Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm

Full Text (PDF, 469KB), PP.59-67

Views: 0 Downloads: 0

Author(s)

Somdip Dey 1,* Kalyan Mondal 1 Joyshree Nath 2 Asoke Nath 1

1. Department of Computer Science, St. Xavier‘s College [Autonomous], Kolkata, India

2. A.K. Chaudhuri School of Information Technology, Calcutta University, Kolkata, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2012.06.08

Received: 10 Feb. 2012 / Revised: 12 Mar. 2012 / Accepted: 10 May 2012 / Published: 8 Jun. 2012

Index Terms

Steganography, Encryption, QR CodeTM, Security, Communication technology

Abstract

Due to tremendous growth in communication technology, now it is a real problem / challenge to send some confidential data / information through communication network. For this reason, Nath et al. developed several information security systems, combining cryptography and steganography together, and the present method, ASA_QR, is also one of them. In the present paper, the authors present a new steganography algorithm to hide any small encrypted secret message inside QR CodeTM , which is then randomized and then, finally embed that randomized QR Code inside some common image. Quick Response Codes (or QR Codes) are a type of two-dimensional matrix barcodes used for encoding information. It has become very popular recently for its high storage capacity. The present method is ASA_QR is a combination of strong encryption algorithm and data hiding in two stages to make the entire process extremely hard to break. Here, the secret message is encrypted first and hide it in a QR CodeTM and then again that QR CodeTM is embed in a cover file (picture file) in random manner, using the standard method of steganography. In this way the data, which is secured, is almost impossible to be retrieved without knowing the cryptography key, steganography password and the exact unhide method. For encrypting data The authors used a method developed by Nath et al i.e. TTJSA, which is based on generalized modified Vernam Cipher, MSA and NJJSA method; and from the cryptanalysis it is seen that TTJSA is free from any standard cryptographic attacks, like differential attack, plain-text attack or any brute force attack. After encrypting the data using TTJSA,the authors have used standard steganographic method To hide data inside some host file. The present method may be used for sharing secret key, password, digital signature etc.

Cite This Paper

Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath, "Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm", International Journal of Modern Education and Computer Science (IJMECS), vol.4, no.6, pp.59-67, 2012. DOI:10.5815/ijmecs.2012.06.08

Reference

[1]Symmetric Key Cryptography using Random Key generator : Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: "Proceedings of International conference on security and management(SAM'10" held at Las Vegas, USA Jul 12-15, 2010), P-Vol-2, 239-244(2010).
[2]An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Choudhary, Asoke Nath: Communicated for publication in IEEE International conference WICT 2011 to be held at Mumbai Dec 11-14, 2011.
[3]Data Hiding and Retrieval : Asoke Nath, Sankar Das, Amlan Chakraborty, published in IEEE "Proceedings of International Conference on Computational Intelligence and Communication Networks(CICN 2010)" held from 26-28 NOV' 2010 at Bhopal.
[4]Advanced Steganographic approach for hiding encrypted secret message in LSB, LSB+1, LSB+2, LSB+3 bits in non standard cover files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications, Vol-14, No. 7, Page-31-35, Feb (2011).
[5]Advanced Steganography Algorithm using encrypted secret message : Joyshree Nath and Asoke Nath, International Journal of Computer Science and Applications, Vol-2, No. 3, Page- 19-24, Mar (2010).
[6]A Challenge in hiding encrypted message in LSB and LSB+1 bit positions in any cover files: executable files, Microsoft Office files and database files, image files, audio and video files : Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath : JGRCS, Vol-2, No. 4, Page- 180-185, Apr (2011).
[7]New Data Hiding Algorithm in MATLAB using Encrypted secret message: Agniswar Dutta, Abhirup Kumar Sen, Sankar Das, Shalabh Agarwal and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU (Jammu), 03-06 Jun, 2011, Page 262-267.
[8]New Steganography algorithm using encrypted secret message : Joyshree Nath, Meheboob Alam Mallik, Saima Ghosh and Asoke Nath : Proceedings of Worldcomp 2011 held at Las Vegas (USA), 18-21 Jul, 2011.
[9]Steganography In Digital Media: Principles, Algorithms and Applications by Jessica Fridrich : Cambridge University Press.
[10]Cryptography and Network Security, William Stallings, Prentice Hall of India.
[11]Cryptography & Network Security, Behrouz A. Forouzan, Tata McGraw Hill Book Company.
[12]Cryptography and Information Security, V. K. Pachghare, Prentice Hall of India
[13]Reed and G. Solomon. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960.
[14]"QR Code, Wikipedia", http://en.wikipedia.org/wiki/QR_code [Online] [Retrieved 2012-02-09]
[15]"ZXING- QR Code Library ", http://code.google.com/p/zxing/ [Online] [Retrieved 2012-02- 09]
[16]N. Johnson and S. Jajodia. Steganaly- sis: The investigation of hidden information. Proc. Of the 1998 IEEE Information Tech- nology Conference, 1998.
[17]B. Dunbar. A detailed look at stegano- graphic techniques and their use in an open- systems environment. Sans InfoSec Reading Room, 2002.
[18]E. T. Lin and E. J. Delp. A review of data hiding in digital images. Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, 1999.
[19]Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm Proceedings of "Information and Communication Technologies (WICT), 2011 " held at Mumbai, 11th – 14th Dec, 2011, Pages:1175-1180.
[20]Somdip Dey, "SD-EQR: A New Technique To Use QR CodesTM in Cryptography", Proceedings of "1st International Conference on Emerging Trends in Computer and Information Technology (ICETCIT 2012)", Coimbatore, India, pp. 11-21.