Metamorphic Cryptography: A Fusion of Cryptography and Steganography



Similar documents
Safer data transmission using Steganography

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Triple Security of Information Using Stegnography and Cryptography

How To Understand And Understand The History Of Cryptography

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

IT Networks & Security CERT Luncheon Series: Cryptography

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security

A Novel Cryptographic Key Generation Method Using Image Features

Image Compression through DCT and Huffman Coding Technique

A Secure Data Transmission By Integrating Cryptography And Video Steganography

encoding compression encryption

A Concept of Digital Picture Envelope for Internet Communication

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Evaluation of the RC4 Algorithm for Data Encryption

Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Savitribai Phule Pune University

Network Security. HIT Shimrit Tzur-David

Fuzzy Keyword Search over Encrypted Stego in Cloud

Security and protection of digital images by using watermarking methods

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23


Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Online Voting System Powered by Biometric Security using Cryptography and Stegnography

A comprehensive survey on various ETC techniques for secure Data transmission

Application Layer (1)

Hill s Cipher: Linear Algebra in Cryptography

A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Network Security: Cryptography CS/SS G513 S.K. Sahay

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Secure Network Communication Based on Text-to-Image Encryption

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

The Misuse of RC4 in Microsoft Word and Excel

Solutions to Problem Set 1

Multi-factor Authentication in Banking Sector

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

A Secure Software Implementation of Nonlinear Advanced Encryption Standard

Image Authentication Scheme using Digital Signature and Digital Watermarking

SecureMessageRecoveryandBatchVerificationusingDigitalSignature

Page 1. Session Overview: Cryptography

Client Server Registration Protocol

Properties of Secure Network Communication

Content Teaching Academy at James Madison University

Split Based Encryption in Secure File Transfer

Institute of Southern Punjab, Multan

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Cryptography & Network Security

Message Authentication Codes

Monitoring Data Integrity while using TPA in Cloud Environment

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Keywords Web Service, security, DES, cryptography.

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm

Network Security Technology Network Management

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2

Sandeep Mahapatra Department of Computer Science and Engineering PEC, University of Technology

Cyber Security Workshop Encryption Reference Manual

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Cryptography and Network Security Chapter 12

Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card

Compter Networks Chapter 9: Network Security

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

JPEG Image Compression by Using DCT

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Symmetric Key cryptosystem

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

CIS433/533 - Computer and Network Security Cryptography

Transcription:

International Journal of Engineering and Technical Research (IJETR) Metamorphic Cryptography: A Fusion of Cryptography and Steganography Atul Haribhau Kachare, Mona Deshmukh Abstract In current information security, the interchange over the network stakes a most important threat of getting it hacked. The different approaches like Cryptography and Steganography are used for addressing such harms. But both of them have some gaps and when used discretely does not perform well. Hence, we use the amalgamation of both Cryptography and Steganography called as Metamorphic Cryptography. In state of the art system, image is used as a key component. But the core concern with image is that it intensifies the computational complexity because of its multi-dimensional nature. In the proposed algorithm dimensionality reduction is achieved using speech signal as a key component. The speech signal being vulnerable to noise, it is commonly parameterized before transmission over the channel. In this paper, Line Spectral frequencies are used as parameters of the speech signal. These parameters are further used to encode and hide text messages. The modest XOR process is used for encoding and decoding. Index Terms Cryptography, steganography, metamorphic cryptography, linear prediction, line spectral frequencies. I. INTRODUCTION In current age Information Security plays a vibrant role. Information or messages are exchanged over a network out of which enormous data is confidential or secluded which increases the demand for advanced information security. Security has become the important features in communication these days due to the existence of hackers who wait for a chance or opportunities to gain an access to confidential or secluded data. We can employ two diverse methodologies for the information security which are Cryptography and Steganography. message cannot be determined by unauthorized recipients. An encryption algorithm is applied to the message, referred to as the plaintext, and a key to produce cipher text. A decryption algorithm converts the cipher text back into plaintext, but only if given the correct code. Mainly there are three forms of cryptography: Classical cryptography Modern cryptography Rotor machine Classical Cipher Modern Substitution Transposition Public Key Private Key Stream Figure 1Cryptography Techniques Block Classical Cryptography is usually divided into two extensive categories [1]: Masking: The use of masking leads to substitution. Veiling: The use of veiling leads to transposition. In Modern cryptography technique there are two type of cryptography [1] [2] Symmetric Cryptography Technique: A single key is used for both encryption and decryption which is already known to both Sender and Receiver. A. Cryptography Cryptography is derived from` the Greek word KRYPTOS meaning concealed and GRAPHEIN meaning to write. It is a study of means of altering information from its ordinary all-inclusive form to an incomprehensive format rendering it unreadable without the secret knowledge. Generally speaking, computer cryptographic tasks can be broken into two general categories: encryption and authentication [1]. Encryption refers to the scrambling of information so that the original Manuscript received March 20, 2014 Atul Haribhau Kachare, Student, Department of Information Technology, VESIT, Mumbai University, India, 9867718014. Mona Deshmukh, Assistant Professor, Department of Master of Computer Applications, VESIT, Mumbai University, India, 9619079377. Figure 2 Symmetric Key Cryptography Asymmetric Cryptography Technique: 199 www.erpublication.org

Metamorphic Cryptography: A Fusion of Cryptography and Steganography A pair of keys called public and private key is used for encryption and decryption. Figure 3 Asymmetric Key Cryptography There are fundamentally two approaches of producing cipher text. They are: Stream cipher: Each bit of data is sequentially encrypted using one bit of the key. Block cipher: Here data is encrypted in chunks of specific size. B. Steganography Steganography is derived from the Greek word STEGANOS meaning enclosed/secret and GRAPHEIN meaning to write/draw. It is the study of means of masking the information in order to prevent hackers from sensing the existence of secret information [1]. The process of wrapping message without leaving remarkable traces is known as Steganography. The majority of today s steganography systems uses multimedia objects like image, audio, video etc. as cover media because people often transmit digital pictures, images or audios over email and other Internet communication [3]. In modern tactic, depending on the nature of cover object, steganography can be separated into five natures: Text Steganography Image Steganography o Least significant bit insertion o Masking and filtering o Redundant pattern encoding o Encrypt and Scatter o Algorithms and Transformations Audio Steganography Video Steganography Protocol Steganography Cryptography and Steganography both undertake the same goal using completely different means. Encryption encodes the data so that an unintended beneficiary cannot determine its intended meaning. Whereas, Steganography in contrast attempts to prevent an unintended addressee from suspecting that the data is present. The proposed method is a blending of both the techniques to provide a very high degree of security for the information. The metamorphic cryptography can be termed as a paradox among the Cryptography and Steganography. The objective of this paper is to describe the proposed model for integrating together cryptography and steganography through audio signal processing. In particular, we present a system able to perform steganography and cryptography at the same time. We will show such system is an effective steganography and is also an unbreakable proposed cryptographic one. Rest of the paper is organized are as follows: Section 2 is presents literature survey and problem definition, Section 3 is presents proposed work, Section 4 is presents outcome, Section 5 is presents conclusion, and final Section is presents acknowledgment and references. II. LITERATURE SURVEY There are many numbers of encryption algorithms available from simple additive cipher to the complicated Symmetric and Asymmetric key ciphers. Using this various ciphering or encryption techniques we can increase the security of our data. But the question is whether these encryption techniques are good enough to protect our data. If large numbers of cryptographic techniques are there then more number of cryptanalysis techniques are also available. The main goal of the cryptanalyst is to obtain the maximum information about the plaintext. So using various kinds of possible attacks the cryptanalyst can broke down the cipher code. By using the knowledge of ciphertext, known plaintext, chosen plaintext, chosen ciphertext, cryptanalyst can easily get access to the encryption key. In paper [4] various attacks possible on both symmetric as well as asymmetric cryptographic techniques are listed such as Boomerang attack, Brute force attack, Davie s attack, Differential cryptanalysis, Integral cryptanalysis, linear cryptanalysis, Man-in-the-middle. Thus we can say using only cryptography cannot provide the required security. Now if consider the steganography technique, from paper [5] we can conclude that if we use Text Steganography then also there are some disadvantages are possible such as some text steganography methods do not allow Optical Character Recognition, also they hide very small part of data, etc. Even in case of Image Steganography there are some loopholes are present. In some methods we have the overhead of hiding extra bits [6], in some method hidden capacity is low [7], in some methods computational complexities is higher as compare data hidden [8], in some method matching pattern has to be stored [9], in some methods hidden capacity degrades the visual quality [10] and some methods do not support the color images for steganography [11]. In case of audio steganography maximum time only.wav format is used as media and transferring only.wav files over network may attract the attention of malicious intruder. Hence we can conclude that even Steganography technique do not provide the stronger security. In paper [12] focus is given on the combination of Cryptography and Steganography method and a new technique Metamorphic Cryptography has suggested. In the system specified in paper [12] image steganography is for the metamorphic cryptography. The message is transformed into a cipher image using a key, concealed into another image using steganography resulting into some intermediate text which is finally converted into final cipher image. To find the original message whole process is reversed. 200

A. Motivation III. PROPOSED WORK As we know due to some measures like Secrecy, Robustness and Complexity, existing system lacks to provide the ample security to the data. So to elude it, in this proposed idea we use Audio media for the audio steganography along with the cryptography. B. Proposed System In proposed scheme, input is taken from the user in string format. We may use some simple ciphering algorithm over to provide optionally added security advantage. The resultant string is then converted into set of ASCII codes. On the other hand, an audio or speech is taken as input and encoded using one of the feature extraction algorithms to compute the feature vectors which are used for encryption purpose. Then the simple logical xor-ed operation is performed on the ASCII value and encrypted audio feature vectors. The modified feature vectors resulting from the xor-ed operation are resynthesized to produce the cipher audio signal. The cipher audio is then covered by a cover audio using steganography and is converted into an intermediate text. This intermediate text is once again encrypted using the encryption algorithm as proposed above to obtain final cipher audio or speech. This speech is transmitted to the receiver. The received speech signal is decrypted it to obtain the intermediate text and analyzed with the cover audio signal to reconstruct the cipher audio. This cipher audio is further deciphered to obtain the encrypted message. Finally the decryption algorithm is used to recover the original text message. C. Algorithm for Proposed System Algorithm for Sender: Input the message to ENCRYPTION Obtain the cipher audio. Input the cipher audio to STEGANOGRAPHY Obtain the intermediate text. Load the intermediate text to ENCRYPTION ALGORITHM again. Obtain the final audio to be transmitted. Algorithm for Encryption: Input the message to be encrypted. Input the sample speech signal. Perform the segmentation and framing [13] to create different frames of the size of message blocks. For every frame calculate the LPC [14] parameters using auto-correlation and toiplitz matrix. Using the Conversion equation the LPC parameters are again converted into LSF [15] parameter. Perform the Xor-ed operation on the LSF parameter and the ASCII values of the message. The resultant matrix of Xor-ed operation is again converted into Speech signal using LPC Synthesis. International Journal of Engineering and Technical Research (IJETR) Algorithm for Steganography: Input the cover speech signal. Input the cipher speech signal. Calculate the LPC and finally the LSF parameters for both the signals. Perform the Xor-ed operation on the LSF parameters of both the signals. Convert the resultant ASCII value matrix into corresponding text format which is known as intermediate text. Algorithm for Receiver: Input the final cipher speech to DECRYPTION Obtain the intermediate text. Input the intermediate text to RETRIVAL CIPHER_SPEECH_ Obtain the cipher speech. Input the cipher speech to the DECRYPTION Obtain the original plain text message. Algorithm for Decryption: Input the final cipher speech. Input the sample speech used by sender. Perform segmentation and framing on both the signals to get frames. For every frame calculate the LPC parameters. Using conversion equation LPC parameters are converted into LSF parameters for both signals. The LSF parameters of both signals are Xor-ed to get the resultant matrix of ASCII values. This ASCII values are converted into the Intermediate text. Algorithm for Retrieving Cipher Speech: Input the cover speech. Input the intermediate text. Perform segmentation and framing on the cover speech signal. Calculate the corresponding LPC and then LSF parameters. Perform XOR operation on LSF parameters and the ASCII values of intermediate text. Obtain the cipher speech. IV. OUTCOMES The proposed system stated above was applied to a message in Figure IV-1. The cover audio used for the process is shown in Figure IV-2. The encrypted results were obtained as shown in Figure IV-3 and Figure IV-4. The audio in was decrypted using the decryption technique to obtain the decrypted outputs as shown in Figure IV-5, Figure IV-6 and Figure IV-7. Figure 4 Message to be Encrypted 201 www.erpublication.org

Metamorphic Cryptography: A Fusion of Cryptography and Steganography Figure 5 Intermediate Audio Signal Figure 10 Intermediate Audio Signal after Decryption Figure 11 Decrypted Original Message Figure 6 Cover Audio Signal Figure 7 Intermediate Text Figure 8 Final Cipher Audio Figure 9 Intermediate Text after Decryption V. CONCLUSION The paper proposed a novel algorithm using one dimensional speech signal as key component in metamorphic cryptography. The use of cryptography and steganography together provides added advantage of good information security whereas, the line spectral parameters representing speech signal provides good stability and correlation over the channel. The proposed system implementation is under process using MATLAB as a tool for digital signal processing. The system implementation still needs few more inspection about the number system algorithm should work on and types of speech signals that can be used. ACKNOWLEDGMENT The authors would like to thank Prof. Smita Jangale, Department of Information Technology, VESIT and Prof. S. M. Toraskar, pursuing PhD, IITB for sharing his valuable inputs and suggestions regarding this study. Authors would also like to thank Prof. M. Vijaylakshmi, Head Department of Information Technology, VESIT for giving permission to work on this project and making available the laboratory resources. We are thankful to our parents to whom we are greatly indebted for their support and encouragement. REFERENCES [1] William Stallings, Cryptography and Network Security: Principles & Practices, Second edition. [2] Luis Von Ahn, Nicholas J. Hopper, Public-Key Steganography. [3] Danah Boyd and Alice Marwick, Social Steganography: Privacy in Networked Publics, ICA 2011. [4] Mr. Vinod Saroha, Suman Mor, Jyoti Malik, A Review of Various Techniques of Cryptanalysis, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, ISSN: 2277128X, IJARCSSE October 2012. [5] Swati Gupta, Deepti Gupta, Text-Steganography: Review Study & Comparative Analysis, International Journal of Coomputer Science and Information Technologies, Vol. 2(5), ISSN: 0975-9646, 2011. [6] Y. K. Jain and R. R. Ahirwal, A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys, International Journal of Computer Science and Security (IJCSS), vol. 4, (2010) March 1. 202

[7] S. Channalli and A. Jadhav, Steganography an Art of Hiding Data, International Journal on Computer Science and Engineering, IJCSE, vol. 1, no. 3, (2009). [8] C.-H. Yang, C.-Y. Weng, S.-J. Wang, Member, IEEE and H.-M. Sun, Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems, IEEE Transactions on Information Forensics and Security, vol. 3, no. (2008) September 3, pp. 488-497. [9] M. A. Al-Husainy, Image Steganography by Mapping Pixels to Letters, Journal of Computer Science, vol.5, no. 1, (2009), pp. 33-38. [10] A. M. Hamid and M. L. M. Kiah, Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis, International Journal of Engineering and Technology (IJET): 0975-4042, (2009). [11] S. Ohyama, M. Niimi, K. Yamawaki and H. Noda, Lossless data hiding using bit depth embedding for JPEG2000 compressed bit-stream, Journal of Communication and Computer, vol. 6, no. 2, (2009) February. International Journal of Engineering and Technical Research (IJETR) [12] Thomas Leontin Philjon and Venkateshvara Rao, Metamorphic Cryptography A Paradox between Cryptography and Steganography Using Dynamic Encryption, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011. [13] Yizhong Song, Xin Peng, Spectra Analysis of Sampling and Reconstructing Continuous Signal Using Hamming Window Function, Fourth international Conference on Natural Computation, 2008. [14] J. Murakami, Y. Tadakoro, A New Toiplitz Approximation method for Linear Prediction Matrices, ISBN 0-7803-0946-4, IEEE, 1993. [15] Peter Kabal, Ravi Prakash Ramchandran, The Computation of Line Spectral Frequencies Using Chebyshev Polynomials, IEEE Transactions on Acoustics, Speech and Signal Processing, Vol. ASSP 34, No. 6, December 1986. 203 www.erpublication.org