SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering
             Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1492-1496
      Four key Secured Data Transfer Using Steganography and
                          Cryptography
                     S.G. Gino Sophia, K.Padmaveni, Linda Joseph
                   School of Computing Sciences and Engineering Hindustan University


Abstract
         Steganography and cryptography are              other part of the program is protected on changing
used to send the data in a confidential way.             the decision of a design from the extensive
Steganography hides the existing message and             modification. For better confidentiality security we
cryptography will confuse the message. The               use both cryptography and Steganography in this
transformation of plain text to cipher text is           paper to develop one system. DES algorithm is a
called as encryption. The transformation of              secured     technique      for   cryptography and
cipher text to plain text is called decryption.          Steganography methods. Our idea is based on
Encryption and decryption are controlled by              combining these techniques the intruder may find
keys. Hashing, symmetric and asymmetric                  the original data, to get a highly secured system for
algorithms are cryptographic techniques. There           data hiding. In data hiding the following are
is a difficulty to find the hidden messages. For         performed.
this purpose various transformations like DCT,           The part of a message which is encrypted will be
FFT, FFT, and 2DDCT are used. A system is                hidden instead of hiding message which is highly
proposed in this paper to develop a new                  encrypted.
technique along with a newly enhanced security           The encrypted message which are unhidden will be
model in which cryptography and Steganography            converted into two secrete keys.
are used. In cryptography DES algorithm is used          To get the original text along with keys for
to encrypt a message and part of the message is          Steganography and cryptography, two extra keys
hidden in 2DDCT of an image and the rest of the          and the reverse process of the key generation should
message will generate two secrete keys for the           be known. So the aim of the project is to develop
generation if high security.                             system which is more secured and even if the
                                                         messages from stegno images are retrieved from
Keywords: Steganography, Cryptography, Data              somebody [1], it becomes meaningless for any
hiding, 2DDCT, DES algorithm                             existing cryptographic techniques.

I.   INTRODUCTION                                        II. BASIC CONCEPTS AND RELATED
           Information security is called cryptography       WORK
[3]. Some techniques included in cryptography are                  For security there are many aspects. One of
the merging of words with images, microdots and          the aspects for confidential communication is that of
the different ways of hiding the data in storage.        cryptography. The specific security requirements [8]
Cryptography mainly concern with the conversion          for cryptography are confidentiality, authentication
plain text into cipher text. This process is called      and integrity, on-repudiation.
encryption. The reverse of this process is called        The following describes the four types of
decryption. The four objectives in modern                algorithms:
cryptography       are:(i)Confidentiality(unauthorized   (a)Public key cryptography (PKC): uses one
person will not be able to understand the                public key for encryption and uses other private key
data)(ii)Integrity(The data can’t be altered in the      for decryption.
storage           between           sender         and   (b)Key distribution centre single key (KDC): A
receiver)(iii)Authentication(confirmation from the       single key is shared with the key distribution centre.
sender and receiver side) (iv)Non- repudiation(at the    Key management and authentication is performed
later stage the sender will not be able to refuse the    by KDC for communication key distribution is
data which is about for transmission).                   essential.
Steganography, this hides information by                 (c)Shared secrete key: Both source and destination
embedding the messages within other. Replacement         share the secrete key. It is also called as challenge
of useless bits or used data is the work performed by    response protocol.
it. If the encryption is not allowed Steganography is    (d)Hash function: To encrypt data irreversibly a
used or otherwise encryption is supplemented by          mathematical transformation is used. The other
Steganography. This encrypted file may also hide         technique for communication is Steganography [7].
information’s. The hidden messages will not be seen      It transfers the messages by which it can’t be
if the encrypted file is deciphered. Data hiding: The    detected. The information can be hidden in audio,



                                                                                              1492 | P a g e
S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering
             Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1492-1496
video, text, images, or code [11] which is digitally    reverse distortion process. Here the system is
representative.                                         designed with three modules.
                                                        (i)Crypto module for cryptography
A. DES algorithm for cryptography                       (ii)Stegno module for Steganography [10] and
         DES algorithm is a cipher block, which         (iii)Security module for more security
encrypt data in 64 bit block. It is a symmetric
algorithm which uses same algorithm [13] and key       A. Hiding the text
for encryption and decryption. This algorithm           Crypto module:
encrypts and decrypts the blocks of data containing    For the encryption of data the following steps are
64 bits under 64 bit key controls.                     considered in crypto module [14].
 Advantages of using DES algorithm                   For encryption the text is inserted
(i)The security of this algorithm resides in the key  DES algorithm is applied using 64bit key
(ii)More secured as the length of the key is  Hexadecimal form cipher text is generates
increased.
                                                            Input             DES                 Output hexa
B. 2DDCT algorithm for Steganography                        string            algorithm           cipher text
          This      2 dimensional discrete cosine
transformations is         a signal from spatial        Figure1: Crypto module
representation into frequency representation. Than
higher frequencies, lower frequencies are more              Security Module:
obvious on transforming an image [5] into                         To our newly developed system an extra
frequency components. By throwing away higher           security feature is provided by this intermediate
frequency coefficients without sacrificing too much     module. Cipher text is modified by this module to
image quality [15] , reduce the amount of needed        generate two extra keys [6]. It regenerates the
data to describe the image.Over simplified Jpeg         original cipher text on its reverse process. The
compressor                                              process of this module before hiding the process
 Image is cut into 8x8 pixel of chunks                 follows:
 Through an 8x8 2DDCT run each chunk                    The alphabets and digits are separated from
 Resulting coefficients are quantified                     cipher text
 Quantified coefficients are compressed using a         The digits and the track of the original position
     losels’ methods                                        of the alphabets are kept in the form of a secrete
Formulae for 2DDCT:                                         key (keyC)
Ru=1/√2 if u=0                                           In first step, the first seven characters are
          1 else                                            separated, the remaining alphabets are added to
Rv = 1/√2 if v=0                                            the end of the separated digits as in the first step
          1 else                                            by which the second key (keyD) is guaranteed.
else
Fvu =                                                                                     Key 4 is generated by
1/4 Rv Ru                                Syx cos(vπ                                       adding remaining digits and
2y+1/2N)cos(vπ 2x+1/2N)                                                                   character
Inverse Discrete Cosine Transform:
Image can be rebuild in the spatial domain from                      Output
frequencies                                                          Hexadecimal
IDCT formulae:                                                                            First seven alphabets are
Ru=1/√2 if u=0                                                                            chosen for hiding
else
          Rv = 1/√2 if v=0
                1 else
Fyx=1/4                 RvRu                Fvucos(vπ
2y+1/2N)cos(vπ 2x+1/2N)                                              KeyC
Until the coefficient quantizing is started no image                 generated
is lost.DCT is perfectly reversible.                                 from digits
                                                                     and original           Digits and alphabets
III. PROPOSED SYSTEM                                                 position of            are separated from
         The two different techniques are combined                   the alphabet           cipher text
which is based on idea of distortion of message and
hiding the existence of distorted message for getting
back the original information and retrieve the data
which is distorted [2] and regain the actual text by          Figure2: security module



                                                                                                    1493 | P a g e
S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering
             Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1492-1496
 Stegno Module:                                                       Original seven
The above guaranteed cipher text are hidden by the
                                                                       alphabets are
following steps:
 From the above discussed security module the                         retrieved
     seven alphabets are taken                                                    Using keyB
                                                       2DDCT of the               unscramble
 The alphabets are scrambled using 128 bit key        original image             the disort
 2DDCT of the image is found
                                                       is taken                   seven
 By altering 2DDCT the cipher text is hidden                                     alphabets
 Inverse 2DDCT is applied
 Stegno image is found
                                                       2DDCT of the
                                                                                   Disorted
     From security             Inverse                 stegno image is
                                                                                   seven
     module seven              2DDCT                   taken
                                                                                   alphabets are
     alphabets are
                                                                                   constructed
     taken
                                                      Difference of
                                                      2DDCT
                                                      coefficient is               From LSB of
      Alphabets
                           Stegno image               taken                        2DDCT bits
      are
                                                                                   are retrieved
      scrambled
                                                                                   from the
      using 128
                                                                                   hidden seven
      bit key
                         By altering 2DDCT,                                        alphabets
                         seven alphabets are
    Gray scale           hidden                       Figure4: stegno module (reverse process)
    image is taken
                                                           Security Module(reversing process):
     2DDCT of image is found                          For retrieving the cipher text the following steps are
                                                      considered in the security module:
Figure3: Stegno module
                                                      The seven characters are clubbed with the alphabets
B. Retrieving text                                    of keyD
 Stegno Module(reversing process):
To retrieve the cipher text the following steps are   The cipher text is reconstructed using keyC and
considered in stegno module:                          keyD from digits and alphabets.
 2DDCT of the original image is taken
 2DDCT of the stegno image is taken
 Difference of 2DDCT coefficient is taken            From reverse
 From LSB of 2DDCT bits are retrieved from           stegno module
    the hidden seven alphabets                        the seven
 The distorted seven alphabets are constructed
                                                      alphabets are
 Using keyB unscramble the distort seven
                                                      retrieved
    alphabets                                                                             Cipher text is
 Original seven alphabets are retrieved                                                  reconstructed in
                                                          KeyC & D                        hexadecimal
                                                                                          form



                                                      Figure5: security module (reversing processing)

                                                       Crypto Module(Reversing Process):
                                                      For retrieving the original text the following steps
                                                      are Considered in crypto module:
                                                      Retrieved cipher text is taken from the above
                                                      Reverse DES algorithm by using keyA
                                                      Original message is obtained.




                                                                                               1494 | P a g e
S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering
             Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 3, Issue 1, January -February 2013, pp.1492-1496
                                                             From keyB the rest of the alphabets are added back
   Cipher data                 Original data                 to seven characters which are retrieved from the
                                                             image

                                                             With the help of the keyA the digits and elements
                                                             are reorganized to get back the original cipher data
                  Reverse DES                                in the form of hexadecimal
                  algorithm using
                  keyA                                       The original message from the cipher text is
                                                             regenerated with the help of DES algorithm.

Figure6: crypto module (reversing process)                   C. Advantage of the proposed system:
                                                             The proposed system is highly secured because
IV. IMPLEMENTATION DETAILS
By VC6.0 platform using VC++ this project is                 Let’s the combination of two secured techniques
developed. The three modules taken part are                  a) DES for cryptography
a) Crypt module                                              b) 2DDCT for Steganography
b) Security module                                          NNumber of keys:
c) Stegno module                                             Four keys are used in this system
                                                             a) For scrambling the cipher text one 56 bit private
A. Algorithm for the proposed system:                        key
In DES algorithm we are getting the cipher text as           b) For DES algorithm one 64 bit private key
hexadecimal form [9].                                        c) For retrieving the original data two extra private
                                                             generated key
Data is encrypted in units which are smaller than the        The system is highly secured by using these two
defined block size.                                          extra generated keys.

Using cipher feedback mode, DES is converted into            V. CONCLUSION
stream cipher. With the same key more than one               The summary of this project is mentioned in the
message is encrypted and different initialization            following points:
vector is used.                                             AThe new system with the combination of
                                                             cryptography and Steganography using 4 keys is
 Cipher feedback mode (CFB) is same as the block             introduced.
cipher. Here encryption is not parallelizable only          TThe method used for encryption using DES
decryption is parallelizable [12] and it has random          algorithm is very secure and it is the main advantage
access property. It is self recovery with respect to         of this system. The 2DDCT transformation
synchronization errors.                                      Steganography is very difficult to detect.

A. Hiding text:
                                                             REFERENCE
Cipher text is generated in hexadecimal form by                [1]   Owen, M.,” A discussion of covert
DES algorithm in the form of alphabets like .                        channels and Steganography”, SANS
With the help of a intermediate the alphabets and                    institute, 2002
digits are separated and the original position of the          [2]J. Zollner,     H.federrath,  H.klimant,    et
alphabets and digits are kept tracked in the form of                 al.,”modeling the security of systems:,
first key(keyA).                                                     steganographic in 2nd workshop on
                                                                     information hiding,Portland,april 1998,
 The first seven characters of the alphabets are taken               pp.345-355.July1999.
and hidden in the image                                        [3]   D.R.Stinson, cryptography: Theory and
The rest of the alphabets are taken and combined                     practice, Boca Raton, Press, 1995.ISBN:
with digits. This form the second key                                0849385210
                                                                [4] M.M         Amin,    M.Salleh,    S.Ibrahim,
Then the seven characters are hidden in the image                    M.R.katmin, and M.Z.I. Shamsuddin,”
mentioned in image 2.2                                               information Hiding using Steganography”,
                                                                     IEEE 0-7803-7773-March 7, 2003.
            B. Retrieving text                                  [5] Marvel, L. M., Boncelet Jr., C.G.&Retter,
From the image the seven characters are retrieved                    C.,”Spread spectrum Steganography”,
                                                                     IEEE        Transactions      on     image
From keyB with the help of seperator2 the alphabets                  processing,8:08,1999
and digits are separated



                                                                                                 1495 | P a g e
S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering
               Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                      Vol. 3, Issue 1, January -February 2013, pp.1492-1496
  [6]   Alain C.Brainos II East Carolina
        university,” Study of Steganography and
        The Art of Hiding information”, November
        13,2003.
  [7]   Dunbar,B.,”Steganography techniques and
        their    use     in     an     Open-Systems
        environment”, SANS Institute,Januray
        2002
        [8]Stinsown,D.”Cryptography: Theory and
        Practice”
  [9]   Neil F.Johnson, Zoran uric, Sushil jajodia,”
        Information hiding: steganography and
        watermarking             attacks         and
        countermeasures”, Kluwer academic press,
        Norway, MA, Newyork, 2000.
   [10] N.Provos,      P.Honeyman,”        Detecting
        Steganography content on the Internet”.
        Transformation”,         ZEICE         Tram.
        [11]Chandramouli, R., Kharrazi, M.&
        Memon,N.,’Image proceedings of the 2nd
        Workshop on Digital Watermarking,
        October 2003.
  [12] R A Isbell,”Steganography: Hidden
        Menace        or       Hidden       saviour”,
        Steganography white Paper, IO May 2002
        [13] Domenico Daniele Bloisi, Luca
        Iocchi: Image based steganography and
        cryptography, Computer Vision theory and
        applications volume1, pp.127-134
  [14] E.T.Lin and E.J.Delp,”A Review of Data
        Hiding in Digital Images”, JUNE 20001
   [15] Ros J.Anderson,Fabien A.P.petitcolas,” on
        The Limits of Steganography”, IEEE
        Journal     of      Selected     Areas     in
        Communications,16(4):474-481,May 1998.
        [16]http://www.xdp.it

About Authors:
S.G. Gino Sophia , M.Tech Computer Science and
Engineering working as a Selection Grade Assistant
professor, Hindustan university, Chennai has 9 years
of teaching experience and has published 7
international journal / conference papers.

K.Padmaveni, ME             Computer Science and
Engineering working as a Selection Grade Assistant
professor, Hindustan university, Chennai has 8 years
of teaching experience and has published 9
international journal / conference papers.

Linda Joseph, ME            Computer Science and
Engineering working as a Senior Scale Assistant
professor, Hindustan university, Chennai has 7 years
of teaching experience and has published 8
international journal / conference papers.




                                                                                 1496 | P a g e

Mais conteúdo relacionado

Mais procurados

Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batchJaimin Jani
 
Document Analysis with Deep Learning
Document Analysis with Deep LearningDocument Analysis with Deep Learning
Document Analysis with Deep Learningaiaioo
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionIJCSIS Research Publications
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...IDES Editor
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESIJNSA Journal
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
 
Enhancing Privacy of Confidential Data using K Anonymization
Enhancing Privacy of Confidential Data using K AnonymizationEnhancing Privacy of Confidential Data using K Anonymization
Enhancing Privacy of Confidential Data using K AnonymizationIDES Editor
 
Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureTELKOMNIKA JOURNAL
 
Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmijp2p
 

Mais procurados (19)

Bj32392395
Bj32392395Bj32392395
Bj32392395
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
50620130101002
5062013010100250620130101002
50620130101002
 
Document Analysis with Deep Learning
Document Analysis with Deep LearningDocument Analysis with Deep Learning
Document Analysis with Deep Learning
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptography
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
585 589
585 589585 589
585 589
 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto System
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
Enhancing Privacy of Confidential Data using K Anonymization
Enhancing Privacy of Confidential Data using K AnonymizationEnhancing Privacy of Confidential Data using K Anonymization
Enhancing Privacy of Confidential Data using K Anonymization
 
Authentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signatureAuthentication system for e-certificate by using RSA’s digital signature
Authentication system for e-certificate by using RSA’s digital signature
 
Pbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithmPbcbt an improvement of ntbcbt algorithm
Pbcbt an improvement of ntbcbt algorithm
 

Destaque

Gatos na UFRN
Gatos na UFRNGatos na UFRN
Gatos na UFRNhanaad
 
Acuerdo reegional 041 2011 - GRA
Acuerdo reegional 041 2011 - GRAAcuerdo reegional 041 2011 - GRA
Acuerdo reegional 041 2011 - GRAKarla Castillo
 
Fiesta olímpica
Fiesta olímpicaFiesta olímpica
Fiesta olímpicamluzcc100
 
Mentalidade 6 com pág. 01 a 15
Mentalidade 6   com pág. 01 a 15Mentalidade 6   com pág. 01 a 15
Mentalidade 6 com pág. 01 a 15Asael Souza
 
Gerenciamento de crise
Gerenciamento de criseGerenciamento de crise
Gerenciamento de criseGlobal Map
 

Destaque (10)

Paulinho 7 b
Paulinho 7 bPaulinho 7 b
Paulinho 7 b
 
Reunião apimec 2007
Reunião apimec 2007Reunião apimec 2007
Reunião apimec 2007
 
U_DOC
U_DOCU_DOC
U_DOC
 
Gatos na UFRN
Gatos na UFRNGatos na UFRN
Gatos na UFRN
 
Acuerdo reegional 041 2011 - GRA
Acuerdo reegional 041 2011 - GRAAcuerdo reegional 041 2011 - GRA
Acuerdo reegional 041 2011 - GRA
 
Inclusao social
Inclusao socialInclusao social
Inclusao social
 
Fiesta olímpica
Fiesta olímpicaFiesta olímpica
Fiesta olímpica
 
Mentalidade 6 com pág. 01 a 15
Mentalidade 6   com pág. 01 a 15Mentalidade 6   com pág. 01 a 15
Mentalidade 6 com pág. 01 a 15
 
Gerenciamento de crise
Gerenciamento de criseGerenciamento de crise
Gerenciamento de crise
 
EMPRESA BATX
EMPRESA BATXEMPRESA BATX
EMPRESA BATX
 

Semelhante a Hv3114921496

A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyZac Darcy
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Swati Nagpal
 
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDijait
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 

Semelhante a Hv3114921496 (20)

A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and Cryptography
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
H42054550
H42054550H42054550
H42054550
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERA SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHER
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
F010243136
F010243136F010243136
F010243136
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 

Hv3114921496

  • 1. S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1492-1496 Four key Secured Data Transfer Using Steganography and Cryptography S.G. Gino Sophia, K.Padmaveni, Linda Joseph School of Computing Sciences and Engineering Hindustan University Abstract Steganography and cryptography are other part of the program is protected on changing used to send the data in a confidential way. the decision of a design from the extensive Steganography hides the existing message and modification. For better confidentiality security we cryptography will confuse the message. The use both cryptography and Steganography in this transformation of plain text to cipher text is paper to develop one system. DES algorithm is a called as encryption. The transformation of secured technique for cryptography and cipher text to plain text is called decryption. Steganography methods. Our idea is based on Encryption and decryption are controlled by combining these techniques the intruder may find keys. Hashing, symmetric and asymmetric the original data, to get a highly secured system for algorithms are cryptographic techniques. There data hiding. In data hiding the following are is a difficulty to find the hidden messages. For performed. this purpose various transformations like DCT, The part of a message which is encrypted will be FFT, FFT, and 2DDCT are used. A system is hidden instead of hiding message which is highly proposed in this paper to develop a new encrypted. technique along with a newly enhanced security The encrypted message which are unhidden will be model in which cryptography and Steganography converted into two secrete keys. are used. In cryptography DES algorithm is used To get the original text along with keys for to encrypt a message and part of the message is Steganography and cryptography, two extra keys hidden in 2DDCT of an image and the rest of the and the reverse process of the key generation should message will generate two secrete keys for the be known. So the aim of the project is to develop generation if high security. system which is more secured and even if the messages from stegno images are retrieved from Keywords: Steganography, Cryptography, Data somebody [1], it becomes meaningless for any hiding, 2DDCT, DES algorithm existing cryptographic techniques. I. INTRODUCTION II. BASIC CONCEPTS AND RELATED Information security is called cryptography WORK [3]. Some techniques included in cryptography are For security there are many aspects. One of the merging of words with images, microdots and the aspects for confidential communication is that of the different ways of hiding the data in storage. cryptography. The specific security requirements [8] Cryptography mainly concern with the conversion for cryptography are confidentiality, authentication plain text into cipher text. This process is called and integrity, on-repudiation. encryption. The reverse of this process is called The following describes the four types of decryption. The four objectives in modern algorithms: cryptography are:(i)Confidentiality(unauthorized (a)Public key cryptography (PKC): uses one person will not be able to understand the public key for encryption and uses other private key data)(ii)Integrity(The data can’t be altered in the for decryption. storage between sender and (b)Key distribution centre single key (KDC): A receiver)(iii)Authentication(confirmation from the single key is shared with the key distribution centre. sender and receiver side) (iv)Non- repudiation(at the Key management and authentication is performed later stage the sender will not be able to refuse the by KDC for communication key distribution is data which is about for transmission). essential. Steganography, this hides information by (c)Shared secrete key: Both source and destination embedding the messages within other. Replacement share the secrete key. It is also called as challenge of useless bits or used data is the work performed by response protocol. it. If the encryption is not allowed Steganography is (d)Hash function: To encrypt data irreversibly a used or otherwise encryption is supplemented by mathematical transformation is used. The other Steganography. This encrypted file may also hide technique for communication is Steganography [7]. information’s. The hidden messages will not be seen It transfers the messages by which it can’t be if the encrypted file is deciphered. Data hiding: The detected. The information can be hidden in audio, 1492 | P a g e
  • 2. S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1492-1496 video, text, images, or code [11] which is digitally reverse distortion process. Here the system is representative. designed with three modules. (i)Crypto module for cryptography A. DES algorithm for cryptography (ii)Stegno module for Steganography [10] and DES algorithm is a cipher block, which (iii)Security module for more security encrypt data in 64 bit block. It is a symmetric algorithm which uses same algorithm [13] and key A. Hiding the text for encryption and decryption. This algorithm  Crypto module: encrypts and decrypts the blocks of data containing For the encryption of data the following steps are 64 bits under 64 bit key controls. considered in crypto module [14].  Advantages of using DES algorithm  For encryption the text is inserted (i)The security of this algorithm resides in the key  DES algorithm is applied using 64bit key (ii)More secured as the length of the key is  Hexadecimal form cipher text is generates increased. Input DES Output hexa B. 2DDCT algorithm for Steganography string algorithm cipher text This 2 dimensional discrete cosine transformations is a signal from spatial Figure1: Crypto module representation into frequency representation. Than higher frequencies, lower frequencies are more  Security Module: obvious on transforming an image [5] into To our newly developed system an extra frequency components. By throwing away higher security feature is provided by this intermediate frequency coefficients without sacrificing too much module. Cipher text is modified by this module to image quality [15] , reduce the amount of needed generate two extra keys [6]. It regenerates the data to describe the image.Over simplified Jpeg original cipher text on its reverse process. The compressor process of this module before hiding the process  Image is cut into 8x8 pixel of chunks follows:  Through an 8x8 2DDCT run each chunk  The alphabets and digits are separated from  Resulting coefficients are quantified cipher text  Quantified coefficients are compressed using a  The digits and the track of the original position losels’ methods of the alphabets are kept in the form of a secrete Formulae for 2DDCT: key (keyC) Ru=1/√2 if u=0  In first step, the first seven characters are 1 else separated, the remaining alphabets are added to Rv = 1/√2 if v=0 the end of the separated digits as in the first step 1 else by which the second key (keyD) is guaranteed. else Fvu = Key 4 is generated by 1/4 Rv Ru Syx cos(vπ adding remaining digits and 2y+1/2N)cos(vπ 2x+1/2N) character Inverse Discrete Cosine Transform: Image can be rebuild in the spatial domain from Output frequencies Hexadecimal IDCT formulae: First seven alphabets are Ru=1/√2 if u=0 chosen for hiding else Rv = 1/√2 if v=0 1 else Fyx=1/4 RvRu Fvucos(vπ 2y+1/2N)cos(vπ 2x+1/2N) KeyC Until the coefficient quantizing is started no image generated is lost.DCT is perfectly reversible. from digits and original Digits and alphabets III. PROPOSED SYSTEM position of are separated from The two different techniques are combined the alphabet cipher text which is based on idea of distortion of message and hiding the existence of distorted message for getting back the original information and retrieve the data which is distorted [2] and regain the actual text by Figure2: security module 1493 | P a g e
  • 3. S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1492-1496  Stegno Module: Original seven The above guaranteed cipher text are hidden by the alphabets are following steps:  From the above discussed security module the retrieved seven alphabets are taken Using keyB 2DDCT of the unscramble  The alphabets are scrambled using 128 bit key original image the disort  2DDCT of the image is found is taken seven  By altering 2DDCT the cipher text is hidden alphabets  Inverse 2DDCT is applied  Stegno image is found 2DDCT of the Disorted From security Inverse stegno image is seven module seven 2DDCT taken alphabets are alphabets are constructed taken Difference of 2DDCT coefficient is From LSB of Alphabets Stegno image taken 2DDCT bits are are retrieved scrambled from the using 128 hidden seven bit key By altering 2DDCT, alphabets seven alphabets are Gray scale hidden Figure4: stegno module (reverse process) image is taken  Security Module(reversing process): 2DDCT of image is found For retrieving the cipher text the following steps are considered in the security module: Figure3: Stegno module The seven characters are clubbed with the alphabets B. Retrieving text of keyD  Stegno Module(reversing process): To retrieve the cipher text the following steps are The cipher text is reconstructed using keyC and considered in stegno module: keyD from digits and alphabets.  2DDCT of the original image is taken  2DDCT of the stegno image is taken  Difference of 2DDCT coefficient is taken From reverse  From LSB of 2DDCT bits are retrieved from stegno module the hidden seven alphabets the seven  The distorted seven alphabets are constructed alphabets are  Using keyB unscramble the distort seven retrieved alphabets Cipher text is  Original seven alphabets are retrieved reconstructed in KeyC & D hexadecimal form Figure5: security module (reversing processing)  Crypto Module(Reversing Process): For retrieving the original text the following steps are Considered in crypto module: Retrieved cipher text is taken from the above Reverse DES algorithm by using keyA Original message is obtained. 1494 | P a g e
  • 4. S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1492-1496 From keyB the rest of the alphabets are added back Cipher data Original data to seven characters which are retrieved from the image With the help of the keyA the digits and elements are reorganized to get back the original cipher data Reverse DES in the form of hexadecimal algorithm using keyA The original message from the cipher text is regenerated with the help of DES algorithm. Figure6: crypto module (reversing process) C. Advantage of the proposed system: The proposed system is highly secured because IV. IMPLEMENTATION DETAILS By VC6.0 platform using VC++ this project is Let’s the combination of two secured techniques developed. The three modules taken part are a) DES for cryptography a) Crypt module b) 2DDCT for Steganography b) Security module  NNumber of keys: c) Stegno module Four keys are used in this system a) For scrambling the cipher text one 56 bit private A. Algorithm for the proposed system: key In DES algorithm we are getting the cipher text as b) For DES algorithm one 64 bit private key hexadecimal form [9]. c) For retrieving the original data two extra private generated key Data is encrypted in units which are smaller than the The system is highly secured by using these two defined block size. extra generated keys. Using cipher feedback mode, DES is converted into V. CONCLUSION stream cipher. With the same key more than one The summary of this project is mentioned in the message is encrypted and different initialization following points: vector is used.  AThe new system with the combination of cryptography and Steganography using 4 keys is Cipher feedback mode (CFB) is same as the block introduced. cipher. Here encryption is not parallelizable only  TThe method used for encryption using DES decryption is parallelizable [12] and it has random algorithm is very secure and it is the main advantage access property. It is self recovery with respect to of this system. The 2DDCT transformation synchronization errors. Steganography is very difficult to detect. A. Hiding text: REFERENCE Cipher text is generated in hexadecimal form by [1] Owen, M.,” A discussion of covert DES algorithm in the form of alphabets like . channels and Steganography”, SANS With the help of a intermediate the alphabets and institute, 2002 digits are separated and the original position of the [2]J. Zollner, H.federrath, H.klimant, et alphabets and digits are kept tracked in the form of al.,”modeling the security of systems:, first key(keyA). steganographic in 2nd workshop on information hiding,Portland,april 1998, The first seven characters of the alphabets are taken pp.345-355.July1999. and hidden in the image [3] D.R.Stinson, cryptography: Theory and The rest of the alphabets are taken and combined practice, Boca Raton, Press, 1995.ISBN: with digits. This form the second key 0849385210 [4] M.M Amin, M.Salleh, S.Ibrahim, Then the seven characters are hidden in the image M.R.katmin, and M.Z.I. Shamsuddin,” mentioned in image 2.2 information Hiding using Steganography”, IEEE 0-7803-7773-March 7, 2003. B. Retrieving text [5] Marvel, L. M., Boncelet Jr., C.G.&Retter, From the image the seven characters are retrieved C.,”Spread spectrum Steganography”, IEEE Transactions on image From keyB with the help of seperator2 the alphabets processing,8:08,1999 and digits are separated 1495 | P a g e
  • 5. S.G. Gino Sophia, K.Padmaveni, Linda Joseph / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1492-1496 [6] Alain C.Brainos II East Carolina university,” Study of Steganography and The Art of Hiding information”, November 13,2003. [7] Dunbar,B.,”Steganography techniques and their use in an Open-Systems environment”, SANS Institute,Januray 2002 [8]Stinsown,D.”Cryptography: Theory and Practice” [9] Neil F.Johnson, Zoran uric, Sushil jajodia,” Information hiding: steganography and watermarking attacks and countermeasures”, Kluwer academic press, Norway, MA, Newyork, 2000. [10] N.Provos, P.Honeyman,” Detecting Steganography content on the Internet”. Transformation”, ZEICE Tram. [11]Chandramouli, R., Kharrazi, M.& Memon,N.,’Image proceedings of the 2nd Workshop on Digital Watermarking, October 2003. [12] R A Isbell,”Steganography: Hidden Menace or Hidden saviour”, Steganography white Paper, IO May 2002 [13] Domenico Daniele Bloisi, Luca Iocchi: Image based steganography and cryptography, Computer Vision theory and applications volume1, pp.127-134 [14] E.T.Lin and E.J.Delp,”A Review of Data Hiding in Digital Images”, JUNE 20001 [15] Ros J.Anderson,Fabien A.P.petitcolas,” on The Limits of Steganography”, IEEE Journal of Selected Areas in Communications,16(4):474-481,May 1998. [16]http://www.xdp.it About Authors: S.G. Gino Sophia , M.Tech Computer Science and Engineering working as a Selection Grade Assistant professor, Hindustan university, Chennai has 9 years of teaching experience and has published 7 international journal / conference papers. K.Padmaveni, ME Computer Science and Engineering working as a Selection Grade Assistant professor, Hindustan university, Chennai has 8 years of teaching experience and has published 9 international journal / conference papers. Linda Joseph, ME Computer Science and Engineering working as a Senior Scale Assistant professor, Hindustan university, Chennai has 7 years of teaching experience and has published 8 international journal / conference papers. 1496 | P a g e