December 2015

Page 1

ISSN (ONLINE) : 2045 -8711 ISSN (PRINT) : 2045 -869X

ISSN (ONLINE) : 2045 -8711 ISSN (PRINT) : 2045 -869X

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING

DECEMBER 2015 VOL- 5 NO - 12

NOVEMBER 2015 VOL- 5 NO - 11

@IJITCE Publication @IJITCE Publication


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

UK: Managing Editor International Journal of Innovative Technology and Creative Engineering 1a park lane, Cranford London TW59WA UK E-Mail: editor@ijitce.co.uk Phone: +44-773-043-0249 USA: Editor International Journal of Innovative Technology and Creative Engineering Dr. Arumugam Department of Chemistry University of Georgia GA-30602, USA. Phone: 001-706-206-0812 Fax:001-706-542-2626 India: Editor International Journal of Innovative Technology & Creative Engineering Dr. Arthanariee. A. M Finance Tracking Center India 66/2 East mada st, Thiruvanmiyur, Chennai -600041 Mobile: 91-7598208700

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

www.ijitce.co.uk

IJITCE PUBLICATION

INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY & CREATIVE ENGINEERING Vol.5 No.12 December 2015

www.ijitce.co.uk

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

From Editor's Desk Dear Researcher, Greetings! Research article in this issue discusses about motivational factor analysis. Let us review research around the world this month. New Technique for Developing Nano devices at One-Hundredth the Current Cost Researchers from MIT have developed new techniques for building microelectromechanical systems at one-hundredth of the current cost. Microelectromechanical systems were a $12 billion business in 2014. But that market is dominated by just a handful of devices, such as the accelerometers that reorient the screens of most smart phones. That’s because manufacturing MEMS has traditionally required sophisticated semiconductor fabrication facilities, which cost tens of millions of dollars to build. Potentially useful MEMS have languished in development because they don’t have markets large enough to justify the initial capital investment in production. Steganography is the practice of concealing a file, message, image or video within another file, message. The word steganography combines Greek words steganos meaning covered, concealed or protected meaning writing. Generally, the hidden messages appear to images, articles, shopping lists or some other cover text. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas keydependent steganographic schemes. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. It has been an absolute pleasure to present you articles that you wish to read. We look forward to many more new technologies related research articles from you and your friends. We are anxiously awaiting the rich and thorough research papers that have been prepared by our authors for the next issue. Thanks, Editorial Team IJITCE

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

Editorial Members Dr. Chee Kyun Ng Ph.D Department of Computer and Communication Systems, Faculty of Engineering,Universiti Putra Malaysia,UPMSerdang, 43400 Selangor,Malaysia. Dr. Simon SEE Ph.D Chief Technologist and Technical Director at Oracle Corporation, Associate Professor (Adjunct) at Nanyang Technological University Professor (Adjunct) at ShangaiJiaotong University, 27 West Coast Rise #08-12,Singapore 127470 Dr. sc.agr. Horst Juergen SCHWARTZ Ph.D, Humboldt-University of Berlin,Faculty of Agriculture and Horticulture,Asternplatz 2a, D-12203 Berlin,Germany Dr. Marco L. BianchiniPh.D Italian National Research Council; IBAF-CNR,Via Salaria km 29.300, 00015 MonterotondoScalo (RM),Italy Dr. NijadKabbaraPh.D Marine Research Centre / Remote Sensing Centre/ National Council for Scientific Research, P. O. Box: 189 Jounieh,Lebanon Dr. Aaron Solomon Ph.D Department of Computer Science, National Chi Nan University,No. 303, University Road,Puli Town, Nantou County 54561,Taiwan Dr. Arthanariee. A. M M.Sc.,M.Phil.,M.S.,Ph.D Director - Bharathidasan School of Computer Applications, Ellispettai, Erode, Tamil Nadu,India Dr. Takaharu KAMEOKA, Ph.D Professor, Laboratory of Food, Environmental & Cultural Informatics Division of Sustainable Resource Sciences, Graduate School of Bioresources,Mie University, 1577 Kurimamachiya-cho, Tsu, Mie, 514-8507, Japan Dr. M. Sivakumar M.C.A.,ITIL.,PRINCE2.,ISTQB.,OCP.,ICP. Ph.D. Project Manager - Software,Applied Materials,1a park lane,cranford,UK Dr. Bulent AcmaPh.D Anadolu University, Department of Economics,Unit of Southeastern Anatolia Project(GAP),26470 Eskisehir,TURKEY Dr. SelvanathanArumugamPh.D Research Scientist, Department of Chemistry, University of Georgia, GA-30602,USA.

Review Board Members Dr. Paul Koltun Senior Research ScientistLCA and Industrial Ecology Group,Metallic& Ceramic Materials,CSIRO Process Science & Engineering Private Bag 33, Clayton South MDC 3169,Gate 5 Normanby Rd., Clayton Vic. 3168, Australia Dr. Zhiming Yang MD., Ph. D. Department of Radiation Oncology and Molecular Radiation Science,1550 Orleans Street Rm 441, Baltimore MD, 21231,USA Dr. Jifeng Wang Department of Mechanical Science and Engineering, University of Illinois at Urbana-Champaign Urbana, Illinois, 61801, USA Dr. Giuseppe Baldacchini ENEA - Frascati Research Center, Via Enrico Fermi 45 - P.O. Box 65,00044 Frascati, Roma, ITALY. Dr. MutamedTurkiNayefKhatib Assistant Professor of Telecommunication Engineering,Head of Telecommunication Engineering Department,Palestine Technical University (Kadoorie), TulKarm, PALESTINE.

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015 Dr.P.UmaMaheswari Prof &Head,Depaartment of CSE/IT, INFO Institute of Engineering,Coimbatore. Dr. T. Christopher, Ph.D., Assistant Professor &Head,Department of Computer Science,Government Arts College(Autonomous),Udumalpet, India. Dr. T. DEVI Ph.D. Engg. (Warwick, UK), Head,Department of Computer Applications,Bharathiar University,Coimbatore-641 046, India. Dr. Renato J. orsato Professor at FGV-EAESP,Getulio Vargas Foundation,São Paulo Business School,RuaItapeva, 474 (8° andar),01332-000, São Paulo (SP), Brazil Visiting Scholar at INSEAD,INSEAD Social Innovation Centre,Boulevard de Constance,77305 Fontainebleau - France Y. BenalYurtlu Assist. Prof. OndokuzMayis University Dr.Sumeer Gul Assistant Professor,Department of Library and Information Science,University of Kashmir,India Dr. ChutimaBoonthum-Denecke, Ph.D Department of Computer Science,Science& Technology Bldg., Rm 120,Hampton University,Hampton, VA 23688 Dr. Renato J. Orsato Professor at FGV-EAESP,Getulio Vargas Foundation,São Paulo Business SchoolRuaItapeva, 474 (8° andar),01332-000, São Paulo (SP), Brazil Dr. Lucy M. Brown, Ph.D. Texas State University,601 University Drive,School of Journalism and Mass Communication,OM330B,San Marcos, TX 78666 JavadRobati Crop Production Departement,University of Maragheh,Golshahr,Maragheh,Iran VineshSukumar (PhD, MBA) Product Engineering Segment Manager, Imaging Products, Aptina Imaging Inc. Dr. Binod Kumar PhD(CS), M.Phil.(CS), MIAENG,MIEEE HOD & Associate Professor, IT Dept, Medi-Caps Inst. of Science & Tech.(MIST),Indore, India Dr. S. B. Warkad Associate Professor, Department of Electrical Engineering, Priyadarshini College of Engineering, Nagpur, India Dr. doc. Ing. RostislavChoteborský, Ph.D. Katedramateriálu a strojírenskétechnologieTechnickáfakulta,Ceskázemedelskáuniverzita v Praze,Kamýcká 129, Praha 6, 165 21 Dr. Paul Koltun Senior Research ScientistLCA and Industrial Ecology Group,Metallic& Ceramic Materials,CSIRO Process Science & Engineering Private Bag 33, Clayton South MDC 3169,Gate 5 Normanby Rd., Clayton Vic. 3168 DR.ChutimaBoonthum-Denecke, Ph.D Department of Computer Science,Science& Technology Bldg.,HamptonUniversity,Hampton, VA 23688 Mr. Abhishek Taneja B.sc(Electronics),M.B.E,M.C.A.,M.Phil., Assistant Professor in the Department of Computer Science & Applications, at Dronacharya Institute of Management and Technology, Kurukshetra. (India). Dr. Ing. RostislavChotěborský,ph.d, Katedramateriálu a strojírenskétechnologie, Technickáfakulta,Českázemědělskáuniverzita v Praze,Kamýcká 129, Praha 6, 165 21

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015 Dr. AmalaVijayaSelvi Rajan, B.sc,Ph.d, Faculty – Information Technology Dubai Women’s College – Higher Colleges of Technology,P.O. Box – 16062, Dubai, UAE Naik Nitin AshokraoB.sc,M.Sc Lecturer in YeshwantMahavidyalayaNanded University Dr.A.Kathirvell, B.E, M.E, Ph.D,MISTE, MIACSIT, MENGG Professor - Department of Computer Science and Engineering,Tagore Engineering College, Chennai Dr. H. S. Fadewar B.sc,M.sc,M.Phil.,ph.d,PGDBM,B.Ed. Associate Professor - Sinhgad Institute of Management & Computer Application, Mumbai-BangloreWesternly Express Way Narhe, Pune - 41 Dr. David Batten Leader, Algal Pre-Feasibility Study,Transport Technologies and Sustainable Fuels,CSIRO Energy Transformed Flagship Private Bag 1,Aspendale, Vic. 3195,AUSTRALIA Dr R C Panda (MTech& PhD(IITM);Ex-Faculty (Curtin Univ Tech, Perth, Australia))Scientist CLRI (CSIR), Adyar, Chennai - 600 020,India Miss Jing He PH.D. Candidate of Georgia State University,1450 Willow Lake Dr. NE,Atlanta, GA, 30329 Jeremiah Neubert Assistant Professor,MechanicalEngineering,University of North Dakota Hui Shen Mechanical Engineering Dept,Ohio Northern Univ. Dr. Xiangfa Wu, Ph.D. Assistant Professor / Mechanical Engineering,NORTH DAKOTA STATE UNIVERSITY SeraphinChallyAbou Professor,Mechanical& Industrial Engineering Depart,MEHS Program, 235 Voss-Kovach Hall,1305 OrdeanCourt,Duluth, Minnesota 55812-3042 Dr. Qiang Cheng, Ph.D. Assistant Professor,Computer Science Department Southern Illinois University CarbondaleFaner Hall, Room 2140-Mail Code 45111000 Faner Drive, Carbondale, IL 62901 Dr. Carlos Barrios, PhD Assistant Professor of Architecture,School of Architecture and Planning,The Catholic University of America Y. BenalYurtlu Assist. Prof. OndokuzMayis University Dr. Lucy M. Brown, Ph.D. Texas State University,601 University Drive,School of Journalism and Mass Communication,OM330B,San Marcos, TX 78666 Dr. Paul Koltun Senior Research ScientistLCA and Industrial Ecology Group,Metallic& Ceramic Materials CSIRO Process Science & Engineering Dr.Sumeer Gul Assistant Professor,Department of Library and Information Science,University of Kashmir,India Dr. ChutimaBoonthum-Denecke, Ph.D Department of Computer Science,Science& Technology Bldg., Rm 120,Hampton University,Hampton, VA 23688

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015 Dr. Renato J. Orsato Professor at FGV-EAESP,Getulio Vargas Foundation,S찾o Paulo Business School,RuaItapeva, 474 (8째 andar)01332-000, S찾o Paulo (SP), Brazil Dr. Wael M. G. Ibrahim Department Head-Electronics Engineering Technology Dept.School of Engineering Technology ECPI College of Technology 5501 Greenwich Road Suite 100,Virginia Beach, VA 23462 Dr. Messaoud Jake Bahoura Associate Professor-Engineering Department and Center for Materials Research Norfolk State University,700 Park avenue,Norfolk, VA 23504 Dr. V. P. Eswaramurthy M.C.A., M.Phil., Ph.D., Assistant Professor of Computer Science, Government Arts College(Autonomous), Salem-636 007, India. Dr. P. Kamakkannan,M.C.A., Ph.D ., Assistant Professor of Computer Science, Government Arts College(Autonomous), Salem-636 007, India. Dr. V. Karthikeyani Ph.D., Assistant Professor of Computer Science, Government Arts College(Autonomous), Salem-636 008, India. Dr. K. Thangadurai Ph.D., Assistant Professor, Department of Computer Science, Government Arts College ( Autonomous ), Karur - 639 005,India. Dr. N. Maheswari Ph.D., Assistant Professor, Department of MCA, Faculty of Engineering and Technology, SRM University, Kattangulathur, Kanchipiram Dt - 603 203, India. Mr. Md. Musfique Anwar B.Sc(Engg.) Lecturer, Computer Science & Engineering Department, Jahangirnagar University, Savar, Dhaka, Bangladesh. Mrs. Smitha Ramachandran M.Sc(CS)., SAP Analyst, Akzonobel, Slough, United Kingdom. Dr. V. Vallimayil Ph.D., Director, Department of MCA, Vivekanandha Business School For Women, Elayampalayam, Tiruchengode - 637 205, India. Mr. M. Moorthi M.C.A., M.Phil., Assistant Professor, Department of computer Applications, Kongu Arts and Science College, India PremaSelvarajBsc,M.C.A,M.Phil Assistant Professor,Department of Computer Science,KSR College of Arts and Science, Tiruchengode Mr. G. Rajendran M.C.A., M.Phil., N.E.T., PGDBM., PGDBF., Assistant Professor, Department of Computer Science, Government Arts College, Salem, India. Dr. Pradeep H Pendse B.E.,M.M.S.,Ph.d Dean - IT,Welingkar Institute of Management Development and Research, Mumbai, India Muhammad Javed Centre for Next Generation Localisation, School of Computing, Dublin City University, Dublin 9, Ireland Dr. G. GOBI Assistant Professor-Department of Physics,Government Arts College,Salem - 636 007 Dr.S.Senthilkumar Post Doctoral Research Fellow, (Mathematics and Computer Science & Applications),UniversitiSainsMalaysia,School of Mathematical Sciences, Pulau Pinang-11800,[PENANG],MALAYSIA. Manoj Sharma Associate Professor Deptt. of ECE, PrannathParnami Institute of Management & Technology, Hissar, Haryana, India RAMKUMAR JAGANATHAN Asst-Professor,Dept of Computer Science, V.L.B Janakiammal college of Arts & Science, Coimbatore,Tamilnadu, India

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015 Dr. S. B. Warkad Assoc. Professor, Priyadarshini College of Engineering, Nagpur, Maharashtra State, India Dr. Saurabh Pal Associate Professor, UNS Institute of Engg. & Tech., VBS Purvanchal University, Jaunpur, India Manimala Assistant Professor, Department of Applied Electronics and Instrumentation, St Joseph’s College of Engineering & Technology, Choondacherry Post, Kottayam Dt. Kerala -686579 Dr. Qazi S. M. Zia-ul-Haque Control Engineer Synchrotron-light for Experimental Sciences and Applications in the Middle East (SESAME),P. O. Box 7, Allan 19252, Jordan Dr. A. Subramani, M.C.A.,M.Phil.,Ph.D. Professor,Department of Computer Applications, K.S.R. College of Engineering, Tiruchengode - 637215 Dr. SeraphinChallyAbou Professor, Mechanical & Industrial Engineering Depart. MEHS Program, 235 Voss-Kovach Hall, 1305 Ordean Court Duluth, Minnesota 55812-3042 Dr. K. Kousalya Professor, Department of CSE,Kongu Engineering College,Perundurai-638 052 Dr. (Mrs.) R. Uma Rani Asso.Prof., Department of Computer Science, Sri Sarada College For Women, Salem-16, Tamil Nadu, India. MOHAMMAD YAZDANI-ASRAMI Electrical and Computer Engineering Department, Babol"Noshirvani" University of Technology, Iran. Dr. Kulasekharan, N, Ph.D Technical Lead - CFD,GE Appliances and Lighting, GE India,John F Welch Technology Center,Plot # 122, EPIP, Phase 2,Whitefield Road,Bangalore – 560066, India. Dr. Manjeet Bansal Dean (Post Graduate),Department of Civil Engineering,Punjab Technical University,GianiZail Singh Campus,Bathinda -151001 (Punjab),INDIA Dr. Oliver Jukić Vice Dean for education,Virovitica College,MatijeGupca 78,33000 Virovitica, Croatia Dr. Lori A. Wolff, Ph.D., J.D. Professor of Leadership and Counselor Education,The University of Mississippi,Department of Leadership and Counselor Education, 139 Guyton University, MS 38677

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

Contents Enhancing the data security and data integrity in steganographed images by store bit randomization Dr.S.Prasath & Jagan Raj J ……………….……………………………….…………………………………….[317]

www.ijitce.co.uk


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

Enhancing the data security and data integrity in steganographed images by store bit randomization Dr.S.Prasath Assistant Professor, Department of Computer Science, Erode Arts & Science College (Autonomous), Erode, Tamil Nadu, India. Email: softprasaths@gmail.com Jagan Raj J Senior TDE, Enterprise Storage Solutions, SanDisk India Device Design Centre Pvt. Ltd. Bangalore, Karnataka, India. Email:jae.jaganraj@gmail.com Abstract— This paper discuss on enhancing the data security of the secret text and verifying the data integrity. The proposed methodology discusses a way through which selection randomization of memory address selection. Additionally the data integrity is verified for possible image tampering by intruders using checksum in the self embedded technique. Keywords—Image steganography, information security, steganographic integrity, data integrity.

1. INTRODUCTION A picture is worth a thousand words and they are concisely convey information about various positions, sizes and inter-relationships among or between objects. Pictures are the most common and sophisticated means of conveying or transferring information. They portray several information that we can recognize as objects. About 75% of the information received by human are in pictorial form. Human beings are good at deriving any information from these images, because of our innate visual and mental abilities. The word steganography is of Greek origin and means “covered, or hidden writing”[9]. It is the science of hiding information. On the other hand, cryptography is used to make data under transmission to unreadable by any intruder, the goal of steganography is to hide the secret data from a third party. In steganography, the information can be hidden in any medium such as images, audio files (jpg, png, bmp etc.,), text files (doc, ods, docx etc.,) and video transmissions (mp4, avi, mkv etc.,). When message is hidden in these medium a stego carrier is formed, which is called as stego-image. It will be perceived to be as close as possible to the original carrier or cover image by the human. Steganography and cryptography are closely related in the data security. On the other hand, Cryptography scrambles the given messages so that they cannot be understood. On the other hand, Steganography, will hide the given message in given media file so that there is no knowledge of the existence of secret message in the first place. Steganography includes the hiding of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. [1]

317

However, today Steganography is very sophisticated than the examples above suggest, allowing a user to hide huge amount of information within image or audio files. These types of steganography are often used in conjunction with cryptographic techniques so that the information is doubly protected; at first it is encrypted and then hidden so that an adversary has to first of all find the information and then decrypt it. One of the main constraint on steganographic techniques are to verify the data integrity of media file, which carries the original message and the file, which is predominantly image file. There are possibilities, where an intruder can capture the image on transmission and do some manipulations so that the file is altered in such a way that would benefit the intruder's intention and also lead to the possibility of misinterpreting the original information to a wrong one. The first step in steganography is to pass both the secret message and the cover message ie., the image file, into the encoder. In the encoder, protocols will be implemented to embed the given secret message into the media file. The type of protocol to use will depend on what kind of information you are trying to embed and where you are embedding it in. For example, you can use an image protocol to embed information inside any image file. A key is often needed in sender's end for embedding process. This can be a public or private key, so that you can encode the secret message with your own private key and then the recipient can decode it using his/her public key. When embedding the information in this way, you can reduce the chance of a third party attacker getting hold of the stego object and decoding the same to find out the secret message. In general, the embedding process inserts a mark in an object. Having passed through the encoder, a stego image will be produced. A stego image is the original cover object with the secret information embedded inside in it. This object should or always look identical to the cover object as otherwise a third party attacker can see embedded information. Having produced the stego image, it will then be sent through some communications channel, such as secure copy, ftp or email to the intended recipient for decoding. The recipient will decode the stego object in order to view the secret information. The decoding process is simply the reverse of encoding process followed. It is the extraction of secret data from a stego image.


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

In the decoding process, the stego image is fed in to the system. The private or public key can decode the original key that is used during the encoding process is also needed so that the secret information can be decoded in receiver's end. It depends on the encoding technique, where sometimes the original cover object is also needed during the decoding process. Otherwise, there may be no way of understanding or extracting the secret message from the stego image. Once decoding process is completed, the secret message embedded in the stego-image can then be extracted and seen. The generic decoding process again requires object, I’. The result will be either the retrieved secret message from the object or indication of the likelihood of M being present in image I. Different types of robust marking systems use different inputs and outputs. A formula for this process can be: Cover medium + Secret message = Stego-Image The typical flow of a steganography process is as mentioned in figure-1.

Fig 1: Steganography Process There are more number of algorithms available for image steganography like masking, LSB (Least significant bit method), and filtering etc. Least significant bit method is one of the simplest and popular method for data hiding in steganography. Researchers focus for a long time is on security aspect. A hash function is any algorithm that maps data of variable length to data of a fixed length [3]. The values returned by a hash function are called hash values, hash sums, hash codes, checksums, digests or simply hashes. an example for practical use in data structure is a hash table where the data is stored associatively. Almost all the programming languages has similar data types for programming ease. In this paper our effort to produce a highly secured stego images under human visual system (HVS). In the proposed method, we are using marker technique [8] to insert hash value. 2. IMPORTANCE OF DATA SECURITY AND DATA INTEGRITY IN STEGANOGRAPHED FILES Data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle,[2] and it is a significant aspect of any system which is storing, managing, processing, or retrieving data. The term data integrity is broad in scope and have widely different definitions depending on the specific context – even in a single field of computing.

Data integrity is the antonym of data corruption, which is a form of data loss. The overall goal of any data integrity technique is the same: ensure that the data is recorded exactly as intended in any given file or medium and upon later retrieval, ensure the data is same as it was when it was originally stored. In short, data integrity aims to prevent unintentional changes to information by anyway. Data integrity shouldn't be confused with data security, which is the discipline of protecting data from unauthorized access. Data integrity is about technique for making sure that the data you entered are accurate. It is important to double check all the information that you passed on the sender's end should be same in the receiver’s end. To create a digest of the message, we use hash function [3]-[5]. The hash function creates a fixed digest from a variable – length message as shown in below figure

Fig 2: Message digest generation process The two most common hash functions are called MD5(Message Digest 5), SHA-1 (Secure Hash Algorithm 1) and SHA-2 (Secure Hash Algorithm 2). The first one produces a 128-bit digest. The second produces a 160-bit digest. Thr third one produces 224, 256, 384, or 512 bits digest. Hash functions have two properties to guarantee its success. 1. The digest can only be created from message, but not vice-versa. 2. It is one-to-one function and there is little probability that two message will have the same digest. One practical use in a data structure is called as hash table where the data is stored associatively. Searching for a person's information using name in a list is slow, but the hashed value can be used to assign a reference to the original data and retrieve constant duration. Another use case is in cryptography, the science of safeguarding the data. It is easy to generate hash values from the input data and easy to verify the data matches the hash, but hard to 'imitate' a hash value to hide the malicious data [14]. 3. IMPORTANCE OF DATA SECURITY IN STEGANOGRAPHED FILES Information security is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical) [12]. Several cryptographic techniques are used with steganography for a safer transmission of data. 4. EXISTING APPROACH FOR STEGANOGRAPHY The existing approach like Bit-Plane Complexity Segmentation Steganography, Least Significant Bit Embeddings, F5-A Steganographic Algorithm, Discrete Cosine Transform etc., allow the user to embed their secret message in images in such a way that it is invisible and doesn't degrade or affect the quality of the original image[6],[7] to the normal human eye.

318


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

A. Input Image An input interface (see figure.1) is provided so that a user can input a (gif, bmp, jpg, or tiff etc.) image in which the user wants to hide their personal data for privacy purposes. B. Input Secret Text Input the text file containing the Secret Text, which the user wants to code in to the image. The input text file is read by our system (see figure.1).

C. Encoding Data in Image For coding text data in the image, several encoding techniques like LSB, marker techniques are used in steganography͘

D. Decoding Data in Image For decoding secret data in the image. The corresponding algorithms are used and generated characters are concatenated to form a complete secret message. 5. PROPOSED METHODOLOGY In this proposed method, the Steganography has following three steps A. Encoding, B. Decoding C. Verification for data tampering A. Encoding Algorithm Proposed Algorithm for Encoding Data in Image: Step-1: Read the RGB image of any size. Step-2: Read the secret text (ST) and store the data in the given Image file (I) using any steganographic algorithm(SA) I=addTextUsingSteg(I,ST,SA) Step-3: Find hash digest (D) for file (I) from any one of the hash algorithms(MD5/SHA1/SHA2) D=hash(I) Step-4: Find the of the data to encode and generate the random addresses (L) ie., store bits, within image boundaries to store the data in LSB of the image S=Size (ST), L=for(1->S) srandom(S.D) Where, srandom is the function to give S locations, S is the size of ST, and D is the digest of I Step-5: Specify start of marker(SOM) at the end of image file, append the digest (D) calculated in the image file(I) and then specify end of marker(EOM) in the image I=I+(SOM+D+EOM) Step-6: Now, the output image (I) containing coded data in the random locations(S) and hash embedded is ready for transit.

C. Verification for data tampering Algorithm Proposed Algorithm for Data Integrity verification for secret text in Image file: Step-1: Traverse the image file and find start of marker(SOM) at the end of image file, read the digest in file (D) stored from image file (I) Step-2: Truncate the hash section(SOM+D+EOM) from the image file(I) I=I-(SOM+D+EOM) Step-3: Find new hash digest (NHD) for new image file (I) using the same hash algorithm used for encoding NHD=hash(I) Step-4: If digest in file(DIF) and new hash digest(NHD) are equal, the secret text(ST) obtained is valid else invalid Step-5: For the valid digest, generate the random addresses(L) ie., store bits within image boundaries to retrieve the data in LSB on the image S=Size(ST), L=for(1->S) srandom(S.D) Where, srandom is the function to give S locations, S is the size of ST, and D is the digest of I Step-6: Read the secret text (ST) by traversing the random addresses generated (L) in previous step and obtain the secret text(ST). 6. SAMPLE RESULTS In this proposed methodology, three different color images 256x256-Person, 950x534-Peacock and 1024x768Nelumno_nucifera of different sizes are taken for the experiment. Simulation results are performed in Microsoft's File Checksum Integrity Verifier version 2.05 version and Virtual Steganographic Laboratory-1.1 version

Figure 3: Original Images

B. Decoding Algorithm Proposed Algorithm for Decoding Data in Image: Step-1: Read the RGB image (I) at the receiving end. Step-2: Extract the D between SOM and EOM. Step-3: Extract the secret text (ST) and store it using steganographic algorithm used in encoding. ST=extractTextUsingSteg(I, SA)

Figure 4: Encoded Images with text data and checksum The comparison of results with data transfer without corruption/intruder's intervention are shown in Table-I. The files which have changed during transmission by size and content are described in Table-II and Table-III respectively with their corresponding checksums.

319


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

Table I - Comparison of checksum for the steganographed image, which transferred without any corruption Image(256x256-Person) with 256x256 dimension and undisturbed during the file transit Image Checksum Secret Text stage value for the (ST) random address generation (S) And Random address generation After 3845e97369852af This is a secret text, Encoding 8c7741ba0ed5ae5 which is hidden in a 39 image file using steganography and 93 ed 96 48 55 3e having embedded 73 63 86 1f 19 80 checksum in it d4 38 ab 1c

8b 0d ec 69 84 56 be bd 57 6d 42 8b 7f 74 3e 55 3b 3a 1d cc 5c 47 92 55 38 42 d3 46 5c 22 2e 74 e1 5d 61 9f 8a 78 fb 7d 55 9e d6 66 e4 3e 46 12 d8 50 56 91 30 e3 a4 d7 dd b2 f8 84 97 b6 19 0f 07 25 b7 80 18 8c 30 c5 90 1b 27 58 61 99 Table II - Comparison of checksum for the steganographed image, which transferred with corruption because of image resize Image(950x534-Peacock) with 950x534 dimension and disturbed during the file transit by resizing the image dimension to 475x267 Image Checksum value Secret Text stage for the random (ST) address generation(md5) (S) After c965b6c78382dcaf8 This is a secret text, Encoding 1037fd28fd6fe37 which is hidden in a image file using steganography and having embedded checksum in it After 67cb60d47fbec5b94 Secret text got Decoding 743ca7706477892 corrupted Table III - Comparison of checksum for the steganographed image, which transferred with corruption because of image color change Image(1024x768-Nelumno_nucifera) with 1024x768 dimension and disturbed during the file transit by changing the image to black and white Image Checksum value Secret Text stage for the random (ST) address generation(md5) (S) After e64d69492b460cd25 This is a secret text, Encoding dbb42f970409f23 which is hidden in a image file using steganography and having embedded checksum in it After e1c2e6f45c57978c86 Secret text got Decoding a78df764295972 corrupted

c0 3d d2 d7 5f 82 ce 9d 8f cd 49 a6 2f 87 6f 0b 8b 0d ec 69 84 56 be bd 57 6d 42 8b 7f 74 3e 55 3b 3a 1d cc 5c 47 92 55 38 42 d3 46 5c 22 2e 74 e1 5d 61 9f 8a 78 fb 7d 55 9e d6 66 e4 3e 46 12 d8 50 56 91 30 e3 a4 d7 dd b2 f8 84 97 b6 19 0f

After Decoding

07 25 b7 80 18 8c 30 c5 90 1b 27 58 61 99 3845e97369852af 8c7741ba0ed5ae5 39 93 ed 96 48 55 3e 73 63 86 1f 19 80 d4 38 ab 1c c0 3d d2 d7 5f 82 ce 9d 8f cd 49 a6 2f 87 6f 0b

This is a secret text, which is hidden in a image file using steganography and having embedded checksum in it

320


INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND CREATIVE ENGINEERING (ISSN:2045-8711) VOL.5 NO.12 DECEMBER 2015

Table IV - Qualitative Comparison of proposed methodology with Discrete Cosine Transform (DCT) for below given seven parameters DCT ECT methodol Parameters Methodology ogy (Proposed) (Existing) Digest Inclusion on Stego files No Yes Capability to identify MITM(Man In The Middle) attack No Yes IPv4 Header Checksum check Yes Yes Digest size used(md5) 0 bit 128 bits Less data Robustness loss No Data loss Data Integrity Check at receiving end No Yes Random store bit selection for secret text No Yes

[8]

[9]

[10]

[11]

[12] [13]

7. CONCLUSION AND FUTURE WORK The proposed method is good for security aspect because the secret text is stored in different places and the same can be generated at the receiving end. if any unauthorized users or intruders tampered the image in any aspect and if the data is lost, this can be verified by the embedded checksum. Through this method, we are ensuring the image & the text are intact and the message can't be mis-interpreted in the receiving end. Even though if intruder found the algorithm used for steganography in the stego image by steganalysis and changed the content of the secret text and if the same is received at the receiver's end the tampering can be found by comparing the checksum.

[1]

[2]

[3] [4]

[5]

[6]

[7]

[14]

8. REFERENCES Compression Algorithms for Real Programmers, Wayner Peter. Publisher: Morgan Kaufmann, 11 Oct 1999 ISBN-10: 0127887741 Boritz, J. “IS Practitioners' Views on Core Concepts of Information Integrity”. International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011. From Wikipedia, “Hash function,” Jan 2014, URL: http://en.wikipedia.org/wiki/Hash_function Behrouz A. Forouzan,”Data communication and networking,” Tata McGraw-Hill Publication, 2nd ed., 2003, pp.799-800. William Stallings,” Cryptographic and network security,” Pearson Prentice Hall Publication, 4th ed., 2006, pp.320-375 Holub V, Fridrich J: Digital image steganography using universal distortion. In 1st ACM Information Hiding and Multimedia Security Workshop. Montpellier; 17–19 June 2013. W. Bender, “Techniques for Data Hiding,” IBM Systems Journal, Vol. 35, no. 7, Pgs 313-336, 1996

321

Wang Qian, et .al,”Steganography and Steganalysis based on digital image,” IEEE 4th International Conference on Image and Signal Processing, Shanghai, 15-17 Oct. 2011, pp.252-255. Adity Sharma, Anoo Agarwal and Vinay Kumar, “ A simple technique for steganography”, arXiv:1307.8385v1 [cs.MM] 31 Jul-2013. VojtČch Holub, Jessica Fridrich, Tomáš Denemark “Universal distortion function for steganography in an arbitrary domain”, EURASIP Journal on Information Security, January 2014. Denemark T, Fridrich J, Holub V: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014. Edited by: Alattar A, Memon ND, Heitzenrater CD. San Francisco; 2–6 February 2014 https://www.law.cornell.edu/uscode/text/44/3542 Chandreyee Maiti, Debanjana Baksi, Ipsita Zamider, Pinky Gorai, Dakshina Ranjan Kisku: Data Hiding in Images Using Some Efficient Steganography Techniques from Signal Processing, Image Processing and Pattern Recognition Communications in Computer and Information Science Volume 260, 2011, pp 195-203 Jagan Raj J and Prasath S. Article: Validating Data Integrity in Steganographed Images using Embedded Checksum Technique. IJCA Proceedings on National Conference on Research Issues in Image Analysis and Mining Intelligence NCRIIAMI 2015(1):5-8, June 2015.


NOVEMBER 2015 VOL- 5 NO - 11

@IJITCE Publication @IJITCE Publication


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.