Proceedings of the 2013 International Conference on
Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22
978-1-4673-5845-3/13/$31.002013 IEEE
Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique
Parag Kadam Mangesh Nawale Department Of Computer Engineering Rajarashi Shahu College of Engg University Of Pune paragkadam1991@gmail.com
Akash Kandhare Department Of Computer Engineering Rajarashi Shahu College of Engg. University Of Pune aakash9373@gmail.com
Department Of Computer Engineering Rajarashi Shahu College of Engg University Of Pune nawale.mangesh@gmail.com
Mukesh Patil
Department Of Computer Engineering Rajarashi Shahu College of Engg. University Of Pune mukeshpa34@gmail.com
AbstractThe field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In this sender encrypt data and image separately using AES algorithm, hides encrypted data in encrypted image using LSB technique, system auto generate the all 3 respective keys. Sender sends the file through existing mail system. Receiver can perform operation as per respective keys like if he has only data hiding and image decryption key then he can only get the image in original form or if he have data hiding and data decryption key then he can get original data, system also provides protection for auto generated keys and system auto generate mail if user fail to perform any operation. Keywords: - Image and data encryption; data hiding and extraction; AES algorithm I. INTRODUCTION The purpose of steganography is to hide the very presence of communication by embedding message into innocuous-looking cover objects. Over the past of years, steganography has been a source of a lot of discussion particularly as it was suspect that terrorist connected with the September 11 th , 2000 attack might have used it for covert communications, while no such connection has been proved, the concern point out the effectiveness of steganography as a means of obscuring data. Indeed, along with encryption, steganography is the one of the fundamental way by which data can be safe confidential. We assume that the steganographic method is publically known with the exception of secret key. But steganography method provides more security as compared to cryptography. Cryptography is used to convert normal data to cipher form for secure communication. Encryption of image using AES algorithm coverts original image into cipher form. Existing System: Currently we had observed that there are many system which have non separable data hiding in encrypted image which have so many limitation like user must have all keys to get the data and less security for data [4] and to overcome limitation of previous system other system proposes the separable and reversible data hiding technique in which data going to embedded in normal form i.e. without encrypting data [1] in proposed system data have less security compare to image as data have more priority than image, to overcome these problem, limitation of previous proposed system we proposes the new system separable and reversible encrypted data in encrypted image using AES algorithm [5] and Lossy compression technique [2]. II. SYSTEM INFRASTRUCTURE The new approach of proposed system is sender encrypts data the data which going to hide can be any form like audio, video, text, document etc. [3] and the original uncompressed image AES algorithm [5] and then after encrypting data and image system will auto generate the data encryption and image encryption keys then user compresses the least significant bits (LSB) of the encrypted image using lossy compression technique and then user hides encrypted data 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 313
into encrypted image and then system will auto generate data-hiding key during the data hiding process the sender have to give the extension for new generated file like .xyz etc. to prevent hacker attack during file transmission. After successfully completion of process sender send the file with new extension to the receiver using existing mail system and all keys will be send privately. At receiver end with an encrypted image containing additional data which is also encrypted, if a receiver have data-hiding and data encryption keys, then he can extract the additional data and get original data though he does not know the image content. If the receiver have data extraction and image decryption keys, he can decrypt an image similar to the original one up to 80%, but cannot get the additional data. If the receiver has all three the data-hiding key, data decryption key and the image decryption key, he can extract the additional data, recover data to its original form and recover the original natural image when the amount of data is not too large. If the receive fails to decrypt any key three times at any stage then system will go into not responding state for next few minute and one notification mail including IP address, Clock timing (failure time) is send to admin regarding failure at receiver end and then admin forward mail to sender and wait for sender reply, system admin have all authority like block unblock users. After few minutes the system will restart and the receiver has to start perform from beginning. III. WORKING OF PROPOSED SYSTEM A. Registration The new user have to register for the system, admin will provide the authority for the new user.
B. Login The user must login to perform any operation, the record of login session will store at admin. C. Image Encryption The user will browse the image from computer and encrypt the image and system will auto generate encryption key. D. Data Encryption The user will browse data that he want send and encrypt the original data and system will auto generate the data encryption key E. Data embedding User will hide the encrypted data in encrypted image and system will auto generate data hiding key and system will generate file extension as per user defined. F. File Sending The sender will send the file with any extension (user defined) using internet connection and all keys will send privately. G. Image Decryption After receiving file from user. If receiver have Data hiding and Image Encryption keys then he will only decrypt the image and he will not able to get original data. H. Data Decryption If receiver have data hiding and data encryption keys then he will able to decrypt data. After decryption of data he will get the original data. I. Both Operation If receiver have all three keys then he will able to perform all three operation i.e. Image decryption, Data extraction, Data decryption.
I. AES ALGORITHM In our system we are using 128 bit key and in AES this is represented by Nb = 4, which reflects the number of 32-bit words (number of columns) in the State. The length of the Cipher Key, K, is 128. The key length is represented by Nk = 4, 6, or 8, which reflects the number of 32-bit words (number of columns) in the Cipher Key. The number of rounds to be performed during the execution of the algorithm is dependent on the key size. The number of rounds is represented by Nr, where Nr = 10 when Nk = 4, Nr = 12 when Nk = 6, and Nr = 14 when Nk = 8. For both its Cipher and Inverse Cipher, the AES algorithm uses a round function that is composed of four different byte- oriented transformations: 1) Byte substitution using a substitution table (S-box). 2) Shifting rows of the State array by different offsets IV. AES ALGORITHM In our system we are using 128 bit key and in AES this is represented by Nb = 4, which reflects the number of 32-bit words (number of columns) in the State. The length of the Cipher Key, K, is 128. The key length is represented by Nk = 4, 6, or 8, which reflects the number of 32-bit words (number of columns) in the Cipher Key. The number of rounds to be performed during the execution of the algorithm is dependent on the key size. The number of rounds is represented by Nr, where Nr = 10 when Nk = 4, Nr = 12 when Nk = 6, and Nr = 14 when Nk = 8. For both its Cipher and Inverse Cipher, the AES algorithm uses a round function that is composed of four different byte-oriented transformations: Figure 1. Proposed System Architecture 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 314
1) substitution using a substitution table (S-box). 2) Shifting rows of the State array by different offsets 3) Mixing the data within each column of the State array 4) Adding a Round Key to the State. [6].
V. COMPUTATIONAL MODEL AND IMPLEMENTATION OF ALGORITHM Computational model is nothing but mathematical model of algorithm as we are going to use AES algorithm for encryption of image and data. A. Mathematical Model
a. Image Encryption and Data Encryption Mathematical Model The main loop of AES performs following functions. i. SubBytes() ii. ShiftRows() iii. MixColumns() iv. AddRoundKey() SubBytes : Processing each byte through an S-Box. ShiftRows : MixColumns :
AddRoundKey :
This technique shows mathematical part of implementaion of encryption and decryption algorithm i.e AES algorithm. B. Experimental Design/Implementation We have been implemented our system in NetBeans 7.3 software. The personal laptop used in all programs and experiments was Intel CORE i3 at 2.27GHz, with 4GB of RAM and 500 GB of hard disc capacity. The performance of this algorithm is evaluated based on parameters such as memory required and simulation time. C. Evaluation Parameters Each of the encryption technique has their own strong and weak points. In order to apply an appropriate technique in a particular application we are required to know these strong and weak points. Therefore the analysis of these techniques based on several features is necessary. Memory required for implementation Different encryption techniques require different memory size for implementation. This memory requirement depends on the number of operations to be done by the algorithm. It is desirable that the memory required should be as small as possible. Simulation time The time required by the algorithm for processing completely a particular length of data is called the simulation time. It depends on the processor speed, complexity of the algorithm etc. The smallest value of simulation time is desired. b. Experimental Results and Analysis Testing of algorithm for execution time of encryption and decryption. For testing the algorithms we use a very simple code that checks the efficiency of algorithm. In this tutorial we have 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 315
tested several files and images in order to check Execution time of our system Following is the simple coding that we include in algorithm to calculate the time that algorithm takes for encryption and decryption. This simple code will calculate the time that the Algorithm takes and will display it on the screen.
DateTime start = DateTime.Now; this.StartSelectedProcess (); DateTime end = DateTime.Now; TimeSpan result = end - start; lblProgress.Text = "Elapsed Time: " + result.ToString(); As per our system implementation we had taken some tutorial and following table shows the execution time of encryption and decryption of text and image file. Table 1 shows execution time of some files i.e. text and image with respective there file size.
TABLE 1. EXECUTION TIME OF ENCRYPTION AND DECRYPTION OF FILES File Size Data (text) File Execution time File Size Image File Execution time 10 kb 00:00:01:9624000 40 kb 00:00:30:9624000 20 kb 00:00:05:9436000 50 kb 00:00:55:9324000 30 kb 00:00:09:2040000 60 kb 00:01:09:2488000 40 kb 00:00:12:0276000 70 kb 00:01:22:9435000 50 kb 00:00:16:7232000 80 kb 00:01:59:9624000 60 kb 00:00:20:2488000 90 kb 00:02:01:3812000
Memory Require for Implementation of whole system and algorithms Table 2 shows memory required in hard disk for implementation AES algorithm and whole system.
TABLE 2. MEMORY REQUIRED FOR IMPLEMENTATION OF ALGORITHMS AND WHOLE SYSTEM Memory Required for implementation of all algorithm (MB) Memory required implementation of whole system (MB) 5 (approx.) 150 (approx.)
VI. FEATURES OF SYSTEM A. Three Keys for more Data Security Encrypted data is hidden in Encrypted Image with separate keys for Data Encryption, Image Encryption and Data Hiding. For decrypting of data receiver should have both Data Encryption and Data hiding key. B. Protection for auto generated keys To perform any operation the user has only 3 attempts. If user is fail to perform any of operation means user enter wrong 3 times then the system is goes to not responding state and one mail with receiver computer IP address is send to the admin. C. User define extension prevent hacker attack During data hiding process user has to give the extension like .xyz. D. Admin as Main Admin of system have all authority that is admin can block, unblock any user at any time if he feel something wrong and admin have all records from all user. VII. CONCLUSION AND FUTURE WORK Our study helps constructing secure transmission of secrete file preventing any third party access and security level of data is increased by encrypting data. We also provide protection for keys during decryption process if any hacker attacks on system. In future we can use audio, video in case of image as cover for hiding the data.
2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 316
REFERENCES [1] X. Zhang, Separable Reversible Data Hiding in Encrypted Image IEEE Trans. Inform. Forensics Security, vol. 7, no. 2, pp. 826-832, April 2012. [2] X. Zhang, Lossy compression and iterative reconstruction for encrypted image, IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 5358, Feb. 2011. [3] Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez, A New Chaos Steganography Algorithm for Hiding Multimedia Data Feb. 19~22, 2012 ICACT2012.
[4] X. Zhang, Reversible Data Hiding in Encrypted Image IEEE signals processing letters, vol. 18, no. 4, pp. 255-258, April 2011. [5] Akash Kumar Mandal, Chandra Parakash, Mrs. Archana Tiwari Performance Evaluation of Cryptographic Algorithms: DES and AES, IEEE Trans. on Electrical, Electronics and Computer Science, 2012. [6] Announcing the ADVANCED ENCRYPTION STANDARD (AES), csrc.nist.gov/publications/fips/fips197/fips-197.pdf