Encrypted Data Hiding In Cryptography Process Using .

3y ago
31 Views
9 Downloads
396.19 KB
9 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Azalea Piercy
Transcription

Encrypted Data Hiding in Cryptography Process using Keyless Algorithm A.Ahila et al.,International Journal of Power Control Signal and Computation(IJPCSC)Vol 8. No.2 Pp.157-165 gopalax Journals, Singaporeavailable at : www.ijcns.comISSN: ----------------------Encrypted Data Hiding in Cryptography Process using KeylessAlgorithmA.Ahila1 and T. Bavithra Devi2PG Student1, Assistant Professor2Department of Computer Science & EngineeringPRIST bstractSecuring data is a challenging issue in today’stechnology. Most of the data travel over theinternet and it becomes difficult to make datasecure. The information security has becomeone of the most significant problems in datacommunication. So it becomes an inseparablepart of data communication. In order to addressthis problem, cryptography technique is usedfor data transmission to making data secure.There arises a need of data hiding. So here weare using a combination of steganography andcryptography for improving the security. Allprevious methods embed data by randomvacating room from the encrypted images,which may be subject to some errors on dataextraction and image restoration. In this paper,we propose a novel method by shuffling roomin image pixels process before encryption witha traditional Keyless algorithm, and thus it iseasy for the data hider to shuffling embed datain the encrypted image. The proposed methodcan achieve real data hidden in the imageprocess, and it will take less time if the file sizeis large. The cryptography method can beapplied for data encryption and decryption forsending confidential data.157Keywords: Encryption, Decryption,Hiding, Keyless, AlgorithmsData1.IntroductionThe main feature of the encryption/decryptionprogram implementation is the generation ofthe encryption key. Now a day, cryptographyhas many commercial applications. If we areprotecting confidential information thencryptography is provide high level of privacy ofindividuals and groups. However, the mainpurpose of the cryptography is used not only toprovide confidentiality, but also to providesolutions for other problems like: data integrity,authentication, non-repudiation. Cryptographyis the methods that allow information to be sentin a secure from in such a way that the onlyreceiver able to retrieve this information.Presently continuous researches on the newcryptographic algorithms are going on.However, it is a very difficult to find out thespecific algorithm, because we have alreadyknown that they must consider many factorslike: security, the features of algorithm, the timecomplexity and space complexity. In thistechnique I am using a random number forgenerating the initial key, where this key willuse for encrypting the given source file using

Encrypted Data Hiding in Cryptography Process using Keyless Algorithm A.Ahila et al.,proposed encryption algorithm with the help ofencryption number. Basically In this techniquea block based substitution method will use. Inthe present technique I will provide forencrypting message multiple times. Theproposed key blocks contains all possible wordscomprising of number (n) of characters eachgenerated from all characters whose ASCIIcode is from 0 to 255 in a random order. Thepattern of the key blocks will depend on textkey entered by the user. Our proposed systemusing 512 bit key size to encrypt a textmessage. It wills us very difficult to find outtwo same massages using this parameter. Todecrypt any file one has to know exactly whatthe key blocks is and to find the random blockstheoretically one has to apply 2256 trial run andwhich is intractable. Initially that technique isonly possible for some files. In the proposedtechnique we have a common keyless algorithmbetween sender and receiver, which is known askeyless algorithm. Basically private keyconcept is the symmetric key concepts whereplain text is converting into encrypted textknown as cipher text using private key wherecipher text decrypted by same private key intoplane text.Disadvantages All previous methods embed data byrandomly or reversibly vacating roomfrom the encrypted images, which maybe subject to some errors on dataextraction and/or image restoration. It is difficult for data hider to reversiblyhide the data behind the image.3. Proposed SystemCryptography is the art of achieving security byencoding the data into unreadable form. Datathat can be unreadable and not understood withdifficulty is called encryption cryptography.Proposed process shuffling the data imagepixels from the encrypted images is relativelydifficult and sometimes inefficient, If weshuffling the order of encryption and vacatingroom prior to image encryption at contentowner side with a traditional Keyless algorithm,and thus it is easy for the data hider to shufflingembed data in the encrypted image. Encryptedimages would be more natural and much easierwhich leads us to the novel framework forsecure data transmission.Advantages2. Existing System In this system it uses traditional keylessalgorithm, and thus it is easy for the datahider to shuffling embed data in theencrypted image. Using this system data extraction andimage recovery are free of any error. Securityenhancementinthecryptography. Efficiency in the encryption anddecryption process. Very less computation processIn this framework, a content owner encrypts theoriginal image using a standard cipher with anencryption key. After producing the encryptedimage, the content owner hands over it to a datahider. The data hider can embed some auxiliarydata into the encrypted image by randomlyvacating some room according to a data hidingkey. Then a receiver, may be the content ownerhimself or an authorized third party can extractthe embedded data with the data hiding key andfurther recover the original image from theencrypted version according to the encryptionkey, But alone cryptography cannot provide abetter security approach because the scrambledmessage is still available to the eavesdropper.4. Literature SurveySynchronization of Lorenz-Based ChaoticCircuitswithApplicationstoCommunications158

Encrypted Data Hiding in Cryptography Process using Keyless Algorithm A.Ahila et al.,A circuit implementation of the chaotic Lorenzsystem is described. The chaotic behavior of thecircuit closely matches the results predicted bynumerical experiments. Using the concept ofsynchronized chaotic systems (SCS’s), twopossible approaches to secure communicationsare demonstrated with the Lorenz circuitimplemented in both the transmitter andreceiver. In the first approach, a chaoticmasking signal is added at the transmitter to themessage, and at the receiver, the masking isregenerated and subtracted from the receivedsignal. The second approach utilizesmodulation of the coefficients of the chaoticsystem in the transmitter and correspondingdetection of synchronization error in thereceiver to transmit binary-valued bit streams.The use of SCS’s for communications relies onthe robustness of the synchronization toperturbations in the drive signal. As a steptoward further understanding the inherentrobustness, we establish an analogy betweensynchronization in chaotic systems, nonlinearobservers for deterministic systems, and stateestimation in probabilistic systems. Thisanalogy exists because SCS’s can be viewed asperforming the role of a nonlinear state spaceobserver. To calibrate the robustness of theLorenz SCS as a nonlinear state estimator, wecompare the performance of the Lorenz SCS toan extended Kalman filter for providing stateestimates when the measurement consists of asingle noisy transmitter component.Rossler systems using numerical simulations.An electronic circuit implementation usingChua’s circuit is also reported, whichdemonstrates the practicality of the approach.Synchronization of Time-Delay Chua’sOscillator with Application to SecureCommunicationIn this paper, we use a Generalized Hamiltoniansystems approach to synchronize the timedelay-feedback Chua’s oscillator (hyperchaoticcircuit with multiple positive Lyapunovexponents). Synchronization is thus betweenthe transmitter and the receiver dynamics withthe receiver being given by an observer. Weapply this approach to transmit private analogand binary information signals in which thequality of the recovered signal is higher than intraditional observer techniques while theencoding remains potentially secure.High bit rate optical communication systemsbased on chaotic carriersIn this thesis, the potential of using chaoticoptical carriers generated by non-linear opticaloscillators as an encryption medium of high bitrate pseudorandom sequences - and thereforetheir application in the development of aninnovative platform of secure opticalcommunications - is studied. The operation ofchaotic semiconductor laser emitters capable ofhiding data and their application within anemitter-receiver system is simulated, underlyingthe decoding process that leads to a successfulmessage recovery. A complete high bit rateoptical communication system based on chaoticcarriers is developed, followed by a successfulencoding and decoding process. We confirmthat the insertion of 100 km ations, as the transmission medium, has aminimal effect for bit rates of the order of 1Gb/s. For the very first time, this experiment isalso performed in real-world conditions, usingA New Approach to Communications UsingChaotic SignalsIn this paper, a new approach forcommunication using chaotic signals ispresented. In this approach, the transmittercontains a chaotic oscillator with a parameterthat is modulated by an information signal. Thereceiver consists of a synchronous chaoticsubsystem augmented with a nonlinear filter forrecovering the information signal. The generalarchitecture is demonstrated for Lorenz and159

Encrypted Data Hiding in Cryptography Process using Keyless Algorithm A.Ahila et al.,an installed optical network of 120 km withinthe metropolitan area of Athens. The successfulresults are presented in a recent publication ofthe popular Nature magazine.processing industries (stirring of fluid flows andprocessing of free-flowing materials)).Synchronization and Control of ChaoticSystems. Spatio-Temporal Structures andApplications to Communications.Electro-optic phase chaos systems with aninternal variable and a digital keyThe field of dynamical systems and especiallythe study of chaotic systems has beenconsidered as one of the importantbreakthroughs in science in this century. Whilethis area is still relatively young, there is noquestion that it is becoming more and moreimportant in a variety of scientific disciplines.Thus, this work starts with an historicaloverview about nonlinear dynamics and chaoticintroduces the motivation for the resultspresented in the The first part of the presentthesisdevoted to the phenomenon ofsynchronization among coupled chaoticsystems. This topic results very interestingsince it could appear to be almost incontradiction with the definition of chaos whichincludes the rapid decorrelation of nearby orbitsdue to the instabilities throughout the phasespace. In particular is devoted to show differentcategories of connections among identicalchaotic systems that can lead to synchronizedmotions of the oscillators, and in we analyzethe stability of the global synchronized state inopen linear arrays or in rings of chaoticoscillators. We will also pay attention to somestable spatio-temporal structures (periodicrotating waves and chaotic rotating waves) thatcan arise when a instability appears in theglobal synchronized state of a ring of chaoticoscillators. The interaction between thesestructures when two rings are interconnected isinvestigated as well. Numerical simulationshave been carried out with assemblies ofLorenz oscillators and Chua’s oscillators,whereas experiments have been carried out in aboard of Chua’s oscillators. The second part ofthe thesis with possible applications of chaoticsystems to the communications field. In weshow some advantageous features that chaoticWe consider an electro-optic phase chaossystem with two feedback loops organized in aparallel configuration such that the dynamics ofone of the loops remains internal. We show thatthis configuration intrinsically conceals in thetransmitted variable the internal delay times,which are critical for decoding. The schemealso allows for the inclusion, in a very efficientway, of a digital key generated as a longpseudorandom binary sequence. A single digitalkey can operate both in the internal andtransmitted variables leading to a largesensitivity of the synchronization to a keymismatch. The combination of intrinsic delaytime concealment and digital key selectivityprovides the basis for a large enhancement ntrolofApplications.Chaos:MethodsandReviewed were the problems and methods forcontrol of chaos, which in the last decade wasthe subject of intensive studies. Considerationwas given to their application in variousscientific fields such as mechanics (control ofpendulums, beams, plates, friction), physics(control of turbulence, lasers, chaos in plasma,and propagation of the dipole domains),chemistry, biology, ecology, economics, andmedicine, as well as in various branches ofengineering such as mechanical systems(control of vibroformers, microcantilevers,cranes, and vessels), spacecraft, electrical andelectronic systems, communication systems,information systems, and chemical and160

Encrypted Data Hiding in Cryptography Process using Keyless Algorithm A.Ahila et al.,behavior can incorporate to conventional digitalcommunication systems and some differentschemes that have already been proposed. Inwe introduce a simple control technique toencode binary sequences of information in achaotic Lorenz waveform as well as twodifferent methods to reconstruct damaged partsof this chaotic waveform when it is transmittedthrough a communication channel. Bothmethods exploit the redundancy provided V bythe determinism of chaotic signals. Finally, it isshown how these reconstruction methods allownot only to reconstruct damaged parts of thetransmitted signal but they can also be used toincrease the rate of the informationtransmission by means of a time divisionmultiplexing scheme. Finally, conclusions andoutlooks of this work are presented.Dynamics of coding in communicating withchaosRecent work has considered the possibility ofutilizing symbolic representations of controlledchaotic orbits for communicating withchaotically behaving signal generators. Thesuccess of this type of nonlinear digitalcommunication scheme relies on partitioningthe phase space properly so that a goodsymbolic dynamics can be defined. A centralproblem is then how to encode an arbitrarymessage into the wave form generated by thechaotic oscillator, based on the symbolicdynamics. We argue that, in general, a codingscheme for communication leads to, in thephase space, restricted chaotic trajectories thatlive on nonattracting chaotic saddles embeddedin the chaotic attractor. The symbolic dynamics161

Encrypted Data Hiding in Cryptography Process using Keyless Algorithm A.Ahila et al.,of the chaotic saddle can be robust against noisewhen the saddle has large noise-resisting gapscoveringthephase-spacepartition.Nevertheless, the topological entropy of such achaotic saddle, or the channel capacity inutilizing the saddle for communication, is oftenless than that of the chaotic attractor. Wepresent numerical evidences and theoreticalanalyses that indicate that the channel capacityassociated with the chaotic saddle is generally anonincreasing, devil’s-staircase-like function ofthe noise-resisting strength. There is usually arange for the noise strength in which thechannel capacity decreases only slightly fromthat of the chaotic attractor. The mainconclusionisthatnonlineardigitalcommunication using chaos can yield asubstantial channel capacity even in noisyenvironment.implementation, channelbandwith, and attenuation.noise,limitedEstimating generating partitions of chaoticsystems by unstable periodic orbitsAn outstanding problem in chaotic dynamics isto specify generating partitions for symbolicdynamics in dimensions larger than 1. It hasbeen known that the infinite number of unstableperiodic orbits embedded in the chaoticinvariant set provides sufficient information forestimating the generating partition. Here wepresent a general, dimension-independent, andefficient approach for this task based onoptimizing a set of proximity functions definedwith respect to periodic orbits. Our algorithmallows us to obtain the approximate location ofthe generating partition for the Ikeda-HammelJones-Moloney map.Cryptographic requirements for chaoticsecure communications5. ConclusionIn recent years, a great amount of securecommunications systems based on chaoticsynchronization have been published. Most ofthe proposed schemes fail to explain a numberof features of fundamental importance to allcryptosystems, such as implementation details,or key definition, characterization, andgeneration. As a consequence, the proposedciphers are difficult to realize in practice with areasonable degree of security. Likewise, theyare seldom accompanied by a security analysis.Thus, it is hard for the reader to have a hintabout their security and performance. In thiswork we provide a set of guidelines that everynew cryptosystem would benefit from adheringto. The proposed guidelines address these twomain gaps, i.e., correct key management andsecurity analysis, among other topics, to helpnew cryptosystems be presented in a morerigorous cryptographic way. Also somerecommendations are made regarding somepractical aspects of communications, such asSecurity in the Internet is improving. Theincreasing use of the Internet for commerce isimproving the deployed technology to protectthe financial transactions. Extension of thebasic technologies to protect multicastcommunications is possible and can beexpected to be deployed as multicast becomesmore widespread. Control over routing remainsthe basic tool for controlling access based onthe keyless algorithm. Implementing particularpolicies will be possible as multicast routingprotocols improve. Cryptography is a toolwhich may alleviate many of the perceivedproblems of using the Internet forcommunications.Reference[1] K. M. Cuomo and A. V. Oppenheim,“Circuit implementation of synchronized chaoswith applications to communications,” Phys.Rev. Lett., vol. 71, no. 1, pp. 65–68, 1993.162

Encrypted Data Hiding in Cryptography Process using Keyless Algorithm A.Ahila et al.,theory to practical algorithms,” IEEE Trans.Circuits Syst. I, Reg. Papers, vol. 53, no. 6, pp.1341–1352, 2006.[12] F. Anstett, G. Millerioux, and G. Bloch,“Chaotic cryptosystems: Cryptanalysis andIndentifiability,” IEEE Trans. Circuits Syst. I,Reg. Papers, vol. 53, no. 12, pp. 2673–2680,2006.[13] D. Arroyo, S. Li, C. Li, and V. Fernandez,“Cryptanalysis of a new chaotic cryptosystembased on ergodicity,” Int. J. Mod. Phys. B, vol.23, pp. 651–659, 2009.[14] W. Xu, L. Wang, and G. Chen,“Performance analysis of the CS-DCSK/BPSKcommunication system,” IEEE Trans. CircuitsSyst.I, Reg. Papers, vol. 61, pp. 2624–2633,2014.[15] P. Muthukumar, P. Balasubramaniam, andK. Ratnavelu, “Synchronization and anapplication of a novel fractional order KingCobra chaotic system,” Chaos, vol. 24, pp.033105-1–033105-10, 2014.[16] G. Alvarez and S. Li, “Some basiccryptographic requirements for chaos-basedcryptosystems,” Int. J. Bifurcation Chaos, vol.16, pp. 2129–2151, 2006.[17] E. N. Lorenz, “Deterministic nonperiodicflow,” J. Atmos. Sci., vol. 20, pp. 130–141,1963.[18] R. Barrio and S. Serrano, “A threeparametric study of the Lorenz

in the encrypted image. The proposed method can achieve real data hidden in the image process, and it will take less time if the file size is large. The cryptography method can be applied for data encryption and decryption for sending confidential data. Keywords: Encryption, Decryption, Data Hiding, Keyless, Algorithms 1.Introduction

Related Documents:

Information Hiding Information Hiding is a general term encompassing many subdisciplines Two important subdisciplines are: steganography and watermarking Steganography: – Hiding: keeping the existence of the information secret Watermarking: – Hiding: making the information imperceptibl

Opening an Encrypted Email The process of opening an encrypted email may differ depending on how you are accessing the email. The different methods will be described below. Opening an Encrypted Email Using Outlook When accessing an encrypted email using Outlook, the email will appear in your inbox with a lock icon on it.

of public-key cryptography; providing hands-on experience with some of the most common encryption algorithms that are used on the internet today. Modern Cryptography Introduction Outline 1 Introduction 2 Historical Cryptography Caesar Cipher 3 Public{Key Cryptography

Cryptography with DNA binary strands and so on. In terms of DNA algorithms, there are such results as A DNA-based, bimolecular cryptography design, Public-key system using DNA as a one-way function for key distribution, DNASC cryptography system and so on. However, DNA cryptography is an

Cryptography and Java Java provides cryptographic functionality using two APIs: JCA - Java Cryptography Architecture - security framework integrated with the core Java API JCE - Java Cryptography Extension - Extensions for strong encryption (exported after 2000 US export policy)

application that runs in the Microsoft Windows Azure cloud service. The client application collects user health data, encrypts it and sends the encrypted record to the cloud application, which runs the prediction algorithm on the encrypted record. The cloud produces an encrypted prediction result, which it sends back to the client application.

When putting an encrypted message, a symmetric key is generated and then encrypted using an asymmetric key operation for each intended recipient of the message. The message data is then encrypted with the symmetric key. When getting the encrypted message the intended recipient needs to use an asymmetric key operation to discover the

100 Days of School, 100 Agricultural Activities! 100th Day festivities have been celebrated throughout schools since the school year of 1981-1982. Lynn Taylor introduced the 100th Day of School idea in the Center for Innovation in Education newsletter. Early celebrations focused on developing number sense for young children. Today, preschool children through elementary students celebrate their .