SlideShare a Scribd company logo
Network and Complex Systems                                                                      www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012



            Data Security Using Stegnography and Quantum

                                           Cryptography

        Mohit Kumar, Abhishek Gupta, Kinjal Shah, Atul Saurabh, Pravesh Saxena, Vikas Kumar Tiwari
    Jaypee University of Information Technology, P.O Dumehar Bani, Waknaghat -173234 (H.P), India


Abstract
Stegnography is the technique of hiding confidential information within any media. In recent years various
stegnography methods have been proposed to make data more secure. At the same time different
steganalysis methods have also evolved. The number of attacks used by the steganalyst has only multiplied
over the years. Various tools for detecting hidden informations are easily available over the internet, so
securing data from steganalyst is still considered a major challenge. While various work have been done to
improve the existing algorithms and also new algorithms have been proposed to make data behind the
image more secure. We have still been using the same public key cryptography like Deffie-Hellman and
RSA for key negotiation which is vulnerable to both technological progress of computing power and
evolution in mathematics, so in this paper we have proposed use of quantum cryptography along with
stegnography. The use of this combination will create key distribution schemes that are uninterceptable thus
providing our data a perfect security.
Keywords: Stegnography, Steganalysis, Steganalyst, Quantum Cryptography.


1. Introduction
Internet users frequently need to store, send and receive private information. The most common way to do
this is to transform the data into different forms. The resulting data can be understood only by those who
know how to return it to its original form. This method of protecting information is known as encryption. A
major drawback to encryption is that the existence of data is not hidden. Data that has been encrypted,
although unreadable, still exists as data. If given enough time, someone could eventually decrypt the data. A
solution to this problem is stegnography. Stegnography is also a form of writing namely concealed writing.
The Greek word staginess means “unseen” or “hidden.” Stegnography is thus a form of communication,
which is designed to be hidden from general view. Stegnography should not be seen as a replacement for
cryptography but rather as a complement to it.. There has been a rapid growth of interest in this subject over
the last two years, and for two main reasons. Firstly, the publishing and broadcasting industries have
become interested in techniques for hiding encrypted copyright marks and serial numbers in digital images,
audio recordings, books and multimedia products; an appreciation of new market opportunities created by
digital distribution is coupled with a fear that digital works could be too easy to copy. Secondly, moves by
various governments to restrict the availability of encryption services have motivated people to study
methods by which private messages can be embedded in seemingly innocuous cover messages. In modern
terms stegnography is usually implemented computationally, where cover Works such as text files, images,
audio files, and video files are tweaked in such a way that a secret message can be embedded within them.
The techniques are very similar to that of digital watermarking; however one big distinction must be
highlighted between the two. In digital watermarking, the focus is on ensuring that nobody can remove or
alter the content of the watermarked data, even though it might be plainly obvious that it exists.
Stegnography on the other hand, focuses on making it extremely difficult to tell that a secret message exists
at all. If an unauthorized third party is able to say with high confidence that a file contains a secret message,
then stegnography has failed. Stegnography also differs from cryptography because the latter does not
attempt to hide the fact that a message exists. Instead, cryptography merely obscures the integrity of the

                                                       46
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
information so that it does not make sense to anyone but the creator and the recipient. The art of detecting
stegnography is referred to as steganalysis. With rapid advances in the field of stegnography and
cryptography there have also been major advances made in the field of steganalysis and cryptanalysis.
Typically, a steganalysis begins by identifying any artifacts that exists in the suspect file as a result of
embedding a message. Electronically, each of the tool used for stegnography leaves a fingerprint or
signature in the image that can be exploited to find the message in the image. Steganalysis does not
however consider the successful extraction of the message, there is usually a requirement of cryptanalysis.
So, after performing cryptanalysis on the cipher text, the plain text can easily be obtained. Over the years
our focus has been mainly on security of data but the security of keys is as important as the security of data.
Often this aspect is neglected. We have been using the same public key cryptosystem for many years now.
Since, uncertainly looms over the security of these cryptosystems; we have used quantum cryptography for
securing the key distribution. Quantum cryptography is thought to be secure for three main reasons. One,
the quantum no-cloning theorem states that an unknown quantum state cannot be cloned. Theoretically,
messages sent using quantum cryptography would be in an unknown quantum state, so they could not be
copied and sent on. Two, in a quantum system, which can be in one of two states, any attempt to measure
the quantum state will disturb the system. A quantum message that is intercepted and read by an
eavesdropper will become garbled and useless to the intended recipient of the message. Three, the effects
produced by measuring a quantum property are irreversible, which means an eavesdropper cannot “put
back” a quantum message to its original state. These three properties provide the power of quantum
cryptography.


2. Related Work
S. K. Moon et al proposed an algorithm to hide data of any format in an image and audio file ( S.K Moon et
al 2007).For stegnography he used the least significant bit ( 4 LSB ) substitution method. The 4LSB method
was implemented for color bitmap images and wave files as the carrier media. A new method of
stegnography in MMS was proposed by Mohammad Shirali et al .This paper presented a new method of
stegnography using both image and text stegnography methods. This project was written in J2ME (Java 2
Micro Edition ) .In this method, data is broken into two parts with proper sizes and the parts were hidden in
the image and text part of MMS message (Mohammad Shirali et al 2007).In order to further enhance the
secrecy of stegnography Piyush Marwaha and Pravesh Marwaha (Piyush Marwaha et al 2010 ) proposed
an advanced system of encrypting data that combines the features of cryptography, stegnography along with
multi-media data hiding. This paper proposed the concept of multiple cryptography where the data will be
encrypted in a cipher and the cipher will be hidden into a multimedia image file in encrypted format. This
system was more secure than any other these techniques alone and also as compared to stegnography and
cryptography combined systems .Muhammad Asad et al proposed an enhanced least significant bit for
audio stegnography ( Muhammad Asad et al 2011 ).This paper proposes two ways to improve the
conventional LSB modification technique. The first way is to randomize bit number of host message used
for embedding secret message while the second way is to randomize sample number containing next secret
message bit. The improvised proposed technique works against steganalysis and decreases the probability
of secret message being extracted by an intruder. Mohammad Hamdaqa used VoIP (Voice over IP) for real
time network stegnography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret
messages. This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange’s
Interpolation, and then applies a two phase approach on the LACK stegnography mechanism to provide
reliability and fault tolerance and to increase steganalysis complexity (Muhammad Hamdaqa et al 2011 ).A
new perfect hashing based approach was given by Imran Sarwar Bajwa et al.It uses hashing based approach
for stegnography in grey scale images. The proposed approach is more efficient and effective that provides
a more secure way of data transmission at higher speed. The presented approach is implemented into a
prototype tool coded in VB.NET (Imran Sarwar Bajwa et al 2011 ).




                                                      47
Network and Complex Systems                                                                      www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
3. Proposed Work
The proposed work consists of the given discussed phases.
3.1 Stegnography
Steganography literally means covered writing. Its goal is to hide the fact that communication is taking
place. Steganography is mainly applied to media such as images, text, video clips, music and sounds. Image
steganography is generally more preferred media because of its harmlessness and attraction. The three basic
techniques used for steganography are classified as follows:
(A)-Injection-Hiding data in sections of file that are ignored by the processing applications. Therefore avoid
modifying those file bits that are relevant to an end user leaving the cover file perfectly usable.
(B)-Substitution-Replacement of least significant bits of information that determine the meaningful content
of the original file with new data in a way that causes least amount of distortion.
(C)-Generation-Unlike injection and substitution, this does not require an existing cover file but generates a
cover file for the sole purpose of hiding the message. There are many algorithms that can be used for
stegnography. The algorithm which we have used here for stegnography is F5 which is much more secure
than all the other algorithms. The F5 algorithm provides high stenographic capacity and can prevent visual
attacks and it is also resistant to statistical attacks. Even if the attacker is able to break this algorithm, he
will get back only the cipher text and will have to perform cryptanalysis on it to get back the original text.
Fig 1 shows the graphical representation of stegnography.



                                              Start Application




                                     Encryption              Stego Image



              Image              Message File                  Image              Message File



                                    Stego Image              Decryption




                             Figure 1. Graphical Representation of Stegnography




                                                       48
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
3.2 Result




    Figure 2. Results of Cover Image and Stego Image (after Hiding the Data behind the Cover Image)


3.3 Stegnalysis
Stegnography basically exploits human perception, as human senses are not trained to look for files that
have information inside them. The art of detecting stegnography is referred to as steganalysis.
Stegnography have made rapid advances over the years and so have steganalysis. Stegnography (and
Steganalysis) is neither inherently good nor evil; it is the manner in which it is used which will determine
whether it is benefit or detriment to our society. The number of attacks used by the steganalyst for detecting
hidden informations has been only multiplied over the years. The types of attacks used by the steganalysts
are following.
1. Stego only attack
2. Chosen stego attack
3. Known cover attack
4. Known stego attack
Various tools for detecting stegnography are easily available over the internet. Various tools like Stegdetect
and Xsteg are freely available over the internet for detecting stegnography. By performing Steganalysis on
the image the attacker will only get the cipher text and he will have to perform Cryptanalysis to get back
the original text.


3.4 Quantum Cryptography
Public key cryptosystems such as RSA and DEFFIE-HELMAN are still considered to be secure for key
distribution. They have undergone over lots of public scrutiny over the years. The power of these
algorithms are based on the fact that there is no known mathematical operation for quickly factoring very
large numbers given today’s computer processing power. The public cryptosystem has been working very
well over the years but in the recent years it has been exposed to a handful of risks. Firstly a computer
scientist at the Indian Institute of Technology, Manindra Agarwal solved a problem, how to tell if a number
is prime, without performing any factoring, solving this problem may open the door for mathematician to
figure out how to factor large numbers. Secondly, the advancements in computer processing will be able to
defeat these cryptosystems in timely fashion thus making the public key cryptosystems obsolescent
instantly. So here we have used quantum cryptography for exchanging the keys efficiently. At this time,
transmission speed and hardware expenses have generally limited the use of quantum devices to distribute


                                                     49
Network and Complex Systems                                                                      www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
the keys rather than the entire message. Classical methods of information security using encryption
decryption or otherwise are known to be secure but not 100 percent. Increasing computation powers helps
hackers to crack down the security cover. Quantum level is one which behaves somewhat differently than
classical ones. Classical methods can never give 100% security for example even strong encryption like
DES, AES are prone to be broken as much effective work has been done to break these. Dealing things at
quantum level will definitely give perfect security because of the behavior of microscopic particles.
Assuming laws of Quantum mechanics is true, which follow Heisenberg’s uncertainty principle and photon
polarization we can provide 100% security.


3.4.1 Why Quantum Cryptography?
Rather than depending on the complexity of factoring large numbers, quantum cryptography is based on the
fundamental and unchanging principles of quantum mechanics. In fact, quantum cryptography rests on two
pillars of 20th century quantum mechanics –the Heisenberg Uncertainty principle and the principle of
photon polarization. Heisenberg’s uncertainty principle says that if you measure one thing, you can not
measure another thing accurately. For example, if you measure the position of an electron flying around an
atom, you can not accurately measure its velocity. It can be represented using this equation.
                                                 where
                            (1)
According the Heisenberg Uncertainty principle, it is not possible to measure the quantum state of any
system without disturbing that system. Thus, the polarization of a photon or light particle can only be
known at the point when it is measured. This principle plays a critical role in thwarting the attempts of
eavesdroppers in a cryptosystem based on quantum cryptography. Secondly, the photon polarization
principle describes how light photons can be oriented or polarized in specific directions. Moreover, a
polarized photon can only be detected by a photon filter with the correct polarization or else the photon
may be destroyed. It is Heisenberg’s uncertainty principle that makes quantum cryptography an attractive
option for ensuring the privacy of data and defeating eavesdroppers.


3.5 Key Generation
Quantum property of light is used to generate key. Individual photons are completely polarized. Their
polarization state can be linear or circular, or it can be elliptical, which is anywhere in between of linear and
circular polarization. These can be described through following equations (analogous to classical
electromagnetic waves).


Linear Polarization
The wave is linearly polarized (or plane polarized) when the phase angles αx and αy are equal.
                                                                                                   (2)
This represents a wave with phase α polarized at an angle θ with respect to x axis. In that case the Jones
Vector can be written as follows.
                                                                                                   (3)


The state vectors for linear polarization in x or y are special cases of this state vector.
If unit vectors are defined such that,
                                                          and
                                                                                     (4)
then, the linearly polarized polarization state can written in the "x-y basis" as follows.


                                                                      (5)

                                                         50
Network and Complex Systems                                                                       www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Circular polarization
If the phase angles αx and αy differs exactly by π/2 and x amplitude equals the y amplitude the wave is
circularly polarized. The Jones vector then becomes

                                                                                        (6)
Where, the plus sign indicates right circular polarization and the minus sign indicates left circular
polarization. In the case of circular polarization, the electric field vector of constant magnitude rotates in
the x-y plane.
If unit vectors are defined such that
                                                      and
                                          (7)
then an arbitrary polarization state can written in the "R-L basis" as
                                                                    where
                                                        (8)
                                                              and




We can see that
                                        (9)
Elliptical polarization

The general case in which the electric field rotates in the x-y plane and has variable magnitude is called
elliptical polarization .The state vector is given by



                                                (10)
We can generate our key using photon polarization. Each photon can be polarized in different manner.
A calcite crystal can be used as a quantum filter. If the crystal is held in a vertical position, photons that are
vertically or horizontally polarized ( | or — ) will pass through the filter unchanged. If a photon that is
diagonally polarized (/ or ) passes through the vertical filter, however, the polarization will be changed to
vertical or .horizontal.

3.6 Securing Key Distribution
It is the one –way-ness of photons along with the Heisenberg uncertainty principle that makes quantum
cryptography an attractive option for ensuring the privacy of data and defeating eavesdropper. The
representation of bits through polarized photons is the foundation of quantum cryptography that serves as
the underlying principle of quantum key distribution. Thus, while the strength of modern digital
cryptography is dependent on the computational difficulty of factoring large numbers, quantum
cryptography is completely dependent on the rules of physics and is also independent of the processing
power of current computing systems. Since the principle of physics will always hold true, quantum
cryptography provides an answer to the uncertainty problem that current cryptography suffers from; it is no
longer necessary to make assumptions about the computing power of malicious attackers or the
development of a theorem to quickly solve the large integer factorization problem.
Keys can be distributed using quantum cryptography in the following manner. The sender will send the
message to the receiver using a photon gun. The stream of photons will be in one of the four polarization
that corresponds to vertical, horizontal or diagonal in opposite directions (0,45,90.135 degree).At the
receiver’s end the receiver will randomly choose a filter and count and measure the correct photon
polarization. Now, receiver will communicate with sender (out-of-band) about their correct measurement
(without sending actual measurement values. The photons that were incorrectly measured will be discarded
and the correctly measured photons will be translated into bits based on their polarization. Now, sender and


                                                       51
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
receiver will generate one time pad combining their results. This one-time pad will be used in one time
information exchange between them. None of them can know the actual key in advance because the key is
the product of both their random choices.
Now, if an attacker tries to eavesdrop, he must select the correct filter otherwise the photon will get
destroyed. Even if attacker is able to successfully eavesdrop, the information which he will get will be of
little use unless he has the knowledge of correct polarization of each particular photon. As a result attacker
will not correctly interpret meaningful keys and thus be thwarted in his endeavors.

3.7 Security
The data which has to be secured here is wrapped around number of security layers. If the attacker gets
access to the stego image file in which the message is embedded. At first he will have to perform
steganalysis to find out that this message contains a message or not. Even if after performing steganalysis
he finds out that image contains some data, he will have to apply the same algorithm to retrieve the
embedded file. Unfortunately, if he finds out the algorithm by which the texts have been embedded into the
medium, he could get back only the cipher text file. The encryption algorithm which we have used here is
AES, which is one of the most secure encryption algorithm used today. This provides an extra layer of
security. Now the hacker is left with only one choice to extract the embedded file and that is to compromise
the encryption key used somehow. Since modern cryptography is vulnerable to both technological progress
of computing power and evolution in mathematics, there is uncertainty that Deffie-Helman and RSA will be
secure for key distribution in future or not. Here we would like to propose a new model. This model could
be easily applied on the web for making data more secure.



                                         Stegnography (Stego Image)



                                         Cryptography (Cipher Text)

                                                  Plain Text
                                 Figure 3. Existing Model of Stegnography




                                   Key Distribution using Quantum Cryptography


                                            Stegnography (Stego Image)



                                             Cryptography (Cipher Text)

                                                      Plain Text




    Figure 4. The proposed model of Stegnography with Key Distribution using Quantum Cryptography
Main idea behind this model is to use quantum cryptography for securing key distribution thus providing
our data another layer of security. This way we can provide perfect security to data over the internet.

4. Future Work
At present quantum cryptography is used in very small area, the use of quantum cryptography should be


                                                     52
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
encouraged and it should be used in wide area of applications beside that, maximum guaranteed
transmission distance between remote parties is very less at present. As, optical fibers are not perfectly
transparent, a photon will at times get absorbed and therefore not reach the end of the fiber. Although,
quantum cryptography is secure but information retrieved is very less (due to loss).
It should be improved. Another problem that needs to be addressed in future is if an attacker tries to tamper
with the message whole message gets destroyed. It is a nice feature of quantum cryptography that no one
can tamper with the message but at the same time due to this the receiver is also suffering because correct
message was not delivered to the recipient, and now the sender will have to resend the message either from
the same path or he will have to choose a different path.

5. Conclusion
Securing the key distribution is as important as securing the data itself. In this paper we have made use of
quantum cryptography thus improving the security of the keys and providing our data a perfect security.
The use of quantum cryptography has added another layer of defense to our data. Even if we use most
secure encryption algorithm and best stego technique to hide our data, if the keys gets compromised these
security will be of no use. Quantum cryptography addresses current as well as emerging threats and it
definitely has “competitive advantage” over other public key cryptosystems. We have used quantum
cryptography only for key distribution rather than for entire messages because of limitations of
transmission speeds and hardware expenses. The representation of bits through polarized photon is the
foundation of quantum cryptography that serves as the underlying principle of quantum key distribution.
This paper concentrates on theory of quantum cryptography and the use of quantum cryptography for key
distribution and how the use of quantum cryptography contributes to the field of stegnography. In this paper
we have shown that using quantum mechanics and photon polarization we can provide perfect security.

References
Manindra Agrawal, Neeraj Kayal, and Nitin Saxena (2004). Primes is in P. Annals of Mathematics,
160,781-793.doi: 10.4007/annals.2004.160.781
Imran Sarwar Bajwa and Rubata Raisat (2011). A New Perfect Hashing based Approach for Secure
Stegnograph. Digital Information Management (ICDIM),174-178. doi: 10.1109/ICDIM.2011.6093325
Muhammad Asad, Junaid Gilani and Adnan Khalid (2011). An Enhanced Least Significant Bit
Modification Technique for Audio Steganography Computer Networks and Information Technology
(ICCNIT), 143-147. doi: 10.1109/ICCNIT.2011.6020921
Mohammad Hamdaqa and Ladan Tahvildari (2011). ReLACK: A Reliable VoIP Steganography Approach.
Fifth International Conference on Secure Software Integration and Reliability Improvement ,189-197.doi:
10.1109/SSIRI.2011.24
S. Changder, N.C. Debnath and D.Ghosh (2011). A Greedy Approach to Text Steganography using
Properties of Sentences. Eighth International Conference on Information Technology: New Generations,
30-35. doi: 10.1109/ITNG.2011.13
Piyush Marwaha and Paresh Marwaha (2010). VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN
IMAGES. Second International conference on Computing, Communication and Networking Technologies,
1-6. doi: 10.1109/ICCCNT.2010.5591730
Jinsuk Baek, Cheonshik Kim, Paul S. Fisher and Hongyang Chao (2010). (N. 1) Secret Sharing Approach
Based on Steganography with Gray Digital Images. IEEE Conference on Wireless Communications,
Networking and Information Security (WCNIS) ,325-329.doi: 10.1109/WCINS.2010.5541793
Ferruccio Pisanello, Luigi Martiradonna, Piernicola Spinicelli, Angela Fiore and Jean-Pierre Hermier
(2009). Polarized Single Photon Emission for Quantum Cryptography Based on Colloidal Nanocrystals.
11th international conference on Transparent Optical Networks,1-4. doi: 10.1109/ICTON.2009.5185131
Vladimir L. Kurochkin and Igor G.Neizvestny (2009). Quantum Cryptography. 10th INTERNATIONAL
CONFERENCE AND SEMINAR EDM'2009, 166-170. doi: 10.1109/EDM.2009.5173960
Mehrdad S. Sharbaf (2009). Quantum Cryptography: A New Generation of Information Technology
Security System. Sixth International Conference on Information Technology: New Generations, 1644-1648.

                                                     53
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
doi: 10.1109/ITNG.2009.173
Mohammad Shirali-Shahreza (2007). Steganography in MMS. IEEE International Multitopic Conference,
INMIC 2007, 1-4. doi: 10.1109/INMIC.2007.4557698
Rajni Goel, Moses Garuba and Anteneh Girma (2007). Research Directions in Quantum Cryptography.
International Conference on Information Technology (ITNG'07), 779-784. doi: 10.1109/ITNG.2007.166
Donovan Artz (2001). Digital Stegnography: Hiding Data within the Data. IEEE Internet Computing , 5,
75-80. http://computer.org/internet/
S.K.Moon & R.S.Kawitkar (2007).Data Security using Data Hiding. International Conference on
Computational Intelligence and Multimedia Applications, 4,247-251. Doi: 10.1109/ICCIMA.2007.163
Beenish Mehboob & Rashid Aziz Faruqui (2008). A Stegnography Implementation. International
Symposium on Biometrics and Security Technology,1-5. doi:10.1109/ISBAST.2008.4547669
Tom Klitsner (2001). Quantum Cryptography: Is Your Data Safe Even When Somebody Looks? SANS
Institute InfoSec Reading Room,1-15.
Bruce R Auburn (2003). Quantum Encryption – A Means to Perfect Security? SANS Institute InfoSec
Reading Room, 1-16.
Bob Gourley (2001). Quantum Encryption vs Quantum Computing: Will the Defense or Offense
Dominate? SANS Security Essentials GSEC Practical Assignment Version 1.2e,1-10.
Bradford C Bartlett (2004). Securing Key Distribution with Quantum Cryptography. SANS Institute InfoSec
Reading Room, 1-13.
Joshua Silman (2001). Stegnography and Steganalysis: An Overview. SANS Institute InfoSec Reading
Room,1-10.
Abhishek Tiwari (2009).Stegnography White Paper: The Science of secret communication. Abhitek
Fostering Innovation, 1-20


Mohit Kumar was born in 13th February 1985, Patna, (Bihar), India. He received his B.E degree in
Computer Engineering from D.Y.Patil College of Engineering,Pune(MAHARASHTRA),India,affiliated to
PUNE UNIVERSITY . He is currently pursuing MTECH degree in Computer Science Engineering and
Information Technology at Jaypee University of Information Technology, Waknaghat, Distt.
Solan,(H.P),India. His research interest includes Cryptography and Network Security,Operating System and
Computer Networks.


Abhishek Gupta was born in 12th February 1987, Saharanpur, (U.P.), India. He received his BTech degree
in Computer Engineering from Shobit Institute of Engineering & Technology,Saharanpur (U.P.), India,
affiliated to U.P.T.U, Lucknow (U.P.),India. He is currently pursuing MTECH degree in Computer Science
Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat,
Distt. Solan,(H.P),India. His research interest includes Cryptography and Network Security and Computer
Networks.

Kinjal Shah was born in 10th November 1987, Vadodara, (Gujarat), India. He received his B.E degree in
Computer Engineering from A. D. Patel Institute of Technology, New Vallabh Vidyanagar, Distt Anand,
(Gujarat), India, affiliated to Sardar Patel University, Vallabh Vidyanagar, (Gujarat),India. He is currently
pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee
University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes
Cloud Computing, Cryptography and Network Security and Computer Networks.

Atul Saurabh was born in 19th June 1984, Darbhanga, (Bihar), India. He received his B. Tech degree in
Information Technology from Bengal Institute of Technology and Management, Santiniketan, (West
Bengal), India affiliated to West Bengal University of Technology, Kolkata, (West Bengal),India. He is


                                                     54
Network and Complex Systems                                                              www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
currently pursuing MTECH degree in Computer Science Engineering and Information Technology at
Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest
includes Business Automation and Modelling, Data Structure and Algorithm, Cryptography and J2EE.

Vikas Kumar Tiwari was born in 20th December 1987, ChandiaUmaria, (M.P.), India. He received his
B.E degree in Computer Science & Engineering from JNCT Bhopal, (M.P.), India, affiliated to R.G.T.U.
Bhopal (M.P.),India. He is currently pursuing MTECH degree in Computer Science Engineering and
Information Technology at Jaypee University of Information Technology, Waknaghat, Distt.
Solan,(H.P),India. His research interest includes Cloud Computing, MapReduce, Cryptography and
Network Security and Computer Networks.

Pravesh Saxena was born in 24th July 1988, Sarangarh, (Chhattisgarh), India. He received his B.E degree
in Computer Engineering from Kirodimal Institute Of Technology, Raigarh,(Chhattisgarh)India, affiliated
to Chhattisgarh Swami Vivekanand Technical University (CSVTU),India. He is currently pursuing
MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of
Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Cryptography
and Network Security and Computer Networks.




                                                  55
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org


The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. Prospective authors of
IISTE journals can find the submission instruction on the following page:
http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
IRJAES Editor
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
International Journal of Science and Research (IJSR)
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
International Journal of Technical Research & Application
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
IOSR Journals
 
A novel approach for hiding data in
A novel approach for hiding data inA novel approach for hiding data in
A novel approach for hiding data in
ijwmn
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
IJNSA Journal
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
IJECEIAES
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
ijtsrd
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
Rishab Gupta
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
ijcses
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
ijtsrd
 
Steganography document
Steganography documentSteganography document
Steganography document
BSheghembe
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
IOSR Journals
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
IOSR Journals
 

What's hot (19)

Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
319 325
319 325319 325
319 325
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
A novel approach for hiding data in
A novel approach for hiding data inA novel approach for hiding data in
A novel approach for hiding data in
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Az24339344
Az24339344Az24339344
Az24339344
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 

Viewers also liked

Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
arvind carpenter
 
Stegnography
StegnographyStegnography
Stegnography
Mayank Garg
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
Sarin Thapa
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

Viewers also liked (10)

Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Arvind stegnography
Arvind stegnographyArvind stegnography
Arvind stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
Steganography Steganography
Steganography
 

Similar to Data security using stegnography and quantum cryptography

H017255560
H017255560H017255560
H017255560
IOSR Journals
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systems
rinzindorjej
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
L1803037377
L1803037377L1803037377
L1803037377
IOSR Journals
 
D010312230
D010312230D010312230
D010312230
IOSR Journals
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
Steganography
Steganography Steganography
Steganography
Sagar Kumar
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
ijtsrd
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
Asia Smith
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
IRJET Journal
 
F1803023843
F1803023843F1803023843
F1803023843
IOSR Journals
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
Aparna Nk
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
IJERA Editor
 

Similar to Data security using stegnography and quantum cryptography (20)

H017255560
H017255560H017255560
H017255560
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systems
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
L1803037377
L1803037377L1803037377
L1803037377
 
D010312230
D010312230D010312230
D010312230
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Steganography
Steganography Steganography
Steganography
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
 
F1803023843
F1803023843F1803023843
F1803023843
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Hl3312951297
Hl3312951297Hl3312951297
Hl3312951297
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
Alexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Data security using stegnography and quantum cryptography

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Data Security Using Stegnography and Quantum Cryptography Mohit Kumar, Abhishek Gupta, Kinjal Shah, Atul Saurabh, Pravesh Saxena, Vikas Kumar Tiwari Jaypee University of Information Technology, P.O Dumehar Bani, Waknaghat -173234 (H.P), India Abstract Stegnography is the technique of hiding confidential information within any media. In recent years various stegnography methods have been proposed to make data more secure. At the same time different steganalysis methods have also evolved. The number of attacks used by the steganalyst has only multiplied over the years. Various tools for detecting hidden informations are easily available over the internet, so securing data from steganalyst is still considered a major challenge. While various work have been done to improve the existing algorithms and also new algorithms have been proposed to make data behind the image more secure. We have still been using the same public key cryptography like Deffie-Hellman and RSA for key negotiation which is vulnerable to both technological progress of computing power and evolution in mathematics, so in this paper we have proposed use of quantum cryptography along with stegnography. The use of this combination will create key distribution schemes that are uninterceptable thus providing our data a perfect security. Keywords: Stegnography, Steganalysis, Steganalyst, Quantum Cryptography. 1. Introduction Internet users frequently need to store, send and receive private information. The most common way to do this is to transform the data into different forms. The resulting data can be understood only by those who know how to return it to its original form. This method of protecting information is known as encryption. A major drawback to encryption is that the existence of data is not hidden. Data that has been encrypted, although unreadable, still exists as data. If given enough time, someone could eventually decrypt the data. A solution to this problem is stegnography. Stegnography is also a form of writing namely concealed writing. The Greek word staginess means “unseen” or “hidden.” Stegnography is thus a form of communication, which is designed to be hidden from general view. Stegnography should not be seen as a replacement for cryptography but rather as a complement to it.. There has been a rapid growth of interest in this subject over the last two years, and for two main reasons. Firstly, the publishing and broadcasting industries have become interested in techniques for hiding encrypted copyright marks and serial numbers in digital images, audio recordings, books and multimedia products; an appreciation of new market opportunities created by digital distribution is coupled with a fear that digital works could be too easy to copy. Secondly, moves by various governments to restrict the availability of encryption services have motivated people to study methods by which private messages can be embedded in seemingly innocuous cover messages. In modern terms stegnography is usually implemented computationally, where cover Works such as text files, images, audio files, and video files are tweaked in such a way that a secret message can be embedded within them. The techniques are very similar to that of digital watermarking; however one big distinction must be highlighted between the two. In digital watermarking, the focus is on ensuring that nobody can remove or alter the content of the watermarked data, even though it might be plainly obvious that it exists. Stegnography on the other hand, focuses on making it extremely difficult to tell that a secret message exists at all. If an unauthorized third party is able to say with high confidence that a file contains a secret message, then stegnography has failed. Stegnography also differs from cryptography because the latter does not attempt to hide the fact that a message exists. Instead, cryptography merely obscures the integrity of the 46
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 information so that it does not make sense to anyone but the creator and the recipient. The art of detecting stegnography is referred to as steganalysis. With rapid advances in the field of stegnography and cryptography there have also been major advances made in the field of steganalysis and cryptanalysis. Typically, a steganalysis begins by identifying any artifacts that exists in the suspect file as a result of embedding a message. Electronically, each of the tool used for stegnography leaves a fingerprint or signature in the image that can be exploited to find the message in the image. Steganalysis does not however consider the successful extraction of the message, there is usually a requirement of cryptanalysis. So, after performing cryptanalysis on the cipher text, the plain text can easily be obtained. Over the years our focus has been mainly on security of data but the security of keys is as important as the security of data. Often this aspect is neglected. We have been using the same public key cryptosystem for many years now. Since, uncertainly looms over the security of these cryptosystems; we have used quantum cryptography for securing the key distribution. Quantum cryptography is thought to be secure for three main reasons. One, the quantum no-cloning theorem states that an unknown quantum state cannot be cloned. Theoretically, messages sent using quantum cryptography would be in an unknown quantum state, so they could not be copied and sent on. Two, in a quantum system, which can be in one of two states, any attempt to measure the quantum state will disturb the system. A quantum message that is intercepted and read by an eavesdropper will become garbled and useless to the intended recipient of the message. Three, the effects produced by measuring a quantum property are irreversible, which means an eavesdropper cannot “put back” a quantum message to its original state. These three properties provide the power of quantum cryptography. 2. Related Work S. K. Moon et al proposed an algorithm to hide data of any format in an image and audio file ( S.K Moon et al 2007).For stegnography he used the least significant bit ( 4 LSB ) substitution method. The 4LSB method was implemented for color bitmap images and wave files as the carrier media. A new method of stegnography in MMS was proposed by Mohammad Shirali et al .This paper presented a new method of stegnography using both image and text stegnography methods. This project was written in J2ME (Java 2 Micro Edition ) .In this method, data is broken into two parts with proper sizes and the parts were hidden in the image and text part of MMS message (Mohammad Shirali et al 2007).In order to further enhance the secrecy of stegnography Piyush Marwaha and Pravesh Marwaha (Piyush Marwaha et al 2010 ) proposed an advanced system of encrypting data that combines the features of cryptography, stegnography along with multi-media data hiding. This paper proposed the concept of multiple cryptography where the data will be encrypted in a cipher and the cipher will be hidden into a multimedia image file in encrypted format. This system was more secure than any other these techniques alone and also as compared to stegnography and cryptography combined systems .Muhammad Asad et al proposed an enhanced least significant bit for audio stegnography ( Muhammad Asad et al 2011 ).This paper proposes two ways to improve the conventional LSB modification technique. The first way is to randomize bit number of host message used for embedding secret message while the second way is to randomize sample number containing next secret message bit. The improvised proposed technique works against steganalysis and decreases the probability of secret message being extracted by an intruder. Mohammad Hamdaqa used VoIP (Voice over IP) for real time network stegnography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange’s Interpolation, and then applies a two phase approach on the LACK stegnography mechanism to provide reliability and fault tolerance and to increase steganalysis complexity (Muhammad Hamdaqa et al 2011 ).A new perfect hashing based approach was given by Imran Sarwar Bajwa et al.It uses hashing based approach for stegnography in grey scale images. The proposed approach is more efficient and effective that provides a more secure way of data transmission at higher speed. The presented approach is implemented into a prototype tool coded in VB.NET (Imran Sarwar Bajwa et al 2011 ). 47
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 3. Proposed Work The proposed work consists of the given discussed phases. 3.1 Stegnography Steganography literally means covered writing. Its goal is to hide the fact that communication is taking place. Steganography is mainly applied to media such as images, text, video clips, music and sounds. Image steganography is generally more preferred media because of its harmlessness and attraction. The three basic techniques used for steganography are classified as follows: (A)-Injection-Hiding data in sections of file that are ignored by the processing applications. Therefore avoid modifying those file bits that are relevant to an end user leaving the cover file perfectly usable. (B)-Substitution-Replacement of least significant bits of information that determine the meaningful content of the original file with new data in a way that causes least amount of distortion. (C)-Generation-Unlike injection and substitution, this does not require an existing cover file but generates a cover file for the sole purpose of hiding the message. There are many algorithms that can be used for stegnography. The algorithm which we have used here for stegnography is F5 which is much more secure than all the other algorithms. The F5 algorithm provides high stenographic capacity and can prevent visual attacks and it is also resistant to statistical attacks. Even if the attacker is able to break this algorithm, he will get back only the cipher text and will have to perform cryptanalysis on it to get back the original text. Fig 1 shows the graphical representation of stegnography. Start Application Encryption Stego Image Image Message File Image Message File Stego Image Decryption Figure 1. Graphical Representation of Stegnography 48
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 3.2 Result Figure 2. Results of Cover Image and Stego Image (after Hiding the Data behind the Cover Image) 3.3 Stegnalysis Stegnography basically exploits human perception, as human senses are not trained to look for files that have information inside them. The art of detecting stegnography is referred to as steganalysis. Stegnography have made rapid advances over the years and so have steganalysis. Stegnography (and Steganalysis) is neither inherently good nor evil; it is the manner in which it is used which will determine whether it is benefit or detriment to our society. The number of attacks used by the steganalyst for detecting hidden informations has been only multiplied over the years. The types of attacks used by the steganalysts are following. 1. Stego only attack 2. Chosen stego attack 3. Known cover attack 4. Known stego attack Various tools for detecting stegnography are easily available over the internet. Various tools like Stegdetect and Xsteg are freely available over the internet for detecting stegnography. By performing Steganalysis on the image the attacker will only get the cipher text and he will have to perform Cryptanalysis to get back the original text. 3.4 Quantum Cryptography Public key cryptosystems such as RSA and DEFFIE-HELMAN are still considered to be secure for key distribution. They have undergone over lots of public scrutiny over the years. The power of these algorithms are based on the fact that there is no known mathematical operation for quickly factoring very large numbers given today’s computer processing power. The public cryptosystem has been working very well over the years but in the recent years it has been exposed to a handful of risks. Firstly a computer scientist at the Indian Institute of Technology, Manindra Agarwal solved a problem, how to tell if a number is prime, without performing any factoring, solving this problem may open the door for mathematician to figure out how to factor large numbers. Secondly, the advancements in computer processing will be able to defeat these cryptosystems in timely fashion thus making the public key cryptosystems obsolescent instantly. So here we have used quantum cryptography for exchanging the keys efficiently. At this time, transmission speed and hardware expenses have generally limited the use of quantum devices to distribute 49
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 the keys rather than the entire message. Classical methods of information security using encryption decryption or otherwise are known to be secure but not 100 percent. Increasing computation powers helps hackers to crack down the security cover. Quantum level is one which behaves somewhat differently than classical ones. Classical methods can never give 100% security for example even strong encryption like DES, AES are prone to be broken as much effective work has been done to break these. Dealing things at quantum level will definitely give perfect security because of the behavior of microscopic particles. Assuming laws of Quantum mechanics is true, which follow Heisenberg’s uncertainty principle and photon polarization we can provide 100% security. 3.4.1 Why Quantum Cryptography? Rather than depending on the complexity of factoring large numbers, quantum cryptography is based on the fundamental and unchanging principles of quantum mechanics. In fact, quantum cryptography rests on two pillars of 20th century quantum mechanics –the Heisenberg Uncertainty principle and the principle of photon polarization. Heisenberg’s uncertainty principle says that if you measure one thing, you can not measure another thing accurately. For example, if you measure the position of an electron flying around an atom, you can not accurately measure its velocity. It can be represented using this equation. where (1) According the Heisenberg Uncertainty principle, it is not possible to measure the quantum state of any system without disturbing that system. Thus, the polarization of a photon or light particle can only be known at the point when it is measured. This principle plays a critical role in thwarting the attempts of eavesdroppers in a cryptosystem based on quantum cryptography. Secondly, the photon polarization principle describes how light photons can be oriented or polarized in specific directions. Moreover, a polarized photon can only be detected by a photon filter with the correct polarization or else the photon may be destroyed. It is Heisenberg’s uncertainty principle that makes quantum cryptography an attractive option for ensuring the privacy of data and defeating eavesdroppers. 3.5 Key Generation Quantum property of light is used to generate key. Individual photons are completely polarized. Their polarization state can be linear or circular, or it can be elliptical, which is anywhere in between of linear and circular polarization. These can be described through following equations (analogous to classical electromagnetic waves). Linear Polarization The wave is linearly polarized (or plane polarized) when the phase angles αx and αy are equal. (2) This represents a wave with phase α polarized at an angle θ with respect to x axis. In that case the Jones Vector can be written as follows. (3) The state vectors for linear polarization in x or y are special cases of this state vector. If unit vectors are defined such that, and (4) then, the linearly polarized polarization state can written in the "x-y basis" as follows. (5) 50
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 Circular polarization If the phase angles αx and αy differs exactly by π/2 and x amplitude equals the y amplitude the wave is circularly polarized. The Jones vector then becomes (6) Where, the plus sign indicates right circular polarization and the minus sign indicates left circular polarization. In the case of circular polarization, the electric field vector of constant magnitude rotates in the x-y plane. If unit vectors are defined such that and (7) then an arbitrary polarization state can written in the "R-L basis" as where (8) and We can see that (9) Elliptical polarization The general case in which the electric field rotates in the x-y plane and has variable magnitude is called elliptical polarization .The state vector is given by (10) We can generate our key using photon polarization. Each photon can be polarized in different manner. A calcite crystal can be used as a quantum filter. If the crystal is held in a vertical position, photons that are vertically or horizontally polarized ( | or — ) will pass through the filter unchanged. If a photon that is diagonally polarized (/ or ) passes through the vertical filter, however, the polarization will be changed to vertical or .horizontal. 3.6 Securing Key Distribution It is the one –way-ness of photons along with the Heisenberg uncertainty principle that makes quantum cryptography an attractive option for ensuring the privacy of data and defeating eavesdropper. The representation of bits through polarized photons is the foundation of quantum cryptography that serves as the underlying principle of quantum key distribution. Thus, while the strength of modern digital cryptography is dependent on the computational difficulty of factoring large numbers, quantum cryptography is completely dependent on the rules of physics and is also independent of the processing power of current computing systems. Since the principle of physics will always hold true, quantum cryptography provides an answer to the uncertainty problem that current cryptography suffers from; it is no longer necessary to make assumptions about the computing power of malicious attackers or the development of a theorem to quickly solve the large integer factorization problem. Keys can be distributed using quantum cryptography in the following manner. The sender will send the message to the receiver using a photon gun. The stream of photons will be in one of the four polarization that corresponds to vertical, horizontal or diagonal in opposite directions (0,45,90.135 degree).At the receiver’s end the receiver will randomly choose a filter and count and measure the correct photon polarization. Now, receiver will communicate with sender (out-of-band) about their correct measurement (without sending actual measurement values. The photons that were incorrectly measured will be discarded and the correctly measured photons will be translated into bits based on their polarization. Now, sender and 51
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 receiver will generate one time pad combining their results. This one-time pad will be used in one time information exchange between them. None of them can know the actual key in advance because the key is the product of both their random choices. Now, if an attacker tries to eavesdrop, he must select the correct filter otherwise the photon will get destroyed. Even if attacker is able to successfully eavesdrop, the information which he will get will be of little use unless he has the knowledge of correct polarization of each particular photon. As a result attacker will not correctly interpret meaningful keys and thus be thwarted in his endeavors. 3.7 Security The data which has to be secured here is wrapped around number of security layers. If the attacker gets access to the stego image file in which the message is embedded. At first he will have to perform steganalysis to find out that this message contains a message or not. Even if after performing steganalysis he finds out that image contains some data, he will have to apply the same algorithm to retrieve the embedded file. Unfortunately, if he finds out the algorithm by which the texts have been embedded into the medium, he could get back only the cipher text file. The encryption algorithm which we have used here is AES, which is one of the most secure encryption algorithm used today. This provides an extra layer of security. Now the hacker is left with only one choice to extract the embedded file and that is to compromise the encryption key used somehow. Since modern cryptography is vulnerable to both technological progress of computing power and evolution in mathematics, there is uncertainty that Deffie-Helman and RSA will be secure for key distribution in future or not. Here we would like to propose a new model. This model could be easily applied on the web for making data more secure. Stegnography (Stego Image) Cryptography (Cipher Text) Plain Text Figure 3. Existing Model of Stegnography Key Distribution using Quantum Cryptography Stegnography (Stego Image) Cryptography (Cipher Text) Plain Text Figure 4. The proposed model of Stegnography with Key Distribution using Quantum Cryptography Main idea behind this model is to use quantum cryptography for securing key distribution thus providing our data another layer of security. This way we can provide perfect security to data over the internet. 4. Future Work At present quantum cryptography is used in very small area, the use of quantum cryptography should be 52
  • 8. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 encouraged and it should be used in wide area of applications beside that, maximum guaranteed transmission distance between remote parties is very less at present. As, optical fibers are not perfectly transparent, a photon will at times get absorbed and therefore not reach the end of the fiber. Although, quantum cryptography is secure but information retrieved is very less (due to loss). It should be improved. Another problem that needs to be addressed in future is if an attacker tries to tamper with the message whole message gets destroyed. It is a nice feature of quantum cryptography that no one can tamper with the message but at the same time due to this the receiver is also suffering because correct message was not delivered to the recipient, and now the sender will have to resend the message either from the same path or he will have to choose a different path. 5. Conclusion Securing the key distribution is as important as securing the data itself. In this paper we have made use of quantum cryptography thus improving the security of the keys and providing our data a perfect security. The use of quantum cryptography has added another layer of defense to our data. Even if we use most secure encryption algorithm and best stego technique to hide our data, if the keys gets compromised these security will be of no use. Quantum cryptography addresses current as well as emerging threats and it definitely has “competitive advantage” over other public key cryptosystems. We have used quantum cryptography only for key distribution rather than for entire messages because of limitations of transmission speeds and hardware expenses. The representation of bits through polarized photon is the foundation of quantum cryptography that serves as the underlying principle of quantum key distribution. This paper concentrates on theory of quantum cryptography and the use of quantum cryptography for key distribution and how the use of quantum cryptography contributes to the field of stegnography. In this paper we have shown that using quantum mechanics and photon polarization we can provide perfect security. References Manindra Agrawal, Neeraj Kayal, and Nitin Saxena (2004). Primes is in P. Annals of Mathematics, 160,781-793.doi: 10.4007/annals.2004.160.781 Imran Sarwar Bajwa and Rubata Raisat (2011). A New Perfect Hashing based Approach for Secure Stegnograph. Digital Information Management (ICDIM),174-178. doi: 10.1109/ICDIM.2011.6093325 Muhammad Asad, Junaid Gilani and Adnan Khalid (2011). An Enhanced Least Significant Bit Modification Technique for Audio Steganography Computer Networks and Information Technology (ICCNIT), 143-147. doi: 10.1109/ICCNIT.2011.6020921 Mohammad Hamdaqa and Ladan Tahvildari (2011). ReLACK: A Reliable VoIP Steganography Approach. Fifth International Conference on Secure Software Integration and Reliability Improvement ,189-197.doi: 10.1109/SSIRI.2011.24 S. Changder, N.C. Debnath and D.Ghosh (2011). A Greedy Approach to Text Steganography using Properties of Sentences. Eighth International Conference on Information Technology: New Generations, 30-35. doi: 10.1109/ITNG.2011.13 Piyush Marwaha and Paresh Marwaha (2010). VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES. Second International conference on Computing, Communication and Networking Technologies, 1-6. doi: 10.1109/ICCCNT.2010.5591730 Jinsuk Baek, Cheonshik Kim, Paul S. Fisher and Hongyang Chao (2010). (N. 1) Secret Sharing Approach Based on Steganography with Gray Digital Images. IEEE Conference on Wireless Communications, Networking and Information Security (WCNIS) ,325-329.doi: 10.1109/WCINS.2010.5541793 Ferruccio Pisanello, Luigi Martiradonna, Piernicola Spinicelli, Angela Fiore and Jean-Pierre Hermier (2009). Polarized Single Photon Emission for Quantum Cryptography Based on Colloidal Nanocrystals. 11th international conference on Transparent Optical Networks,1-4. doi: 10.1109/ICTON.2009.5185131 Vladimir L. Kurochkin and Igor G.Neizvestny (2009). Quantum Cryptography. 10th INTERNATIONAL CONFERENCE AND SEMINAR EDM'2009, 166-170. doi: 10.1109/EDM.2009.5173960 Mehrdad S. Sharbaf (2009). Quantum Cryptography: A New Generation of Information Technology Security System. Sixth International Conference on Information Technology: New Generations, 1644-1648. 53
  • 9. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 doi: 10.1109/ITNG.2009.173 Mohammad Shirali-Shahreza (2007). Steganography in MMS. IEEE International Multitopic Conference, INMIC 2007, 1-4. doi: 10.1109/INMIC.2007.4557698 Rajni Goel, Moses Garuba and Anteneh Girma (2007). Research Directions in Quantum Cryptography. International Conference on Information Technology (ITNG'07), 779-784. doi: 10.1109/ITNG.2007.166 Donovan Artz (2001). Digital Stegnography: Hiding Data within the Data. IEEE Internet Computing , 5, 75-80. http://computer.org/internet/ S.K.Moon & R.S.Kawitkar (2007).Data Security using Data Hiding. International Conference on Computational Intelligence and Multimedia Applications, 4,247-251. Doi: 10.1109/ICCIMA.2007.163 Beenish Mehboob & Rashid Aziz Faruqui (2008). A Stegnography Implementation. International Symposium on Biometrics and Security Technology,1-5. doi:10.1109/ISBAST.2008.4547669 Tom Klitsner (2001). Quantum Cryptography: Is Your Data Safe Even When Somebody Looks? SANS Institute InfoSec Reading Room,1-15. Bruce R Auburn (2003). Quantum Encryption – A Means to Perfect Security? SANS Institute InfoSec Reading Room, 1-16. Bob Gourley (2001). Quantum Encryption vs Quantum Computing: Will the Defense or Offense Dominate? SANS Security Essentials GSEC Practical Assignment Version 1.2e,1-10. Bradford C Bartlett (2004). Securing Key Distribution with Quantum Cryptography. SANS Institute InfoSec Reading Room, 1-13. Joshua Silman (2001). Stegnography and Steganalysis: An Overview. SANS Institute InfoSec Reading Room,1-10. Abhishek Tiwari (2009).Stegnography White Paper: The Science of secret communication. Abhitek Fostering Innovation, 1-20 Mohit Kumar was born in 13th February 1985, Patna, (Bihar), India. He received his B.E degree in Computer Engineering from D.Y.Patil College of Engineering,Pune(MAHARASHTRA),India,affiliated to PUNE UNIVERSITY . He is currently pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Cryptography and Network Security,Operating System and Computer Networks. Abhishek Gupta was born in 12th February 1987, Saharanpur, (U.P.), India. He received his BTech degree in Computer Engineering from Shobit Institute of Engineering & Technology,Saharanpur (U.P.), India, affiliated to U.P.T.U, Lucknow (U.P.),India. He is currently pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Cryptography and Network Security and Computer Networks. Kinjal Shah was born in 10th November 1987, Vadodara, (Gujarat), India. He received his B.E degree in Computer Engineering from A. D. Patel Institute of Technology, New Vallabh Vidyanagar, Distt Anand, (Gujarat), India, affiliated to Sardar Patel University, Vallabh Vidyanagar, (Gujarat),India. He is currently pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Cloud Computing, Cryptography and Network Security and Computer Networks. Atul Saurabh was born in 19th June 1984, Darbhanga, (Bihar), India. He received his B. Tech degree in Information Technology from Bengal Institute of Technology and Management, Santiniketan, (West Bengal), India affiliated to West Bengal University of Technology, Kolkata, (West Bengal),India. He is 54
  • 10. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 2, No.2, 2012 currently pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Business Automation and Modelling, Data Structure and Algorithm, Cryptography and J2EE. Vikas Kumar Tiwari was born in 20th December 1987, ChandiaUmaria, (M.P.), India. He received his B.E degree in Computer Science & Engineering from JNCT Bhopal, (M.P.), India, affiliated to R.G.T.U. Bhopal (M.P.),India. He is currently pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Cloud Computing, MapReduce, Cryptography and Network Security and Computer Networks. Pravesh Saxena was born in 24th July 1988, Sarangarh, (Chhattisgarh), India. He received his B.E degree in Computer Engineering from Kirodimal Institute Of Technology, Raigarh,(Chhattisgarh)India, affiliated to Chhattisgarh Swami Vivekanand Technical University (CSVTU),India. He is currently pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Cryptography and Network Security and Computer Networks. 55
  • 11. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar