Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Similar documents
Enhanced LSB Based Audio Steganography

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

LSB Based Audio Steganography Using Pattern Matching

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Image Steganography (cont.)

An Analysis of Various Techniques in Audio Steganography

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

A Review of Approaches for Steganography

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Steganography using MATLAB

Architectural Design of Multi Level Steganography System for Data Transmission

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Jeff Hinson CS525, Spring 2010

Robust DWT Based Technique for Digital Watermarking

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

A Hybrid Method of Hiding The Text Information Using Stegnography

A Novel Information Security Scheme using Cryptic Steganography

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Secret Sharing in Audio Steganography

Comparative Analysis of Different Transformation Techniques in Image Steganography

AN AUTHENTICATED BSS METHODOLOGY FOR DATA SECURITY USING STEGANOGRAPHY JPEG- BMP

HTML Steganography using Relative links & Multi web-page Embedment

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

Image Processor. Copyright 18/04/2018 by clive homewood. All Rights Reserved.

Reversible Data Hiding in Colour Images using AES Data Encryption System

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

International Journal of Advance Research in Engineering, Science & Technology

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm

Secret Communication through Audio for Defense Application

Steganography. Brent McClain Rob Carey

Hiding Data in Wave Files

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

CREATING AN IMAGE USING ENCRYPTED SENSITIVE WORDS

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

A SECURE STEGANOGRAPHY APPROACH OF MULTIPLE SECRET IMAGES USING ANN

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

International Journal of Recent Engineering Research and Development (IJRERD) ISSN: Volume 03 Issue 04 April 2018 PP.

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability

A SURVEY : INFORMATION SECURITY USING STEGANOGRAPHY & CRYPTOGRAPHY

Information and Communications Security: Encryption and Information Hiding

Webpage: Volume 4, Issue V, May 2016 ISSN

Distributed Steganography

A New Color Image Watermarking Frame through Dwt and Alpha Channel

A Image Steganography based on Non-uniform Rectangular Partition

Invisible Watermarking Audio Digital with Discrete Cosine Transform

Optimizing Image Steganography using Genetic Algorithm

Secured Way of Ciphering Text Using Audio Steganography

Introducing Image Steganography in Bangla Language Communication

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

A NOVEL METHOD FOR HIDING INFORMATION

Analysis of Steganography as a Security Technique

Receiver Operating Characteristic (ROC) Graph to Determine the Most Suitable Pairs Analysis Threshold Value

Dr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq

A Image Steganography based on Non-uniform Rectangular Partition

Multimedia Security: So What s the Big Deal?

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE

[2014] Steganography Using Prime Technique. Vinam Tomar. Kamal Saluja. Authors. Guided By-

A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector

The Hybrid Methods of Column Transposition with Adaptive Minimum Error Least Significant Bit Replacement(AMELSBR) Using file jpg / jpeg and png

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

A New Approach to Compressed Image Steganography Using Wavelet Transform

Steganography Methods on Text, Audio, Image and Video: A Survey

Steganography and Steganalysis

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

International Journal of Computer Engineering and Applications,

BLIND EXTRACTION OF HIDDEN DATA FROM DIGITAL IMAGE USING M-IGLS ALGORITHM

Data Hiding in Color Images Using Modified Quantization Table

Application of Data Hiding in Audio-Video Using Advance Algorithm

Steganography: A Security Model for Open Communication

Analysis of Different Types of Steganography

Complex Encryption Methodology Based On Two Level Encryption Technique

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image

Principle of Graph Theoretic Approach to Digital Steganography

A Modified Approch Audio Stagnography Based On Technique LSB Coding

EFFECTIVE USE OF STEGANOGRAPHY ON AUDIO WAVE AND SPY ANALYSIS

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

A Survey on Various Approaches of Image Steganography

Fast Real-Time Hardware Engine for Multipoint Text Steganography

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Transcription:

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5 1,2,3,4,5 Dept. of Computer Engineering, Shree L.R.Tiwari College of Engineering Abstract Steganography [1] is derived from the Greek word steganographic which means covered writing. It is the science of secret communication. The goal of steganography is to hide the existence of the message from unauthorized party. The modern secure image steganography presents a task of transferring the embedded information to the destination without being detected by the attacker. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. In the LSB approach, the basic idea is to replace the Least Significant Bits (LSB) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The LSB-based technique [2] is the most challenging one as it is difficult to differentiate between the cover-object and stego-object if few LSB bits of the cover object are replaced. In the proposed LSB technique the last two bits of each image byte are replaced with the bits of encrypted form of data that has to be hidden in the cover image. Keywords- Steganography, LSB, Random-key, Image, secret message, stego-key, cover image, Techniques. I. INTRODUCTION The word steganography is derived from the Greek words stages meaning cover and grafia meaning writing defining it as covered writing. In image steganography the information is hidden exclusively in images. Steganography is the [3] art and science of secret communication. It is the practice of encoding/embedding secret information in a manner such that the existence of the information is invisible. The original files can be referred to as cover text, cover image, or cover audio. After inserting the secret message it is referred to as stego-medium. A stego-key is used for hiding/encoding process to restrict detection or extraction of the embedded data. Watermarking and fingerprinting related to [4] steganography are basically used for intellectual property protection. A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or image data. It is typically used to identify ownership of the copyright of such signal. The embedded information in a watermarked object is a signature refers the ownership of the data in order to ensure copyright protection. In fingerprinting, different and specific marks are embedded in the copies of the work that different customers are supposed to get. In this case, it becomes easy for the property owner to find out such customers who give themselves the right to violate their licensing agreement when they illegally transmit the property to other groups. II. REVIEW OF LITERATURE 2.1 PRESENT SCENARIO The majority of [2] today s steganographic systems uses multimedia objects like image, audio, video etc as cover media because people often transmit digital pictures over email and other Internet communication. Modern steganography uses the opportunity of hiding information into digital multimedia _les and also at the network packet level. @IJMTER-2016, All rights Reserved 416

Hiding information into a medium requires following elements 1. The cover medium(c) that will hold the secret message. 2. The secret message (M), may be plain text, digital image file or any type of data. 3. The stegonographic techniques 4. A stego-key (K) may be used to hide and unhide the message. In modern approach, depending on the cover medium, steganography can be divided into four types: 2.1.1 Text steganography: Hiding information in text file is the most common method of steganography. The method was to hide a [3] secret message into a text message. After coming of Internet and different type of digital file formats it has decreased in importance. Text stenography using digital files is not used very often because the text files have a very small amount of excess data. 2.1.2 Image steganography: Images are used as the popular cover medium for steganography. A message is embedded in a digital image using an embedding algorithm, using the secret key. The resulting stego-image is send to the receiver. On the other side, it is processed by the extraction algorithm Contents 4 using the same key. During the transmission of stego- image unauthenticated persons can only notice the transmission of an image but can t see the existence of the hidden message. 2.1.3 Audio steganography: Audio steganography is concerned with embedding information in an innocuous cover speech in a secure and robust manner. Communication and transmission security and robustness are essential for [7] transmitting vital information to intend sources while denying access to unauthorized persons. An audible, sound can be inaudible in the presence of another louder audible sound. This property allows selecting the channel in which to hide information. Existing audio steganography software can embed messages in WAV and MP3 sound _les. The list of methods that are commonly used for audio steganography are listed and discussed below. LSB coding Parity coding Phase coding Spread spectrum Echo hiding 2.1.4 Video steganography: Video Steganography is a technique to hide any kind of files in any extension into a carrying Video file. 2.2 Existing System 2.2.1 QuickStego: QuickStego is free steganography software available for Windows. It lets you hide your text in pictures and only users of QuickStego can read this hidden text messages. You can add text by typing or load it from TXT file. Supported input image formats are: BMP, JPG, JPEG, and GIF, but it saves [3] the output image in BMP format with hidden text in it. The interface of this software is simple and easy to understand. First of all use "Open Image" button to open image file and then type your secret text in the big text box. You can also load text from TXT file by clicking "Open Text" button and click "Hide Text" and then click "Save Image" button to save the final BMP file. To retrieve the hidden text; just open the BMP file containing hidden text with it. 2.2.2 OpenStego: OpenStego is just 203 KB in size and is easy to use steganography application. You can attach any type of secret message file to cover files. Supported file types for cover are: BMP, GIF, JPEG, JPG, PNG, and WBMP. You can set the password also. After finishing you can save output stego file in PNG format. Similarly you can use this software to extract secret data from the above @IJMTER-2016, All rights Reserved 417

output file by providing correct password. It is a java based, open source steganography software. You can run either BAT file or JAR file from the installed directory. III. PROPOSED SYSTEM ARCHITECTURE In smart data encryption and transfer we are replacing the last two bits if image file byte for hiding the secret message. We are also encrypting the data file prior to embedding process and sharing the stego file over LAN. The system will also work on audio and video files. 3.1 User Interface Module (Steganograph): This module will basically provide the main form for accessing the functionality of the application. Since the application will be implemented in the form of MDI parent child property for user interface, this module will work as a parent form for other child forms. 3.2 Embed Module: This module will basically provide the functionality of embedding the message and the text or data file in the image, audio, video files. It will also have a sub module named Encrypt which will be responsible for encrypting the message and the data file. The embed module will make the use of this encrypt module for encryption purpose. This module will handle the backend task for Embed File form. 3.3 Retrieve Module: This module will basically provide the functionality of retrieving the message and the text or data file from the image, audio, video files. It will also have a sub module named Decrypt which will be responsible for decrypting the message and the data file. The retrieve module will make the use of this decrypt module for decryption purpose. This module will handle the backend task for Retrieve File form. 3.4 Sender Module: This module will basically provide the functionality of sending the files from one machine to another machine. This module will make use of socket programming for sending the file to other machines. This module will also provide the user interface that is child form (Send File). 3.5 Receiver Module: This module will basically provide the functionality of receiving the files coming from other machines. This module will also make the use of socket programming for receiving the files from other machines. This module will not have any user interface. It will be functioning in the background. 3.6 Help Module: This module will be responsible for providing the Help to the application. It will be implemented using JAVA and HTML both. The form for this module will be designed in JAVA, whereas the content for the help will be designed using HTML. Fig 1: Block diagram of proposed architecture @IJMTER-2016, All rights Reserved 418

IV. DEVELOPMENT AND METHODOLOGY The development and methodology that has been undertaken for the development of smart data encryption and transfer is described below which gives an overview of the basic technology and their usage. 4.1 Selection of Technology: The system planning also includes the selection of technology for the development of the modules and the application. The technology which will be used in this project is JAVA and HTML. The JAVA technology will be used for providing platform independency to the application and for doing the bit level calculations in the modules. The HTML technology would be used for the development of help modules which will be meant for providing to the application. The application which we will be developing is a standalone application. This application, apart from providing data security communicates with other machines for file transfer. The machines which will be communicating might not have same platform. So the application needs to be platform independent. For embedding the files and the message the image, audio, video files need to be rendered at bit level. So a very secure technique is required for dealing at bit level. 4.2 System Development Model: This project deals [1] with the secure transfer of data from one machine to another machine via LAN. The development of such software would really be complex task. It is more of a technical project. Although the requirements and the concepts of the project are clear at the initial stage but would require some advancement at the later stage. This advancement cannot be detected initially. So it would be better to develop those modules that are clear at the current stage. As the development proceeds the further features can be added into the system as per the requirement of the user. The project development also requires the coverage of technical risks. Since the development of the system can be done and advanced features can be added at the regular interval of time, for this system Incremental model is recommended. In incremental model, iterative development can be done i.e. system can be developed in number of phases. First that module is developed whose requirement is clear. If the user is satisfied [8] with that module then work is done on other iteration. Also incremental model helps us to cover risk for our project. 4.3 User Interface of Smart Data Encryption And Transfer Fig 2: The User Interface @IJMTER-2016, All rights Reserved 419

V. RESULTS The features mentioned in the previous section can be observed in the screenshots taken from a Test run while testing the application and have successfully embedded the text behind the image file and have also encrypted the data before embedding it. We have provided two option in the application either select a text file to hide or type the string to be embedded behind the image file. Fig 3: The first UI and the login page Here is the home page of the application which include option to select a text file or enter the text in the text box. We have provided the check for file size while embedding the data in the image file that s shows the difference between initial image and final image. The content of the file can be seen in the text area provided for displaying the message The below images depict the successful working of the embedding plain typed text and retrieving of the same.the embed and the retrieve module successfully perform the embedding and the retrieving operations. Fig 4: Embed message Fig 5: Retrieve message The below images depict the successful working of the embedding plain typed text and retrieving of the same.the embed and the retrieve module successfully perform the embedding and the retrieving operations. Fig 6: Embed file Fig 7: Retrieve file @IJMTER-2016, All rights Reserved 420

We have also successfully transferred data from one pc to another using the IP address of the client pc.. Fig 8: Sharing of stego-image VI. CONCLUSION Smart Data Encryption and Transfer is successfully able to fulfill the task of hiding piece of information behind a cover image. The data to be hidden is encrypted successfully using a random key. Smart data encryption and transfer easily embeds and retrieves data from a file or plain text. The stego image can be sent to another PC by entering the IP address of that PC. Smart data encryption and transfer is also able to work on the audio and video files in the same manner as it works on image files and is operational, satisfying the sole purpose of data hiding. VII. FUTURE WORK 1. The application can have multiple login id and password. 2. Security will not lose by any mean. 3. The application can embed message in text file. 4. Not only text file but also any other file can be embedded in image, audio and video file. 5. The message can be transferred in intranet and in Internet environment. 6. The message can be transferred to any other device such as mobile. REFERENCES [1] https://en.wikipedia.org/wiki/steganography (Accessed on Aug 2015) [2] Krativyas, B.L.Pal A Proposed Method In Image Steganography To Improve Image Quality With Lsb Technique IJARCCE Vol. 3, Issue 1, January 2014 [3] ParmarAjit Kumar Maganbhai, Prof. Krishna Chouhan A Study and literature Review on Image Steganography (IJCSIT) Vol. 6 (1), 2015, 685-688 [4] T. Morkel,J.H.P. Eloff,M.S. Olivier An overview of image steganography ICSA Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa [5] http://www.programmer2programmer.net/live_projects/project_7/steganography.aspx(accessed on Aug 2015) [6] http://www.sans.org/reading-room/whitepapers/covert/detailed-steganographic-techniques-open-systemsenvironment-677 (Accessed on Aug 2015) [7] Bankar Priyanka R, Katariya Rushabh R, Patil Komal, Shashikant Pingle, Sanghvi Mahesh Audio Steganography Using LSB 1st International Conference on Recent Trends in Engineering & Technology, Mar-2012. [8] Kshetrimayum Jenita Devi A Sesure Image Steganography Using LSB Technique and Pseudo Random Encoding Technique Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, India. www.nitrkl.ac.in May 2013 @IJMTER-2016, All rights Reserved 421