Keywords: Steganography, Cryptography, Encryption, Data hiding

Similar documents
A Novel Information Security Scheme using Cryptic Steganography

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

Jeff Hinson CS525, Spring 2010

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

A New Approach to Compressed Image Steganography Using Wavelet Transform

DATA- FILE SECURITY ENCRYPTION ALGORITHM

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Lecture 15: Cryptographic algorithms

Random Image Embedded in Videos using LSB Insertion Algorithm

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Steganography. Brent McClain Rob Carey

International Journal of Advance Research in Engineering, Science & Technology

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Hybrid Method of Hiding The Text Information Using Stegnography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Lecture 19: cryptographic algorithms

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

AN AUTHENTICATED BSS METHODOLOGY FOR DATA SECURITY USING STEGANOGRAPHY JPEG- BMP

Watermarking Moble Phone Color Images With Error Correction Codes

An introduction to steganography methods

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

Security. Communication security. System Security

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

Multimedia Security: So What s the Big Deal?

A Novel Method for Compressing Encrypted Images using Auxiliary Information

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

Application of Data Hiding in Audio-Video Using Advance Algorithm

Introducing Image Steganography in Bangla Language Communication

Steganography: A Security Model for Open Communication

Digital Watermarking: Combining DCT and DWT Techniques

Information and Communications Security: Encryption and Information Hiding

Robust DWT Based Technique for Digital Watermarking

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

A New hybrid method in watermarking using DCT and AES

LSB Based Audio Steganography Using Pattern Matching

A Review of Approaches for Steganography

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

Assignment 9 / Cryptography

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Appendix A. Definition of Terms

Concealing Information in Images using Progressive Recovery

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Image Steganography (cont.)

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Digital Image Steganography Using Bit Flipping

Winter 2011 Josh Benaloh Brian LaMacchia

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

Designing a New Lightweight Image Encryption and Decryption to Strengthen Security

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

Image Steganography Method Using Integer Wavelet Transform

Breaking the OutGuess

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Improved Qualitative Color Image Steganography Based on DWT

White-Box Cryptography State of the Art. Paul Gorissen

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Cryptography MIS

Data Hiding in Video

Data Hiding in Color Images Using Modified Quantization Table

Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect

International Journal of Computer Engineering and Applications,

Text Steganography in SMS Using Similarity of Glyphs in Unicode Characters

Efficient Image Steganography Using Integer Wavelet Transform

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules

Enhancing the Image Compression Rate Using Steganography

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Improved Protection In Video Steganography Using DCT & LSB Poonam V Bodhak, Baisa L Gunjal

Implementation of Security in Cloud Systems Based using Encryption and Steganography

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach

A Survey on Digital Image Steganography and Steganalysis

Novel Mechanism Control Algorithm for Wired Network

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

STEGANALYSIS OF STEGOSTORAGE SYSTEM

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Secret Communication through Audio for Defense Application

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Steganography in Multiple Data: Review

ISSN: Page 320

International Journal of Advance Engineering and Research Development

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Transcription:

Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Stegnography with Encryption and Decryption with Text File D. Bhuvaneswari M.Sc., M.Phil., ME., K.S.R College of Technology, Tiruchengode, Tamil Nadu, India DOI: 10.23956/ijarcsse/V7I4/0241 Abstract: In any communication, security is the most important issue in today s world. In teganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Waveletsetc. In this project we are developing a system in which two techniques, steganography and cryptography are combined, which provides a strong backbone for its security. The scenario of present day of information security system includes onfidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. In this project work, the secret message is encrypted before the actual embedding process starts. The hidden message is encrypted using Tiny algorithm using secret key and DCT technique is used for embedding and extraction file. Keywords: Steganography, Cryptography, Encryption, Data hiding I. INTRODUCTION A. Steganography Steganography is the art of passing information through original files in a manner that the existence of the message is unknown. The term steganography is arrived from Greek word means, Covered Writing. The innocent files can be referred to as cover text, cover image, or cover audio as appropriate. After embedding the secret message it is referred to as stego-medium. A stego-key is used to control the hiding process so as to restrict detection and/or recovery of the embedded data. Steganography refers to information or a file that has been concealed inside a digital Picture, Video or Audio file[1]. B. Cryptography Cryptography encodes information in such a way that nobody can read it, except the person who holds the key. More advanced cryptotechniques ensure that the nformation being transmitted has not been modified in transit. Cryptography is about protecting the content of messages (their meaning), steganography is about hiding the message so that intermediate persons cannot see the message. There is some difference in cryptography and steganography, in cryptography the hidden message is always visible, because information is in plain text form but in steganography hidden message is invisible. II. THE PROPOSED SYSTEM In this proposed system we have the software for dataencryption and then embed the cipher text in a cover medium. This system combines the effect of these two methods to enhance the security of the data. The proposed system encrypts the data with a tiny algorithm and then embeds the encrypted data in a cover file using DCT algorithm. This system improves the security of the data by embedding the encrypted data and not the plain data in cover file. The block diagram of proposed system is as shown in fig.1 Fig. 1 Block diagram of proposed system 2017, IJARCSSE All Rights Reserved Page 27

To embed a secret message file in the cover file used two distinct methods: (1) Encrypt the secret message (2) The encrypted secret message is embed in the covermedia A. Encryption algorithm This encryption method is simple and efficient and is ofsymmetric type where only receiver and sender knows secretkey. The Secret key length is variable and is of range doubleprecision. At the receiver side during extraction process thedecryption,that is the reverse process of encryption is carriedout using the same key to obtain the secret message from stegno medium. In a nutshell, the reason that we encrypt the message is : Cryptography + Steganography = Secure Steganography 1) Crypto module Text File + Tiny Algorithm = Encrypted File 2) Stegno module Encrypted File + DCT Algorithm + Stegno medium =Stegno Object B. Tiny Algorithm Tiny Encryption Algorithm the Tiny Encryption Algorithm is a Feistel type cipher (Feistel, 1973) that uses operations from mixed (orthogonal) algebraic groups XOR, ADD and SHIFT. A dual shift causes all bits of the data and key to be mixed repeatedly. The key schedule algorithm is simple; the 128-bit key K is split into four 32-bit blocks K = ( K[0], K[1], K[2],K[3]). TEA seems to be highly resistant to differentialcryptanalysis (Biham et al., 1992) and achieves complete diffusion (where a one bit difference in the plaintext will cause approximately 32 bit differences in the cipher text).time performance on a workstation is very impressive. 1) Encryption Routine The Encrypt Routine is written in the C language andassumes a 32-bit word size. The 128 bit key is split into four parts and is stored in K[0] - k[3] and the Data is stored in v[0] and v[1]. void code(long* v, long* k) { unsigned long y = v[0], z = v[1], sum = 0, /* set up */ delta = 0x9e3779b9, n = 32 ; /* a key schedule constant */ while (n-->0) { /* basic cycle start */ sum += delta ; y += (z<<4)+k[0] ^ z+sum ^ (z>>5)+k[1] ; z += (y<<4)+k[2] ^ y+sum ^ (y>>5)+k[3] ; /* end cycle */ } v[0] = y ; v[1] = z ; } The constant delta is given as delta = ( 5-1) * 231 i.e.9e3779b9h and is derived from the golden number ratio to ensure that the sub keys are distinct and its precise value has no cryptographic significance.tea uses addition and subtraction as the reversible operators instead of XOR. The TEA encryption routine relies on the alternate use of XOR and ADD to provide nonlinearity. The algorithm has 32 cycles (64 rounds). TEA is short enough to write into almost any program on any computer. The Tiny Encryption Algorithm (TEA) is a block cipher encryption algorithm that is very simple to implement, has fast execution time, and takes minimal storage space [2]. C. Embedding Algorithm 1) Discrete Cosine transform (DCT) According to the method presented in this paper, the message is inserted into the DCT domain of the host image. The hidden message is a stream of 1 and 0 giving a total number of 56 bits. The transform is applied to the image as a multiple factor of 8x8 blocks. The next step of the technique after the DCT is to select the 56 larger positive coefficients, in the low-mid frequency range. The high frequency coefficients represent the image details and are vulnerable to most common image manipulation like filtering compression] etc. Our scheme is applied to the whole image and since robustness is the main issue, the low and mid frequency coefficients are the most appropriate. The selected coefficients ci are ordered by magnitude and then modified by the corresponding bit in the message stream. If the ithmessage bit s(i) to be embedded is 1, a quantity D is added to the coefficient. This D quantity represents the persistence factor. If the message bit is 0, the same quantity is subtracted from the coefficient. Thus the replaced DCT coefficients are DCT (new) = DCT+1*D for s(i)=1; Else DCT (new) =DCT-1*D for s(i)=0. DCT can separate the image into High, Middle and Low Frequency components. To hide information we need to set a threshold value for the DCT coefficients depending on the quality of the images. D. Description of Proposed Work When the system is executed GUI is displayed for login window, from here user can login to enter into the system and new user can register himself. If any registered user forget his password, this system has an option of forgot password. Database is provided to store user id and passwords. The system provides the process for encryption, 2017, IJARCSSE All Rights Reserved Page 28

decryption, embedding, and de-embedding. The Encryption window provides option for selecting secret message file, for this system the secret message file is text file. Embedding window to embed the message in cover file to get stegomedium and the press save button to save thestegomedium. In Home window press dembed button in home window to extract the secret message fromstegomedium and then press decrypt button to get the original file which is in readable form. And press exit button to get out of the home window.secret key is required at the time of encryption at sender side and same secret key is required at receiver side to decrypt the dembeded file.secret key must be known to both sender and receiver. If the incorrect key is entered it is not possible to Snapshot1:Login Window Snapshot1: Login Window Snapshot 2: Home Window Snapshot 3: Encryption Window 2017, IJARCSSE All Rights Reserved Page 29

Snapshot 4: Embedding Window Snapshot 5: De-embedding Encrypted File Window Snapshot 6:Decryption Window 2017, IJARCSSE All Rights Reserved Page 30

As our eye is not very sensitive so therefore after embedding a secret message in a cover file our eye may not be able to find the difference between the original message and the message after inserting some secret text or message on to it. III. CONCLUSION This system provides two level of security, first byencryption, second by steganography. Tiny encryptionalgorithm is block cipher algorithm. It is simple and fast. This System uses Tiny algorithm for encryption which is very secure and the DCT transformation Steganography techniques are very hard to detect. IV. FUTURE WORK As future work, we intend to study more steganalytic techniques i.e. detecting whether a particular file contains anyform of embedding or not. We also plan to extend our system,so that it can hide digital files in other digital files, forexample hiding Audio files in Videos files etc. REFERENCES [1] Z. Hrytskiv, S. Voloshynovskiy& Y. RytsarCryptography of VideoInformationIn Modem communica- tion, Electronics and Energefics,vol.11, pp. 115-125, 1998. [2] Wheeler D., and R. Needham. TEA, a Tiny Encryption Algorithm,Proceedings of the Second International Workshop on Fast SoftwareEncryption, Springer-Verlag, 1995, pp. 97-110. [3] National Institute of Standards, Data Encryption Standard, FederalInformation Processing Standards Publication 46. January 1977. [4] Wang, H & Wang, S, Cyber warfare: Steganography vs. Steganalysis,Communications of the ACM, 47:10, October 2004. [5] Chandramouli, R., Kharrazi, M. &Memon, N., Image Steganographyand steganalysis: Concepts and Practice, Proceedings of the 2 nd International Workshop on Digital Watermarking, October 2003. [6] Stefan Katznbeisser, Fabien.A.,P.Petitcolas editors, Information Hiding Techniques for Steganography and Digital Watermarking, ArtechHouse, Boston.London, 2000. [7] Marvel, L.M., Boncelet Jr., C.G. &Retter, C., Spread Spectrum Steganography, IEEE Transactions on image processing, 8:08, 1999. [8] C. Cachin, An Information-theoretic Model for steganography, in proceeding 2nd Information Hiding Workshop, vol.1525, pp.306-318,1998. [9] Neil F. Johnson, Zoranuric,Sushil. Jajodia, Information Hiding:steganography and Watermarking Attacks and Countermeasures,Kluwer Academic Press, Norwrll, MA,New York, 2000. [10] N. F. Johnson and S. Katzenbeisser,.A survey of steganographictechniques., in S. Katzenbeisser and F. Peticolas (Eds.): Information Hiding, pp.43-78.artech House, Norwood, MA, 2000. [11] M. M Amin, M. Salleh, S. Ibrahim, M.R. Katmin, and M. Z. I.Shamsuddin, Information Hiding using Steganography, IEEE 0-7803- 7773-March 7,2003. 2017, IJARCSSE All Rights Reserved Page 31