Data Security by (Information XOR Image) Along With ...

46 downloads 0 Views 423KB Size Report
Rohit Sharma, Dr. Anuj Kumar Agarwal, Dr. P.K. Singh. Research ... Rohit Sharma and Dr. P.K. Singh point that .... [5] Walia, E., Jain, P. and Navdeep. (2010) ...
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 11, Number 1 (2015), pp. 27-36 © Research India Publications http://www.ripublication.com

Data Security by (Information XOR Image) Along With High Capacity Encryption to Overcome Steganography Rohit Sharma, Dr. Anuj Kumar Agarwal, Dr. P.K. Singh Research scholar (School of Electronics and Communication) Teerthanker mahaveer university, Moradabad Associate Professor, Teerthanker mahaveer university, Moradabad Professor, IIMT Engineering College, Meerut Abstract As we realize that the security of information is a noteworthy issue in the field of PC system and for that we have a ton of information security plans like staganography for concealing data and other for encryption and decoding the information & and so forth. In this paper, we going to presented another plan, which is the mix of a numerical operation and a high limit encryption. We likewise talked about that why we ought not utilized staganography to concealing the data and security. Proposed plan not just defeat the disadvantages of staganography, even it likewise give a high limit encryption. In this paper, first we XOR the data (to be send) with picture and after that resultant picture will be scrambled with a secret key. Mix of these two plans will rebelliously improve the security of data. We additionally think about the parameters estimations of staganography and parameters estimations of proposed plan. Keywords-Information XOR Image, Staganography, Encryption

1.0. INTRODUCTION As the foe assaults on PC system expanded step by step, the requirement for new security conspires likewise expanded. Staganography is one of the data hidding plans, which is information concealing procedure. Numerous individuals the world over have utilized this information concealing system [1]. In this paper, we proposed another security plan. This plan is the mix of two distinctive high limit systems. The principle concern of this strategy is to give high limit security to information. This plan likewise beats the downsides of staganograpgy. With the help proposed plan, we attempted to change over information in such a structure, to the

28

Rohit Sharma and Dr. P.K. Singh

point that give the privacy and information respectability [3]. In this paper, first we give the examination in the middle of staganograpgy and proposed plan and afterward break down that how the proposed plan is more proficient for information security. This paper contrasts these two plans and the assistance of some parameter and attempted to clear the distinction by numerical and graphical investigation.

Fig-1.1 – Proposed Scheme

Info picture is same for investigation for both staganography and proposed plan. As the block diagram shows, first we perform scientific operation in the middle of picture and data. And after that yield sent for the encryption. A password will be utilized as the mystery key for encryption [7].

2.0. HIDING INFORMATION (STAGANOGRAPHY) Staganography is art of concealing the data inside other document. It has numerous favorable circumstances over the cryptography. Yet, it is not more fit for security perspective. For secure data, and hide insider facts, advanced watermarking and steganography systems are utilized [5]. On other hand, numerous specialist buckle down for enhancing the limit of staganography.

Fig-2.1– Staganography Procedure

On the off chance that there are ensures on the uprightness of the channel then steganography is a superb method for chatting. Concurrence on mystery key is not by

Data Security by (Information XOR Image)

29

any means essential for two gatherings. Nonetheless, sticking aversion of the incognito messages is troublesome in the vicinity of a dynamic foe. On the off chance that we need to conceal data then Steganography would be a best instrument yet the characteristic suspicion of its utilization is low, as sites or email, yet for high-esteem media streams, it is a poor device on the grounds that here superintendents/assailants can securely accept that steganographic strategies are being utilized [2]. Fundamental steganography application is to shroud a picture or data inside of a spread picture. Straightforward steganographic procedure is Least-noteworthy bit concealing taking into account altering the minimum huge piece of the spread picture and the most critical segments of the picture to be stow away. It supplanted the minimum noteworthy n bits of every pixel of the spread picture with the most huge n bits of the shrouded picture [10]. At the point when n is not very substantial then just Least-critical bit covering functions admirably, yet with the assistance of factual examinations it can without much of a stretch distinguish the stegotext [6]. The deficiency in minimum critical bit veiling is that the bits proportion of stegotext to shrouded content is high. Assuming 8 bit planes (one plane each of red, green, and blue intensities) n bits of shrouded content per 8 bits of stegotext. The proportion is sufficiently high that insights of the stegotext will specifically influenced by concealed content [11]. 2.1. Implementation and Result Taking after figure demonstrate the complete staganography operation. All staganographic methodologies have the same fundaments that they are utilizing to shroud data.

Fig-2.2-hiding secret message

As in figure-2.2, first we need to apply a secret message and a spread picture to inserting capacity. Yield picture has conveying the secret message covered up. Further a converse procedure needs to seek separating the first message. Presently we are going to actualize the staganography calculation on picture.

30

Rohit Sharma and Dr. P.K. Singh

Fig-2.3 – Cover image

The figure-2.3 is our spread picture. After apply the staganography operation between the spread picture and data, we have the yield as figure-2.4.

Fig-2.4 Stego image

We can't stand up in comparison the cover picture and stego picture by human eyes. Be that as it may, in the event that we take a survey on the histogram of these pictures then we discovered an expansive contrast between both pictures. With RGB pictures, the default histogram is ascertained by changing over every pixel to grayscale utilizing the equation Gray = (red + green + blue) ⁄ 3 or gray = 0.299 × red + 0.587 × green + 0.114 × blue if Weighted RGB Conversions is checked.

Data Security by (Information XOR Image)

31

Fig – 2.5 – Histogram of Cover Image

Fig – 2.6-Histogram of Stego Image

Above Fig-2.5 and Fig-2.6 demonstrates the histogram for spread picture and stego picture. Both are histogram are unique in relation to one another.

3.0. WHY NOT STAGONOGRAPHY? As we talk about in past area that the histogram of stego picture is totally not the same as the histogram of spread picture. In this area we depicted that why we ought not utilized staganography for security perspective [9]. For that we need to survey a few parameters of stago picture. Table-1-Parameters for Stego and cover image Operation (Image) Mean Mode Standard Deviation Original Image 174.735 251 70.345 Stego Image 194.985 219 48.752

On the off chance that we audit these parameters, then we found that mean and mode estimation of both picture are fundamentally the same. The purpose for this is to conceal the information with just the LSB piece of spread picture. This technique is exceptionally suitable for concealing the data [10].

32

Rohit Sharma and Dr. P.K. Singh

Human can't discover the distinction in both pictures. In any case, when we discussing the security, then it is not proficient to giving the high limit security. Foe can undoubtedly separate the data with performing assault on LSB some piece of stego picture [2]. To defeat this downside we acquainted new plan with supplant the staganography. At the spot of staganography, we perform XOR operation in the middle of information and picture. Every single bit of picture will be the piece of XOR operation. Table-2-Parameters for cover image and parameter after XOR Operation (Image) Mean Mode Standard Deviation Original Image 174.735 251 70.345 I XOR I 81.055 11 70.010 Above table-2 demonstrates the parameters for spread picture and parameters after XOR. There have a substantial contrast in the mean and mode estimations of spread picture and XOR picture. This is on the grounds that we utilized complete bit stream for concealing the data. Foe can't without much of a stretch concentrate the data from this kind of picture. This plan is able for concealing data as well as for giving high limit security [9]. We depict this plan in subtle element in next area.

4.0. PROPOSED MODEL In this paper, we proposed another plan for data encryption and to defeat the disadvantage of staganography In the proposed model, first we perform XOR operation between the data and picture and afterward forward this yield picture for encryption. The yield picture from XOR is not like the cover picture on the grounds that we perform the XOR for complete picture. [4]. 4.1. Experiment and Results Figure-4.1. shows the cover image to be encrypted

Fig-4.1 Cover image

Data Security by (Information XOR Image)

33

And figure-4.2 shows the XOR output image.

Fig-4.2 XOR output image Both the images are different from each other. Fig-4.3 shows the final encryption output image. Encryption has completed with a secret password [8].

Fig-4.3 Encrypt output image Now we comparing the histogram for cover image, XOR output image and encrypt out image. Fig-4.4 shows the histogram for cover image.

Fig-4.4 Histogram for Cover image Figure-4.5 shows the histogram for XOR output

34

Rohit Sharma and Dr. P.K. Singh

Fig-4.5 Histogram for XOR output image Figure-4.6 shows the histogram for output encrypted image.

Fig-4.6 Histogram for output encrypted image These are the histogram for cover, XOR and encoded picture. All histograms are not quite the same as one another. Scrambled histogram begins from qualities 2-3 and completion at 252-253. The parameters for these yields can be demonstrated by Table-3. Table-3-Parameters for different outputs Operation (Image) Original Image Stgo image XOR o/p Data Encrypted image

Size (Bytes) Mean Mode Standard Deviation 96,884 174.735 251 70.345 212,695 194.985 219 48.752 122,065 81.055 11 70.010 514,174 127.746 127 42.694

In table-3 we think about the parameters for diverse yields. The last scrambled yield parameters are totally not the same as the spread picture parameters. That implies extraction of data is not simple for foe. This proposed plan beyond any doubt the high limit for security.

Data Security by (Information XOR Image)

35

5. CONCLUSION The proposed plan is utilized to give high ability security to information. This plan satisfies the necessity of concealing the data and also giving the security. The principle lacking of staganography is to utilize just LSB some piece of picture for concealing data. In any case, we realize that step by step, enemy will be more hazardous. That is the reason we require some new strides in the field of security. Our proposed plan satisfies these whole prerequisites. All of the picture will be scrambled in the proposed plan. As the time builds step by step, the need of changes in past innovation will increments. We further attempt to present propelled variant of proposed plan for future necessity. Further we will utilize new test systems, new operation, and new thoughts in the field of security. To make RFID innovation globalized, I proposed part of encryption model. Yet, I believe that picture encryption can likewise be a decent answer for RFID framework security. I trust that this proposed plan will be the piece of encryption plans.

REFERENCES [1]

[2]

[3].

[4]

[5]

[6]

[7]

[8]

[9]

Anderson, R. J. and Petitcolas, F. A.P. (1998) “On The Limits of Steganography”, IEEE Journal of Selected Areas in Communications, Vol.16 No.4, pp.474-481, ISSN 0733-8716. Petitcolas, F.A.P., Anderson, R. J. and Kuhn, M.G. (1999) “Information Hiding-A Survey”, Proceedings of the IEEE, Special issue on Protection of Multimedia Content, vol. 87, no. 7, pp.1062-1078. Laskar, S.A. and Hemachandran, K. (2012), “An Analysis of Steganography and Steganalysis Techniques”, Assam University Journal of Sscience and Technology, Vol.9, No.II, pp.83-103, ISSN: 0975-2773. Younes, M.A.B. and Jantan, A. (2008), "Image Encryption Using BlockBased Transformation Algorithm," International Journal of Computer Science, Vol. 35, Issue.1, pp.15-23. Walia, E., Jain, P. and Navdeep. (2010), “ An Analysis of LSB & DCT based Steganography”, Global Journal of Computer Science and Technology, Vol. 10 Issue 1, pp 4-8. Khare, P., Singh, J. and Tiwari, M. (2011), “Digital Image Steganography”, Journal of Engineering Research and Studies, Vol. II, Issue III, pp. 101-104, ISSN:0976-7916. Sokouti, M., Sokouti, B. and Pashazadeh, S. (2009), “An approach in improving transposition cipher system”, Indian Journal of Science and Technology, Vol.2 No. 8, pp. 9-15, ISSN: 0974-6846. Mohammad Ali Bani Younes and Aman Jantan, ―An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption‖ , IJCSNS International Journal of Computer Science and Network Security, VOL.8, April 2008. Rabah, K. (2004), “Steganography – The Art of Hiding Data”, Information Technology Journal, Vol.3, no.3, pp. 245-269.

36 [10]

[11]

Rohit Sharma and Dr. P.K. Singh Deshpande, N., Kamalapur, S. and Daisy, J. (2006), “Implementation of LSB steganography and Its Evaluation for Various Bits”, 1st International Conference on Digital Information Management, pp.173-178. Karen, Bailey, and Kevin Curran.(2006) "An evaluation of image based steganography methods" Multimedia Tools and Applications, Springer Vol.30, no. 1, pp. 55-88.

Suggest Documents