Top Banner
Steganography using Genetic Algorithm along with Visual Cryptography By, Aparna.N.K S4 MCA ROLL NO:1
32

steganography using genetic algorithm along with visual cryptography for wireless network application

Jun 27, 2015

Download

Education

Aparna Nk

steganography using genetic algorithm along with visual cryptography for wireless network application
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: steganography using genetic algorithm along with visual cryptography for wireless network application

Steganography using

Genetic Algorithm along with

Visual Cryptography

By, Aparna.N.K S4 MCA ROLL NO:1

Page 2: steganography using genetic algorithm along with visual cryptography for wireless network application

Contents

Introduction Keywords Brief Overview Proposed System Step by Step Process Algorithm Description Functional Flow Diagram Performance Analysis Result

Page 3: steganography using genetic algorithm along with visual cryptography for wireless network application

Introduction

The main aim of the project is to design a feasible RS resistance secure algorithm which combines the use of both steganography and cryptography with the goals of improving security, reliability, and efficiency for secret message. LSB steganography is combined with the Genetic Algorithm making it more secure from RS steganalysis.

Page 4: steganography using genetic algorithm along with visual cryptography for wireless network application

Keywords:

Steganalysis: The detection of steganographically encoded

packages is called Steganalysis. To make steganalysis easier, several softwares are readily available on the internet as freeware or as a shareware. These softwares are capable of determining the irregularity of RGB patterns in the image, thus alerting the user that the particular image is a stego image.

Page 5: steganography using genetic algorithm along with visual cryptography for wireless network application

Cryptography Cryptography is the practice and study of

techniques for secure communication in the presence of third parties (called adversaries).

Page 6: steganography using genetic algorithm along with visual cryptography for wireless network application

Visual Cryptography Visual cryptography is a cryptographic technique which allows visual information to beencrypted in such a way that decryption becomes a mechanical operation that does not require a computer.

Page 7: steganography using genetic algorithm along with visual cryptography for wireless network application

Genetic Algorithm In the computer science field of artificial

intelligence, a genetic algorithm (GA) is a search heuristic that mimics the process of natural selection. This heuristic (also sometimes called a metaheuristic) is routinely used to generate useful solutions to optimization and search problems.

Page 8: steganography using genetic algorithm along with visual cryptography for wireless network application

Brief Overview

Hiding information by embedding secret data into an innocuous medium is often referred to as steganography.

Steganography can be applied electronically by taking a message (a binary file) and some sort of cover (often a sound or image file) and combining both to obtain a “stego-object”.

The RS analysis is considered as one of the most famous steganalysis algorithm which has the potential to detect the hidden message by the statistic analysis of pixel values

Page 9: steganography using genetic algorithm along with visual cryptography for wireless network application

Both the topic of steganography and visual cryptography has been considered as a distinct topic for image security.

The use of steganography in combination visual cryptography is a sturdy model and adds a lot of challenges to identifying such hidden and encrypted data

Page 10: steganography using genetic algorithm along with visual cryptography for wireless network application
Page 11: steganography using genetic algorithm along with visual cryptography for wireless network application

Proposed System

The proposed makes use of the LSB steganography combined with Genetic Algorithm. The Genetic algorithm is used to modify the pixel locations of the stego image thus enhancing the security level to new heights. The hidden data is now distributed all over the image rather than at the LSB of the stego image.

Page 12: steganography using genetic algorithm along with visual cryptography for wireless network application

Step by Step process: An input image is accepted as cover image which is used

to hide the secret message.

An input image is accepted as cover image for the input message in plain text format.

After embedding the secret message in LSB (least significant bit) of the cover image, the pixel values of the steg-image are modified by the genetic algorithm to keep their statistic characters.

The user can select their targeted information in terms of plain text for embedding the secret message in LSB of the cover image.

Page 13: steganography using genetic algorithm along with visual cryptography for wireless network application

The implications of the visual cryptography will enable the pixels value of the steg-image to keep their statistic character.

LSB steganography has low computation complexity and high embedding capacity, in which a secret binary sequence is used to replace the least significant bits of the host medium.

The algorithm in use is not secret but only the key used by the algorithm is kept as a secret between the two parties, this assumption is also known as Kerchoff’s principle in the field of cryptography.

Page 14: steganography using genetic algorithm along with visual cryptography for wireless network application
Page 15: steganography using genetic algorithm along with visual cryptography for wireless network application

Algorithm Description

The proposed project work consist of mainly two algorithms which are

(i) Steganography using Genetic Algorithm (ii) Visual Cryptography with Threshold. The application initiates with Steganography

module where the cover image will be encrypted to generate Stego image. The stegographic image generated in this module will act as an input for visual cryptographic module.

Page 16: steganography using genetic algorithm along with visual cryptography for wireless network application

Steganography using Genetic Algorithm

Algorithm: SteganographyInput: Cover ImageOutput: Stego Image Step 1: Read the cover image. Step 2: Find out the pixel values of cover image. Step 3: Read the secret data character wise. Step 4: Convert each character into its equivalent ASCII

code. Step 5: ASCII code is converted into binary values. Step 6: Enter the secret key. Step 7: Secret data is converted into cipher data. Step 8: The stream of 8-bits (cipher data) are embedded into

LSB of each pixel of the cover image. Step 9: To apply Genetic Algorithm in the stego image the

pixel location should be modified.

Page 17: steganography using genetic algorithm along with visual cryptography for wireless network application

Visual Cryptography with Threshold.

Algorithm: Visual CryptographyInput: Stego-ImageOutput: Encrypted Shares Step 1: Read Stego-Image generated. Step 2: The stego image is breaked into three layers

namely split-1, split-2, split-3 these three files are

containing the hidden data and to get the hidden data these three files have to be reconstructed perfectly. Step 3: The re-assembled picture and the extracted data will be gained again.

Page 18: steganography using genetic algorithm along with visual cryptography for wireless network application

Functional Flow Diagram

Page 19: steganography using genetic algorithm along with visual cryptography for wireless network application

The proposed system works in the following phases:SENDER SIDE:

Encryption Phase: The data to be encrypted is first read from the user through the keyboard using an appropriate GUI, designed in JAVA. The encryption algorithm used in the DES.

Page 20: steganography using genetic algorithm along with visual cryptography for wireless network application

Encoding Phase: The encrypted image is then encoded into the

least significant bits of the image.

Page 21: steganography using genetic algorithm along with visual cryptography for wireless network application

Pixel Modification Phase: Genetic algorithm is used to modify the pixel

locations for enhancing security and reliability.

Page 22: steganography using genetic algorithm along with visual cryptography for wireless network application

RECEIVERS SIDE: Overlapping Phase: The two shares of the same image are needed to retrieve

the original information As the cipher data is distributed in both the images, it is impossible for anyone to get the data by obtaining just a single share of the image.

Page 23: steganography using genetic algorithm along with visual cryptography for wireless network application

Decoding Phase :In the decoding phase, the cipher data is decoded from the stego image. The cipher data can be retrieved by the inverse process of encoding process that was employed at the sender side.

Page 24: steganography using genetic algorithm along with visual cryptography for wireless network application

Decryption Phase :In the decryption phase, the cipher data is converted into the original data. The DES algorithm is used in the inverse manner using the same encryption key(secret key) as used during encryption of the original data.

Page 25: steganography using genetic algorithm along with visual cryptography for wireless network application

Performance Analysis

The performance of the proposed system is experimented by performing stegnalysis and conducting benchmarking test for analysing parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio.

Cover image : rice.png Size : 256*256

Mean Square Error (MSE) : 0.0678 Peak Signal-to-Noise Ratio (PSNR) : 59.8188db

After applying Genetic Algorithm the measured performance is shown in below

Mean Square Error (MSE) : 0.794 Peak Signal-to-Noise Ratio (PSNR) : 39.4011db After applying genetic algorithm all the pixel location are altered. Due to

the change the pixel location MSE and PSNR values are increased.

Page 26: steganography using genetic algorithm along with visual cryptography for wireless network application

Result:

Encrypt Screen Message to be encrypted: “Sachin Ramesh Tendulkar- The LEGEND”

Page 27: steganography using genetic algorithm along with visual cryptography for wireless network application

Encode ScreenAfter clicking on Encrypt Now at the bottom, the encrypted message is

shown. CipherText :

vbPG8nqjKQoW6N6ugkb4l+wbTz3c+EyRLPkW5nxVv1ZKFxHyPyTQoQ==

Page 28: steganography using genetic algorithm along with visual cryptography for wireless network application

After clicking on Encode Now, a File Chooser is opened to choose the image file.

Page 29: steganography using genetic algorithm along with visual cryptography for wireless network application
Page 30: steganography using genetic algorithm along with visual cryptography for wireless network application
Page 31: steganography using genetic algorithm along with visual cryptography for wireless network application

Conclusion

The proposed system has discussed implementation of securely using steganography using genetic algorithm along with visual cryptography. It can be concluded that when normal image security using steganographic and visual cryptographic technique is applied, it makes the task of the investigators unfeasible to decrypt the encoded secret message. The security features of the steganographic are highly optimized using genetic algorithm.

Page 32: steganography using genetic algorithm along with visual cryptography for wireless network application

THANK YOU…!!!