Sie sind auf Seite 1von 4

2017 9th International Conference on Computational Intelligence and Communication Networks

Optical Stegnography to Enhance Speed of Analog Transmission with Security


Enhancement through Image Encryption

Amanpreet Kaur, Gaurav Soni


Dept. of Electronics and Communication Engineering, Amritsar College of Engineering and Technology
Amritsar, Punjab, India
e-mail: amanpreetahuja1800@gmail.com

Abstract - Data transmission is the way through which data is


sent from source to destination over a physical medium. In
networking we use coaxial cable, twisted pair wires for transfer
of data from source to destination. These medium of data
transfer are slower in nature and data which is transferred may
leak or lost during transmission and also there no security of
data. To overcome these problems during transmission we use
fibre optics. In fibre optics the data is transferred in the form of
light beams so there it is less prone to leakage of data. It also uses
some security mechanisms for secure transmission of data. The
data which are transferred firstly encrypt and after that
transferred to the destination in the form of light beams. In our
proposed system we introduced encryption in fibre optics using
image. Also various encryption algorithms have been proposed
to make optical medium data secure, vulnerable and give
concern to the security issues, challenges and also comparisons
have been made between AES, DES and RSA algorithms to find
the best one security algorithm, which has to be used in Optical
medium for making Optical medium data secure and not to be Fig.1. Showing transmission signals
hacked by attackers.
Keywords: Data transmission, Encryption, AES, DES, RSA 1.2 FIBRE OPTICS
algorithms A fibre optic cable consists of cable which uses optic
I. INTRODUCTION fibres which use light to carry data. Optical fibre transfers the
data at the speed of light in a glass. The infrared light which
1.1 DATA TRANSMISSION is used for transfer of data cannot be seen so there are less
In data transmission the physical transfer of data from source safety hazards. So there is not any magnetic field around the
to destination using physical medium is to be done. Physical optical fibres which makes it impossible for leakage of data.
medium used for data transfer is coaxial cable, twisted pair, Thus these are the most secure medium that are available for
optic fibre etc. [1]-[4] The data can be sending using carrying data that are more sensitive.
electromagnetic signal such as radio waves, microwave or The transmission process through optical fibre is with the
infrared signal. help of light. Light signals travel exceedingly fast. The data
leakage is inherent in the current media. The optical fibre
prevents such leakage and hence eliminates the loss of energy
and enhances performance.
1.3 Use of Image in encryption
The encryption process is enhanced by the use of image. The
image is a collection of pixels. The pixels represent data in
encryption. The image is transmitted from source to
destination. The receiver at the other end utilizes decryption
mechanism to extract the information. The information in
such a case does not require public key. Hence the
information is much more secure. The proposed work deals
with optical stegnography by the use of optical fibre and
enhances the security process by the use of delayed LSB
stegnography with image.

978-1-5090-5001-7/17/$31.00 ©2017 IEEE 165


DOI 10.1109/CICN.2017.37
II. RELATED WORK
The work has been done toward the encryption and
decryption along with transmission process. The papers has
been analysed and result has been extracted. [5] The
encryption process in the technology is the wide area where
it is required. The cloud computing is one form of technology
in which large number of users are involved. The users are of
varying intensions so guard against such users is ensured
through the security mechanism within the cloud. [6] With
the enhancement in technology users are forced to outsource
the data toward the distant servers. This gives the chance to
malicious users to attack on the data as and when required. In
order to ensure the security the process of encryption and
decryption process is suggested.[7] Current Application Fig.2. showing the proposed model
Partitioning Algorithms (APAs) adopt different models such Another slandered which is commonly used in optical
as Graph-based model, Linear Programming (LP) model and medium security is Data Encryption slandered. This is a
hybrid model (combination of graph and LP model). Some symmetric method of encryption. DES was created in order
algorithms are restricted to single programming language to avoid brute force attacks within the system. The public key
whereas others use multi-programming language support. method is used in order to ensure the prevention of malicious
Current APAs focus on separating the intensive components attacks within the optical medium. Through the DES optical
of the application while profiling the availability of resources medium control matrix is used. The public keys are shared
on local mobile device and do not consider the availability of among source and destination. The size and compliance
services on the computational clouds. [8] The computational related information is contained within the optical medium
offloading techniques do not incorporate fault tolerance control matrix.
techniques to cope up with partition loss. In the existing The optical medium control matrix contains logical values.
systems more work on parameters like turnaround time, The values can be true or false. The most of the values should
required bandwidth is need to be done. There are following be true in order for the packet to be accepted. The packets
problems which are associated with the existing system. which are accepted are said to be compliance. The DES will
be used by dividing the data part into subsections each
1) The problem of required network subsection will be checked separately. The code block is
bandwidth in terms of twisted pair and coaxial cable. generally divided into block of 32 bits each. The keys in this
2) The cost of data transfer is high. case are known as sub-keys.
3) The mechanisms which are given do not employ any The algorithm of the proposed system is listed as follows
technique for optimum encryption strategies. Algorithm OptSteg
4) The problem of more energy consumption is there.

III. PROPOSED SYSTEM a) Receive the message(M)


b) Select the Image(I)
The proposed system utilizes the optical medium in order to c) Encode Image along with the
transfer the data toward the destination. The optical medium
Message(IM)
enhances speed hence the overall performance of the system
is enhanced. The transmission process utilizes digital signals. d) Transfer the data toward the destination
The propagation delay is introduced within the data being e) //At the destination end
transmitted. This delay will complement data hence f) Receive the image
encryption is introduced. The overall process is known as g) Convert the image into message
stegnography. The proposed model is as given in Figure 2 [9]-
h) Receive the message
[12]. The receiver will get the decoded information. The
decoded information will be received by the receiver in the
user understandable form. The information in the optical
medium will remains in the encoded form where the
malicious attacker may distort the data. The concept of parity
bits are also used in this case which will detect the disturbance IV. RESULTS
in the bit formation. The obtained result from the simulation is considered. The
results are better in terms of speed and encryption. The
simulation is conducted in MATLAB. The MATLAB model
is prepared and then delayed propagation is introduced in it.

166
TABLE NO. 1: THE KEY SIZE AND PACKET SIZE IN
PROPOSED SYSTEM
Simulation Key Packet Size(Kb) with
Size image

SIM 1 5 14

SIM 2 8 18

SIM 3 6 12

SIM 4 7 11

SIM 5 9 14

SIM 6 4 18

SIM 7 8 16
Fig.4. Beginning Screen of Simulation
SIM 8 5 12 The user can select the image for encryption as shown by
clicking on the browse button
SIM 9 8 15

SIM 10 11 17

The result in terms of the simulation graph is as shown below


in Figure 3.

Fig.1. Selecting Image for encryption


The image at other end can also be selected for stegnography
which is used for decryption in this case

Fig.3. shows the graph of proposed system


The simulation when executed the following screen
is displayed.

167
Encryption algorithms play an important role in data security
on Optical medium and by comparison of different
parameters used in algorithms, it has been found that AES
algorithm uses least time to execute Optical medium data.
Blowfish algorithm has least memory requirement. DES
algorithm consumes least encryption time. RSA consumes
longest memory size and encryption time. The future scope
of this work is to find out an efficient algorithm to make the
data secure by combining homomorphic encryption and MD5
algorithm and use some compression algorithm to protect the
data. In the future we will work on improvement of optical
stegnography to be utilized along with Optical medium.
REFERENCES
1. Kai He, Chuanhe Huang, Hao Zhou, Jiaoli Shi, Xiaomao Wang, Feng
Dan, "Public auditing for encrypted data with client-side
deduplication in cloud storage, " Wuhan University Journal of Natural
Sciences, Volume 20, Issue 4, pp 291– 298,August 2015.
2. Fips N. Announcing the ADVANCED ENCRYPTION STANDARD
Fig.6. After Data Hiding Process (AES ). Byte. 2001; 2009(12):8–12.
3. Ninni Singh, Nitin Kumar Singh, "Information Security in Cloud
The proposed model in terms of simulation is created within
Computing using Encryption Techniques , " International Journal of
model factory in MATLAB Scientific & Engineering Research, Volume 5, Issue 4, ISSN 2229-
5518, April-2014.
4. Maha TEBAA, Said EL HAJII, "Secure Cloud Computing Through
Homomorphic Encryption, " International Journal of Advancements
in Computing Technology (IJACT), Volume5, Number16, December
2013.
5. Wang C, Wang Q, Ren K, "Towards Secure and Effective Utilization
over Encrypted Cloud Data, 31st International Conference on
Distributed Computing Systems Workshops IEEE, ISSN 15450678,
pp. 282–286, 2011.
6. Cao N, Wang C, Li M, Ren K, Lou W, "Privacy Preserving Multi-
Keyword Ranked Search over Encrypted Cloud Data, IEEE Trans
Parallel Distributed Systems, Vol. 25, No. 1, pp. 222-233, January
2014.
7. Xu Chen, “Decentralized Computation Offloading Game for Mobile
Optical medium,” IEEE Transactions on Parallel and Distributed
Systems 26(4):974–983, March 26, 2015.
8. Steve Hanna, Juniper Networks, " Cloud Computing: Finding the
Silver Lining, 2009.
9. GL Prakash, Manish Prateek , Inder Singh, "Data encryption and
decryption algorithms using key rotations for data security in cloud
system, International Conference on Signal Propagation and
Fig.7. Proposed Model Computer Technology (ICSPCT 2014) 3(4):624–629, 2014.
10. Xia Z, Wang X, Sun X, Wang Q, "A Secure and Dynamic Multi-
V. CONCLUSION Keyword Ranked Search Scheme over Encrypted Cloud Data, IEEE
Trans Parallel Distrib Syst, 27(2):340–52, Feb 2016.
The dissolution of security concerns within the Optical 11. Cloud security alliance. Category 8// Encryption. 2012; (September):
medium is reviewed in this paper. The security mechanisms 1–28.
which are discussed in this paper are efficient. The 12. Jie Xu, Qiaoyan Wen, Wenmin Li and Zhengping Jin, “Circuit
collaboration of Optical medium with optical stegnography is Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable
Delegation in Optical medium,” IEEE Transactions on Parallel and
also studied. In other words, this three way protocol is Distributed Systems 27(1):119–129, 2016.
considered to be best one analyzed different methods for data 13. S.S. Bedi, ShekharVerma & G.S. Tomar, “An Adaptive Data Hiding
security in Optical medium. Various encryption algorithms Technique for Digital Image Authentication”, International Journal of
have been proposed to make Optical medium data secure, Computer Theory and Engineering, Vol. 2, No. 3, pp 338-344, June,
vulnerable and gave concern to security issues, challenges 2010.
and also comparisons have been made between AES, DES
and RSA algorithms to find the best one security algorithm,
which has to be used in Optical medium for making Optical
medium data secure and not to be hacked by attackers.

168

Das könnte Ihnen auch gefallen