Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all to protect their secret information from unauthorized access. There are so many methods for security. Cryptography and stegnography are two important branches so this paper represents two techniques cryptography and stegnography. This paper discuss Blowfish algorithm for encrypt secret information, LSB method for information hiding and Rijndael algorithm for image encryption. This paper provides triple security of secret data. Keywords Encryption; Decryption; Stegnography, Blowfish; LSB. I. INTRODUCTION In today s developing age technologies have developed so much most of every person use laptop, desktop, mobile, notepad etc. in their daily life to transfer their secret information across World Wide Web. Some people are waiting for this type of secret information which we called hacker and then change your information which we called cracker so, to protect your secret information from this type of unauthorized peoples you must secure your data so, that reason this paper discuss security techniques. This paper discusses a cryptography and stegnography techniques to protect secret data. Cryptography is a technique in which original data is converted to unreadable form so user cannot understand what data to be transfer across the network. Stegnography hide the data into cover media. Cover media can anything like as image, audio, video etc. so; it is unnoticed across the network. The rest of paper is organized as follow. Second section is literature survey in which different method of information hiding is discussed. Third section is proposed work. Fourth section is result analysis. Fifth section contains conclusion and references used at the end. II. RELATED WORK Authors of [1] only hide text information using interword and inter paragraph spacing. Authors of [2] propose authentication and verification based system at the stage of encryption and data hiding. Authors have used AES for encryption and LSB for data hiding. Researcher of [3] uses RSA and LSB for protect their data. Authors of [4] proposed a LSB and symmetric algorithm for data hiding. Komal Patel 1, Surendra Vishwakarma 2, Hitesh Gupta 3 642 Authors of [5] propose technique in which message is first encrypted and then embed in cover file with help of steganographic system. For encryption the secret message is randomly permuted using the secret key. The random permutation is carried out by using matlab functions rand and randperm. They used LSB algorithm for both embedding and extraction process. Authors of [6] used two techniques Rivest, Shamir, Adleman (RSA) algorithm and Diffie Hellman algorithm to encrypt the data then LSB is used to hide encrypted message. Their result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used instead of RSA algorithm. To provide higher security the secret information is encrypted first by using RSA or Diffie Hellman algorithm and encrypted ASCII value is converted in binary form. The image pixels at the same time are also converted into binary form. The image is now used as a cover to embed the encrypted information. This process is done by LSB encoder. Authors of [7] introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have used new algorithm proposed by Nath et al. for encryption they modified the idea of Play fair method into a new platform where they can encrypt or decrypt any file. They introduced a new randomization method for generating the randomized key matrix to encrypt plain text file and to decrypt cipher text file. They also introduced a new algorithm for encrypting the plain text multiple times. Authors of [8] used advance encryption standard (AES) algorithm to encrypt a message and a part of the message is hidden in DCT of an image. Author of [9] used S-DES algorithm to encrypt secret message and then alteration component method is used to hide encrypted message. Authors of [10] are used advanced encryption standard (AES) algorithm to encrypt secret message and then pixel value differencing (PVD) with K-bit least-significant-bit (LSB) substitution is used to hide encrypted message into true color RGB image. Author of [11] are used new encryption algorithm and LSB method for data hiding.
III. PROPOSED METHOD In this paper author use blowfish, LSB and Rijndael algorithm. Proposed method architecture is given in below diagram. P T E N =f (P T, E K ) S H =f (C T, S K ) E S =f (S I, E KS ) C I P T E N S H E S P T = Plain text E N =Encryption function E K =Encryption Key S H =Hiding function C T =Cipher Text S K =Stego Key E N = Decryption function Steps of proposed method from sender side are as follow. 1. Convert original data into unreadable form (encryption) by using blowfish algorithm and encryption key. 2. Hide encrypted data from step1 into cover image using LSB and stego key and get stego image 3. Encrypt stego image form step3 using rijndael algorithm encryption key for stego image and get encrypted image. 4. Transfer encrypted image. Steps of proposed method at receiver side are as follow 1. Decrypt received image using rijandael algorithm and get stego image. E S =Stego image Encryption Function S I =Stego Image E KS = Encryption key for stego image C I =Cipher Image E S =Decryption function for stego image S H = reverse of hiding function Figure 1. Architecture of proposed method. 2. Remove cover image using LSB and get encrypted data. 3. Decrypt encrypted data using blowfish algorithm. 4. Get original data. Graphical Representation: In proposed method requires.bmp and.jpeg type of image file. It has two modules one is encrypt which is work at sender side and second is decrypt which is work from receiver side shown in figure 2. 643
The number of rounds in Rijndael is: 9 if both the block and the key are 128 bits long, 11 if either the block or the key is 192 bits long, and neither of them is longer than that and 14 if either the block or the key is 256 bits long. More description of this algorithm is given on [13]. IV. RESULT ANALYSIS Author has used C#.Net language to implement their work. In below figure snapshot of result is given. (a) (b) (c) (d) Figure 3. (a) Original data. (b) Encrypted data (c) stego image (d) encrypted image Figure 2.The graphical representation of proposed method BLOWFISH Algorithm: In this paper author chose BLOWFISH algorithm for encrypt original data. The block length of blowfish is 64 bit. Key length is 32 to 448 bit and 16 rounds. More description of blowfish is on [12]. LSB Method: In this paper encrypted data is hidden into stego image using LSB method. Decryption of LSB is on [12]. RIJANDAEL Algorithm: In this paper author chose Rijandael Algorithm for encrypt stego image. The Rijndael algorithm is the new advanced encryption standard (AES) approved by the US National Institute of Standards and Technology (NIST). It provides extra flexibility in that both the key size and the block size may be 128, 192, or 256 bits. Result Comparison in Tabular Form: Below table show the compression between proposed method and previous stegnography method. In this paper author compare two method based on encryption time and decryption time. Table1. Comparison of existing method and proposed method based on Encryption Time File Name database connection.docx IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY Proposed Method 0.468 0.421 ADHAAR_NO.txt 0.171 0.093 function.txt 0.327 0.156 ticketstation.txt 0.156 0.062 Int_Topic.txt 0.124 0.078 644
Table2. Comparison of existing method and proposed method based on Decryption Time Decryption Time: Here graph -2 from Table-2 to reveal it. File Name IMAGE STEGNOGRAPHY USING LEAST SIGNIFICANT BIT WITH CRYPTOGRAPHY Proposed Method database connection.docx 0.28 0.265 ADHAAR_NO.txt 0.171 0.156 function.txt 0.171 0.156 ticketstation.txt 0.124 0.124 Int_Topic.txt 0.156 0.124 Graphical Representation of Comparison: Encryption Time: Here the Graph from Table to reveal it. Graph 1:- Encryption Time Comparison of Existing Method with Proposed Method. Graph 2:- Decryption Time Comparison of Existing Proposed Method. V. CONCLUSION Method with This paper introduced the concept of stegnography and cryptography. Method used in this paper provides triple security because in this method author used three methods two for cryptography and one for stegnography. Blowfish algorithm is used for original text encryption. LSB algorithm for hiding encrypted data and Rijandael method. Finally conclude that the proposed techniques are effective for secret data communication. REFERNCES [1] Jayaram P, Ranganatha H R, Anupama H S INFORMATION HIDING USING AUDIO STEGNOGRAPHY A SURVEY, The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.3, August 2011 [2] Ankur Dauneria, Kumari Indu Encryption Based Data hiding Architecture with Text Pattern Authentication and Verification, IEEE 8 th international Conference on computer and information technology workshops. [3] Mamta Juneja, Parvinder Singh Sandhu, Designing of Robust Image Stegnography Technique Based on LSB Insertion and Encryption, 2009 international conference on advances in recent technologies in communication and computing. 645
[4] M.Grace Vennice, Prof.Tv.Rao, M.Swapna, Prof.J.Sasi kiran, Hiding the Text Information using Stegnography, in nternational Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 1, Jan-Feb 2012. [5] Harshitha K M and Dr. P. A. Vijaya, secure data hiding algorithm using encrypted secret message in International Journal of Scientific and Research Publications, Volume 2, Issue 6, June 2012. [6] Shailender Gupta, Ankur Goyal, Bharat Bhushan, Information Hiding Using Least Significant Bit Steganography and Cryptography, in I.J.Modern Education and Computer Science, june 2012 [7] Joyshree Nath, Asoke Nath, Advanced Steganography Algorithm using Encrypted secret message, in (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, March 2011 [8] Dipti Kapoor Sarmah, Neha Bajpai, Proposed System for data hiding using Cryptography and Steganography in international gournal of computer applications,2010. [9] Ankita Agaral, Security Enhancement Scheme for Image Steganography using S-DES Technique in International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 4, April 2012. [10] Phad Vitthal S., Bhosale Rajkumar S., Panhalkar Archana R., A Novel Security Scheme for Secret Data using Cryptography and Steganography in I. J. Computer Network and Information Security, March 2012. [11] Mr.Vikas Tyagi,Mr. Atul kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar, Image Steganography Using Least Significant Bit With Cryptography,in Journal of Global Research in Computer Science, Volume 3, No. 3, March 2012 [12] komal patel, sumit utareja and hiesh gupta, Information hiding Using Least Significant Bit and Blowfish Algorithm, International journal of computer application volume 63 no.13 february 2013. [13] https://www.lri.fr/~fmartignon/documenti/systemesecurite/5- AES.pdf 646