ISSN: 2229-371X
Ramveer Singh*1, Sanjive Tyagi 2, Awakash Mishra3, Akshay Tyagi4, Deo Brat Ojha5
|
Corresponding Author: Ramveer Singh, E-mail: ramveersingh_rana@yahoo.co.in |
Related article at Pubmed, Scholar Google |
Visit for more related articles at Journal of Global Research in Computer Sciences
In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double – EHDES over Teeming Channel. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and crucial. In this paper, we establish the complete arrangement of combination of encryption and compression with double EHDES while transmitting over media.A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.
Keywords |
Double - EHDES, Cryptography, Stegnography, Compression, Image File, Error Correction Code. |
INTRODUCTION |
Steganalysis is a technology which determines the presence of a hidden message or image in cover image and attempt to disclose the actual contents of this message [1].A more erudite method of steganography is by merging the two techniques to produce more security to secure data transmission such that if intruders detect the presence of data even then message cannot be decode without the knowledge of key. |
The most common stegno method is the LSB approach, or Least Significant Bit. As we know digital pixels are represented by three colors: red, green and blue. These colors together form digital pictures or video. Each color of every pixel requires 1 byte or 8 bits of information. Since the first bit is the ―least significant‖ or carries the least amount of importance in the byte, this steganographic technique chooses to overwrite the first bit of successive bytes until the entire secret message is embedded into the original source file, or the cover data. Since we have only modified the least significant bits of a portion of the source file, the human eye should not be able to detect the degradation in the picture or video [2]. |
PRELIMINARIES |
1. Stegnography: |
Steganography is a technique used to embed secret information into non-secret information, preventing the message from being detected by non-authorized people.[3] |
The purpose of steganography is to hide the very presence of communication by embedding messages into innocuous-looking cover objects, such as digital images. To accommodate a secret message, the original cover image is slightly modified by the embedding algorithm to obtain the stego image. The embedding process usually incorporates a secret stego-key that governs the embedding process and it is also needed for the extraction of the hidden message [4]. |
There are three basic views behind hiding information. The first is capacity, which is the amount of information that can be embedded within the cover file. An information-hiding algorithm has to be able to compactly store a message within a file. Next is security, which refers to how a third-party can detect hidden information within a file. Intuitively, if a message is to be hidden, an ideal algorithm would store information in a way that was very hard to notice. High security layers have been proposed through three layers to make it difficult to break through the encryption of the input data and confuse steganalysis too. Various encryption techniques like cryptography, digital watermarking, steganography etc have already been introduced in attempt to address these growing concerns [5]. |
Steganography have four application areas: |
Copyright Protection. It has security, invisibility and robustness requirements. Watermark techniques fit in this area. |
Authentication. It has security and invisibility requirements. Digital signature fits in this area. |
Secret and Invisible Communication. It has requirements for security, invisibility and insertion of high volumes of secret data. [6] |
2. Cryptography |
Cryptography is a branch of applied mathematics that aims to add security in the ciphers of any kind of messages. Cryptography algorithms use encryption keys, which are the elements that turn a general encryption algorithm into a specific method of encryption. The data integrity aims to verify the validity of data contained in a given document. [7] |
DEFINITION: |
2.1 EHDES |
In Enhanced Data Encryption Standard (EHDES), we use the block ciphering of data and a symmetric key. As traditional Data Encryption Standard (DES), we also break our data into 64-Bit blocks and use a symmetric key of 56-Bit. |
3.1 Enhanced Data Encryption Standard (EHDES) |
Enhanced Data Encryption Standard (EHDES) having three phases. |
three phases. 1. Key Generation. 2. Encryption on Input Data. 3. Decryption on Input Cipher. |
3.1.1 Key Generation |
Figure 3: Process of new generated key (Knew i) of EHDES. |
In this phase of EHDES, We moderate the initial 56 Bit key using Random Number Generator (RNG) for every block of message (M1, M2, M3 ...Mn). The new generated 56 Bit keys (Knew1, Knew2, Knew3................ Knew n) from initial key K is used for encryption and decryption for each block of data. For new keys, we generate a random number and implement a function F on generated random number (NRNG) and the initial key K. |
algorithm Double - EHDES in which we use generated secret key which are calculated using Double - EHDES key generation process. Secret key is used at both sender side and receiver side. Secret key are always different using Double - EHDES algorithm with modification that a mathematical function F. This function using a value depends on the decimal value of the R array of each pixel of cover image. The first letter corresponding to the first pixel and next to the second pixel and so on . |
A mathematical function F is using R array of each pixel of cover image and initial key K for generating the Secret key Knew i.The encrypted code is taken digit by digit. This approach constitutes the phase one security in our work. |
Now in the second phase of work, we have used Sequitur loss less compression technique to compress the encrypted text so that we can hide large amount of data in cover image. |
In next phase, we have introduced the hiding of encrypted and compressed text file into any cover image. |
In our work secret key are always different because we are generating randomly number based on the confidential message text and original cover image. This method is a unique to generate random number such that no one can guess the random number to crack the secret key. |
A. Algorithm for encrypting the confidential message |
B. Algorithm for compress the confidential message |
– Sequitur and Error Correction Code – Fuzzy error correction code. |
References |
|