295-1, 760 MMSP Singapore, pp. 760-764, 2008