a novel approach for transfer of large data of secret messages … · 2018. 9. 29. · a novel...

14
A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela 1 , Dr. G Samuel Vara Prasad Raju 2 , Macha Ganesh Babu 3 and Prathipati Ratna Kumar 4 1 Assistant Professor, Department of Computer Science and Engineering, Sir C R Reddy College of Engineering, Eluru, Andhra Pradesh, India. [email protected] 2 Professor, Department of Computer Science and Engineering, Andhra University, Visakhapatnam, Andhra Pradesh, India. [email protected] 3 Assistant Professor, Department of Computer Science and Engineering, Sir C R Reddy College of Engineering, Eluru, Andhra Pradesh, India. [email protected] 4 Professor, Department of Computer Science and Engineering, V S L Engineering College, Kakinada, Andhra Pradesh, India. [email protected] Abstract Technology is growing very fast and rapidly making so many changes in the technology. Communication plays a key role in now a day’s technology. There are some mes- sages which should be kept secret from other persons. Main- taining this secrecy and passing them to correct person is International Journal of Pure and Applied Mathematics Volume 120 No. 6 2018, 4661-4674 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ 4661

Upload: others

Post on 25-Sep-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

A Novel Approach for Transfer of LargeData of Secret Messages Through Media

Homer Benny Bandela1,Dr. G Samuel Vara Prasad Raju2,

Macha Ganesh Babu3 and Prathipati Ratna Kumar41Assistant Professor, Department of Computer Science

and Engineering, Sir C R Reddy Collegeof Engineering, Eluru, Andhra Pradesh, India.

[email protected], Department of Computer Science

and Engineering, Andhra University, Visakhapatnam,Andhra Pradesh, [email protected]

3Assistant Professor, Department of Computer Scienceand Engineering, Sir C R Reddy College

of Engineering, Eluru, Andhra Pradesh, [email protected]

4Professor, Department of Computer Scienceand Engineering, V S L Engineering College,

Kakinada, Andhra Pradesh, [email protected]

Abstract

Technology is growing very fast and rapidly making somany changes in the technology. Communication plays akey role in now a day’s technology. There are some mes-sages which should be kept secret from other persons. Main-taining this secrecy and passing them to correct person is

International Journal of Pure and Applied MathematicsVolume 120 No. 6 2018, 4661-4674ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/

4661

Page 2: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

called security. Message passing with encryption and de-cryption techniques are called cryptography. Message pass-ing within images and video is related to stenography. Thispaper focuses on sending more secret data using video tech-niques. Computer video contains series of similar images,which these images are run to form motion. Based on pix-els we can save large secret data in images. This type isrequired while travelling through submarines. Where theremay not have continuous communication between the gen-erals and submarine crew.

Key Words : Encryption, Decryption, Stenography,Communication, Submarine.

1 Introduction

Communication plays a lead role in day-to-day life. Communi-cation can be between people, groups, machines and other thingsin the world. If anybody want to anything, it is possible by com-munication. Communication can be by text, voice, signal, imagesand other procedures. Communication can be of two types one ispublic and private communications. Public communication can bebetween two or more people and everything is public. Whereas pri-vate communication is meant for certain group not to all. This typeof communication cannot be open. If it is open compulsory thereis a chance to other people. Figure1 gives the details of differencebetween public and private communication.

Figure 1: Communication

International Journal of Pure and Applied Mathematics Special Issue

4662

Page 3: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

Communication can be by voice, if the parties are available verynear. Communication can be text if the parties are very far. Whenpublic communication there is no problem. If the private commu-nication then the text should be encrypted before sending and de-crypted before receiving. This is called cryptography. Most therewill be text message between the people of groups of people. Thistext messaging is the art of preparing, composing and sending e-messages, typically consisting of alphabetic and numeric charactersbetween two or more persons who use mobile phones, tablets, desk-tops, laptops or other devices. Testing can be done over cellularnetwork, or may also be sent via an internet connection. This typeof communication is mostly used in between military of database.

A military is a force authorized to use lethal or deadly forceand weapons to support the interests of their leaders or all of itsnationals. Military means it consists of an army, navy, air forceand in certain countries the marine and wart guard. Military is notlocated at one place. They may be located at different places inthe country. There may be different commands takes place fromhead quarters to different military camps. If they communicatenormally the commands may be shared among different people,which is highly confidential. The communication within militaryshould be encrypted and decrypted.

In cryptography, encryption is the method of encoding a mes-sage of information in such a way that only authorized parties canaccess it and those who are not authorized cannot. In an encryp-tion, the intended message, referred to as plain text, is encryptedby using an encryption algorithm-a cipher text can be read only ifdecrypted.

Text t = l1, l2, l3, l4, l5, l6,...................................(1)

Encryption p(t) = l1+e, l2+e, l3+e, l4+e,............(2)

Decryption p(t) = l1-e, l2-e, l3-e, l4-e,...................(3)

International Journal of Pure and Applied Mathematics Special Issue

4663

Page 4: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

2 Literature Review

Alaa A Jabbar Altary et.al, focus on programs related to stegan-ography. Steganography is the science and art of hiding the exis-tence of a message between sender and receiver paper focus onimage steganography.

Shashikala Channalli et.al, focus on sending and displaying thehidden information especially in public places. Different methodshave been proposed for hiding information. One method for hidingof information on the bill board display. May technique is related toimage, Private mailing system using symmetric key steganographytechnique and LSB is used to hide secret message.

Ramadhan Mstafa et.al, focus on innovation of technology forhiding information. The steganography digital water marking pro-vide methods that users can hide and min their information withinother information, which makes others to understand it key at-tributes.

Pria Bhartu et.al, focus steganography system that embeddedhidden content is unremainable cover media and no doubt for at-tributes. Author introduces novel schema for the embedding datain images is cryptography, combined cryptography and steganogra-phy process is one algorithm. Last bits are loaded with the secretmessage. It is a improved algorithm.

Dr. Raj Kumar L. Biradar et.al, focus on importance of in-formation hiding techniques in communication process. Data isembedding is achieved in communication, image, text, voice, ormultimedia content for copy rights, military communication, au-thentication and many other purposes. Paper focuses on criticallyanalyzed various steganography techniques.

A.Soria-Lorente et.al, focus on a novel steganography methodbased on the compression standard according to the joint photo-graphic expert groups and an entropy threshold technique. Con-verts secret message to binary bits, Insertion tables eventually placeat the first seven AC coefficients in the transformed DCT domain.Before insertion message gusto various transformations experimen-tal process contains PSNR(Peak Signal to Noise Ratio).

Navneet Kaur et.al, focus on information hiding in multimediacarrier, e.g. image, audio and video files. Hiding text in an im-age file using east significant bit (LSB) based on steganography,

International Journal of Pure and Applied Mathematics Special Issue

4664

Page 5: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

Discreet Wavelet Transform (DWT) based steganography.MS. G. S. Sravanthi et.al, steganography is the art and sci-

ence of hiding secret message by embedding data into cover media.Method is based on plane bit substitution method (PSBSM) tech-nique in which message bits are embedded into the pixel value(s)of an image.

C. P. Sumathi et.al, focus on sharing sensitive information ina network communication. Paper focus on steganography, wheremodern data compression, Information theory, Greed Spectrum andCryptography that specifies steganography methods and recent de-velopments in the field of hiding information.

3 Existing System

Message passing is not a new domain; it is followed from ancientperiod onwards. King used send secret messages through pigeonsand eagles. They are not in understandable knowledge. Only thesender and receivers used know the secret messages. People usedto talk each other and sometimes they want share their ideas or in-formation only with them and not with all. Secret message passingstarted at that time. Technology is taking various shapes in it isdevelopment. Now it is term for video steganography. In past dayswe had heard about cryptography that is related to sending secretmessage from one system to another system. It had advancementtowards steganography on images. We can hide secret messages ina image based on pixels RGB. They are limited to short messages.

4 Proposed System

Bulk of messages or information can be passed using videosteganography. Steganography with video is a model in previ-ous sessions. Message passing is not modern thing. It tools areplayed from ancient days onwards to till today. Main paper focus onatomic view of transferring secret message using video. Video canbe recorded or already existing one. Divide video stream into im-ages. Previous process we can send limited secret messages throughsteganography. Video system is series of photographs. These pho-tographs are run with timing to give motion.

International Journal of Pure and Applied Mathematics Special Issue

4665

Page 6: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

5 Implementation

Model related Steganography

Steganography in the process of concating the message withinother non-secret text or data.these data or text can be used anthe source to hide message what are want to send text is a partmethod.Data is divided into different types as shown in below fig-ure.

Figure 2: For Data

Based on steganography are can use image as video data to hideour secret message in this paper we focus on video data.

Sender Receiver Image

International Journal of Pure and Applied Mathematics Special Issue

4666

Page 7: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

Algorithm:

Algorithm contains MEC and MDC. Where MEC(Message Encryp-tion Chamber)in for sender. MDC(Message Decryption Chamber)for receiver.

MEC: (Message Encryption Chamber)

1. Prepare Message to send

2. Collect/shoot any video

3. De-centraline them to frames(images)

4. Connect image to RGB pixels with bits

5. Convert original message into bits

6. Add original message to the pixel bits

7. Combine all frames(images)into a movie.

8. Send an video to any person

MDC: (Message Decryption Chamber)

1. Collect video which was send by sender

2. De-Centralize them into frames

3. Convert messages to RGB pixels with bits

4. Collect bits from RGB pixels.

5. Frame these bits into messages

6. Tag original message.

Implementation:

Develop Software for MEC and MDC this software should beavailable with sender and receiver implementation can be followedby model and algorithm message encryption chamber should beencrypted secret message to the video message decryption chambershould be like that receive video and decrypt the secret messagefrom video.

International Journal of Pure and Applied Mathematics Special Issue

4667

Page 8: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

MEC:

Step 1: Prepare sent message for encryption

Plain text = a1 + a2 +..... ———–(1)

a1,a2,......=alphabet/numeric value

Step 2: Convert plain text to ASCII binary form as binary stringmatrix.

Step 3: Get video/short film prepared or download

Step 4: Get video frames frame is a snapshot of the video. Videois prepare by all snapshots of photography in a sequentialorder and run with tuning.

V1 = pic1 + pic2 +...... ————(3)

Step 5: Convert each pic to RGB pixels each pixel contain RGB(Red, Green, Blue) pixels in digital way ,a pixel,pel,dotsor picture element in an all points assemble in displaydevice do it is the smallest controllable element if a picturerepresented on the screen.

Examples:

Lemon yellow has R = 255 G = 255 and B = 0

For every pixel we have RGB and color is based on thethree combinations let us assume that there are 50 pixelsfor 50 KB image pic.

Step 6: Scatter sequentially all 50 pixels in a matrix form

Matrix:

International Journal of Pure and Applied Mathematics Special Issue

4668

Page 9: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

Step 7: Arrange all bits of secret message in a column mannersequential.

Step 8: Arrange all bits of secret message in a sequential R G Bpixels in form bit 0 position onwards.

Matrix:

International Journal of Pure and Applied Mathematics Special Issue

4669

Page 10: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

Note:

Example for bit 3 position only. If later position the thirdperson can easily below that there is some hidden message.

Step 9: Prepare message for export to receiver

Vice-versa for MDC model.

6 RESULT

Defence department has a vital view in sending secret messages.Submarine or spacecrafts like devices may be unable to maintaincommunication continuously with the ground surface. Governmentwant to send messages or actions that should take place in courseof action in period. Government can send one set of actions totheir devices. These messages can be grouped into images that toosimilar images and make a motion film. The result graph of suchdevices is shown below figure 3.

Figure 3: More images and more messages

International Journal of Pure and Applied Mathematics Special Issue

4670

Page 11: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

7 Conclusion

Drastically growing area is steganography, we can use all meth-ods and algorithms in defence fields. As technology is growing thehurdles related to the safety of the weapons and devices also in-crease. This paper focus on sending bulk messages from source todestinations through video steganography. The technique and toolis similar to image steganography. The main method is relatedto similar images. Original film is take into series of images andwe hide the secret message in images and steganography video isprepared. Prepared version is send to the source party.

References

[1] “An Introduction to Image Steganography Techniques”, Alaaa Jabbar Altay, Shahrin Bin Sahib, Mazdak Zamani, IEEE,2012.

[2] “Steganography an Art of Hiding Data”, Shashikala Channalli,Ajay Jadhav, IJCSE, 2009.

[3] “Information Hiding in Images using Steganography Tech-niques”, Ramadhan J. Mustafa, Christian Bach, ASEE North-east Section Conference 2013.

[4] “A New Approach of Data Hiding in Images using Cryptog-raphy and Steganography”, Pria Bharathi, Roapalisoni, IJCA,2012.

[5] “A Survey Paper Steganography Techniques”, Dr. Rajkumar,L. Biradan, Ambika, Uma shetty, IJIRCCE, 2016.

[6] “A Secure Steganographic Algorithm based on Frequency Do-main for the Transmission of Hidden Information”, A SoriaLorente, S. Berres, Hindawi Security and Communication Net-works, 2017.

[7] “A Survey on Various Types of Steganography and Analysis ofHiding Techniques”, Navneet Kumar, Sunny Behal, IJETT,2014.

International Journal of Pure and Applied Mathematics Special Issue

4671

Page 12: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

[8] “A Spatial Domain Image Steganography Techniques Based onPlane Bit Substitution Method”, Ms. G. S. Sravanthi, Mrs. B.Sunitha Devi, S. M Riyazoddin, M. Jaya Reddy.

[9] “A Study of various Steganographic Techniques used for In-formation Hiding”, C.P.Sumathi, T.Santhanam, G.Uma Mah-eswari.

[10] “Unbeen: An Overview of Steganography and Presentation ofAssociated Java Applications Chide”, Jessica Codr, Prof. RajJain.

[11] “Steganography Techniques: A Review Paper”, Jasleen Kow,Deepankar Varma, IJERMT, 2014.

[12] “Steganography Techniques: A Review”, Pravin Kamble, Mr.Prakash S. Wasnqmode, Vilas S Gaikwad, Mr. Ganesh BThosade, IJERT, 2013.

[13] “Image Steganography: A Review”, Shikha Sharda, SumitBudhiraja, IJETAE, 2013.

[14] “Dual Steganography: A New Hiding Techniques for Digi-tal Communication”, Jigar Makwana, S. G Chudasama, IJA-REEIE, 2016.

[15] “A Hybrid Approach of Image Steganography”, Dilpreet Kaur,Harsha Kumar Verma, Ravindra Kumar Singh, IEEE Xplore,16 January 2017.

[16] “A Secure Robust Gray Scale Image Steganography using Seg-mentation”, Mohammed J. Bawareh, Atef A. Obeidat, JIS,2016.

[17] “Digital Image Security: Function of Encryption, Steganogra-phy and Watermarking”, Mirza Abdur Razag, Mirza AdnanBaiz, Riaz Ahmed Shaikh, Ashfaque Ahmed Menon, IJACSA,2017.

[18] “Video Steganography using Zero Order Hold Method for Se-cure Data Transmission”, Shashidhara H. N, Usha B. A, IJCA,2017.

International Journal of Pure and Applied Mathematics Special Issue

4672

Page 13: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

[19] “New Image Steganography Method using Zero Order HoldZooming”, Abdelngeid, Tarak, Al-Hussain, Shaimaa, IJCA,2016.

[20] “Video Steganography using Encrypted Payload for SatelliteCommunication”, Swadin, Kaustudh, Chiras, IEEE, 2017.

International Journal of Pure and Applied Mathematics Special Issue

4673

Page 14: A Novel Approach for Transfer of Large Data of Secret Messages … · 2018. 9. 29. · A Novel Approach for Transfer of Large Data of Secret Messages Through Media Homer Benny Bandela1,

4674