Synopsis for Separable reversible data hiding in encrypted image using AES

September 16, 2017 | Author: SanjayBhatia | Category: Cryptography, Encryption, Key (Cryptography), Feasibility Study, Data Compression
Share Embed Donate


Short Description

Synopsis for separable Reversible data hiding in encrypted image using AES...

Description

Department of Information Technology Pillai’s Institute of Information Technology, Engineering, Media Studies & Research New Panvel – 410 206 CERTIFICATE This is to certify that the requirements for the synopsis entitled ‘SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE’ have been successfully completed by the following students: Name

Roll No.

Ronak Bhatia

06

Pawan Jagtap

20

Ashish Gupta in partial fulfilment of Bachelor of Engineering of Mumbai University in the Department of Information Technology, Pillai’s Institute of Information Technology, Engineering, Media Studies & Research, New Panvel during the academic year 2015 – 2016. Internal guide ________________

External guide (if any) ________________

(Prof. Dipti Lawand)

(Name of External Guide)

Internal Examiner ________________

External Examiner ________________

Head of Department ______________

Principal _________________

(Dr. Madhumita A. Chatterjee)

(Dr. R. I. K. Moorthy)

A PROJECT SYNOPSIS ON

SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE SUBMITTED BY RONAK BHATIA PAWAN JAGTAP ASHISH GUPTA

UNDER THE GUIDANCE OF PROFESSOR DIPTI LAWAND

DEPARTMENT OF COMPUTER ENGINEERING PILLAI’S INSTITUTE OF INFORMATION TECHNOLOGY, ENGINEERING, MEDIA STUDIES & RESEARCH NEW PANVEL – 410 206 UNIVERSITY OF MUMBAI Academic Year 2015 – 16

ACKNOWLEDGEMENT Dedication, determination plays a key role in success of human life as well as inspiration and motivation plays a key role in success of any venture. At this level of understanding it is difficult to understand the wide spectrum of knowledge without proper guidance and advice. We would like to take this opportunity to express our sincere thanks to, Dr. Madhumita A. Chatterjee (H.O.D) and our project guide Prof. Dipti Lawand who have shown us the way all throughout the venture. Her kind co-operation & encouragement has helped us in doing the project. We are indebted to her for spending her valuable time in guiding us with minute details of our project. We would like to express our gratitude and appreciation to all those who gave us the possibility to complete this report. A special thanks to our final year project coordinators, Prof. Madhu Nashipudi, and Prof. Sushopti Gawade whose help, stimulating suggestions helped us especially in writing this report. Also this is the best opportunity to thank our Dr. R. I. K. Moorthy for his timely help and guidance. Our special thanks to the college faculty members, without their guidance our embarking on this project would not have been successful. We would take this opportunity to thank the staff of the IT department for providing us literature.

Ronak Bhatia Pawan Jagtap Ashish Gupta

INDEX

i Abstract 1.

Introduction……………………………………………… 1 1.1 Aims and objectives 1.2 Problem Statement 1.3 Scope

2. Literature Survey 3 Existing system (if any) 4 Proposed System Methodology (your approach to solve the problem) 5 Analysis Details of Hardware & Software 6 Design details 7 Implementation Plan for next semester 8 References (Books, Papers, Websites referenced)

ABSTRACT The field steganography is a very popular technique for sending secret messages and a lot of researches are going on it. We intend to do something on separable and reversible encrypted data hiding in encrypted image using Rijndael algorithm which is an iterated block cipher algorithm that uses encryption or decryption of a block of data that is accomplished by the iteration of a specific transformation. As input, Rijndael accepts 1-D 8-bit byte arrays that create data blocks. The plaintext is input and then mapped onto state bytes. The cipher key is also a 1-D 8-bit byte array. The design of Rijndael is based on easily understandable mathematical concepts including finite field mathematics and linear algebra and matrix manipulation. Using an encryption key, the person which has information to send encrypts the original image. Then a user may compress the least significant bits of the image which are going to be encrypted using a data-hiding key, to create a sparse space for occupying some data. With an encrypted image containing data, if a receiver has the data-hiding key, he can extract the data without knowing the content of the image. The receiver cannot extract the data by just having an encryption key, but by having this key, he can decrypt to obtain an image similar to the original one. If the receiver has both the data-hiding key and the encryption key, he can extract the additional data to recover the original content without any error by exploiting the spatial correlation in natural image when the amount of additional data is not too large.

Chapter 1 Introduction In the current trends of the world, the technologies have advanced so much that most of the individuals prefer using the internet as the primary medium to transfer data from one end to another across the world. There are many possible ways to transmit data using the internet: via emails, chats, etc. The data transition is made very simple, fast and accurate using the internet. However, one of the main problems with sending data over the internet is the security threat it poses i.e. the personal or confidential data can be stolen or hacked in many ways. Therefore it becomes very important to take data security into consideration, as it is one of the most essential factors that need attention during the process of data transferring. Data security basically means protection of data from unauthorized users or hackers and providing high security to prevent data modification. This area of data security has gained more attention over the recent period of time due to the massive increase in data transfer rate over the internet. In order to improve the security features in data transfers over the internet, many techniques have been developed like: Cryptography, Steganography. While Cryptography is a method to conceal information by encrypting it to cipher texts and transmitting it to the intended receiver using an unknown key, Steganography provides further security by hiding the cipher text into a seemingly invisible image or other formats.

1.1

AIM AND OBJECTIVE The aim of this project is to retrieve data from image content. The amount of digital images has increased rapidly on the Internet. Image security becomes increasingly important for many applications, e.g., confidential transmission, video surveillance, military and medical applications. For example, the necessity of fast and secure diagnosis is vital in the medical world. Nowadays, the transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks. To decrease the transmission time, the data compression is necessary. The protection of this multimedia data can be done with encryption or data hiding algorithms. Since few years, a problem is to try to combine compression, encryption and data hiding in a single step. For example, some solutions were proposed in to combine image encryption and compression. Two main groups of technologies have been developed for this purpose. The first one is based on content protection through encryption. There are several methods to encrypt binary images or gray level images. The second group bases the protection on data hiding, aimed at secretly embedding a message into the data. Nowadays, a new challenge consists to embed data in encrypted images. Previous work proposed to embed data in an encrypted image by using an irreversible approach of data hiding or data hiding, aimed at secretly embedding a message into the data. A new idea is to apply reversible data hiding algorithms on encrypted images by wishing to remove the embedded data before the image decryption. Recent reversible data hiding methods have been proposed with high capacity, but these methods are not applicable on encrypted images. Data security basically means protection of data from unauthorized users or hackers and providing high security to prevent data medication. This area of data security has gained more attention over the recent period of time due to the massive increase in data transfer rate over the internet. In order to improve the security features in data transfers over the internet, many techniques have been developed like: Cryptography, Steganography. While Cryptography is a method to conceal information by encrypting it to cipher texts and transmitting it to the intended receiver using an unknown key, Steganography provides further security by hiding the cipher text into a seemingly invisible image or other formats. In Order to be able to define our system architecture, we must first dearly state what our objective that will driver system behaviour at the same one of our objective is to create an experience,

which is not only unique to the (user) client, but also makes him feel that he has loyal attachment to the system and approaches us whenever he/she needs. To achieve better results and success by implement computerized process instead of manual process.

1.2 PROBLEM STATEMENT

The previous existing system deals with transmission of a message or data without allowing unauthorized access over the internet but with lesser security using the basic approach of steganography technique. 1. If any one key is lost while transmission we can’t extract the data. 2. If the mail doesn’t reach the expected client. 3. If the mail used is corporate mail ID.

1.3 SCOPE

It can be used in banking sector where ATM pin is hidden inside image and the image is encrypted with credentials along with password to decrypt the image and retrieve the relevant data from it and send to the user through mail. At the user side, user decrypt the image with the appropriate password provided by the Bank and also decrypt the File in which they provide additional password to extract the ATM pin from image. If users provide a valid data hiding key then he get the relevant ATM pin from the image.

Chapter 2 Literature Review STEGANOGRAPHY: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word Steganography is of Greek origin and means "concealed writing" meaning "covered or protected", Generally, messages will appear to be something else: images, articles, shopping lists, or some other cover text and, classically, the hidden message may be in invisible ink between the visible lines of a private letter. It is high security technique for long data transmission. Steganography is the process of hiding the one information into other sources of information like text, image so that it is not visible to the natural view. There are varieties of stenographic techniques available to hide the data depending upon the carriers we use.

Fig 2.1 Block diagram for Steganography Steganography and cryptography both are used for the purpose of sending the data securely. The same approach is followed in Steganography as in cryptography like encryption, decryption and secret key. In Steganography the message is kept secret without any changes but in cryptography the original content of the message is differed in different stages like encryption and decryption. Steganography supports different types of digital formats that are used for hiding the data. These files are known as carriers. Depending upon the redundancy of the object the suitable formats are used. “Redundancy” is the process of providing better accuracy for the object that is used for display by the bits of object. The main file formats that are used for Steganography are Text, images, audio, and video.

Chapter 3 Existing System In the existing system reversible data hiding technique the image is compressed [3] and encrypted by using the encryption key and the data to hide is embedded in to the image by using the data hiding key. At the receiver side he first need to extract the image using the encryption key in order to extract the data and after that he’ll use data hiding key to extract the embedded data. It is a serial process and is not a separable process.

Image Encryption The sender selects the file and applies his encryption algorithm to encrypt the image. Encryption is the method of applying or changing some of the attributes of the original image to form every different image. Nobody can read the exact image if he is unknown of the changed done by the content owner. Data Embedding After encrypting the image the sender embed some additional data behind the selected part of the image before transmission. Any type of image can be selected for the encryption like JPEG, PNG or BMP.

Data Extraction This is the action performed at the receiver side. After receiving the data the main task of the receiver is to extract the original data hide behind the image. This technique is known as data extraction. Image Recovery Image recovery is the technique of decrypting the received image. The main task is to generate the image same as the original image. And this is done by the reversibly perform the encryption

action

i.e.

by

using

the

decryption

key.

Disadvantages: Principal content of the image is revealed before data extraction. If someone has the data hiding key but not the encryption key he cannot extract any information from the encrypted image containing additional data.

Chapter 4 Proposed System The proposed scheme is made up of image encryption, data embedding and dataextraction/image-recovery phases. The content owner encrypts the original uncompressed image [2] using an encryption key to produce an encrypted image. Then, the data-hider compresses the least significant bits (LSB) of the encrypted image using a data-hiding [12] key to create a sparse space to accommodate the additional data. Since the data embedding only affects the LSB, a decryption with the encryption key can result in an image similar to the original version. When using both of the encryption and data-hiding keys, the embedded additional data can be successfully extracted and the original image can be perfectly recovered by exploiting the spatial correlation in natural image.

Image Encryption The sender selects the file and applies his encryption algorithm to encrypt the image. Encryption is the method of applying or changing some of the attributes of the original image

to form a very different image. Nobody can read the exact image if he is unknown of the changed done by the content owner. Data Embedding After encrypting the image the sender embed some additional data behind the selected part of the image before transmission. Any type of image can be selected for the encryption like JPEG, PNG or BMP. Data Encryption In data Encryption we protect the text with password and write in a file then encrypt the file with the additional password so that at decryption time first he should decrypt the file with the proper credentials and then access that file to read the password and use that password to extract the data hidden in the image. Data Extraction This is the action performed at the receiver side. After receiving the data the main task of the receiver is to extract the original data hide behind the image. This technique is known as data extraction. Image Recovery Image recovery is the technique of decrypting the received image. The main task is to generate the image same as the original image. And this is done by the reversibly perform the encryption action i.e. by using the decryption key.

Data Decryption In data Decryption the receiver or user decrypts the file with the relevant password to retrieve the data hiding key to extract the data from the image.

Advantages: If the receiver has only the data-hiding key, he can extract the additional data though he does not know the image content. If he has only the encryption key, he can decrypt the received data to obtain an image similar

to the original one, but cannot extract the embedded additional data.

If he receiver has both the data-hiding key and the encryption key, he can extract the additional data and recover the original image without any error when the amount of additional data is not too large.

Chapter 5 Analysis 5.1 HARDWARE AND SOFTWARE REQUIREMENTS 5.1.1 Hardware Requirements: The hardware required is given below: Main processor

: Pentium IV processor 1.13 GHz.

Internal memory capacity

: 128 MB

Hard disk capacity

: 40GB

Cache memory

: 512 MB

5.1.2 Software Requirements: The software required is given below: Front End

: Matlab

Operating system

: WINDOWS-XP

Chapter 6 Design Details 6.1 FEASIBILITY ANALYSIS 6.1.1 System Feasibility The very first phase in any system developing life cycle is preliminary investigation. In the preliminary investigations we examine the project feasibility, the likelihood of the system being useful to automate homes.

6.1.2 Operational Feasibility It was decided that the proposed project could be created as a Windows -based application system that will meet the operating environment of various people for browsing the internet. The reasons for this conclusion are:    

Business method adopted is acceptable to all users. The end users have been involved in the planning and development. Manual errors will be reduced. It is a user-friendly browser and any person having moderate knowledge of



Computers, internet and project handling can operate it. It is an operationally feasible project considering both the hardware and software

6.1.3 Technical Feasibility It was decided that the project was technically feasible because of the following:  

Necessary technology exists to do what is suggested. The system could be expandable and enhanced if so decided.

6.1.4 Economic Feasibility

Some financial and economic questions raised were:     

The cost to conduct systems investigation Cost of software and hardware for the class of application being considered. Benefits in the form of fewer costly errors. Costly implementation. The cost of nothing changes i.e. the proposed system is not developed.

6.2 REQUIREMENT ANALYSIS 6.2.1 Functional Requirement In the functional requirement we specify the functional requirement to function the system. Here we specify the use case diagram as shown in Figure 5.1

6.2.2 Non-functional Requirements Performance requirements: The software will run on a machine with a minimum of 1GHz and 512MB RAM. It will start up within 3 seconds after initialization.

Safety requirements: The data handled in this system is very vital. The system should always be confirmed to run properly and the data are saved to the database at consecutive intervals. Power is a significant feature and the power supply should be always taken care of. An Uninterrupted Power Supply is always recommended.

Software quality attributes: Availability This system will be available on the user’s machine, 24 hours a day. Should the user leave the program running whilst sitting at the machine, data will remain in memory, unless edited, and the system will remain in the state in which the user left it. Operability The system will allow the user to operate it with a mouse, unless input is required from the keyboard. Learn ability The system will be delivered with a user manual which will detail the use of the system to the user. Team Respect will also provide a tutorial for the user if the user wishes at software delivery time.

Adaptability This software is adaptable in any environment. Usability requirements: The system will provide a well-structured help facility. It will display informative error messages when necessary. It will have consistent and easy to learn graphical user interfaces.

6.3 SYSTEM ANALYSIS In this section we present system analysis and design of proposed systems. System analysis model defines user requirements, establishes basis of system design and defines set of validation requirements needed for testing implemented system. System design is the technical kernel of System engineering and is applied regardless of the System process model that is used. Beginning once system requirements have been analyzed and specified, System design is the first of three technical activities—design, code generation, and test—that are required to build and verify the system. Each activity transforms information in a manner that ultimately results in validated proposed System.

Chapter 7 Implementation Plan for Next Semester

1. Algorithm Implementation. 2. Coding. 3. Testing. 4. Deployment.

Chapter 8 References X. Zhang, “Reversible data hiding in encrypted image,” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012 Separable Reversible Data Hiding In Encrypted Image accessed on 15 July 2015 available online https://www.youtube.com/watch?v=BK_StE54pMs

View more...

Comments

Copyright ©2017 KUPDF Inc.