The Hybrid Methods of Column Transposition with Adaptive Minimum Error Least Significant Bit Replacement(AMELSBR) Using file jpg / jpeg and png

Similar documents
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Steganography using MATLAB

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Enhancing the Image Compression Rate Using Steganography

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

A reversible data hiding based on adaptive prediction technique and histogram shifting

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Architectural Design of Multi Level Steganography System for Data Transmission

A Novel Information Security Scheme using Cryptic Steganography

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

High Performance Multithreaded Model for Stream Cipher

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

LSB Based Audio Steganography Using Pattern Matching

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Appendix A. Definition of Terms

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

Steganography. Brent McClain Rob Carey

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Digital Image Steganography Using Bit Flipping

A Image Steganography based on Non-uniform Rectangular Partition

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

A Hybrid Method of Hiding The Text Information Using Stegnography

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Reversible Steganographic Technique Based on IWT for Enhanced Security

Visual Cryptography of Animated GIF Image Based on XOR Operation

A Reversible Data Hiding Scheme for BTC- Compressed Images

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

A New Approach to Compressed Image Steganography Using Wavelet Transform

Steganography by using Logistic Map Function and Cellular Automata

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Implementation of Security in Cloud Systems Based using Encryption and Steganography

Watermarking Moble Phone Color Images With Error Correction Codes

Adaptive Pixel Pair Matching Technique for Data Embedding

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Implementation of Random Byte Hiding algorithm in Video Steganography

Efficient Image Steganography Using Integer Wavelet Transform

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Science & Technology (DCRUST), Sonepat

2

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

International Journal of Computer Engineering and Applications,

Jeff Hinson CS525, Spring 2010

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Metamorphosis of High Capacity Steganography Schemes

Robust DWT Based Technique for Digital Watermarking

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

A Framework to Reversible Data Hiding Using Histogram-Modification

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Data Hiding on Text Using Big-5 Code

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Enhanced LSB Based Audio Steganography

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

Reversible Data Hiding in Colour Images using AES Data Encryption System

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key

Image Processing and Watermark

A Formula Diamond Encoding Data Hiding Scheme

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

STEGANOGRAPHY IN IMAGE SEGMENTS BY LSB SUBSTITUTION USING GENETIC ALGORITHM

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE

Robust Image Watermarking based on DCT-DWT- SVD Method

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

Ad Evaluation Report

FRAGILE WATERMARKING USING SUBBAND CODING

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

New Approach for Modifying Blowfish Algorithm by Using Multiple Keys

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

Efficient & Secure Data Hiding Using Secret Reference Matrix

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Reversible Data Hiding VIA Optimal Code for Image

CHAPTER-5 WATERMARKING OF COLOR IMAGES

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Improved Qualitative Color Image Steganography Based on DWT

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

Evolution of Sha-176 Algorithm

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image

II. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca

Comparison of Text Data Compression Using Run Length Encoding, Arithmetic Encoding, Punctured Elias Code and Goldbach Code

Watermarking 3D images and 3D meshes

Encoding. A thesis submitted to the Graduate School of University of Cincinnati in

Application of Data Hiding in Audio-Video Using Advance Algorithm

APPLICATION OF CONTOURLET TRANSFORM AND MAXIMUM ENTROPY ON DIGITAL IMAGE WATERMARKING

Transcription:

174 IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.7, July 2017 The Hybrid Methods of Column Transposition with Adaptive Minimum Error Least Significant Bit Replacement(AMELSBR) Using file jpg / jpeg and png Wamilliana 1, Mustofa Usman 1, Astria Hijriani 2, Warsito 3, and Roni Setiawan 2 1 Dept. of Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Lampung 2 Dept. of Computer Science, Faculty of Mathematics and Natural Sciences, Universitas Lampung 3 Dept. of Physics, Faculty of Faculty of Mathematics and Natural Sciences, Universitas Lampung Abstract The development of rapid technological demands a strong security system, especially in the process of sending digital data.the more layers of security the less chance the data will be stolen by unauthorized parties.in this case, cryptography is a concept to secure a message by encrypting the message so that is becoming difficult to be understood by others, while the art of steganography is to hide secret messages into other messages in such a way so that other people are not aware of the existence of something in the message. In this research, we built a hybrid system using Column Transposition and Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) webbased, with media messages to be sent as text file format (.txt), inserted into the media image file format (.jpg) as input (cover) and produces an image with the type of file (.png) as stego image. Using eight pictures with different colors dominant as cover, the result shows that AMELSBR managed to hide files and restore files that have been inserted earlier without causing distortion (noise) excessive stego image. The Column Transposition method affects the result of the manipulation of images such as brightness and contrast changes in pixel values. This increased the number of characters so that the number of columns and rows be increased.the images are resistant to image manipulation form of a cut (crop) and can restore the messages contained in the cropped image on the bottom and right with a certain scale cuts. Some media messaging such as WhatsApp, Line and Blackberry Messenger cannot return a message for applying the system of image compression algorithms while email can. Keywords Cryptography, steganography, column transposition, Replacement (AMELSBR). 1. Introduction The rapid technological developments allow humans to communicate and exchange information away in a short time.with electronic media are connected through the internet makes communication a vital part that affects the lives. Most of people prefer to send a message via the short message service (SMS), email or social media (such as WhatsApp, Line, Blackberry Messenger, and so on) rather than sending messages through the post office because they can be done in a matter of seconds. However, delivering of messages using electronic media has a problem of security.the possibility of infiltration through the actions made by the network not authorized (hackers) to retrieve the data.to increase the security in data transmission process used cryptography and steganography. Cryptography is the hieroglyph [1]. Cryptography has two main processes : encryption and decryption.the encryption process is to change the message to be sent (plaintext) into irregular shapes up to no meaning so that it is hard to understand (ciphertext), while the decryption process is restoring files encrypted (ciphertext) be added to form the original file(plaintext). Steganography is an art of hiding messages into other media [2]. The media that can be used to insert such messages, pictures, music, or video. The messages encrypted (ciphertext) which will then be inserted into one of these media produces an output image (stego image). In this paper we develop an applications which used the hybrid of classical cryptography which is column transposition and one of steganography method which is Adaptive Minimum Least Significant Bit Error Replacement (AMELSBR). Subsequently, in Section 2 we will discuss about column transposition and AMELSBR, and then we will discuss the implementation and results in Section 3, and is followed by conclusions in Section 4. 2. Materials and Methods The reason for choosing image JPG / JPEG as the cover image is that this image format into an international standard format and images in these formats can be found easily in mobile phones and digital cameras. In addition, based on www.jpeg.org, the format image received ISO (International Standardization Organization) and IEC (International Electro technical Commission), while the PNG format (ping) is used as an output for PNG file using the compaction method does not eliminate part of the image (lossless compression), thereby reducing excessive noise in the image. The PNG file format also get a certificate of ISO and IEC in 2003. Before the message is Manuscript received July 5, 2017 Manuscript revised July 20, 2017

IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.7, July 2017 175 inserted into an image, firstly the message encrypted with column transposition. [5]. The steps being taken to encrypt messages include: 1. Reading the message file(plaintext) 2. Determining the size of the columns and rows 3. Mapping into columns and rows 4. Transposition of the column corresponding key. 5. Print the results of each column transposition (ciphertext) Then the ciphertext file inserted in the cover image. Before pasted there are several processes that must be performed including checking the capacity of insertion and color variation value. The value of color variation is used to obtain K bits that will be used for the error value, conversion into a binary message, and insert a binary value into 3x3 pixel of RGB pixel [6]. After doing all of those steps we obtained a stegoimage as an output image. The following is the flowchart of the procedure: Fig. 1 Stages Research

176 IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.7, July 2017 3. Results and Discussion The following table shows the images that used as the cover image. Table 1: Cover Image No Image (JPG) Pixel Size Image Size (KB) 1 1280 x 800 277 (N + 1), whereas if the message length = N 2 then the value column = rows = N. That message is in length 84 (including the space character). Suppose that N = 9, N 2 = 81 will be entered in the condition where the message length> N 2 so the value column=rows=10 [5]. In a column transposition normally the space character is sometimes allowed nulls (space left blank). In this research the space character is replaced with an underscore character, with the aim of showing the existence of a space character instead of nulls. 2 1625 x 1080 201 3 1020 x 850 103 column/ row Table 2: Encryption Process 1 2 3 4 5 6 7 8 9 10 4 1024 x 768 76.6 5 1440 x 900 395 6 1600 x 1000 236 7 1600 x 1000 56.9 8 1024 x 768 135 The text "The quick brown fox jumps over the lazy dog,.; '[] \ <>?:" {} = -_ +) (* & ^% $ # @! ~ `12345 67890" will be inserted in the cover image. The reason for using this message is the same as [7]. This text firstly encrypted using transposition of the column. In this research we made that the rows and columns are dynamic, therefore to accommodate this feature we set a concept in the form of columns and rows for the determination of the size NxN (0<=N<=ROUND(SQRT(length message))). If the message length < N 2 then the value column = rows = (N-1), if the length of the message> N 2 then the value column = rows = 1 T h e _ Q u i c k _ 2 B r o w n _ F o x _ 3 J u m p s _ O v e r 4 _ t h e _ L a z y _ 5 D o g,. ; [ ] \ 6 < >? : { } = - 7 _ + ) ( * & ^ % $ # 8 @! ~ ` 1 2 3 4 5 6 9 7 8 9 0 10 The random of even column and then followed by odd column is used as the key to encrypt the message. For example, the order of the columns that occurs when the array is a column transposition 2,4,6,8,10,1,3,5,7,9. To see the details column transposition in the case of earlier tests can be seen in Table 3 below. Table 3: Continuation of Encryption Process column/ 1 2 3 4 5 6 7 8 9 10 row 1 h _ u c _ T e Q i k 2 r w _ o _ B o n F x 3 u p _ v r J m s O e 4 t e L z h _ a y 5 o, ; [ \ D g, ' ] 6 > : { - <? " } = 7 + ( & % # _ ) * ^ $ 8! ` 2 4 6 @ ~ 1 3 5 9 8 0 7 9 10 So the result of encryption (as ciphertext) are "hruto> +! 8 _wpe, :(` 0 u L; {& 2 covz [ % 4 r _ \ - # 6 TBJ_D

IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.7, July 2017 177 <_ @ 7 eomhg?) ~ 9 Qns _. "* 1 ifoa '} ^ 3 kxey] = $ 5 ". Then the ciphertext is inserted into the cover image to generate stego image. The comparison between the cover image and stego image can be seen in Table 4. Table 4: Comparison Cover Image and Stego Image No Cover Image(.jpg) Stego Image(.png) 1 277 KB 379 KB Imag e 1 Table 5: Histogram of Cover Image and StegoImage Before Inserted After Inserted (Cover image) (Stegoimage) 2 201 KB 839 KB 2 3 103 KB 595 KB 3 4 76.6 KB 430 KB 4 5 6 395 KB 236 KB 1980 KB 1870 KB 5 6 7 56.9 KB 502 KB 7 8 8 135 KB 1010 KB The size of the image (stegoimage) is getting bigger because there is an inserted message in the image. At a first glance the two images look the same and there is no difference. The histogram in Table 5 shows that the differences is very hard to be detected. If stego image directly extracted without any change in the image (such as brightness, contrast and crop), then the chiper text can be extracted without changes to the original text file. To see the robustness of the method we do test the stego image by image changes through brightness images, contrast and crop.the reason to test using these three features because when someone get an image from somebody, the most common thing he done with the image is to do the brightness or contrast to see it

178 IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.7, July 2017 clearly. Moreover, someone who get the image may also do the cutting of the image. The following is the brightness changes made at intervals of -150, -120, -90, - 60, -30, 30, 60, 90, 120, 150. Interval Stego image Table 6: Brightness Testing -150-120 - 90-60 - 30 + 30 + 60 +90 +12 0 +150 1 -* - -* - -* - - - - - 2 - - -* -* -* -* -* - - -* 3 - -* - - - - - - - - 4 - - - - - - - - - - 5 - - - - - - - - - - 6 - - - - - - - - - - 7 - - - - - - - - - - 8 - - - -* - -* - - - - (-): The message cannot be returned to the original message (-*): There are some characters of the message back, but the file does not return to original message after decryption. In the brightnest testing, there are some files that contained some character messages. However, after the decryption code does not create a message. This happens because of the changing in pixel value in the image causes the addition of a character.the addition of a number of characters affects the decryption process because of the number of columns and rows in the process of decryption and encryption must be the same in order to obtain the original message. Increasing the number of characters occurs in all messages in all stego image. To test image manipulation (contrast) is done at intervals of -50, -30, 30, 60, 90. The test results contrast can be seen in Table 7 below. Table 7: Contrast Testing Interval Stegoimage -50-30 30 60 90 1 -* -* -* -* - 2 -* -* -* -* - 3 -* - - - - 4 - - - - - 5 - - - - - 6 - - - - - 7 - - - -* - 8 - - - - - (-): The message cannot be returned to the original message (-*): There are some characters of the message back, but the file does not return to original message after decryption The result of testing on brightness gave no image can restore a message after the change of contrast. Although there are some files that recover some character messages after decryption, but no original messages were returned. Next, we did testing by performing cropping at the top, bottom, right and left stego image by 1/3.The results of this test can be seen in Table 8 below. Table 8: Crop Testing Side Stegoimage Top Bottom Right Left 1 - - 2 - - 3 - - - 4 - - - 5 - - 6 - - 7 - - 8 - - - ( ): Files can be recovered. (-): The message cannot be returned to its original message. In the crop testing, returned messages contained in cutting the bottom and right with the 1/3 scale images.in addition to those three types of testing, we did also testing by sending stego image through social media, such as WhatsApp, Line, Blackberry Messenger (BBM) and Email. The test results can be seen in Table 9 below. Table 9: Delivery stego image with media Media Stegoimage WhatsApp Line BBM Email 1 - - 2 - - 3 - - 4 - - 5 - - - 6 - - - 7 - - 8 x x ( ): File (message) can be recovered. (X): The file is missing (no message is inserted in the stego image). (-): The message cannot be returned in full. The message inserted cannot be retrieved and tends to be lost because of media WhatsApp, Line and Black Berry Messenger implement image compression algorithms. The stegoimage is a PNG image when it is transmitted to the media is changed into JPG format when it is received. As a result, the pixel values change. The BBM can restore most of the messages due to the request of HD (High Definition) and email does not apply compression

IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.7, July 2017 179 algorithm so that the file is sent unchanged format and size. 4. Conclusion. From the above discussion we can conclude that the use of JPG / JPEG provide much choice for the cover image, because it can be easily obtained. Image manipulation can restore images that allow the cutting beam (crop) the bottom and right. Column transposition method is not able tto fully support the image manipulation (brightness, contrast and crop because the pixel value of stego image changes and makes extra characters so that the number of columns and rows increases. Therefore, the decryption process cannot restore the original message. Some medias used to send stego image are not able to be used because they are not apply image compression algorithms not like email. References [1] Mollin, Richard.An Introduction to Cryptography Second Edition.Chapman and Hall / CRC, London. (2006). [2] Sellars, D.An Introduction to Steganography, [Online].Available:http://www.cs.uct.ac.za/courses/CS400 W/NIS/papers99/dsellars/stego.html (2006) [3] Lee, YK, and Chen, LH. An Adaptive Image Steganographic Model Based on Minimum-Error LSB Replacement,[Online].Available: http://citeseer.ist.psu.edu/205600.html/lee99adaptive.pdf (1999). [4] Stinson, D.R. Cryptography Theory and Practice. CRC Press.Florida. (1995) [5] Munir, Renaldi. Kriptografi. Informatika, Bandung.(2006) [6] Bailey, K., Curran, K., and Condell, J. "An Evaluation of Automated Methods In Stegodetection Images".Available:http://www.ittconference.com/anonftp/p df/2004%20presentations/presentations/session%20a/karen %20Bailey-1.ppt (2004) [7] Wamiliana, Mustofa Usman, M. Azram, Faiz AM Elfaki, Astria Hijriani, and Pandya Panditatwa Adaptive Minimum Error Least Significant Bit Replacement Method for Steganography Using JPG/JPEG and PNG Files, Science International (Lahore), Vol 27 No. 6. Pp. 4987 4990. ( 2015)