Sample Paper - 2
Sample Paper - 2
net/publication/358457069
CITATIONS READS
7 209
2 authors, including:
Bindu Madavi K P
Christ University
21 PUBLICATIONS 30 CITATIONS
SEE PROFILE
All content following this page was uploaded by Bindu Madavi K P on 17 August 2022.
Abstract— Data security is a key concern for organizations technique for hiding data by encasing the hidden message in
considering a transfer of their on-premises applications to the another medium.
cloud. Organizations must shift their security controls from “Fig. 1”, depicts the general notion of cryptography. The
historical perimeter and detection-based technologies to a focus sender transmits an unencrypted message, which is known as
on establishing enhanced protection at the application and data ”plain text,” and it is transformed into an incomprehensible
levels to ensure the confidentiality, integrity, and availability of
form, known as ”ciphertext,” following encryption. The
these various systems and datasets. Data integrity is a critical
component of cloud data security, preventing unauthorized ciphertext is then transferred across an unsecured channel in
alteration or removal and guaranteeing that data stays as it was the presence of a third party known as an adversary or intruder,
when it was initially uploaded. This article presents a and the plain text is discovered at the receiving end after
compacting with steganography technique which is used to hide decrypting the ciphertext once again.
data with substantial security and also perfect invisibility while
utilizing a combination of DES, AES, and RC4 encryption
methods. The objective of this study is to provide data security
using steganography with the Least Significant Bit (LSB)
Algorithm and Hybrid Encryption that encrypts user input and
conceals it in an image file to provide the highest level of security
for messages sent and received.
I. INTRODUCTION
Many industrial sectors are adopting cloud computing,
which raises security issues. However, there are solutions to Fig. 1. A comprehensive concept of cryptography [10].
protect privacy and prevent data loss. By implementing cloud
technology, most businesses have been able to lower the total Cryptography alone isn’t always enough to secure data.
cost of ownership, enhance the flexibility of IT deployment, sometimes it’s also necessary to hide the data. Steganography
become more competitive among new competitors, and is the method of concealing the existence of data or
achieve time-to-market goals. While cloud technology has information. The information is encapsulated in a cover item,
many advantages, it also has some drawbacks. Data residency making it impossible for anybody to detect its presence. The
and security are two major considerations when shifting to the embedding method requires a key, without which the
cloud. Who maintains and has access to the data is referred to adversary will be unable to identify the embedded message.
as data residency. What laws apply and where is the data
stored? Will data from a data breach remain in the cloud even
after the server has been shut down? To address data residency
problems, major options include data encryption and
tokenization. Data encryption is a mathematical technique that
converts plain text data into encrypted text that can only be
read by the person who has the encryption key. Because there
is a separation of responsibilities between where the keys are
maintained and where the encryption data is stored,
encryption protects against both internal and external threats. Fig. 2. A comprehensive concept of Steganography [10].
Encryption necessitates the use of stateless servers that do not
store data. Cryptography methods alter the content of the The general principle of steganography is seen in “Fig. 2”.
communication for unauthorized parties. Stenography is a Three ideas that compete with each other are necessary for
90
Authorized licensed use limited to: GITAM University. Downloaded on August 17,2022 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON-2021)
steganography algorithms are capacity, security, and, the RSA algorithm to encrypt the text data and produce the
robustness [11]. keys and then image files to hide the encrypted data. From the
• Capacity: refers to the amount of data that the cover item can Image files, extract the encrypted data. finally Using the
conceal. decryption key, decrypt the text data. The results’
• Security: refers to the safeguarding of information such that performance will be assessed by comparing the image file
an intruder is unable to deduce its presence. quality before and after the data is hidden in these files.
• Robustness: relates to how many changes a stego item may
tolerate before the concealed information is destroyed. Ardiansyah, G., et al., [5] proposed a method of combining
Combining these techniques can increase secret information two Steganography domains with Cryptography to make
security and fulfill the security and resilience criteria for private information more secure and unavailable to
transferring sensitive data across an open channel. unauthorized individuals. The 3-DES technique is used to
encrypt messages. DWT is used to break down the cover
II. LITERATURE SURVEY picture into four sub-bands on the other side. The LSB
technique is used to insert encrypted messages in the LH, HL,
and HH subbands. The final step is to use Inverse DWT to
Bin Mohd Na et al., [1] presented a web application for
rebuild the stego picture. PSNR and MSE are used to assess the
protecting data by combining stenography with the Least
quality of the suggested technique.
Significant Bit (LSB) Algorithm and Hybrid Encryption with
RSA and AES. The RSA technique is employed as an
additional layer of protection, with the intended target’s N. H. Hassoon et al,. [6] suggested a new architecture for
private keys being the only way to open it. Create the concealing information that included cryptography and
encryption keys and encrypt the text contents with RSA. steganography. In this study, there were many methods used
Using the AES method, encrypt the public key and message. to conceal information. The first step is to encrypt a secret
LSB algorithm is applied to embed the private key and message using the Blowfish method to produce a key that will
encrypted message into the picture. The user will embed a be used to XOR a plaintext with the key during the encryption
message inside the image of their choice and publish it to procedure. The second step involves applying an edge
Google Drive, while the second party, or receiver, can detection algorithm to a cover picture to find hiding places.
download the image and extract the message back into plain Following that, the bat’s algorithm will be used on the edge
text. detection picture’s cover image to pick a random hiding place.
M. S. Abbas et al., [2] developed hybrid encryption The next step is to use the least significant bit to insert the
utilizing the AES and RSA encryption algorithms. Using the hidden message in a cover picture. The hybrid technique
LSB technique, the encrypted data will be concealed in a suggested by Negi, L. et al., [7] utilizes AES and Coverless
picture. The SHA hashing technique is used in the data image stenography. In the cryptography section, after
validation step. Before concealing the data in the image, encrypting 128-bit plaintext with a 128-bit key using the AES
compress it using the LZW technique. As a result, it is feasible technique, the encrypted message is changed to the bitstream,
to hide as much data as possible. The following processes are and the OMR sheet is bubbled by marking TRUE if the bit in
included in the proposed systems: encryption, compression, the bitstream is 1 and FALSE if the bit is 0. In this system, a
and embedding. The LSB technique is used to hide the results 128-question OMR sheet is utilized, which implies OMR
of the encryption in the image after encrypted compression contains 128 entries for storing 0/1 bits. As a result, the OMR
data. can store data up to 128 bits. The sender delivers the mapped
bubble sheet to the receiver, together with the secret key used
in the mapped sheet, and the recipient decodes the message.
A new secure communication model is presented by Dur-
Finally, this message is decrypted using the obtained key,
gadevi, S. et al., [3] that combines cryptography with
resulting in plaintext message encryption. The receiver reads
steganography techniques to create a pair of layers of security
what he or she has received.
so that the steganalyst cannot decipher the ciphertext without
knowing the secret key. The key images were first encrypted
using the Secure Force-AES algorithm, and then the encrypted Powerful hybrid image encryption and decryption method
images were concealed in the cowl image using JSTEG and are presented by Hazra, T. K., et al.,[8]. Arnold’s cat map is
LSB techniques. Using JSteg and LSB coding for combined with two more algorithms, the Criss-cross and
steganography, the encrypted secret data was hidden in a Random Shuffling methods, to create a permutation cipher
cover picture, guaranteeing extremely secure communication. that is generally far stronger. The Continuous Raster C pattern
and the LSB method will be combined in this work’s
steganography algorithm. The LSB technique will be utilized
Jassim, K. N., et al., [4] used hybrid RSA and LSB
based on the scan pattern.
algorithms to demonstrate that the integration of these
approaches is feasible and effective. The RSA algorithm is
used to encrypt the data. The data will be hidden in image files To protect data, Gupta, T. S. et al,. [9] present a
with the .bmp extension. The technique is divided into four cryptosystem that combines symmetric and asymmetric
steps, first to use cryptography. The method also includes a sub-process for
encrypting encryption keys before embedding them in a
picture. To encrypt data, the hybrid cryptosystem employs a
mix of Blowfish, RSA, and AES layers. LSB Stenography is
also utilized by the system to
91
Authorized licensed use limited to: GITAM University. Downloaded on August 17,2022 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
encrypt the keys used and embed them in an image. The • The first and last permutations are inverses and are
integration of Blowfish-RSA-AES has greatly enhanced straight Permutation boxes.
security while simultaneously addressing the shortcomings of • By applying a 48-bit key to the rightmost 32 bits, the
standalone solutions. DES function yields a 32-bit output.
• We must first extend the right input to 48 bits since
III. PROPOSED METHOD
the right input is 32 bits and the round key is 48 bits.
• After the expansion permutation, DES conducts an
XOR operation on the enlarged right portion and the
Information concealment is one of the most essential
round key.
components of information security. To achieve both
• Substitution Boxes are a type of substitution box that
steganography and cryptography, this research applies a few
is used to replace one item with another. The DES
different techniques. The design technique guarantees
algorithm employs eight S-boxes, each with 6-bit
comprehensive security of personal information in the public
input and 4-bit output.
cloud model. This is because it is open to everyone who wants
to utilize it. The suggested solution is compatible with hybrid,
private, and community cloud deployment types. The AES algorithm is built on a ’substitution–
permutation network. For 128-bit keys, AES uses 10 rounds,
twelve for 192-bit keys, and fourteen for 256-bit keys. Each
The proposed work includes the following processes as
of these rounds has its 128-bit round key, which is generated
shown in “Fig.3”. The input consists of a text file and an
from the initial AES key. There are four sub-processes in each
image file. Based on the number of characters in the file, the
cycle.
text file is split into three equal blocks. The padding was done
to divide the file into equal chunks. Different algorithms are
used to encrypt each block of text. The DES algorithm is used • SubBytes: The 16 input bytes are replaced by
for the first block of data. The AES method is used to encrypt looking up a pre-defined table (S-box) in the design.
the second block of the file, and the RC4 algorithm is used to A four-row, four-column matrix is the outcome.
encrypt the last block. RC4 is easy to use and may be quite • Shiftrows: The four rows of the matrix are shifted to
quick. AES is a very safe algorithm. In wireless routers, both the left.
ciphers are used. In encryption, DES employs a 56-bit key, • MixColumns: Each four-byte column is now
with a total of 256 potential keys. A brute force assault on modified using a distinct mathematical formula. This
such a large number of keys would be unfeasible. The Least function accepts four bytes from one column as input
Significant Bit (LSB) embedding technique is used to store and replaces them with four new bytes.
the secrete key in the image. Dropbox will store the encrypted • Addroundkey: The 16 bytes of the matrix are now
steno-text files. We can decrypt the file stored on Dropbox treated as 128 bits, and they are XORed with the
using the Hybrid decryption algorithm. round key’s 128 bits. The ciphertext is the output if
this is the final round.
92
Authorized licensed use limited to: GITAM University. Downloaded on August 17,2022 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON-2021)
Stego-Image has a secret key that is hidden inside the image. PT =PT1 +PT2 +PT3 (8)
To decode the secret key from the image, the LSB
steganography method is employed. “Fig. 6”, depicts the key
decryption procedure. IV. EXPERIMENTAL RESULTS AND DISCUSSION
93
Authorized licensed use limited to: GITAM University. Downloaded on August 17,2022 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
OUTPUT:
Encryption:
DES :
Key : F44248B6D1CC41C2
Encrypted text : Fig. 8. Key Encryption & Decryption.
57a9b3f3d14fe95fbbb4191d579ff65b8365f995
49d2d6c2dbe09cb8e9b99247
AES :
Key : AKOtROyKmwsOOhY1UUrW5w==
Encrypted text :
FsnFg7Ef81SpUswlaSbvaI2LA8ql61KdH4ET
oedNLNHwBzdNIA4pRjwBlSZjkECM
RC4 :
Key : 6MC3MfZ9iFkhr+6y3bGong==
Encrypted text :
J4H4sPVt5beDV2p+N1a4F/E88GqweAeaR8B dORj7Q0o=
94
Authorized licensed use limited to: GITAM University. Downloaded on August 17,2022 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON-2021)
95
Authorized licensed use limited to: GITAM University. Downloaded on August 17,2022 at 05:27:17 UTC from IEEE Xplore. Restrictions apply.
View publication stats