A New hybrid method in watermarking using DCT and AES

Similar documents
ECE596C: Handout #7. Analysis of DES and the AES Standard. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Introduction to Cryptology. Lecture 17

Encryption Details COMP620

Cryptography and Network Security. Sixth Edition by William Stallings

Block Ciphers. Lucifer, DES, RC5, AES. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk Block Ciphers 1

CPSC 467b: Cryptography and Computer Security

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

CPSC 467b: Cryptography and Computer Security

Implementation of Full -Parallelism AES Encryption and Decryption

Goals of Modern Cryptography

Block Ciphers. Secure Software Systems

FPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY

Content of this part

Course Business. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Allowed to bring one index card (double sided) Location: Right here

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 4 The Advanced Encryption Standard (AES) ver. October 28, 2009

L3: Basic Cryptography II. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Lecture 2: Secret Key Cryptography

Week 5: Advanced Encryption Standard. Click

A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm

Goals for Today. Substitution Permutation Ciphers. Substitution Permutation stages. Encryption Details 8/24/2010

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Analysis of the Use of Whirlpool s S-box, S1 and S2 SEED s S- box in AES Algorithm with SAC Test Novita Angraini, Bety Hayat Susanti, Magfirawaty

Area Optimization in Masked Advanced Encryption Standard

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Block Ciphers Introduction

Data Encryption Standard (DES)

Winter 2011 Josh Benaloh Brian LaMacchia

CPSC 467: Cryptography and Computer Security

Design Implementation of Composite Field S-Box using AES 256 Algorithm

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

Cryptography and Network Security

Implementation of the block cipher Rijndael using Altera FPGA

HOST Cryptography III ECE 525 ECE UNM 1 (1/18/18)

Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM

Efficient Area and High Speed Advanced Encryption Standard Algorithm

AES Cryptosystem Acceleration Using Graphics Processing Units. Ethan Willoner Supervisors: Dr. Ramon Lawrence, Scott Fazackerley

AES ALGORITHM FOR ENCRYPTION

in a 4 4 matrix of bytes. Every round except for the last consists of 4 transformations: 1. ByteSubstitution - a single non-linear transformation is a

Design and Implementation of Rijndael Encryption Algorithm Based on FPGA

Fundamentals of Cryptography

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Cryptographic Algorithms - AES

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

Optimized AES Algorithm Using FeedBack Architecture Chintan Raval 1, Maitrey Patel 2, Bhargav Tarpara 3 1, 2,

Presented by: Kevin Hieb May 2, 2005

FPGA Based Design of AES with Masked S-Box for Enhanced Security

Cryptography Functions

The NSA's Role In Computer Security. Adrien Cheval Joe Willage

AES Advanced Encryption Standard

Modified Advanced Encryption Standard For Text And Images

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Digital Image Steganography Techniques: Case Study. Karnataka, India.

MEDICAL IMAGE PROTECTION IN CLOUD SYSTEM Philomina Jees 1, Diya Thomas 2 1

Efficient Hardware Design and Implementation of AES Cryptosystem

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

Secret Key Cryptography

Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures

ISSN: Page 320

Security against Timing Analysis Attack

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Secret Key Cryptography

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

IMPROVEMENT KEYS OF ADVANCED ENCRYPTION STANDARD (AES) RIJNDAEL_M

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION

Symmetric-Key Cryptography

Advanced Encryption Standard

Design of Least Complex S-Box and its Fault Detection for Robust AES Algorithm

A new robust watermarking scheme based on PDE decomposition *

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Delineation of Trivial PGP Security

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

Scanned by CamScanner

A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform

Chapter 7 Advanced Encryption Standard (AES) 7.1

Symmetric Key Cryptography

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

Encryption and Decryption by AES algorithm using FPGA

2 Algorithm Description

Digital Logic Design using Verilog and FPGA devices Part 2. An Introductory Lecture Series By Chirag Sangani

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General considerations for cipher design:

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box

Symmetric encryption algorithm image for wireless multimedia sensor network

Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES

Comparison of Performance of AES Standards Based Upon Encryption /Decryption Time and Throughput

Symmetric Cryptography. CS4264 Fall 2016

International Journal of Advance Engineering and Research Development

ENEE 459-C Computer Security. Symmetric key encryption in practice: DES and AES algorithms

Combination of RGB Substitution for Text to Image Encryption Technique using AES

AES Core Specification. Author: Homer Hsing

Face Protection by Fast Selective Encryption in a Video

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

A New Approach to Compressed Image Steganography Using Wavelet Transform

Application of Data Hiding in Audio-Video Using Advance Algorithm

Digital Watermarking Using 2-DCT

Transcription:

International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.64-69 A New hybrid method in watermarking using DCT and AES 1 Yasir Mustafa Wais 2 Ardm Hasseb Mohammed Ali 1,2 Department of Electronic and Communication University of Cankaya Ankara - Turkey Abstract:- In this paper I'm trying to make a combination between the encryption by using one of the most powerful algorithm called Advanced Encryption Standard (AES) to encrypt a secret message another word logo and then embed it in the digital image in frequency domain by using the Discrete Cosine Transform (DCT) in low frequency to increase the robustness and then applying some attacks to check it. Index Terms:- Advanced Encryption Standard, Discrete Cosine Transform. I. INTRODUCTION Basically to protect any kind of secrete message transmitted over the network from playing on it or eavesdrops by attackers, there are two approaches have been imposed. One is a traditional one cryptography approach, which used to convert a secrete message or to unrecognizable form by using secret Key beside of algorithm. Second one is watermark which used to hide your secrete message inside digital media (images, video, audio etc.) this project am trying to make a combination between cryptography by using AES algorithm and watermark by using DCT. II. DISCRETE COSINE TRANSFORM The DCT is a very popular transform function used in signal processing. It transforms a signal from spatial domain to frequency domain. Due to good performance, it has been used in JPEG standard for image compression. DCT has been applied in many fields such as data compression, pattern recognition, image processing, and so on. The DCT transform and its inverse manner can be expressed as follows. Where As an image transformed by the DCT, it is usually divided into non-overlapped m x m block. In general, a block always consists of 8x8 components. The block coefficients are shown in figure 1. The left-top coefficient is the DC value while the others stand for AC components. The zigzag scanning permutation is implied the energy distribution from high to low as well as from low frequency to mid then high frequency with the same manner. Figure 1 DCT coefficients and zigzag 64

The human eyes are more sensitive to noise in lower-frequency band than higher frequency. The energy of natural image is concentrated in the lower frequency range. The watermark hidden in the higher frequency band might be discarded after a lossy compression. Therefore, the watermark is always embedded in the lowerband (lower frequency) range of the host image that transformed by DCT is perfect selection. III. DESCRIBING THE PROPOSED ALGORITHM A. Embedding algorithm using DCT Embedding process has been done by using cover image with size 512x512 and logo or watermark image with size 128x128 in low frequency according of below steps 1- Initial step of embedding process consist of breakout the original image NxN in to 8x8 blocks and the logo or watermark image into 4x4 blocks. 2- Make a DCT for each original and logo block. 3- Convert each original and logo block to vector form by using Zigzag order 4- Apply below embedding equation, which represent a block from original image, represent a block from logo and represent the scaling factor. 5- After embedding process apply a Re-zigzag order to convert the vector to block. 6- Make inverse DCT to convert it to spatial domain 7- Repeat the steps until all blocks run out. The figure 2 explains the embedding process for two kinds of logo first normal one and second encrypted one Figure 2 Embedding process B. Extracting algorithm Extraction process it's kind of inverse operation for embedding process which done by using cover or original image 512x512 and watermarked image with size 512x512 according of below steps 1- Breakout the watermarked image and original image into 8x8 blocks 2- Make a DCT for each watermarked and original block 3- Apply Zigzag order for each watermarked and original block to convert it to vector 4- Apply below extracting equation. = - /. 5- After extracting process apply Re-zigzag order to convert vector to block 6- Make inverse DCT to convert it to spatial domain 7- Repeat the steps until all blocks run out. 65

The figure 3 explains the extraction process for one kind of logo the normal one same outcomes for encrypted one Figure 3 Extraction process IV. ADVANCED ENCRYPTION STANDARD In January 1997, researchers world-over were invited by National Institute of Standards and Technology (NIST) to submit proposals for a new standard to be called Advanced Encryption Standard (AES)in order to take a place of Data Encryption Standard (DES), which was published in 1977. Thus after the selection process the two Belgian cryptographers, Joan Daemen and Vincent Rijmen, win the contest therefore some AES called the Rijndael algorithm. In June 2003, the U.S. Government announced that AES could be used to protect classified information "Top Secret". the Rijndael algorithm support supported plaintext sizes of 128, 192 and 256 bits, as well as, keylengths of 128,192 and 256 bits. But in my approach I used 128 bit's because of gray level image which each pixel represent 1 byte. So to descript how the algorithm works to encrypt or decrypt an image A. Encryption process In encryption process am going to pick up each 4x4 logo block as a state matrix together with cipher key as a input to encryption process and repeat the operation until the blocks run out in logo image the below steps explain the encryption process for each block. 1- Key Expansion - The algorithm for generating the 10 rounds of the round key is as follows: The 4th column of the key is rotated such that each element is moved up one row. Then puts this result through a forwards Sub Box algorithm which replaces each 8 bits of the matrix with a corresponding 8-bit value from S-Box. To generate the first column of the key, this result is XOR -ed with the first column of the i-1th key as well as a constant (Row constant or Rcon) which is dependent on i. 66

Then select the second column of the key and then continues iteratively for the other two columns in order to generate round key 1. 2. Initial Round 1. Add Round Key : each byte of the state is combined with the round key using bitwise xor. 3. Rounds 1. Sub Bytes a non-linear substitution step where each byte is replaced with another according to a lookup table. 2. Shift Rows a transposition step where each row of the state is shifted cyclically a certain number of steps. 3. Mix Columns a mixing operation which operates on the columns of the state, combining the four bytes in each column. 4. Add Round Key 4. Final Round (no MixColumns) 1. SubBytes 2. ShiftRows 3. AddRoundKey B. Decryption process It s kind of inverse process that used same 10 round keys but with the inverse SubBytes, inverse ShiftRows and inverse MixColumns. V. EXPERIMENTAL RESULTS The test has been done by using some of the popular images like (Cameraman) as an original image with regards of the two kinds of logo one is encrypted one as below. 67

The second one is normal logo (My university logo) A New hybrid method in watermarking using DCT and AES To embed these two logos with scale factor 0.08 the outcomes like below with the PSNR. To apply some attacks and then extract the logo the outcomes like below Regarding of outcomes for extraction process like below 68

VI. CONCLUSIONS The combination idea work just normal case when you extract an encrypted logo and then decrypt it but when you apply any kind of attacks this idea does not stand, take a look for extract normal logo it's contain a little bit noise depend of type of attack this will be same impact for encrypted logo and to decrypted it according to AES will be impossible to get a secret message. Therefore I think if there is noise reduction for each attack used to eliminate impacted logo and then apply decryption process or find out another encryption algorithm with can decrypt an impacted logo. REFERENCES [1]. A Digital Image Watermarking Method in the Discrete Cosine Transformation Domain, Mohammad Reza Khammar, Yunusa Ali Saied, M. H Marhaban. [2]. A Digital Image Watermarking Method in the Discrete Cosine Transformation Domain, Mohammad Reza Khammar, Yunusa Ali Saied, M. H Marhaban. [3]. Intelligent Multimedia Analysis for Security Applications edited by Husrev T. Sencar, Sergio Velastin, Nikolaos Nikolaidis, Shiguo Lian. [4]. Digital Watermarking Using DCT Transformation, Wen Yuan Chen and Shih Yuan Huang. [5]. A DCT-domain system for robust image watermarking Mauro Barni, Franco Bartolini, Vito Cappellini, Alessandro Piva. [6]. http://en.wikipedia.org/wiki/advanced_encryption_standard. [7]. Understanding AES Mix-Columns Transformation Calculation, Kit Choy Xintong. 69