SlideShare a Scribd company logo
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.7 ISSN: 2454-1311
www.ijaems.com Page | 450
A New Approach of Cryptographic Technique
Using Simple ECC & ECF
Neha Saini1
, Kirti Bhatia2
1
M. Tech (Student), SKITM, Ladrawan,Haryana, India
2
HOD of CSE department, SKITM, Ladrawan, Haryana, India
Abstract— Cryptography is the technique in which usually
a file is converted into unreadable format by using public
key and private key system called as public key
cryptosystem. Then as per the user requirement that file is
send to another user for secure data transmission. In this
paper we purposed an image based cryptography that
Elliptic Curve Function (ECF) techniques and pseudo
random encoding technique on images to enhance the
security of RFID communication. In the ECF approach, the
basic idea is to replace the Elliptic Curve Function (ECF)
of the cover image with the Bits of the messages to be
hidden without destroying the property of the cover image
significantly. The ECF based technique is the most
challenging one as it is difficult to differentiate between the
cover object and Crypto object if few ECF bits of the cover
object are replaced. In Pseudo Random technique, a
random key is used as seed for the Pseudo Random Number
Generator in needed in the embedding process. Both the
techniques used a Crypto key while embedding messages
inside the cover image. By using the key, the chance of
getting attacked by the attacker is reduced.
Keyword— Cryptography,ECC,RFID,ECF.
I. INTRODUCTION
The word cryptography is derived from the Greek words
Cryptos meaning cover and grafia meaning writing [1]
defining it as covered writing. In image cryptography the
information is hidden exclusively in images. Cryptography
is the art and science of secret communication .It is the
practice of encoding/embedding secret information in a
manner such that the existence of the information is
invisible. The original files can be referred to as cover text,
cover image, or cover audio. After inserting the secret
message it is referred to as Crypto-medium. A Crypto-key
is used for hiding/encoding process to restrict detection or
extraction of the embedded data.
Modern cryptography concerns itself with the following
four objectives:
 Confidentiality ( the information cannot be understood by
anyone for whom it was unintended)
 Integrity( the information cannot be altered in storage or
transit between sender and intended receiver without the
alteration being detected)
 Non- repudiation (the create/ sender of the information
cannot deny at a later stage his or her intensions in the
creation or transmission of the information)
 Authentication (the sender and the receiver can confirm
each other's identity and the origin of information.
II. RELATED WORKS
Encryption is a method of transforming original data, called
plain text , into a format appears to be random and
unreadable, which is called cipher text. Plain text is either in
a form of that can be understood by a person or by a
computer . Once it is transformed into a cipher text , neither
human nor machine can properly process it until it is
decrypted. This enables the transmission of confidential
information over insecure channels without authorized
disclosure. When data is stored on a computer , it is usually
protected by logical and physical access controls. When this
same sensitive information is sent over a network, it can no
longer take these controls for granted and the information is
in a much more vulnerable state.The algorithms, the set of
mathematical rules, dictates how enciphering and
deciphering takes place . Many algorithms are publicaly
known and are not the secret part of the encryption
algorithms work can be kept secret from the public , but
many of them are publicaly known and well understood . If
the internal mechanisms of the algorithm are not a secret ,
then something must be . The secret piece of using a well
known encryption is the key. The key can be any value that
is made upof a large sequence of random bits. Is it just any
random number of bits crammed together? Not really. An
algorithm contains a key space, which is a range of values
that can be used to construct a key. The key is made up of
random values within the key space range. The larger the
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.7 ISSN: 2454-1311
www.ijaems.com Page | 451
key space, the more available values can be used to
represent different keys, and the more random the keys are,
the harder it is for intruders to figure out Cryptosystem
III. LITERATURE SURVEY
Visual cryptography is a cryptographic technique which
allows visual information (pictures, text, etc.) to be
encrypted in such a way that decryption becomes a
mechanical operation that does not require a computer .One
of the best-known techniques has been credited to Moni
Naor and Adi Shamir, who developed it in 1994. They
demonstrated a visual secret sharing scheme, where an
image was broken up into n shares so that only someone
with all n shares could decrypt the image, while any n − 1
shares revealed no information about the original image.
Each share was printed on a separate transparency, and
decryption was performed by overlaying the shares. When
all shares were overlaid, the original image would appear.
There are several generalizations of the basic scheme
including k-out-of-n visual cryptography.
The Frequency domain the message is inserted into
transformed coefficients of image giving more information
hiding capacity and more robustness against attacks.
Transform domain embedding can be termed as a domain of
embedding techniques for which a number of algorithms
have been suggested [3].Most of the strong cryptographic
systems today operate within the transform domain
Transform domain techniques have an advantage over ECF
techniques as they hide information in areas of the image
that are less exposed to compression, cropping, and image
processing. Some transform domain techniques do not seem
dependent on the image format and they may outrun
lossless and lossy format conversions. An information
hiding system has been developed for confidentiality.
However, in this chapter, we study an image file as a carrier
to hide message. Therefore, the carrier will be known as
cover-image, while the Crypto-object known as Crypto-
image. The implementation of system will only focus on
Least Significant Bit (ECF) as one of the cryptography
techniques as mentioned in below
In this technique, A random key is used to choose the pixels
randomly and embed the message. This will make the
message bits more difficult to find and hopefully reduce the
realization of patterns in the image [9]. Data can be hidden
in the ECF of a particular colour plane (Red plane) of the
randomly selected pixel in the RGB colour space.
IV. PROPOSED WORK AND IMPLEMENATION
We introduce the ECC to enhance the cryptographic
technique for secure transfer of secret images For RFID
based communication channel. In this paper we are more
focusing on Identification field of the IP header to hide
secret encrypted data. Identification field is used only when
fragmentation occurs. At the receiver end, to reassemble the
packets, identification field tells the right order for that. If
fragmentation is not occurred, then identification field will
always be unused, so that we can use this 16 bit field to hide
secret encrypted message. To avoid fragmentation, we use
MTU. Maximum transfer unit decides limit for packet size
for transmission over network. Sender and receiver, both
should have awareness of MTU unit. For the encryption and
decryption we use Elliptic curve cryptography. Elliptic
Curve Cryptography is a public key cryptography.
Elliptic curve cryptography (ECC) is an approach to
public-key cryptography based on the algebraic structure of
elliptic curves over finite fields. One of the main benefits in
comparison with non-ECC cryptography (with plain Galois
fields as a basis) is the same level of security provided by
keys of smaller size.Elliptic curves are applicable for
encryption, digital signatures, pseudo-random generators
and other tasks. They are also used in several integer
factorizational gorithms that have applications in
cryptography.
Mathematical Expression For ECC The mathematical
operations of ECC is defined over the elliptic curve y = x 3
+ ax + b, where 4a + 27b ≠ 0. Each value of the 'a' and 'b'
gives a different elliptic curve. All points (x, y) which
satisfies the above equation plus a point at infinity lies on
the elliptic curve A. Performance Analysis
As a performance measure for image distortion due to
hiding of message, the well-known peak-signal-to noise
ratio (PSNR), which is categorized under difference
distortion metrics, can be applied to Crypto images. It is
defined as:
PSNR = 10log(Cmax)2=MSE:
MSE = mean - square - error;
Which is given as?
MSE = 1/MN ((S-C) 2):
C max = 25, Where M and N are the dimensions of the
image,
S is the resultant Crypto-image, and C is the cover image.
B. Implementation and Evaluation of above two
techniques
We have implemented the above two techniques in
MATLAB and the above mentioned algorithms with respect
to image cryptography are not void of weak and strong
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017]
https://dx.doi.org/10.24001/ijaems.3.5.7 ISSN: 2454-1311
www.ijaems.com Page | 452
points. Consequently, it is important to decide the most
suitable approach to be applied. As defined before, there are
several parameters to measure the performance of the
cryptographic system. Some parameters are as follows :
Perceptibility does embedding information distort cover
medium to a visually unacceptable level.
Capacity how much information can be hidden (relative to
the change in perceptibility) item.
Robustness to attacks can embedded data survive
manipulation of the Crypto medium in an effort to destroy,
remove, or change the embedded data.
Table: Comparison of characters of above two techniques
Sl No. Imperceptibility Robustness Capacity Tamper Resistance
Simple ECF High* Low High Low
(ECC) Higher** Low High High**
*: Indicates dependency on the used cover image
**: Indicates dependency on the used key and ECC Key
V. CONCLUSION AND FUTURE WORK
Secure data transfer by using ECC provides an efficient
technique for data hiding by using RFID channel.RFID
channel is a subject which can be seen in many areas.
Hiding the medium itself has a strong impact on the
network communication providing high level of security
and a more secure system respectively. The TCP/IP suite
along with the covert medium further enhances the security
of the system since attackers are more concerned over the
“http”. The proposed technique will avoid illegal
transmission of secret communication on the web and will
provide a better secure system in case of Authentication and
demand less bandwidth In Security concern it has very
secured algorithm.
REFERENCES
[1] R.Anderson and F. Petitcolas, "On the limits of
cryptography" IEEE Journal of Selected Areas in
Communications, Vol. 16, No. 4, May 1998
[2] Niels Provos, Peter Honeyman, "Hide and Seek: An
Introduction to Cryptography," IEEE computer
society,2003
[3] Algorithm using ECF, DCT and Image Compression
on Raw Images",Technical Report, Department of
Computer Science and Engineering, University
Visvesvaraya College of Engineering,Bangalore
University, December 2004
[4] .An overview of image cryptography by T. Morkel ,
J.H.P. Eloff, M.S. Olivier. Information and Computer
Security Architecture (ICSA) Research Group
Department of Computer Science University of
Pretoria, 0002, Pretoria, South Africa
[5] Johnson, N.F. Jajodia, S., "Exploring Cryptography:
Seeing the Unseen",Computer Journal, February 1998.
[6] Detecting ECF Cryptography in Color and Gray-Scale
Images" Jessica Fridrich, Miroslav Goljan, and Rui Du
State University of New York, Binghamton.
[7] Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, "Hiding
data in images by optimal moderately significant-bit
replacement" IEE Electron. Lett. 36 (25) (2000)
20692070.
[8] Hiding data in images by simple ECF substitution by
Chi-Kwong Chan, L.M. Cheng Department of
Computer Engineering and Information Technology,
City University of Hong Kong, Hong Kong Received
17 May 2002.
[9] A Tutorial Review on Cryptography" by Samir K
Bandyopadhyay, Debnath Bhattacharyya1, Debashis
Ganguly1, Swarnendu Mukherjee1 and Poulami Das,
Heritage Institute of Technology
[10]International Journal of Computer Science
Engineering Technology (IJC-SET) "Modern
Cryptographic technique: A Survey" by Pratap
Chandra Mandal Asst. Prof., Department of Computer
Application B.P.Poddar Institute of Management
Technology.

More Related Content

What's hot

(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
AnsabArshad
 
Image encryption
Image encryptionImage encryption
Image encryption
rakshit2105
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
eSAT Publishing House
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
Mohit Goel
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganography
ijceronline
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
IJERA Editor
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
theijes
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
IJTET Journal
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 

What's hot (20)

(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Image encryption
Image encryptionImage encryption
Image encryption
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganography
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Image steganography
Image steganographyImage steganography
Image steganography
 

Similar to A New Approach of Cryptographic Technique Using Simple ECC & ECF

Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
AIRCC Publishing Corporation
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
AIRCC Publishing Corporation
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
ijcsit
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
eSAT Journals
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
ijcsit
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Editor IJCATR
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
TELKOMNIKA JOURNAL
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
cscpconf
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
irjes
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
muhammed jassim k
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
ijma
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 

Similar to A New Approach of Cryptographic Technique Using Simple ECC & ECF (20)

Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 

Recently uploaded

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 

Recently uploaded (20)

Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 

A New Approach of Cryptographic Technique Using Simple ECC & ECF

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017] https://dx.doi.org/10.24001/ijaems.3.5.7 ISSN: 2454-1311 www.ijaems.com Page | 450 A New Approach of Cryptographic Technique Using Simple ECC & ECF Neha Saini1 , Kirti Bhatia2 1 M. Tech (Student), SKITM, Ladrawan,Haryana, India 2 HOD of CSE department, SKITM, Ladrawan, Haryana, India Abstract— Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced. Keyword— Cryptography,ECC,RFID,ECF. I. INTRODUCTION The word cryptography is derived from the Greek words Cryptos meaning cover and grafia meaning writing [1] defining it as covered writing. In image cryptography the information is hidden exclusively in images. Cryptography is the art and science of secret communication .It is the practice of encoding/embedding secret information in a manner such that the existence of the information is invisible. The original files can be referred to as cover text, cover image, or cover audio. After inserting the secret message it is referred to as Crypto-medium. A Crypto-key is used for hiding/encoding process to restrict detection or extraction of the embedded data. Modern cryptography concerns itself with the following four objectives:  Confidentiality ( the information cannot be understood by anyone for whom it was unintended)  Integrity( the information cannot be altered in storage or transit between sender and intended receiver without the alteration being detected)  Non- repudiation (the create/ sender of the information cannot deny at a later stage his or her intensions in the creation or transmission of the information)  Authentication (the sender and the receiver can confirm each other's identity and the origin of information. II. RELATED WORKS Encryption is a method of transforming original data, called plain text , into a format appears to be random and unreadable, which is called cipher text. Plain text is either in a form of that can be understood by a person or by a computer . Once it is transformed into a cipher text , neither human nor machine can properly process it until it is decrypted. This enables the transmission of confidential information over insecure channels without authorized disclosure. When data is stored on a computer , it is usually protected by logical and physical access controls. When this same sensitive information is sent over a network, it can no longer take these controls for granted and the information is in a much more vulnerable state.The algorithms, the set of mathematical rules, dictates how enciphering and deciphering takes place . Many algorithms are publicaly known and are not the secret part of the encryption algorithms work can be kept secret from the public , but many of them are publicaly known and well understood . If the internal mechanisms of the algorithm are not a secret , then something must be . The secret piece of using a well known encryption is the key. The key can be any value that is made upof a large sequence of random bits. Is it just any random number of bits crammed together? Not really. An algorithm contains a key space, which is a range of values that can be used to construct a key. The key is made up of random values within the key space range. The larger the
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017] https://dx.doi.org/10.24001/ijaems.3.5.7 ISSN: 2454-1311 www.ijaems.com Page | 451 key space, the more available values can be used to represent different keys, and the more random the keys are, the harder it is for intruders to figure out Cryptosystem III. LITERATURE SURVEY Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer .One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994. They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n − 1 shares revealed no information about the original image. Each share was printed on a separate transparency, and decryption was performed by overlaying the shares. When all shares were overlaid, the original image would appear. There are several generalizations of the basic scheme including k-out-of-n visual cryptography. The Frequency domain the message is inserted into transformed coefficients of image giving more information hiding capacity and more robustness against attacks. Transform domain embedding can be termed as a domain of embedding techniques for which a number of algorithms have been suggested [3].Most of the strong cryptographic systems today operate within the transform domain Transform domain techniques have an advantage over ECF techniques as they hide information in areas of the image that are less exposed to compression, cropping, and image processing. Some transform domain techniques do not seem dependent on the image format and they may outrun lossless and lossy format conversions. An information hiding system has been developed for confidentiality. However, in this chapter, we study an image file as a carrier to hide message. Therefore, the carrier will be known as cover-image, while the Crypto-object known as Crypto- image. The implementation of system will only focus on Least Significant Bit (ECF) as one of the cryptography techniques as mentioned in below In this technique, A random key is used to choose the pixels randomly and embed the message. This will make the message bits more difficult to find and hopefully reduce the realization of patterns in the image [9]. Data can be hidden in the ECF of a particular colour plane (Red plane) of the randomly selected pixel in the RGB colour space. IV. PROPOSED WORK AND IMPLEMENATION We introduce the ECC to enhance the cryptographic technique for secure transfer of secret images For RFID based communication channel. In this paper we are more focusing on Identification field of the IP header to hide secret encrypted data. Identification field is used only when fragmentation occurs. At the receiver end, to reassemble the packets, identification field tells the right order for that. If fragmentation is not occurred, then identification field will always be unused, so that we can use this 16 bit field to hide secret encrypted message. To avoid fragmentation, we use MTU. Maximum transfer unit decides limit for packet size for transmission over network. Sender and receiver, both should have awareness of MTU unit. For the encryption and decryption we use Elliptic curve cryptography. Elliptic Curve Cryptography is a public key cryptography. Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. One of the main benefits in comparison with non-ECC cryptography (with plain Galois fields as a basis) is the same level of security provided by keys of smaller size.Elliptic curves are applicable for encryption, digital signatures, pseudo-random generators and other tasks. They are also used in several integer factorizational gorithms that have applications in cryptography. Mathematical Expression For ECC The mathematical operations of ECC is defined over the elliptic curve y = x 3 + ax + b, where 4a + 27b ≠ 0. Each value of the 'a' and 'b' gives a different elliptic curve. All points (x, y) which satisfies the above equation plus a point at infinity lies on the elliptic curve A. Performance Analysis As a performance measure for image distortion due to hiding of message, the well-known peak-signal-to noise ratio (PSNR), which is categorized under difference distortion metrics, can be applied to Crypto images. It is defined as: PSNR = 10log(Cmax)2=MSE: MSE = mean - square - error; Which is given as? MSE = 1/MN ((S-C) 2): C max = 25, Where M and N are the dimensions of the image, S is the resultant Crypto-image, and C is the cover image. B. Implementation and Evaluation of above two techniques We have implemented the above two techniques in MATLAB and the above mentioned algorithms with respect to image cryptography are not void of weak and strong
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-5, May- 2017] https://dx.doi.org/10.24001/ijaems.3.5.7 ISSN: 2454-1311 www.ijaems.com Page | 452 points. Consequently, it is important to decide the most suitable approach to be applied. As defined before, there are several parameters to measure the performance of the cryptographic system. Some parameters are as follows : Perceptibility does embedding information distort cover medium to a visually unacceptable level. Capacity how much information can be hidden (relative to the change in perceptibility) item. Robustness to attacks can embedded data survive manipulation of the Crypto medium in an effort to destroy, remove, or change the embedded data. Table: Comparison of characters of above two techniques Sl No. Imperceptibility Robustness Capacity Tamper Resistance Simple ECF High* Low High Low (ECC) Higher** Low High High** *: Indicates dependency on the used cover image **: Indicates dependency on the used key and ECC Key V. CONCLUSION AND FUTURE WORK Secure data transfer by using ECC provides an efficient technique for data hiding by using RFID channel.RFID channel is a subject which can be seen in many areas. Hiding the medium itself has a strong impact on the network communication providing high level of security and a more secure system respectively. The TCP/IP suite along with the covert medium further enhances the security of the system since attackers are more concerned over the “http”. The proposed technique will avoid illegal transmission of secret communication on the web and will provide a better secure system in case of Authentication and demand less bandwidth In Security concern it has very secured algorithm. REFERENCES [1] R.Anderson and F. Petitcolas, "On the limits of cryptography" IEEE Journal of Selected Areas in Communications, Vol. 16, No. 4, May 1998 [2] Niels Provos, Peter Honeyman, "Hide and Seek: An Introduction to Cryptography," IEEE computer society,2003 [3] Algorithm using ECF, DCT and Image Compression on Raw Images",Technical Report, Department of Computer Science and Engineering, University Visvesvaraya College of Engineering,Bangalore University, December 2004 [4] .An overview of image cryptography by T. Morkel , J.H.P. Eloff, M.S. Olivier. Information and Computer Security Architecture (ICSA) Research Group Department of Computer Science University of Pretoria, 0002, Pretoria, South Africa [5] Johnson, N.F. Jajodia, S., "Exploring Cryptography: Seeing the Unseen",Computer Journal, February 1998. [6] Detecting ECF Cryptography in Color and Gray-Scale Images" Jessica Fridrich, Miroslav Goljan, and Rui Du State University of New York, Binghamton. [7] Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, "Hiding data in images by optimal moderately significant-bit replacement" IEE Electron. Lett. 36 (25) (2000) 20692070. [8] Hiding data in images by simple ECF substitution by Chi-Kwong Chan, L.M. Cheng Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong Received 17 May 2002. [9] A Tutorial Review on Cryptography" by Samir K Bandyopadhyay, Debnath Bhattacharyya1, Debashis Ganguly1, Swarnendu Mukherjee1 and Poulami Das, Heritage Institute of Technology [10]International Journal of Computer Science Engineering Technology (IJC-SET) "Modern Cryptographic technique: A Survey" by Pratap Chandra Mandal Asst. Prof., Department of Computer Application B.P.Poddar Institute of Management Technology.