Abstract: Security has become the most indispensible part of any form of communication. There are different ways through which it is brought about, out of which one of the efficient implementation through steganography and encryption. Steganography conceals the existence of a secret message throughout the communication thereby providing enhanced security. In this study, a methodology has been proposed to perform encryption on an image with the help of Secret Steganography Code for Embedding (SSCE) code. A mapping technique has been proposed to combine quantum truth table and LSB based embedding. The SSCE has been employed to provide encryption, followed by quantum table before embedding the secret data. The proposed methodology supports both images and text as cover as well as secret data. In the proposed scheme, embedding has been included with encryption to provide security multifold. The implementation was carried out using Visual Basic. NET and results are presented.
INTRODUCTION
In the present scenario, the marked up dependence on technology have lead to vulnerable privacy. This brings out more desire for security to rectify privacy in virtual realm. Hence, the term data encryption evolved simultaneously which was widely used to ensure the protection of information. Encryption is the method that imparts the content of the messages unintelligible to the persons who are not authorized to read it. It is simply the translation of a message into secret code. And to read that encrypted code, you need to have the secret key to decrypt the message.
There is an interesting sub discipline of information hiding called steganography. It is an art of maintaining secrecy of transmission of any message so that it is not even susceptible to an intruder. The term steganography has its provenance from the Greek words, Stego means Cover and Graphy means Writing. It is otherwise called as concealed writing (Amirtharajan and Rayappan, 2012a-c, 2013; Amirtharajan et al., 2013a- j; Cheddad et al., 2010). It is a variant cryptography for data security (Praveenkumar et al., 2014a-n, 2013a-d, 2012a, b). Whereas, cryptography is a method for maintaining confidentiality or simple privacy of data. Steganography is basically classified into three categories (Ramalingam et al., 2014a, b; Rajagopalan et al., 2014a-d; Thanikaiselvan et al., 2012a-c, 2013a, b, 2014). These are text steganography, image steganography and audio/video steganography. All the three of them have their own specialization and characteristics.
Over the past few years, there had been increasing steganography techniques that are greatly used to ingrain secret messages into multi-media objects. This is because that multimedia objects have high rate of superfluous information which provides a way to add large number of data by carrying out cinch and profound changes that preserve visceral content of the cover. This study effectively implies image steganography (Amirtharajan and Rayappan, 2012a-c; Janakiraman et al., 2012a, b, 2013, 2014a, b; Rajagopalan et al., 2014a-d).
In image steganography, the information is entirely hidden inside the images. There are various techniques present to perform this operation. The LSB substitution is one of the most simple and straight forward techniques. Here, the message is ingrained into least significant bit plane hence it causes less degradation of the cover. The LSB based techniques stays to be an ambitious task for the steg-analyst to differentiate the cover and stego images, given small changes have been made.
MATERIALS AND METHODS
Quantum gate: Behind every computation, there will be certainly some basic logic. The general classical computations are carried out using basic logic such as 0 and 1. They can physically be represented by on and off condition. Quantum circuits are quite different from the digital circuits due to certain rules that are new to quantum computations. The quantum bit are generally considered to be a vector in a two dimensional Hilbert space. A fresh quantum computing is found to be a major application in cryptography. For a physical system, its state can be pictured by its wave function which is completely characterized by the state of the system. An electric circuit was constructed using logic gates similarly quantum circuits are constructed using quantum gates. These quantum gates employ many basic operations based on its states (Shaw and Brun, 2011; Qu et al., 2010, 2011).
Qubits are the quantum bits (Qu et al., 2010; Martin, 2007; Liao et al., 2010) upon which the basic quantum circuits operate. Unlike logic gates which are most often irreversible, the quantum gates are physically and logically reversible. A qubit is a basic or smallest unit for manipulation of quantum circuits. They have two possible states ket|0> and ket|1> which are also known as computational basis states. A logic bit can take either 0 or 1 whereas a quantum bit can take the superposition of both the states. Quantum probability amplitudes are defined by complex number. Qubits are somewhat distinct from Boolean logic and that is the reason why they have excitingly increased expectations.
C-NOT quantum truth table: The operation of controlled gate is represented by If first bit is true, then perform NOT on the second bit. Where the first bit is the control qubit and the second bit is the target qubit. If control qubit is 0, then target qubit is not changed. If control qubit is set to 1, then target qubit is inverted.
C-NOT gate quantum truth table are given in Table 1. Inverse of a unitary matrix is again a unitary matrix therefore, this gate is logically reversible. This gate is universal. It is the quantum parallel of the universality of the NAND gate. Therefore, this gives logical and physical reversibility. This quantum truth table has been used for mapping.
VB.NET platform: The implementation of this concept was carried out in VB.NET platform. This language has got many striking features. The basic structure of this programming language is facile and especially when it comes to executable code. It is an integrated, Interactive Development Environment (IDE). This VB-IDE stays to be a cornerstone for Rapid Application Development (RAD) which braces the use of graphical user interfaces.
Table 1: | Quantum truth table |
This is mainly made of use in this study. It has also got Intelligence technology which shows a popup window about the types of constructs.
Now, if the message is embedded into the LSB of the cover image, the resultant LSB plane will provide attention and will clearly turn over the message. Hence, it is strongly ratified to maintain a randomness of LSB, for which encryption can be performed. And this encrypted message should be randomly inserted into a subset of pixels. Then encryption is accomplished using SSCE code. In order to boost up the security level, quantum mapping concept is also used ahead of embedding the message into cover.
The secret image to be trespassed via a communication channel is first selected as given in Fig. 1. It is encrypted using SSCE code. A secret key is generated which has to be used at the receiver for decryption. Then a random matrix is chosen according to the size of input image. The quantum truth table is mapped to this random matrix from top left till the end. The encrypted messages are replaced by 0s present in the mapped matrix. A suitable cover image is chosen. This table of encrypted message contents is then embedded into the cover image. The LSB based substitution has been carried out here. Thus, a stego image has been formed.
At the receiver side, the message was extracted from the LSB plane of stego image. And the decryption was performed using the secret key for SSCE code. Thus, the resultant gives the secret image which was originally transmitted.
Algorithm of the proposed scheme:
• | Get an input secret image of size NxN |
• | Encrypt the image by modifying each pixel value by its corresponding SSCE values |
• | The next step is to declare a ones matrix of dimension (N+N/2)x(N+N/2) |
• | Map the quantum truth table, shown in Fig. 1, to the above ones matrix |
• | Then replace 0's in the above mapped matrix by the pixel values of encrypted image |
• | Convert the matrix into an array and then convert each value in to 8-bit binary representation |
Fig. 1: | Proposed methodology |
• | Get a cover image into which the secret image should be hidden |
• | Convert each pixel of cover image into 8-bit binary representation |
• | Now replace the LSB of each pixel of cover image by a bit in binary array |
• | Then convert back the values to decimal and display that as image |
• | So that stego image which contains secret information will be transmitted through the communication channel |
• | At the receiver side, after receiving the stego image, its converted in to binary in order to retrieve the LSB bits. |
• | After retrieving, the values are converted back to decimal |
• | From the extracted decimal values, excluding 0's and 1's remaining values are stored in a matrix and they are converted back to original values using the SSCE value |
• | Then, finally secret message was extracted |
RESULTS AND DISCUSSION
The proposed methodology was implemented using ten images and implemented using VB.NET platform for both images and text. One of the sample secret image, cover image and its corresponding outputs are shown below. A secret input image was taken and analyzed for better results. The following are the output at various stages of the process. Figure 2 shows the output window of the input image on the screen.
Fig. 2: | Secret input image |
Figure 3 shows the encrypted output image after the encrypting the original image with the SSCE code (Qu et al., 2010, 2011; Liao et al., 2010). Figure 4 shows the cover image into which the encrypted image is to be embedded. Figure 5 shows the stego image that has hidden information.
Finally, Fig. 6 shows the extracted image from which the original secret image was decrypted at the receiver side as given in Fig. 7. This same concept can also be implemented for text data. The message and cover can be taken as text data.
Fig. 3: | Encrypted image of secret input image |
Fig. 4: | Cover image |
The algorithm resembles as that for images except a few steps at embedding the encrypted value into cover. While, using images simple LSB substitution was carried out, instead in text, a concept of quantum states are used.
The information is shuffled using the 4 quantum states. They are 00 Rectilinear Vertical, 01-Rectilinear Horizontal-Diagonal Left circular polarization and 11-Diagonal Right circular polarization. Then the changes were made in the cover text using variations made in articles of the passage. The embedding was performed using the following rule as given in Table 2.
Fig. 5: | Stego image |
Fig. 6: | Extracted image |
Fig. 7: | Recovered secret image |
Table 2: | Embedding table for text |
Fig.8: | Output of text based steganography on sender side |
Fig.9 : | Output of text based steganography on receiver side |
Using the above mentioned procedure, the text of various lengths were taken as input and corresponding cover text were chosen to analyze the result of text steganography. Figure 8 and 9 shows the embedding and the extraction at the transmitter and at the receiver side consider text as cover and secret data, respectively.
CONCLUSION
In the proposed scheme, SSCE codes are initially used for encryption, followed by quantum table for shuffling and LSB based embedding was done considering images as cover and secret. Then, text based steganography was done where four quantum states were involved to shuffle the text and table for performing text based embedding was considered. In total, this method supports both images and text as cover as well as secret data. In addition, this method scheme, embedding has been included with encryption to provide security multifold. The implementation was carried out using Visual Basic. NET and results are presented.