Professional Documents
Culture Documents
Hoss en 2020
Hoss en 2020
Abstract—In the new era of modern science and technology is and Steganography. Steganography can hide data via audio,
developing day by day, data confidentiality is risky, all over the video, text, images [7]. In this paper the method have been
world and it increases rapidly. In this paper, a new approach to presented in which used two important algorithms have been
hiding the data using steganography techniques is proposed used, one is Advanced Encryption Standard (AES) and the
based on AES and RC5 algorithm cryptosystem. S teganography other is RC5. As known, AES can create a 128-bit cipher text
is the beauty of hiding secret data behind the digital images, and in our method, the 128 bit of block size is used in the RC5
videos, audios and text to cover the secret communication. A algorithm [5]. Watermark will also be created on each image so
cryptosystem is the process which given our method more that the pictures are transmitted through confidential security.
perfection. The visual quality of the cover image nice, no one can
LSB, DCT, DWT are among the few ways a cover image can
think about it how confidential data are transmitted using this
method. This proposed method and algorithm capacity is highly
be composed.
flexible than other published algorithm. The AES and RC5
algorithm had no complexity and it looks like very well to hide II. RELAT ED W ORK
the confidential data. A picture is known to be made up of many pixels. These
Keywords—Steganography, Cryptosystem, Data hiding, Secret pixels are arranged in rows and columns, which Quist-Aphetsi
Communication, Confidential Data. Kester mentions in his article that shuffling [1] the RGB pixel
can encrypt the image with bit permutation technique. Priyanka
Sahute has proved in her paper that it is possible to send data
I. INT RODUCT ION through photos using RSA and Hash algorithms [2]. And the
Information security has become an important factor in the information is transmitted with highly secured. Throughout the
modernization of communications. That's why data can be ages, many scientists have discovered various ways to hide
encrypted and transmitted. Data is usually exchanged over the information. Stegano is also a significant method. Stegano can
Internet. Every day some kind of data can be seen on the be done in several ways including DCT, DWT, LSB, etc.
Internet such as pictures, videos, audio, text etc. [9]. Other Suryawanshi mentions in his paper how it is possible to Stagno
data can be encrypted through the image if wanted. For image using the DCT technique [3]. Another technique is LSB
hackers, huge amounts of information are being lost during [5], [6], [8], the use of which see in a few more papers. It is a
transmission. So in the field of information and process of bit shifting. After all, since Stegano is a part of
communication, security measures is taken like cryptography cryptography, many scientists have been able to provide
Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
information security using simple cryptographic algorithms more secured and fast. If RC6 is used then it will be more
such as hashes, RSA, etc. [10]. Hash function are using to secured but it is out of AES competition [21].
encrypted data [11], mainly banking security system is
following to protect their money from theft [14]. Digital
signature and biometric authentication are produced the best Two algorithms is used in one proposed model. Because two
security to the user to protect the bank from unauthorized algorithms that can be used in many block size such as 32 bits,
access [12], [15]. User can easily withdraw money in the off- 64 bits, 128 bits. But when 128 bits block size is used for this
line and on-line money transaction system, digital signature reason two algorithms had the same block size that’s why
and biometric verification system can exchange their valuable needed more quality and more security so algorithms are
transaction with trust and safe their valuable with responsibility combined that made hybrid system.
[16], [18]. RC5 algorithm is mainly inter manipulation on
rotation and it is not universally practical that’s why our
proposed AES and RC5 combine encryption process can get List of the technologies which are added with the pro posed
better performance than the existing system. model than the existing one.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
A. Cryptography and Steganography different times. And this is also localized in both time and
frequency and it provides a multi-resolution system. In this
Steganography: Steganography is a method by which paper, this is a used method for hiding data with watermark in
users can conceal and confuse or tousle their information with the same resolution.
other information that makes it difficult for attackers to
identify. It is a technique that prevents unauthorized users D. Dct Encoding
from accessing important data. It is a technique where the The general equation for a 1D (N data items) DCT is defined
method of concealing information is used in such a way that by the following equation:
no information can be easily discovered. It’s called Shorthand.
F (u) = (2\N) 1\2 …………. (1)
Cryptography: Cryptography is a system or method or
process of securing and hiding information or message and the corresponding inverse 1D DCT transform is simple F-
through the use of code so that only those for whom the 1(u), i.e.:
information is meant and intended can read and process this Where
information or message. Nowadays cryptography uses
algorithms and mathematical equations and secret keys to for …………………….(2)
encrypt and decrypt data [11]. Cryptography is used to provide
seclusion or solitude and indivisibility to our data, and both The general equation for a 2D (N by M image) DCT is defined
authentication [15], anonymity and confidentiality to our by the following equation:
communications. It is a process of protecting information by
metamorphosing it into a secure format [19]. F(u,v)=(2\N) 1\2(2\M) 1\
Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
Procedure ( )
Secret message = - a
Stego Object = + a
V. A DVANT AGE
1. The sender will be able to send his information or data to
the receiver in the most confidential and secure way.
2. This system is beneficial for securely storing sensitive
and important data such as hiding system passwords or keys by
using watermarked processes.
3. The visual quality of image watermark or cover image is
awesome, No one can imagine how a confidential data are
transmitted using this method.
4. The system algorithm AES (128 bits) and RC5 (128
bits)'s capacity is highly flexible and no complexity.
5. It is the most user's friendly system because of its
simplest algorithm’s, methods and Designs.
6. The user will be able to use this system very easily,
securely and without any trouble.
Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
01 In the proposed syst em, the Other algorithms have been used
data is hidden using in previous systems such as
Fig. 5. JU (a) Cover Image (b) Stego object steganography techniques RC6.
based on AES and RC5
algorithm cryptosystems.
Fig. 6. BUT EX (a) Cover Image (b) Stego object 04 T his system design is very On the other hand, T he earlier
unique and useful for users. systems were less unique and
more complex to use.
The new approach is simulated using MATLAB with Intel
core i5 6200U processor with 2.8GHz and 4 GB Ram. The 05 T his system is more Previous systems are not more
proposed watermarking is tested in various watermark images. confidential other than all confidential than the proposed
previous systems. System
Here DIU, JU and BUTEX watermark image are being used
to analyze the performance of the algorithm. MSE can be 06 T his system is more secure and T he previous system is less
used to measure the error between the cover image and the easy to use other than all secure and difficult to use.
watermark image [9]. previous systems.
Where,
T able. 3. Comparative Study
2
MSE = 1/MN
Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.