Академический Документы
Профессиональный Документы
Культура Документы
IV Sem MTech, Computer Science and Engineering, K.S.S.E.M. , Bengaluru, Karnataka, India, Yamuna.dasar@gmail.com
Assistant Professor, Computer Science and Engineering, K.S.S.E.M. , Bengaluru, Karnataka, India, preethi.p@kssem.edu.in
Abstract
Todays internet world needs secret communication for exchanging the confidential information. Cryptography and
steganography are two important branches of information security. Cryptography scrambles a message and steganography hides
the existence of a message. Neither cryptography nor steganography alone can guarantee better security because they can be
cracked after many attempts. It is necessary to combine both cryptography and steganography to generate a hybrid system called
as Crypto-Steganography. This hybrid system provides two tier securities to the data and make difficult for the intruders to attack
confidential information is being proposed. In the current work secret messages are encrypted using RSA algorithm and
encrypted information is embedded in the LSBs of randomly selected pixels. The end user has given the choice of inputting one to
maximum three messages. Proposed work also explains a method that extracts the encrypted information at the receiving end and
decryption of it to get original messages and helps to achieve better capacity and immunity to suspicion.
1. INTRODUCTION
1.2 Steganography
1.1 Cryptography
Cryptography is one of the branch of information security
which
scrambles the message such that the unintended
receiver cannot understand the message very easily. In
cryptography, the sender encrypts the message into a form
that only the intended recipient of the message can decrypt
and read. Present Cryptography includes secure algorithms
for encryption and decryption of messages. The
cryptography system may be symmetric key system or
asymmetric key system. In symmetric key systems single
key is shared between sender and receiver. In an asymmetric
key system two keys are used, one is a public key which is
known to everyone and another is private key which is
known to only message recipient. It is very difficult for an
attacker to decrypt the encrypted message without knowing
the key. Below shows the cryptographic model in Fig -1.
Key
Key
Cipher Text
Plain Text
Encryption
Decryption
Plain Text
_______________________________________________________________________________________
Volume: 03 Issue: 03 | May-2015, Available @ http://www.ijretm.com | Paper id - IJRETM-2015-03-03-004
Cover
Image
Stego Key
Message
Embedding
Algorithm
Message
Stego Key
Extraction
Algorithm
Stego
Image
Steganographic
Technique
Hash-LSB
Reference
AES
Lokesh [2]
DES
Alteration Component
Method
LSB
AES
DCT
Secret Message
Cipher Text
Embedding it in the cover
image
Stego image
Extracting the cipher text
Cipher Text
Decrypting the cipher text
Secret Message
_______________________________________________________________________________________
Volume: 03 Issue: 03 | May-2015, Available @ http://www.ijretm.com | Paper id - IJRETM-2015-03-03-004
2. LITERATURE SURVEY
Cryptography is an important element of any strategy to
address message transmission security requirements.
Cryptography is the study of methods of sending messages
in disguised form so that only the intended recipients can
remove the disguise and read the message [11].
Cryptographic systems are generically classified along three
independent dimensions [7].They are (1) Methodology for
transforming plain text to cipher text.(2) Methodology for
the number of keys used.(3) Methodology for processing
plain text. Cryptography systems can be broadly classified
into symmetric-key systems that use a single key that both
the sender and the receiver have, and public-key systems
that use two keys, a public key known to everyone and a
private key that only the recipient of messages uses.
Examples of symmetric key systems are Blowfish, Twofish,
DES, and AES. Examples of public key systems are RSA
and DSA [9].
Steganography is another technique for secured
communication.
Steganography involves hiding
information so it appears that no information is hidden at all.
Steganography is the process of hiding a secret message
within cover medium such as image, video, text, audio [3]
[4]. Image steganography allows for two parties to
communicate secretly and covertly. One of the other main
uses for image steganography is for the transportation of
high-level or top-secret documents between international
governments [5]. Confidential information is sent without
worry of detection by hiding it in cover media, which is very
difficult to detect by an attacker. Steganography systems can
be grouped by the type of covers used (graphics, sound, text,
executable) or by the techniques used to modify the covers
[4] [6]. Techniques are (1) Substitution system,
(2)
Transform domain techniques, (3) Spread spectrum
techniques, (4) Distortion techniques. Steganography alone
cannot guarantee for better security because steganographic
techniques can be cracked after many attempts.
Different spatial domain techniques are used for secret
communication. LSB (Least Significant Bit) method in the
BMP is most suitable for applications where the focus is on
the amount of information to be transmitted and not on the
secrecy of that information. LSB in GIF is a very efficient
algorithm to use when embedding a reasonable amount of
data in a grayscale image [3]. Performance evaluation
matrices
of
image steganography techniques are
embedding capacity, mean square error (MSE), peak signal
noise ratio(PSNR), histograms is discussed in [8] .One of
the other main uses for image steganography is for the
transportation of high-level or top-secret documents
between international governments [5].
The aim of both Cryptography and Steganography keeps
the data safe from unwanted parties. So both techniques
alone cannot provide more security so researchers combined
both the techniques for providing the complete security to
the data, i.e. two layer of security i.e. cryptography along
with Steganography. So many different combinations of
cryptography and steganography techniques are used for
securing the data].RSA and Hash-LSB technique are
combined to provide secret communication. This paper
proposed a new technique of image steganography i.e.
Hash-LSB with RSA algorithm for providing more security
to data as well as for data hiding method. The proposed
technique uses a hash function to generate a pattern for
hiding data bits into LSB of RGB pixel values of the cover
image. This technique makes sure that the message has been
encrypted before hiding it into a cover image. If in any case
the cipher text got revealed from the cover image, the
intermediate person other than receiver can't access the
message as it is in encrypted form. It ensures double security
using cryptography and steganography technique.[1].
In [10] two stage (stego-based-crypto) invertible technique
is proposed based on cryptography and steganography
algorithms. In order to increase the security, the proposed
technique
uses
Rivest-Shamir-Adleman
(RSA)
cryptographic algorithm in the first stage for encrypting the
secret message, and Integer Wavelet Transform (IWT)
based lifting scheme in the second stage as a steganography
algorithm to hide the secret message, To increase the
capacity of secret message payload and robustness, data are
embedded in the integer wavelet transform coefficients; in
the low, middle and high frequency sub-bands. The
alteration component method and Advanced Encryption
Standard technique combination provide better security for
data. These two techniques encrypt the data as well as hide
the encrypted data in another medium so the fact that a
message being sent is concealed. In cryptography advanced
encryption standard (AES) algorithm is used to encrypt
secret messages and then the alteration component method
is used to hide encrypted message. By using these two
techniques the security of secret data increases to two tiers
and a high quality of stego image is obtained. [2]. All
steganographic algorithms have to comply with a few basic
requirements. These requirements are invisibility, payload
_______________________________________________________________________________________
Volume: 03 Issue: 03 | May-2015, Available @ http://www.ijretm.com | Paper id - IJRETM-2015-03-03-004
3. PROPOSED APPROACH
The proposed approach uses the following techniques to
provide better two tier security for the information.
Sender
Cover
Image
Msg 1
Pre-process
Msg 2
Messages
Msg 3
Encryption
using RSA
Algorithm
Embed the
ciphered
messages
into all
channels of
Image
Decryption
using RSA
Algorithm
Extract the
ciphered
messages
from all
channels of
Image
(Binary
String)
Receiv
er
Msg 1
Msg 2
Msg 3
Robustness
check(PSNR,
MSE &
RMSE)
_______________________________________________________________________________________
Volume: 03 Issue: 03 | May-2015, Available @ http://www.ijretm.com | Paper id - IJRETM-2015-03-03-004
Stego Image
(14) Read the last bit of selected pixels to get the ciphered
messages.
(15) Read the private key
(16) Using RSA decryption module ciphered message
converted back into the original message.
_______________________________________________________________________________________
Volume: 03 Issue: 03 | May-2015, Available @ http://www.ijretm.com | Paper id - IJRETM-2015-03-03-004
5. SIMULATION RESULTS
7. REFERENCES
In current work color image of any format like .bmp, .jpg
and .png can be used. Only color images are used. Test
images are of size 300 300 pixels. The user has given the
choice of inputting single message to maximum three
messages. The single input message is embedded in only
red plane of the image. Two input messages are embedded
into red and green planes of the image respectively. Three
input messages are embedded into red, green and blue
planes of the image respectively.
Chann
el
PSNR
(dB)
MSE
Boy
Red
1.6721e+0
8
1.8878e+0
8
3.8889e04
3.4444e04
3.0000e04
Green
Blue
Mickey
mouse
Red
Green
Tulip
Red
Kids
Red
Green
Blue
216750000
5.2723e+0
7
22950000
1.4778e+0
7
2.5781e+0
7
1.0055e+0
7
1.1084e+0
7
RMSE
0.0153
0.0145
0.0137
0.0012
0.0291
0.0028
0.0393
0.0044
0.0410
0.0025
0.0440
0.0065
0.0459
0.0059
0.0632
6. CONCLUSION
The proposed system provides means for secure data
transmission over the internet. The confidential information
is transmitted with two tier security. The secret message is
encrypted using RSA algorithm and hidden into random
pixels of the cover image in different planes. Hiding data
into random pixels is more efficient than the sequential
embedding. The attacker cannot get clues that secret
_______________________________________________________________________________________
Volume: 03 Issue: 03 | May-2015, Available @ http://www.ijretm.com | Paper id - IJRETM-2015-03-03-004
_______________________________________________________________________________________
Volume: 03 Issue: 03 | May-2015, Available @ http://www.ijretm.com | Paper id - IJRETM-2015-03-03-004