You are on page 1of 5

Proceedings of the 2013 International Conference on

Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22


978-1-4673-5845-3/13/$31.002013 IEEE

Separable Reversible Encrypted Data Hiding in
Encrypted Image Using AES algorithm and Lossy
Technique

Parag Kadam Mangesh Nawale
Department Of Computer Engineering
Rajarashi Shahu College of Engg
University Of Pune
paragkadam1991@gmail.com

Akash Kandhare
Department Of Computer Engineering
Rajarashi Shahu College of Engg.
University Of Pune
aakash9373@gmail.com

Department Of Computer Engineering
Rajarashi Shahu College of Engg
University Of Pune
nawale.mangesh@gmail.com

Mukesh Patil

Department Of Computer Engineering
Rajarashi Shahu College of Engg.
University Of Pune
mukeshpa34@gmail.com

AbstractThe field steganography is very much popular
technique for sending secrete message and lots of research are
going in it. To overcome the limitation of previous work we
proposed separable and reversible encrypted data hiding in
encrypted image using AES Algorithm and Lossy technique as
solution. In this sender encrypt data and image separately using
AES algorithm, hides encrypted data in encrypted image using
LSB technique, system auto generate the all 3 respective keys.
Sender sends the file through existing mail system. Receiver can
perform operation as per respective keys like if he has only data
hiding and image decryption key then he can only get the image
in original form or if he have data hiding and data decryption
key then he can get original data, system also provides
protection for auto generated keys and system auto generate
mail if user fail to perform any operation.
Keywords: - Image and data encryption; data hiding and
extraction; AES algorithm
I. INTRODUCTION
The purpose of steganography is to hide the very
presence of communication by embedding message into
innocuous-looking cover objects.
Over the past of years, steganography has been a source
of a lot of discussion particularly as it was suspect that
terrorist connected with the September 11
th
, 2000 attack
might have used it for covert communications, while no such
connection has been proved, the concern point out the
effectiveness of steganography as a means of obscuring data.
Indeed, along with encryption, steganography is the one of
the fundamental way by which data can be safe confidential.
We assume that the steganographic method is publically
known with the exception of secret key. But steganography
method provides more security as compared to cryptography.
Cryptography is used to convert normal data to cipher
form for secure communication. Encryption of image using
AES algorithm coverts original image into cipher form.
Existing System: Currently we had observed that there
are many system which have non separable data hiding in
encrypted image which have so many limitation like user
must have all keys to get the data and less security for data
[4] and to overcome limitation of previous system other
system proposes the separable and reversible data hiding
technique in which data going to embedded in normal form
i.e. without encrypting data [1] in proposed system data have
less security compare to image as data have more priority
than image, to overcome these problem, limitation of
previous proposed system we proposes the new system
separable and reversible encrypted data in encrypted image
using AES algorithm [5] and Lossy compression technique
[2].
II. SYSTEM INFRASTRUCTURE
The new approach of proposed system is sender encrypts
data the data which going to hide can be any form like audio,
video, text, document etc. [3] and the original uncompressed
image AES algorithm [5] and then after encrypting data and
image system will auto generate the data encryption and
image encryption keys then user compresses the least
significant bits (LSB) of the encrypted image using lossy
compression technique and then user hides encrypted data
2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 313

into encrypted image and then system will auto generate
data-hiding key during the data hiding process the sender
have to give the extension for new generated file like .xyz
etc. to prevent hacker attack during file transmission. After
successfully completion of process sender send the file with
new extension to the receiver using existing mail system and
all keys will be send privately. At receiver end with an
encrypted image containing additional data which is also
encrypted, if a receiver have data-hiding and data encryption
keys, then he can extract the additional data and get original
data though he does not know the image content.
If the receiver have data extraction and image decryption
keys, he can decrypt an image similar to the original one up
to 80%, but cannot get the additional data. If the receiver has
all three the data-hiding key, data decryption key and the
image decryption key, he can extract the additional data,
recover data to its original form and recover the original
natural image when the amount of data is not too large. If the
receive fails to decrypt any key three times at any stage then
system will go into not responding state for next few minute
and one notification mail including IP address, Clock timing
(failure time) is send to admin regarding failure at receiver
end and then admin forward mail to sender and wait for
sender reply, system admin have all authority like block
unblock users. After few minutes the system will restart and
the receiver has to start perform from beginning.
III. WORKING OF PROPOSED SYSTEM
A. Registration
The new user have to register for the system, admin will
provide the authority for the new user.


B. Login
The user must login to perform any operation, the record of
login session will store at admin.
C. Image Encryption
The user will browse the image from computer and encrypt
the image and system will auto generate encryption key.
D. Data Encryption
The user will browse data that he want send and encrypt the
original data and system will auto generate the data
encryption key
E. Data embedding
User will hide the encrypted data in encrypted image and
system will auto generate data hiding key and system will
generate file extension as per user defined.
F. File Sending
The sender will send the file with any extension (user
defined) using internet connection and all keys will send
privately.
G. Image Decryption
After receiving file from user. If receiver have Data hiding
and Image Encryption keys then he will only decrypt the
image and he will not able to get original data.
H. Data Decryption
If receiver have data hiding and data encryption keys
then he will able to decrypt data. After decryption of data he
will get the original data.
I. Both Operation
If receiver have all three keys then he will able to
perform all three operation i.e. Image decryption, Data
extraction, Data decryption.

I. AES ALGORITHM
In our system we are using 128 bit key and in AES this is
represented by Nb = 4, which reflects the number of 32-bit
words (number of columns) in the State.
The length of the Cipher Key, K, is 128. The key length is
represented by Nk = 4, 6, or 8, which reflects the number of
32-bit words (number of columns) in the Cipher Key.
The number of rounds to be performed during the
execution of the algorithm is dependent on the key size. The
number of rounds is represented by Nr, where Nr = 10 when
Nk = 4, Nr = 12 when Nk = 6, and Nr = 14 when Nk = 8.
For both its Cipher and Inverse Cipher, the AES algorithm
uses a round function that is composed of four different byte-
oriented transformations:
1) Byte substitution using a substitution table (S-box).
2) Shifting rows of the State array by different offsets
IV. AES ALGORITHM
In our system we are using 128 bit key and in AES this is
represented by Nb = 4, which reflects the number of 32-bit
words (number of columns) in the State.
The length of the Cipher Key, K, is 128. The key length
is represented by Nk = 4, 6, or 8, which reflects the number
of 32-bit words (number of columns) in the Cipher Key.
The number of rounds to be performed during the
execution of the algorithm is dependent on the key size. The
number of rounds is represented by Nr, where Nr = 10 when
Nk = 4, Nr = 12 when Nk = 6, and Nr = 14 when Nk = 8.
For both its Cipher and Inverse Cipher, the AES
algorithm uses a round function that is composed of four
different byte-oriented transformations:
Figure 1. Proposed System Architecture
2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 314

1) substitution using a substitution table (S-box).
2) Shifting rows of the State array by different offsets
3) Mixing the data within each column of the State
array
4) Adding a Round Key to the State. [6].

V. COMPUTATIONAL MODEL AND
IMPLEMENTATION OF ALGORITHM
Computational model is nothing but mathematical model
of algorithm as we are going to use AES algorithm for
encryption of image and data.
A. Mathematical Model

a. Image Encryption and Data Encryption Mathematical
Model
The main loop of AES performs following functions.
i. SubBytes()
ii. ShiftRows()
iii. MixColumns()
iv. AddRoundKey()
SubBytes :
Processing each byte through an S-Box.
ShiftRows :
MixColumns :


AddRoundKey :

This technique shows mathematical part of
implementaion of encryption and decryption algorithm i.e
AES algorithm.
B. Experimental Design/Implementation
We have been implemented our system in NetBeans 7.3
software. The personal laptop used in all programs and
experiments was Intel CORE i3 at 2.27GHz, with 4GB of
RAM and 500 GB of hard disc capacity. The performance of
this algorithm is evaluated based on parameters such as
memory required and simulation time.
C. Evaluation Parameters
Each of the encryption technique has their own strong
and weak points. In order to apply an appropriate technique
in a particular application we are required to know these
strong and weak points. Therefore the analysis of these
techniques based on several features is necessary.
Memory required for implementation
Different encryption techniques require different
memory size for implementation. This memory requirement
depends on the number of operations to be done by the
algorithm. It is desirable that the memory required should be
as small as possible.
Simulation time
The time required by the algorithm for processing
completely a particular length of data is called the simulation
time. It depends on the processor speed, complexity of the
algorithm etc. The smallest value of simulation time is
desired.
b. Experimental Results and Analysis
Testing of algorithm for execution time of encryption
and decryption.
For testing the algorithms we use a very simple code that
checks the efficiency of algorithm. In this tutorial we have
2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 315

tested several files and images in order to check Execution
time of our system
Following is the simple coding that we include in
algorithm to calculate the time that algorithm takes for
encryption and decryption.
This simple code will calculate the time that the
Algorithm takes and will display it on the screen.

DateTime start = DateTime.Now;
this.StartSelectedProcess ();
DateTime end = DateTime.Now;
TimeSpan result = end - start;
lblProgress.Text = "Elapsed Time: " +
result.ToString();
As per our system implementation we had taken some
tutorial and following table shows the execution time of
encryption and decryption of text and image file. Table 1
shows execution time of some files i.e. text and image with
respective there file size.











TABLE 1. EXECUTION TIME OF ENCRYPTION AND DECRYPTION OF FILES
File Size Data (text) File Execution time File Size Image File Execution time
10 kb 00:00:01:9624000 40 kb 00:00:30:9624000
20 kb 00:00:05:9436000 50 kb 00:00:55:9324000
30 kb 00:00:09:2040000 60 kb 00:01:09:2488000
40 kb 00:00:12:0276000 70 kb 00:01:22:9435000
50 kb 00:00:16:7232000 80 kb 00:01:59:9624000
60 kb 00:00:20:2488000 90 kb 00:02:01:3812000

Memory Require for Implementation of whole system
and algorithms
Table 2 shows memory required in hard disk for
implementation AES algorithm and whole system.

TABLE 2. MEMORY REQUIRED FOR IMPLEMENTATION OF ALGORITHMS AND
WHOLE SYSTEM
Memory Required for
implementation of all algorithm
(MB)
Memory required implementation
of whole system (MB)
5 (approx.) 150 (approx.)

VI. FEATURES OF SYSTEM
A. Three Keys for more Data Security
Encrypted data is hidden in Encrypted Image with
separate keys for Data Encryption, Image Encryption and
Data Hiding. For decrypting of data receiver should have
both Data Encryption and Data hiding key.
B. Protection for auto generated keys
To perform any operation the user has only 3
attempts. If user is fail to perform any of operation means
user enter wrong 3 times then the system is goes to not
responding state and one mail with receiver computer IP
address is send to the admin.
C. User define extension prevent hacker attack
During data hiding process user has to give the extension
like .xyz.
D. Admin as Main
Admin of system have all authority that is admin can
block, unblock any user at any time if he feel something
wrong and admin have all records from all user.
VII. CONCLUSION AND FUTURE WORK
Our study helps constructing secure transmission of
secrete file preventing any third party access and security
level of data is increased by encrypting data. We also provide
protection for keys during decryption process if any hacker
attacks on system.
In future we can use audio, video in case of image as
cover for hiding the data.


2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) 316

REFERENCES
[1] X. Zhang, Separable Reversible Data Hiding in Encrypted Image
IEEE Trans. Inform. Forensics Security, vol. 7, no. 2, pp. 826-832,
April 2012.
[2] X. Zhang, Lossy compression and iterative reconstruction for
encrypted image, IEEE Trans. Inform. Forensics Security, vol. 6, no.
1, pp. 5358, Feb. 2011.
[3] Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez, A New
Chaos Steganography Algorithm for Hiding Multimedia Data Feb.
19~22, 2012 ICACT2012.

[4] X. Zhang, Reversible Data Hiding in Encrypted Image IEEE signals
processing letters, vol. 18, no. 4, pp. 255-258, April 2011.
[5] Akash Kumar Mandal, Chandra Parakash, Mrs. Archana Tiwari
Performance Evaluation of Cryptographic Algorithms: DES and
AES, IEEE Trans. on Electrical, Electronics and Computer Science,
2012.
[6] Announcing the ADVANCED ENCRYPTION STANDARD (AES),
csrc.nist.gov/publications/fips/fips197/fips-197.pdf

You might also like