SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 5 (Jul. - Aug. 2013), PP 49-54
www.iosrjournals.org
www.iosrjournals.org 49 | Page
High Security Cryptographic Technique Using Steganography
and Chaotic Image Encryption
Arun A.S.1
, George M. Joseph2
1
M.Tech Student, Department of Electronics and Communication Engineering, SCT College of Engineering,
Kerala, India
2
Assistant Professor, Department of Electronics and Communication Engineering, SCT College of Engineering,
Kerala, India
Abstract : This paper proposes a novel cryptographic technique that exploits the advantages of two
important techniques – steganography and chaotic image encryption. Steganography is the technique of
hiding the message within a cover media. Once the message is embedded within the cover image, it is
encrypted using triple-key chaotic image encryption. So altogether this method provides a four-layer
security to the original message. Various analyses were done and the results of the experiments are very
encouraging and in future, this method can be extended to support media other than images.
Keywords - Cryptography, Colour Image, Steganography, Encryption, Chaotic logistic map.
I. INTRODUCTION
With the advent of internet and other communication methods, the security of the data being
transmitted has become important. One of the most important methods for transmitting a data securely is to hide
the data within another media and to transmit the cover media. The cover media can be text, image, audio or
video. By doing so, a third person is not aware that the transmitted media contains an embedded message. Once
the steganography is done, the resulting cover image which contains the embedded message is encrypted using
chaotic image encryption technique which uses three keys. For decryption, not only all the keys are required but
also they must be entered in the same order as entered for encryption.
II. IMAGE BASED STEGANOGRAPHY
Steganography[1] is the technique of hiding information within any media. The commonly used media
are plaintext, images, video, audio and IP datagram. In this paper, we are concerned with image steganography
only. Digital image steganography is the most widely used technique of steganography. The existence of large
number of digital images in the internet further allows us to use this technique for secure data transmission
through the internet. The message that can be embedded in the digital images includes plaintext, ciphertext,
other images and any other media which can be encoded as a bit stream. The inability of the human visual
system (HVS) to identify minor variations in the luminance of colour vectors is being exploited by the
steganography techniques.
All the digital images can be represented as a collection of pixel values. Colour images will have three
colour planes – red, green and blue. Each pixel will have optical characteristics like brightness, chroma, hue,
saturation etc. Each pixel value can be digitally represented in binary form. For example, a 24bit colour image
will have 8 bits each of red, green and blue values at each pixel position. Since 8 bits are used to represent each
value, it can have 28 values each of red, green and blue, ranging from 0 to 255. The human visual system is
insensitive to the changes in the least significant bits in the image, which enables the user to hide the message in
the least significant bits without being identified by an attacker.
The cover image for this technique can be either of uncompressed formats like bitmap or of
compressed formats like JPEG. In both formats, the LSBs are modified for hiding the message. If large cover
images are used, even audio files can be embedded in them without affecting the quality of the images.
III. IMAGE ENCRYPTION
Encryption is the process of encoding the message in such a way that an attacker will not be able to
read it. The media used for encryption can be plaintext, images, audio or video. In this paper, we consider only
image encryption. Some of the existing block cipher algorithms are: Data Encryption Standard
(DES)[2],Advanced Encryption Standard (AES)[3] and International Data Encryption Algorithm (IDEA)[4].
The problem with these algorithms is that they are not suitable to encrypt bulky data due to their
intensive computational costs. Computations can be accelerated by using additional hardware, but it further
increases the cost of the system.
High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption
www.iosrjournals.org 50 | Page
In order to overcome these problems, we can make use of chaotic image encryption technique[5].
Chaotic systems are non-linear systems with high sensitivity to initial conditions. Any change in the initial
conditions will result in compounding errors in the prediction of the system’s future behaviour. To predict the
behaviour of such systems, one must have sufficient knowledge about the initial conditions. Some of the
important properties of a chaotic system are[6]:
(i) Deterministic, so that they are characterised by mathematical equations.
(ii) Unpredictable and non-linear, and highly sensitive to initial conditions. Even a very slight change in
the starting point can lead to significant different outcomes.
(iii) Appear to be random and disorderly but beneath the random behavior there is a sense of order and
pattern.
The logistic map[7], parameterised by , which maps [0,1] [0,1] is the simplest 1D map which
exhibits complicated behaviour.
Xi = µ Xi-1 (1 - Xi-1) (1)
(1) can be represented using the bifurcation diagram as shown in Fig.1.
Fig. 1: Bifurcation diagram of 1D logistic map
The horizontal axis of the plot represents the bifurcation parameter whereas the vertical axis
represents the possible long-term population values of the logistic function. As the value of increases
bifurcation of the map occurs. From the plot we can see that as the value of is close to 4, many bifurcations
has occurred and the amount of chaos in the system is very high. We use the same principle in achieving chaotic
image encryption.
IV. PROPOSED SYSTEM
The proposed system for cryptography achieves the high security by making use of two powerful
techniques- steganography and image encryption. The steganography technique used in this system makes sure
that no collisions occur while selecting pixels for embedding the message, thereby improving the speed and
efficiency of the system. Once the message is embedded onto the cover image, it is encrypted using chaotic
image encryption technique. The proposed system model is shown in Fig.2.
High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption
www.iosrjournals.org 51 | Page
Fig.2: Proposed System
4.1 Method of Encryption
For achieving encryption, steganography is carried out first and then the resulting image is encrypted
using chaotic image encryption technique. The cover image used for encryption can be of any format and size.
4.2 Steganography
The steganography system takes in three inputs- cover image, message which is to be embedded and
the key for steganography. The message as well the key can contain alphabets, digits and special characters. The
message which is read from the user is converted to the binary value of its ASCII code. The key is used to find
the pixel positions for embedding the message. While selecting the pixel positions, the system makes sure that
no collisions occur. Had there been any collisions, there will be loss of data which will reduce the efficiency of
the system. Once the pixel positions are selected, the message in the binary form is embedded on to the image.
While embedding the message, the binary stream of the ciphertext is used to replace lowest 2 bits of red plane,
lowest 1 bit of green plane and lowest 3 bits of blue plane. Selecting different number of bits from each plane is
in accordance with the sensitivity of the human visual system(HVS)[8] to different colours. By doing so, we can
embed total of 6 bits at each pixel position without being detected by the human eye.
4.3 Chaotic Image Encryption
Once the message has been embedded in the image, the stego-image is given to the chaotic image
encryption system[6]. This system requires 3 keys for encryption - an 80 bit session key, an initial parameter
key and a control parameter key. The various steps for encryption are as given below:
Step 1: The Stego-image is converted to its equivalent binary image matrix form. Let the image
contains R rows and C columns. Then total number of pixels in the image is R × C = N pixels. The image is first
converted into a 1-dimensional array of size N × 1 and then each pixel is converted into 8-bit binary form. The
resulting binary image matrix can be represented as follows:
Pnk = (2)
Step 2: The next step of triple-key encryption is to compute the initial parameter key which will act as
the initial value of the chaotic logistic map. To compute the initial parameter key, the user is asked to enter two
keys – an 80 bit session key and a second key whose value is in between 0 and 1. The 80 bit session key can be
entered in the form of 20 hexadecimal characters.
K = k1k2k3…. k20 (3)
These hexadecimal characters are converted into the equivalent binary form. A block k of 24 bits, say,
k5k6k7k8k9k10, is extracted from the session key K. Any number of bits can be extracted depending upon the
requirement of the chaos that needed to be introduced into the system.
Compute X01 as given in (4):
X01 = (k51 × 20
+ ... + k54 × 23
+ k61 × 24
+ ... + k64 × 27
+ ... + k10 × 220
+ ... + k104 × 223
) / 224
(4)
Now, the initial parameter key, X(1) is computed when the user enters key X02 using (5).
X(1) = (X01+ X02) mod 1 (5)
Since, X(1) is the remainder of the division by 1, it will be a value between 0 and 1.
Step 3: Once the keys are generated, the next step is to generate the chaotic sequence that follows the 1D
logistic map. The Chaotic sequence X1 X2 X3…XN is generated as in (6).
Xi = µ Xi-1 (1 - Xi-1) (6)
High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption
www.iosrjournals.org 52 | Page
The initial parameter key X(1) is used as the initial value for the generation of the chaotic sequence.
The control parameter key µ is entered by the user. Since all the values in the chaotic sequence Xi are between
0 and 1, it must be normalized to the image scale, between 0 and 255.
For normalization (7) can be used:
(7)
Now, Xi is an array of size 1 N. After normalizing the chaotic sequence, all the values in Xi are
converted to their equivalent binary representations. Each pixel value is represented as 8-bit binary number so
that an N 8 matrix B is obtained.
B = (8)
Step 4: Next step is to construct the neural network using the values of the matrix B. Both weight
matrix and bias matrix are calculated using the matrix B. N weight matrices, each of size 8 x 8, are computed by
mapping each row of the matrix as follows:
wik = (9)
where i and k vary from 1 to 8 and n varies from 1 to N. Weight matrix W is a diagonal matrix whose diagonal
contains only values ±1. The diagonal element is 1 if the corresponding bit in chaotic sequence is zero and -1 if
the corresponding bit is one.
The bias matrix of size 1 x 8 is computed by mapping each row of B as given below:
θj (10)
Therefore θj contains values ± 1/2.
Step 5: Once the weight matrix and bias matrix are computed, then the encryption process can be
carried out. The cipher bit corresponding to each bit is computed as in (11) :
= sign ( (11)
(11) can be simplified as given below
= (12)
These steps are repeated for all the rows of B to obtain the encrypted matrix
P’nk = (13)
This binary matrix is converted to its decimal equivalent with values ranging from 0 to 255 and is
converted to a two dimensional array of size R × C. The red, green and blue plane of the colour images are
encrypted separately. The output of this process gives the encrypted image which contains the original message.
4.4 Decryption Process
Decryption consists of two processes - triple key decryption and inverse steganography. The encrypted
image is first decrypted using triple key decryption for which the system requires three keys - 80 bit session key,
initial parameter key and the control parameter key. The same keys which were used for encryption are required
for the decryption process also. Once triple key decryption is done, the resulting image is given to the inverse
steganography system which uses the stego-key to find the location of the pixels where the message was
originally embedded. Once the positions are calculated, the message bits are extracted and converted back to
alphanumeric form and displayed.
V. OBSERVATIONS AND RESULTS
Simulation was done in MATLAB and efficiency of the proposed method was calculated. The proposed
system was tested in images of different sizes and formats by using different combinations of keys. The results
of the simulation are presented in the paper. Fig. 3 shows the original image, image after steganography and the
final encrypted image.
High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption
www.iosrjournals.org 53 | Page
Fig 3: (a): Original Image. (b) Image after steganography (c) Image after encryption
From the simulation diagrams of Fig.3, we can observe that after the first process of steganography, the
resulting does not differ from the original image. So visually it is not possible to identify the existence of the
embedded message in the image. From the result of the second process of the proposed method, the chaotic
image encryption, it can be inferred that the amount of confusion and diffusion introduced by the method is
sufficient enough that the original image can never be identified from the encrypted image without the
knowledge of the keys.
This can further be proved from the Peak-Signal-to-Noise-Ratio (PSNR) between final images and
original images as given in Table 1. It can be seen that the PSNR values after steganography are very high
which implies that the amount of noise introduced in the image as a result of steganography is very low.
However, the PSNR values after encryption is very low. These low values are the results of the chaos introduced
in the image. So it can clearly be stated that the original image can never be identified by mere inspection.
Figure Format Size
PSNR after
Steganography
(dB)
PSNR after
Encryption
(dB)
Cablecar Jpg 256x240 65.3882 4.8790
Sailboat Jpg 256x256 65.6274 5.1705
Goldhill Bmp 300x256 66.0808 5.0659
Peppers Bmp 400x400 69.4901 5.9828
Lena Jpg 512x512 71.6319 5.1773
Table 1. Comparison of psnr values of various images after encryption using the proposed system
We are providing another analysis based on the histogram of the image. Histogram of an image gives
the relative frequency of occurrence of each pixel value in an image. Since we are considering colour images in
this paper, the histogram of red, green and blue plane of the images are considered separately. The histograms of
the original image show non-uniform distribution whereas the histograms of the encrypted image show a
uniform distribution of pixels. Due to this uniform distribution, it will be extremely difficult for an attacker to
extract the original information from the image without the keys.
Fig. 4: Histogram Analysis
High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption
www.iosrjournals.org 54 | Page
VI. CONCLUSION
In this paper, we presented a novel system for encryption which makes use of steganography and triple-
key chaotic image encryption. The system can work with images of various formats and sizes. Due to the
presence of four keys, this system provides very high level of security. We have presented the results of various
analyses and the results are very encouraging. However, the used algorithms can be improved in the future to
get accurate results.
REFERENCES
[1] F. Shih, Digital Watermarking And Steganography-Fundamentals And Techniques(USA: CRC Press, 2008).
[2] D. Coppersmith, “Data encryption standard and its strength against attacks”, IBM J. Res. Develop, vol. 38 no. 3 may 1994.
[3] M. Zeghid et al., "A modified AES based algorithm for image encryption", International Journal of Computer Science and
Engineering, 1(IX2006) 70-75.
[4] Xuejia Lai and James L. Massey, “A Proposal for a New Block Encryption Standard”, Eurocrypt 1990, pp389–404
[5] N. K. Pareek, Vinod Patidar, K. K. Sud; "Image encryption using chaotic logistic map", Image and Vision Computing 24 (2006)
926-934.
[6] G. Srividya, P. Nandakumar, "A Triple-Key chaotic image encryption method," Communications and Signal Processing (ICCSP),
2011 International Conference on , pp.266-270, 10-12 Feb. 2011.
[7] C.W. Wu and N.F. Rulkov, "Studying chaos via 1-Dmaps-a tutorial," IEEE Trans. on Circuits and Systems I: Fundamental Theory
and Applications, vol. 40, no. 10, pp. 707-721, 1993.
[8] T. Fei, L. Shaojun, "Research and implementation of information hiding based on RSA and HVS," E -Business and E -Government
(ICEE), 2011 International Conference on , pp.1-4, 6-8 May 2011.

Mais conteúdo relacionado

Mais procurados

An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesIJERA Editor
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyAM Publications
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 

Mais procurados (18)

An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
akashreport
akashreportakashreport
akashreport
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Image Security
Image SecurityImage Security
Image Security
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
C010511420
C010511420C010511420
C010511420
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Destaque

Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...IOSR Journals
 
Performance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone PlatformsPerformance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone PlatformsIOSR Journals
 
Customers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadCustomers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadIOSR Journals
 
Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...IOSR Journals
 
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...IOSR Journals
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETIOSR Journals
 
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...IOSR Journals
 
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAsLow Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAsIOSR Journals
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
 
Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...IOSR Journals
 
Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...IOSR Journals
 
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...IOSR Journals
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingIOSR Journals
 
Automatic Learning Image Objects via Incremental Model
Automatic Learning Image Objects via Incremental ModelAutomatic Learning Image Objects via Incremental Model
Automatic Learning Image Objects via Incremental ModelIOSR Journals
 
Wireless Energy Transfer
Wireless Energy TransferWireless Energy Transfer
Wireless Energy TransferIOSR Journals
 
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...IOSR Journals
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksIOSR Journals
 

Destaque (20)

Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
Disposition Pattern of Sulphur Functional Groups in High Sulphur Ledo Coals o...
 
Performance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone PlatformsPerformance of Web Services on Smart Phone Platforms
Performance of Web Services on Smart Phone Platforms
 
Customers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in HyderabadCustomers Attitude toward Mobile Service Providers in Hyderabad
Customers Attitude toward Mobile Service Providers in Hyderabad
 
B0440509
B0440509B0440509
B0440509
 
Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...
 
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
A Solution to Optimal Power Flow Problem using Artificial Bee Colony Algorith...
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANET
 
C0551417
C0551417C0551417
C0551417
 
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
A New Single-Stage Multilevel Type Full-Bridge Converter Applied to closed lo...
 
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAsLow Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
Low Leakage Low Ground Bounce Noise Power Gating Techniques for FPGAs
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...Ethopian Database Management system as a Cloud Service: Limitations and advan...
Ethopian Database Management system as a Cloud Service: Limitations and advan...
 
Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...Efficiency of Optical Fiber Communication for Dissemination of Information wi...
Efficiency of Optical Fiber Communication for Dissemination of Information wi...
 
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
Proximate Composition of Whole Seeds and Pulp of African Black Velvet Tamarin...
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
 
Automatic Learning Image Objects via Incremental Model
Automatic Learning Image Objects via Incremental ModelAutomatic Learning Image Objects via Incremental Model
Automatic Learning Image Objects via Incremental Model
 
Wireless Energy Transfer
Wireless Energy TransferWireless Energy Transfer
Wireless Energy Transfer
 
H0434555
H0434555H0434555
H0434555
 
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
In Vitro Gas Production Parameters and Characteristics of Four Types of Sweet...
 
Video Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor NetworksVideo Streaming Compression for Wireless Multimedia Sensor Networks
Video Streaming Compression for Wireless Multimedia Sensor Networks
 

Semelhante a High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web applicationAlexander Decker
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) cscpconf
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementIOSR Journals
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 

Semelhante a High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
 
H43064650
H43064650H43064650
H43064650
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 

Último (20)

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 5 (Jul. - Aug. 2013), PP 49-54 www.iosrjournals.org www.iosrjournals.org 49 | Page High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption Arun A.S.1 , George M. Joseph2 1 M.Tech Student, Department of Electronics and Communication Engineering, SCT College of Engineering, Kerala, India 2 Assistant Professor, Department of Electronics and Communication Engineering, SCT College of Engineering, Kerala, India Abstract : This paper proposes a novel cryptographic technique that exploits the advantages of two important techniques – steganography and chaotic image encryption. Steganography is the technique of hiding the message within a cover media. Once the message is embedded within the cover image, it is encrypted using triple-key chaotic image encryption. So altogether this method provides a four-layer security to the original message. Various analyses were done and the results of the experiments are very encouraging and in future, this method can be extended to support media other than images. Keywords - Cryptography, Colour Image, Steganography, Encryption, Chaotic logistic map. I. INTRODUCTION With the advent of internet and other communication methods, the security of the data being transmitted has become important. One of the most important methods for transmitting a data securely is to hide the data within another media and to transmit the cover media. The cover media can be text, image, audio or video. By doing so, a third person is not aware that the transmitted media contains an embedded message. Once the steganography is done, the resulting cover image which contains the embedded message is encrypted using chaotic image encryption technique which uses three keys. For decryption, not only all the keys are required but also they must be entered in the same order as entered for encryption. II. IMAGE BASED STEGANOGRAPHY Steganography[1] is the technique of hiding information within any media. The commonly used media are plaintext, images, video, audio and IP datagram. In this paper, we are concerned with image steganography only. Digital image steganography is the most widely used technique of steganography. The existence of large number of digital images in the internet further allows us to use this technique for secure data transmission through the internet. The message that can be embedded in the digital images includes plaintext, ciphertext, other images and any other media which can be encoded as a bit stream. The inability of the human visual system (HVS) to identify minor variations in the luminance of colour vectors is being exploited by the steganography techniques. All the digital images can be represented as a collection of pixel values. Colour images will have three colour planes – red, green and blue. Each pixel will have optical characteristics like brightness, chroma, hue, saturation etc. Each pixel value can be digitally represented in binary form. For example, a 24bit colour image will have 8 bits each of red, green and blue values at each pixel position. Since 8 bits are used to represent each value, it can have 28 values each of red, green and blue, ranging from 0 to 255. The human visual system is insensitive to the changes in the least significant bits in the image, which enables the user to hide the message in the least significant bits without being identified by an attacker. The cover image for this technique can be either of uncompressed formats like bitmap or of compressed formats like JPEG. In both formats, the LSBs are modified for hiding the message. If large cover images are used, even audio files can be embedded in them without affecting the quality of the images. III. IMAGE ENCRYPTION Encryption is the process of encoding the message in such a way that an attacker will not be able to read it. The media used for encryption can be plaintext, images, audio or video. In this paper, we consider only image encryption. Some of the existing block cipher algorithms are: Data Encryption Standard (DES)[2],Advanced Encryption Standard (AES)[3] and International Data Encryption Algorithm (IDEA)[4]. The problem with these algorithms is that they are not suitable to encrypt bulky data due to their intensive computational costs. Computations can be accelerated by using additional hardware, but it further increases the cost of the system.
  • 2. High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption www.iosrjournals.org 50 | Page In order to overcome these problems, we can make use of chaotic image encryption technique[5]. Chaotic systems are non-linear systems with high sensitivity to initial conditions. Any change in the initial conditions will result in compounding errors in the prediction of the system’s future behaviour. To predict the behaviour of such systems, one must have sufficient knowledge about the initial conditions. Some of the important properties of a chaotic system are[6]: (i) Deterministic, so that they are characterised by mathematical equations. (ii) Unpredictable and non-linear, and highly sensitive to initial conditions. Even a very slight change in the starting point can lead to significant different outcomes. (iii) Appear to be random and disorderly but beneath the random behavior there is a sense of order and pattern. The logistic map[7], parameterised by , which maps [0,1] [0,1] is the simplest 1D map which exhibits complicated behaviour. Xi = µ Xi-1 (1 - Xi-1) (1) (1) can be represented using the bifurcation diagram as shown in Fig.1. Fig. 1: Bifurcation diagram of 1D logistic map The horizontal axis of the plot represents the bifurcation parameter whereas the vertical axis represents the possible long-term population values of the logistic function. As the value of increases bifurcation of the map occurs. From the plot we can see that as the value of is close to 4, many bifurcations has occurred and the amount of chaos in the system is very high. We use the same principle in achieving chaotic image encryption. IV. PROPOSED SYSTEM The proposed system for cryptography achieves the high security by making use of two powerful techniques- steganography and image encryption. The steganography technique used in this system makes sure that no collisions occur while selecting pixels for embedding the message, thereby improving the speed and efficiency of the system. Once the message is embedded onto the cover image, it is encrypted using chaotic image encryption technique. The proposed system model is shown in Fig.2.
  • 3. High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption www.iosrjournals.org 51 | Page Fig.2: Proposed System 4.1 Method of Encryption For achieving encryption, steganography is carried out first and then the resulting image is encrypted using chaotic image encryption technique. The cover image used for encryption can be of any format and size. 4.2 Steganography The steganography system takes in three inputs- cover image, message which is to be embedded and the key for steganography. The message as well the key can contain alphabets, digits and special characters. The message which is read from the user is converted to the binary value of its ASCII code. The key is used to find the pixel positions for embedding the message. While selecting the pixel positions, the system makes sure that no collisions occur. Had there been any collisions, there will be loss of data which will reduce the efficiency of the system. Once the pixel positions are selected, the message in the binary form is embedded on to the image. While embedding the message, the binary stream of the ciphertext is used to replace lowest 2 bits of red plane, lowest 1 bit of green plane and lowest 3 bits of blue plane. Selecting different number of bits from each plane is in accordance with the sensitivity of the human visual system(HVS)[8] to different colours. By doing so, we can embed total of 6 bits at each pixel position without being detected by the human eye. 4.3 Chaotic Image Encryption Once the message has been embedded in the image, the stego-image is given to the chaotic image encryption system[6]. This system requires 3 keys for encryption - an 80 bit session key, an initial parameter key and a control parameter key. The various steps for encryption are as given below: Step 1: The Stego-image is converted to its equivalent binary image matrix form. Let the image contains R rows and C columns. Then total number of pixels in the image is R × C = N pixels. The image is first converted into a 1-dimensional array of size N × 1 and then each pixel is converted into 8-bit binary form. The resulting binary image matrix can be represented as follows: Pnk = (2) Step 2: The next step of triple-key encryption is to compute the initial parameter key which will act as the initial value of the chaotic logistic map. To compute the initial parameter key, the user is asked to enter two keys – an 80 bit session key and a second key whose value is in between 0 and 1. The 80 bit session key can be entered in the form of 20 hexadecimal characters. K = k1k2k3…. k20 (3) These hexadecimal characters are converted into the equivalent binary form. A block k of 24 bits, say, k5k6k7k8k9k10, is extracted from the session key K. Any number of bits can be extracted depending upon the requirement of the chaos that needed to be introduced into the system. Compute X01 as given in (4): X01 = (k51 × 20 + ... + k54 × 23 + k61 × 24 + ... + k64 × 27 + ... + k10 × 220 + ... + k104 × 223 ) / 224 (4) Now, the initial parameter key, X(1) is computed when the user enters key X02 using (5). X(1) = (X01+ X02) mod 1 (5) Since, X(1) is the remainder of the division by 1, it will be a value between 0 and 1. Step 3: Once the keys are generated, the next step is to generate the chaotic sequence that follows the 1D logistic map. The Chaotic sequence X1 X2 X3…XN is generated as in (6). Xi = µ Xi-1 (1 - Xi-1) (6)
  • 4. High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption www.iosrjournals.org 52 | Page The initial parameter key X(1) is used as the initial value for the generation of the chaotic sequence. The control parameter key µ is entered by the user. Since all the values in the chaotic sequence Xi are between 0 and 1, it must be normalized to the image scale, between 0 and 255. For normalization (7) can be used: (7) Now, Xi is an array of size 1 N. After normalizing the chaotic sequence, all the values in Xi are converted to their equivalent binary representations. Each pixel value is represented as 8-bit binary number so that an N 8 matrix B is obtained. B = (8) Step 4: Next step is to construct the neural network using the values of the matrix B. Both weight matrix and bias matrix are calculated using the matrix B. N weight matrices, each of size 8 x 8, are computed by mapping each row of the matrix as follows: wik = (9) where i and k vary from 1 to 8 and n varies from 1 to N. Weight matrix W is a diagonal matrix whose diagonal contains only values ±1. The diagonal element is 1 if the corresponding bit in chaotic sequence is zero and -1 if the corresponding bit is one. The bias matrix of size 1 x 8 is computed by mapping each row of B as given below: θj (10) Therefore θj contains values ± 1/2. Step 5: Once the weight matrix and bias matrix are computed, then the encryption process can be carried out. The cipher bit corresponding to each bit is computed as in (11) : = sign ( (11) (11) can be simplified as given below = (12) These steps are repeated for all the rows of B to obtain the encrypted matrix P’nk = (13) This binary matrix is converted to its decimal equivalent with values ranging from 0 to 255 and is converted to a two dimensional array of size R × C. The red, green and blue plane of the colour images are encrypted separately. The output of this process gives the encrypted image which contains the original message. 4.4 Decryption Process Decryption consists of two processes - triple key decryption and inverse steganography. The encrypted image is first decrypted using triple key decryption for which the system requires three keys - 80 bit session key, initial parameter key and the control parameter key. The same keys which were used for encryption are required for the decryption process also. Once triple key decryption is done, the resulting image is given to the inverse steganography system which uses the stego-key to find the location of the pixels where the message was originally embedded. Once the positions are calculated, the message bits are extracted and converted back to alphanumeric form and displayed. V. OBSERVATIONS AND RESULTS Simulation was done in MATLAB and efficiency of the proposed method was calculated. The proposed system was tested in images of different sizes and formats by using different combinations of keys. The results of the simulation are presented in the paper. Fig. 3 shows the original image, image after steganography and the final encrypted image.
  • 5. High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption www.iosrjournals.org 53 | Page Fig 3: (a): Original Image. (b) Image after steganography (c) Image after encryption From the simulation diagrams of Fig.3, we can observe that after the first process of steganography, the resulting does not differ from the original image. So visually it is not possible to identify the existence of the embedded message in the image. From the result of the second process of the proposed method, the chaotic image encryption, it can be inferred that the amount of confusion and diffusion introduced by the method is sufficient enough that the original image can never be identified from the encrypted image without the knowledge of the keys. This can further be proved from the Peak-Signal-to-Noise-Ratio (PSNR) between final images and original images as given in Table 1. It can be seen that the PSNR values after steganography are very high which implies that the amount of noise introduced in the image as a result of steganography is very low. However, the PSNR values after encryption is very low. These low values are the results of the chaos introduced in the image. So it can clearly be stated that the original image can never be identified by mere inspection. Figure Format Size PSNR after Steganography (dB) PSNR after Encryption (dB) Cablecar Jpg 256x240 65.3882 4.8790 Sailboat Jpg 256x256 65.6274 5.1705 Goldhill Bmp 300x256 66.0808 5.0659 Peppers Bmp 400x400 69.4901 5.9828 Lena Jpg 512x512 71.6319 5.1773 Table 1. Comparison of psnr values of various images after encryption using the proposed system We are providing another analysis based on the histogram of the image. Histogram of an image gives the relative frequency of occurrence of each pixel value in an image. Since we are considering colour images in this paper, the histogram of red, green and blue plane of the images are considered separately. The histograms of the original image show non-uniform distribution whereas the histograms of the encrypted image show a uniform distribution of pixels. Due to this uniform distribution, it will be extremely difficult for an attacker to extract the original information from the image without the keys. Fig. 4: Histogram Analysis
  • 6. High Security Cryptographic Technique Using Steganography And Chaotic Image Encryption www.iosrjournals.org 54 | Page VI. CONCLUSION In this paper, we presented a novel system for encryption which makes use of steganography and triple- key chaotic image encryption. The system can work with images of various formats and sizes. Due to the presence of four keys, this system provides very high level of security. We have presented the results of various analyses and the results are very encouraging. However, the used algorithms can be improved in the future to get accurate results. REFERENCES [1] F. Shih, Digital Watermarking And Steganography-Fundamentals And Techniques(USA: CRC Press, 2008). [2] D. Coppersmith, “Data encryption standard and its strength against attacks”, IBM J. Res. Develop, vol. 38 no. 3 may 1994. [3] M. Zeghid et al., "A modified AES based algorithm for image encryption", International Journal of Computer Science and Engineering, 1(IX2006) 70-75. [4] Xuejia Lai and James L. Massey, “A Proposal for a New Block Encryption Standard”, Eurocrypt 1990, pp389–404 [5] N. K. Pareek, Vinod Patidar, K. K. Sud; "Image encryption using chaotic logistic map", Image and Vision Computing 24 (2006) 926-934. [6] G. Srividya, P. Nandakumar, "A Triple-Key chaotic image encryption method," Communications and Signal Processing (ICCSP), 2011 International Conference on , pp.266-270, 10-12 Feb. 2011. [7] C.W. Wu and N.F. Rulkov, "Studying chaos via 1-Dmaps-a tutorial," IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications, vol. 40, no. 10, pp. 707-721, 1993. [8] T. Fei, L. Shaojun, "Research and implementation of information hiding based on RSA and HVS," E -Business and E -Government (ICEE), 2011 International Conference on , pp.1-4, 6-8 May 2011.