DCS Research Paper
DCS Research Paper
DCS Research Paper
STEGANOGRAPHY
Cryptography stage:
In modern cryptography, a hybrid algorithm refers to a combination of symmetric
(AES) and asymmetric (RAS) encryption algorithms used together to provide
secure and efficient communication.
• Advanced Encryption Standard (AES):
AES is a symmetric encryption algorithm widely used for secure data
transmission and storage. It is a symmetric key algorithm, meaning the same key
is used for both encryption and decryption processes.
• Rivest-Shamir-Adleman (RSA):
The RSA algorithm is an asymmetric encryption algorithm widely used for secure
data transmission, digital signatures, and key exchange.
Steganography stage:
Steganography is the practice of concealing secret information or messages
within other non-secret data in a way that avoids detection by unintended
recipients. It is a technique used to hide the existence of communication or the
content of a message, as opposed to cryptography, which focuses on making the
content unintelligible.
Image Steganography:
The practice of Image Steganography involves concealing information
inside an image. This information can take various forms, such as an image, audio
file, text document, or any other type of file. The process involves enveloping the
data within an image. We have opted to utilize this method to bind the data to an
image. By embedding audio within an image, we can establish the sender's
authenticity, confirm whether the intended recipient is the one receiving the data,
and determine whether there is a third-party attacker present in the
communication channel.
Receiver side:
Receiver side consists of steganography and cryptography stages.We will
first remove any embedded data on the receiver side before decrypting it.
Steganography:
In the receiver side, we start with steganography then cryptography. We
will use the same steps which are used in sender side
Cryptography Stage:
In cryptography stage, we use the data which is extracted from stego file
and use RSA and AES. We will use the same steps which are used in sender
side. The Decryption can be done using the Encrypted message, receivers
private key and sender’s public key.
Algorithm:
Inputs: Image, Message, Key.
1) Initially Sender consider a Cover Image
2) Get the input from the user
3) Encode the input through HMAC and BASE-64
4) Encrypt the message through Cryptography technique
5) Hide the Encrypted message in the image.
6) Hiding can be done using a secret key for confidentiality.
7) After Hiding the Image is considered as a Stego-Image.
8) The Receiver will receive the Stego-Image
9) Using the Secret Key the receiver can view the data hidden in the image
Encryption side:
Step 1: Give the input data
Step 2: The given input data goes through a hash function and a secret key
under a HMAC system. This output is given as input to the next step.
Step 3: Convert this input to Base-64 using Base-64 conversion Algorithm.
Step 4: After converting into Base-64 we will be getting a String.
Step 5: Store the entire string in a Text File and save the file.
Step 6: From that file we consider each character separately and apply AES
algorithm on them.
Step 7: After applying the AES algorithm the secret key is generated again
which is symmetrical and private. This key is given as the input to the next step
where we apply RSA
Step 8: The output of the last step is taken and RSA is applied on it to produce a
public key for transmitting.
Step 9: By Using RSA we will be getting Cipher Text .
Step 10: Let the Cipher Text be encrypted message.
Step 11: Consider an image, And hide the encrypted message in the given
image with the secret key Using Steganography Algorithm.
Step 12: Now send the Stego-Image to the Receiver.
Decryption side:
Proposed system:
Home page:
Results of encryption:
3) Here we can see the result of out encryption system and respective cipher text is produced.
These are the results of our original image along with the stego image output
Decryption page:
4) Here we take the public key generated and paste in decryptor part to get the
input message
5) This is the decrypted output as you can see we got our input message back
Comparison with the earlier works:
Comparing the AES system to the system with HMAC, BASE64, AES, and
RSA together
Lack of Data Integrity and Authenticity: AES alone provides encryption and
decryption capabilities but does not inherently provide data integrity and
authenticity. Without additional mechanisms like HMAC, there is no built-in
protection against data tampering or ensuring the data's origin.
Key Management: AES is a symmetric encryption algorithm, which means the
same key is used for both encryption and decryption.
Lack of Secure Key Exchange: AES alone does not provide a mechanism for
secure key exchange between communicating parties. In a system that combines
RSA, AES, and other components, RSA can be used for secure key exchange,
ensuring that the shared symmetric AES key remains confidential during
transmission.
Limited Protection Against Data Tampering: AES alone does not provide built-
in mechanisms for verifying the integrity of the encrypted data. By
incorporating HMAC, the combined system can ensure data integrity by
providing a cryptographic checksum for the encrypted data, enabling detection
of any unauthorized modifications.
Comparing the RSA system to the system with HMAC, BASE64, AES, and
RSA together
Lack of Perfect Forward Secrecy: RSA does not provide perfect forward
secrecy. If an attacker compromises the private key, they can decrypt any
previously intercepted encrypted messages. This is in contrast to symmetric
encryption algorithms like AES, where compromise of a specific encryption key
does not impact the security of previous or future messages.
Limited Encryption Length: RSA encryption has a limitation on the length of
data that can be encrypted directly with the public key. The maximum length of
the plaintext that can be encrypted using RSA is dependent on the key size. To
encrypt larger data sets, a hybrid encryption scheme is often employed where a
symmetric encryption algorithm like AES is used to encrypt the data, and the
AES key is encrypted using RSA.
Interoperability Challenges: RSA is widely supported, but there can still be
interoperability challenges when different systems and platforms need to
communicate. The integration of BASE64 encoding in the combined system
may be required to ensure compatibility with systems that only support ASCII
characters. However, BASE64 encoding increases data size, which can impact
storage and bandwidth requirements.
When comparing the BASE 64 and HMAC to the system with HMAC,
BASE64, AES, and RSA together, the AES system has the following
potential drawbacks
Compatibility and Interoperability: While HMAC is a widely used mechanism
for data integrity, not all systems or protocols may natively support HMAC.
Integration with existing systems or compatibility with certain platforms may
require additional efforts to support HMAC-based integrity checks.
Key Management: HMAC requires a shared secret key between the sender and
receiver to calculate and verify the HMAC. Managing and securely distributing
these keys can be challenging, especially in large-scale systems or scenarios
with frequent key rotation. Proper key management practices, including key
generation, storage, and distribution, are crucial to maintain the security of the
HMAC component.