vendor needs not to present himself before the tender opening date. The tender can .... After that covert both ID and amount into binary format and concatenate ...
Robust Tendering Implementation using Selective Frame attack resistant Video Steganography Ms. Shikha Sharma, Mr. Devendra Somwanshi,
Mr. Vijay Prakash Sharma
Poornima University, Jaipur, India
JECRC University, Jaipur, India
Abstract: E tendering is a way to publish and bid for a tender online that is so secured that it has reduced the corruption as no one will be aware of the actual facts and figures that other parties must have quoted and uploaded on the network. . The tendering process cannot be completed without proper sealing of the quotation envelope. In E-tendering this is done through cyclic redundancy check of the video frames, the CRC process is very time consuming and mathematically complex. Here proposed method for E-tendering is secured with attack resistant data hiding method. We planned to implement the use of multilevel cryptography and Steganography in E tendering. In this method biding amount hide from third party through multilevel process. Amount is embedded into frequency domain of logo image. Three level DWT is also used to increase the level data security. In this if someone tampers with video having secret information, it is still readable due to secret extraction using attack resistant embedding. Keywords:- image steganography, video steganography, DWT, DCT, attack resistant, PSNR, MSE
I. INTRODUCTION Tenders are filed for any contractual work to choose the vendor who satisfies all the terms and conditions. The criteria for selection also include the minimum proposed bid to deliver the desired services. It is the best method to get all the services with minimum cost. Unfortunately, in India many tenders are forcefully changed. Leaking the tender amount by some person in tender management, forcefully asking the persons to withdraw tenders are the major problems in making this process secure and genuine. We propose a secure tender filing system which may be connected to an online system where the vendor needs not to present himself before the tender opening date. The tender can only be opened by the vendor. Even the higher authorities cannot break this digital seal. The secure information like amount, etc. are embedded into an Enterprise Video. This video is selected by the vendor only. He is not going to enter the amount physically anywhere. This info will be digitally secured in his own video. Every time if the tender amount is to be seen it can be done only in presence of the vendor. He will select the images from the personal image identification module and hashing on these images will generate the secret key which will be merged with the tender
amount and the password given by the vendor. Time of registration will also be recorded in this secret key. II COMBINATION OF CRYPTOGRAPHY AND STEGANOGRAPHY Now a day the best way that people do or use to transfer secret message between two parties is the use of both Steganography and Cryptography for data transmission. Let us consider the below example in Fig 1, and understand the benefits of transferring data using both the techniques. Here need to transmit a Secret Message. Before sending the Secret message, first apply an Encryption technique on it and create a new Encrypted Message. This Encrypted Message called the Cipher Text which is changed as per some algorithm used for encryption. Now this Cipher Text is hidden behind a Cover image and hence creating a Stego-Image which has a meaning in itself but nobody will understand whether this is a Stego-Image or a normal image. The StegoImage is created using a Stego-Key. This is then received at the receiver end and using the Stego-Key first create the Cipher Text and then based on the decryption algorithm, decrypt the cipher text into Plain text. This new technique is helpful as this has two layered protection against the attackers. The attackers has to first identify the Stego-Image, if they are successful in identifying the Stego-Image then they need to succeed in creating the Cipher Text by creating the Stego-Key, which itself is not easy. If Stego- Key is found they also need to identify the Decryption algorithm to decrypt the Cipher text.
Fig 1: Combination of Steganography and Cryptography
III PROPOSED SYSTEM AND FLOW CHART 978-1-4673-6984-8/16/$31.00 © 2016 IEEE
Complete E-tendering system divided into two parts:i) ii)
Tender filling process Tender opening process
i) Tender Filing process:-This process is highly secured and heart of the proposed method. A two level security has been added since the first secret information taken from the bidder is the password and other is PII (Personal Image identification) image selection. The method locks the data in two phases. First is to store the secret data into the EDL and then embedding this EDL as watermark in the video using attack resistant watermarking method. There is no effect of tampering to the hidden information since it is embedded in frequency domain. This is practically impossible for physical tendering process where if the tampering is done then whole tendering process is to be repeated. The steps are as follows: i. Input a. Bidder information input BIDDER_ID and PWD b. Bid amount BAMT c. Time of Bidding d. Enterprise dependent logo for secret info hiding e. Tender video as bid envelope to hide EDL ii. Check if authentic bidder iii. Parameters a. nframes=video.NumFrames; b. col=video.Width; c. row=video.Height; iv. Bidder ID and amount are concatenated in binary and length of this sequence is stored binary embedding sequence this is our secret info v. Generate binary EDL permutation key(EPK) by concatenating time of tendering and password of bidder vi. Reset random number generator to EPK vii. Resize logo up to 1/8 of video size viii. Make a permute sequence of size (row/8, col/8) ix. Random embedding intensity (custom intensity) generation according to binary embedding sequence to be embedded into logo x. Summation of EPK bits for PII image index x and index y selection xi. Input of PII images a. Getting values from index x and index y of PII images b. Concatenating all to make a seed xii. Generate an IGS to randomly select the embedding locations inside EDL for customization xiii. Customization of EDL by embedding of custom intensity at positions determined by IGS xiv. Store complete secret info in EDL guided by IGS and stored values are random intensities xv. Permute the EDL using permuting sequence so that the embedded data is randomly spreader all over EDL xvi. This customized EDL is the watermark for attack resistant watermarking xvii. This EDL is embedded in multiple frames selected randomly based on seed xviii.Selection of frames for data hiding xix. Embedding Process by Attack resistant wavelet based watermarking Method xx. Conversion to movie format
xxi. PSNR and MSE are calculated for video quality control ii) Tender Opening Process- This process is inverse process of the tender filing process. All the functions and generated information and key are same but here the bid amount is not entered. This is the process occurs in presence of all the bidders. The bid amount of any tender video file can be extracted only if the bidder enters the correct password. Another level of security is added since he has to select the same PII images that were selected during registration. This two tier security process is almost impossible if the correct password and the PII image selection have not been done. Brief steps of tender opening are as follows: Select the tender video envelope i. ii.
Enter the bidder id and password Run the same algorithm for seed and key generation as it was done for tender filing iii. Apply attack resistant watermark extraction process iv. Extract the permuted EDL v. Re-Permuted extracted EDL vi. Extract the Hidden secret info from re-permuted EDL vii. Decrypt the extract information viii. Convert in to the binary ix. This gives bidder ID and Amount x. Separate the Bidder ID and amount from sequence xi. If Bidder ID is matched a. Amount is valid xii. Extract Bid amount IV FLOW CHARTS i. Information Encryption process: Objective of this process is, to encrypted secret information (bidding amount). In this process first, ID, password, time, and amount take as input. After that covert both ID and amount into binary format and concatenate them using following function and store their value into a variable EMBED. Add time and password and store the value into a variable EPKK. If EMBED having value 1 then, this value will be converted any of 1 to 100 numbers on the basis of EPKK, otherwise any of 150 to 250. This process is repeat till the length of EMBED. By doing this secret information which is bidding amount is encrypt.
ii. Image Steganography Process:- Objective of this process is, to generate stego image. In this process output of
the previous process is taking as input. Additionally a cover image and three personal images take as input. In this process first select co-ordinate (x, y) on basis of EPKK then take intensity of all three personal images at co-ordinate (x, y). Concatenate all three intensity and store the value into SEEDF. Now based on SEEDF, select a co-ordinate (x, y) and at this co-ordinate of cover image one bit of encrypted information is stored. This process applies length of encrypted information times. By changing the value of particular pixels of cover image with encrypted information a stego image is generated.
input. First of all collect information of video for instance no of frames, height and width of frames etc. Now select few frames on basis of SEEDF. Perform 3- level DWT using HAAR wavelet on selected frames, calculate approximation, horizontal, vertical and diagonal details and also calculate DCT of stego image, copied into diagonal detail of DWT. After that, perform inverse 3-Level DWT to get stego frame. Combine both stego frames with other frame to generate the stego video. Embedded process is complete at this level. After this step information (amount) is hidden within video in encrypted form. This video and time will be sent for extraction process (receiving end).
iii. Image encryption process:- The objective of this process is, to generate encrypted stego image. In this process output of the previous process which is stego image, taking as input. First of all a matrix named PERMUTE having value 0 or 1 is created. Moreover its size is equals to that of cover image. If matrix having value 1 at particular co-ordinate (x, y), interchange the value of stego image at co-ordinate (x, y) with co-ordinate (y, x). Otherwise no changes are required. By doing encrypted stego image is received.
v. Attacking process:- Objective of this process is, to generate a attacked stego video. In this process output of the previous process is taking as input. In this we perform various attacks on video like scaling, rotation, linear filter, median filter, blurring, adjustment, jpeg compression, Histogram Equalization. Output of this process is attacked stego video.
iv. Video steganography process:- The aim of this process is, to generate a stego video. In this process output of the previous process is taking as input and a cover video take as
vi. Extraction process of video steganography:- Purpose of this process is, to generate encrypted stego image. In this process stego video (output of embedded process) and time is taking as input. Along with these inputs user ID, password and three personal images are also required. First of all add time and password and store the value into a variable EPKK1, then based on EPKK1 select the co-ordinate (x, y), now take intensity of all three personal images at co-ordinate (x, y). Concatenate all three intensity and store the value into SEEDF. Select frames by using SEEDF. Perform 3- level DWT on selected frame using HAAR wavelet. Take its diagonal part and calculate inverse cosine of diagonal part to get stego image. Output of this process is encrypted stego image. If password of extraction process is different form embedded process, value of EPKK1 will be different from EPKK, so co-ordinate (x,y) will be different, as a result of this SEEDF1 will be different, finally correct encrypted stego image will not be received.
vii. Decryption process:- Requirement of this process is, to generate stego image. In this process output of the previous process is taking as input. First of all a matrix named PERMUTE having value 0 or 1 is created. Moreover its size is equals to that of cover image. If matrix having value 1 at particular co-ordinate (x, y), interchange the value of encrypted stego image at co-ordinate (x, y) with co-ordinate (y, x). Otherwise no changes are required. By doing stego image is received. viii Extraction process of image steganography:- The reason of this process is, to generate encrypted information. In this process output of the previous process is taking as input. Along with this SEEDF1, which is calculated in previous step is also required, calculate co-ordinate (x,y) using SEEDF1, and check the intensity of stego image at co-ordinate (x,y), if value less than and equal to 100 than put 1 into a variable ext_bit, otherwise put 0. This process is repeats till the length of secret information. Output of this process is sequence of ext_bit. ix Process of extracting information:- The objective of this process is, to generate secret information (bidding amount). In this process output of previous process is taking as input. ID is also taking as input. Calculate the length of ID and put into a variable P. Discard 1 to p bits of sequence of ext_bit. Convert rest sequence from binary to decimal. This decimal part is our secret information (bidding amount).
Start
Sequence of Ext_Bit, User ID
Convert User ID in to Binary Format
Fig 5: histogram of original and embedded image
P=length of User ID
Histograms show s that there is no difference between original image and embedded image.
Discard 1 to P Bit of Sequence of Ext_bit
Convert rest sequence from Binary to Decimal Fig 6: original frame and Embedded frame
Secret Information (Amount)
End
V RESULTS
Fig 7: histogram of original and embedded frame
Fig 2: Login window
Fig 3: Enter Biding amount
Fig 8: attacked frame
Fig 4: original image and embedded image
[3].
[4].
[5]. [6]. Fig 9: PSNR, MSE and extract bid amount
Extract amount is same as input value. VI CONCLUSION The proposed method for hiding tender information inside digital video envelope. This scheme is novel in this area and has no algorithmic comparisons. The concept of digital video envelope, EDL, attack resistant watermarking in frequency domain has been used to ensure multiple tiers of security. We are also using framed video data hiding method. The visual quality of the Stego video has been ensured by high PSNR values such as infinite. The main idea is to verify the hidden bidding information from the digital video envelope. Even the histogram checking is not able to detect the presence of the data. This approach ensures a successful landmark for data hiding by applying digital videos for online tendering. The approach has been verified for successful data extraction even after presence of common image processing attacks. We are planning to deploy it for government organizations as a complete system.
REFERENCES [1]. [2].
Abdelwahab, A.A.; Hassaan, L.A., "A discrete wavelet transform based technique for image data hiding," Radio Science Conference, 2008. NRSC 2008. National , vol., no., pp.1,9, 18-20 March 2008 Akhtar N.; Johri P.; Khan S.; “Enhancing the Security and Quality of LSB based Image Steganography”, “International Conference on Computational Intelligence and Communication Networks”, 2013
[7]. [8]. [9]. [10]. [11].
[12]. [13].
[14].
[15].
[16].
Babu, K.S.; Raja, K.B.; Kiran, K.K.; Manjula Devi, T.H.; Venugopal, K.R.; Patnaik, L.M., "Authentication of secret information in image Steganography," TENCON 2008 - 2008 IEEE Region 10 Conference , vol., no., pp.1,6, 19-21 Nov. 2008 Balakrishna C.; Naveen Chandra V.; Pal R.; “Image Steganography Using Single Digit Sum with Varying Base”,”IEEE international conference on Electronics, computing and communication Technologies”, Banglore,2014,page no 1-5. Balaji, R.; Naveen, G., "Secure data transmission using video Steganography," Electro/Information Technology (EIT), 2011 IEEE International Conference on , vol., no., pp.1,5, 15-17 May 2011 Bhautmage P.; Jeyakumar A.; Dahatonde A.; ”Advanced Video Steganography Algorithm”, “International Journal of Engineering Research and Applications (IJERA)” , ISSN: 2248-9622, Vol. 3, Issue 1, February 2013, Chunying Gu, Xiaoli Cao, “Research on Information Hiding Technology”, IEEE 2nd International Conference on Consumer Electronics, Communications and Networks, pp. 2035-2037, April 2012. Gupta Banik B.; Bandyopadhyay S.; “A DWT method for Image Steganography”, “International journal of Advanced Research in computer science and software Engineering”, 2013 Kajewski, S and Weippert, A, “E-Tendering: Benefits, Challenges and Recommendations for Practice”. “In Proceedings CRCCI International Conference: Clients Driving innovation”, 2004 Raphasel A.j.; Dr. Sumdaram V.; “Cryptography and Steganography – A Survey” “International Journal of computer Technology and Application”, vol 2(3),626-630 Mishra, A.; Gupta, A.; Vishwakarma, D. K., "Proposal of a New steganographic Approach," Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. International Conference on , vol., no., pp.175,178, 28-29 Dec. 2009 Min Liu, "Study of Digital Video Watermarking," Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on , vol.2, no., pp.77,80, 23-25 March 2012 Nag, A.; Ghosh, S.; Biswas, S.; Sarkar, D.; Sarkar, P.P., "An image steganography technique using X-box mapping," Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on , vol., no., pp.709,713, 30-31 March 2012 Neeta, D.; Snehal, K.; Jacobs, D., "Implementation of LSB Steganography and Its Evaluation for Various Bits," Digital Information Management, 2006 1st International Conference on , vol., no., pp.173,178, 6-6 Dec. 2006 Sirsendusarbavidya, Sunil Karforma, “UML implementation of ETendering using Secret Key Digital Watermarking”, International Journal of Computer and Distributed System Volume: 1, Issue: 2, 72-75, 2012 Xing Chang; Weilin Wang; Jianyu Zhao; Li Zhang, "A survey of digital video watermarking," Natural Computation (ICNC), 2011 Seventh International Conference on , vol.1, no., pp.61,65, 26-28 July 2011