30
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint Presented By: Ranjit R, Banshpal S.R.B GROUP OF INSTITUTIONS

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint

Embed Size (px)

Citation preview

Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Biometric Fingerprint

Presented By:Ranjit R, Banshpal

S.R.B GROUP OF

INSTITUTIONS

• Introduction• Problem Definition• Literature Survey• Methodology • Project Flow• Tools / Platform• Implementation Detail• Experimental Results• Conclusion• Future Scope• Publications Detail• References

Outline

Security is important factor for any communication system.

Like password in ATM, For social networking sites etc.

Security threat becomes a critical problem that must be solved by new reliable and robust identification, verification or cryptographic techniques .

Biometric method .

To reduce the storage space or for fast transmission or for fast sharing of any data compression technique is useful.

Reduced data size.

Introduction

System authentication

Data Integrity

Data Confidentiality

Contd...

In Password based protection, Password can be stolen or forget.

Traditional steganographic technique compresses secret image if its size is larger than cover image. that degrades the quality of secret image.

There is restriction on size of image data which is to be transferred if data hiding technique is used .

Less embedding capacity.

Existing system does not uses compression algorithm to efficiently compress image data .

Simple key is used for image encryption and decryption purpose.

Problem Definition

To overcome the above drawbacks

Single system is design which provides System authentication Data Integrity Data Confidentiality

Mosaic image method is used for secure transmission of secret image.

Biometric key is used for system authentication and image encryption.

Sr.no. Method Name Description

1. LSB Substitution [3][4]

• Simple technique for data embedding.• Most significant bits are embedded in least

significant bits.• Less embedding Capacity.

2. RGB intensity based Steganography [5]

• Data embedding takes place in one of the channel that is Red, Green and blue.

• Embedding capacity depends on the intensity value of pixel.

3. Difference Expansion Technique [3]

• It uses redundancy in digital images.• If less redundancy in image then performance

degraded

4. Reversible Data Hiding technique

• Based on histogram technique• Works on only grey- scale images only.

Literature Survey

Sr.no. Method Name Description

5. Confusion and Diffusion [8]

• It is an image encryption method.• First image get scrambled then decomposed

into several bit planes.• Uses key to encrypt each bit plain.

6. Secret –Fragment- Visible- Mosaic Image method [1]

• Secure image transmission method• It searches database for similar images for data embedding

7. DES based image Encryption [11]

• It uses 64 bit block cipher.• 56 bit key.• vulnerable to attack because of small key size

8. Selective Region-Based Method [18]

• In first phase the area which contain more information is selected for Encryption.• In second phase non encrypted and encrypted area get interchanged.

SHA -256 One way cryptographic function. used to generate biometric key from fingerprint.

Input 61 62 63 64 65 66Binary 00111101 00111110 00111111 01000000 01000001 01000010

Hash Ba7816bf 8f01cfea 414140de 5dae2223 b00361a3 96177a9c b410ff61 f20015ad

10101000111001101010101101011010101010100001010101 SHA-256 Hex

Key

Methodology

Secret –Fragment-Visible –Mosaic Image method

AdvantagesNo need to compress secret image. It makes an use of color characteristic of target image.Recovered Secret image is nearly lossless . No need of database for searching compatible target image.

JPEG Image Compression

• It is a lossy image compression.

• It divides the image into 8 * 8 blocks

• It makes an use of quantization process. Quantization process deals with reducing the number of colors required for representing color image.

AES algorithm

• It is a symmetric key algorithm.

• There are 3 types of AES, AES- 128, AES - 192, and AES-256

• It is stronger than DES algorithm.

Flow graph of Proposed system

Minimum Software Requirement

1. Operating System : Windows- XP or any later version of windows2. Language : Java3. Platform : Netbeans IDE 7.2 or later 4. Database : MySQL

•Minimum Hardware Requirement

1. Processor : Intel Pentium IV or later 2. RAM : 256 MB or more 3. Hard Disk Capacity : 2 GB or more 4. Fingerprint Scanner / Direct image

Tools / Platform

Implementation Details

Fig 1. System Login

Fig 2 .Generated 256-bit Key

Fig 3. Client side

Fig 4. Mosaic Image Compression Fig 5. Mosaic Image Encryption

Fig 6. Send to receiver

Fig 7. At receiver

Fig 8. Decompression

Fig 9. Secret Image Extraction

Secret Image Target Image

Target BlockMosaic Image

Mosaic Image Creation

Experimental Results

PSNR (Peak Signal to Noise Ratio)

RMSE Value ( Root Mean Square Error Value)

M

i

N

j

M

i

N

jijij

gf

gf

ijijMN

gfPSNR

MNgfRMSE

1 1

2

2

10

1 1

2

)()(

][255log

)()(1

10),(

][1,

Image Parameters

M= Number of pixels in first imageN= Number of pixels in second imageWhere MN= Total number of pixel in images

imagefirst in pixel of coordinate),(f

jiimage second of pixel of coordinate

),(g

ji

Fig 10. Comparison on the basis of PSNR value

Fig 11. Comparison on the basis of RMSE Value

Performance Analysis

Fig 12. Error value

Above graph shows the distortion between transmitted image and received image.

Fig 13. Comparison on the basis of Image Quality and Embedding Capacity

In this project Hybrid system is proposed which is more robust in nature.

Secret fragment visible mosaic image method is used for secure transmission through network. Proposed system has better PSNR value than existing system.

System authentication is provided by means of biometric fingerprint and data confidentiality is achieves by means of encryption method. For fast transmission of image data lossy compression technique is used.

Thus the proposed system provides data confidentiality, data integrity and system authentication in a single model.

Conclusion

Future work Includes Improving the efficiency of proposed system.

Instead of using single biometric feature like fingerprint for system authentication, multimodal biometric features can be used.

Proposed system can be implemented with different color model other than RGB.

Focus will be on better mosaic image creation.

Future Scope

Sr.No

Authors Title of Paper Journal /Conference Name,Volume, IssueDate / ISBN/ISSN

Impact Factor

DOI PageNo

1. Prashant Dahake

Prof. S.U. Nimbhorkar

Review on various Methods for Secure

Transmission of Images for

Maintaining Image Integrity

IJCSN (International Journal of Computer

Science and Network)Volume 3, Issue 6,

December 2014 Impact Factor .274

Published

December

2014450-454

2. Prashant Dahake

Prof. S.U. Nimbhorkar

Hybrid Cryptosystem for

Maintaining Image Integrity using

Biometric Fingerprint

.

International Conference on Pervasive Computing

ICPC 2015 Pune8-10 january 2015

ISBN 978 - 1 - 4799 - 6272 – 3

Published and

Presented1-5

Publication Detail

[1] I-Jen Lai, Wen-Hsiang Tsai, "Secret-Fragment-Visible Mosaic Image–A New Computer Art and Its Application to Information Hiding", Information Forensics and Security, IEEE Transactions on , vol.6, no.3, pp.936,945, Sept. 2011.

.[2] Gaurav Bhatnagar, Q. M. Jonathan Wu, “Biometric Inspired Multimedia

Encryption Based on Dual Parameter Fractional Fourier Transform”, IEEE Transaction on Systems, Man, and Cybernetics: Systems 2014.

[3] Ya-Lin Lee, Wen-Hsiang Tsai, "A New Secure Image Transmission Technique via Secret-Fragment-Visible Mosaic Images by Nearly Reversible Color Transformations", IEEE Transactions on  Circuits and Systems for Video Technology, vol.24, no.4, pp.695,703, April 2014.

[4] H. Yang, X. Sun, G. Sun, “A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution”, Journal: Radio engineering, vol. 18, no. 4, (2009), pp. 509-516.

[5] M. Tanvir Parvez, A. Abdul-Aziz Gutub, “RGB Intensity Based Variable-Bits Image Steganography”, IEEE Asia-Pacific Services Computing Conference, (2008), pp. 1322-1327

References

[6] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010).

[7] M. Chaumont, W. Puech, “DCT-Based Data Hiding Method To Embed the Color Information in a JPEG Grey Level Image”, 14th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, copyright by EURASIP, (2006) September 4-8.

[8] Naik,K. Pal, A.K., "An image cryptosystem based on diffusion of significant bit-planes of a scrambled image with generated binary key matrices" , IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp.1,4, 26-28 Dec. 2013.

[9] Priyanka dixit, Mayanka dixit, “Study of JPEG Image Compression Technique Using Discrete Cosine Transformation”, International Journal of Interdisciplinary Research and Innovations Vol. 1, Issue 1, pp: (32-35), October-December 2013.

[10] Ritu Pahal ,Vikas kumar, “Efficient Implementation of AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.

.

[11] Qian Gong-bin, Jiang Qing-feng, Qiu Shui-sheng, "A new image encryption scheme based on DES algorithm and Chua's circuit," IEEE International Workshop on Imaging Systems and Technique, pp.168,172, 11-12 May 2009.

[12]Pia Singh, Prof. Karamjeet Singh, “Image Encryption and Decryption Using Blowfish Algorithm In Matlab”, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013.

[13] U. Uludag, S. Pankanti, S. Prabhakar and A.K. Jain, “Biometric cryptosystems: issues and challenges”, Proceedings of the IEEE, Vol. 92, No. 6, Pp. 948 –960, 2004.

[14] Yao-Jen Chang, Wende Zhang, Tsuhan Chen, “Biometrics-based cryptographic key generation”, IEEE International Conference on Multimedia and Expo (ICME), Vol. 3, Pp. 2203 – 2206, 2004.

[15]Bhammar M.B, Mehta K.A, “Survey of Various Image Compression Techniques”, Ijdi-Eret- International Journal of Darashan Institute On Engineering Research & Emerging Technology Vol. 1, No. 1, 2012.

[16] Singh A., Gahlawa M. “Image Compression and its Various”, International Journal of Advanced Research in Computer Science and Software Engineering. Volume 3, Issue 6, June 2013.

[17]Hae-Yeoun Lee, “Generation of Photo-Mosaic Images through Block Matching and Color Adjustment”, International Journal of Computer, Information, Systems and Control Engineering Vol. 8 No.3, 2014.

[18] Ullah, I, Iqbal, W.; Masood, A, "Selective region based images encryption",  2nd National Conference on  Information Assurance (NCIA), pp.125,128, 11-12 IEEE 2013.

[19] V. Madhu Viswanatham, J. Manikonda, “A Novel Technique for Embedding Data in Spatial Domain”, International Journal on Computer Science and Engineering, IJCSE, vol. 2, (2010).

[20]Prashant Dahake and Sonali Nimbhorkar, “Review on Various Methods for Secure Transmission of Images for Maintaining Image Integrity”, IJCSN Journal Volume 3, Issue 6, December 2014.

[21] Prashant Dahake and Sonali Nimbhorkar, “Hybrid Cryptosystem for Maintaining Image Integrity using Biometric Fingerprint”, IEEE international conference on parvasive computing 2015.

Thank You