SlideShare une entreprise Scribd logo
1  sur  14
A Seminar on
Mini-project

An Efficient Encryption using Data Compression towards
Steganography

.

Presented by
Prashant Dahake
Mtech CSE

Dept. of Computer Science & Engineering
2013-2014

1 1
1
Outlines








Introduction
Review of Literature
Methodology
Block Diagram of Proposed System
Research Contribution
Conclusion
References
Introduction
 Data transmission must be secure enough

to be used in channel
medium without any loss and tampering of data. Secure transmission of
data is a key issue in the field of information technology.[2]
 Data sent must be in compact way. Compactness is achieve through
data compression, which reduces storage space or transmission capacity
of the information.

 Data compression is formally called as bit rate reduction. Which
focuses on reducing the number of bits representing the secret
information.
Types of data compression
 Lossy
 Lossless
Review of literature
Sr.
No

Author

Title

Methodology

Inference Drawn

1

K. Ashok
Babu and V.
Satish Kumar

Implementation of
Data Compression
Using Huffman
Coding.2010 [3]

It makes an use of
probability
of
occurrence of each
character
in the
message.
 Use tree structure
and top down
approach

 Each symbol is
represented
by
variable length code
 not that much
efficient.

G.
Manikandan,
N. Sairam
and M.
Kamarasan

A Hybrid Approach
for Security
Enhancement by
Compressed
Crypto-Stegno
Scheme
(2012)[9]

 LZW (LempelZiv-Welch)
algorithm
 uses Dictionary

It replaces strings
of characters with
single Code

2
Continue…..

Sr.
No.

3

4

Author

Title

Asjad Amin,
Haseeb
Ahmad
Qureshi,
Muhammad
Junaid

Run Length Encoding
Scheme with
Introduction of Bit
Stuffing for efficient
Data Compression
(2011)[7]

M.S.Sutaone,
M.V.
Khandare

Image based
steganography using
LSB insertion
technique [2008]

Methodology

• RLE
algorithm

• Uses LSB
technique.
(without any
compression
technique)

Inference Drawn
 Consecutive
bits are counted
and
store
as
single value with
its run.
 not
always
produce
compression
 when size of the
data increases, one
can
identify
difference
between images
Methodology
 Arithmetic coding compression technique is used. It converts

stream of plaintext into single floating point number[1] and range of
floating point number is between [0,1].
 It has high compression ratio than any other compression
technique.

 It is based on probability of each character[2]. Calculated as

Where P= probability of character
C= Occurrence of the character
L= Length of the plaintext
Fig. 1 Working of Arithmetic Coding
Block diagram of proposed system

PLANE TEXT

ARITHMETIC CODING
DATA COMPRESSION

FLOATING POINT
NUMBER

BINARY
CODED FORM

ENCRYPTION

IMAGE

BINARY
CODED FORM

STEGANOGRAPHY
(EMBEDDING)

Fig. 2 Process at Sender side

STEGO IMAGE
CONTINUE…

STEGO-IMAGE

BINARY
CODED
FORM

PLANE TEXT

STEGANOGRAPHY
(EXTRACTION)

ARITHMETIC
CODING
DECOMPRESSION

Fig.3 Process at Receiver side

DECRYPTION

FLOATING
POINT NUMBER
Research Contribution

 Compactness is achieved using Data compression technique, that is by
using arithmetic coding. It provide some amount of security to secret data.
 But in proposed system additional security is provided to data by using
Encryption technique , which makes an use of any cryptographic algorithm
and it is applied on the compressed data.

 Provides confidentiality and secrecy to data.
Conclusion
 Thus the proposed system can provides an efficient manner for
the transmission of the secret information from one authorized user
to the other.
 From the study of literature, Compressed data required less
storage capacity, so more amount of information can be hided inside
the image.
References
[1] Jiantao Zhou, Xianming Liu, Oscar C. Au, Fellow, and Yuan Yan Tang,
Fellow, “Designing an Efficient Image Encryption-Then-Compression System
via Prediction Error Clustering and Random Permutation”, IEEE Transactions
on information forensic and security,vol.9,No.1,january 2014.
[2] M. Gomathymeenakshi, S. Sruti, B. Karthikeyan, Meka Nayana, “An
Efficient Arithmetic Coding Data Compression with Steganography”, IEEE
International Conference on Emerging Trends in Computing, Communication
and Nanotechnology, 2013.

[3] K. Ashok Babu and V. Satish Kumar, “Implementation of Data
Compression Using Huffman Coding”, Methods and Models in Computer
Science (ICM2CS), 2010 International Conference on , vol., no., pp.70,75, 1314 Dec. 2010.
[4] Monica Adriana Dagadit, Emil Ioan Slusanschi ,Razvan Dobre, “Data
Hiding Using Steganography”, IEEE 12th International Symposium on
Parallel and Distributed Computing, 2013.
[5] O. P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi, “Peformance
Analysis Of Data Encryption Algorithms”, IEEE 2011.
[6] Jyoti Gaba, R.C. Mishra, “A Review Based Study of Hybrid Security Schemes
Based on Compression, Encryption and Steganography”,International Journal of
Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- July 2013.
[7] Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid, “Run Length
Encoding Scheme with Introduction of Bit Stuffing for efficient Data
Compression”, International Conference for internet Technology and Secured
Transactions,2011.
[8] Senthil Shanmugasundaram, Robert Lourdusamy, “A Comparative Study Of
Text Compression Algorithms”, International Journal of Wisdom Based
Computing, Vol. 1 (3), December 2011.
[9] G. Manikandan, N. Sairam and M. Kamarasan, “A Hybrid Approach for
Security Enhancement by Compressed Crypto-Stegno Scheme”, Research Journal
of Applied Sciences, Engineering and Technology 4(6): 608-614, 2012.
An Efficient encryption using Data compression towards Steganography,introducing arithmetic coding.

Contenu connexe

Tendances

DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...
IJECEIAES
 
Image encryption
Image encryptionImage encryption
Image encryption
rakshit2105
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Marisa Paryasto
 

Tendances (19)

Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
OPTIMIZED HYBRID SECURITY MECHANISM FOR IMAGE AUTHENTICATION AND SECRECY USIN...
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...Hide text depending on the three channels of pixels in color images using the...
Hide text depending on the three channels of pixels in color images using the...
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
R04405103106
R04405103106R04405103106
R04405103106
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption Extended of TEA: A 256 bits block cipher algorithm for image encryption
Extended of TEA: A 256 bits block cipher algorithm for image encryption
 
Image encryption
Image encryptionImage encryption
Image encryption
 
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATDATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMAT
 
An approach to empirical Optical Character recognition paradigm using Multi-L...
An approach to empirical Optical Character recognition paradigm using Multi-L...An approach to empirical Optical Character recognition paradigm using Multi-L...
An approach to empirical Optical Character recognition paradigm using Multi-L...
 
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
Issues in Elliptic Curve Cryptography Implementation - Internetworking Indone...
 

En vedette

Introduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhoneIntroduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhone
rohitnayak
 
Hardware and Software parallelism
Hardware and Software parallelismHardware and Software parallelism
Hardware and Software parallelism
prashantdahake
 
Teresa's Buisness Communication Presentation
Teresa's Buisness Communication PresentationTeresa's Buisness Communication Presentation
Teresa's Buisness Communication Presentation
teresasilva1966
 

En vedette (20)

Mcse notes
Mcse notesMcse notes
Mcse notes
 
Introduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhoneIntroduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhone
 
Groovy & Grails: Scripting for Modern Web Applications
Groovy & Grails: Scripting for Modern Web ApplicationsGroovy & Grails: Scripting for Modern Web Applications
Groovy & Grails: Scripting for Modern Web Applications
 
Race TRAINING
Race TRAININGRace TRAINING
Race TRAINING
 
Hardware and Software parallelism
Hardware and Software parallelismHardware and Software parallelism
Hardware and Software parallelism
 
Ewriter
EwriterEwriter
Ewriter
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Your Dream is your signature
Your Dream is your signatureYour Dream is your signature
Your Dream is your signature
 
Buisness &management
Buisness &managementBuisness &management
Buisness &management
 
Introduction to Selenium
Introduction to SeleniumIntroduction to Selenium
Introduction to Selenium
 
Teresa's Buisness Communication Presentation
Teresa's Buisness Communication PresentationTeresa's Buisness Communication Presentation
Teresa's Buisness Communication Presentation
 
Business
BusinessBusiness
Business
 
Selenium Architecture
Selenium ArchitectureSelenium Architecture
Selenium Architecture
 
Global buisness presentation
Global buisness presentationGlobal buisness presentation
Global buisness presentation
 
Buisness skills
Buisness skillsBuisness skills
Buisness skills
 
Deepsi ppt on international buisness
Deepsi ppt on international buisnessDeepsi ppt on international buisness
Deepsi ppt on international buisness
 
Natural language processing
Natural language processingNatural language processing
Natural language processing
 
Introduction to Natural Language Processing
Introduction to Natural Language ProcessingIntroduction to Natural Language Processing
Introduction to Natural Language Processing
 
Nino
NinoNino
Nino
 
Entrepreneurship & small business management
Entrepreneurship  & small business managementEntrepreneurship  & small business management
Entrepreneurship & small business management
 

Similaire à An Efficient encryption using Data compression towards Steganography,introducing arithmetic coding.

Similaire à An Efficient encryption using Data compression towards Steganography,introducing arithmetic coding. (20)

Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs User Selective Encryption Method for Securing MANETs
User Selective Encryption Method for Securing MANETs
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

An Efficient encryption using Data compression towards Steganography,introducing arithmetic coding.

  • 1. A Seminar on Mini-project An Efficient Encryption using Data Compression towards Steganography . Presented by Prashant Dahake Mtech CSE Dept. of Computer Science & Engineering 2013-2014 1 1 1
  • 2. Outlines        Introduction Review of Literature Methodology Block Diagram of Proposed System Research Contribution Conclusion References
  • 3. Introduction  Data transmission must be secure enough to be used in channel medium without any loss and tampering of data. Secure transmission of data is a key issue in the field of information technology.[2]  Data sent must be in compact way. Compactness is achieve through data compression, which reduces storage space or transmission capacity of the information.  Data compression is formally called as bit rate reduction. Which focuses on reducing the number of bits representing the secret information. Types of data compression  Lossy  Lossless
  • 4. Review of literature Sr. No Author Title Methodology Inference Drawn 1 K. Ashok Babu and V. Satish Kumar Implementation of Data Compression Using Huffman Coding.2010 [3] It makes an use of probability of occurrence of each character in the message.  Use tree structure and top down approach  Each symbol is represented by variable length code  not that much efficient. G. Manikandan, N. Sairam and M. Kamarasan A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme (2012)[9]  LZW (LempelZiv-Welch) algorithm  uses Dictionary It replaces strings of characters with single Code 2
  • 5. Continue….. Sr. No. 3 4 Author Title Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid Run Length Encoding Scheme with Introduction of Bit Stuffing for efficient Data Compression (2011)[7] M.S.Sutaone, M.V. Khandare Image based steganography using LSB insertion technique [2008] Methodology • RLE algorithm • Uses LSB technique. (without any compression technique) Inference Drawn  Consecutive bits are counted and store as single value with its run.  not always produce compression  when size of the data increases, one can identify difference between images
  • 6. Methodology  Arithmetic coding compression technique is used. It converts stream of plaintext into single floating point number[1] and range of floating point number is between [0,1].  It has high compression ratio than any other compression technique.   It is based on probability of each character[2]. Calculated as Where P= probability of character C= Occurrence of the character L= Length of the plaintext
  • 7. Fig. 1 Working of Arithmetic Coding
  • 8. Block diagram of proposed system PLANE TEXT ARITHMETIC CODING DATA COMPRESSION FLOATING POINT NUMBER BINARY CODED FORM ENCRYPTION IMAGE BINARY CODED FORM STEGANOGRAPHY (EMBEDDING) Fig. 2 Process at Sender side STEGO IMAGE
  • 10. Research Contribution  Compactness is achieved using Data compression technique, that is by using arithmetic coding. It provide some amount of security to secret data.  But in proposed system additional security is provided to data by using Encryption technique , which makes an use of any cryptographic algorithm and it is applied on the compressed data.  Provides confidentiality and secrecy to data.
  • 11. Conclusion  Thus the proposed system can provides an efficient manner for the transmission of the secret information from one authorized user to the other.  From the study of literature, Compressed data required less storage capacity, so more amount of information can be hided inside the image.
  • 12. References [1] Jiantao Zhou, Xianming Liu, Oscar C. Au, Fellow, and Yuan Yan Tang, Fellow, “Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation”, IEEE Transactions on information forensic and security,vol.9,No.1,january 2014. [2] M. Gomathymeenakshi, S. Sruti, B. Karthikeyan, Meka Nayana, “An Efficient Arithmetic Coding Data Compression with Steganography”, IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology, 2013. [3] K. Ashok Babu and V. Satish Kumar, “Implementation of Data Compression Using Huffman Coding”, Methods and Models in Computer Science (ICM2CS), 2010 International Conference on , vol., no., pp.70,75, 1314 Dec. 2010. [4] Monica Adriana Dagadit, Emil Ioan Slusanschi ,Razvan Dobre, “Data Hiding Using Steganography”, IEEE 12th International Symposium on Parallel and Distributed Computing, 2013. [5] O. P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi, “Peformance Analysis Of Data Encryption Algorithms”, IEEE 2011.
  • 13. [6] Jyoti Gaba, R.C. Mishra, “A Review Based Study of Hybrid Security Schemes Based on Compression, Encryption and Steganography”,International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 7- July 2013. [7] Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid, “Run Length Encoding Scheme with Introduction of Bit Stuffing for efficient Data Compression”, International Conference for internet Technology and Secured Transactions,2011. [8] Senthil Shanmugasundaram, Robert Lourdusamy, “A Comparative Study Of Text Compression Algorithms”, International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011. [9] G. Manikandan, N. Sairam and M. Kamarasan, “A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme”, Research Journal of Applied Sciences, Engineering and Technology 4(6): 608-614, 2012.