An Enhanced Encryption Technique Using BCD and Bit Complementation
An Enhanced Encryption Technique Using BCD and Bit Complementation
Maharashtra, India
---------------------------------------------------------------------***------------------------------------------------------------------
Abstract - The paper describes the combination of different SG is used for the data hiding technique. SG means
method use to secure the data. The cryptography and cover and grapy means writing. SG is mainly used for the
steganography technique are used to secure the data. image and audio. In this paper SG is used for the video
Cryptography technique is use to encrypt the data. processing. For data hiding in video, the video is divided into
Steganography technique is use to hide the data within the frames of images. And the frames of images is selected
selected image. . For that, we first substitute the original within them and in one of the image the data is hided. In such
message by using the fourteen square substitution algorithms. a way the video processing is applied.
After the substitution of text, we then encrypt this text message
using RSA algorithm. The encrypted message compressed by The word Steganography is derived from the Greece
JPEG 2000 (Huffman coding) method, so it will reduce the size words Stegos means cover and Grafia means writing.
of the message that will be inserted and increase the capacity Steganography can be achieved by using image, audio, video
of messages that can be inserted. Messages that have been carriers. The most flexible and efficient way to use it is with
compressed and encrypted, is then hidden by DWT (Discrete help of images, hence in our software, we are using it in form
Wavelet Transform) techniques. With the incorporation of of image. Encryption and steganography are the preferred
encryption techniques, steganography, and compression, the techniques for protecting the transmitted data , as a result,
acquired information is more secure and its capacity is larger. there are various encryption systems to encrypt and decrypt
At the receivers end, same operations are performed to decrypt image data, and it can be argued that there is no single
the original message in reverse order. It is found that here we encryption algorithm satisfies the different image types .
are using the double ciphering techniques which makes the Data exchange is a good example of an application that uses
system very robust and secures it from known hacking attacks. encryption to maintain data confidentiality between the
It makes very difficult for the intruders to hack the image and sender and the receiver. In this paper, steganography is used
then decrypt the message in a feasible amount of time thus to hide information to perform encryption. Steganography
securing it from many known network attacks techniques are getting significantly more sophisticated and
have been widely used. The Steganography techniques are
Key Words: Cryptography and steganograhy, JPEG2000 the perfect supplement for encryption that allows a user to
Compression, DWT, RSA encryption. hide large amounts of information within an image.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 312
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
encryption process we are going to compression technique, 2.2.1 SPATIAL DOMAIN STEGANOGRAPHY :
which is JPEG2000 compression, in this the size of the image is
Spatial domain technique is mostly used for Least
compress.
Significant Bit (LSB) . The least significant bit is use to
embedded bits of the message into the LSB of the pixel image.
2. CRYPTOGRAPHY AND STEGANOGRAPHY But the problem with this technique is that if the image is
COMBINATION compressed, the data inserted may be lost. Thus, there is a
fear for the loss of data that might have sensitive information.
2.1 CRYPTOGRAPHY
Cryptography is the art and science to encode the 2.2.2 FREQUENCY DOMAIN STEGANOGRAPHY:
messages to make them unreadable. This message is In frequency domain the message is embedded in the
unreadable to the other but the message is only readable to image. In frequency domain the embedded data which is the
the sender and receiver. The cryptography is use to encrypt hidden data, this data is spread across the image and this
and decrypt the data between two parties. Cryptography data is more stronger in the image area. There are various
provide the authentication key for verifying the identity of techniques that change the image from spatial domain to
sender and receiver. Cryptanalysis is the reverse engineering frequency domain. 2D discrete cosine transform is usually
of cryptography. There are various ways to classify the used in the frequency domain. In frequency domain there are
cryptographic algorithms. The three types of algorithms are: various discrete transform are used such as the discrete
wavelet transform, discrete cosine transform, discrete
(1) Secret key Cryptography: Uses only one key for both Fourier transform.
encryption and decryption.
The wavelet transform works on the time frequency
(2) Public Key Cryptography: Uses different key for which provide signal. In this paper we are applying discrete
encryption and different for decryption. wavelet transform and even inverse wavelet transform.
Discrete wavelet transform is use to embedded the secrete
(3) Hash Functions: Uses a mathematical transformation to
data in the original image and to embedded the stego image
irreversibly "encrypt" information.
we use the inverse wavelet transform to regain the original
image. The image pixel consist of the low level and high level
2.2 STEGANOGRAPHY
pixel. The discrete wavelet transform is use to hide the data
Steganography is derived from the Greek Steganos in low level(LL) pixel in image. The low level pixel are the
(hidden) and graphein (writing). Steganography means integer number and the high level(HL) pixel means floating
cover writing. Steganography is a art and science of hiding point.
messages into a image or video files in a way that actually
In discrete wavelet transform it embedded integer
dont know any one, only the sender and the receiver. The
to integer. The wavelet transform is more efficient to lossless
steganography, hides the secrete information in the media
compression. And in this project we are using the JPEG2000
files such as the image, video, audio file. There different types
compression which is the lossless compression. Thus to get
of the steganography. They are as follows:
the perfect output the discrete wavelet Transform and the
inverse wavelet transform is used in combination of
encryption and decryption.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
of pagination anywhere in the paper. Do not number text The cipher text is the encrypted data which is unreadable to
heads-the template will do that for you. the attacker. The cipher text is then applied to the cover
Finally, complete content and organizational editing image. The cover image is the image in which the data is
before formatting. Please take note of the following items hidden with the help of the stegnography technique. And
when proofreading spelling and grammar: hence the data is hidden in the stego image. To get the original
message back we have to reverse the process that is decrypt
2.3. CRYPTOGRAPHY AND STEGANOGRAPHY the stego image. And at the output we get the original image
COMBINATION and secrete data without disturbance.
Working only on cryptography or the steganography is not
sufficient, because the cryptography and the steganography
technique are used for the security. If any one technique is 3. PROPOSED SYSTEM
used for the security it will not help to secure the confidential
data. The role of the cryptography is to encrypt and decrypt 3.1 RSA ALGORITHM
the information. And the role of steganography is to hide the
confidential data into the image. So the combination of RSA algorithm was introduced by three researchers
cryptography and steganography is more efficient then to use from MIT (Massachusetts Institute of Technology), namely
anyone technique. In cryptography, the attacker can hack the Ron Rivest, Adi Shamir, and Len Adleman in 1976. RSA
confidential data easily. But when the steganography is used encryption and decryption process is based on the prime
the attacker is use to first identify the secret embedded data numbers and modulo arithmetic. The encryption and
and then the attacker is use to hack the data. decryption keys are integers. RSA algorithm work on the
public key. The encrypted key is kept secret and is not known
However, it is good practice to use Cryptography and to anyone (so-called public key), but kept secret key for
Steganography technique together for additional multiple decryption. Decryption keys is made up of multiple prime
layers of encryption. The combination of the data encryption integers together with the encryption key. If we have to find
is done by a software and then embed the information in the the decryption key, we must factorize a composite number
cipher text that is image, video, audio or any other media file into prime factors. But factorizing the nonprime numbers
with the help of steganography key. The combination of into prime number is not easy. The RSA algorithm is efficient
cryptography and steganography technique will enhance the to find the factor it. The large number are more difficult to
security level of the secrete data embedding. The get there non prime number factoring. The RSA algorithm is
combination of these two technique will satisfy the as follows.
requirements such as the capacity, security and robustness to
secure the data transmission. RSA algorithm as follows:
The explanation of the figure shown below is the 1. p and q are primes (secret)
combination of the steganography and cryptography
technique. The first block consist of the plain text, the plain 2. n = pq (not secret)
text means the secrete data which can be a alphabet, 3. (n) = (p - 1) (q - 1) (secret)
numbers or any special character. The plain text is then
applied to the encryption block. There are various encryption 4. e (encryption key) (not secret)
technique which are used to encrypt the data such as the 14th
square encryption, RSA encryption etc. The encryption block 5. d (decryption key) (secret)
will encrypt the plain text and it will convert into the cipher 6. m (plain text) (secret)
text. Then the encrypted data is pass to the cipher text.
7. c (cipher text) (not secret)
an 1 (mod n) . . . . . . . (1)
(n) = n(1 1/p1)(1 1/p2) (1 1/pr), where p1, p2, ..., pr are
the prime number of n.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 314
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
or ak (n) 1 (mod n)
Dd ( m ) = m cd mod n. . . . . . (4)
Choose any two prime numbers , p and q Fig. 4.JPEG2000 decoder block diagram
Calculate n = pq (preferably p q , because if p = q
The JPEG block diagrams is mostly same as the JPEG2000
then n = p2 so p can be obtained by numerical square
but the difference is that the JPEG2000 consist the discrete
root of n)
wavelet transform block rather than discrete cosine
Calculate :
transform. Firstly the source image is applied the source
(n) = (p - 1)(q - 1) (5)
image means the original image. The source image is then
Select the public key , e which is relatively prime to
applied to the tile decomposition block. The tile
(n)
decomposition block work on the source image, the source
Generate a private key using the equation : ed 1 (mod image is divided into component and these component is
(n)) divided into tile.
4. IMPLEMENTATION OF SYSTEM
These tile are then applied to the discrete wavelet
4.1 JPEG2000 transform (DWT). The discrete wavelet transform is use to
transform the bit pixel in the image. And these bit are then
JPEG2000 is first international standard of continuous applied to the quantized block. The bit is quantize and then it
tone still image compression and coding. It is very popular for is applied to the encoded block. The encryption block is used
the still image and it can be transfer over the internet and to encrypt the bit. These encrypted bits are then applied to
these still image can also be store in the devices. First, JPEG the compress block. The compress block is use to compress
encoded images show severe blocking drawback at a low bit the bit and output of compress block is the compress bit
rate. This problem is due to block-based DCTs, which are stream.
discussed earlier. JPEG dose not support much to the spatial
domain and SNR quality. The quality of the JPEG image is not
so good and it dose not reconstruct the image properly. Hence 4.2 14th SQUARE ALGORITHM
to overcome these drawback the advance version was
introduce that is JPEG2000 in 1996. In the earlier paper the twelve square cipher substitution
is represented which includes only lower case alphabets,
numbers and some special characters. This is extended in to
fourteen square substitution ciphers to include numerals,
upper and lower alphabets and all special characters
including space bar which are present on keyboard. At first,
the fourteen-square substitutes the alphabets, digits and
special characters so it is less susceptible to frequency
analysis attacks. It uses eight 9 by 6 matrices each arranged
in a square, as shown in figure-1. Each of the 9 by 6 matrices
contains the letters of the alphabets (upper case and lower
case) and another six 6 by 7 matrices arranged in a squares
for digits and special characters, as shown in figure-2. All the
special characters from your desktop/laptop keyboard are
included in this figure
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 315
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
twenty six, are small letters. In each row we have arranged The special character (including digit), its plain text
nine alphabets and each column contains six alphabets. is in square-9 and cipher text is in same row and column
location of square-12. For another special
Square 2: is made from square- 1 by taking the first row of character(including digits) it follow the same procedure as
the square-1 to sixth row place and other rows one position mentioned for figure-1 characters
up.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 316
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
67.57 0.011
66.63 0.014
66.52 0.014
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 317
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
CONCLUSION
The simulation design of securing data using a Combination
of JPEG2000 Compression, RSA Encryption, andDWT
Steganography is more efficient then the LZW compression.
As the capacity of the compressed data is more in JPEG2000.
And further comparison with the other encryption technique
to secure data more efficiently
REFERENCES
[1] Gandharba Swain, Saroj Kumar Lenka, Steganography
using the Twelve Square Substitution Cipher and Index
Variable,IEEE transactions on Image Processing, 2011.
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 318