SlideShare a Scribd company logo
1 of 7
Download to read offline
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

Data Security Using Cryptosteganography in Web Application
            Abhishek Patidar Gajendra Jagnade* Laxmi Madhuri Pranay Mehta Ronak Seth
                                Maharashtra Academy Of Engineering,Alandi,Pune
                         * E-mail of the corresponding author: praggroup@yahoo.com
Abstract
Data security using Cryptosteganography in web application is a web based application used to conceal
important information through hybrid cryptography and Steganography and provide means of its secure
transmission through any medium or channel .Using a web browser the user uploads the important
information and an envelope image. The same is received by the Data Shielder facade web application .The
web application sends the data and envelope image to the real Data Shielder .It generates a unique key and
encrypts the crucial data .The key is associated with a "unique id" and preserved in a store .Then the
encrypted information is embedded into the envelope image using modified BPCS technique .Finally a
stego image is generated .Data Shielder returns the "unique id" and stego image to the facade web
application .Web application further archives the stego image and unique key and allows the user to
download it. The user can simply unzip the archive and transmit the stego image through unsecured
channels like email, sockets, pen drives, cds, dvds, etc. And can keep the unique id safe. When the user
wants its data back then user needs to upload the stego image and the "unique id" to the Data Shielder
facade web application. The web application sends the unique id and stego image to the real Data Shielder.
First it finds the encryption key from the store through the unique id. Next, reversing the BPCS
Steganography, the stego image is processed and encrypted data is fetched. Finally using the encryption key
decryption is done and the crucial data is fetched back. The same is returned to the facade web application,
which is rendered to the user.
Keywords: Cryptography, Steganography, Stego- image, Threshold Value



1. Introduction
Cryptography and Steganography are well known and widely used techniques that manipulate information
(messages) in order to cipher or hide their existence respectively. This is a web application which uses
combination of Steganography and Cryptography techniques .Steganography is the art and science of
communicating in a way which hides the existence of the communication. Cryptography scrambles a
message so it cannot be understood. The Steganography hides the message for security. This paper
describes a system, which uses both Cryptography and Steganography for better confidentiality and
security. Major applications of the project are confidential communication and secret data storage which
can be used by normal people to secure their data & for military purpose, government organization, private
sector organization for security concern.
So this project aims to provide hybrid means of security and to improve existing BPCS technique for
Steganography and to develop new cryptographic algorithm.

2. Basic Concepts and Related Work
There are many aspects to security and many applications. One essential aspect for secure communications
is that of cryptography. But it is important to note that while cryptography is necessary for secure
communications, it is not by itself sufficient. There are some specific security requirements for
cryptography, including Authentication, Privacy/confidentiality, and Integrity Non-repudiation. The three
types of algorithms are described:
(i) Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption.
(ii)Public Key Cryptography (PKC): Uses one key for encryption and another for decryption.

                                                    74
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

(iii)Hash Functions: Uses mathematical transformation to irreversibly "encrypt" information.
Steganography is the other technique for secured communication. It encompasses methods of transmitting a
secret message through innocuous cover carriers in such a manner that the very existence of the embedded
messages is undetectable. Information can be hidden in images, audio, video, text, or some other digitally
representative code. Steganography systems can be grouped by the type of covers used (graphics, sound,
text, executables) or by the techniques used to modify the covers
a) Substitution system.
b) Transform domain techniques.
c) Spread spectrum techniques.
d) Statistical method.
e) Distortion techniques.
f) Cover generation methods.



2.1 Architecture
Architecture consists of four basic blocks
    1) Encryption : Matrix Mapping Method For Symmetric Key Cryptography
    2) Steganography : Modified BPCS
    3) Decryption Matrix Mapping Method For Symmetric Key Cryptography
    4) Desteganography : Modified BPCS




                               Figure1. Architecture Diagram of System
2.1.1 Encryption: Matrix Mapping Method for Symmetric Key Cryptography
In this algorithm, using the key we generate a mapping matrix. Every byte of the mapping image is unique

                                                    75
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

and is with respect to key. The mapping matrix is of size 16 by 16.This algorithm is influenced by Applied
cryptography in Java (Partida, A.Andina, D.Atos).
Algorithm:
1) The source file is opened for reading in binary mode.
2) Every byte of the source file is read and converted into its equivalent 8-bit binary number.
3) Split the 8-bit binary number into 4-bit higher and lower nibble number.
4) Convert these two 4-bit nibbles into its equivalent decimal value.
5) With the help of these two decimal values pickup a pixel from the mapping matrix. Where higher nibble
equivalent decimal value acts as row indicator and lower nibble equivalent decimal value acts as column
indicator for mapping image.
6) Replace the original pixel with the byte selected from mapping matrix.
7) Encrypted file gets generated as the above process is repeated for all the pixels.


2.1.2 Steganography: Modified BPCS
Our new Steganography uses an image as the vessel data, and we embed secret information in the bit-
planes of the vessel. This technique makes use of the characteristics of the human vision system whereby a
human cannot perceive any shape information in a very complicated binary pattern. We can replace all of
the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the
image quality.This algorithm is influenced by Principle and application of BPCS-Steganography(Eiji
Kawaguchi and Richard O.Eason).This algorithm is termed as Modified “BPCS-Steganography,” which
stands for Bit-Plane Complexity Segmentation Steganography. Input data will be vessel image and data to
embed in byte format. Load the vessel image into memory. Get width and height of the memory image.
Generate a threshold value. For each pixel get red, green and blue values of current pixel .
Algorithm:
Real Image and data to Embed in byte array format is given as input.
1) Load the vessel image into memory.
2) Get a "readable pen" for the memory image.
3) Get width and height of the memory image.
4) Generate a threshold value.
5) Loop for all rows of memory image
   Loop for all cols of memory image
     a) Using the "readable pen" get red, green and blue values of current pixel.
     b) if red <= threshold and green <= threshold and blue <= threshold then
 * mark the pixel as NOISY (store in a list).
6) If NOISY pixel list size >= size of data to embed go to step 8.
7) Raise Error "Content length is more than embedding capacity of Vessel Image".
8) Convert the Data to embed into SECRET BLOCKS
 a) Create a empty list to hold secret blocks
 b) Loop for every byte of input data
   * conjugate the byte
   * store the conjugated byte into secrect block list.
9) Get a "writable pen" for the memory image.

                                                      76
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

10) Loop for every element of NOISY pixel list
 a) Embed 2 bytes of data from SECRET blocks into red, green and blue bands of noisy pixel.
 b) Using the writable pen write the pixel into memory image.
11) Write back the memory image into IMAGE FILE.




                         Figure 2: Algorithm to encrypt data and embed it into image

2.1.3 Decryption: Matrix Mapping Method for Symmetric Key Cryptography
In this algorithm, using the key we generate a mapping matrix. Every byte of the mapping image is unique
and is with respect to key. The mapping matrix is of size 16 by 16.
Algorithm:
1) The encrypted file is opened for reading in binary mode.
2) Every byte of the encrypted file is read and converted into its equivalent 8-bit binary number.
3) Match the byte in the mapping matrix and find out row and column number of the matched byte.
4) Form 2 nibbles using the row number and column number. Generate a 8-bit binary number from 4-bit
higher (row) and lower (column) nibble number.
5) Substitute this generated 8 bit binary data in place of the current byte.
6) Original file gets generated as the above process is repeated for all the pixels.
Get the bytes from image using Desteganography and use the key to generate decryption matrix. Now
match the byte which we got from image with each matrix element. And get corresponding row and column
number of matched element. Convert the obtained row and column number into binary format. Deconjugate
these two numbers which represents original data.




                                                       77
Computer Engineering and Intelligent Systems                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

2.1.4Desteganography: Modified BPCS




                        Figure 3. Algorithm to decrypt data and extract from image


Image having embedded data is given as input .
Algorithm:
1) Load the image into memory.
2) Get a "readable pen" for the memory image.
3) Get width and height of the memory image.
4) Generate a threshold value.
5) Loop for all rows of memory image
   Loop for all cols of memory image
     a) Using the "readable pen" get red, green and blue values of current pixel.
     b) If red <= threshold and green <= threshold and blue <= threshold then
        mark the pixel as NOISY (store in a list)
6) Loop for every element of NOISY pixel list
    a) Extract bytes of data from red, green and blue bands of noisy pixel.
    b) Deconjugate the secret blocks and form data bytes.
    c) Concatenate the data in a result buffer.

                                                     78
Computer Engineering and Intelligent Systems                                              www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.4, 2012

7) Write back the result buffer into a FILE Input data will be image having embedded data. Load the image
into memory. Get width and height of the memory image. Generate a threshold value.



Conclusion & Future Enhancements
The work accomplished during this project can be summarized with the following points:
1) In this project we have presented a new system for the combination of cryptography and Steganography
using matrix mapping method for Symmetric Key Cryptography and modified BPCS technique for
Steganography which could be proven a highly secured method for data communication in near future.
2) Steganography especially combined with cryptography, is a powerful tool which enables people to
communicate without possible eavesdroppers even knowing there is a form of communication in the first
place. The proposed method provides acceptable image quality with very little distortion in the image.
3) The main advantage of this Cryptosteganography System is hybrid combination of cryptography and
Steganography which provides double layer security.
In future video or audio files can be used to hide data instead of images.


References
Visual Cryptography Steganography In Images, PiyushMarwaha , PareshMarwaha
A steganography implementation ,Mehboob, B. Faruqui, R.A.
Principle and application of BPCS-Steganography,Eiji Kawaguchi and Richard O.Eason,KIT,Japan
Applied cryptography in Java ,Partida, A.Andina, D.Atos-ODS , S.A.Madrid.
Data Security Using Data Hiding , Moon, S.K. Kawitkar, R.S.,PICT, Pune.
Digital steganography: hiding data within data,Artz, D.;Los Alamos Nat. Lab., NM




                                                      79
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

More Related Content

What's hot

Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
prjpublications
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
IJNSA Journal
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 

What's hot (20)

Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Image Security
Image SecurityImage Security
Image Security
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 

Viewers also liked (9)

11.treatability studies of dairy wastewater by upflow anaerobic sludge blanke...
11.treatability studies of dairy wastewater by upflow anaerobic sludge blanke...11.treatability studies of dairy wastewater by upflow anaerobic sludge blanke...
11.treatability studies of dairy wastewater by upflow anaerobic sludge blanke...
 
11.development and modification of curriculum for excellence in teacher educa...
11.development and modification of curriculum for excellence in teacher educa...11.development and modification of curriculum for excellence in teacher educa...
11.development and modification of curriculum for excellence in teacher educa...
 
11.a live study of employee satisfaction and growth analysis
11.a live study of employee satisfaction and growth analysis11.a live study of employee satisfaction and growth analysis
11.a live study of employee satisfaction and growth analysis
 
Evaluation task 7pp
Evaluation task 7ppEvaluation task 7pp
Evaluation task 7pp
 
Evaluation task 7pp
Evaluation task 7ppEvaluation task 7pp
Evaluation task 7pp
 
11.niosome the magic bullet
11.niosome the magic bullet11.niosome the magic bullet
11.niosome the magic bullet
 
11.[7 11]psychological evaluation of sports persons with disability
11.[7 11]psychological evaluation of sports persons with disability11.[7 11]psychological evaluation of sports persons with disability
11.[7 11]psychological evaluation of sports persons with disability
 
Evaluation of method
Evaluation of methodEvaluation of method
Evaluation of method
 
11.variation of water quality across cooum river in chennai city
11.variation of water quality across cooum river in chennai city11.variation of water quality across cooum river in chennai city
11.variation of water quality across cooum river in chennai city
 

Similar to 11.data security using cryptosteganography in web application

Similar to 11.data security using cryptosteganography in web application (20)

High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
P017329498
P017329498P017329498
P017329498
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
Alexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
Alexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
Alexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
Alexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
Alexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
Alexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
Alexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
Alexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
Alexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
Alexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
Alexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
Alexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
Alexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
Alexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
Alexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
Alexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

11.data security using cryptosteganography in web application

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 Data Security Using Cryptosteganography in Web Application Abhishek Patidar Gajendra Jagnade* Laxmi Madhuri Pranay Mehta Ronak Seth Maharashtra Academy Of Engineering,Alandi,Pune * E-mail of the corresponding author: praggroup@yahoo.com Abstract Data security using Cryptosteganography in web application is a web based application used to conceal important information through hybrid cryptography and Steganography and provide means of its secure transmission through any medium or channel .Using a web browser the user uploads the important information and an envelope image. The same is received by the Data Shielder facade web application .The web application sends the data and envelope image to the real Data Shielder .It generates a unique key and encrypts the crucial data .The key is associated with a "unique id" and preserved in a store .Then the encrypted information is embedded into the envelope image using modified BPCS technique .Finally a stego image is generated .Data Shielder returns the "unique id" and stego image to the facade web application .Web application further archives the stego image and unique key and allows the user to download it. The user can simply unzip the archive and transmit the stego image through unsecured channels like email, sockets, pen drives, cds, dvds, etc. And can keep the unique id safe. When the user wants its data back then user needs to upload the stego image and the "unique id" to the Data Shielder facade web application. The web application sends the unique id and stego image to the real Data Shielder. First it finds the encryption key from the store through the unique id. Next, reversing the BPCS Steganography, the stego image is processed and encrypted data is fetched. Finally using the encryption key decryption is done and the crucial data is fetched back. The same is returned to the facade web application, which is rendered to the user. Keywords: Cryptography, Steganography, Stego- image, Threshold Value 1. Introduction Cryptography and Steganography are well known and widely used techniques that manipulate information (messages) in order to cipher or hide their existence respectively. This is a web application which uses combination of Steganography and Cryptography techniques .Steganography is the art and science of communicating in a way which hides the existence of the communication. Cryptography scrambles a message so it cannot be understood. The Steganography hides the message for security. This paper describes a system, which uses both Cryptography and Steganography for better confidentiality and security. Major applications of the project are confidential communication and secret data storage which can be used by normal people to secure their data & for military purpose, government organization, private sector organization for security concern. So this project aims to provide hybrid means of security and to improve existing BPCS technique for Steganography and to develop new cryptographic algorithm. 2. Basic Concepts and Related Work There are many aspects to security and many applications. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. There are some specific security requirements for cryptography, including Authentication, Privacy/confidentiality, and Integrity Non-repudiation. The three types of algorithms are described: (i) Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption. (ii)Public Key Cryptography (PKC): Uses one key for encryption and another for decryption. 74
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 (iii)Hash Functions: Uses mathematical transformation to irreversibly "encrypt" information. Steganography is the other technique for secured communication. It encompasses methods of transmitting a secret message through innocuous cover carriers in such a manner that the very existence of the embedded messages is undetectable. Information can be hidden in images, audio, video, text, or some other digitally representative code. Steganography systems can be grouped by the type of covers used (graphics, sound, text, executables) or by the techniques used to modify the covers a) Substitution system. b) Transform domain techniques. c) Spread spectrum techniques. d) Statistical method. e) Distortion techniques. f) Cover generation methods. 2.1 Architecture Architecture consists of four basic blocks 1) Encryption : Matrix Mapping Method For Symmetric Key Cryptography 2) Steganography : Modified BPCS 3) Decryption Matrix Mapping Method For Symmetric Key Cryptography 4) Desteganography : Modified BPCS Figure1. Architecture Diagram of System 2.1.1 Encryption: Matrix Mapping Method for Symmetric Key Cryptography In this algorithm, using the key we generate a mapping matrix. Every byte of the mapping image is unique 75
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 and is with respect to key. The mapping matrix is of size 16 by 16.This algorithm is influenced by Applied cryptography in Java (Partida, A.Andina, D.Atos). Algorithm: 1) The source file is opened for reading in binary mode. 2) Every byte of the source file is read and converted into its equivalent 8-bit binary number. 3) Split the 8-bit binary number into 4-bit higher and lower nibble number. 4) Convert these two 4-bit nibbles into its equivalent decimal value. 5) With the help of these two decimal values pickup a pixel from the mapping matrix. Where higher nibble equivalent decimal value acts as row indicator and lower nibble equivalent decimal value acts as column indicator for mapping image. 6) Replace the original pixel with the byte selected from mapping matrix. 7) Encrypted file gets generated as the above process is repeated for all the pixels. 2.1.2 Steganography: Modified BPCS Our new Steganography uses an image as the vessel data, and we embed secret information in the bit- planes of the vessel. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality.This algorithm is influenced by Principle and application of BPCS-Steganography(Eiji Kawaguchi and Richard O.Eason).This algorithm is termed as Modified “BPCS-Steganography,” which stands for Bit-Plane Complexity Segmentation Steganography. Input data will be vessel image and data to embed in byte format. Load the vessel image into memory. Get width and height of the memory image. Generate a threshold value. For each pixel get red, green and blue values of current pixel . Algorithm: Real Image and data to Embed in byte array format is given as input. 1) Load the vessel image into memory. 2) Get a "readable pen" for the memory image. 3) Get width and height of the memory image. 4) Generate a threshold value. 5) Loop for all rows of memory image Loop for all cols of memory image a) Using the "readable pen" get red, green and blue values of current pixel. b) if red <= threshold and green <= threshold and blue <= threshold then * mark the pixel as NOISY (store in a list). 6) If NOISY pixel list size >= size of data to embed go to step 8. 7) Raise Error "Content length is more than embedding capacity of Vessel Image". 8) Convert the Data to embed into SECRET BLOCKS a) Create a empty list to hold secret blocks b) Loop for every byte of input data * conjugate the byte * store the conjugated byte into secrect block list. 9) Get a "writable pen" for the memory image. 76
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 10) Loop for every element of NOISY pixel list a) Embed 2 bytes of data from SECRET blocks into red, green and blue bands of noisy pixel. b) Using the writable pen write the pixel into memory image. 11) Write back the memory image into IMAGE FILE. Figure 2: Algorithm to encrypt data and embed it into image 2.1.3 Decryption: Matrix Mapping Method for Symmetric Key Cryptography In this algorithm, using the key we generate a mapping matrix. Every byte of the mapping image is unique and is with respect to key. The mapping matrix is of size 16 by 16. Algorithm: 1) The encrypted file is opened for reading in binary mode. 2) Every byte of the encrypted file is read and converted into its equivalent 8-bit binary number. 3) Match the byte in the mapping matrix and find out row and column number of the matched byte. 4) Form 2 nibbles using the row number and column number. Generate a 8-bit binary number from 4-bit higher (row) and lower (column) nibble number. 5) Substitute this generated 8 bit binary data in place of the current byte. 6) Original file gets generated as the above process is repeated for all the pixels. Get the bytes from image using Desteganography and use the key to generate decryption matrix. Now match the byte which we got from image with each matrix element. And get corresponding row and column number of matched element. Convert the obtained row and column number into binary format. Deconjugate these two numbers which represents original data. 77
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 2.1.4Desteganography: Modified BPCS Figure 3. Algorithm to decrypt data and extract from image Image having embedded data is given as input . Algorithm: 1) Load the image into memory. 2) Get a "readable pen" for the memory image. 3) Get width and height of the memory image. 4) Generate a threshold value. 5) Loop for all rows of memory image Loop for all cols of memory image a) Using the "readable pen" get red, green and blue values of current pixel. b) If red <= threshold and green <= threshold and blue <= threshold then mark the pixel as NOISY (store in a list) 6) Loop for every element of NOISY pixel list a) Extract bytes of data from red, green and blue bands of noisy pixel. b) Deconjugate the secret blocks and form data bytes. c) Concatenate the data in a result buffer. 78
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.4, 2012 7) Write back the result buffer into a FILE Input data will be image having embedded data. Load the image into memory. Get width and height of the memory image. Generate a threshold value. Conclusion & Future Enhancements The work accomplished during this project can be summarized with the following points: 1) In this project we have presented a new system for the combination of cryptography and Steganography using matrix mapping method for Symmetric Key Cryptography and modified BPCS technique for Steganography which could be proven a highly secured method for data communication in near future. 2) Steganography especially combined with cryptography, is a powerful tool which enables people to communicate without possible eavesdroppers even knowing there is a form of communication in the first place. The proposed method provides acceptable image quality with very little distortion in the image. 3) The main advantage of this Cryptosteganography System is hybrid combination of cryptography and Steganography which provides double layer security. In future video or audio files can be used to hide data instead of images. References Visual Cryptography Steganography In Images, PiyushMarwaha , PareshMarwaha A steganography implementation ,Mehboob, B. Faruqui, R.A. Principle and application of BPCS-Steganography,Eiji Kawaguchi and Richard O.Eason,KIT,Japan Applied cryptography in Java ,Partida, A.Andina, D.Atos-ODS , S.A.Madrid. Data Security Using Data Hiding , Moon, S.K. Kawitkar, R.S.,PICT, Pune. Digital steganography: hiding data within data,Artz, D.;Los Alamos Nat. Lab., NM 79
  • 7. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).