International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015 A Survey on Various Techniques to Secure Images using various methods like stegnography watermarking and cryptography Varsha Shakti1, Mr. Anil Khandekar2 Pursuing M.E.1, Asst. Professor2 Indore Institute of Science & Technology, Indore [email protected] ABSTRACT: The image security on internet transfers is the concern of the hour as the breaching attacks into the image databases are rising every year. The hackers take advantage of the stolen personal and important images to fulfill their dangerous and unethical intentions. The image data theft can be used to defame a person on the internet by posting the illegal and unacceptable images of that person (internet user). Hence the images transfers have to be secure to ensure the privacy of the user’s image data. In this research, a number of image security systems have been studied to evaluate the research gap. Majority of the existing image security systems are not up to date to protect against the latest breaching attacks. So, we have proposed an effective and robust image security framework particularly designed for the images. The proposed has been designed and implemented using MATLAB. In this research, a hybrid image security framework has been proposed to overcome the problem stated earlier, which will be implemented by combining various techniques together to achieve the image security goal. The techniques included in the combination would be image compression, cryptography and steganography. DWT compression has been used, because it is a stronger compression Algorithm. The stegano graphed image would be compressed to reduce its size. Blowfish encryption Algorithm would be used for the encryption purposes. It offers maximum throughput (faster) and also energy efficient. Compressed image would be encrypted to enhance the image security. Real image will be hidden into another image. A cluster based steganographic technique will be used. Real image and face image would be analyzed, and the real image would be embedded in those areas of face image, where color schemes of the real image and face image would be most similar. Kmeans or Hierarchical clustering would be used as a clustering technique. An all new comparative analysis technique would be applied to make the comparison between real image and base image on the basis of color patterns. Keywords:- Transfers Image Security, Image compression, Image steganography, Image encryption, image. 1. Introduction: converting a message text into an unreadable cipher.A large number of cryptography algorithms have been created till Cryptography and Steganography are well known date with the primary objective of converting information and widely used techniques that manipulate information in into unreadable ciphers Cryptography systems can be broadly order to cipher or hide their existence respectively. classified into symmetric-key systems and public key Steganography is the art and science of communicating in a systems. The symmetric key systems uses a common key for way which hides the existence of the communication. encryption and decryption of the message. This key is shared Steganography word is of Greek origin and essentially means privately by the sender and the receiver. The sender encrypts concealed writing. Protection of the transmitted data from the data using the joint key and then sends it to the receiver being intercepted or tampered has led to the development of who decrypts the data using the same key to retrieve the various steganographic techniques. Cryptography involves original message. The public-key systems that use a different Paper ID: 2015/IJTRM/12/2015/6255 1 International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015 key for encryption as the one used for decryption. Public key Five hundred years ago, the Italian mathematician systems require each user to have two keys – a public key Jérôme Cardan reinvented a Chinese ancient method of secret and a private key (secret key). The sender of the data writing. The scenario goes as follows: a paper mask with encrypts the message using the receiver’s public key. The holes is shared among two parties, this mask is placed over a receiver then decrypts this message using his private key. blank paper and the sender writes his secret message through Cryptography scrambles a message so it cannot be the holes then takes the mask off and fills the blanks so that understood; the Steganography hides the message so it the message appears as an innocuous text. This method is cannot be seen. Even though both methods provide security, credited to Cardan and is called Cardan Grille [4]. a study is made to combine both cryptography and This section attempts to give an overview of the Steganography methods into one system for better most important steganographic techniques in digital images. confidentiality and security. The most popular image formats on the internet are Graphics The steganography and cryptography differ in the Interchange Format (GIF), Joint way they are evaluated: steganography fails when the Photographic Experts Group (JPEG), and to a lesser ”enemy” is able to access the content of the cipher message, extent - the Portable Network Graphics (PNG). One of the while cryptography fails when the ”enemy” detects that there earliest methods to discuss digital steganography is credited is a secret message present in the steganographic medium. to Kurak and McHugh [1], who proposed a method which The disciplines that study techniques for deciphering cipher resembles embedding into the 4 LSBs (least significant bits). messages and detecting hide messages are called They examined image downgrading and contamination cryptanalysis and steganalysis. Steganalysis is "the process of which is known now as image-based steganography. detecting steganography by looking at variances between bit The survey of Johnson [6] appeared in the patterns and unusually large file sizes" [3]. It is the art of “Information hiding” book, which limits its distribution discovering and rendering useless covert messages. The goal compared to a Journal paper which can be more affordable. of steganalysis is to identify suspected information streams, The classification, herein, of the techniques and that of determine whether or not they have hidden messages Johnson are different. Johnson classify steganography encoded into them, and, if possible, recover the hidden techniques into: Substitution systems, transform domain information. The cryptanalysis is the process of encrypted techniques, spread spectrum techniques, statistical methods, messages can sometimes be broken the cipher message is distortion techniques, and cover generation methods. Johnson otherwise called as code breaking, although modern survey neither talks about the history of steganography nor its cryptography techniques are virtually unbreakable. grating applications.Johnson work has not included test images that together cryptography and steganography through some can allow readers visualize the concepts. media such as image. In this paper, the secret message is Creighton T. R. Hager worked on the Performance embedded within the image called cover-image. Cover-image and Energy Efficiency of Block Ciphers in Personal Digital carrying embedded secret data is referred as stegno-image. Assistants [3]: The author has performed a comparative analysis of various encryption algorithms on various kinds of data. This research has proved that blowfish outperforms all 2. Literature Survey: other encryption algorithms. Blowfish is the best, unbreakable and fast encryption algorithm than others. Gary The word steganography is originally derived from C.Kessler has written an Overview of Cryptography: Greek words which mean “Covered Writing”. It is defined as Cryptographic [3]: This is an old published paper on "hiding information within a noise; a way to supplement cryptography by Gary C. Kessler, and since then it was encryption, to prevent the existence of encrypted data from continuously updated till date. It was last updated in 2014. being detected" [1]. It has been used in various forms for The author suggested the great source for the cryptography thousands of years. In the 5th century BC Histaiacus shaved a algorithms again. It is very important to understand the slave’s head, tattooed a message on his skull and the slave encryption algorithm structure before putting it in the use. was dispatched with the message after his hair grew back [ 2, Navita Agarwal et al. have develope Efficient Pixel- 4,5,7]. shuffling Based Approach to Simultaneously Perform Image In Saudi Arabia at the King Abdulaziz City of Compression, Encryption and Steganography [1]: The science and technology, a project was initiated to translate authors have conducted a similar research, where they have into English some ancient Arabic manuscripts on secret applied compression, encryption and steganography on the writing which are believed to have been written 1200 years digital image data. Pixel shuffling based symmetric ago. Some of these manuscripts were found in Turkey and encryption algorithm, DCT for compression, WinRAR to Germany [10]. Image steganography are used to achieve the proposed model in this paper. Paper ID: 2015/IJTRM/12/2015/6255 2 International Journal of Technology Research and Management ISSN (Online): 2348-9006 Vol 2 Issue 12 December 2015 Evolution of Steganography: For understanding
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages5 Page
-
File Size-