0% found this document useful (0 votes)
72 views7 pages

An Enhanced Encryption Technique Using BCD and Bit Complementation

The document discusses using a combination of JPEG2000 compression, RSA encryption and DWT steganography to securely transmit data. It describes encrypting a message using 14 square substitution and RSA algorithms, compressing it with JPEG2000, then hiding it in an image using DWT steganography. At the receiver, the reverse process is performed to decrypt the original message.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views7 pages

An Enhanced Encryption Technique Using BCD and Bit Complementation

The document discusses using a combination of JPEG2000 compression, RSA encryption and DWT steganography to securely transmit data. It describes encrypting a message using 14 square substitution and RSA algorithms, compressing it with JPEG2000, then hiding it in an image using DWT steganography. At the receiver, the reverse process is performed to decrypt the original message.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056

Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072

Designing secured data using a combination of JPEG2000 Compression,


RSA Encryption and DWT Steganography

Sayli S. Relekar1, Prof. V. B. Raskar2


1Sayli S. Relekar, Dept of Electronics and Telecommunication, Imperial college of Engineering and Research,
Maharashtra, India
2Prof. V. B. Raskar, Dept of Electronics and Telecommunication, Imperial college of Engineering and Research,

Maharashtra, India

---------------------------------------------------------------------***------------------------------------------------------------------
Abstract - The paper describes the combination of different SG is used for the data hiding technique. SG means
method use to secure the data. The cryptography and cover and grapy means writing. SG is mainly used for the
steganography technique are used to secure the data. image and audio. In this paper SG is used for the video
Cryptography technique is use to encrypt the data. processing. For data hiding in video, the video is divided into
Steganography technique is use to hide the data within the frames of images. And the frames of images is selected
selected image. . For that, we first substitute the original within them and in one of the image the data is hided. In such
message by using the fourteen square substitution algorithms. a way the video processing is applied.
After the substitution of text, we then encrypt this text message
using RSA algorithm. The encrypted message compressed by The word Steganography is derived from the Greece
JPEG 2000 (Huffman coding) method, so it will reduce the size words Stegos means cover and Grafia means writing.
of the message that will be inserted and increase the capacity Steganography can be achieved by using image, audio, video
of messages that can be inserted. Messages that have been carriers. The most flexible and efficient way to use it is with
compressed and encrypted, is then hidden by DWT (Discrete help of images, hence in our software, we are using it in form
Wavelet Transform) techniques. With the incorporation of of image. Encryption and steganography are the preferred
encryption techniques, steganography, and compression, the techniques for protecting the transmitted data , as a result,
acquired information is more secure and its capacity is larger. there are various encryption systems to encrypt and decrypt
At the receivers end, same operations are performed to decrypt image data, and it can be argued that there is no single
the original message in reverse order. It is found that here we encryption algorithm satisfies the different image types .
are using the double ciphering techniques which makes the Data exchange is a good example of an application that uses
system very robust and secures it from known hacking attacks. encryption to maintain data confidentiality between the
It makes very difficult for the intruders to hack the image and sender and the receiver. In this paper, steganography is used
then decrypt the message in a feasible amount of time thus to hide information to perform encryption. Steganography
securing it from many known network attacks techniques are getting significantly more sophisticated and
have been widely used. The Steganography techniques are
Key Words: Cryptography and steganograhy, JPEG2000 the perfect supplement for encryption that allows a user to
Compression, DWT, RSA encryption. hide large amounts of information within an image.

Thus, it is often used in conjunction with cryptography so


that the information is doubly protected; first it is encrypted
1.INTRODUCTION and then hidden so that an adversary has to first find the
hidden information before decryption take place. The
Now a days network security is very essential in problem with cryptography is that the encrypted message is
encrypting the data and decrypting the data. Hence there are obvious. This means that anyone who observes an encrypted
various technique used for network security. Most commonly message in transit can reasonably assume that the sender of
the cryptography is used for the security. And there many the does not want it to be read by casual observers. This makes it
other technique used for security. As to transmitted the possible to deduce the valuable information.
secret data only cryptography is not essential for encrypting In this project we are hiding the text massage in the color
and decrypting the data. So in this paper we are doing dual image using the encryption technique. In this we are taking the
encryption and for testing this encryption we are Appling color image in that we are going to hide the text massage. The
some parameter as they are Peak Signal Noise Ratio (PSNR), encryption of this text is first process by the 14 square algorithm.
Mean Square Error (MSE), Bit Error Rate (BER). For dual And after encrypting by 14 square algorithm we are again
encryption we using two different algorithm as they are encrypting by the RSA encryption technique. In this project we
fourteen square algorithm and RSA algorithm. are dual encryption is done for higher level of security. After

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 312
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072

encryption process we are going to compression technique, 2.2.1 SPATIAL DOMAIN STEGANOGRAPHY :
which is JPEG2000 compression, in this the size of the image is
Spatial domain technique is mostly used for Least
compress.
Significant Bit (LSB) . The least significant bit is use to
embedded bits of the message into the LSB of the pixel image.
2. CRYPTOGRAPHY AND STEGANOGRAPHY But the problem with this technique is that if the image is
COMBINATION compressed, the data inserted may be lost. Thus, there is a
fear for the loss of data that might have sensitive information.
2.1 CRYPTOGRAPHY
Cryptography is the art and science to encode the 2.2.2 FREQUENCY DOMAIN STEGANOGRAPHY:
messages to make them unreadable. This message is In frequency domain the message is embedded in the
unreadable to the other but the message is only readable to image. In frequency domain the embedded data which is the
the sender and receiver. The cryptography is use to encrypt hidden data, this data is spread across the image and this
and decrypt the data between two parties. Cryptography data is more stronger in the image area. There are various
provide the authentication key for verifying the identity of techniques that change the image from spatial domain to
sender and receiver. Cryptanalysis is the reverse engineering frequency domain. 2D discrete cosine transform is usually
of cryptography. There are various ways to classify the used in the frequency domain. In frequency domain there are
cryptographic algorithms. The three types of algorithms are: various discrete transform are used such as the discrete
wavelet transform, discrete cosine transform, discrete
(1) Secret key Cryptography: Uses only one key for both Fourier transform.
encryption and decryption.
The wavelet transform works on the time frequency
(2) Public Key Cryptography: Uses different key for which provide signal. In this paper we are applying discrete
encryption and different for decryption. wavelet transform and even inverse wavelet transform.
Discrete wavelet transform is use to embedded the secrete
(3) Hash Functions: Uses a mathematical transformation to
data in the original image and to embedded the stego image
irreversibly "encrypt" information.
we use the inverse wavelet transform to regain the original
image. The image pixel consist of the low level and high level
2.2 STEGANOGRAPHY
pixel. The discrete wavelet transform is use to hide the data
Steganography is derived from the Greek Steganos in low level(LL) pixel in image. The low level pixel are the
(hidden) and graphein (writing). Steganography means integer number and the high level(HL) pixel means floating
cover writing. Steganography is a art and science of hiding point.
messages into a image or video files in a way that actually
In discrete wavelet transform it embedded integer
dont know any one, only the sender and the receiver. The
to integer. The wavelet transform is more efficient to lossless
steganography, hides the secrete information in the media
compression. And in this project we are using the JPEG2000
files such as the image, video, audio file. There different types
compression which is the lossless compression. Thus to get
of the steganography. They are as follows:
the perfect output the discrete wavelet Transform and the
inverse wavelet transform is used in combination of
encryption and decryption.

The discrete cosine transform is also used for hiding


secrete data. The discrete cosine transform is use to divided
the image into 8 8 blocks and each block is transform is
done. It set the image pixel according to the image frequency
value. In discrete cosine transform it embedded only the high
frequency bit or coefficient. In the blocks after discrete cosine
transform DCT , the pixel position of 8th row and 8th column
Fig. 1. Types of steganography (8,8) is use to change the for hidden data bit to 1, and
change to - for hidden data bit to 0. represents the positive
Steganography is used for almost all media file formats, but value to hide the data bit. And the represent the negative
these file are with a high degree of redundancy . Redundancy value to hide the data bit.
is use to defined as the bits of an object which provide
accuracy for the objects use and display. Image and audio Before you begin to format your paper, first write and save
files are especially encrypted with there necessary, it cover the content as a separate text file. Keep your text and graphic
the secrete information in the media files that is, it hide the files separate until after the text has been formatted and
information in the media file. Image file are mostly used in styled. Do not use hard tabs, and limit use of hard returns to
steganography for hiding data. only one return at the end of a paragraph. Do not add any kind

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 313
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072

of pagination anywhere in the paper. Do not number text The cipher text is the encrypted data which is unreadable to
heads-the template will do that for you. the attacker. The cipher text is then applied to the cover
Finally, complete content and organizational editing image. The cover image is the image in which the data is
before formatting. Please take note of the following items hidden with the help of the stegnography technique. And
when proofreading spelling and grammar: hence the data is hidden in the stego image. To get the original
message back we have to reverse the process that is decrypt
2.3. CRYPTOGRAPHY AND STEGANOGRAPHY the stego image. And at the output we get the original image
COMBINATION and secrete data without disturbance.
Working only on cryptography or the steganography is not
sufficient, because the cryptography and the steganography
technique are used for the security. If any one technique is 3. PROPOSED SYSTEM
used for the security it will not help to secure the confidential
data. The role of the cryptography is to encrypt and decrypt 3.1 RSA ALGORITHM
the information. And the role of steganography is to hide the
confidential data into the image. So the combination of RSA algorithm was introduced by three researchers
cryptography and steganography is more efficient then to use from MIT (Massachusetts Institute of Technology), namely
anyone technique. In cryptography, the attacker can hack the Ron Rivest, Adi Shamir, and Len Adleman in 1976. RSA
confidential data easily. But when the steganography is used encryption and decryption process is based on the prime
the attacker is use to first identify the secret embedded data numbers and modulo arithmetic. The encryption and
and then the attacker is use to hack the data. decryption keys are integers. RSA algorithm work on the
public key. The encrypted key is kept secret and is not known
However, it is good practice to use Cryptography and to anyone (so-called public key), but kept secret key for
Steganography technique together for additional multiple decryption. Decryption keys is made up of multiple prime
layers of encryption. The combination of the data encryption integers together with the encryption key. If we have to find
is done by a software and then embed the information in the the decryption key, we must factorize a composite number
cipher text that is image, video, audio or any other media file into prime factors. But factorizing the nonprime numbers
with the help of steganography key. The combination of into prime number is not easy. The RSA algorithm is efficient
cryptography and steganography technique will enhance the to find the factor it. The large number are more difficult to
security level of the secrete data embedding. The get there non prime number factoring. The RSA algorithm is
combination of these two technique will satisfy the as follows.
requirements such as the capacity, security and robustness to
secure the data transmission. RSA algorithm as follows:

The explanation of the figure shown below is the 1. p and q are primes (secret)
combination of the steganography and cryptography
technique. The first block consist of the plain text, the plain 2. n = pq (not secret)
text means the secrete data which can be a alphabet, 3. (n) = (p - 1) (q - 1) (secret)
numbers or any special character. The plain text is then
applied to the encryption block. There are various encryption 4. e (encryption key) (not secret)
technique which are used to encrypt the data such as the 14th
square encryption, RSA encryption etc. The encryption block 5. d (decryption key) (secret)
will encrypt the plain text and it will convert into the cipher 6. m (plain text) (secret)
text. Then the encrypted data is pass to the cipher text.
7. c (cipher text) (not secret)

RSA algorithm is based on Euler's theorem which states that :

an 1 (mod n) . . . . . . . (1)

a must be prime number to n

(n) = n(1 1/p1)(1 1/p2) (1 1/pr), where p1, p2, ..., pr are
the prime number of n.

(n) is a function that determines how many of the numbers 1, 2,


3, ..., n which are relatively prime number to n. Based on the
Fig. 2.Cryptography and steganography combination

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 314
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072

nature of ak bk mod n for an integer k 1 , then the equation


(1) can be written as :

ak (n) 1k (mod n). . . . . . . (2)

or ak (n) 1 (mod n)

So that encryption and decryption are formulated as follows:

Ee (m) = c me mod n. . . . . . . (3)

Dd ( m ) = m cd mod n. . . . . . (4)

Algorithms which generate the key pair :

Choose any two prime numbers , p and q Fig. 4.JPEG2000 decoder block diagram
Calculate n = pq (preferably p q , because if p = q
The JPEG block diagrams is mostly same as the JPEG2000
then n = p2 so p can be obtained by numerical square
but the difference is that the JPEG2000 consist the discrete
root of n)
wavelet transform block rather than discrete cosine
Calculate :
transform. Firstly the source image is applied the source
(n) = (p - 1)(q - 1) (5)
image means the original image. The source image is then
Select the public key , e which is relatively prime to
applied to the tile decomposition block. The tile
(n)
decomposition block work on the source image, the source
Generate a private key using the equation : ed 1 (mod image is divided into component and these component is
(n)) divided into tile.

4. IMPLEMENTATION OF SYSTEM
These tile are then applied to the discrete wavelet
4.1 JPEG2000 transform (DWT). The discrete wavelet transform is use to
transform the bit pixel in the image. And these bit are then
JPEG2000 is first international standard of continuous applied to the quantized block. The bit is quantize and then it
tone still image compression and coding. It is very popular for is applied to the encoded block. The encryption block is used
the still image and it can be transfer over the internet and to encrypt the bit. These encrypted bits are then applied to
these still image can also be store in the devices. First, JPEG the compress block. The compress block is use to compress
encoded images show severe blocking drawback at a low bit the bit and output of compress block is the compress bit
rate. This problem is due to block-based DCTs, which are stream.
discussed earlier. JPEG dose not support much to the spatial
domain and SNR quality. The quality of the JPEG image is not
so good and it dose not reconstruct the image properly. Hence 4.2 14th SQUARE ALGORITHM
to overcome these drawback the advance version was
introduce that is JPEG2000 in 1996. In the earlier paper the twelve square cipher substitution
is represented which includes only lower case alphabets,
numbers and some special characters. This is extended in to
fourteen square substitution ciphers to include numerals,
upper and lower alphabets and all special characters
including space bar which are present on keyboard. At first,
the fourteen-square substitutes the alphabets, digits and
special characters so it is less susceptible to frequency
analysis attacks. It uses eight 9 by 6 matrices each arranged
in a square, as shown in figure-1. Each of the 9 by 6 matrices
contains the letters of the alphabets (upper case and lower
case) and another six 6 by 7 matrices arranged in a squares
for digits and special characters, as shown in figure-2. All the
special characters from your desktop/laptop keyboard are
included in this figure

Square1: We have taken fifty two alphabets and two special


Fig. 3.JPEG2000 encoder block diagram characters, out of which twenty six are capital letters and

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 315
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072

twenty six, are small letters. In each row we have arranged The special character (including digit), its plain text
nine alphabets and each column contains six alphabets. is in square-9 and cipher text is in same row and column
location of square-12. For another special
Square 2: is made from square- 1 by taking the first row of character(including digits) it follow the same procedure as
the square-1 to sixth row place and other rows one position mentioned for figure-1 characters
up.

Square 3: is created from square 2 by taking the first row of


square 2 to sixth row place and other rows are position up.

Square 4: which created from square-3 by taking first row of


square-3 to sixth row of square-4 and other rows are
position up.

Square 5: we have converted rows into column and


interchanged first and last alphabets.

Square 6 to 8: by taking first row of previous square to sixth


row and other rows one position up.

Fig. 6.Plain Text and Cipher Text Table(number and


special character)

After this successful substitution of the plain text,


again this cipher text will be encrypted by the one of the most
secure encryption algorithm. For this we are using the RSA
algorithm form encryption and decryption process and lastly
the encrypted message will be embedded inside the image.
The substituted image is then re-encrypted using the RSA in
following way.

5. RESULT AND EXERIMENTAL OF THE


In cryptography, message gets encrypted and in
Steganography, it gets embedded within the selected image.
For that, we first substitute the original message by using the
Fig. 5.Plain Text and Cipher Text Table(Alphabets)
fourteen square substitution algorithm. After the substitution
The plain text is read from left to right. If the character is of text, we then encrypt this text message using RSA
alphabet it will refer to the figure-1, otherwise if it is a algorithm and 14th square algorithm. The encrypted message
number or a special character it will refer to figure-2. While is then hidden within image by Least Significant Bit (LSB)
scanning the plain text the first alphabets plain text is in method.
square-1 and its cipher is in same row and column location in
This image works as a carrier file and is sent to the
square-5. The second alphabet, its plain text is in square- 2
receiver. At the receivers end, same operations are
and its cipher text is in same row and column location of
performed to decrypt the original message in reverse order.
square6. The third alphabet, its plain text is in square-3 and
It is found that here we are using the double ciphering
cipher text is in same row and column location of square-7.
techniques which makes the system very robust and secures
The fourth alphabet, its plain text is in square 4 and it from known hacking attacks. It makes very difficult for the
its cipher text is in same row and column location of square-8 intruders to hack the image and then decrypt the message in
similarly fifth alphabet corresponds to square-1 and square- a feasible
5, 6th alphabet corresponds to square-2 and square-6, 7th
alphabet corresponds to square-3 and square-7 and so on.
Secret message is combination of alphabets, digits and
special characters. While scanning for the secrete message,
for the special characters and digits it will refer to the figure-
2.

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 316
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072

Table -1: Output stego image and parameters

Here denoted to the process pixel value


Input image PSNR MSE Stego image
denoted to the original pixel value, m and n denote to the
height and width of the image.

67.57 0.011

66.63 0.014

Fig. 7.Input image


66.27 0.015

66.52 0.014

Fig. 8.Denoised image


The comparative results of the different images and the two
different parameters. To calculate the PSNR and MSE.

There are various parameter to analysis the efficiency of the


image or the video. The parameters are set to identify the
efficiency of an image.

5.1 PEAK SIGNAL NOISE RATIO (PSNR), MEAN


SQUARE ERROR (MSE), BIT ERROR RATE (BER)
Peak signal noise ratio (PSNR) is use to test the
image quality. PSNR is most commonly used for the image
but in this paper we are Appling it to the video processing.
Fig. 9.Output stego image

Mean square error (MSE) is use to define the error.


And it is defined as

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 317
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072

Fig. 10. Output of the secrete data and parameters

CONCLUSION
The simulation design of securing data using a Combination
of JPEG2000 Compression, RSA Encryption, andDWT
Steganography is more efficient then the LZW compression.
As the capacity of the compressed data is more in JPEG2000.
And further comparison with the other encryption technique
to secure data more efficiently

REFERENCES
[1] Gandharba Swain, Saroj Kumar Lenka, Steganography
using the Twelve Square Substitution Cipher and Index
Variable,IEEE transactions on Image Processing, 2011.

[2] Saleh Saraireh. "A Secure Data Communication System


Using Cryptography And Steganography", International
Journal of Computer Networks & Communications (IJCNC)
Vol.5, No.3, May 2013.

[3] Geeta Kasana , Kulbir Singh Steganography Technique


for JPEG2000 Compressed Images Using Histogram in
Wavelet Domain Vol.8, No.6 (2014).

[4] Manoj, I. V. S., "Cryptography and Steganography".


International Journal of Computer Applications (09758887),
Vol.1, No.12, 2010.

[5] Saleh Saraireh. "A Secure Data Communication System


UsingCryptography And Steganography", International
Journal of Computer Networks & Communications (IJCNC)
Vol.5, No.3, May 2013.

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 318

You might also like