SlideShare a Scribd company logo
TELKOMNIKA, Vol 16, No 1: February 2018, pp. 361~367
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v16i1.6409  361
Received May 9, 2017; Revised January 5, 2018; Accepted January 11, 2018
File Encryption and Hiding Application Based on AES
and Append Insertion Steganography
G. C. Prasetyadi, R. Refianti and A.B. Mutiara*
Faculty of Computer Science and Information Technology, Gunadarma University
Jl. Margonda Raya No.100, Depok 16424, Indonesia
*Corresponding author, e-mail: amutiara@staff.gunadarma.ac.id
Abstract
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
Keywords: file hiding, append insertion steganography, symmetric key encryption, personal security
Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Steganography is the art of concealed communication, which keeps the existence of a
message secret. It is an alternative tool for privacy and security, which may suppress and
prevent unnecessary attention of third parties, as encrypted messages are obvious even though
they are in nonsense form [1]. Thus, steganography can be applied to avoid unwanted attention
or in places where the usage of encryption is illegal. Encryption and steganography can be used
together to ensure data security. Any possible eavesdropper should not realize any attempt of
secret communication at all, and when the presence of the message is compromised, it is still
not in meaningful form.
1.1. Append Insertion Steganography
Appending data to the end of file is one of the most flexible form of digital
steganography, as many file types allow data to be appended into them, without causing error,
and it has potential to remove limitations such as size and type of data that could be hidden.
Many types of file have end-of-file (eof) marker inside it, and most file readers will simply ignore
any data after the eof [2].
1.2. Related Works
Many articles are reviewed not only to study the algorithm, but also to find similarity in
them that can be considered as limitation, which solution can be proposed. In [3], grayscale
secret images with bit depth of 8-bits are hidden in cover images with bit depth of 24-bits. Cover
images have size of 800x800 pixels, while secret images have 100x100 pixels. The resulting
stego images have 99% conformity with the original images and it can withstand both intentional
and unintentional attacks to some extent.In [4-5], images are processed using binary mode.
Transform domain method such as DWT and DCT are used. In addition, the size of the images
is often too small [6] uses pixel differencing with n-bit Least Significant Bit (LSB) substitution to
provide higher embedding capacity without sacrificing the imperceptibility of the host data.
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 361 – 367
362
Some images used in the testing have up to 359 kilobytes hiding capacity. In [7], a
steganography technique using LSB substitution and PVD method is presented as an adaptive
scheme in the spatial domain. The method partitions the grayscale image into several non-
overlapping blocks with three consecutive pixels. This can also increase hiding capacity. Both
[6] and [7] have not yet implemented encryption.
1.3. Typical Limitation of Various Steganography Methods
As mentioned previously, many steganography methods limit the type and size of
message that can be hidden inside cover/carrier files. Some even do not implement any
encryption. At best, the hiding capacity of cover files can be optimized using methods that are
relatively new and they were tested against various attacks with certains parameters.
This study aims to design and implement an algorithm based on append insertion
steganography method that is flexible for the user to choose what type and size of secret file
he/she wants to hide, instead of focusing to limit the message in some way to meet the
requirements of a steganography method.
2. Research Method
2.1. Limitation of Cover File Types
While the message file can be practically any file, the carrier file must have certain
characteristic so it can be opened after being embedded with encrypted data. To avoid losing
the embedded data, the best types of carrier file are the files intended for sharing and viewing
only. The file format must also have some kind of stop marker, found either at the end of file or
at other structure, which is used as a point for their default handler application to stop reading
the stream of data. This way, the resulted stego file can still be opened normally. Some file
formats which have that characteristic, are:
a. Portable Document Format (pdf),
b. Bitmap image (bmp),
c. Joint Photographic Expert Group (jpg/jpeg), and
d. Portable network graphics (png).
2.2. Proposed Algorithm for Identifying Secret Message
A special block of bytes, called Identification (ID) Block, is needed for the algorithm to
find out the following information of a secret message:
a. Hash value. This is used as secondary measure for authentication and integrity. The original
message hash value is kept and later compared when the message is extracted. Forty digits
long SHA1 hexadecimal value is chosen.
b. Type (extension) of file. Even though the file has no extension at all, it will pose no problem
because empty string value (“”) is supported.
c. Key index. A 0-based index value is needed to tell the application at which point the
message sequence start in the stego file, so it can be extracted completely. This value is
equal to the length of cover file.
Vertical line/pipe (|) character is used to separate those three values. The key index is
generated last and always padded so the total length of ID block is 64 bytes. Therefore, the
structure of this vector is:
[40 bytes hash] + "|" + [ bytes extension] + "|" + [ bytes key index],
where
40 + + + 2 = 64.
This ID block is encrypted and then appended to the end of encrypted message.
2.3. AES-256 Encryption
Advanced Encryption Standard (AES) with Rijndael algorithm, which replaced the aging
DES, is used to enhance the security and confidentality of data [8]. In this study, 256-bits key
length with block size of 128 bits is used.
TELKOMNIKA ISSN: 1693-6930 
File Encryption and Hiding Application Based on AES and Append… (G. C. Prasetyadi)
363
The core of Rijndael algorithm is the round function, which consists of four steps; each
has its own particular function [9]:
a. Bytesub (BSB),
b. Shift Row (SR),
c. Mix Column (MC), and
d. Round Key Addition (RKA)
2.3.1. Cipher Block Chaining
CBC is a block cipher mode of operation to define how block ciphers (such as in DES
and AES) may be applied correctly depending on the specification [9]. CBC eliminates the near
obvious data pattern weakness found in the older Electronic Codebook (ECB) mode.
In CBC mode, each block of plaintext (128 bit for AES) is XORed with the previous
ciphertext block before being encrypted using chosen algorithm, hence the name „chaining‟. For
the first plaintext, an initialization vector (IV), which best randomly and securely generated, is
used to XOR the first plaintext. For the decryption, previous ciphertext block is used to XOR the
decrypted ciphertext block to generate the plaintext. The same IV used in the encryption is used
to XOR the first decrypted ciphertext. Figure 1 shown the diagram of CBC operations.
Figure 1. CBC mode of operation
2.3.2. PKCS7 Byte Padding
During encryption process, the message chosen by user may come in various sizes,
and the plaintext block cannot be empty and must be filled completely with the help of padding.
Thus, PKCS7 padding is used in this study for its simplicity. In PKCS7, the value of each added
byte is the number of bytes that are added. For example, if 3 bytes of message is put into the 8-
bytes block, additional 5 bytes are needed to complete the block. Using PKCS7, the value of
those bytes is 05. Even if the message size in bytes divided by block size results in integer
value, padding is still used for consistency. PKCS7 is thoroughly described in [10].
2.4. Proposed Algorithm for File Hiding and Recovery
2.4.1. File Hiding
The steganography method used to hide the confidential message file is append
insertion method. The primary reason is to remove the file type and size limitation found in many
other methods. The activity diagram of the proposed file hiding scheme is illustrated in Figure 2.
The algorithm is as follows:
a. Choose a carrier file and a message file.
b. Read all contents of those files as binary into array of byte.
c. Generate 64 bytes identification (ID) block.
d. Encrypt the of the message byte array.
e. Append the ID block to the encrypted message byte array.
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 361 – 367
364
f. Append the message bytes with ID array to the cover byte array.
g. Write the resulting stego byte array to a stego file.
Figure 2. Diagram of file hiding
The AES-256 with 256-bit key and 128-bit block size is chosen as encryption standard.
Cipher Block Chaining (CBC) mode of operation is used to handle the blocks. The encryption
algorithm is as follows:
1. Randomly generate 128-bit (16 bytes) salt and initialization vector (IV).
2. Use the user given passphrase and salt to generate the real 256-bit secret key.
3. Put the message bytes into blocks of 128-bit with the help PKCS7 padding.
4. For ; < number of blocks; ++:
a. If , XOR the message block with generated IV, encrypt the resulting block using
the secret key to generate ciphertext block.
b. Else, XOR the message block with previous ciphertext, encrypt the resulting block using
the secret key to generate ciphertext block.
5. Prepend the salt and the IV to the generated ciphertext.
The functions to generate salt, IV, and secret key need to be secure. The resulting
stego file will have this structure:
[x bytes cover] + [[16 bytes salt] + [16 bytes IV] + [y bytes encrypted] + [64 bytes ID]],
2.4.2. File Recovery
To recover the hidden message file, the ID block has to be retrieved first before
encrypted message bytes can be extracted and decrypted with secret passphrase. The
algorithm is as follows:
a. Choose a stego file.
b. Read all contents as binary into a byte array.
c. Get the 64 bytes ID block at the end of stego byte array.
d. Extract and read the encrypted message bytes into a byte array.
e. Decrypt the encrypted byte array.
TELKOMNIKA ISSN: 1693-6930 
File Encryption and Hiding Application Based on AES and Append… (G. C. Prasetyadi)
365
f. Write the resulting message byte array to a file with certain type.
The activity diagram of the proposed file recovery scheme is shown in Figure 3:
Figure 3. Diagram of file recovery
The decryption algorithm is as follows:
1. Get the 16 bytes salt and IV.
2. Generate the original secret key using correct passphrase and the salt.
3. Put the ciphertext bytes into blocks of 128-bit.
4. For = 0; < number of blocks; ++:
a. If = 0, decrypt the ciphertext block using the key, and XOR it with IV to generate
the message block.
b. Else, decrypt the ciphertext block using the key, and XOR it with previous ciphertext
block to generate the message block.
3. Results and Analysis
The application was made using C# programming language and NET Framework
optimized for Windows operating system. The size of final assembly is approximately 58.5 KB.
Figure 4 shown user interface of application. The integrity testing examined whether the
message file, which is the file to be hidden in the carrier/cover file, retained its integrity before
being encrypted and embedded into the cover file, and after being successfully extracted and
decrypted. SHA-256 hash function was used to produce hash value (also called signature or
checksum). The same message file would always produce the same hash value.
In this testing, five randomly generated files, each with different size, got their hash
value computed. Those files was encrypted and hidden in a carrier file and then retrieved back,
using proposed algorithm explained previously. Table 1 shown the details of those files.
A random 2 MB portable document format (PDF) file was used as cover. Note that the
characteristics of cover files would not matter most of the times, as long as they comply with the
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 361 – 367
366
requirements explained previously. The hash value of the retrieved files was to be computed
again, and the value should be the same. The result is shown in Table 2.
Figure 4. User interface of application
Table 1. The Details of Randomly Generated Dummy Files
Filename Size (MB) Size (bytes)
Dummy09MB 9.53 10000000
Dummy19MB 19 20000000
Dummy28MB 28.6 30000000
Dummy38MB 38.1 40000000
Dummy47MB 47.6 50000000
Table 2. Data Integrity Testing Results
Filena
me
Original hash value Hash value after recovery
Concl
usion
dumm
y09MB
E0BD9F3AB7B7868BA5CDDE48DC34E69C5B
BBB7DA59105F9801907FBF2A40893A
E0BD9F3AB7B7868BA5CDDE48DC34E69C5B
BBB7DA59105F9801907FBF2A40893A
VALI
D
dumm
y19MB
4F6D706F771F58A33F9280617EFDB4E3F42E
C4F6025AF5C2DCA21B7ABD8CB9B8
4F6D706F771F58A33F9280617EFDB4E3F42E
C4F6025AF5C2DCA21B7ABD8CB9B8
VALI
D
dumm
y28MB
D129C56BB17001E1E2BCE43FEF801FD55B5
40BCF5918E49EDB2FACBB5799ED64
D129C56BB17001E1E2BCE43FEF801FD55B5
40BCF5918E49EDB2FACBB5799ED64
VALI
D
dumm
y38MB
AAFE10A8DD14DD04FBF3BCE4D3486EA97E
9576E0DF3C37730AF7F9082F58FE08
AAFE10A8DD14DD04FBF3BCE4D3486EA97E
9576E0DF3C37730AF7F9082F58FE08
VALI
D
dumm
y47MB
D7EA6522CDA07B68DBB61B348B5ACCEE90
BC7E8E0246F3F26419EF033FCADF75
D7EA6522CDA07B68DBB61B348B5ACCEE90
BC7E8E0246F3F26419EF033FCADF75
VALI
D
To measure how the usage of this application affects system performance, additional
test was run. Dummy files that had been used in data integrity test were used again, this time to
analyze memory usage and time needed to complete two main operation: data hiding and
encryption.
The test is run on the local machine with following specifications:
a. CPU: 4 Cores, up to 3.6 GHz
b. RAM: 8 (2x4) GB, 1600 Mhz
c. Hard drive: 466 GB capacity, Read 74.45 MB/s, Write 64.18 MB/s
d. Operating system: Windows 8.1 Pro, 64-bit
Table 3 shown the result:
Table 3. Performance Testing Results
Filename Size (bytes) Encryption
time (ms)
Hiding
time (ms)
Peak memory
(MB)
dummy09MB 10000000 405 168 144.8
dummy19MB 20000000 808 472 255.1
dummy28MB 30000000 1181 1433 267.5
dummy38MB 40000000 1612 2710 624
dummy47MB 50000000 2005 1272 690.4
TELKOMNIKA ISSN: 1693-6930 
File Encryption and Hiding Application Based on AES and Append… (G. C. Prasetyadi)
367
During the testing, CPU, memory, and hard drive were on idle and used to process only
necessary programs and services, including the operating system, the IDE and its debugger,
and the application itself. Based on the result, obviously, the bigger the message file, the longer
the encryption and hiding time. Exception was found at the last test, which the hiding time for a
file with 50000000 bytes in size only took 1272 milliseconds. This could be caused by the .NET
Framework optimization when operating with large data.
4. Conclusion
The proposed file hiding and file recovery algorithm involving identification (ID) block
was proven usable for hiding any kind and any size of data (file) using append insertion method
in the selected cover file types. In addition, this method allows the usage of current standard
AES to scramble the message/hidden files, further enhancing data security. The application as
the implementation of proposed concept could be used to hide and later recover a message file
up to 47 MB in roughly 2005 milliseconds, which is acceptable for personal usage. The
maximum size of files depends on the system that runs this application. The hash values of
each dummy file before hiding operation and after successfully recovered were the same. The
final assembly can be found at https://github.com/GottfriedCP/FileStegano. Per January 2018, it
has been downloaded 2100 times. This study is an initial attempt to remove the limitation of
message type and size in in steganography method, thus giving users freedom to choose any
file format. Some improvements have to be done, such as to increase its robustness to
detection and various attacks by making the cover and the message seem inseparable through
implementation of special file formatting and handling.
References
[1] Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T. Digital Watermarking and Steganography.
Burlington: Morgan Kaufmann Publishers. 2008.
[2] Raggo M, Hosmer C. Data Hiding. Massachusetts: Elsevier. 2013: 43-46.
[3] PourArian MR, Hanani A. Blind Steganography in Color Images by Double Wavelet Transform and
Improved Arnold Transform. Indonesian Journal of Electrical Engineering and Computer Science
(IJEECS). 2016; 3(3): 586-600.
[4] Kakkirala KR, et al. Block Based Robust Blind Image Watermarking Using Discrete Wavelet
Transform. Signal Processing & its Applications, IEEE 10th International Colloquium on Kuala
Lumpur. 2014: 58-61.
[5] Thanh TM, et al. A proposal of novel q-DWT for blind and robust image watermarking. IEEE 25th
Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
Washington DC. 2014: 2061-2065.
[6] Arya MS, Rani M, Bedi CS. Improved Capacity Image Steganography Algorithm using 16-Pixel
Differencing with n-bit LSB Substitution for RGB Images. International Journal of Electrical and
Computer Engineering (IJECE). 2016; 6(6): 2735-2741.
[7] Jahromi MB, Faez K. An Adaptive Steganography Scheme Based on Visual Quality and Embedding
Capacity Improvement. International Journal of Electrical and Computer Engineering (IJECE). 2016;
4(4): 573-584.
[8] Delfs H, Knebl H. Introduction to Cryptography. New York: Springer. 2007.
[9] Mollin RA. An Introduction to Cryptography. Boca Raton: Taylor & Francis Group, LLC. 2007.
[10] Housley R. RFC 5652 - Cryptographic Message Syntax (CMS). September 2009. [Online]. Available:
https://tools.ietf.org/html/rfc5652#section-6.3. [Accessed 3 May 2017].

More Related Content

What's hot

Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
CSCJournals
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
IJECEIAES
 
H42054550
H42054550H42054550
H42054550
IJERA Editor
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganography
ijceronline
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
sipij
 
H018114956
H018114956H018114956
H018114956
IOSR Journals
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
IOSR Journals
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
International Journal of Science and Research (IJSR)
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
 
Text hiding in text using invisible character
Text hiding in text using invisible character Text hiding in text using invisible character
Text hiding in text using invisible character
IJECEIAES
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
Pradeep Vishwakarma
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Editor IJMTER
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 

What's hot (18)

Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
H42054550
H42054550H42054550
H42054550
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganography
 
Report
ReportReport
Report
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
 
H018114956
H018114956H018114956
H018114956
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
Text hiding in text using invisible character
Text hiding in text using invisible character Text hiding in text using invisible character
Text hiding in text using invisible character
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
It3116411644
It3116411644It3116411644
It3116411644
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 

Similar to File Encryption and Hiding Application Based on AES and Append Insertion Steganography

A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
ijcisjournal
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
vaishali kataria
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
csandit
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
IRJET Journal
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
IJECEIAES
 
Hiding Image within Video Clip
Hiding Image within Video ClipHiding Image within Video Clip
Hiding Image within Video Clip
IOSR Journals
 

Similar to File Encryption and Hiding Application Based on AES and Append Insertion Steganography (20)

A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHYADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
ADVANCED LSB TECHNIQUE FOR AUDIO STENOGRAPHY
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
H43064650
H43064650H43064650
H43064650
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Hiding Image within Video Clip
Hiding Image within Video ClipHiding Image within Video Clip
Hiding Image within Video Clip
 
Stegnography
StegnographyStegnography
Stegnography
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
TELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
TELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
TELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
TELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
TELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
TELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
TELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
TELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
itech2017
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABSDESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

File Encryption and Hiding Application Based on AES and Append Insertion Steganography

  • 1. TELKOMNIKA, Vol 16, No 1: February 2018, pp. 361~367 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v16i1.6409  361 Received May 9, 2017; Revised January 5, 2018; Accepted January 11, 2018 File Encryption and Hiding Application Based on AES and Append Insertion Steganography G. C. Prasetyadi, R. Refianti and A.B. Mutiara* Faculty of Computer Science and Information Technology, Gunadarma University Jl. Margonda Raya No.100, Depok 16424, Indonesia *Corresponding author, e-mail: amutiara@staff.gunadarma.ac.id Abstract Steganography is a method of hiding secret message in other innocuous looking object so that its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method used in this paper is called append insertion steganography method. This method is chosen as an attempt to remove the limitation of message format, which appears in many popular steganography methods. To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase. A special block of bytes is used to identify and verify the original message so it can be recovered while retaining its integrity. The C# programming language and .NET Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file contains exactly one message file. In the testing, five random files are used as secret message. Their integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented. Keywords: file hiding, append insertion steganography, symmetric key encryption, personal security Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Steganography is the art of concealed communication, which keeps the existence of a message secret. It is an alternative tool for privacy and security, which may suppress and prevent unnecessary attention of third parties, as encrypted messages are obvious even though they are in nonsense form [1]. Thus, steganography can be applied to avoid unwanted attention or in places where the usage of encryption is illegal. Encryption and steganography can be used together to ensure data security. Any possible eavesdropper should not realize any attempt of secret communication at all, and when the presence of the message is compromised, it is still not in meaningful form. 1.1. Append Insertion Steganography Appending data to the end of file is one of the most flexible form of digital steganography, as many file types allow data to be appended into them, without causing error, and it has potential to remove limitations such as size and type of data that could be hidden. Many types of file have end-of-file (eof) marker inside it, and most file readers will simply ignore any data after the eof [2]. 1.2. Related Works Many articles are reviewed not only to study the algorithm, but also to find similarity in them that can be considered as limitation, which solution can be proposed. In [3], grayscale secret images with bit depth of 8-bits are hidden in cover images with bit depth of 24-bits. Cover images have size of 800x800 pixels, while secret images have 100x100 pixels. The resulting stego images have 99% conformity with the original images and it can withstand both intentional and unintentional attacks to some extent.In [4-5], images are processed using binary mode. Transform domain method such as DWT and DCT are used. In addition, the size of the images is often too small [6] uses pixel differencing with n-bit Least Significant Bit (LSB) substitution to provide higher embedding capacity without sacrificing the imperceptibility of the host data.
  • 2.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 361 – 367 362 Some images used in the testing have up to 359 kilobytes hiding capacity. In [7], a steganography technique using LSB substitution and PVD method is presented as an adaptive scheme in the spatial domain. The method partitions the grayscale image into several non- overlapping blocks with three consecutive pixels. This can also increase hiding capacity. Both [6] and [7] have not yet implemented encryption. 1.3. Typical Limitation of Various Steganography Methods As mentioned previously, many steganography methods limit the type and size of message that can be hidden inside cover/carrier files. Some even do not implement any encryption. At best, the hiding capacity of cover files can be optimized using methods that are relatively new and they were tested against various attacks with certains parameters. This study aims to design and implement an algorithm based on append insertion steganography method that is flexible for the user to choose what type and size of secret file he/she wants to hide, instead of focusing to limit the message in some way to meet the requirements of a steganography method. 2. Research Method 2.1. Limitation of Cover File Types While the message file can be practically any file, the carrier file must have certain characteristic so it can be opened after being embedded with encrypted data. To avoid losing the embedded data, the best types of carrier file are the files intended for sharing and viewing only. The file format must also have some kind of stop marker, found either at the end of file or at other structure, which is used as a point for their default handler application to stop reading the stream of data. This way, the resulted stego file can still be opened normally. Some file formats which have that characteristic, are: a. Portable Document Format (pdf), b. Bitmap image (bmp), c. Joint Photographic Expert Group (jpg/jpeg), and d. Portable network graphics (png). 2.2. Proposed Algorithm for Identifying Secret Message A special block of bytes, called Identification (ID) Block, is needed for the algorithm to find out the following information of a secret message: a. Hash value. This is used as secondary measure for authentication and integrity. The original message hash value is kept and later compared when the message is extracted. Forty digits long SHA1 hexadecimal value is chosen. b. Type (extension) of file. Even though the file has no extension at all, it will pose no problem because empty string value (“”) is supported. c. Key index. A 0-based index value is needed to tell the application at which point the message sequence start in the stego file, so it can be extracted completely. This value is equal to the length of cover file. Vertical line/pipe (|) character is used to separate those three values. The key index is generated last and always padded so the total length of ID block is 64 bytes. Therefore, the structure of this vector is: [40 bytes hash] + "|" + [ bytes extension] + "|" + [ bytes key index], where 40 + + + 2 = 64. This ID block is encrypted and then appended to the end of encrypted message. 2.3. AES-256 Encryption Advanced Encryption Standard (AES) with Rijndael algorithm, which replaced the aging DES, is used to enhance the security and confidentality of data [8]. In this study, 256-bits key length with block size of 128 bits is used.
  • 3. TELKOMNIKA ISSN: 1693-6930  File Encryption and Hiding Application Based on AES and Append… (G. C. Prasetyadi) 363 The core of Rijndael algorithm is the round function, which consists of four steps; each has its own particular function [9]: a. Bytesub (BSB), b. Shift Row (SR), c. Mix Column (MC), and d. Round Key Addition (RKA) 2.3.1. Cipher Block Chaining CBC is a block cipher mode of operation to define how block ciphers (such as in DES and AES) may be applied correctly depending on the specification [9]. CBC eliminates the near obvious data pattern weakness found in the older Electronic Codebook (ECB) mode. In CBC mode, each block of plaintext (128 bit for AES) is XORed with the previous ciphertext block before being encrypted using chosen algorithm, hence the name „chaining‟. For the first plaintext, an initialization vector (IV), which best randomly and securely generated, is used to XOR the first plaintext. For the decryption, previous ciphertext block is used to XOR the decrypted ciphertext block to generate the plaintext. The same IV used in the encryption is used to XOR the first decrypted ciphertext. Figure 1 shown the diagram of CBC operations. Figure 1. CBC mode of operation 2.3.2. PKCS7 Byte Padding During encryption process, the message chosen by user may come in various sizes, and the plaintext block cannot be empty and must be filled completely with the help of padding. Thus, PKCS7 padding is used in this study for its simplicity. In PKCS7, the value of each added byte is the number of bytes that are added. For example, if 3 bytes of message is put into the 8- bytes block, additional 5 bytes are needed to complete the block. Using PKCS7, the value of those bytes is 05. Even if the message size in bytes divided by block size results in integer value, padding is still used for consistency. PKCS7 is thoroughly described in [10]. 2.4. Proposed Algorithm for File Hiding and Recovery 2.4.1. File Hiding The steganography method used to hide the confidential message file is append insertion method. The primary reason is to remove the file type and size limitation found in many other methods. The activity diagram of the proposed file hiding scheme is illustrated in Figure 2. The algorithm is as follows: a. Choose a carrier file and a message file. b. Read all contents of those files as binary into array of byte. c. Generate 64 bytes identification (ID) block. d. Encrypt the of the message byte array. e. Append the ID block to the encrypted message byte array.
  • 4.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 361 – 367 364 f. Append the message bytes with ID array to the cover byte array. g. Write the resulting stego byte array to a stego file. Figure 2. Diagram of file hiding The AES-256 with 256-bit key and 128-bit block size is chosen as encryption standard. Cipher Block Chaining (CBC) mode of operation is used to handle the blocks. The encryption algorithm is as follows: 1. Randomly generate 128-bit (16 bytes) salt and initialization vector (IV). 2. Use the user given passphrase and salt to generate the real 256-bit secret key. 3. Put the message bytes into blocks of 128-bit with the help PKCS7 padding. 4. For ; < number of blocks; ++: a. If , XOR the message block with generated IV, encrypt the resulting block using the secret key to generate ciphertext block. b. Else, XOR the message block with previous ciphertext, encrypt the resulting block using the secret key to generate ciphertext block. 5. Prepend the salt and the IV to the generated ciphertext. The functions to generate salt, IV, and secret key need to be secure. The resulting stego file will have this structure: [x bytes cover] + [[16 bytes salt] + [16 bytes IV] + [y bytes encrypted] + [64 bytes ID]], 2.4.2. File Recovery To recover the hidden message file, the ID block has to be retrieved first before encrypted message bytes can be extracted and decrypted with secret passphrase. The algorithm is as follows: a. Choose a stego file. b. Read all contents as binary into a byte array. c. Get the 64 bytes ID block at the end of stego byte array. d. Extract and read the encrypted message bytes into a byte array. e. Decrypt the encrypted byte array.
  • 5. TELKOMNIKA ISSN: 1693-6930  File Encryption and Hiding Application Based on AES and Append… (G. C. Prasetyadi) 365 f. Write the resulting message byte array to a file with certain type. The activity diagram of the proposed file recovery scheme is shown in Figure 3: Figure 3. Diagram of file recovery The decryption algorithm is as follows: 1. Get the 16 bytes salt and IV. 2. Generate the original secret key using correct passphrase and the salt. 3. Put the ciphertext bytes into blocks of 128-bit. 4. For = 0; < number of blocks; ++: a. If = 0, decrypt the ciphertext block using the key, and XOR it with IV to generate the message block. b. Else, decrypt the ciphertext block using the key, and XOR it with previous ciphertext block to generate the message block. 3. Results and Analysis The application was made using C# programming language and NET Framework optimized for Windows operating system. The size of final assembly is approximately 58.5 KB. Figure 4 shown user interface of application. The integrity testing examined whether the message file, which is the file to be hidden in the carrier/cover file, retained its integrity before being encrypted and embedded into the cover file, and after being successfully extracted and decrypted. SHA-256 hash function was used to produce hash value (also called signature or checksum). The same message file would always produce the same hash value. In this testing, five randomly generated files, each with different size, got their hash value computed. Those files was encrypted and hidden in a carrier file and then retrieved back, using proposed algorithm explained previously. Table 1 shown the details of those files. A random 2 MB portable document format (PDF) file was used as cover. Note that the characteristics of cover files would not matter most of the times, as long as they comply with the
  • 6.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 361 – 367 366 requirements explained previously. The hash value of the retrieved files was to be computed again, and the value should be the same. The result is shown in Table 2. Figure 4. User interface of application Table 1. The Details of Randomly Generated Dummy Files Filename Size (MB) Size (bytes) Dummy09MB 9.53 10000000 Dummy19MB 19 20000000 Dummy28MB 28.6 30000000 Dummy38MB 38.1 40000000 Dummy47MB 47.6 50000000 Table 2. Data Integrity Testing Results Filena me Original hash value Hash value after recovery Concl usion dumm y09MB E0BD9F3AB7B7868BA5CDDE48DC34E69C5B BBB7DA59105F9801907FBF2A40893A E0BD9F3AB7B7868BA5CDDE48DC34E69C5B BBB7DA59105F9801907FBF2A40893A VALI D dumm y19MB 4F6D706F771F58A33F9280617EFDB4E3F42E C4F6025AF5C2DCA21B7ABD8CB9B8 4F6D706F771F58A33F9280617EFDB4E3F42E C4F6025AF5C2DCA21B7ABD8CB9B8 VALI D dumm y28MB D129C56BB17001E1E2BCE43FEF801FD55B5 40BCF5918E49EDB2FACBB5799ED64 D129C56BB17001E1E2BCE43FEF801FD55B5 40BCF5918E49EDB2FACBB5799ED64 VALI D dumm y38MB AAFE10A8DD14DD04FBF3BCE4D3486EA97E 9576E0DF3C37730AF7F9082F58FE08 AAFE10A8DD14DD04FBF3BCE4D3486EA97E 9576E0DF3C37730AF7F9082F58FE08 VALI D dumm y47MB D7EA6522CDA07B68DBB61B348B5ACCEE90 BC7E8E0246F3F26419EF033FCADF75 D7EA6522CDA07B68DBB61B348B5ACCEE90 BC7E8E0246F3F26419EF033FCADF75 VALI D To measure how the usage of this application affects system performance, additional test was run. Dummy files that had been used in data integrity test were used again, this time to analyze memory usage and time needed to complete two main operation: data hiding and encryption. The test is run on the local machine with following specifications: a. CPU: 4 Cores, up to 3.6 GHz b. RAM: 8 (2x4) GB, 1600 Mhz c. Hard drive: 466 GB capacity, Read 74.45 MB/s, Write 64.18 MB/s d. Operating system: Windows 8.1 Pro, 64-bit Table 3 shown the result: Table 3. Performance Testing Results Filename Size (bytes) Encryption time (ms) Hiding time (ms) Peak memory (MB) dummy09MB 10000000 405 168 144.8 dummy19MB 20000000 808 472 255.1 dummy28MB 30000000 1181 1433 267.5 dummy38MB 40000000 1612 2710 624 dummy47MB 50000000 2005 1272 690.4
  • 7. TELKOMNIKA ISSN: 1693-6930  File Encryption and Hiding Application Based on AES and Append… (G. C. Prasetyadi) 367 During the testing, CPU, memory, and hard drive were on idle and used to process only necessary programs and services, including the operating system, the IDE and its debugger, and the application itself. Based on the result, obviously, the bigger the message file, the longer the encryption and hiding time. Exception was found at the last test, which the hiding time for a file with 50000000 bytes in size only took 1272 milliseconds. This could be caused by the .NET Framework optimization when operating with large data. 4. Conclusion The proposed file hiding and file recovery algorithm involving identification (ID) block was proven usable for hiding any kind and any size of data (file) using append insertion method in the selected cover file types. In addition, this method allows the usage of current standard AES to scramble the message/hidden files, further enhancing data security. The application as the implementation of proposed concept could be used to hide and later recover a message file up to 47 MB in roughly 2005 milliseconds, which is acceptable for personal usage. The maximum size of files depends on the system that runs this application. The hash values of each dummy file before hiding operation and after successfully recovered were the same. The final assembly can be found at https://github.com/GottfriedCP/FileStegano. Per January 2018, it has been downloaded 2100 times. This study is an initial attempt to remove the limitation of message type and size in in steganography method, thus giving users freedom to choose any file format. Some improvements have to be done, such as to increase its robustness to detection and various attacks by making the cover and the message seem inseparable through implementation of special file formatting and handling. References [1] Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T. Digital Watermarking and Steganography. Burlington: Morgan Kaufmann Publishers. 2008. [2] Raggo M, Hosmer C. Data Hiding. Massachusetts: Elsevier. 2013: 43-46. [3] PourArian MR, Hanani A. Blind Steganography in Color Images by Double Wavelet Transform and Improved Arnold Transform. Indonesian Journal of Electrical Engineering and Computer Science (IJEECS). 2016; 3(3): 586-600. [4] Kakkirala KR, et al. Block Based Robust Blind Image Watermarking Using Discrete Wavelet Transform. Signal Processing & its Applications, IEEE 10th International Colloquium on Kuala Lumpur. 2014: 58-61. [5] Thanh TM, et al. A proposal of novel q-DWT for blind and robust image watermarking. IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC). Washington DC. 2014: 2061-2065. [6] Arya MS, Rani M, Bedi CS. Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images. International Journal of Electrical and Computer Engineering (IJECE). 2016; 6(6): 2735-2741. [7] Jahromi MB, Faez K. An Adaptive Steganography Scheme Based on Visual Quality and Embedding Capacity Improvement. International Journal of Electrical and Computer Engineering (IJECE). 2016; 4(4): 573-584. [8] Delfs H, Knebl H. Introduction to Cryptography. New York: Springer. 2007. [9] Mollin RA. An Introduction to Cryptography. Boca Raton: Taylor & Francis Group, LLC. 2007. [10] Housley R. RFC 5652 - Cryptographic Message Syntax (CMS). September 2009. [Online]. Available: https://tools.ietf.org/html/rfc5652#section-6.3. [Accessed 3 May 2017].