15
IMPLEMENTATION OF BPCS-STEGANOGRAPHY (SYNOPSIS)

Implementation of bpsc stegnography ( synopsis)

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Implementation of bpsc stegnography ( synopsis)

IMPLEMENTATION OF BPCS-STEGANOGRAPHY

(SYNOPSIS)

Page 2: Implementation of bpsc stegnography ( synopsis)

ABSTRACT IMPLEMENTATION OF BPCS-STEGANOGRAPHY

Steganography is a technique to hide secret information in some other data (we call it a vessel) without leaving any apparent evidence of data alteration. All of the traditional steganographic techniques have limited information-hiding capacity. They can hide only 10% (or less) of the data amounts of the vessel. This is because the principle of those techniques was either to replace a special part of the frequency components of the vessel image, or to replace all the least significant bits of a multivalued image with the secret information. Our new Steganography uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel.

This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality. We termed our Steganography “BPCS-Steganography,” which stands for Bit-Plane Complexity Segmentation Steganography.

Page 3: Implementation of bpsc stegnography ( synopsis)

INTRODUCTION

INTRODUCTION TO THE AREA Internet communication has become an integral part of the

Infrastructure of today’s world. The information communicated comes in numerous forms and is used in many applications. In a large number of these applications, it is desired that the communication be done in secrete. Such secret communication ranges from the obvious cases of bank transfers, corporate communications, and credit card purchases, on down to a large percentage o f everyday email. With email, many people wrongly assume that their communication is safe because it is just a small piece of an enormous amount of data being sent worldwide. After all, who is going to see it? But in reality, the Internet is not a secure medium, and there are programs “out there” which just sit and watch messages go by for interesting information.

Encryption provides an obvious approach to information security, and encryption programs are readily available. However, encryption clearly marks a message as containing “interesting” information, and the encrypted message becomes subject to attack. Furthermore, in many cases it is desirable to send information without anyone even noticing that information has been sent secret information. Some of them use the least significant bits of the image data to hide the data. Other programs embed the secret information in a Steganography presents another approach to information security. In steganography, data is hidden inside a vessel or container that looks

Page 4: Implementation of bpsc stegnography ( synopsis)

like it contains only something else. A variety of vessels are possible, such as digital images, sound clips, and even executable files. In recent years, several steganographic programs have been posted on Internet home pages. Most of them use image data for the container of the specific band of the spatial frequency component of the carrier Some other programs make use of the sampling error in image digitization. However, all those steganographic techniques are limited in terms of information hiding capacity. They can embed only 5-15 % of the vessel image at the best. Therefore, current steganography is more oriented to water marking of computer data than to secret person-person communication applications. We have invented a new technique to hide secret information in a color image. This is not based on a programming technique, but is based on the property of human vision system. Its information hiding capacity can be as large as 50% of the original image data. This could open new Applications for steganography leading to a more secure Internet Communication age. Digital images are categorized as either binary (black-and-white) or multi-valued pictures despite their actual color. We can decompose an n-bit image into a set of n binary images by bit-slicing operations [1][2]. Therefore, binary image analysis is essential to all digital image processing. Bit slicing is not necessarily the best in the Pure-Binary Coding system (PBC), but in some cases the Canonical Gray Coding system (CGC) is much better [3].

Page 5: Implementation of bpsc stegnography ( synopsis)

TECHNOLOGIES This project has been developed to work all in SUN platforms for the client side and it needs APPLET as the server side platform. We have used JAVA coding AWT and Swing components and we have implemented these components in JAVA. The windows API calls are mainly used in all objects to get required systems files.

SECURITY CONSIDERATIONS

THE RSA ALGORITHM INTRODUCTION:

The RSA scheme is a block cipher in which the plaintext and cipher text are integers between 0 and n-1 for some n.A typical size for n is 1024 bits or 309 decimal digits. The RSA scheme has since that time reigned supreme as the most widely accepted and implemented general purpose to public key encryption.

DESCRIPTION: The scheme developed by Rivest, Shamir and Adleman makes use of an expression with exponentials. Plaintext is encrypted in blocks, with each block having a binary value less than some number n.That is, the block size must be less than or equal to log2(n) ; in practice, the block size is k bits, where 2k < n < 2k+1 .Encryption and decryption are of the following form, for some plaintext block M and cipher text block C: C = Me mod n

M = Cd mod n = (Me) d mod n = Med mod n

Both sender and receiver must know the value of n.The sender knows the value of e and only the receiver knows the value of d.Thus, this is a public key encryption algorithm with a public key of KU = {d,n}.

Page 6: Implementation of bpsc stegnography ( synopsis)

For this algorithm to be satisfactory for public key encryption, the following requirements to be met :1. It is possible to find the values of e, d, n such that Med = M mod n for all M < n.2. It is relatively easy to calculate Me and Cd for all values of M < n.3. It is infeasible to determine d given e and n.

For now,we focus on the first requirement and consider the other questions later.We need to find a relationship of the form

Med = M mod n Given two prime numbers and q, and two integers and m, such that n=pq and 0<m<n, and arbitrary integer k, the following relationships holds:

Mkφ (n)+1 = mk(p-1)(q-1)+1 = m mod n

Where φ(n) is the euler’s totient function, which is the number of positive integers less than n and relatively prime to n. it is shown that for p,q prime,φ(p,q)=(p-1)(q-1). Thus we can achieve the desired relationship if

ed = kφ(n)+1This is equivalent to saying:

ed = 1 mod φ(n) d = e-1 mod φ(n)

Page 7: Implementation of bpsc stegnography ( synopsis)

That is, e and d are multiplicative inverses mod φ (n). Note that, according to the rules of modular arithmetic, this is true only if d (and therefore e) is relatively prime to φ (n). Equivalently, gcd (φ(n),d) = 1. We are now ready to state the rsa scheme.the ingredients are the following:

P, q, two prime numbers (private, chosen)n = pq (public, calculated)e, with gcd(φ(n),e) = 1; 1< e < φ(n) (public, chosen)d = e-1mod φ(n) (private, calculated)

The private key consist of {d,n} and the public key consists of {e,n}.suppose that user a has published its public key and that user b wishes to send the message M to A. then b calculates C = Me (mod n) and transmits C. on receipt of this cipher text, user a decrypts by calculating M = Cd (mod n). It is worthwhile to summarize the justification for this algorithm. We have chosen e and d such that

d = e-1 mod ø (n)

Therefore, Ed = 1 mod ø (n)Therefore,ed is of the form kø(n)+1 So M ed = mod n .Now

Page 8: Implementation of bpsc stegnography ( synopsis)

C = Me mod n M = Cd mod n = (Me)d mod n = M mod nThe keys were generated as follows:1. Select two prime numbers p and q 2. Calculate n = pq 3. Calculate ø (n) = (p-1) (q-1)4. Select e such that e is relatively prime to ø (n) and less than ø(n)5. Determine d such that de = 1 mod ø (n)

KEY GENERATION Before the application of the public key cryptosystem, each participant must generate a pair of keys. This involves the following tasks:1. Determining two prime numbers, p and q2. Selecting either e or d and calculating the other

The procedure for picking a prime number is as follows:1. Pick an odd integer n at random2. Pick an integer a < n at random3. Perform the probabilistic primarily test, such as Miller Rabin. If n fails the test, reject the value n and go to step 1.4. If n has passed a sufficient number of tests, accept n; otherwise, go to step

THE SECURITY OF RSA Three possible approaches to attacking the RSA algorithm are as follows :1. Brute force: This involves trying all possible private keys.

Page 9: Implementation of bpsc stegnography ( synopsis)

2. Mathematical attacks: There are several approaches, all equivalent in effect to factoring the product of two primes3. Timing attacks: These depend on the running time of the decryption algorithm.

SYSTEM STUDY

EXISTING WORK •Information send through any network have a chance to attack

by hackers•Encryption provides an obvious approach to information

security, and encryption programs are readily available. However, encryption clearly marks a message as containing “interesting” information, and the encrypted message becomes subject to attack. Furthermore, in many cases it is desirable to send information without anyone even noticing that information has been sent secret information.

OBJECTIVE OF THE PROPOSED SYSTEM The main objective of this system is we never leave any

information about something will be hided in that vessel. PROPOSED SYSTEM

Page 10: Implementation of bpsc stegnography ( synopsis)

•In Steganography, data is hidden inside a vessel or container that looks like it contains only something else. A variety of vessels are possible, such as digital images, sound clips, and even executable files.

•All of the traditional steganographic techniques have limited information-hiding capacity. They can hide only 10% (or less) of the data amounts of the vessel.

•This Technique uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel.

•We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality

•We termed our Steganography “BPCS-Steganography,” which stands for Bit-Plane Complexity Segmentation Steganography

Page 11: Implementation of bpsc stegnography ( synopsis)

PROPOSED SYSTEM MODULES Hider

File Segmentation (8 X 8)Noise Level IdentifierComplexity IdentifierGray ConverterNoisy level RevalidatorSecret File SegmentorText & Image bits replacerImage Reproducer

Retriever Image ScannerImage Segmentor (8 x 8)Complex Plan IdentifierInformation RetrieverProcess State Identifier

JUSTIFICATION •In Encryption, Message can be hacked, because some one can

easily detect the encrypted file.•This technique makes use of the characteristics of the human

vision system whereby a human cannot perceive any shape information in a very complicated binary pattern.

Page 12: Implementation of bpsc stegnography ( synopsis)

REQUIREMENTS ANALYSIS AND SPECIFICATION HARDWARE REQUIREMENTS

Processor : Pentium Celeron

Processor Speed : 850 MHZ

Memory Size : 128MB

Hard Disk Drive : 40GB SOFTWARE REQUIREMENTS Operating System : Windows 98/2000/NT

Front End : JAVA 1.5.0