You are on page 1of 6

Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)

IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9

A New Approach to Hiding Data in the Images


Using Steganography Techniques Based on AES
and RC5 Algorithm Cryptosystem
Md. Sagar Hossen 1 Md. Ashiqul Islam 2
Student, Dept. of Computer Science and Engineering Student, Dept. of Computer Science and Engineering
Daffodil International University Daffodil International University
Dhaka, Bangladesh Dhaka, Bangladesh
sagar15-1504@diu.edu.bd ashiqul15-951@diu.edu.bd

Tania Khatun 3 Shahed Hossain 4


Lecturer, Dept. of Computer Science and Engineering Student, Dept. of Computer Science and Engineering
Daffodil International University Daffodil International University
Dhaka, Bangladesh Dhaka, Bangladesh
tania.cse@diu.edu.bd shahed15-2659@diu.edu.bd

Md. Mahfujur Rahman 5


Lecturer, Dept. of Computer Science and Engineering
Daffodil International University
Dhaka, Bangladesh
mrrajuiit@gmail.co m

Abstract—In the new era of modern science and technology is and Steganography. Steganography can hide data via audio,
developing day by day, data confidentiality is risky, all over the video, text, images [7]. In this paper the method have been
world and it increases rapidly. In this paper, a new approach to presented in which used two important algorithms have been
hiding the data using steganography techniques is proposed used, one is Advanced Encryption Standard (AES) and the
based on AES and RC5 algorithm cryptosystem. S teganography other is RC5. As known, AES can create a 128-bit cipher text
is the beauty of hiding secret data behind the digital images, and in our method, the 128 bit of block size is used in the RC5
videos, audios and text to cover the secret communication. A algorithm [5]. Watermark will also be created on each image so
cryptosystem is the process which given our method more that the pictures are transmitted through confidential security.
perfection. The visual quality of the cover image nice, no one can
LSB, DCT, DWT are among the few ways a cover image can
think about it how confidential data are transmitted using this
method. This proposed method and algorithm capacity is highly
be composed.
flexible than other published algorithm. The AES and RC5
algorithm had no complexity and it looks like very well to hide II. RELAT ED W ORK
the confidential data. A picture is known to be made up of many pixels. These
Keywords—Steganography, Cryptosystem, Data hiding, Secret pixels are arranged in rows and columns, which Quist-Aphetsi
Communication, Confidential Data. Kester mentions in his article that shuffling [1] the RGB pixel
can encrypt the image with bit permutation technique. Priyanka
Sahute has proved in her paper that it is possible to send data
I. INT RODUCT ION through photos using RSA and Hash algorithms [2]. And the
Information security has become an important factor in the information is transmitted with highly secured. Throughout the
modernization of communications. That's why data can be ages, many scientists have discovered various ways to hide
encrypted and transmitted. Data is usually exchanged over the information. Stegano is also a significant method. Stegano can
Internet. Every day some kind of data can be seen on the be done in several ways including DCT, DWT, LSB, etc.
Internet such as pictures, videos, audio, text etc. [9]. Other Suryawanshi mentions in his paper how it is possible to Stagno
data can be encrypted through the image if wanted. For image using the DCT technique [3]. Another technique is LSB
hackers, huge amounts of information are being lost during [5], [6], [8], the use of which see in a few more papers. It is a
transmission. So in the field of information and process of bit shifting. After all, since Stegano is a part of
communication, security measures is taken like cryptography cryptography, many scientists have been able to provide

978-1-7281-5461-9/20/$31.00 ©2020 IEEE 676

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9

information security using simple cryptographic algorithms more secured and fast. If RC6 is used then it will be more
such as hashes, RSA, etc. [10]. Hash function are using to secured but it is out of AES competition [21].
encrypted data [11], mainly banking security system is
following to protect their money from theft [14]. Digital
signature and biometric authentication are produced the best Two algorithms is used in one proposed model. Because two
security to the user to protect the bank from unauthorized algorithms that can be used in many block size such as 32 bits,
access [12], [15]. User can easily withdraw money in the off- 64 bits, 128 bits. But when 128 bits block size is used for this
line and on-line money transaction system, digital signature reason two algorithms had the same block size that’s why
and biometric verification system can exchange their valuable needed more quality and more security so algorithms are
transaction with trust and safe their valuable with responsibility combined that made hybrid system.
[16], [18]. RC5 algorithm is mainly inter manipulation on
rotation and it is not universally practical that’s why our
proposed AES and RC5 combine encryption process can get List of the technologies which are added with the pro posed
better performance than the existing system. model than the existing one.

x Hybrid Algorithm System


x Encryption and Decryption Method
III. PROPOSED SYST EM
Information are constantly exchanged for our various
needs. Therefore, it is our moral responsibility to ensure the In our proposed model especially 128 bits block size is used
security of our information. Similarly, considering the security for encryption and decryption. For the attractive reason these
of information, a model that is developed using steganography algorithms is, the same algorithm that can be used for
technology that will make our information more secure. encryption and decryption. and know it can be used many
block size system but for the hybrid purpose 128 bits is used
How to hide information in images is known but more
that is same for two algorithms and this is the maximum block
complex security will be given through a few algorithms. Two
size[22] that’s why 128 bits is used and made it unique.
algorithms called RC5 (128 bits) and AES (128 bits) is used.
DCT and DWT is also used to compress the image. It has been
shown that DCT can compress better than DWT [13].
In our model, first, the sender will send a secret message
then it will go to the encryption method [11], [15][19] in the
encryption method, the message will be encrypted with two
algorithms and will become a stego object.
This stego object will reach the customer via the internet.
Before that, it will be Decrypt with the same two algorithms.
Finally, the customer will get that secret message [17].
The stego object described here means to transform an
image into a watermark image [7]. Watermarked image
processing is done by following a few steps. Encrypt an image
first with watermark data.
Then it will be sent to the receiver. There the system will
detect water image data using private keys. Then the image
will be decrypted. Finally will finish the work of the Stego
object.
RC5 algorithm has limitless block cipher and it's simple.
Designed by Ronald Rivets’ in 1994. RC stands for "Rivest
Cipher", or "Ron's Code. Rivest announced also RC2 and RC4
and now there's RC6 which is that the Advanced Encryption
Standard (AES) candidate (RC6 was supported RC5). It has
some special features those are, It is suitable for hardware and
software, it is very fast, it is run very secured because o f its
different size of the block (32 bits, 64 bits, 128 bits)[20]. It
required low memory space. Its highlight features are its
variable key size, data dependence rotation, a variable number
of the round. For this simplicity and attractively, this Fig. 1. Block Diagram of Proposed Scheme.
algorithm is used in this system. And can see our system is

978-1-7281-5461-9/20/$31.00 ©2020 IEEE 677

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9

A. Cryptography and Steganography different times. And this is also localized in both time and
frequency and it provides a multi-resolution system. In this
Steganography: Steganography is a method by which paper, this is a used method for hiding data with watermark in
users can conceal and confuse or tousle their information with the same resolution.
other information that makes it difficult for attackers to
identify. It is a technique that prevents unauthorized users D. Dct Encoding
from accessing important data. It is a technique where the The general equation for a 1D (N data items) DCT is defined
method of concealing information is used in such a way that by the following equation:
no information can be easily discovered. It’s called Shorthand.
F (u) = (2\N) 1\2 …………. (1)
Cryptography: Cryptography is a system or method or
process of securing and hiding information or message and the corresponding inverse 1D DCT transform is simple F-
through the use of code so that only those for whom the 1(u), i.e.:
information is meant and intended can read and process this Where
information or message. Nowadays cryptography uses
algorithms and mathematical equations and secret keys to for …………………….(2)
encrypt and decrypt data [11]. Cryptography is used to provide
seclusion or solitude and indivisibility to our data, and both The general equation for a 2D (N by M image) DCT is defined
authentication [15], anonymity and confidentiality to our by the following equation:
communications. It is a process of protecting information by
metamorphosing it into a secure format [19]. F(u,v)=(2\N) 1\2(2\M) 1\

B. Digital Watermarking …………. (3)


Digital watermarking technology is the authenticity of the
respective owners in digital media. It can be used in client and the corresponding inverse 2D DCT transform is simple F-
digital media to protect the information, illegal activities of 1(u, v), i.e.:
hackers and embedding authority information in images Where
snapshot in digital still or video cameras [4]. Digital
watermarking and steganography can reduce the illegal for …………………….(4)
activities of third parties to decipher the original document [7]. Here,
x Input image is N by M
x F (i, j) is the intensity of the pixel in row i and
column j.
x F (u, v) is the DCT coefficient in row k1 and column
k2 of the DCT matrix.

IV. SYST EM OPERAT ION


Currently trying to use the most of modern technology
andone such modern technology is steganography through
Fig. 2. Watermark Detection Process
which information can be transformed with utmost secrecy.
An over-protection system have been used for steganography
C. DCT & DWT in this system. After the system is started, at first system takes
a secret message input. The message is encrypted using two
DCT: DCT is a transformation technique of an image. algorithms (AES and RC5). Then it creates a steganography
DCT stands for discrete cosine transform .it is used for an object using a watermark. The object is transmitted through the
image special domain to the frequency domain as every public network. As soon as it reaches the customer, it decrypts
image is known as a special domain. Suppose had a 1D or 2D again through algorithm two. If the decryption is successful,
image that would be transformed f(x) into F (u) and f(x, y) the recipient will be able to read the message. Otherwise, the
into F (u, v). Basically, used it for the watermarking method. system ends automatically.
In this paper, used it for data security on image

DWT: DWT is one of the methods of image


watermarking. It stands for the discrete wavelet transform.
The basic function of this is small waves are located at

978-1-7281-5461-9/20/$31.00 ©2020 IEEE 678

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9

A. Flow Chart B. Algorithm

Procedure ( )
Secret message = - a
Stego Object = + a

a) Secret message encrypted with AES and RC5

If secret message is encrypted


b) Stego object generate with watermark
c) Return stego object in public network
Elif program stop

If stego object is receive


d) Watermark remove from stego object
e) Stego object decrypted with AES and RC5
f) Return original secret message
Elif program stop
Return encrypted key is not match
End procedure

V. A DVANT AGE
1. The sender will be able to send his information or data to
the receiver in the most confidential and secure way.
2. This system is beneficial for securely storing sensitive
and important data such as hiding system passwords or keys by
using watermarked processes.
3. The visual quality of image watermark or cover image is
awesome, No one can imagine how a confidential data are
transmitted using this method.
4. The system algorithm AES (128 bits) and RC5 (128
bits)'s capacity is highly flexible and no complexity.
5. It is the most user's friendly system because of its
simplest algorithm’s, methods and Designs.
6. The user will be able to use this system very easily,
securely and without any trouble.

Fig. 3. System Flowchart

978-1-7281-5461-9/20/$31.00 ©2020 IEEE 679

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9

VI. RESULT PSNR = 10 log 10 (max2 \ MSE) db


Experimental Performance Analysis:
Cove r Image Ste go Image MSE% PSNR
DIU (112 kb) 112 kb 0.37 62.61

JU (56 kb) 56 kb 0.45 51.57


BUT EX (120 kb) 120 kb 0.36 62.69

T able. 1. Result analysis

From the result analysis, can be observed that the MSE is


increased when the payload increases. When MSE is
Fig. 4. DIU (a) Cover Image (b) Stego object decreased PSNR is increases and vice-versa. PSNR values
beneath 30 db is fairly low quality and high quality cover
image is needed to embed the image. In our result analysis ,
can be seen that 51-62 db is got in above all which is
perceived by a human eye and it is mention in the table 2. This
study brings the high quality PSNR and it produce high
quality security to protect the system.

VII. COMPARAT IVE ST UDY

SL Propose d syste m Pre vious systems.

01 In the proposed syst em, the Other algorithms have been used
data is hidden using in previous systems such as
Fig. 5. JU (a) Cover Image (b) Stego object steganography techniques RC6.
based on AES and RC5
algorithm cryptosystems.

02 T he system algorithm AES On the other hand, the previous


(128 bits) and RC5 (128 bits)'s systems have used RC6 and
capacity is highly flexible and other algorithms which are more
no complexity. difficult and complex for users.

03 T his system specifically Previous systems did not


mentions all the technologies mention all technologies which
used in it. were used on that.

Fig. 6. BUT EX (a) Cover Image (b) Stego object 04 T his system design is very On the other hand, T he earlier
unique and useful for users. systems were less unique and
more complex to use.
The new approach is simulated using MATLAB with Intel
core i5 6200U processor with 2.8GHz and 4 GB Ram. The 05 T his system is more Previous systems are not more
proposed watermarking is tested in various watermark images. confidential other than all confidential than the proposed
previous systems. System
Here DIU, JU and BUTEX watermark image are being used
to analyze the performance of the algorithm. MSE can be 06 T his system is more secure and T he previous system is less
used to measure the error between the cover image and the easy to use other than all secure and difficult to use.
watermark image [9]. previous systems.
Where,
T able. 3. Comparative Study
2
MSE = 1/MN

We can also calculate PSNR which is the cumulative squared


error of watermark image and an original image.
Here,

978-1-7281-5461-9/20/$31.00 ©2020 IEEE 680

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9

VIII. CONCLUSION Computer Science, Engineering and Information T echnology


(IJSRCSEIT ), ISSN : 2456-3307, Volume 5 Issue 6, pp. 317-322,
In the modern era, more privacy and more secured November-December 2019. Available at doi :
system is needed for our communication Network. Nowadays https://doi.org/10.32628/CSEIT 195659 Journal URL :
steganography is one of the best technique based on AES and http://ijsrcseit.com/CSEIT 195659
[10] Ankit Gambhir and Sibaram Khara (2016). Integrating RSA
RC5 Algorithm to hiding data from an intruder. AES and RC5 Cryptography & Audio Steganography. IEEE ICCCA.
algorithm had no complexity that’s why these two Algorithms
[11] Md. Ashiqul Islam, Aysha Akter Kobita, Md. Sagar Hossen, Laila
make this technique more effective and flexible [5]. it is a safe Sultana Rumi, Rafat Karim, T asfia T abassum, “ Data Security System
transaction and communication Technique. This system is for A Bank Based on T wo Different Asymmetric Algorithm
highly secured to send or receive original data behind the Cryptography”, International Conference on Evolutionary Computing
and Mobile Sustainable Networks (ICECMSN 2020)
digital image, audio, video and text. The communication
[12] M. Dutta, K. K. Psyche, T. Khatun, M. A. Islam and M. A. Islam, "ATM
process is more secured. Steganography technique covers the Card Security Using Bio-Metric and Message Authentication
secret communication in back of digital image, audio, video T echnology," 2018 IEEE International Conference on Computer and
and text. Using this technique Sender can send valuable data Communication Engineering T echnology (CCET ), Beijing, 2018, pp.
behind the digital image, audio, video and the Text. The 280-285, doi: 10.1109/CCET .2018.8542227.
receiver will receive exact data behind the medium. That’s [13] Govind R. Suryawanshi, Dr. Suresh N. Mali,” Analysis of Effect of
Spatial Domain Steganography T echnique on DCT Domain using
why the intruders will never understand how confidential data Statistical Features for Digital Images”, International Journal of Applied
is transmitted and then they will never hack any kind of Engineering Research ISSN 0973-4562 Volume 13, Number 1 (2018)
information [14]. In the mean future people will use to this pp. 634-640 © Research India Publications.
http://www.ripublication.com
steganography technique for its secured communication
[14] Dutta M., Islam M.A., Mamun M.H., Psyche K.K., Mamun M.A. (2020)
Network it will provide us with more privacy in our Bank Vault Security System Based on Infrared Radiation and GSM
transaction and communication system T echnology. In: Hemanth D., Shakya S., Baig Z. (eds) Intelligent Data
Communication T echnologies and Internet of T hings. ICICI 2019.
Lecture Notes on Data Engineering and Communications Technologies,
vol 38. Springer, Cham
[15] Rafat Karim, Laila Sultana Rumi, Md. Ashiqul Islam, Aysha Akter
Kobita, T asfia T abassum and Md. Sagar Hossen, “ Digital Signature
Authentication for A Bank Using Asymmetric Key Cryptography
Algorithm and T oken Based Encryption” International Conference on
REFERENCES Evolutionary Computing and Mobile Sustainable Networks (ICECMSN
2020)
[1] Q. Kester, “ A cryptographic Image Encryption technique based on the
RGB PIXEL shuffling A cryptographic Image Encryption technique [16] Dutta M, Psyche KK, Yasmin S (2017) ATM transaction security using
based on the RGB PIXEL shuffling”, International Journal of Advanced fingerprint recognition. Am J Eng Res (AJER) 6(8). e-ISSN: 2320-0847,
Research in Computer Engineering & Technology, vol. 2,no.2 pp.848 - p-ISSN: 2320-0936
854, January 2013.
[2] P. Sahute, S. Waghamare, S. Patil, and A. Diwate, “ Secure Messaging [17] Pashang Engineer, Priyanka A. Bansode, Shreya Vitthalrao Surnar,
Using Image Steganography”, International Journal of Modern Trends in Prathmesh N. Gunjgur, “ Secured Crypto-Stegano Communication”,
Engineering and Research,vol.2,no.3, pp. 598 –608, March 2015. International Journal of Advanced Research in Computer and
[3] G R Suryawanshi, Dr. S N Mali.(2015).Study of Effects of DCT Domian Communication Engineering ISSN (Online) 2278-1021 ISSN (Print)
Steganography T echniques in Spatial Doamain for JPEG Images 2319-5940 Vol. 8, Issue 4, April 2019 Copyright to IJARCCE DOI
Steganalysis. Internation Journal of Computer Applciaiton, 127(6), 16 - 10.17148/IJARCCE.2019.8438
20 [18] Israt Jahan, Kangkhita Keam Psyche and Mithun Dutta, “An Off-line E-
[4] SwagotaBera, Dr. Monisha Sharma and Dr. Bikesh Singh,” Feature Cash Scheme based on Group Blind Signature Scheme” International
Extraction and Analysis using Gabor Filter and Higher Order Statistics Journal of Engineering Research and Development e-ISSN: 2278-067X,
for the JPEG Steganography ”, International Journal of Applied p-ISSN: 2278-800X, www.ijerd.com Volume 12, Issue 8 (August 2016),
Engineering Research ISSN 0973-4562 Volume 13, Number 5 (2018) PP.46-53
pp. 2945-2954 © Research India Publications. [19] Md. Sagar Hossen, T asfia Tabassum, Md. Ashiqul Islam, Rafat Karim,
http://www.ripublication.com Aysha Akter Kobita and Laila Sultana Rumi, “ DIGITAL SIGNAT URE
[5] Islam, M.R.,Siddiqa, A., Uddin,M.P., Mandal, A.K., Hossain, M.D.: An AUT HENT ICAT ION USING ASYMMET RIC KEY
efficient filtering based approach improving LSB image steganography CRYPT OGRAPHY WIT H DIFFERENT BYT E NUMBER”
using status bit along with AES cryptography, 3rd IEEE International International Conference on Evolutionary Computing and Mobile
Conference on Informatics, Electronics & Vision, Dhaka, Bangladesh, Sustainable Networks (ICECMSN 2020)
May 23-24(2014).
[6] Karim,S.M.M., Rahman,M.S., Hossain, M.I.: A New Approach for LSB [20] O. Elkeelany and A. Olabisi, "Case study: integrated design of RC5
Based Image Steganography using Secret Key, Proceedings of 14th encryption," Proceedings 2007 IEEE SoutheastCon, Richmond, VA, 2007, pp.
IEEE International Conference on Computer and Information 69-72, doi: 10.1109/SECON.2007.342857.
T echnology, 286 – 291 (2011).
[7] Wayner, P.: Disappearing Cryptography: Information Hiding: [21] A. B. Mohamed, G. Zaibi and A. Kachouri, "Implementation of RC5 and
Steganography & Watermarking, ELSEVIER, 3rd Edition(2008). RC6 block ciphers on digital images," Eighth International Multi-Conference
on Systems, Signals & Devices, Sousse, 2011, pp. 1 -6, doi:
[8] Sugathan, S.: An Improved LSB Embedding T echnique for Image 10.1109/SSD.2011.5767447.
Steganography, IEEE International Conference on Applied and
T heoretical Computing and Communication T echnology (2016).
[22]Amin, Mohamed & Abd El-Latif, Ahmed. (2010). Efficient modified RC5
[9] Musa. M. Yahaya, Aminat Ajibola , "Cryptosystem for Secure Data based on chaos adapted to image encryption. J. Electronic Imaging. 19.
T ransmission using Advance Encryption Standard (AES) and 013012. 10.1117/1.3360179.
Steganography", International Journal of Scientific Research in

978-1-7281-5461-9/20/$31.00 ©2020 IEEE 681

Authorized licensed use limited to: Auckland University of Technology. Downloaded on October 24,2020 at 10:44:55 UTC from IEEE Xplore. Restrictions apply.

You might also like