Future Identity Card Using Lattice-Based Cryptography and Steganography
Future Identity Card Using Lattice-Based Cryptography and Steganography
Future Identity Card Using Lattice-Based Cryptography and Steganography
1 Introduction
Toward incoming future communication, business in secured 5G networks flour-
ish on the confidentiality, integrity, and availability of personal or group business
information. The task of ensuring business information safety is very simple in
a closed environment but in can be complex in an open environment. It drives
companies to outsource their system security and maintenance in order to re-
duce costs and streamlines. On the other hand, the outsourcing method allows
at least two possible security breaches to the company’s system i.e., a process
perspective and a technology perspective. By outsourcing its data and system
maintenance to other party, the company allows their business partner to access
and process critical data such as government data, medical data, intellectual
capital, etc. Not only that the company must get its business partners to com-
mit to the formalized security measures and policies, but also must take steps
2 F. Kurniawan and G.B. Satrya
As for the rest of this research, section 2 reviews recent researches on ad-
vanced cryptography and steganography. Section 3 explains the proposed archi-
tecture including the encoding and decoding procedures. Then, the details of
results and benchmarking with existing cryptography are provided in section 4.
Finally, section 5 gives the conclusions of this research.
2 Literature Review
A new method in information security was presented by Joshi and Yadav for
image LSB steganography in gray images combined with Vernam cryptography
[12]. First, the message was encrypted using Vernam cipher algorithm and then
the encrypted message was embedded inside an image using the new image
steganography. LSB with shifting steganography was proposed by performing
circular left shift operation and XOR operation. The amount of pixels in an
image were 256*256 i.e., 65536 while the amount of hidden bit were 65536.
If all of LSB bits were being extracted by the intruder, they would not get the
message. The experimental result showed that all PSNR values were below 70dB.
Mittal et al. combined and implemented RSA asymmetric key cryptography
and least significant bit steganography technique [13]. The original message was
encrypted by using RSA and the cipher text obtained as the output was taken
as an input data for being embedded in the cover image, the subsequent stego-
image had cipher text embedded in it. The analysis revealed that for preserving
the implementation of LSB technique and RSA data security algorithm, the most
crucial thing was to ensure that the size of original image and stego image must
be equivalent and it also applied for plain text and cipher text used in RSA.
Histogram, time complexity, and space complexity analysis were also provided
as experiment results but the process to obtain the results were not described
thoroughly.
Rachmawanto et al. proposed steganographic mobile applications using LSB
method by adding AES encryption to improve security [17]. First, entered the
text and the key AES that will be hidden. Second, read the cover image and the
LSB key, then performed the embedding process by using LSB algorithm. In the
preprocessing data, it was tested using five different sizes of cover images. The
result of PSNR and histogram were obtained with most of the averages to be
under 70dB.
4 F. Kurniawan and G.B. Satrya
Abood introduced RC4 stream cipher for encryption and decryption pro-
cesses based on image matrix. The study also proposed steganography by using
hash-LSB (HLSB) with RGB pixel shuffling [1]. RC4 only requires byte-length
manipulations so it is suitable for embedded systems. Despite the vulnerabilities
in RC4, the combination of RC4 and RGB pixel shuffling makes it almost impos-
sible to break. The image encryption and decryption processes used pixel shuf-
fling. However, the PSNR and security quality values showed that this method
still needed improvements.
Alotaibi et al. designed security authentication systems on mobile devices
by combining hash, cryptography, and steganography mechanisms [3]. The hash
function provided a message authentication service to verify authentication and
integrity, as found in MD5 and SHA-1. During signup or login, a cover image
was chosen by the user as a digital signature. Afterward, the user would encrypt
the password using AES algorithm with username as a key. Then, the result of
AES algorithm would be hidden in cover image by using LSB algorithm. The
study concluded three recommended techniques e.g., AES with LSB, hash with
LSB, and the combination of hash, AES, and LSB. According to the results, all
PSNR values were less than 40dB.
Methodology
No Relevant Study Remarks
Phase 1 Phase 2
1 Joshi and Yadav [12] First encrypted using LSB with shifting PSNR and histrogram
Vernam cipher algo- (LSB-S) with different message
rithm sizes
2 Reddy and Kumar [18] Text is encrypted usingLSB with LL sub- no evaluation of the
AES band wavelet decom- stego image
posed image
3 Bukhari et al. [7] LSB steganography Double random phase PSNR and entropy
encoding (DRPE) with noise type (Gaus-
cryptography sian, salt & pepper
and speckle)
4 Mittal et al. [13] RSA for the message LSB for the images Time complexity,
space complexity,
histogram
5 Patel and Meena [15] Pseudo random num- Dynamic key rotation PSNR
ber (PRN) which pro- cryptography
vide double layer secu-
rity
6 Phadte and Dhanaraj [16] Randomized LSB encrypted using Histogram and key
steganography chaotic theory sensitive analysis
7 Rachmawanto et al. [17] AES-128 bit for the LSB for the images PSNR and histrogram
text with different image
sizes
8 Chaucan et al. [8] Variable block size LSB steganography PSNR and entropy
cryptography
9 Abood [1] RC4 cryptography for Hash-LSB steganogra- PSNR, histogram, se-
image phy curity quality, elapsed
time for secret images
and cover images
10 Saxena et al. [19] Proposed encryption LSB PSNR and entropy
architecture using
EI(secret image), k,
and CI (cover image)
11 Budianto et al. [6] ECC for data informa- LSB for person picture PSNR
tion
Future Identity Card using Lattice-based Cryptography and Steganography 5
To the best of authors’ knowledge, the preliminary stage in this research has
been carried out by surveying eleven relevant literature in the last five years.
Table 1 explained and compared the literature thoroughly in order to find a
gap that can be used as the art of the state for this research in crypto-stegano
system.
µ ≡ Fq ~ g mod q (2)
ξ ≡ pφ ~ µ + m mod q (3)
Decrypting the message, in the event that Bob has received the message ξ
from Alice, Bob wants to decrypt it using his private key f . To do this efficiently,
Bob should precompute the polynomial Fp . In order to decrypt ξ, Bob first has
to compute as Eq 4. Bob then chooses the coefficients of ψ in the interval from
−q/2 to q/2. Now considering ψ as a polynomial with integer coefficient, Bob
recovers the message by computing as Eq 5.
ψ ≡f ~ξ mod q (4)
Fp ~ ψ mod p (5)
6 F. Kurniawan and G.B. Satrya
3 Proposed System
3.1 System Architecture
The embedding system will be begun with message encryption, producing the
cipher and preparing the cover image as the carrier as can be seen in Figure 1. To
manipulate the last bits of the designated pixels by using spiral-LSB, both the
cipher and the cover image need to be converted to bits. The converted bits on
the image are the values of the pixels R, G, B channel. After the bit conversion,
next is calculating the cipher length, then the cipher bits and the image bits will
be generated. To do encoding in spiral pattern, the first step is to generate the
location list of the pixels(x, y), the center will be the starting point. The cipher
length will be encoded in the carrier on the first n-bytes (customize) as identifier
of the amount of data embedded on the carrier so the decoder knows where to
stop decoding. Then, every bits of the cipher is placed into the last bit of every
R, G, B value of the pixel. When all last bit of the pixels is filled, the encoder
will proceed to the previous bit slot, and repeat the process for the rest of the
cipher bits. The spiral-LSB encoding is expected to be an improvement of the
conventional LSB.
Spiral-LSB
Stegano
Image
Encode
The test was carried out by using 32 bytes of plaintext and various key length
for each cryptosystem. This research provided two NTRU recommendations with
different keys. NTRU gave a fairly constant result even when the key length level
was increased. As can be seen, there was quite a high increase in the key in RSA
which was the time consumption of the encode and decode processes. In addition,
by increasing the key length of NTRU also resulted in a fairly constant PSNR.
To verify the quality of stegano images when embedded with encryption is
shown in Figure 2 from the histogram. The results of this research have success-
fully demonstrated the differences in histogram from the original image with AES
and RSA. These results explained that NTRU can produce more stable stegano
image quality as the difference between NTRU-439 and NTRU-743. Abiding the
proceeding rules about number of pages, the detailed results for the histogram
will not be shown instead the Lena image is used a representative of the results.
5 Conclusion
Acknowledgment
This research was collaborated between School of Computing and School of Ap-
plied Science, Telkom University. This research was also funded by PPM, Telkom
University. Informed consent was obtained from all individual participants in-
cluded in the research and the authors declare that there is no conflict of interest.
Future Identity Card using Lattice-based Cryptography and Steganography 9
3000 3000
2500 2500
2000 2000
Pixels
Pixels
1500 1500
1000 1000
500 500
0 0
0 50 100 150 200 250 0 50 100 150 200 250
RGB Value RGB Value
(a) Histogram analysis of original Lena (b) Histogram analysis of Lena with
AES
3000 3000
2500 2500
2000 2000
Pixels
Pixels
1500 1500
1000 1000
500 500
0 0
0 50 100 150 200 250 0 50 100 150 200 250
RGB Value RGB Value
(c) Histogram analysis of Lena with (d) Histogram analysis of Lena with
RSA NTRU
References
1. Abood, M.H.: An efficient image cryptography using hash-lsb steganography with
rc4 and pixel shuffling encryption algorithms. In: 2017 Annual Conference on New
Trends in Information Communications Technology Applications (NTICT). pp.
86–90 (March 2017). https://doi.org/10.1109/NTICT.2017.7976154
2. Ajtai, M.: Generating hard instances of lattice problems (extended abstract).
In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory
of Computing. pp. 99–108. STOC ’96, ACM, New York, NY, USA (1996).
https://doi.org/10.1145/237814.237838
3. Alotaibi, M., Al-hendi, D., Alroithy, B., AlGhamdi, M., Gutub, A.: Secure mobile
computing authentication utilizing hash, cryptography and steganography combi-
nation. Journal of Information Security and Cybercrimes Research (JISCR) 2(1)
(2019). https://doi.org/10.26735/16587790.2019.001
4. Bloisi, D.D., Iocchi, L.: Image based steganography and cryptography. In: VISAPP
(1). pp. 127–134. Citeseer (2007)
5. Brakerski, Z., Vaikuntanathan, V.: Lattice-based fhe as secure as pke. In:
Proceedings of the 5th Conference on Innovations in Theoretical Com-
10 F. Kurniawan and G.B. Satrya
puter Science. pp. 1–12. ITCS ’14, ACM, New York, NY, USA (2014).
https://doi.org/10.1145/2554797.2554799
6. Budianto, C.D., Wicaksana, A., Hansun, S.: Elliptic curve cryptography and lsb
steganography for securing identity data. In: Lee, R. (ed.) Applied Computing and
Information Technology. pp. 111–127. Springer International Publishing, Cham
(2019). https://doi.org/10.1007/978-3-030-25217-5 9
7. Bukhari, S., Arif, M.S., Anjum, M.R., Dilbar, S.: Enhancing security of images by
steganography and cryptography techniques. In: 2016 Sixth International Confer-
ence on Innovative Computing Technology (INTECH). pp. 531–534 (Aug 2016).
https://doi.org/10.1109/INTECH.2016.7845050
8. Chauhan, S., Jyotsna, Kumar, J., Doegar, A.: Multiple layer text security using
variable block size cryptography and image steganography. In: 2017 3rd Inter-
national Conference on Computational Intelligence Communication Technology
(CICT). pp. 1–7 (Feb 2017). https://doi.org/10.1109/CIACT.2017.7977303
9. Goldreich, O., Goldwasser, S., Halevi, S.: Collision-free hashing from lattice prob-
lems. IACR Cryptology ePrint Archive 1996, 9 (1996)
10. Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryptosystems from lat-
tice reduction problems. In: Kaliski, B.S. (ed.) Advances in Cryptology —
CRYPTO ’97. pp. 112–131. Springer Berlin Heidelberg, Berlin, Heidelberg (1997).
https://doi.org/10.1007/BFb0052231
11. Hoffstein, J., Pipher, J., Silverman, J.H.: Ntru: A ring-based public key cryptosys-
tem. In: Buhler, J.P. (ed.) Algorithmic Number Theory. pp. 267–288. Springer
Berlin Heidelberg, Berlin, Heidelberg (1998). https://doi.org/10.1007/BFb0054868
12. Joshi, K., Yadav, R.: A new lsb-s image steganography method blend with
cryptography for secret communication. In: 2015 Third International Con-
ference on Image Information Processing (ICIIP). pp. 86–90 (Dec 2015).
https://doi.org/10.1109/ICIIP.2015.7414745
13. Mittal, S., Arora, S., Jain, R.: Pdata security using rsa encryption
combined with image steganography. In: 2016 1st India International
Conference on Information Processing (IICIP). pp. 1–5 (Aug 2016).
https://doi.org/10.1109/IICIP.2016.7975347
14. Narayana, S., Prasad, G.: Two new approaches for secured image steganography us-
ing cryptographic techniques and type conversions. Signal & Image Processing: An
International Journal (SIPIJ) 1(2) (2010). https://doi.org/10.5121/sipij.2010.1206
15. Patel, N., Meena, S.: Lsb based image steganography using dynamic
key cryptography. In: 2016 International Conference on Emerging
Trends in Communication Technologies (ETCT). pp. 1–5 (Nov 2016).
https://doi.org/10.1109/ETCT.2016.7882955
16. Phadte, R.S., Dhanaraj, R.: Enhanced blend of image steganography
and cryptography. In: 2017 International Conference on Computing
Methodologies and Communication (ICCMC). pp. 230–235 (July 2017).
https://doi.org/10.1109/ICCMC.2017.8282682
17. Rachmawanto, E.H., Amin, R.S., Setiadi, D.R.I.M., Sari, C.A.: A perfor-
mance analysis stegocrypt algorithm based on lsb-aes 128 bit in vari-
ous image size. In: 2017 International Seminar on Application for Technol-
ogy of Information and Communication (iSemantic). pp. 16–21 (Oct 2017).
https://doi.org/10.1109/ISEMANTIC.2017.8251836
18. Reddy, M.I.S., Kumar, A.S.: Secured data transmission us-
ing wavelet based steganography and cryptography by using
aes algorithm. Procedia Computer Science 85, 62 – 69 (2016).
Future Identity Card using Lattice-based Cryptography and Steganography 11