View
553
Download
2
Category
Preview:
Citation preview
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint
Presented By:Ranjit R, Banshpal
S.R.B GROUP OF
INSTITUTIONS
• Introduction• Problem Definition• Literature Survey• Methodology • Project Flow• Tools / Platform• Implementation Detail• Experimental Results• Conclusion• Future Scope• Publications Detail• References
Outline
Security is important factor for any communication system.
Like password in ATM, For social networking sites etc.
Security threat becomes a critical problem that must be solved by new reliable and robust identification, verification or cryptographic techniques .
Biometric method .
To reduce the storage space or for fast transmission or for fast sharing of any data compression technique is useful.
Reduced data size.
Introduction
In Password based protection, Password can be stolen or forget.
Traditional steganographic technique compresses secret image if its size is larger than cover image. that degrades the quality of secret image.
There is restriction on size of image data which is to be transferred if data hiding technique is used .
Less embedding capacity.
Existing system does not uses compression algorithm to efficiently compress image data .
Simple key is used for image encryption and decryption purpose.
Problem Definition
To overcome the above drawbacks
Single system is design which provides System authentication Data Integrity Data Confidentiality
Mosaic image method is used for secure transmission of secret image.
Biometric key is used for system authentication and image encryption.
Sr.no. Method Name Description
1. LSB Substitution [3][4]
• Simple technique for data embedding.• Most significant bits are embedded in least
significant bits.• Less embedding Capacity.
2. RGB intensity based Steganography [5]
• Data embedding takes place in one of the channel that is Red, Green and blue.
• Embedding capacity depends on the intensity value of pixel.
3. Difference Expansion Technique [3]
• It uses redundancy in digital images.• If less redundancy in image then performance
degraded
4. Reversible Data Hiding technique
• Based on histogram technique• Works on only grey- scale images only.
Literature Survey
Sr.no. Method Name Description
5. Confusion and Diffusion [8]
• It is an image encryption method.• First image get scrambled then decomposed
into several bit planes.• Uses key to encrypt each bit plain.
6. Secret –Fragment- Visible- Mosaic Image method [1]
• Secure image transmission method• It searches database for similar images for data embedding
7. DES based image Encryption [11]
• It uses 64 bit block cipher.• 56 bit key.• vulnerable to attack because of small key size
8. Selective Region-Based Method [18]
• In first phase the area which contain more information is selected for Encryption.• In second phase non encrypted and encrypted area get interchanged.
SHA -256 One way cryptographic function. used to generate biometric key from fingerprint.
Input 61 62 63 64 65 66Binary 00111101 00111110 00111111 01000000 01000001 01000010
Hash Ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c b410ff61 f20015ad
10101000111001101010101101011010101010100001010101 SHA-256 Hex
Key
Methodology
Secret –Fragment-Visible –Mosaic Image method
AdvantagesNo need to compress secret image. It makes an use of color characteristic of target image.Recovered Secret image is nearly lossless . No need of database for searching compatible target image.
JPEG Image Compression
• It is a lossy image compression.
• It divides the image into 8 * 8 blocks
• It makes an use of quantization process. Quantization process deals with reducing the number of colors required for representing color image.
AES algorithm
• It is a symmetric key algorithm.
• There are 3 types of AES, AES- 128, AES - 192, and AES-256
• It is stronger than DES algorithm.
Minimum Software Requirement
1. Operating System : Windows- XP or any later version of windows2. Language : Java3. Platform : Netbeans IDE 7.2 or later 4. Database : MySQL
•Minimum Hardware Requirement
1. Processor : Intel Pentium IV or later 2. RAM : 256 MB or more 3. Hard Disk Capacity : 2 GB or more 4. Fingerprint Scanner / Direct image
Tools / Platform
PSNR (Peak Signal to Noise Ratio)
RMSE Value ( Root Mean Square Error Value)
M
i
N
j
M
i
N
jijij
gf
gf
ijijMN
gfPSNR
MNgfRMSE
1 1
2
2
10
1 1
2
)()(
][255log
)()(1
10),(
][1,
Image Parameters
M= Number of pixels in first imageN= Number of pixels in second imageWhere MN= Total number of pixel in images
imagefirst in pixel of coordinate),(f
jiimage second of pixel of coordinate
),(g
ji
Fig 10. Comparison on the basis of PSNR value
Fig 11. Comparison on the basis of RMSE Value
Performance Analysis
In this project Hybrid system is proposed which is more robust in nature.
Secret fragment visible mosaic image method is used for secure transmission through network. Proposed system has better PSNR value than existing system.
System authentication is provided by means of biometric fingerprint and data confidentiality is achieves by means of encryption method. For fast transmission of image data lossy compression technique is used.
Thus the proposed system provides data confidentiality, data integrity and system authentication in a single model.
Conclusion
Future work Includes Improving the efficiency of proposed system.
Instead of using single biometric feature like fingerprint for system authentication, multimodal biometric features can be used.
Proposed system can be implemented with different color model other than RGB.
Focus will be on better mosaic image creation.
Future Scope
Sr.No
Authors Title of Paper Journal /Conference Name,Volume, IssueDate / ISBN/ISSN
Impact Factor
DOI PageNo
1. Prashant Dahake
Prof. S.U. Nimbhorkar
Review on various Methods for Secure
Transmission of Images for
Maintaining Image Integrity
IJCSN (International Journal of Computer
Science and Network)Volume 3, Issue 6,
December 2014 Impact Factor .274
Published
December
2014450-454
2. Prashant Dahake
Prof. S.U. Nimbhorkar
Hybrid Cryptosystem for
Maintaining Image Integrity using
Biometric Fingerprint
.
International Conference on Pervasive Computing
ICPC 2015 Pune8-10 january 2015
ISBN 978 - 1 - 4799 - 6272 – 3
Published and
Presented1-5
Publication Detail
[1] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding", Information Forensics and Security, IEEE Transactions on , vol.6, no.3, pp.936,945, Sept. 2011.
.[2] Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia
Encryption Based on Dual Parameter Fractional Fourier Transform”, IEEE Transaction on Systems, Man, and Cybernetics: Systems 2014.
[3] Ya-Lin Lee, Wen-Hsiang Tsai, "A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations", IEEE Transactions on Circuits and Systems for Video Technology, vol.24, no.4, pp.695,703, April 2014.
[4] H. Yang, X. Sun, G. Sun, “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”, Journal: Radio engineering, vol. 18, no. 4, (2009), pp. 509-516.
[5] M. Tanvir Parvez, A. Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, IEEE Asia-Pacific Services Computing Conference, (2008), pp. 1322-1327
References
[6] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010).
[7] M. Chaumont, W. Puech, “DCT-Based Data Hiding Method To Embed the Color Information in a JPEG Grey Level Image”, 14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, copyright by EURASIP, (2006) September 4-8.
[8] Naik,K. Pal, A.K., "An image cryptosystem based on diffusion of significant bit-planes of a scrambled image with generated binary key matrices" , IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp.1,4, 26-28 Dec. 2013.
[9] Priyanka dixit, Mayanka dixit, “Study of JPEG Image Compression Technique Using Discrete Cosine Transformation”, International Journal of Interdisciplinary Research and Innovations Vol. 1, Issue 1, pp: (32-35), October-December 2013.
[10] Ritu Pahal ,Vikas kumar, “Efficient Implementation of AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.
.
[11] Qian Gong-bin, Jiang Qing-feng, Qiu Shui-sheng, "A new image encryption scheme based on DES algorithm and Chua's circuit," IEEE International Workshop on Imaging Systems and Technique, pp.168,172, 11-12 May 2009.
[12]Pia Singh, Prof. Karamjeet Singh, “Image Encryption and Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.
[13] U. Uludag, S. Pankanti, S. Prabhakar and A.K. Jain, “Biometric cryptosystems: issues and challenges”, Proceedings of the IEEE, Vol. 92, No. 6, Pp. 948 –960, 2004.
[14] Yao-Jen Chang, Wende Zhang, Tsuhan Chen, “Biometrics-based cryptographic key generation”, IEEE International Conference on Multimedia and Expo (ICME), Vol. 3, Pp. 2203 – 2206, 2004.
[15]Bhammar M.B, Mehta K.A, “Survey of Various Image Compression Techniques”, Ijdi-Eret- International Journal of Darashan Institute On Engineering Research & Emerging Technology Vol. 1, No. 1, 2012.
[16] Singh A., Gahlawa M. “Image Compression and its Various”, International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 6, June 2013.
[17]Hae-Yeoun Lee, “Generation of Photo-Mosaic Images through Block Matching and Color Adjustment”, International Journal of Computer, Information, Systems and Control Engineering Vol. 8 No.3, 2014.
[18] Ullah, I, Iqbal, W.; Masood, A, "Selective region based images encryption", 2nd National Conference on Information Assurance (NCIA), pp.125,128, 11-12 IEEE 2013.
[19] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010).
[20]Prashant Dahake and Sonali Nimbhorkar, “Review on Various Methods for Secure Transmission of Images for Maintaining Image Integrity”, IJCSN Journal Volume 3, Issue 6, December 2014.
[21] Prashant Dahake and Sonali Nimbhorkar, “Hybrid Cryptosystem for Maintaining Image Integrity using Biometric Fingerprint”, IEEE international conference on parvasive computing 2015.
Recommended