Crypto 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 47

ii

ABSTRACT

Cloud based data is safer than paper and client-server records. Now, medical

practices just have to be willing to look to the cloud for the future of healthcare IT.

There are lots of security issues related with the storage of sensitive personal health

information in the cloud, which will make lots of security challenges to the PMR

privacy and confidentiality. Cryptography is an essential tool that helps to assure

our data accuracy. The Cryptographic techniques can be employed to protect the

data in cloud environment. The technique used for security is multiple authority

attribute-based encryption technique which focuses on the multiple data owner

scenario and divide the users in the PMR system into multiple security domains

which leads to key management complexity for owners and users. In the proposed

distributed attribute based encryption scheme PMR can be accessed from any

hospital using a single key thereby reducing the complexity of key management.

This Security concern can be solved using various ways, the most commonly used

techniques are cryptography and Steganography. We have introduced in our

proposed project a new security mechanism that uses a combination of multiple

cryptographic algorithms of symmetric key and image Steganography. In this

proposed system RC6 (Rivest Cipher 6) and STEGANOGRAPHY algorithms are

used to provide security to data. All the algorithms use 128- bit keys. LSB

1
Steganography technique is used to securely store the key information. Key

information will contain the information regarding the encrypted part of the file,

the algorithm and the key for the algorithm. File during encryption is split into

two parts. These individual parts of the file will be encrypted using different

encryption algorithm simultaneously with the help of multithreading technique.

The key information is hidden in an image by the LSB technique. Our

methodology guarantees better security and protection of customer data by storing

encrypted data, using STEGANOGRAPHY and RC6 algorithm.

TABLE OF CONTENT

CHAPTE TITLE PAGE

R NO. NO.
ACKNOWLEDGEMENT ii
ABSTRACT iii
LIST OF FIGURES vi
LIST OF ABBREVATIONS vii
1. INTRODUCTION 1
1.1 Data security 1
1.2 Problem statement 1
1.3 Cryptography and Steganography 2
1.3.1 Features of cryptography 2
1.3.2 Steganography protocols 3
1.3.3 Pure Steganography 3
2
1.3.4 Secret key Steganography 4
1.3.5 Public key Steganography 4
1.3.6 Image Steganography 4
1.4 Objective 5
2. LITERATURE SURVEY 6
2.1 Introduction 6
2.2 Literature Review 6
3. SYSTEM DESIGN 11
3.1 Overview 11
3.3 Rivest cipher 6 (RC6) 13
3.4 Architectural design 15
4. WORKING 16
4.1 STEGANOGRAPHY algorithm and image 16

Steganography
4.2 RC6 encryption combined image 19

Steganography
5 RESULTS 22
6. CONCLUSION AND FUTURE WORK 23
REFERENCES 24
APPENDIX 27

3
LIST OF FIGURES

FIGUR TITLE PAGE NO.

E NO.
3.1 System Overview 11
3.3 Rivest Cipher 6 (RC6) 14
3.4 System Sender Architecture 15
4.1 Input-original information 16
4.2 Encryption key of the input 16
4.3 Cover image 17
4.4 Stego image 17
4.5 Decrypt-stego image 18
4.6 Output-retrieved original information 18
4.7 Original data 19
4.8 Password to protect 20
4.9 Cover image 20
4.10 Output-Stego image 21

4
LIST OF ABBREVATIONS

RC6 Rivest Cipher 6


LSB Least Significant Bit
RC5 Rivest Cipher 5
RSA Rivest-Shamir-Adleman
PSNR Peak Signal-to-Noise Ratio
BOI Blocks Of Interest
PVD Pixel Value Differencing
HOG Histogram of Oriented Gradient
MSB Most Significant Bit
RDH Reversible Data Hiding
XOR Exclusive OR
RGB Red Green Blue
MSE Mean Squared Error
CHAPTER 1

INTRODUCTION

1.1 DATA SECURITY

Cloud computing is an efficient technique by which the user can access any

data from anywhere and anytime through internet. Thus it’s providing the new

world of computing technology to the world. The personal health records are thus

also using this cloud computing technology for the efficient storage and retrieval

system. But there is still a comparison is going on with the electronic health record

and personal health record. Electronic health record is the electronic version of the
5
medical record of the care and treatment the patient receives. It is maintained and

managed by the health care organizations. But our PMR is the collection of

important information that the patient maintain about their health or the health of

someone they are caring for. It may be short and simple or very

detailed.Data1DataThe traditional PMR was in the form of paper documents,

electronic files maintained by their computer, but now the PMR is created by using

the tools available in the internet. So which make the facility to use the health

information across any distances, and to share with the selective users with special

read and write access. But while using third party service providers there are many

security and privacy risks for PMR. The main concern is whether the medical

record owner actually gets full control of his or her data or not, especially when it

is stored in third party servers which is not fully trusted.

Technological advancements are resulting in trends and movements that

improve the quality of life. In this fast life where every person uses a

smartphone and has access to the internet, the major concern that the people face

is regarding the security of their information present online and Cryptography

technique is used here. Cryptography techniques convert original data into Cipher

text. So only legitimate users with the right key can access data from the

cloud storage server. The main aim of cryptography is to keep the security of

6
the data from hackers, online/software crackers, and any third party users. No

legitimate user access to information results in loss of confidentiality. This data can

be confidential and extremely sensitive. Hence, the data management and

security should be completely reliable. It is necessary that the data in the cloud is

protected from malicious attacks. This system focuses on providing complete

security to the data on cloud. We have introduced a new mechanism in which

we are using a multiple symmetric key cryptography algorithm and image

Steganography.

A new type of sociotechnical challenge has arisen with the advent of eHealth and

big data technologies. For example, ubiquitous and wearable health systems collect

data through sensors and mobile apps and store the data in the servers of multiple

commercial service providers. Furthermore, a growing number of people share this

sensitive medical information through social networks such as Facebook and

Twitter. This is significantly different from the traditional health service, where

service providers kept tight control over patient data.

It has been argued that these new technologies can lead to positive health

outcomes, as they are evidence of people self-managing their illness DataData.

Some of the ways in which self-management can have a positive effect include

7
supporting the patient’s motivation to look after their health, greater levels of

engagement, and understanding about the condition.

Furthermore, these new technologies may help improve population health by

helping researchers learn about the drivers of different pathologies, or how people's

behavior is affected by social influence and public health promotion campaigns

DataData. The information posted to social networks can prove invaluable in

assisting doctors and counselors to better understand patient behaviors and

symptoms and can help to provide support and/or consultation. Social networks are

now being leveraged to provide people with a better lifestyle and health, without

the need to continually visit the doctor’s clinic.

However, privacy DataData, trust, and security issues associated with health data

make patients hesitant to post sensitive health information and share it with health

providers DataData. Data are not ephemeral and will be stored in servers and

shared. All stakeholders need to worry about the lifecycle of the data; not just who

can access and manage the data at a particular point in time, but also who will be

able to do so in the future. There is a strong need to provide patients with a

guarantee that their sensitive health information will only be visible to the doctors,

counselors, or others they wish to share it with at a particular point in time.

8
A trivial solution to sharing data in the cloud involves the data owners first

encrypting their data before storing to cloud servers. The data owner can then

distribute encryption keys to every user in the group thereby keeping the data

protected from the cloud provider and also malicious users. Authorized users in the

group can then download the encrypted data from the cloud and decrypt the data

using the encryption key provided. However, the main problem with this solution

is user revocation. When the data owner wishes to revoke one of the users in the

group, he must re-encrypt the data with a new encryption key and redistribute the

new key to all the remaining users in the group. This renders the revoked user’s

key useless and he or she will thus not be able to access the data contents. This

process of re-encrypting the data and redistributing keys to all the remaining users

in the group every time a user is revoked access can place a huge burden on the

data owner. This is especially the case when the group size is very large, in excess

of thousands to hundreds of thousands (eg, everyone in an organization or online

community).

There is a growing body of research on the trust, privacy, and security in

information systems, most of which apply to health.

Trust and Privacy


9
These issues often arise from insider attacks. For example, malicious insiders to a

cloud service provider (eg, employees) can steal data, because they have direct

access to it. Insiders who are not happy with their job and who have recently been

terminated may take revenge and destroy, corrupt, or sell all data owner’s data

DataData. Organizationally, cloud service providers may misuse data in order to

sell to third parties Data,Data. Such privacy attacks affect the trust of users and

make them skeptical of using cloud services for sensitive data storage. It has been

argued that this is one of the main reasons why patients have a lack of trust for

using the cloud for storage and sharing of highly critical medical information

Data,Data.

There have been multiple studies around privacy and trust in health systems in

research Data-Data. One of the most effective ways of keeping data private in the

cloud, and thus increasing the trust of the data owners, is keeping data encrypted

when stored on untrusted servers, backup servers, and when in transit on untrusted

public channels.

The THEWS (Trusted eHealth and eWelfare Space) architecture DataData

provided privacy management to help data owners create and manage the network

as well as maintain information privacy. As Ruotsalainen et al DataData pointed

out, there is an asymmetric relationship between health information systems and

10
their users because users rarely have the power “to force a system to put personal

rules into effect.” Our paper contributes a novel security architecture that can help

balance this power difference.

Even when data are encrypted, it may still be possible for a malicious cloud

provider to deduce information from the encrypted data. Zhang et al DataData

propose a novel solution that adds noise obfuscation based on a time-series pattern

to client data stored in the cloud. This can help protect the privacy of the owner’s

data because it prevents malicious service providers from deducing information

from the encrypted data.

Little of this work has focused on private data sharing between patients and doctors

using social networks. We present a new security model that would allow users to

have a much more fine-grained control of their health data.

One of the major issues with private sharing of health information, and hence the

major focus of this paper, is encryption key management. As discussed above, the

trivial solution is computationally inefficient when having to revoke users because

of the burden on re-encryption and redistribution of keys.

Microsoft HealthVault Data,Data provides a next step to allowing patients to store

and manage their health and fitness information, as well as share the data securely

with their friends and family. The encryption is done within HealthVault and does
11
not rely on the patient to generate and distribute keys. The patient can decide who

specifically can view his health information. With our system, the patient has

greater control over his health information and can choose to store his health data

on any cloud service provider that he wishes. The patient himself distributes

encryption keys to people he wishes to share the data with and does not rely on

commercial services, which may be untrustworthy.

Proxy re-encryption and attribute-based encryption (ABE) DataData are two

current techniques aimed at secure and private data sharing in the cloud DataData.

Ming et al DataData use ABE for efficient revocation for outsourced data sharing

control. Liang et al DataData combine ABE with proxy re-encryption to achieve

stronger security.

Silva et al DataData present a data encryption solution for mobile health apps and a

performance evaluation comparing both symmetric and asymmetric encryption

algorithms. Our work takes advantage of both symmetric and asymmetric

cryptographic algorithms to achieve both strong security and high-performance

eHealth data using mobile phones.

1.2 PROBLEM STATEMENT

12
We live in an age and society that surrounds us with information, and increasingly

our day-to-day lives depend upon this information and our ability to manipulate

it. Nowadays an individual person’s bank account is monitored and trapped by

the hackers easily so it is mandatory and necessity in order to secure army

information's to protect from hackers. Sadly, whenever there are services for

manipulating information that has value, there will be unscrupulous

elements in society that will seek to subvert these services for their own benefit.

This has led to the growth of cryptography and Steganography scan pattern for

secured communication.

1.3 CRYPTOGRAPHY AND STEGANOGRAPHY

In this proposed system STEGANOGRAPHY and Rivest Cipher 6 (RC6)

algorithms are used to provide security to data. LSB algorithm is used for

image Steganography. Sensitive data of the user is hidden into a cover image

for security purposes. STEGANOGRAPHY and RC6 algorithms are considered to

form a hybrid algorithm to accomplish better security. The Steganography

part assists in storing the key information safely. It makes it difficult for the

attacker to recover the secret file of the user. File that the user wants to store on

cloud is split into two parts for encryption. These two parts of the file will be
13
encrypted using different encryption algorithm mentioned above. The key

information is inserted into an image using the LSB technique.

1.4.FEATURES OF CRYPTOGRAPHY

In information and media communications, cryptography is fundamental

when imparting over any untrusted medium, which incorporates pretty much

any organization, especially the Internet. Within the setting of any application-

to- application communication, there are some particular security, including:

• Authentication: The way to reveal one's personality. (The essential types of

host-to-have verification on the Internet today are name-based or

address- based, the two of which are famously weak).

• Privacy/classification: Ensuring that nobody can peruse the message with

the exception of the proposed receiver.

• Integrity: Assuring the collector that the got message has not been changed

at all from the first.

14
1.3.2 STEGANOGRAPHY PROTOCOLS

As the use of internet has increased for day to day communication between the

people and organization in various ways through mobile phones, fax, computer

communication and so on. Those data’s are to be secured while transforming

the data. There are basically three protocols of Steganography,

 Pure Steganography

 Secret key Steganography

 Public key Steganography

1.3.3 Pure Steganography

Pure Steganography is a system in which the exchange of secret information in

prior is not needed to start the communication. Thus it is secure and the entire

process is under secrecy. In most applications, since the communication

partners doesn’t share stego-key, pure Steganography is considered. Even

though Protocols of pure Steganography don’t provide any security if an intruder

knows the embedding method.

15
1.3.4 Secret key Steganography:

A secret key steganographic system is alike symmetric cipher where the secret

key is used to embed the secret message in to the cover which is selected by the

sender. If the secret key is known to the receiver, the process can be reversed

and the secret message can be extracted.

.3.5 Public key Steganography:

Public key Steganography doesn’t depend upon the exchange of a secret key.

It requires two keys, one of them private (secret) and therefore the other

public: the general public key is stored during a public database, whereas the

general public key’s used in the embedding process. The secret key is used to

reconstruct the confidential message.

.3.6Image Steganography

Concealing the information by taking the cover object as the picture is known

as image Steganography. In computerized Steganography, pictures are


16
broadly utilized cover source on the grounds that there are countless bits

present in the in the digital representation of a picture. There are a great deal of

approaches to shroud data inside a picture.

.4 OBJECTIVE

To secure the communication of crucial digital data from the intruders, the

cryptography along with Steganography technique is introduced with a new

scan pattern. Our methodology guarantees better security and protection of

customer data by storing encrypted data on a single cloud server, using

STEGANOGRAPHY and RC6 algorithm.

17
CHAPTER 2

LITERATURE REVIEW

2. INTRODUCTION

A literature survey is that part which shows the different examinations and

exploration made in the field of interest and the outcomes previously

distributed, considering the different parameters of the project and the degree of

the undertaking.

2.2 LITERATURE REVIEW

. An Efficient Algorithm for Confidentiality, Integrity and Authentication Using

18
Hybrid Cryptography and Steganography

Chitra Biswas (209), proposed the hybrid cryptography and Steganography

to secure the data. The security of data or information in this digital world

has become a challenge. Hybrid cryptography has been applied using the

STEGANOGRAPHY and RSA technique, to ensure better security the

symmetric key used for encrypting the message has been encrypted to create

the stego-image at the transmission side DataData. At the receiving side, digital

signature which is created using hash value is used to check integrity. The

encrypted message, encrypted symmetric key and encrypted digest are

combined together to form a complete message and this complete message is

encrypted using LSB Steganography method which strengthens security.

2. Enhancing Security of Cloud computing by using RC6 Encryption Algorithm

Salim Ali Abbas (207), in this paper, they focus on RC6 encryption for the

security of cloud computing where people share their information or files to

the cloud. Because of the low security there exists an information misfortune,

hijacks and so on. The RC6 algorithm which is a block cipher derived from

RC5 where encryption and decryption are performed using the similar keys. The

RC6 encryption algorithm where the clients are given a unique ID and password
19
so that information sent through cloud are secured and it can be accessed

anywhere Data2Data. RC6 algorithm has been proposed to enhance the security

level for the data stored within the cloud to protect user’s data against threats and

attacks.

3. An Improved Method for LSB Based Color Image Steganography Combined

with Cryptography

LianJing Jin (206), an improved LSB algorithm of color image using secret

key and peak signal-to-noise ratio (PSNR) are combined to hide information

in an image is proposed Data7Data. The digital signature created for

authentication and encryption technology make the unauthorized users not to know

the location of embedded secret information. By combining the LSB algorithm

and cryptography, the human eye visual features are increased to improve the

secured information. An improved LSB algorithm has better security than general

LSB algorithm. This is the straightforward concept explained during this

paper.

4. A Compressed LSB Steganography Method

20
Vasim Ahamad (207), this paper focuses on LSB substitution method using

modulus function for hiding data. To achieve better PSNR, secret data is break

into smaller components, remainder and quotient when divided by m, which

can be hidden separately in cover image Data8Data. Only 3 bits have been

used for indicating repetitions while hiding the remainder sequence and in

future work more bits can be used to indicate repetition length.

5. An Adaptive Image Steganography Method Based on Histogram of Oriented

Gradient and PVD-LSB Techniques

Mohamed abdel hameed (209), proposed a system where, the Steganography

method has embedding algorithm which is based on selecting a set of blocks of

interest (BOI) using the HOG algorithm to hide secret data in the cover

image. Pixel value differencing (PVD) and least significant bit substitution are

two main schemes in image Steganography. A histogram of oriented gradient

(HOG) algorithm is proposed to find the dominant edge direction for each 2

X2 block of cover images Data9Data. Blocks of interest (BOIs) are determined

adaptively based on the gradient magnitude and angle of the cover image.

21
6. An Efficient Filtering Based Approach Improving LSB Image Steganography

using Status Bit along with STEGANOGRAPHY Cryptography

Ayasha Siddiqa (204), to hide large data in Bitmap image using filtering based

algorithm, which uses MSB bits for filtering purpose. As it is uncompressed,

Bitmap image filtering is convenient than other method.

STEGANOGRAPHY cryptography will change the secret message into cipher

text to ensure two layer security of the message before the Steganography

technique. PSNR is calculated for each of the images tested and various sizes

of data are stored inside the image. The Stego image has higher PSNR value

as compared to other method Data0Data.

7. An Improved Method for Reversible Data Hiding Steganography Combined

with Cryptography

Rashmi (208), a dual layer security in which Steganography combined with

cryptography was proposed to provide the information secure. The

STEGANOGRAPHY cryptographic algorithm is used to encrypt the secret

message. Stego-image was obtained by implementing the least significant bit

and the Reversible data hiding technique Data4Data. Improved RDH is carried

out considering the security and the peak signal-to-noise ratio (PSNR).
22
8. A Secure Video Steganography with Encryption Based on LSB Technique

Pooja Yadav (203), in this paper, a high capacity video Steganography based

on image Steganography to hide a video behind a video. Video is simply a

sequence of images, hence space is available in between video for hiding

information. Video Steganography is used to hide a secret video stream in

cover video stream. Each frame of secret video will be broken into individual

components and then converted into 8-bit binary values, and encrypted using XOR

with secret key Data2Data. Using sequential encoding of cover video the

encrypted frames will be hidden in the least significant bit of each frames. LSB

technique directly embeds the secret data within the cover image. The quality

of secret video stream is acceptable and there is no distortion in the host video

stream as experimented.

9. Multiple layer Text security using Variable block size Cryptography and Image

Steganography

Shivani Chauhan (207), the author proposed a multilayer security using

block size cryptography and image Steganography. The data is encrypted

by cryptographic algorithm and that encrypted data is hidden using different

23
ratio in Red Green Blue (RGB) plane. The steganographic technique used is

LSB and raster scan pattern where the data is hidden up to a maximum of 480

KB message in a cover image of size 800×600 pixels approximately Data5Data.

Thus results in less MSE and more PSNR value.

0. Enhancing the Data Security in Cloud by Implementing Hybrid (RSA &

STEGANOGRAPHY) Encryption Algorithm

K. Shahade and V. S. Mahale (204), in the research a Hybrid encryption

algorithm was introduced which was a combination of RSA algorithm and

STEGANOGRAPHY algorithm. In their system, the user creates

and stores the RSA private key with himself and also create an RSA

public key while uploading the data Data6Data. In the cloud, the

server calls the RSA and STEGANOGRAPHY algorithm for encryption of the file

and then properly store the file on the server.

. Developing Efficient Solution to Information Hiding through K text

Steganography along with cryptography

24
Palash Uddin (204), researched an efficient way for information hiding using

Text Steganography along with Cryptography. In this study, Steganography

of pure text was proposed, including private key cryptography that provides

a high level of security Data7Data. According to the algorithm after

embedding the cipher text in the cover text, the text seems like ordinary text.

2. Steganographic Secure Data Communication

R.T. Patil (204), suggested a system for the hiding text in cover images

using the LSB algorithm and for decoding using the same method. The use

of the data of this algorithm can be stored in the Least Significant Bit of the title

image Data8Data. Even then, the human eye cannot notice the hidden text in

the image.

25
CHAPTER 3

SYSTEM DESIGN

3. OVERVIEW

The architecture for whole process is shown in Figure 3.. In the proposed

system, a method for securely storing files in the cloud using a hybrid

cryptography algorithm is presented. In this system, the user can store the file

safely in online cloud storage as these files will be stored in encrypted form in

the cloud and only the authorized user has access to their files. Syntactic

arrangement. In this system, dictionary looks up with the morphological

analysis.

26
Figure 3.: System Overview

As in the above figure 3., the files that the user will upload on the cloud will be

encrypted with a user-specific key and store safely on the cloud. The file

uploaded is then split into two which is then encrypted by using the two

algorithms as mentioned above. Then the key generated is stored in the form

of the image using the Steganography technique and is stored in the user’s profile.

If the user wants the file, the file is then decrypted by using the same algorithms

that are being used for encryption. Then the decrypted files are merged

together and file is sent to the user for further use.

3.2 RIVEST CIPHER 6 (RC6)

RC6 is a symmetric key block cipher. RC6 (Rivest Cipher 6) is an enhanced

version of the old RC5 algorithm. RC6 – w/r/b means that four w-bit-word

plaintexts are encrypted with r-rounds by b-bytes keys. It is a proprietary


27
algorithm patented by RSA Security. RC6 operators as a unit of a w-bit word

using five basic operations such as an addition, a subtraction, a bit-wise

exclusive-or, a multiplication, and a data-dependent shifting. The RC6

algorithm has a block size of 28 bits and also works with key sizes of 28-bit,

92-bit, and 256 bits and up to 2040 bits.

28
Figure 3.2: Rivest Cipher 6 (RC6)

3.4 ARCHITECTURAL DESIGN

An architecture description is a formal description and representation of a

system, organized in a way that supports reasoning and behavior of

the system.

7. Input 6. Input file 5. Input


image Key

4. Python

3. Encrypte
d File 2. R
C

1. Image
steganogr
aphy with
key

29
Figure 3.4: System Sender Architecture

Figure 3.4 represents the sender architectural design of the system where the

interface asks the user to input the file he wants to store on cloud, image he

chooses to hide the key. The file then subjected to two algorithms

STEGANOGRAPHY and RC6. The encrypted file with the stego image is sent to

the server.

30
CHAPTER 4

WORKING

4. STEGANOGRAPHY ALGORITHM AND IMAGE

STEGANPGRAPHY

STEGANOGRAPHY algorithm is performed for the original information that is to

be secured. The data is encrypted and hidden into a cover image. Then the stego

image is generated at the sender side. To retrieve the original information on

the receiver side reverse Steganography and decryption is applied and the results

are obtained.

Figure 4.: Input- original information

31
In figure 4., the original information that is to be encrypted using

STEGANOGRAPHY algorithm is entered as “hello world”.

Figure 4.2: Encryption key of the input

In figure 4.2, the encryption key for the original data is obtained

after applying the STEGANOGRAPHY encryption algorithm of 28 bit keys.

32
Figure 4.3: cover image

The figure 4.3 is the cover image in which the encrypted data is to be encoded.

The cover image is selected which is the ‘cover.jpg’ and the data will be

encoded into the selected image.

Figure 4.4: stego image

The figure 4.4 is the resultant stego image in which the data is encoded and

hidden using the LSB technique. The encrypted data will be in a random

pattern.

33
Figure 4.5: Decrypt Stego image

In figure 4.5 the stego image which is obtained from the sender is to be

decrypted to get the original data. So the stego image which is encrypted on

the receiver side is selected for the decryption process.

Figure 4.6: Output-retrieved original information

34
The figure 4.6 is the result where the original data “hello world” entered in the

sender side is obtained after the carrying the decryption process in the stego

image.

4.2 RC6 Encryption combined Image Steganography

RC6 encryption is performed to secure the data which is to be transferred by the

user. The data is encrypted using a password and encoded into the cover image

in a Z scan pattern. The information is encoded in a Z scan pattern using the

LSB technique. Then resultant stego image is obtained. The presence of

information inside the stego image is invisible and it is highly secure by the

new scan pattern.

35
Figure 4.7: original data

In figure 4.7, the original data is entered as “my name is bruno”. This data is to

be secured while the communication occurs.

36
Figure 4.8: Password to protect

The figure 4.8 shows the password which is entered by the user to protect the

original data by using the key size of 28.

37
Figure 4.9: Cover image

The figure 4.9 shows the cover image ‘dog.jpg’ which is selected to encode the

password created to protect the data.

38
Figure 4.0: Output-Stego image

The figure 4.0 is the resultant stego image in which the data is secured by using

RC6 encryption and LSB technique to encode the data in a Z scan pattern. This

RC6 encryption combined with image Steganography with a new scan pattern

is highly secure

CHAPTER 5

RESULTS

39
40
CHAPTER 6

CONCLUSION AND FUTUTRE WORK

6. CONCLUSION

The main aim of this system is to securely store and retrieve Doctor Data on the

cloud. Cloud storage issues of Data security are solved using the combination

of cryptography and Steganography techniques. Data security is achieved using

RC6 and STEGANOGRAPHY algorithm. Key information is safely stored using

LSB technique (Steganography). Less time is used for the encryption and

decryption process using multithreading technique. With the help of the proposed

security mechanism, we have accomplished better Data integrity, high security,

low delay, authentication, and confidentiality.

6.2 FUTURE WORK

In the future the Data which is sent to the cloud will be accessed after the

downlink process is performed only by the authentified user. We can add

public key cryptography to avoid any attacks during the transmission of the
41
Data from the client to the server. To improve the security further, the key size

can be increased. The public key cryptography combined with Steganography

can reduce the percentage of uncertainty an intruder can get that some Data is

being transferred.

42
REFERENCES

o Chitra Biswas, Udayan Das Gupta, Md. Mokammel Haque, “An

Efficient Algorithm for Confidentiality, Integrity and

Authentication Using Hybrid Cryptography and Steganography”,

IEEE International Conference on Electrical, Computer and

Communication Engineering (ECCE), February 209.

o Salim Ali Abbas, Malik Qasim Mohammed, “Enhancing Security of

Cloud computing by using RC6 Encryption Algorithm”,

International Journal of Applied Information Systems (IJAIS),

November 207.

o ShengDun Hu, KinTak U, “A Novel Video Steganography based on

Non- uniform Rectangular Partition”, in the 4th IEEE International

Conference on Computational Science and Engineering, 20.

43
o Ako Muhamad Abdullah, “Advanced Encryption Standard

( STEGANOGRAPHY) Algorithm to Encrypt and Decrypt

Data”, published in Research Gate, 207.

o Dnyanda Namdeo Hire, “Secured Wireless Data Communication”,

International Journal of Computer Applications, September

202.

o Xingtong Liu, Quan Zhang, Chaojing Tang, Jingjing Zhao and Jian

Liu, “A Steganographic Algorithm for Hiding Data in PDF Files

Based on Equivalent Transformation”, in IEEE journal, 2008.

o Xinyi Zhou, Wei Gong, WenLong Fu, LianJing Jin, “An Improved

Method for LSB Based Color Image Steganography Combined

with Cryptography”, in the IEEE International Conference on

Computer and Information Science, June 206.

44
o Nadeem Akhtar, Vasim Ahamad, Hira Javed, “A Compressed LSB

Steganography Method”, IEEE International Conference on

Computational Intelligence and Communication Technology, 207.

o Mohamed abdel hameed , M. Hassaballah , saleh aly and ali ismail

awad, “An Adaptive Image Steganography Method Based on

Histogram of Oriented Gradient and PVD-LSB Techniques”, in

IEEE journal , December 209.

o Md. Rashedul Islam, Ayasha Siddiqa, Md. Palash Uddin, Ashis

Kumar Mandal and Md. Delowar Hossain, “An Efficient

Filtering Based Approach Improving LSB Image

Steganography using Status Bit along with STEGANOGRAPHY

Cryptography”, International conference on informatics,

electronics & vision, 204.

o Tapan Kumar Hazra, Rumna Samanta, Nilanjana Mukherjee, Ajoy

Kumar Chakraborty, “Hybrid Image Encryption and

45
Steganography Using SCAN Pattern for Secure Communication”,

IEEE journal, 207.

o Pooja Yadav, Nishchol Mishra, Sanjeev Sharma, “A Secure Video

Steganography with Encryption Based on LSB Technique”,

IEEE International Conference on Computational Intelligence and

Computing Research, 203.

o Jaspal Kaur Saini, Harsh K Verma, “A Hybrid Approach for Image

Security by Combining Encryption and Steganography”, IEEE

Second International Conference on Image Information

Processing, 203.

46

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy