Multilayered security is introduced to maNe the data more secure. The first layer uses the AES to .... Shared cryptographic Scheme with Efficient Data Recovery.
Available online at www.sciencedirect.com
ScienceDirect Procedia Computer Science 78 (2016) 375 – 381
,QWHUQDWLRQDO&RQIHUHQFHRQ,QIRUPDWLRQ6HFXULW\DQG3ULYDF\,&,63 'HFHPEHU 1DJSXU,1',$
$0XOWLOD\HUHG6HFXUH6FKHPHIRU7UDQVPLVVLRQRI6HQVLWLYH ,QIRUPDWLRQEDVHGRQ6WHJDQDO\VLV 'LY\D-HQQLIHU'¶6RX]DD 0LQX3$EUDKDPE a
III Yr, Part-Time MTech, NMAMIT,Nitte,Karkala, Karnataka-574110, India b Assistant Professor, NMAMIT,Nitte,Karkala, Karnataka-574110, India
$EVWUDFW :HSURSRVHDPXOWLOD\HUHGVHFXUHVFKHPHWRWUDQVIHUVHQVLWLYHWH[WRYHUDQXQUHOLDEOHQHWZRUN7KHVHFUHWWH[WLVILUVWHQFU\SWHG XVLQJWKH$(6DOJRULWKP7KHFLSKHUWH[WSURGXFHGLVKLGGHQLQDQDXGLRILOH7KHDXGLRILOHLVLQWXUQHQFU\SWHGLQSDUDOOHOXVLQJ WKHFRQFHSWRI6KDPLU¶VWHFKQLTXHEDVHGRQ&57WRPD[LPL]HUHVRXUFHXWLOL]DWLRQ7KHVHDXGLRVKDUHVDUHVHQWRYHUGLIIHUHQW FKDQQHOV LQ WKH QHWZRUN IRU VHFXULW\ ([SHULPHQWDO UHVXOWV VKRZ WKDW HYHQ LI FHUWDLQ VKDUHV JRW ORVW RYHU QHWZRUN DXGLR ILOHV FRXOGEHUHFRYHUHGDWWKHUHFHLYHUZLWKWKHUHPDLQLQJVKDUHVZLWKRXWVHQGHUQHHGLQJWRUHVHQGWKHILOH
© 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license 7KH$XWKRUV3XEOLVKHGE\(OVHYLHU%9 (http://creativecommons.org/licenses/by-nc-nd/4.0/). 3HHUUHYLHZXQGHUUHVSRQVLELOLW\RIRUJDQL]LQJFRPPLWWHHRIWKH,&,63 Peer-review under responsibility of organizing committee of the ICISP2015 Keywords:(QFU\SWLRQ3DUDOOHO&RPSXWLQJ6KDUHV6WHJQRJUDSK\/6%
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
&RUUHVSRQGLQJDXWKRU7HO E-mail address: MHQQLIHUGVRX]D#QLWWHHGXLQ
1877-0509 © 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of organizing committee of the ICISP2015 doi:10.1016/j.procs.2016.02.077
376
Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381
7KHILUVWOD\HURIHQFU\SWLRQLQYROYHV$(6HQFU\SWLRQIXQFWLRQZKLFKWDNHVWKHVHQVLWLYHWH[WXDOGRFXPHQWDQGD PHVVDJHHQFU\SWLRQNH\³.H\´DVSDUDPHWHUVWRLW8VLQJWKHVHWZRSDUDPHWHUVDFLSKHUWH[WLVJHQHUDWHG 7KH VHFRQG OD\HU RI HQFU\SWLRQ LQYROYHV KLGLQJ WKH FLSKHU WH[W LQWR DQ DXGLR ILOH ZKLFK LV WUDQVIHUUHG RYHU WKH QHWZRUN8VLQJWKH&KLQHVH5HPLQGHU7KHRUHP&57 LWLVSRVVLEOHWRHQFRGHWKHDXGLRILOH7KHRULJLQDODXGLRILOH LVEHLQJVSOLWXSLQWRQVKDUHV'HFRGLQJFRXOGEHGRQHE\VLPSO\VWDFNLQJXSNVXEVHWRIQVKDUHV7KHQXPEHUN VKRXOG EHVHOHFWHGVXFKWKDW LWVKRXOGEHKDOIRUPRUHWKHDFWXDOQXPEHURIVKDUHVQ 3URSRVHGVFKHPHXVHVNQ DFFHVVVWUXFWXUHVFKHPHLQZKLFKWKHVHFUHWDXGLRLVHQFU\SWHGLQWRQQXPEHURIVKDUHVVXFKWKDWDWOHDVWNVKDUHVDUH FRPELQHGWRUHYHDOWKHDXGLRDWWKHUHFHLYHUHQG 7KLVSDSHULVGLYLGHGLQWRWKHIROORZLQJVHFWLRQV 6HFWLRQH[SODLQVWKHOLWHUDWXUHVXUYH\GHSLFWLQJWKHH[LVWLQJV\VWHPVRQWKHDXGLRHQFU\SWLRQFRPSOH[LWLHVDQG WKHSURSRVHGV\VWHP6HFWLRQGHVFULEHVWKHSUREOHPVWDWHPHQWDQGWKHFRPSOHWHZRUNLQJRIWKHSURSRVHGVHFXULW\ V\VWHP,Q6HFWLRQVRPHRIWKHH[SHULPHQWDOUHVXOWVDUHVKRZQ6HFWLRQJLYHVWKHFRQFOXVLRQVGUDZQDQGIXWXUH ZRUN /LWHUDWXUH6XUYH\ :LWKWKHGHYHORSPHQWRIQHWZRUNDQGPXOWLPHGLDWHFKQRORJ\PXOWLPHGLDGDWDVXFKDVLPDJHVDXGLRYLGHRILOHV DUH PRUH IUHTXHQWO\ XVHG LQ GD\ WR GD\ WUDQVDFWLRQV ,Q RUGHU WR VDIHJXDUG WKH VHQVLWLYH LQIRUPDWLRQ RQ SROLWLFV PLOLWDU\ UHVHDUFKZRUNV(WF PDQ\ DOJRULWKPV DUH LQWURGXFHG DQGGHYHORSHG 7KH OLWHUDWXUHVXUYH\HODERUDWHV WKH IDFWWKDWWKHUHLVORWRIVFRSHIRULPSURYHPHQWLQWKHILHOGRIDXGLRHQFU\SWLRQ7KHPRVWFKDOOHQJLQJZRUNFRXOGEH WRUHPRYHWKHGHILFLHQFLHVIRXQGLQWKHHDUOLHUWHFKQLTXHVZLWKUHVSHFWWRWKHFRQVXPSWLRQRIWKHQHWZRUNEDQGZLGWK XQDEOHWRGHFRGHWKHPHVVDJHGXHWRVRPHRIWKHVKDUHVJHWWLQJORVWGXULQJWUDQVPLVVLRQFRPPXQLFDWLRQFKDQQHOV JHWWLQJKDFNHGIDLOXUHRIWKHWUDQVPLVVLRQPHGLXPFRPSOH[LW\LQHQFRGLQJDQGGHFRGLQJRIWKHDXGLRILOHVODWHQF\ LQWUDQVIHUULQJWKHILOHV 7KH SURSRVHG V\VWHP XVHV NQ VFKHPH RI DXGLR HQFU\SWLRQ ZKHUH DQ DXGLR ILOH LV GLYLGHG LQWR Q QXPEHU RI VKDUHVXVLQJWKH&KLQHVHUHPDLQGHUDOJRULWKP 7KHVHQVLWLYHWH[WLVWKHQHPEHGGHGLQWRWKHVHQVKDUHVXVLQJWKH /6%LQVHUWLRQWHFKQLTXH/HDVW6LJQLILFDQWELW/6% LVRQHRIWKHSRSXODUWHFKQLTXH ZKLFKLVXVHGIRUKLGLQJWKH LQIRUPDWLRQLQWKHWUDQVPLVVLRQPHGLXP$VXEVHWNQXPEHURIVKDUHVDUHEHLQJFRQILJXUHGVXFKWKDWDQDXGLRILOH FRXOGEHGHFRGHGDWWKHUHFHLYHUHQGZLWKWKHVHQXPEHUVRIVKDUHVZKHUHNLVKDOIRUPRUHWKHWRWDOQQXPEHURI VKDUHV 7KLVLVVLPLODUWRVSOLWWLQJQ XSDQREMHFWWH[W DQGGLVWULEXWLQJWKHPDPRQJWKHYDULRXVSHRSOHVKDUHV 7KHHQGXVHUZRXOGFROOHFWVXIILFLHQWQXPEHUN RISLHFHVWRIRUPWKHREMHFW7KUHVKROG6HFUHWVKDULQJVFKHPHZDV SURSRVHGE\6KDPLUEDVHGRQDSRO\QRPLDORIGHJUHHN WRDQ\VHWRINSRLQWVWKDWOLHRQWKHSRO\QRPLDO 7KHEHQHILWRIWKLVVFKHPHLVWKDWDXGLRILOHFRXOGEHUHWULHYHGDWWKHGHVWLQDWLRQZLWKWKHPLQLPXPQXPEHURI VKDUHVZKLFKVDYHVQHWZRUNEDQGZLGWKDQGFRQJHVWLRQ7KHVHFRQGDGYDQWDJHLVWKDWHYHQLIVRPHRIWKHVKDUHVJHW ORVW LQ WKH QHWZRUN WKH DXGLR ILOH FRXOG VWLOO EH UHWULHYHG ZLWK WKH UHPDLQLQJ VKDUHV 7KLV DYRLGV WKH VHQGHU IURP UHVHQGLQJWKHORVWVKDUHV7KHWKLUGDGYDQWDJHLVWKHGHOD\LQWUDQVIHURIILOHVFRXOGEHDYRLGHGE\HQFU\SWLQJWKHVH VKDUHVLQSDUDOOHO7KHVKDUHVDUHWKHQWUDQVIHUUHGYLDGLIIHUHQWSRUWVVRDVWRGHFUHDVHWKHKDFNHUDWWDFN :RUNLQJRIWKH3URSRVHG6\VWHP :LWKWKHDGYDQFHPHQWRIWKHPXOWLPHGLDWHFKQRORJ\WKHUHDUHHQRUPRXVDPRXQWRILQIRUPDWLRQH[FKDQJHWDNLQJ SODFHLQWKHQHWZRUN$VWKLVGHPDQGLVEHLQJSURJUHVVLYHO\LQFUHDVLQJWKHUHLVUHTXLUHPHQWIRUVWURQJDQGHIILFLHQW \HWVLPSOHHQFU\SWLRQWHFKQLTXHV 0XOWLOD\HUHG VHFXULW\ LV LQWURGXFHG WR PDNH WKH GDWD PRUH VHFXUH 7KH ILUVW OD\HU XVHV WKH $(6 WR HQFU\SW WKH VHQVLWLYHLQIRUPDWLRQDVLWLVFRQVLGHUHGWREHRQHDPRQJWKHWRSFLSKHUVIRULWVPDVVLYHFRPELQDWLRQRINH\V7KH VHFRQG OD\HU RI VHFXULW\ FRPHV LQ ZKHQ WKH HQFU\SWHG WH[W LV KLGGHQ LQVLGH WKH DXGLR PHGLXP 7KH WKLUG OD\HU RI VHFXULW\FRPSULVHVRIHQFU\SWLQJWKHDXGLRILOHE\GLYLGLQJLWLQWRGLIIHUHQWVKDUHVVD\Q 7KHHQFU\SWHGWH[WLVLQ WXUQKLGGHQLQVLGHWKHVKDUHVXVLQJ/6%7KHHQGV\VWHPFDQVWDFNXSWKRVHVKDUHVGHFU\SWWKHPXVLQJWKHLQYHUVH IXQFWLRQSRO\QRPLDOLQWHUSRODWLRQ WRREWDLQWKHHQFU\SWHGWH[W7KHHQFU\SWHGWH[WLVIXUWKHUGHFU\SWHGXVLQJWKH SULYDWHNH\WRUHFRQVWUXFWWKHRULJLQDOPHVVDJH
Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381
377
7KLVPHWKRGSRVHVDGYDQWDJHZKHUHWKHUHFHLYHUGRHVQRWH[SHFWDOOQVKDUHVIURPWKHVHQGHUWRUHFRQVWUXFWWKH PHVVDJH7KHVKDUHVDUHWUDQVIHUUHGYLDGLIIHUHQWSRUWVWRLQFUHDVHVHFXULW\7KHGLVDGYDQWDJHFRXOGEHLIWKHKDFNHU FRXOG JHW DFFHVV WR DOO WKH FKDQQHOV WKURXJK ZKLFK WKHVH VKDUHV DUH EHLQJ WUDQVIHUUHG DQG DOVR WKH SULYDWH NH\ WR GHFU\SWWKHHQFU\SWHGWH[WKHVKHFRXOGJDLQDFFHVVWRWKHLQIRUPDWLRQ7KLVKRZHYHULVDYHU\FRPSOH[WDVN
3.1. Architecture 7KHVHQGHUHQFU\SWVWKHVHOHFWHGVHFUHWPHVVDJHDQGKLGHVLWLQDFDUULHUPHGLXP$(6(QFU\SWLRQIXQFWLRQWDNHV DVHFUHWWH[WDQGDPHVVDJHHQFU\SWLRQNH\³.H\´DVSDUDPHWHUVWRLW8VLQJWKHVHWZRSDUDPHWHUVDFLSKHUWH[WLV JHQHUDWHG7KLVFLSKHUWH[WLVKLGGHQLQDVHOHFWHGZDYDXGLRILOHZKLFKIRUPVDVWHJRDXGLRILOH7KH$XGLRILOHLV GLYLGHGLQWRQVKDUHVDQGWKHFLSKHUWH[WLVSDUWLDOO\KLGGHQLQWKH/6%RIWKHVHVKDUHV$VXEVHWRINVKDUHVZKHUH N! Q LVEHLQJWUDQVIHUUHGRYHUWKHQHWZRUNWKURXJKWKHGLIIHUHQWSRUWVLQRUGHUWRDYRLGLQWUXGHU¶VDWWDFN7KH VKDUHV DUH FRPELQHG DW WKH UHFHLYHU HQG 7KH UHVXOW LV WKH (QFU\SWHG 6WHJR $XGLR ILOH 7KH FLSKHU WH[W DQG WH[W GHFU\SWLRQNH\³.H\´LVSDVVHGDVDSDUDPHWHUWRDQ $(67H[W'HFU\SWLRQIXQFWLRQDQGWKHVHFUHWWH[WLVREWDLQHG EDFN 3.2. Sender Side Module $V VKRZQ LQ WKH EHORZ )LJXUH $(6 (QFU\SWLRQ IXQFWLRQ WDNHV D VHFUHW WH[W DQG D PHVVDJH HQFU\SWLRQ NH\ ³.H\´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
)LJ6HQGHU6LGH0RGXOH
378
Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381
3.3. Steganalysis Technique using Audio 7KHDXGLRILOHZKLFKLVXVHGDVDPHGLXPWRKLGHWKHDFWXDOPHVVDJHLVGHFRPSRVHGLQWRQQXPEHURIVKDUHVVXFK WKDWWKHDFWXDOILOHFRXOGEHREWDLQHGE\VWDFNLQJDWOHDVWNQXPEHURIVKDUHVZKHUHN Q! Q (DFKHQFU\SWHG VKDUHVFRQWDLQVSDUWLDOHQFU\SWHGSRUWLRQRIWKHVHFUHWGDWD8VLQJDPLQLPXPRIQ QXPEHURIVKDUHVRULJLQDOWH[W FRXOGEHUHWULHYHG 6WHSVIRUFUHDWLQJVKDUHVDWWKH6HQGHU6LGH 6KDPLU¶VWHFKQLTXHLVEDVHGRQ&57ZKLFKLVXVHGIRUVKDUHFUHDWLRQ7KLVDSSURDFKXVHVQQ DFFHVVVWUXFWXUH ZKLFKPHDQVQVKDUHVLVUHTXLUHGDWWKHUHFHLYHUHQGWRUHFUHDWHWKHRULJLQDOPHVVDJH:HKDYHXVHGNQ DSSURDFK ZKLFKUHTXLUHVPLQLPXPRINVKDUHVWRUHWULHYHEDFNWKHRULJLQDOGDWD $VVXPH6WREHWKHVHFUHWPHVVDJHQDVWKHWRWDOQXPEHURIVKDUHVDQGPDVWKHVXEVHWRIQVKDUHV 6WHS&KRRVHDYHU\ODUJHSULPHQXPEHULQWHJHU VXFKWKDW3!6DQG3!Q 6WHS&KRRVHDUDQGRPP VHTXHQFHRIFRHIILFLHQWDD««DP/HWD 6 6WHS&RPSXWHWKHSRO\QRPLDOLQWHUSRODWLRQI[ DD[D[««««DP[P 6WHS&RQVWUXFWWKHSRLQWV[L\M LIL PRGS ZKHUHL ««Q
)LJ&UHDWLRQRIQ6KDUHV
7R UHFRQVWUXFW WKH VHFUHW D PLQLPXP RI Q ZRXOG EH VXIILFLHQW &RPSXWH WKH /DJUDQJH¶V SRO\QRPLDOV HTXDWLRQ
)LJ6WDFNLQJRIN6KDUHV
379
Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381
/HDVWVLJQLILFDQWELW/6% LQVHUWLRQLVDFRPPRQVLPSOHDSSURDFKXVHGWRHPEHGLQIRUPDWLRQLQDWUDQVPLVVLRQ PHGLXP7KHOHDVWVLJQLILFDQWELWWKELW RIVRPHRUDOORIWKHE\WHVLVFKDQJHGWRDELWRIWKHVHFUHWPHVVDJHWKXV HQDEOLQJWRKLGHWKHVHFUHWWH[WLQVLGHDSUHSURFHVVHGDXGLRILOHZDY )RUHJ,IWKH$OSKDEHW$$6&,,%LQDU\ KDVWREHHPEHGGHGLQWRDQDXGLRILOHWKHQVD\IRU LQVWDQFHZHKDYHWKHIROORZLQJJULGRIDSUHSURFHVVHGDXGLRILOH 8VLQJWKH/6%RQO\WKHODVWELWZLOOQHHGWREHFKDQJHG6RWKHFKDQJHGJULGZRXOGORRNOLNHWKLV
3.4. Receiver end module $VVKRZQLQWKHEHORZGLDJUDP)LJXUH WKHUHFHLYHUVLGHZRUNVLQUHYHUVHRIWKHRSHUDWLRQVGRQHDWWKHVHQGHU VLGH7KLVLVGRQHVRDVWRUHJHQHUDWHRULJLQDOPHVVDJH7KHPXOWLSOHLQFRPLQJDUURZVGHQRWHLQFRPLQJVKDUHVIURP PXOWLSOHFKDQQHOV
)LJ5HFHLYHU6LGH0RGXOH
([SHULPHQWDO5HVXOWV 4.1. At the server console ,QSXW7H[WILOH:ULWLQJVHQVLWLYHLQIRUPDWLRQWKDWQHHGVWREHWUDQVIHUUHGWRWKHGHVWLQDWLRQLQWRDQRWHSDG
%URZVLQJWKHWH[WILOHDQG&KRRVLQJDQDXGLRILOHZDY WRHPEHGWKHWH[WILOHDIWHUEHLQJHQFU\SWHGE\WKHVHQGHU ZLWKKLVKHU SULYDWH NH\7KH DXGLRILOH LV VSOLW LQWR VKDUHV RI VL]H E\WHV DQG VHQW YLDSRUW ZKLFK LV VKRZQLQWKHORJUHSRUWEHORZ
380
Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381
)LJ6HQGHU/RJ
4.2. At the receiver console
$WWKHUHFHLYHUHQGWKHSRUWLVDFFHVVHGWRUHFHLYHWKHVKDUHV7KHVKDUHVZKLFKZHUHUHFHLYHGDUHEHLQJ FRPELQHGDWWKHUHFHLYHUHQGWRREWDLQWKHDXGLRILOH7KHSULYDWHNH\RIWKHHQGXVHULVXVHGWRGHFU\SWWKHPHVVDJH 7KLVLVVKRZQLQWKHORJUHSRUWEHORZ
)LJ5HFHLYHU/RJ
&RQFOXVLRQV $PXOWLOD\HUHGDSSURDFKZKLFKLQFOXGHV$(6DQG$XGLREDVHGFU\SWRJUDSK\WHFKQLTXHLVEHLQJSURSRVHGZKLFK LVVXLWDEOHIRUPXOWLPHGLDHQFU\SWLRQDQGGHFU\SWLRQ7KLV PHWKRGLVRIORZFRVWUHOLDEOHVXSSRUWVGLUHFWELWUDWH FRQWURO DQG LV PRUH UREXVW WR WUDQVPLVVLRQ HUURUV 7KHVH FKDUDFWHULVWLFV PDNH LW PRUH DSSOLFDEOH IRU WKH FXUUHQW QHHGV7KLVWHFKQLTXHFRXOGEHH[WHQGHGWRYLGHRHQFU\SWLRQZKLFKZLOOEHDQDO\]HGLQGHWDLOLQIXWXUHZRUN 5HIHUHQFHV
5DQMDQ.XPDU+63UDVDQQD.XPDU+56XGHHSD.%DQG*DQHVK$LWKDO(QKDQFHG6HFXULW\6\VWHPXVLQJ6\PPHWULF(QFU\SWLRQ DQG9LVXDO&U\SWRJUDSK\International Journal of Advances in Engineering & Technology-XO\#,-$(7,661 &KDQJ&KRX /LQ DQG :HQ+VLDQJ 7VDL 6HFUHW LPDJH VKDULQJ ZLWK VWHJDQRJUDSK\ DQG DXWKHQWLFDWLRQ - 6\VW6RIW ,661
Divya Jennifer D’Souza and Minu P. Abraham / Procedia Computer Science 78 (2016) 375 – 381
381
6DJDU$