New Dimension Of Data Security Using Neural Networks

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Abstract: Data hiding embeds data into digital media for the purpose of identification, annotation, and copyright. New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications. Our objective is to hide large volumes of data in the host, in a manner that causes minimal perceptual distortion, and is robust to survive benign and malicious attacks, and make sure to hide as much information as possible into the host. In this paper we identify the prospects of the hidden information being detected and introduce a new approach for hiding any text without any embedding, by the method of Multiple key functions and Newton Forward Difference Technique so that it passes unnoticed by the existing stochastic detection techniques. By this approach, the size of the data that can be hidden will be larger than all the size that all the existing techniques support. This approach derives a polynomial function that generates the bit position in the host where the data bits matches with the host bits. Since the approach uses the original bits of the host to hide the data, the conventional embedding is not done and so the host does not undergo any perceptual degradation and thus escapes all the existing stochastic detection techniques.

II. INTRODUCTION

New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications. However, despite the obvious

advantages of digital data hiding technologies and their current progress, these developments carry inherent risks such as copyright violation, unauthorized prohibited usage and distribution of digital media, secret communications and network security violations.[1]

Although the issues of robustness, visibility and capacity of digital data hiding technologies have received a lot of attention, their security aspect still remains an open and

little studied problem. The security requirement is closely related to the stochastic visibility and unauthorized detection of hidden information and requires both new and careful study.

New information-theoretic methods for blind stochastic detection of hidden data should be investigated. This aspect will have a great impact on robust digital watermarking, steganography,

integrity control and tamper proofing (possibly even without embedded hidden data) and Internet/network security.[2][3][5]

III.RELATED W/ORK

An introduction to steganography and its application to digital images are available from [5]. Other, more robust, methods of hiding information in images include application of the transform domain that takes advantage of algorithms and coefficients from processing the image or its components to hide information. Transformations can be applied over the entire image [8] to blocks through out the image [9, 10], or other variations. Many of these transformation techniques require use of the original, unmarked image to extract the watermark. In [11] a number of papers propose techniques that do not require using the original to extract the watermark [12]. A method that proposes a combination of these techniques from LSB insertion to spread spectrum disbursement of data is described in [9]. A survey of transform domain techniques can be found in [13]. grabs. One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or truncation at the grayscales 0 and 255 [6]. Another unconventional approach in which we consider "piggy-backing" the color information on the luminance component of an image for improved color image coding[1]. The new technique essentially transforms a given color image into the YIQ color space where the chrominance information is subsampled and embedded in the wavelet domain of the luminance component

IV. THE NEW APPROACH

A).Multiple Key Function Method:

In this paper, we formulate a distinctive method for information hiding in images to beat the existing detection techniques. Let us take the example of hiding an secret text called the cipher text in an image called the cover image.

In the effort to keep the structural characteristics of the cover image, secure, we make minimal introduction of message bits into the cover image and yet manage to embed text messages of substantial size. It is thus possible, by choosing from a set of key functions, which requires introducing least number of message bits in the cover image and still accommodate the entire cipher intended to be hidden. The key functions are used to generate a set of byte-positions where the message is to be embedded. At various bit positions in the cover image a match between the cipher bit and the original image bit may result, which means that actually, no replacement of the original image bit occurs. The Bit Replacement Count (BRC) for this key function is calculated, dynamically, as the replacement/non-replacement of the image bits occur. Here, BRC = Number of replacements in the original image bits introduced

Now, another key function from the key function set is chosen and the above manipulations are performed. As before, the new value of BRC is calculated. Redundant application of the above formulation will result in a set of BRCs. The set of BRCs can be compared to find out a key function, which belongs to the key function set, which causes least number of original image bit replacements. The result is, a sizable text embedded into a cover image, without actually disturbing much of the image‘s original characteristics.[14]

Associated with the key functions, is a unique identification number in the key functions lookup table. Both the sender and the receiver are required to have a similar lookup table. The unique key identification number is also embedded in the cover image at specific positions in the cover image, along with the cipher. The embedded cipher can be recovered safely by the receiver by first extracting the key identification number from the cover image, and then generate the byte-positions to actually decipher the embedded cipher information. Because the number of bits in the cover retouched is minimal, as resulted from using the suitable key function, the image can escape the statistical analyses (such as CHI-SQUARE or Extended CHI-SQUARE tests),if the cover image is carefully chosen.

.

B). Implementation and Testing:

This approach was implemented and tested in windows environment with the c++ compiler. The results given above are with a modest, 11 different key function table for a cipher text of 20 bytes. The perfect permutation of the key function and the cover image can produce astonishing results with the ratio of the BRC to the size of the cipher, approaching unity.[15]

BRC/Size of the Cipher = 1 (approx.)

The results ought to be better if the key function table is larger and a suitable database of cover image is maintained. In such cases the probability of BRC would consistently reach unity irrespective of the size of the cipher thus escaping all existing detection techniques.

C).Enhancements on this technique:

The complexity of the first approach is very high when the number of functions in the function domain increases. The complexity can be reduced by using a generator which dynamically generates functions in the neighborhood of the function that gives better BRC values from a domain of just 50 functions.[16]

D). Newton’s Forward Difference Method:

In this approach, Newton’s forward difference operator is introduced. The definition for that operator is

F(x) = F(x+h) - F(x), where h=interval of x values

In the method of Newton Forward Difference, by taking

X : The serial number of cipher bits (1,2,3…n) [ always h=1 ]

F(x): The bit position of image where the respective cipher matches the original Image Bit.

Using the above functional table, the forward difference table is constructed. From the table thus obtained we get the polynomial function that can generate the functional table. This polynomial function is then sent to the receiver along with the image. The receiver can retrieve the polynomial function which is placed in some fixed positions in the image. He can then generate the functional table thus knowing the bit positions where the cipher information is present. [17]

E). Advantages of this method:

Since the method uses the original bits of the image to hide the cipher, the conventional embedding is being ruled out and so probability of BRC is consistently equal to 1 for any cipher size and any cover image. Since we are not going to choose all the bits of the image in sequence, the size of the cipher that can be hidden is extremely large almost equal to half of the size of the image. Since we are not going to embed, the statistical properties of the image left unchanged. So the image escapes all the statistical detection techniques. [18]

E). Implementation and testing:

This new approach was implemented and tested in windows environment with the c++ compiler. The forward difference table was constructed for a cipher length of 10 bytes., that is, 80 bits and the functional table obtained is as given below.

The above functional table yields the polynomial function 2x^5+2x^4-3x^2+2 after constructing the forward difference table. The technique was tested for five cases by hiding different ciphers in various images and the results thus obtained are shown in the graph.

Thus this approach proves to be more efficient than any other method because nowhere we are going to replace or embed any data into the image. Any detention technique (CHI-SQUARE method) fails to detect any suspection over the image.[19]

F). Enhancements on this technique:

The degree of the polynomial thus obtained is very high .To reduce the degree of the resulting

Polynomial function, we use a selector to which some intelligence is incorporated. We use the

concepts of neural networks to achieve this task. We try to test and train the selector so that it

intelligent selector such that the image bit positions such that the higher order differences in the

forward difference table vanishes to give a polynomial of lesser degree.

As shown above, the same technique is applied recursively on the resultant polynomial functions

Until the resultant polynomial function is of lesser degree. The polynomial table resulting because

The enhancements is shown below. This table corresponds to the polynomial 3x-2.[20]

G). Comparison between the exitsting techniques and our method:

IV. CONCLUSION

With the arrival of the digital society in the 21st century, the potential of information hiding and

watermarking techniques for multimedia has drawn increasingly intensive attention from the

research communities and commercial sectors all over the world during the last decade. Recently,

many researchers are investigating image data hiding techniques in various aspects in addition

to imperceptibility and robustness. These aspects include information theoretic,

stochastic, and security issues. This research trend will advance the information

hiding technologies and provide opportunity for practical systems. This paper proposes

two new evolutionary techniques in the field of data hiding. The first approach aims at minimal

embedding by increasing the number of functions. This approach provides facilities for using

65536 functions as we have used a 16 bit key. The second approach aims at avoiding embedding

thus satisfying theoretic, stochastic, and security issues.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now