ABSTRACT
Security of data over unsecured channel is a global
issue. Image steganography and Exclusive-OR (XOR) encryption are techniques
employed to ensure data security. This dissertation develops and implements an
algorithm that further improves the traditional image Least Significant Bit
algorithm. Encryption of secret message was performed using 64 bits key and
plaintext to obtain a cipher text. Each bits of the cipher text were hidden
randomly using specific condition in red and blue planes of a selected cover 24
bits colour image. Extraction of the embedded cipher text was done as well as
decryption of cipher text back to plain text. Experimental results showed that
the proposed algorithm hides significant amount of data and extract it
successfully without any loss at a very good Peak Signal to Noise Ratio (PNSR)
of above 60dB. The statistical analysis of cover and stego image showed no much
difference which further proved the proposed technique is more secured and
efficient for private communication. Steganalytic result showed that the
algorithm survives steganalysis test. Based on these results, the algorithm out
performs other algorithm considered in the study.
CHAPTER
ONE
INTRODUCTION
1.1
Background of the Study
Humans have continually sought for new and efficient
means of communicating sensitive information through the web and other
communication channels. Seberry and Pierprzyk (1989) explained that “Security
of information results from the need for private transmission of both military
and diplomatic messages. This need is as old as civilization itself”.
Advancements in technology introduced written language, telegraph,
radio/television, and most recently electronic mail, telephone, social media
chat, and communicating privately through these media is not without security
challenges. Data transmission through Internet has been the fastest, simple and
most used means of communication. However, the use of Internet poses serious
threat on the security of such data. Therefore it becomes imperative to
consider data security as it is one of the most important factor during data
transmission process. Data security basically means the protection of data from
unauthorized users or hackers and provision of high security against data
modification. This area of study is growing in astronomical rate due to the
growing number of Internet users globally. Data security has five main
requirements to satisfy: confidentiality, data integrity, non repudiation,
availability and authentication (Stallings, 2011).
Cryptography and steganography are two powerful
techniques employed in data security. Steganography is the art and science of
communicating in a way which hides the existence of the communication (Narayana
and Prasad, 2010). The idea of modern steganography was first described in
Simmons (1983) while describing communication between two prisoners.
Cryptography is the study of encryption principles/methods. The process of
converting from plaintext to ciphertext is known as enciphering or encryption;
restoring the plaintext from the ciphertext is deciphering or decryption
(Stallings, 2011).
The general objective of encryption is not to
protect communications as such but rather the content (Becket, 1988). This is
due to it being extremely difficult to stop communication interceptions. By
using encryption, even if there is a transmission interception, the content of
the communication is kept secret. This is extremely important in communication
channels such as the Internet where many networks are connected together using
broadcast mediums (such as Ethernet) and so data interception is real and
active problem. Cryptographic techniques could be vulnerable due to improvement
in the computers‟ capabilities in terms of speed of processing. However, this
vulnerability can be significantly curbed by combining it with steganography.
Steganography can be thought of as a higher version of cryptography and hence
its usage can further increase the integrity and security of data.
Traditionally in steganography, the goal is to hide a secret message, which is
transmitted between two or more communication partners in a way to ensure confidentiality
and integrity of data. Successful embedding depends on the selection of the
cover image and the method involved. It is also important to note that
steganographic technique not only involves in embedding information inside
digital media but also the ability to successfully retrieve the information
from the media.
1.2
Problem Statement
There are many conventional approaches to image
least significant bit (LSB) steganography algorithms to guarantee secure data
communication constraints but none is absolutely ideal. Each steganography
algorithm has its own strength and weakness in terms of security and
complexity. Some algorithm cannot retrieve hidden bits without loss of some
part of it. The work therefore seeks to modify existing LSB algorithm and
combine cryptography for the security of embedded data while maintaining high
imperceptibility of the cover media with no loss of data during extraction
process.
MSC Project Topics and Complete Thesis in Computer Science
ENHANCED DATA SECURITY ALGORITHM USING MODIFIED IMAGE RANDOMIZED LEAST SIGNIFICANT BIT AND EXCLUSIVE-OR ENCRYPTION
Department: Computer Science (M.Sc)
Format: MS Word
Chapters: 1 - 5, Preliminary Pages, Abstract, References, Appendix.
No. of Pages: 90
NB: The Complete Thesis is well written and ready to use.
Price: 20,000 NGN
In Stock
Our Customers are Happy!!!
No comments:
Post a Comment
Add Comment