Implementation of reversible Data Hiding in Encrypted Image using A-S Algorithm

Data encryption is the best way to provide secure communication. The paper presents a novel approach to data hiding using a symmetric stream cipher known as A-S Algorithm. Here the user can have two keys: Encryption Key and Data Hiding Key. Using the A-S Algorithm the image encryption is performed. After encryption the additional data will be hided in the encrypted image with the use of data hiding key. For extraction of the hidden data first apply decryption algorithm with the use of the key and then extract the additional data. The computational complexity of the proposed method is lesser than that of the existing methods and the performance is much higher. The novel approach only requires very feeble amount of time for the conversion. The algorithm can be applied to any kind of data such as images, videos, audios, etc. Here the main concentration is given to Data Hiding in Encrypted Images.

[1]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[2]  T. D. B. Weerasinghe,et al.  An effective RC4 stream cipher , 2013, 2013 IEEE 8th International Conference on Industrial and Information Systems.

[3]  A. J. Raphael,et al.  Cryptography and Steganography – A Survey , .

[4]  Chao-Hsi Huang,et al.  RFID systems integrated OTP security authentication design , 2013, 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference.

[5]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[6]  Yuan Yan Tang,et al.  Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling , 2014, IEEE Transactions on Information Forensics and Security.

[7]  Hardikkumar V. Desai Steganography, Cryptography, Watermarking: A Comparative Study , 2012 .

[8]  S. O. Sharif,et al.  Performance analysis of stream and block cipher algorithms , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[9]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[10]  Yuhei Nagao,et al.  Hardware Implementation of High Throughput RC4 algorithm , 2012, 2012 IEEE International Symposium on Circuits and Systems.

[11]  Changda Wang,et al.  Book Cipher with Infinite Key Space , 2008, 2008 International Symposium on Information Science and Engineering.

[12]  Chaple Gopal,et al.  Reversible Data Hiding in Encrypted Images , 2014 .

[13]  Qamar Abbas,et al.  Energy efficient sensor network security using Stream cipher mode of operation , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[14]  Lin Ding,et al.  Cryptanalysis of Lightweight WG-8 Stream Cipher , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Aswin Achuthshankar,et al.  A novel symmetric cryptography algorithm for fast and secure encryption , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).

[16]  K. S. Rangasamy,et al.  SEPARABLE REVERSIBLE DATA HIDING USING COMPRESSION IN ENCRYPTED IMAGE , 2013 .

[17]  ByungRae Cha,et al.  Design and Efficiency Analysis of New OTP System Using Homomorphic Graph of Fingerprint Features , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[18]  Kamred UdhamSingh A Survey on Image Steganography Techniques , 2014 .

[19]  Chhattar Singh Lamba Design and Analysis of Stream Cipher for Network Security , 2010, 2010 Second International Conference on Communication Software and Networks.

[20]  Mohammad V. Malakooti,et al.  A new symmetric cryptography algorithm to secure e-commerce transactions , 2010, 2010 International Conference on Financial Theory and Engineering.

[21]  S. Indarjani,et al.  Comparison the insertion attack effects on randomness property of Dragon and Rabbit stream cipher , 2013, 2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA).

[22]  R. Murugesh Advanced biometric ATM machine with AES 256 and steganography implementation , 2012, 2012 Fourth International Conference on Advanced Computing (ICoAC).

[23]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Muhammad Khurram Khan,et al.  OTP-Based Two-Factor Authentication Using Mobile Phones , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[25]  Xinpeng Zhang,et al.  Reversible Data Hiding With Optimal Value Transfer , 2013, IEEE Transactions on Multimedia.

[26]  N. Sujatha,et al.  A review of some recent stream ciphers , 2013, 2013 International conference on Circuits, Controls and Communications (CCUBE).

[27]  Hyotaek Lim,et al.  Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[28]  Wai Wai Zin,et al.  Implementation and analysis of three steganographic approaches , 2011, 2011 3rd International Conference on Computer Research and Development.

[29]  Xiaofeng Wang,et al.  An Improved Algorithm of Stream Cipher Based on LFSR , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[30]  B. Achiriloaie,et al.  VI REFERENCES , 1961 .

[31]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[32]  Othman Omran Khalifa,et al.  A new method for generating cryptographically strong sequences of pseudo random bits for stream cipher , 2010, International Conference on Computer and Communication Engineering (ICCCE'10).

[33]  Tung-Shou Chen,et al.  An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.

[34]  Jian Xie,et al.  An improved RC4 stream cipher , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[35]  Chang Nian Zhang,et al.  RC4 state and its applications , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[36]  Shikha Sharda,et al.  Image Steganography: A Review , 2013 .

[37]  Navneet Kaur,et al.  A Survey on various types of Steganography and Analysis of Hiding Techniques , 2014 .

[38]  ByungRae Cha,et al.  Design of New OTP System Using Homomorphic Graph by Changed Location and Angle of Fingerprint Features , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.

[39]  Rakesh Shukla,et al.  Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem , 2013, 2013 International Conference on Machine Intelligence and Research Advancement.