A Multilayered Secure Scheme for Transmission of ...

12 downloads 329 Views 282KB Size Report
Multilayered security is introduced to maNe the data more secure. The first layer uses the AES to .... Shared cryptographic Scheme with Efficient Data Recovery.
Available online at www.sciencedirect.com

ScienceDirect Procedia Computer Science 78 (2016) 375 – 381



,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\DQG3ULYDF\ ,&,63 'HFHPEHU 1DJSXU,1',$

$0XOWLOD\HUHG6HFXUH6FKHPHIRU7UDQVPLVVLRQRI6HQVLWLYH ,QIRUPDWLRQEDVHGRQ6WHJDQDO\VLV 'LY\D-HQQLIHU'¶6RX]DD 0LQX3$EUDKDPE a

III Yr, Part-Time MTech, NMAMIT,Nitte,Karkala, Karnataka-574110, India b Assistant Professor, NMAMIT,Nitte,Karkala, Karnataka-574110, India

$EVWUDFW :HSURSRVHDPXOWLOD\HUHGVHFXUHVFKHPHWRWUDQVIHUVHQVLWLYHWH[WRYHUDQXQUHOLDEOHQHWZRUN7KHVHFUHWWH[WLVILUVWHQFU\SWHG XVLQJWKH$(6DOJRULWKP7KHFLSKHUWH[WSURGXFHGLVKLGGHQLQDQDXGLRILOH7KHDXGLRILOHLVLQWXUQHQFU\SWHGLQSDUDOOHOXVLQJ WKHFRQFHSWRI6KDPLU¶VWHFKQLTXHEDVHGRQ&57WRPD[LPL]HUHVRXUFHXWLOL]DWLRQ7KHVHDXGLRVKDUHVDUHVHQWRYHUGLIIHUHQW FKDQQHOV LQ WKH QHWZRUN IRU VHFXULW\ ([SHULPHQWDO UHVXOWV VKRZ WKDW HYHQ LI FHUWDLQ VKDUHV JRW ORVW RYHU QHWZRUN DXGLR ILOHV FRXOGEHUHFRYHUHGDWWKHUHFHLYHUZLWKWKHUHPDLQLQJVKDUHVZLWKRXWVHQGHUQHHGLQJWRUHVHQGWKHILOH

 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license ‹7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9 (http://creativecommons.org/licenses/by-nc-nd/4.0/). 3HHUUHYLHZXQGHUUHVSRQVLELOLW\RIRUJDQL]LQJFRPPLWWHHRIWKH,&,63 Peer-review under responsibility of organizing committee of the ICISP2015 Keywords:(QFU\SWLRQ3DUDOOHO&RPSXWLQJ6KDUHV6WHJQRJUDSK\/6%

,QWURGXFWLRQ 6HQGLQJ VHQVLWLYH GRFXPHQWV RYHU WKH XQUHOLDEOH QHWZRUN LV QRW VDIH 7KHUH DUH FKDQFHV WKDW VXFK GRFXPHQWV FRXOG EH HDVLO\ WUDFNHG E\ DQ\ LQWUXGHU +HQFH D PXOWLOD\HUHG VHFXULW\ DSSURDFK ZDV D QHHG 6WHJDQRJUDSK\ LV D PHWKRGXVHGWRKLGHPHVVDJHVZLWKLQDQRUPDOPHGLXPVXFKWKDWQRRQHHOVHFRXOGVHQVHWKHSUHVHQFHRIVHFUHWGDWD &U\SWRJUDSK\LVDWHFKQLTXHRIHLWKHUVFUDPEOLQJRUWUDQVIRUPLQJWKHGDWDLQWRDQXQUHDGDEOHIRUPDWFDOOHGDVWKH FLSKHUWH[W2QO\WKHXVHUZKRSRVVHVVHVWKHVHFUHWNH\FDQGHFLSKHULW7KLVSDSHUSURSRVHVDSRVVLEOHWHFKQLTXHWR FRPELQH VWHJDQRJUDSK\ DQG DXGLR HQFU\SWLRQ WR SURGXFH D PXOWLOD\HUHG VHFXULW\ IRU WKH VHQVLWLYH LQIRUPDWLRQ WUDQVIHU BBBBBBB

&RUUHVSRQGLQJDXWKRU7HO E-mail address: MHQQLIHUGVRX]D#QLWWHHGXLQ



1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of organizing committee of the ICISP2015 doi:10.1016/j.procs.2016.02.077

376

Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381

 7KHILUVWOD\HURIHQFU\SWLRQLQYROYHV$(6HQFU\SWLRQIXQFWLRQZKLFKWDNHVWKHVHQVLWLYHWH[WXDOGRFXPHQWDQGD PHVVDJHHQFU\SWLRQNH\³.H\´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

Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381

377

7KLVPHWKRGSRVHVDGYDQWDJHZKHUHWKHUHFHLYHUGRHVQRWH[SHFWDOOQVKDUHVIURPWKHVHQGHUWRUHFRQVWUXFWWKH PHVVDJH7KHVKDUHVDUHWUDQVIHUUHGYLDGLIIHUHQWSRUWVWRLQFUHDVHVHFXULW\7KHGLVDGYDQWDJHFRXOGEHLIWKHKDFNHU FRXOG JHW DFFHVV WR DOO WKH FKDQQHOV WKURXJK ZKLFK WKHVH VKDUHV DUH EHLQJ WUDQVIHUUHG DQG DOVR WKH SULYDWH NH\ WR GHFU\SWWKHHQFU\SWHGWH[WKHVKHFRXOGJDLQDFFHVVWRWKHLQIRUPDWLRQ7KLVKRZHYHULVDYHU\FRPSOH[WDVN

 3.1. Architecture 7KHVHQGHUHQFU\SWVWKHVHOHFWHGVHFUHWPHVVDJHDQGKLGHVLWLQDFDUULHUPHGLXP$(6(QFU\SWLRQIXQFWLRQWDNHV DVHFUHWWH[WDQGDPHVVDJHHQFU\SWLRQNH\³.H\´DVSDUDPHWHUVWRLW8VLQJWKHVHWZRSDUDPHWHUVDFLSKHUWH[WLV JHQHUDWHG7KLVFLSKHUWH[WLVKLGGHQLQDVHOHFWHGZDYDXGLRILOHZKLFKIRUPVDVWHJRDXGLRILOH7KH$XGLRILOHLV GLYLGHGLQWRQVKDUHVDQGWKHFLSKHUWH[WLVSDUWLDOO\KLGGHQLQWKH/6%RIWKHVHVKDUHV$VXEVHWRINVKDUHV ZKHUH N!  Q LVEHLQJWUDQVIHUUHGRYHUWKHQHWZRUNWKURXJKWKHGLIIHUHQWSRUWVLQRUGHUWRDYRLGLQWUXGHU¶VDWWDFN7KH VKDUHV DUH FRPELQHG DW WKH UHFHLYHU HQG 7KH UHVXOW LV WKH (QFU\SWHG 6WHJR $XGLR ILOH 7KH FLSKHU WH[W DQG WH[W GHFU\SWLRQNH\³.H\´LVSDVVHGDVDSDUDPHWHUWRDQ $(67H[W'HFU\SWLRQIXQFWLRQDQGWKHVHFUHWWH[WLVREWDLQHG EDFN 3.2. Sender Side Module $V VKRZQ LQ WKH EHORZ )LJXUH  $(6 (QFU\SWLRQ IXQFWLRQ WDNHV D VHFUHW WH[W DQG D PHVVDJH HQFU\SWLRQ NH\ ³.H\´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

 )LJ6HQGHU6LGH0RGXOH



378

Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381

3.3. Steganalysis Technique using Audio 7KHDXGLRILOHZKLFKLVXVHGDVDPHGLXPWRKLGHWKHDFWXDOPHVVDJHLVGHFRPSRVHGLQWRQQXPEHURIVKDUHVVXFK WKDWWKHDFWXDOILOHFRXOGEHREWDLQHGE\VWDFNLQJDWOHDVWNQXPEHURIVKDUHVZKHUHN Q!  Q (DFKHQFU\SWHG VKDUHVFRQWDLQVSDUWLDOHQFU\SWHGSRUWLRQRIWKHVHFUHWGDWD8VLQJDPLQLPXPRI Q QXPEHURIVKDUHVRULJLQDOWH[W FRXOGEHUHWULHYHG  6WHSVIRUFUHDWLQJVKDUHVDWWKH6HQGHU6LGH 6KDPLU¶VWHFKQLTXHLVEDVHGRQ&57ZKLFKLVXVHGIRUVKDUHFUHDWLRQ7KLVDSSURDFKXVHV QQ DFFHVVVWUXFWXUH ZKLFKPHDQVQVKDUHVLVUHTXLUHGDWWKHUHFHLYHUHQGWRUHFUHDWHWKHRULJLQDOPHVVDJH:HKDYHXVHG NQ DSSURDFK ZKLFKUHTXLUHVPLQLPXPRINVKDUHVWRUHWULHYHEDFNWKHRULJLQDOGDWD $VVXPH6WREHWKHVHFUHWPHVVDJHQDVWKHWRWDOQXPEHURIVKDUHVDQGPDVWKHVXEVHWRIQVKDUHV 6WHS&KRRVHDYHU\ODUJHSULPHQXPEHU LQWHJHU VXFKWKDW3!6DQG3!Q 6WHS&KRRVHDUDQGRP P VHTXHQFHRIFRHIILFLHQWDD««DP/HWD 6 6WHS&RPSXWHWKHSRO\QRPLDOLQWHUSRODWLRQI [  DD[D[««««DP[P 6WHS&RQVWUXFWWKHSRLQWV [L\M   LI L PRGS ZKHUHL ««Q

)LJ&UHDWLRQRIQ6KDUHV

7R UHFRQVWUXFW WKH VHFUHW D PLQLPXP RI Q  ZRXOG EH VXIILFLHQW &RPSXWH WKH /DJUDQJH¶V SRO\QRPLDOV HTXDWLRQ 

 )LJ6WDFNLQJRIN6KDUHV

379

Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381

/HDVWVLJQLILFDQWELW /6% LQVHUWLRQLVDFRPPRQVLPSOHDSSURDFKXVHGWRHPEHGLQIRUPDWLRQLQDWUDQVPLVVLRQ PHGLXP7KHOHDVWVLJQLILFDQWELW WKELW RIVRPHRUDOORIWKHE\WHVLVFKDQJHGWRDELWRIWKHVHFUHWPHVVDJHWKXV HQDEOLQJWRKLGHWKHVHFUHWWH[WLQVLGHDSUHSURFHVVHGDXGLRILOH ZDY  )RUHJ,IWKH$OSKDEHW$ $6&,,%LQDU\ KDVWREHHPEHGGHGLQWRDQDXGLRILOHWKHQVD\IRU LQVWDQFHZHKDYHWKHIROORZLQJJULGRIDSUHSURFHVVHGDXGLRILOH    8VLQJWKH/6%RQO\WKHODVWELWZLOOQHHGWREHFKDQJHG6RWKHFKDQJHGJULGZRXOGORRNOLNHWKLV   

3.4. Receiver end module $VVKRZQLQWKHEHORZGLDJUDP )LJXUH WKHUHFHLYHUVLGHZRUNVLQUHYHUVHRIWKHRSHUDWLRQVGRQHDWWKHVHQGHU VLGH7KLVLVGRQHVRDVWRUHJHQHUDWHRULJLQDOPHVVDJH7KHPXOWLSOHLQFRPLQJDUURZVGHQRWHLQFRPLQJVKDUHVIURP PXOWLSOHFKDQQHOV 

 )LJ5HFHLYHU6LGH0RGXOH

 ([SHULPHQWDO5HVXOWV 4.1. At the server console ,QSXW7H[WILOH:ULWLQJVHQVLWLYHLQIRUPDWLRQWKDWQHHGVWREHWUDQVIHUUHGWRWKHGHVWLQDWLRQLQWRDQRWHSDG

 %URZVLQJWKHWH[WILOHDQG&KRRVLQJDQDXGLRILOH ZDY WRHPEHGWKHWH[WILOHDIWHUEHLQJHQFU\SWHGE\WKHVHQGHU ZLWKKLVKHU SULYDWH NH\7KH DXGLRILOH LV VSOLW LQWR VKDUHV RI VL]H E\WHV DQG VHQW YLDSRUW ZKLFK LV VKRZQLQWKHORJUHSRUWEHORZ 

380

Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381

 )LJ6HQGHU/RJ

 4.2. At the receiver console

 $WWKHUHFHLYHUHQGWKHSRUWLVDFFHVVHGWRUHFHLYHWKHVKDUHV7KHVKDUHVZKLFKZHUHUHFHLYHGDUHEHLQJ FRPELQHGDWWKHUHFHLYHUHQGWRREWDLQWKHDXGLRILOH7KHSULYDWHNH\RIWKHHQGXVHULVXVHGWRGHFU\SWWKHPHVVDJH 7KLVLVVKRZQLQWKHORJUHSRUWEHORZ



 )LJ5HFHLYHU/RJ

 &RQFOXVLRQV $PXOWLOD\HUHGDSSURDFKZKLFKLQFOXGHV$(6DQG$XGLREDVHGFU\SWRJUDSK\WHFKQLTXHLVEHLQJSURSRVHGZKLFK LVVXLWDEOHIRUPXOWLPHGLDHQFU\SWLRQDQGGHFU\SWLRQ7KLV PHWKRGLVRIORZFRVWUHOLDEOHVXSSRUWVGLUHFWELWUDWH FRQWURO DQG LV PRUH UREXVW WR WUDQVPLVVLRQ HUURUV 7KHVH FKDUDFWHULVWLFV PDNH LW PRUH DSSOLFDEOH IRU WKH FXUUHQW QHHGV7KLVWHFKQLTXHFRXOGEHH[WHQGHGWRYLGHRHQFU\SWLRQZKLFKZLOOEHDQDO\]HGLQGHWDLOLQIXWXUHZRUN  5HIHUHQFHV  

5DQMDQ.XPDU+63UDVDQQD.XPDU+56XGHHSD.%DQG*DQHVK$LWKDO(QKDQFHG6HFXULW\6\VWHPXVLQJ6\PPHWULF(QFU\SWLRQ DQG9LVXDO&U\SWRJUDSK\International Journal of Advances in Engineering & Technology-XO\#,-$(7,661 &KDQJ&KRX /LQ DQG :HQ+VLDQJ 7VDL 6HFUHW LPDJH VKDULQJ ZLWK VWHJDQRJUDSK\ DQG DXWKHQWLFDWLRQ - 6\VW6RIW    ,661

Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381 

381

6DJDU$

Suggest Documents