synopsis for separable reversible data hiding in encrypted image using aes

35
Department of Information Technology Pillai’s Institute of Information Technology, Engineering, Media Studies & Research New Panvel – 410 206 CERTIFICATE This is to certify that the requirements for the synopsis entitled ‘SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE’ have been successfully completed by the following students: Name Roll No. Ronak Bhatia 06 Pawan Jagtap 20 Ashish Gupta in partial fulfilment of Bachelor of Engineering of Mumbai University in the Department of Information Technology, Pillai’s Institute of Information Technology, Engineering, Media Studies & Research, New Panvel during the academic year 2015 – 2016. Internal guide ________________ External guide (if any) ________________ (Prof. Dipti Lawand) (Name of External Guide)

Upload: sanjaybhatia

Post on 04-Dec-2015

21 views

Category:

Documents


2 download

DESCRIPTION

Synopsis for separable Reversible data hiding in encrypted image using AES

TRANSCRIPT

Page 1: Synopsis for Separable reversible data hiding in encrypted image using AES

Department of Information Technology

Pillai’s Institute of Information Technology,

Engineering, Media Studies & Research

New Panvel – 410 206

CERTIFICATE

This is to certify that the requirements for the synopsis entitled ‘SEPARABLE

REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE’ have been successfully

completed by the following students:

Name Roll No.

Ronak Bhatia 06

Pawan Jagtap 20

Ashish Gupta in partial fulfilment of Bachelor of Engineering of Mumbai University in the Department of

Information Technology, Pillai’s Institute of Information Technology, Engineering, Media

Studies & Research, New Panvel during the academic year 2015 – 2016.

Internal guide ________________ External guide (if any) ________________

(Prof. Dipti Lawand) (Name of External Guide)

Internal Examiner ________________ External Examiner ________________

Head of Department ______________ Principal _________________

(Dr. Madhumita A. Chatterjee) (Dr. R. I. K. Moorthy)

Page 2: Synopsis for Separable reversible data hiding in encrypted image using AES

A PROJECT SYNOPSIS ON

SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGE

SUBMITTED BY

RONAK BHATIA

PAWAN JAGTAP

ASHISH GUPTA

UNDER THE GUIDANCE OF

PROFESSOR DIPTI LAWAND

DEPARTMENT OF COMPUTER ENGINEERING

PILLAI’S INSTITUTE OF INFORMATION TECHNOLOGY,

ENGINEERING, MEDIA STUDIES & RESEARCH

NEW PANVEL – 410 206

UNIVERSITY OF MUMBAI

Academic Year 2015 – 16

Page 3: Synopsis for Separable reversible data hiding in encrypted image using AES

ACKNOWLEDGEMENT

Dedication, determination plays a key role in success of human life as well as

inspiration and motivation plays a key role in success of any venture. At this level of

understanding it is difficult to understand the wide spectrum of knowledge without proper

guidance and advice.

We would like to take this opportunity to express our sincere thanks to, Dr.

Madhumita A. Chatterjee (H.O.D) and our project guide Prof. Dipti Lawand who have

shown us the way all throughout the venture. Her kind co-operation & encouragement has

helped us in doing the project. We are indebted to her for spending her valuable time in

guiding us with minute details of our project.

We would like to express our gratitude and appreciation to all those who gave us the

possibility to complete this report. A special thanks to our final year project coordinators,

Prof. Madhu Nashipudi, and Prof. Sushopti Gawade whose help, stimulating suggestions

helped us especially in writing this report.

Also this is the best opportunity to thank our Dr. R. I. K. Moorthy for his timely help

and guidance.

Our special thanks to the college faculty members, without their guidance our

embarking on this project would not have been successful. We would take this opportunity to

thank the staff of the IT department for providing us literature.

Ronak BhatiaPawan JagtapAshish Gupta

Page 4: Synopsis for Separable reversible data hiding in encrypted image using AES

INDEX

i Abstract

1. Introduction……………………………………………… 1 1.1 Aims and objectives

1.2 Problem Statement 1.3 Scope

2. Literature Survey

3 Existing system (if any)

4 Proposed SystemMethodology (your approach to solve the problem)

5 AnalysisDetails of Hardware & Software

6 Design details

7 Implementation Plan for next semester

8 References(Books, Papers, Websites referenced)

Page 5: Synopsis for Separable reversible data hiding in encrypted image using AES

ABSTRACT

The field steganography is a very popular technique for sending secret messages and a lot of

researches are going on it. We intend to do something on separable and reversible encrypted

data hiding in encrypted image using Rijndael algorithm which is an iterated block cipher

algorithm that uses encryption or decryption of a block of data that is accomplished by the

iteration of a specific transformation. As input, Rijndael accepts 1-D 8-bit byte arrays that

create data blocks. The plaintext is input and then mapped onto state bytes. The cipher key is

also a 1-D 8-bit byte array. The design of Rijndael is based on easily understandable

mathematical concepts including finite field mathematics and linear algebra and matrix

manipulation. Using an encryption key, the person which has information to send encrypts the

original image. Then a user may compress the least significant bits of the image which are

going to be encrypted using a data-hiding key, to create a sparse space for occupying some

data. With an encrypted image containing data, if a receiver has the data-hiding key, he can

extract the data without knowing the content of the image. The receiver cannot extract the data

by just having an encryption key, but by having this key, he can decrypt to obtain an image

similar to the original one. If the receiver has both the data-hiding key and the encryption key,

he can extract the additional data to recover the original content without any error by

exploiting the spatial correlation in natural image when the amount of additional data is not too

large.

Page 6: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 1

Introduction

In the current trends of the world, the technologies have advanced so much that most of

the individuals prefer using the internet as the primary medium to transfer data from one

end to another across the world. There are many possible ways to transmit data using the

internet: via emails, chats, etc. The data transition is made very simple, fast and accurate

using the internet. However, one of the main problems with sending data over the internet

is the security threat it poses i.e. the personal or confidential data can be stolen or hacked

in many ways. Therefore it becomes very important to take data security into

consideration, as it is one of the most essential factors that need attention during the

process of data transferring. Data security basically means protection of data from

unauthorized users or hackers and providing high security to prevent data modification.

This area of data security has gained more attention over the recent period of time due to

the massive increase in data transfer rate over the internet. In order to improve the

security features in data transfers over the internet, many techniques have been developed

like: Cryptography, Steganography. While Cryptography is a method to conceal

information by encrypting it to cipher texts and transmitting it to the intended receiver

using an unknown key, Steganography provides further security by hiding the cipher text

into a seemingly invisible image or other formats.

Page 7: Synopsis for Separable reversible data hiding in encrypted image using AES

1.1 AIM AND OBJECTIVE

The aim of this project is to retrieve data from image content. The amount of digital

images has increased rapidly on the Internet. Image security becomes increasingly

important for many applications, e.g., confidential transmission, video surveillance,

military and medical applications. For example, the necessity of fast and secure diagnosis

is vital in the medical world. Nowadays, the transmission of images is a daily routine and

it is necessary to find an efficient way to transmit them over networks. To decrease the

transmission time, the data compression is necessary. The protection of this multimedia

data can be done with encryption or data hiding algorithms. Since few years, a problem is

to try to combine compression, encryption and data hiding in a single step. For example,

some solutions were proposed in to combine image encryption and compression. Two

main groups of technologies have been developed for this purpose. The first one is based

on content protection through encryption. There are several methods to encrypt binary

images or gray level images. The second group bases the protection on data hiding, aimed

at secretly embedding a message into the data. Nowadays, a new challenge consists to

embed data in encrypted images. Previous work proposed to embed data in an encrypted

image by using an irreversible approach of data hiding or data hiding, aimed at secretly

embedding a message into the data. A new idea is to apply reversible data hiding

algorithms on encrypted images by wishing to remove the embedded data before the

image decryption. Recent reversible data hiding methods have been proposed with high

capacity, but these methods are not applicable on encrypted images. Data security

basically means protection of data from unauthorized users or hackers and providing high

security to prevent data medication. This area of data security has gained more attention

over the recent period of time due to the massive increase in data transfer rate over the

internet. In order to improve the security features in data transfers over the internet, many

techniques have been developed like: Cryptography, Steganography. While Cryptography

is a method to conceal information by encrypting it to cipher texts and transmitting it to

the intended receiver using an unknown key, Steganography provides further security by

hiding the cipher text into a seemingly invisible image or other formats. In Order to be

able to define our system architecture, we must first dearly state what our objective that

will driver system behaviour at the same one of our objective is to create an experience,

which is not only unique to the (user) client, but also makes him feel that he has loyal

Page 8: Synopsis for Separable reversible data hiding in encrypted image using AES

attachment to the system and approaches us whenever he/she needs. To achieve better

results and success by implement computerized process instead of manual process.

Page 9: Synopsis for Separable reversible data hiding in encrypted image using AES

1.2 PROBLEM STATEMENT

The previous existing system deals with transmission of a message or data without allowing

unauthorized access over the internet but with lesser security using the basic approach of

steganography technique.

1. If any one key is lost while transmission we can’t extract the data.

2. If the mail doesn’t reach the expected client.

3. If the mail used is corporate mail ID.

Page 10: Synopsis for Separable reversible data hiding in encrypted image using AES

1.3 SCOPE

It can be used in banking sector where ATM pin is hidden inside image and the image is

encrypted with credentials along with password to decrypt the image and retrieve the relevant

data from it and send to the user through mail. At the user side, user decrypt the image with

the appropriate password provided by the Bank and also decrypt the File in which they

provide additional password to extract the ATM pin from image. If users provide a valid data

hiding key then he get the relevant ATM pin from the image.

Page 11: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 2

Literature Review

STEGANOGRAPHY:

Steganography is the art and science of writing hidden messages in such a way that no one,

apart from the sender and intended recipient, suspects the existence of the message, a form of

security through obscurity. The word Steganography is of Greek origin and means "concealed

writing" meaning "covered or protected", Generally, messages will appear to be something

else: images, articles, shopping lists, or some other cover text and, classically, the hidden

message may be in invisible ink between the visible lines of a private letter. It is high security

technique for long data transmission. Steganography is the process of hiding the one

information into other sources of information like text, image so that it is not visible to the

natural view. There are varieties of stenographic techniques available to hide the data

depending upon the carriers we use.

Fig 2.1 Block diagram for Steganography

Page 12: Synopsis for Separable reversible data hiding in encrypted image using AES

Steganography and cryptography both are used for the purpose of sending the data securely.

The same approach is followed in Steganography as in cryptography like encryption,

decryption and secret key. In Steganography the message is kept secret without any changes

but in cryptography the original content of the message is differed in different stages like

encryption and decryption.

Steganography supports different types of digital formats that are used for hiding the data.

These files are known as carriers. Depending upon the redundancy of the object the suitable

formats are used. “Redundancy” is the process of providing better accuracy for the object that

is used for display by the bits of object.

The main file formats that are used for Steganography are Text, images, audio, and video.

Page 13: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 3

Existing System

In the existing system reversible data hiding technique the image is compressed [3] and

encrypted by using the encryption key and the data to hide is embedded in to the image by

using the data hiding key. At the receiver side he first need to extract the image using the

encryption key in order to extract the data and after that he’ll use data hiding key to extract

the embedded data. It is a serial process and is not a separable process.

Image Encryption

The sender selects the file and applies his encryption algorithm to encrypt the image.

Encryption is the method of applying or changing some of the attributes of the original image

to form every different image. Nobody can read the exact image if he is unknown of the

changed done by the content owner.

Data Embedding

After encrypting the image the sender embed some additional data behind the selected part of

the image before transmission. Any type of image can be selected for the encryption like

JPEG, PNG or BMP.

Page 14: Synopsis for Separable reversible data hiding in encrypted image using AES

Data Extraction

This is the action performed at the receiver side. After receiving the data the main task of the

receiver is to extract the original data hide behind the image. This technique is known as data

extraction.

Image Recovery

Image recovery is the technique of decrypting the received image. The main task is to

generate the image same as the original image. And this is done by the reversibly perform the

encryption action i.e. by using the decryption key.

Disadvantages:

Principal content of the image is revealed before data extraction.

If someone has the data hiding key but not the encryption key he cannot extract any

information from the encrypted image containing additional data.

Page 15: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 4

Proposed System

The proposed scheme is made up of image encryption, data embedding and

data-extraction/image-recovery phases. The content owner encrypts the original

uncompressed image [2] using an encryption key to produce an encrypted image. Then, the

data-hider compresses the least significant bits (LSB) of the encrypted image using a data-

hiding [12] key to create a sparse space to accommodate the additional data. Since the data

embedding only affects the LSB, a decryption with the encryption key can result in an image

similar to the original version. When using both of the encryption and data-hiding keys, the

embedded additional data can be successfully extracted and the original image can be

perfectly recovered by exploiting the spatial correlation in natural image.

Image Encryption

The sender selects the file and applies his encryption algorithm to encrypt the image.

Encryption is the method of applying or changing some of the attributes of the original image

to form a very different image. Nobody can read the exact image if he is unknown of the

changed done by the content owner.

Page 16: Synopsis for Separable reversible data hiding in encrypted image using AES

Data Embedding

After encrypting the image the sender embed some additional data behind the selected part of

the image before transmission. Any type of image can be selected for the encryption like

JPEG, PNG or BMP.

Data Encryption

In data Encryption we protect the text with password and write in a file then encrypt the file

with the additional password so that at decryption time first he should decrypt the file with

the proper credentials and then access that file to read the password and use that password to

extract the data hidden in the image.

Data Extraction

This is the action performed at the receiver side. After receiving the data the main task of the

receiver is to extract the original data hide behind the image. This technique is known as data

extraction.

Image Recovery

Image recovery is the technique of decrypting the received image. The main task is to

generate the image same as the original image. And this is done by the reversibly perform the

encryption action i.e. by using the decryption key.

Data Decryption

In data Decryption the receiver or user decrypts the file with the relevant password to retrieve

the data hiding key to extract the data from the image.

Advantages:

If the receiver has only the data-hiding key, he can extract the additional data though he does

not know the image content.

If he has only the encryption key, he can decrypt the received data to obtain an image similar

to the original one, but cannot extract the embedded additional data.

Page 17: Synopsis for Separable reversible data hiding in encrypted image using AES

If he receiver has both the data-hiding key and the encryption key, he can extract the

additional data and recover the original image without any error when the amount of

additional data is not too large.

Page 18: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 5

Analysis

5.1 HARDWARE AND SOFTWARE REQUIREMENTS

5.1.1 Hardware Requirements:

The hardware required is given below:

Main processor : Pentium IV processor 1.13 GHz.

Internal memory capacity : 128 MB

Hard disk capacity : 40GB

Cache memory : 512 MB

5.1.2 Software Requirements:

The software required is given below:

Front End : Matlab

Operating system : WINDOWS-XP

Page 19: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 6

Design Details

6.1 FEASIBILITY ANALYSIS

6.1.1 System Feasibility

The very first phase in any system developing life cycle is preliminary investigation. In the

preliminary investigations we examine the project feasibility, the likelihood of the system

being useful to automate homes.

6.1.2 Operational Feasibility

It was decided that the proposed project could be created as a Windows -based application

system that will meet the operating environment of various people for browsing the internet.

The reasons for this conclusion are:

Business method adopted is acceptable to all users.

The end users have been involved in the planning and development.

Manual errors will be reduced.

It is a user-friendly browser and any person having moderate knowledge of

Computers, internet and project handling can operate it.

It is an operationally feasible project considering both the hardware and

software

6.1.3 Technical Feasibility

It was decided that the project was technically feasible because of the following:

Necessary technology exists to do what is suggested.

The system could be expandable and enhanced if so decided.

6.1.4 Economic Feasibility

Page 20: Synopsis for Separable reversible data hiding in encrypted image using AES

Some financial and economic questions raised were:

The cost to conduct systems investigation

Cost of software and hardware for the class of application being considered.

Benefits in the form of fewer costly errors.

Costly implementation.

The cost of nothing changes i.e. the proposed system is not developed.

Page 21: Synopsis for Separable reversible data hiding in encrypted image using AES

6.2 REQUIREMENT ANALYSIS

6.2.1 Functional Requirement

In the functional requirement we specify the functional requirement to function the system.

Here we specify the use case diagram as shown in Figure 5.1

Page 22: Synopsis for Separable reversible data hiding in encrypted image using AES

6.2.2 Non-functional Requirements

Performance requirements:

The software will run on a machine with a minimum of 1GHz and 512MB RAM. It will start

up within 3 seconds after initialization.

Safety requirements:

The data handled in this system is very vital. The system should always be confirmed to run

properly and the data are saved to the database at consecutive intervals. Power is a significant

feature and the power supply should be always taken care of. An Uninterrupted Power

Supply is always recommended.

Software quality attributes:

Availability

This system will be available on the user’s machine, 24 hours a day. Should the user leave the

program running whilst sitting at the machine, data will remain in memory, unless edited, and

the system will remain in the state in which the user left it.

Operability

The system will allow the user to operate it with a mouse, unless input is required from the

keyboard.

Learn ability

The system will be delivered with a user manual which will detail the use of the system to the

user. Team Respect will also provide a tutorial for the user if the user wishes at software

delivery time.

Page 23: Synopsis for Separable reversible data hiding in encrypted image using AES

Adaptability

This software is adaptable in any environment.

Usability requirements:

The system will provide a well-structured help facility. It will display informative error

messages when necessary. It will have consistent and easy to learn graphical user interfaces.

Page 24: Synopsis for Separable reversible data hiding in encrypted image using AES

6.3 SYSTEM ANALYSIS

In this section we present system analysis and design of proposed systems. System analysis

model defines user requirements, establishes basis of system design and defines set of

validation requirements needed for testing implemented system. System design is the

technical kernel of System engineering and is applied regardless of the

System process model that is used. Beginning once system requirements have been analyzed

and specified, System design is the first of three technical activities—design, code

generation, and test—that are required to build and verify the system. Each activity

transforms information in a manner that ultimately results in validated proposed System.

Page 25: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 7

Implementation Plan for Next Semester

1. Algorithm Implementation.

2. Coding.

3. Testing.

4. Deployment.

Page 26: Synopsis for Separable reversible data hiding in encrypted image using AES

Chapter 8

References

X. Zhang, “Reversible data hiding in encrypted image,” IEEE TRANSACTIONS ON

INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 2, APRIL 2012

Separable Reversible Data Hiding In Encrypted Image accessed on 15 July 2015 available

online https://www.youtube.com/watch?v=BK_StE54pMs