DISCRETE WAVELET TRANSFORM (DWT) BASED TRIPLESTEGGING WITH ELLIPTIC CURVE CRYPTOGRAPHY (ECC) SHIVANAND S. GORNALE P G Department of Computer. Science, Rani Chennamma University,Belagavi, Karnataka,India.
[email protected] NUTHAN A.C Department of ECE, GMIT, Bharathinagara, Karnataka, India. Research Scholar, Jain University, Bangalore.
[email protected] ABSTRACT: The new developments in digital communication necessitate the need for preserving secrecy of sensitive data. This paper presents an improved method for embedding encrypted secret data in color images to provide high level security of data for communication over unsecured channels. The proposed technique collages Cryptography and Steganography. Cryptography is conversion of the secret message into a non-intelligible data. This encrypted data is embedded into a cover media to hides its existence using Triple- Stegging. This method has good visual quality of the stego-image and allows variety in implementation to acquire desired robustness and fault tolerance. KEYWORDS: DWT, ECC, Random Number Generator (RNG). INTRODUCTION Information security is the protection of information from unauthorized access, disclosure, modification, or destruction in order to provide confidentiality, integrity, and availability. Cryptography and steganography are the two popular methods to provide security [Kapoor et al]. Cryptography is the art and science of protecting information from unauthorized attackers, using encryption where the data scrambled to make the data unreadable, during transmission or storage [Stallings]. In this paper, a Public Key Cryptography method using Elliptic Curve Cryptography(ECC) Algorithm is used. Figure 1 shows the typical steganography system. PROBLEM FORMULATION The meaningless form of cipher text confirms an hacker with the existence of secret data in the hacked message. Therefore in order to hide the existence of such ciphered secret data steganographic method is used. Cryptography techniques can be executed on secret data before embedding into image; to strengthen security level and suppress the energy compaction of secret data. This method has good visual quality of the stego-image and allows variety in implementation to acquire desired robustness and fault tolerance. This paper uses ECC algorithm for data encryption which will be hidden into an image. The embedding is applied by modifying the details coefficients in transform domain of 2-Dimensional Discrete Wavelet Transform (DWT) and is followed by Triple-Stegging. Table 1 summarizes the
Figure 1. Typical steganography system
Stage
Algorithm
Table 1. Objective of the paper Objective
1
ECC
Data tobe hidden into an image file is converted into a cipher,
2
2-d DWT
3
Triple Stegging
Enable large capacity of data and maintaining good visual quality of the cover image Enhance the security level of the data
Encryption Haar wavelet transform presented No. of stages Steganography Cover image
of
Table 2. Previous work verses Present work Previous work Present work RSA algorithm [Nadiya et al] ECC, since it gives a higher security level than RSA [Rodriguez et al]. Abstract mathematical setting Matrix multiplication produces using special function called smoother and satisfactory compressed Haar Wavelets[Mulcahy et al] images [Colm Mulcahy] Single / Double stegging Triple [Nadiya et al] Gray scale image Color image Table 3. Generation of Private and Public keys A B Select private key nA