advanced halftone secret sharing scheme: using …is complex by bot assailant. visual cryptography...

15
ADVANCED HALFTONE SECRET SHARING SCHEME: USING VISUAL CRYPTOGRAPHY WITH STEGANOGRAPHY TO AVERT ATTACKS I.Diana Judith 1 , Dr.G.J.Joyce Mary 2 1 Research Scholar, Department of CSE, PRIST University,Vallam,Thanjavur 2 Research Supervisor, Department of CSE, PRIST University,Vallam,Thanjavur March 21, 2018 Abstract Visual Cryptography is a technique for information hid- ing behind media record, for example, text and picture. For improving the security of information stowing away and transmission over system, the recently proposed framework utilizes hereditary calculation in Visual Cryptography. Plain content or image is changed over into figure message then it is covered up by another picture. Hereditary Algorithm is utilized to rearrange pixel area of picture with the goal that recognition of hidden image wind up by another image is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into different shares to guarantee enhanced security and unwavering qual- ity. The execution of the proposed framework Advanced Halftone Secret Sharing Scheme using Visual cryptography with Steganography (AH-VCST) has been tested by per- forming quality measure parameters like Mean Squared Er- 1 International Journal of Pure and Applied Mathematics Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/

Upload: others

Post on 19-Sep-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

ADVANCED HALFTONE SECRETSHARING SCHEME: USING VISUAL

CRYPTOGRAPHY WITHSTEGANOGRAPHY TO AVERT

ATTACKS

I.Diana Judith1, Dr.G.J.Joyce Mary2

1 Research Scholar, Department of CSE,PRIST University,Vallam,Thanjavur

2Research Supervisor, Department of CSE,PRIST University,Vallam,Thanjavur

March 21, 2018

Abstract

Visual Cryptography is a technique for information hid-ing behind media record, for example, text and picture.For improving the security of information stowing away andtransmission over system, the recently proposed frameworkutilizes hereditary calculation in Visual Cryptography. Plaincontent or image is changed over into figure message thenit is covered up by another picture. Hereditary Algorithmis utilized to rearrange pixel area of picture with the goalthat recognition of hidden image wind up by another imageis complex by bot assailant. Visual cryptography is a sortof encryption procedure which isolate picture into differentshares to guarantee enhanced security and unwavering qual-ity. The execution of the proposed framework AdvancedHalftone Secret Sharing Scheme using Visual cryptographywith Steganography (AH-VCST) has been tested by per-forming quality measure parameters like Mean Squared Er-

1

International Journal of Pure and Applied MathematicsVolume 118 No. 24 2018ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/

Page 2: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

ror (MSE) , Normalised Correlation (NC) , Structured Sim-ilarity Index (SSI) and Peak Signal to Noise Ratio (PSNR).The primary point of AH-VCST is to outline the gradedsecure calculation which utilizes both Visual Cryptographyand steganography to guarantee enhanced security and un-wavering quality of the image.

Key Words:Visual Cryptography, Advanced Halftone,Sharing Scheme, Attack, Steganography

1 INTRODUCTION

Concealing data by inserting secured information into a harmlessmedium is frequently alluded to as steganography. Steganographycan be connected electronically by taking a message or image andsome kind of cover (regularly a content or picture document) andjoining both to acquire a ”stego-image”. The Reliable Steganalysisexamination was considered as a standout amongst the most wellknown steganalysis calculation which can possibly distinguish thecovered message by the measurement investigation of pixel esteems[1]. The procedure of Reliable steganalysis utilizes the normal andparticular gatherings as the contemplations with a specific end goalto appraise the relationship of pixels [2]. The nearness of strongrelationship witness in the neighboring pixels.

1.1 Existing Problems

Steganography and visual cryptography has been combined togetherfor security reason however the idea of the decrypt image is poorin the present system [3]. Despite the fact that there are broadinvestigation in consolidating these two methodologies [4], yet theoutcomes are not all that acceptable as for examination. Othertraditional strategies for image security has seen the utilization ofadvanced watermarking broadly [5], which installs image inside an-other picture, and after that utilizing it as a secret picture [6].

1.2 Challenges to Identify Hidden Data

The utilization of steganography along with visual cryptographyis a solid model and adds a lot of difficulties to distinguish such

2

International Journal of Pure and Applied Mathematics Special Issue

Page 3: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

covered up and encoded information. During the initial level, onecould have a secret image with secret information which could bepart up into different encoded shares. At last when such encodedshares were reassembled or decoded to update the authentic im-age it is workable for one to have an uncovered image which yetcomprises of private information. Such sorts of calculations can’tcontinue without having a suitable qualities in the visual cryptogra-phy procedure [7]. The ground for this is, reconstructing strategy oreven the encoding technique changes the information exists in theimage, at that point the framework would appropriately change thescrambled data which makes the framework credible for separatingthe encoded information from the uncovered picture. The steganal-ysis is the procedure to uncover the secret information even certainquestionable area. There are different attacks[QIN 2006] which un-cover the information easily [8].

Different histogram and also piece impact has additionally beenaccounted in the earlier research work[9]. But the image qualityis less after decryption when it is compared to the original imagequality, it appears black. However, certain Reliable steganalysiswork has been accounted for as most concrete and fitting methodto other traditional substitution steganography [10], which utilizescustomary and particular gatherings as the rudimentary parametersto assess the relationship of the pixels. To avert attacks, the effecton the relationship of the pixels will be required need to be adjusted.

2 RELATED WORK

Visual Cryptography (VC) is a special encryption technique to hidethe information in an images. It is decrypted by human vision [11].Survey on various techniques applied in VC which maintains theimage quality and security such as Halftone Cryptography, ImageSharing using Steganography is discussed.

2.1 Traditional VC

Traditional visual cryptography will not send the image with highsecurity. Thus the VCSS comes into existence which is the ap-propriate approach for transferring highly secured information astext or image. Halftone Visual Cryptography (HVC) enlarges the

3

International Journal of Pure and Applied Mathematics Special Issue

Page 4: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

area of visual cryptography by the addition of digital Halftoningtechniques. In particular, in visual secret sharing schemes, a secretimage can be encoded into halftone shares taking meaningful visualinformation. HVC construction methods based on error diffusionhas been newly proposed .

2.2 Halftone VC with Error Diffusion

The secret image is concurrently embedded into binary valued shareswhile these shares are halftoned by error diffusion, which is theworkhorse standard of halftoning algorithms. Error diffusion haslow complexity and provides halftone shares with good image qual-ity. A reconstructed secret image, obtained by stacking qualifiedshares together, does not suffer from cross interference of share im-ages [12]. The main objective of newly proposed system has beenperformed image sharing with which retains quality of the image.The proposed system using by halftone error diffusion and key gen-eration based in Diffie Hellman algorithm.

2.3 Need for Quality Image Confirmation inthe Server

Along with, the validation procedure, the trusted element sendsa demand to every server and the comparing sheets are transmit-ted to it. Sheets are overlaid (i.e. super imposed) to remake theprivate image subsequently maintaining a strategic distance fromany muddled unscrambling and translating calculations that areutilized as a part of visual cryptography, steganography or cryp-tosystem approaches. Once the coordinating score is figured, therecreated image is disposed of. Facilitate, collaboration betweenthe two servers is basic keeping in mind the end goal to recreatethe first biometric image. To protect the privacy and respectabilityof patients proposed a system who had mammography to experi-ence the necessities of genuineness and trustworthiness of medicalimages For preserving the privacy of patients, Timothy et al. rec-ommended a security system, which have been effectively evaluatedthe clinical strategies and went for expressing circumstances of de-mand for patient’s information access as a cause to protection ofthe patient’s security.

4

International Journal of Pure and Applied Mathematics Special Issue

Page 5: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

3 PROPOSED SYSTEM

3.1 Avert Malicious Attack

A botnet is a kind of trap starting late by harmful customers wherenumber of Internet-related PCs communicate with other similarmachines with a true objective to complete miserable tasks andgoals. This can be as ordinary as keeping control of an InternetRelay Chat (IRC) channel, or it could be used to send spam emailor appreciate passed on repudiation of-advantage strikes [13]. Theword botnet is a blend of the words robot and framework. Theterm is ordinarily used with a negative or harmful hint [14].

Fig.1 Malicious user Attack

3.2 AH-VCST

Advanced Halftone secure secret sharing scheme using visual cryp-tography and steganography (AH-VCST) is the newly proposed toavoid bot attacks. In traditional visual cryptography during en-cryption and decryption the quality of the image is not same. Inorder to overcome this problem newly proposed system uses Ad-vanced Halftone images.

5

International Journal of Pure and Applied Mathematics Special Issue

Page 6: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

Fig.2.Working Model OF AH-VCST

6

International Journal of Pure and Applied Mathematics Special Issue

Page 7: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

Fig. 3. Steps involved in AH-VCST Algorithm

In AH-VCST Original AH-image is hidden by the cover imageusing steganalysis and the pixel values will be calculated. Pixelvalues will be rearranged using raster random order scanning Forexample if image dimension is 5 X 5, then its raster order shown inFig.4.The pixel scanning Order shown in Fig 4(a) and Fig 4(b), hasbeen rearranged with different points from the first row left cornerand it proceed. So the raster order starts with different startingpoint.

Fig 4. Pixel Scanning Order1 and Order2

In the proposed system AH-VCST, Pixel arranged randomly whichis shown in the Fig 5. Because of the random arrangement of the

7

International Journal of Pure and Applied Mathematics Special Issue

Page 8: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

pixel, intruders were not able to hack the information. Next to therandom scanning in AH-VCST Stego image is split into two sharesas share1,share 2 and it is transmitted through the network.

Fig 5. Pixel Scanning Order AH-VCST

Fig 6. Pixel Scanning Order AH-VCST

Image share creation process is shown in Fig 7(a) and 7(b). Aftertransmission of the secret image, the inverse process of the rasterrandom scanning gives stego image with hidden image. In order toget the final secret image it needs to undergo inverse steganalysis.

8

International Journal of Pure and Applied Mathematics Special Issue

Page 9: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

Fig 7. Image Share creation Process in AH-VCST

Fig 8. Image reconstruction Process in AH-VCST

In Fig 8(a) shows the inverse raster random rearrangement ofthe shares and Fig.8(b) shows the stego-image with hidden secretimage. Fig 8(c) shows the cover image which removes the originalhidden image by inverse steganalysis and Fig 8(d) shows the securedsecret image.

4 PERFORMANCE ANALYSIS

The performance of the proposed system was experimented by per-forming stegnalysis and conducting benchmarking test for analysingparameters like Mean Square Error (MSE) and Peak Signal to NoiseRatio (PSNR) to find the error produced and the quality of the im-age.

9

International Journal of Pure and Applied Mathematics Special Issue

Page 10: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

Table 1.Comparison of MSE

Fig 9. MSE comparison of MRI Images

Comparison of MSE error rates based on basic VC, HalftoneVC and GA-Random scan is shown in the Fig.9 The error ratescalculated on the basis of dBs.

Table 2.Comparison of PSNR

10

International Journal of Pure and Applied Mathematics Special Issue

Page 11: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

The average PSNR value of the newly proposed system AH-VCST is higher than the existing system is shown in Fig 10. Forexample, PSNR OF AH-VCST is 62.271 which is higher than theBasic VC PSNR is 31.023,

Fig.10 PSNR comparison of MRI Images

PSNR of GA random scan is 50.401 and PSNR of Halftone VC is53.732. Quality of the decrypted image is same as the quality ofthe encrypted image because of the advanced halftone image withhigh PSNR and low MSE.

Table 3. Comparative results of Share Creation

11

International Journal of Pure and Applied Mathematics Special Issue

Page 12: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

Fig.11 Comparative results of Share Creation

Steganalysis with Random Scanning for AH-image with 256x256pixel average time for share creation has been given as 0.195 Sec-onds and it was shown in the Fig 11.

Table 4. Comparative Results of Share Reconstruction

12

International Journal of Pure and Applied Mathematics Special Issue

Page 13: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

AH-VCST share reconstruction based on steganalysis and randomscanning compared with Basic VC, Genetic Algorithm in RandomScanning and Halftone VC and the average time for share creationfor 256*256 pixel images has been given as 1.012 Seconds and itwas shown in the Fig 12.

Fig.12 Comparative results of Reconstruction

5 Conclusion

The experimental results show that the proposed method AH-VCSTVisual cryptography with steganography along with Raster randomscanning is highly secure to transmit the secret data. From the re-sults, it clearly shows that the confidential medical images, can beeasily transmitted with high security. The quality of the image ishigh when compared to other techniques. In the future work error

13

International Journal of Pure and Applied Mathematics Special Issue

Page 14: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

rates can be reduced more with error diffusion technique applied toAH-VCST.

References

[1] Fridrich, J., Goljan, M. and Du,R, Reliable Detection of LSBSteganography in Colour and Grayscale Images, Proceedingsof ACM Workshop on Multimedia and Security, Ottawa,pp.27-30, October 5, 2001

[2] Sathiamoorthy Manoharan, an empirical analysis of rs ste-ganalysis, proceedings of the third international conference oninternet monitoring and protection, IEEE computer societyWashington, 2008.

[3] Singh, K.M.; Nandi, S.; Birendra Singh, S.; ShyamSundarSingh, L.; , Stealth steganography in visual cryptography forhalf tone images, Computer and Communication Engineering,International Conference, 2008.

[4] Jithesh K , Dr. A V Senthil Kumar , Multi Layer InformationHiding - A Blend Of Steganography And Visual Cryptography,Journal of Theoritical and Applied Information Technology,2010.

[5] Hsien-Chu Wu; Chwei-Shyong Tsai; Shu-Chuan Huang;, Col-ored digital watermarking technology based on visual cryptog-raphy, Nonlinear Signal and Image Processing, IEEE-Eurasip,2005.

[6] R. Chandramouli, Nasir Menon, Analysis of LSB Based ImageSteganography techniques, IEEE Xplore Digital Library-2001.

[7] Atesh, K., T. Jayakar, Charles Tobin, K. Madhavi, and K.Murali. ”Chaos based spread spectrum image steganography”,IEEE transactions on consumer Electronics 50, 587-590, no. 2,1996

[8] Arezoo Yadollahpour, Hossein Miar Naimi, Attack on LSBSteganography in Colour and Grayscale Images Using Au-tocorrelation Coefficients, European Journal of Scientific Re-search ISSN 1450- 216X Vol.31 No.2, 2009.

14

International Journal of Pure and Applied Mathematics Special Issue

Page 15: ADVANCED HALFTONE SECRET SHARING SCHEME: USING …is complex by bot assailant. Visual cryptography is a sort of encryption procedure which isolate picture into di erent shares to guarantee

[9] J. Fridrich, M. Goljan, and D. Hogea. Steganalysis of jpeg im-ages: Breaking the F5 algorithm. In Proc. of the ACM Work-shop on Multimedia and Security, 2002.

[10] Fridrich, J., Goljan, M. and Du,R, Reliable Detection of LSBSteganography in Colour and Grayscale Images, Proceedingsof ACM Workshop on Multimedia and Security, Ottawa,pp.27-30, October 5, 2001.

[11] Naor and A. Shamir, Visual cryptography, in EUROCRYPT,pp.112, 1994.

[12] Zhou, Gaochao, Robert Myers, Ying Li, Yuli Chen, XiaolanShen, Judy Fenyk-Melody, Margaret Wu et al. ”Role of AMP-activated protein kinase in mechanism of metform in action.”The Journal of clinical investigation 108, no. 8, pp.1167-1174,2001.

[13] Melinda, Reed, John F. Miller, and Paul Popick. ”Supplychain attack patterns: Framework and Catalog.” Office of theDeputy Assistant Secretary of Defense for Systems Engineering, 2014.

[14] Wen Chen Shi, Yun Q., and Chunhua Chen,. ”A Markov pro-cess based approach to effective attacking JPEG steganogra-phy.” In International Workshop on Information Hiding, PP.249-264. Springer Berlin Heidelberg, 2001.

15

International Journal of Pure and Applied Mathematics Special Issue