07 Padam+Paper
07 Padam+Paper
Abhigya Saxena
Assistant Professor, Department of Computer Science, YIT, Jaipur
Keywords
AES, RSA, PSNR, MSE, Encryption
Abstract
This research is focused to use a hybrid encryption method. This hybrid system uses both the AES and RSA
algorithms. To compare the efficacy of the four proposed algorithms, additional testing was done on both colour
and grayscale photographs with varied text sizes. Our methods produced higher PSNR and MSE values than the
reference data. When comparing 2D-DWT-3L with hybrid (AES and RSA) to other approaches, it was found that
while text encryption increases the security of the text, it decreases the invisibility of the cover picture. To put
it another way, text encryption exacerbates the distortion of the cover image, making it more visible to those
who shouldn't. As a result, when compared to the reference methodology used in this study, our proposed
methods were more effective in concealing hidden information.
http://actaenergetica.org 42
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
photos are captured optically. Using video cameras, some way. Place encrypted photos in database using
they are recorded and digitalized. Samples and cryptography algorithm that has been proposed.
quantization are part of the digitization process. In If you're looking for an easy way to get your kids to
the next step, these images are subjected to one or eat more fruits and vegetables, this is a good place
more of the five essential procedures. to start. (Aboul Ella Hassanien; Mohamed Elhoseny;
Data storage and transmission have become more Arun Kumar Sangaiah; Khan Muhammad, 2017)
sensitive to information security concerns. Images This century's ICT revolution has seen the rise of
and electronic data sharing have created a huge Cloud Computing (CC) and the Internet of Things.
opportunity for data security and protection of Experts believe that the CloudIoT paradigm can
personal information from unauthorised access. significantly improve healthcare services and
When it comes to data security, encryption is one of contribute to its ongoing and systematic
the most used methods. Encryption technology has improvement if it is adopted in the healthcare field.
advanced greatly in recent years, with a variety of CC and IoT integration in healthcare applications,
encryption methods being employed to protect such as smart hospitals, medicine control, and
images. Using these methods, random encryption remote medical services, is examined in this study.
keys are generated but the content itself is hidden We also cover some basic concepts like cloud
from view. Each algorithm has been created and computing and IoT in the context of health care. In
applied to ensure secure image data transfer. this study, we introduce the CloudIoT-Health
paradigm, a new approach to integrating cloud
computing and Internet of Things (IoT) for
2. LITERATURE SURVEY healthcare applications. Using the name CloudIoT-
Dr. Harsh Vikram Singh and Ms. Pushpanjali Health, this study provides a feasible vision for
Singh1 (2020) Since medical picture data are integrating current components of CC and the IoT in
routinely disseminated via public channels, the healthcare applications. Besides that, this article
security, privacy, and confidentiality of such data is seeks to describe the current state of the art and gap
of paramount importance (internet). With this, analysis of various levels of integration components
remote pre-diagnosis has been made more in CloudIoT-Health systems by assessing various
affordable and accessible in the remotest parts of the existing ideas. Finally, studies on CC and IoT
world, where there are few medical facilities. A high integration for healthcare systems have been
danger of life is associated with tampering with evaluated, together with their relevant study.. An
medical images that are sensitive and private data, extensive bibliography is provided to assist in the
therefore maintaining data integrity, confidentiality, identification of challenges and prospective research
and allowed use while storing, transferring, and avenues.
using medical images is critical. There is an ever- Jain, M.; Choudhary RC; and Kumar A Using a
increasing requirement for the protection of medical decision tree approach, a new method for encrypting
photographs transmitted via the internet. Medical medical information is provided in this article to
information is protected using cryptography, protect patient confidentiality. It is shown that the
steganography, and watermarking. In the previous secret information mapping concept provides a
few years, a number of image security techniques robust mechanism for determining the position of a
have been classified and discussed in this paper. medical carrier image's secret information hiding
Using these tools, researchers can identify research site using decision trees. The RSA technique is
gaps in medical image security and establish new being used to encrypt the patient's unique data. The
avenues for their work. RSA results in a series of blocks that are evenly
Bala Kumari and B.Kiran Bala (2017) The patient dispersed. In steganography, secret cypher blocks
picture report can be stored in a database in order to are assigned to the carrier image for data insertion
provide more protection for the patient's medical via a mapping process that uses breadth-first search.
images as well as privacy for the patient. The report With RSA decryption, the recipient receives the
has a hidden state in another image if it is attempted patient's private medical information, which can
to be viewed by third parties such as medical only be read by the recipient who is authorised to see
workers, relatives, and intruders. The MRI image of it. There are a variety of metrics used to evaluate the
the patient has been steganographically altered in performance of the medical stego and carrier
http://actaenergetica.org 43
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
images. Algorithms that have already been scanning assaults may be achieved. Color space is
developed are compared to the results. transformed during the printing and scanning
(Yehia, L., Khedr, A., & Darwish, A., 2015) Things process.
will be able to recognise one another and connect to
the internet as part of an emerging technology called 3. OBJECTIVES AND SCOPE
the Internet of Things (IoT). Smart living, smart
housing, healthcare systems, smart manufacturing, By combining a steganography approach with a
environmental monitoring, and smart logistics are hybrid encryption scheme, the goal of this research
is to increase the security of medical data transfer.
just some of the applications that will benefit from
the Internet of Things (IoT). For healthcare ➢ Develop a security system that uses
applications in the IoT, this study integrates, steganography techniques (DWT) to hide text
summarises and examines some of the security data in an image independently.
solutions, particularly hybrid techniques, that can be ➢ Improve the security of stego images by
deployed. developing an integrated security system that
includes both data encryption (AES and RSA)
(Su Wai Phyob., 2015) As electronic data sharing
and steganography (DWT) approaches.
has become more common, the importance of data
storage and transmission security cannot be ➢ Assess the system's ability to protect and
overstated. The lack of security in security retrieve the original data.
awareness applications causes a number of issues. It
is important to remember that images and text are 4. METHODOLOGY
the two most common ways to communicate. It is
An IoT security paradigm for medical data transfer
possible to protect data security using
is proposed in this work. Four continuous processes
steganography and cryptography. In other words,
make up the suggested model:
the goal of this research is to improve the security of
both images and information by combining • RSA and AES encryption methods are
cryptography with steganography approaches. combined in a suggested hybrid encryption
Images are more secure because of the proposed scheme to protect personal patient data.
block-based transformation and encryption • Second, a stego-image is created by utilising
technique, according to cryptography. It is proposed 2D-DWT-2L to hide the encrypted data.
that a block-based transformation technique be used • The embedded data is retrieved in this step.
to improve image encryption robustness. Blowfish • The encrypted data is decoded in order to get
is used to encrypt the resulting image once it has the unencrypted data.
been converted. Using the encrypted image as a An encryption cryptography method is one in which
cover for information security, a steganography messages are encoded such that hackers can't read
approach provides the data-hiding mechanism. them, but only authorised individuals can. The
Combination process (proposed transformation and Advanced Encryption Standard (AES) and the
Blowfish encryption) is shown to be more Rivest-Shamir-Adleman (RSA) algorithm are the
advantageous than single encryption by comparing two primary data encryption methods employed in
the correlation and entropy of encrypted images this study. Symmetric AES employs the usage of the
generated by combination process with the Blowfish same key on both ends. Text (plain or encryption)
technique. and keys of lengths 128,192, or 256 bits are used in
[Wen Zhang, et.al, 2018] The study plan for a fixed message block size of 128 bits. Messages
implementing and discovering the hard to duplicate that are longer than 128 bits are broken up into
and easy to detect watermarking approach. The blocks of 128 bits. Keys that are longer appear to
watermarking procedure was broken down into make the cypher harder to break, but they also make
three stages: printing, scanning, extracting, and the encryption and decryption process longer.
watermarking, according to the authors. However, RSA is a public key method that is widely
Watermarking in digital photographs employs a utilised in both the corporate and personal
technology that makes it impossible to link communication sectors. It features a configurable
watermarking algorithms to printing process factors. key size of (2-2048) bits, which makes it more
The researchers determined that the balance flexible.The frequency domain DWT steganography
between invisibility and resilience against printing techniques implemented in this research are 1-level,
http://actaenergetica.org 44
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
http://actaenergetica.org 45
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
Figure 4.1 Proposed Framework for Hiding Information using Steganography Technologies Only
Figure 4.2 Proposed Framework for Hiding Information using both Steganography and Hybrid
Encryption Algorithms
5. SIMULATION interfaces, and integrating with other programmes
written in C, C++, Java, and Fortran.
Numerical computation is made easier by
MATLAB, a programming language developed by There are many ways to document and share your
the MIT Media Lab for the fourth generation. work with MATLAB. MATLAB code can be
MATLAB, created by Math Works, is a powerful integrated into other languages and applications, and
tool for manipulating matrices, graphing functions MATLAB techniques and applications can be
and data, implementing algorithms, creating user distributed. The following are the simulation steps:
http://actaenergetica.org 46
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
Figure 5.3 Input Colour Image Figure 5.4 Input Gray Image
Figure 5.5 1-Level Decomposed Cover Image Figure 5.6 2-Level Decomposed Cover Image
Figure 5.7 3-Level Decomposed Cover Image Figure 5.8 3-Level Embedded Image
http://actaenergetica.org 47
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
http://actaenergetica.org 48
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
Figure 5.12 Histogram Analysis of Proposed System for Grey Scale Image
http://actaenergetica.org 49
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
our methods were greater than those found in the [5]. Bairagi, A. K., Khondoker, R., & Islam, R. (2016).
reference data. But while text encryption increases An efficient steganographic approach for
the security of the text, it reduces the invisibility of protecting communication in the Internet of
Things (IoT) critical infrastructures. Information
the cover image, which was observed when
Security Journal: A Global Perspective, 25(4-6),
comparing 2D-DWT-3L with hybrid (AES and
197-212.
RSA) to other techniques. To put it another way, text [6]. Anwar, A. S., Ghany, K. K. A., & Mahdy, H. E.
encryption exacerbates the distortion of the cover (2015).Improving the security of images
image, making it more obvious to people who transmission. International Journal of Bio-Medical
shouldn't see it. As a result, when compared to the Informatics and e-Health, 3(4).
reference methodologies employed in this [7]. Ahmed Abdelaziza, Mohamed Elhoseny, Ahmed
investigation, our proposed approaches performed S. Salama, A.M. Riad,”A Machine Learning
better at concealing secret data. Model for Improving Healthcare services on
Cloud Computing Environment”, Measurement,
Volume 119, April 2018, Pages 117-128, 2018
Future Work (https://doi.org/10.1016/j.measurement.2018.01.0
22)
We can improve information security procedures in
[8]. Paschou, M., Sakkopoulos, E., Sourla, E., &
the future and provide a channel for safe data
Tsakalidis, A. (2013). Health Internet of Things:
transmission. It is possible to extend this work to Metrics and methods for efficient data transfer.
operate with other types of data files, such as video Simulation Modelling Practice and Theory, 34,
and audio. Each Arabic text in the cover media may 186-199.
be used to construct a powerful strategy for hiding [9]. Muhammad Sajjad, Mansoor Nasir, Khan
Arabic text in the cover media. The larger the Muhammad, Siraj Khan, Zahoor Jan, Arun Kumar
implementation, the more likely it is that we'll be Sangaiah, Mohamed Elhoseny, Sung Wook Baik,
able to mimic numerous parties exchanging "Raspberry Pi assisted face recognition framework
for enhanced law-enforcement services in smart
messages (normal and covert communication). A
cities", Future Generation Computer Systems,
quantum steganography system that cannot be
Elsevier, 2018 (DOI:
duplicated will be introduced to strengthen the https://doi.org/10.1016/j.future.2017.11.013)
currently used approach of quantum steganography, [10]. Kumar, P., & Lee, H. J. (2011). Security issues in
making it stronger than conventional steganography. healthcare applications using wireless medical
sensor networks: A survey. Sensors, 12(1), 55-91.
[11]. Razzaq, M. A., Sheikh, R. A., Baig, A., & Ahmad,
REFERENCES A. (2017). Digital image security: Fusion of
[1]. Ms. Pushpanjali Singh1 and Dr. Harsh Vikram encryption, steganography and watermarking.
Singh, “Analysis of Data Security for Medical International Journal of Advanced Computer
Images”, Journal of Critical Reviews ISSN- 2394- Science and Applications (IJACSA), 8(5).
5125 VOL 7, ISSUE 19, 2020. [12]. Dey, N., & Santhi, V. (Eds.). (2017). Intelligent
[2]. Bala B. K, Kumar A. B. “The Combination of Techniques in Signal Processing for Multimedia
Steganography and Cryptography for Medical Security. Springer International Publishing.
Image Applications”, Biomed Pharmacol J [13]. Jain, M., Choudhary, R. C., & Kumar, A. (2016).
2017;10 (4). Secure medical image steganography with RSA
[3]. Ashraf Darwish, Aboul Ella Hassanien, cryptography using decision tree. In
MohamedElhoseny, Arun Kumar Sangaiah, Khan Contemporary Computing and Informatics (IC3I),
Muhammad, The Impact of the Hybrid Platform of 2016 2nd International Conference on (pp. 291-
Internet of Things and Cloud Computing on 295). IEEE.
Healthcare Systems: Opportunities, Challenges, [14]. Yehia, L., Khedr, A., & Darwish, A. (2015).
and Open Problems, Journal of Ambient Hybrid security techniques for Internet of Things
Intelligence and Humanized Computing, 2017 healthcare applications. Advances in Internet of
(https://doi.org/10.1007/s12652-017-0659-1) Things, 5(03), 21.
[4]. Abdulaziz Shehab, Mohamed Elhoseny, Khan [15]. Zaw, Z. M., & Phyo, S. W. (2015). Security
Muhammad,Arun Kumar Sangaiah, Po Yang, Enhancement System Based on the Integration of
Haojun Huang, Guolin Hou;Secure and Robust Cryptography and Steganography. International
Fragile Watermarking Scheme for Medical Journal of Computer (IJC), 19(1), 26-39.
Images, IEEE Access, Volume: PP, Issue: 99, [16]. Gupta, R. K., & Singh, P. (2013). A new way to
(DOI: 10.1109/ACCESS.2018.2799240). design and implementation of hybrid crypto
system for security of the information in public
http://actaenergetica.org 50
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
http://actaenergetica.org 51
Padam Kumar Verma et al. | Acta Energetica 3/46 (2022) | 42–52
http://actaenergetica.org 52