The document proposes a system for enhancing security in confidential data transmission. It combines cryptography and steganography techniques. Cryptography is used to encrypt the data using Blowfish algorithm with a 32-448 bit key. Steganography hides the encrypted data in a grayscale image by modifying the image's discrete cosine transform coefficients and using a 64 bit key. The system generates two additional keys by modifying the encrypted text, improving security. By combining encryption, data hiding, and multiple keys, the proposed system aims to make confidential data transmission highly secure and undetectable.
3. ABSTRACT • Security enhancement in confidential data
transmission is achieved by making the confidential
data scrambled and then sending the data in a way
such that the existence of the message is undetected.
• Data is scrambled using the Cryptography techniques.
• Message existence is hidden using the Steganography.
• By combining these two techniques the security of the
confidential data can be enhanced.
3
Of
11
4. CRYPTOGR
APHY
• Cryptography refers to the technique of converting the
plain text message into a cipher text and then that
cipher text into the original plain text.
• Although cryptography is a necessary condition for
secure communications but it is not by itself sufficient.
• Types :
1. Secret Key Cryptography: Uses a single key for both
encryption and decryption
2. Public Key Cryptography: Uses one key for
encryption and another for decryption
3. Hash Functions: Uses a mathematical
transformation to irreversibly "encrypt"
information.[2] 4
Of
11
5. CRYPTO
MODULE
• For Crypto Module the following steps are considered
for encrypting the data:
1. Insert text for encryption.
2. Apply Blowfish algorithm using 32-448 bit key (Key 1).
3. GenerateCipherText in hexadecimal form. [2]
5
Of
11
InsertText
Encryption
Method
Cipher
Text
6. SECURITY
MODULE
• This is an intermediate module which provides an
extra security features to the newly developed system.
This module is used to modify the cipher text and
to generate two extra keys. In the reverse process it
regenerates the original cipher text.
• Before the hiding process this module works as
follows:
1. Separate the alphabets and digits from the cipher
text.
2. Keep track of the original position of the alphabet
and the digits in the form of a secret key (Key 3).
3. Separate first seven alphabets retrieved from first
step and add the remaining alphabets at the end of
the separated digits as in the first step.This
generates the second key (Key 4).[2] 6
Of
11
7. SECURITY
MODULE
CipherText in Hex
Generate Key 3 from
the original position of
the alphabet and the
digits
Separate the
alphabets and digits
from the cipher text
Take first seven
alphabets to be
hidden
Generate Key 4 by
adding remaining
characters and digits
7
Of
11
[2]
8. STEGANO
GRAPHY
• Steganography is the technique for secured
communication which encompasses methods of
transmitting secret messages through innocuous cover
carriers in such a manner that the very existence of
the embedded messages is undetectable.
• Information can be hidden in images , audio, video,
text, or some other digitally representative code.
• The techniques used to modify the covers
1. Substitution system
2. Transform domain techniques
3. Spread spectrum techniques
4. Statistical method
5. Distortion techniques
6. Cover generation methods[2]
8
Of
11
9. STEGO
MODULE
• For Stego Module the following steps are
considered for hiding the above generated Cipher text.
1. Take seven alphabets from the above discussed
Security Module.
2. Scramble the alphabets using a 64 bit key (Key 2).
3. Take a Gray Scale Image.
4. Find the DCT of the Image.
5. Hide the Cipher by altering DCTs.
6. Apply Inverse DCT.
7. Find the Stego Image[2]
9
Of
11
10. HOW
SECURE
THE
PROPOSED
SYSTEM
IS?
• The proposed solution is highly secure since-
• It’s a combination of two highly secured techniques –
a) Blowfish for cryptography
b) DCT manipulation for Steganography.
• Number of Keys:This system contains total 4 keys.
One 32-448 bits private key for Blowfish algorithm
One 56 bits private key for scrambling the cipher text.
Two extra private generated keys for retrieving the
original message.
• These two extra generated keys make the system
highly secured. If intruder detect the partial part of the
hidden message from the stego image it will be totally
meaningless for him and moreover until the complete
set of keys are available getting the original message is
impossible.[2]
10
Of
11
11. REFRENCES 1. Network security essentials: applications and
standards, fourth edition byWilliam Stallings
2. Proposed System for Data Hiding Using
Cryptography and Steganography by Dipti Kapoor
Sarmah and Neha Bajpai.
3. Security Enhancement Algorithm for Data
Transmission using Elliptic Curve Diffie - Hellman Key
Exchange by Shaikh Ammarah P., Vikas Kaul and S K
Narayankhedkar
4. Data Hiding in Image using least significant bit with
cryptography by Mr.VikasTyagi.
5. A dynamic method to secure confidential data using
signcryption with steganography by Dr. Suryakant
Thorat and Mr. Madhav Bokare
11
Of
11