International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Evolutionary Computing Assisted Visually-Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment

Author NameAuthor Details

Denis R, Madhubala P

Denis R[1]

Madhubala P[2]

[1]Department of Computer Science, Periyar University, Salem, Tamil Nadu, India

[2]PG & Research Department of Computer Science, Don Bosco College, Dharmapuri, Tamil Nadu, India

Abstract

The exponential growth of communication technologies and related application environments has broadened the cloud computing ecosystem horizon to meet major communication needs. However, in-parallel upsurge in online attacks, security breaches or allied intrusion events has alarmed industries to ensure optimal data security. Unlike text data transmission, image, or other multimedia communication over the cloud requires computational efficiency, imperceptibility, etc. to meet attack-resilient transmission. Amongst the major available security systems, the combination of cryptosystems and steganography has been identified as an augmented security model for data transmission. However, it demands enhancement in both stages to meet cloud-specific communication efficiency. Considering it as motivation, in this paper an efficient Visually Imperceptible Hybrid Crypto-Steganography (VIHCS) model is developed using Hybrid Cryptosystems followed by Adaptive Genetic Algorithm assisted Least Significant Bit (LSB) embedding process. We developed a novel Hybrid Cryptosystem by strategically applying Advanced Encryption Standard (AES) and Rivest–Shamir–Adleman (RSA) algorithms to secure secret data to be embedded in a cover image. In addition, the use of the Adaptive Genetic Algorithm based Optimal Pixel Adjustment (AGA-OPAP) strengthened the Least Significant Bit embedding while retaining the best possible image quality and visual imperceptibility. The proposed model achieved higher security, high embedding capacity as well as image quality, which is vital for cloud communication. To perform LSB embedding we applied 2D-Discrete Wavelet Transform (2D-DWT-2L) method with 8×8 dimensional block-wise embedding. It helps to achieve better embedding efficiency in conjunction with the AGA-OPAP model. Simulation results and respective visio-statistical assessment revealed that the proposed VIHCS model can accomplish better performance and reliable secure data communication over the cloud environment. Thus, the VIHCS model achieves maximum possible imperceptibility and hence can avoid attacks- such as steganalysis based attack or RS-attacks.

Index Terms

Secure Data Transmission

Cloud Environment

Hybrid Cryptography-Steganography Model

Evolutionary Computing

Encryption and Decryption

Adaptive Genetic Algorithm (AGA)

Least Significant Bit (LSB)

Reference

  1. 1.
    R. K. Gupta and P. Singh, “A new way to design and implementation of hybrid crypto system for security of the information in public network,” Int. J. Emerg. Technol. Adv. Eng., vol. 3, no. 8, pp. 108-115, 2013.
  2. 2.
    Anupam Kumar Bairagi, Rahamatullah Khondoker & Rafiqul Islam (2016) An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures, Information Security Journal: A Global Perspective, 25:4-6, 197-212, DOI: 10.1080/19393555.2016.1206640.
  3. 3.
    Sajjad, M., Muhammad, K., Baik, S.W. et al. Mobile-cloud assisted framework for selective encryption of medical images with steganography for resource-constrained devices. Multimed Tools Appl 76, 3519–3536 (2017). https://doi.org/10.1007/s11042-016-3811-6
  4. 4.
    Darwish, A., Hassanien, A.E., Elhoseny, M. et al. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Human Comput 10, 4151–4166 (2019). https://doi.org/10.1007/s12652-017-0659-1
  5. 5.
    Y. Xu, X. Zhao and J. Gong, "A Large-Scale Secure Image Retrieval Method in Cloud Environment," in IEEE Access, vol. 7, pp. 160082-160090, 2019, doi: 10.1109/ACCESS.2019.2951175
  6. 6.
    Mersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios Tsakalidis, Health Internet of Things: Metrics and methods for efficient data transfer, Simulation Modelling Practice and Theory, Volume 34, 2013, Pages 186-199, https://doi.org/10.1016/j.simpat.2012.08.002
  7. 7.
    Muhammad Sajjad, Mansoor Nasir, Khan Muhammad, Siraj Khan, Zahoor Jan, Arun Kumar Sangaiah, Mohamed Elhoseny, Sung Wook Baik, Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities, Future Generation Computer Systems, Volume 108, 2020, Pages 995-1007, ISSN 0167-739X, https://doi.org/10.1016/j.future.2017.11.013.
  8. 8.
    Laskar, Shamim. (2012). High Capacity data hiding using LSB Steganography and Encryption. International Journal of Database Management Systems. 4. 57-68. 10.5121/ijdms.2012.4605.
  9. 9.
    May Zaw, Z., & Phyo, S. W. (2015). Security Enhancement System Based on the Integration of Cryptography and Steganography. International Journal of Computer (IJC), 19(1), 26-39
  10. 10.
    L. Yu, Z. Wang and W. Wang, "The Application of Hybrid Encryption Algorithm in Software Security," 2012 Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, 2012, pp. 762-765, doi: 10.1109/CICN.2012.195.
  11. 11.
    Parah S.A., Sheikh J.A., Ahad F., Bhat G.M. (2018) High Capacity and Secure Electronic Patient Record (EPR) Embedding in Color Images for IoT Driven Healthcare Systems. In: Dey N., Hassanien A., Bhatt C., Ashour A., Satapathy S. (eds) Internet of Things and Big Data Analytics Toward Next-Generation Intelligence. Studies in Big Data, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-319-60435-0_17
  12. 12.
    Li, L., Hossain, M.S., El-Latif, A.A.A. et al. Distortion less secret image sharing scheme for Internet of Things system. Cluster Comput 22, 2293–2307 (2019). https://doi.org/10.1007/s10586-017-1345-y
  13. 13.
    B. Xue, X. Li and Z. Guo, "A New SDCS-based Content-adaptive Steganography Using Iterative Noise-Level Estimation," 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Adelaide, SA, 2015, pp. 68-71, doi: 10.1109/IIH-MSP.2015.80.
  14. 14.
    Vipula Madhukar Wajgade, "Enhancing Data Security Using Video Steganography," International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 4, April 2013.
  15. 15.
    Marwa E. Saleh, Abdelmgeid A. Aly and Fatma A. Omara, "Data Security Using Cryptography and Steganography Techniques" International Journal of Advanced Computer Science and Applications (IJACSA), 7(6), 2016. http://dx.doi.org/10.14569/IJACSA.2016.070651
  16. 16.
    M. E. Saleh, A. A. Aly, and F. A. Omara, "Enhancing Pixel Value Difference (PVD) Image Steganography by Using Mobile Phone Keypad (MPK) Coding," International Journal of Computer Science and Security (IJCSS), Volume (9), Issue (2), pp. 397 - 397, 2015
  17. 17.
    A. Duluta, S. Mocanu, R. Pietraru, D. Merezeanu and D. Saru, "Secure Communication Method Based on Encryption and Steganography," 2017 21st International Conference on Control Systems and Computer Science (CSCS), Bucharest, 2017, pp. 453-458, doi: 10.1109/CSCS.2017.70.
  18. 18.
    Dhvani Panchal, "An Approach Providing Two Phase Security of Images Using Encryption and Steganography in Image Processing", 2015 IJEDR, Volume 3, Issue 4, ISSN: 2321-9939.
  19. 19.
    Y. Leung and R. Y. Hou, "Unequal security protection for secure multimedia communication," 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), Osaka, 2015, pp. 570-571, doi: 10.1109/GCCE.2015.7398667.
  20. 20.
    J. Li, X. Guo, Y. Yu, Q. Tu and A. Men, "A robust and low-complexity video fingerprint for multimedia security," 2014 International Symposium on Wireless Personal Multimedia Communications (WPMC), Sydney, NSW, 2014, pp. 97-102, doi: 10.1109/WPMC.2014.7014798.
  21. 21.
    D. E. M. Ahmed and O. O. Khalifa, "Robust and Secure Image Steganography Based on Elliptic Curve Cryptography," 2014 International Conference on Computer and Communication Engineering, Kuala Lumpur, 2014, pp. 288-291, doi: 10.1109/ICCCE.2014.88.
  22. 22.
    V. Hajduk, M. Broda, O. Kovac and D. Levicky, "Image steganography with using QR code and cryptography," 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA), Kosice, 2016, pp. 350-353, doi: 10.1109/RADIOELEK.2016.7477370.
  23. 23.
    M. Mukhedkar, P. Powar and P. Gaikwad, "Secure non real time image encryption algorithm development using cryptography & steganography," 2015 Annual IEEE India Conference (INDICON), New Delhi, 2015, pp. 1-6, doi: 10.1109/INDICON.2015.7443808.
  24. 24.
    M. S. Alam, "Secure M-commerce data using post quantum cryptography," 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, 2017, pp. 649-654, doi: 10.1109/ICPCSI.2017.8391793.
  25. 25.
    N. Kumar and S. Agrawal, "An efficient and effective lossless symmetric key cryptography algorithm for an image," 2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014), Unnao, 2014, pp. 1-5, doi: 10.1109/ICAETR.2014.7012788.
  26. 26.
    S. F. Mare, M. Vladutiu and L. Prodan, "Secret data communication system using steganography, AES and RSA," 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME), Timisoara, 2011, pp. 339-344, doi: 10.1109/SIITME.2011.6102748.
  27. 27.
    P.V.Nithyabharathi, T.Kowsalya, V.Baskar, "To Enhance Multimedia Security in Cloud Computing Environment Using RSA and AES", IJSETR, Volume 3, Issue 2, February 2014.
  28. 28.
    Anwar, Asmaa & A.Ghany, Kareem & Elmahdy, Hesham. (2015). Improving the security of images transmission. International Journal of Bio-Medical Informatics and e-Health. 3. 7-13.
  29. 29.
    Xin Liao, Jiaojiao Yin, Sujing Guo, Xiong Li, Arun Kumar Sangaiah, Medical JPEG image steganography based on preserving inter-block dependencies, Computers & Electrical Engineering, Volume 67, 2018, Pages 320-329, ISSN 0045-7906. https://doi.org/10.1016/j.compeleceng.2017.08.020.
  30. 30.
    Balakrishnan Ramalingam , Amirtharajan Rengarajan , John Bosco Balaguru Rayappan , Hybrid Image Crypto System for Secure Image Communication- A VLSI Approach, Microprocessors and Microsystems (2017), doi:10.1016/j.micpro.2017.02.003
  31. 31.
    D. Ravichandran, P. Praveenkumar, J. B. B. Rayappan and R. Amirtharajan, "DNA Chaos Blend to Secure Medical Privacy," in IEEE Transactions on NanoBioscience, vol. 16, no. 8, pp. 850-858, Dec. 2017, doi: 10.1109/TNB.2017.2780881.
  32. 32.
    Mansour, R.F., Abdelrahim, E.M. An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications. Multidim Syst Sign Process 30, 791–814 (2019). https://doi.org/10.1007/s11045-018-0575-3
  33. 33.
    M. A. Usman and M. R. Usman, "Using image steganography for providing enhanced medical data security," 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, 2018, pp. 1-4, doi: 10.1109/CCNC.2018.8319263.
  34. 34.
    M. M. Hashim, M. S. Taha, A. H. M. Aman, A. H. A. Hashim, M. S. M. Rahim and S. Islam, "Securing Medical Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography," 2019 7th International Conference on Mechatronics Engineering (ICOM), Putrajaya, Malaysia, 2019, pp. 1-6, doi: 10.1109/ICOM47790.2019.8952061.
  35. 35.
    Chidambaram, N., Raj, P., Thenmozhi, K. et al. A cloud compatible DNA coded security solution for multimedia file sharing & storage. Multimed Tools Appl 78, 33837–33863 (2019). https://doi.org/10.1007/s11042-019-08166-z
  36. 36.
    Shilpi Harnal, R.K. Chauhan, "Hybrid Cryptography based E2EE for Integrity &Confidentiality in Multimedia Cloud Computing", IJITEE, Volume 10, Issue 8, August 2019.
  37. 37.
    Stoyanov B, Stoyanov B. BOOST: Medical Image Steganography Using Nuclear Spin Generator. Entropy. 2020; 22(5):501.
  38. 38.
    Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd El-Latif AA. A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms. Sensors. 2020; 20(11):3108
  39. 39.
    Madhusudhan, K.N., Sakthivel, P. A secure medical image transmission algorithm based on binary bits and Arnold map. J Ambient Intell Human Comput (2020). (online first) https://doi.org/10.1007/s12652-020-02028-5
  40. 40.
    Emy Setyaningsih, Retantyo Wardoyo, Anny Kartika Sari, Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution, Digital Communications and Networks, 2020, (online first) ISSN 2352-8648, https://doi.org/10.1016/j.dcan.2020.02.001.
  41. 41.
    Hari Mohan Pandey, Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography, Future Generation Computer Systems, Volume 111, 2020, Pages 213-225, ISSN 0167-739X, https://doi.org/10.1016/j.future.2020.04.034.
  42. 42.
    M. Elhoseny, G. Ramírez-González, O. M. Abu-Elnasr, S. A. Shawkat, N. Arunkumar and A. Farouk, "Secure Medical Data Transmission Model for IoT-Based Healthcare Systems," in IEEE Access, vol. 6, pp. 20596-20608, 2018.
  43. 43.
    A Comprehensive Retinal Image Dataset for the Assessment of Glaucoma from the Optic Nerve Head Analysis. Sivaswamy J, S. R. Krishnadas, Arunava Chakravarty, Gopal Dutt Joshi, Ujjwal and Tabish Abbas Syed , JSM Biomedical Imaging Data Papers, 2(1):1004, 2015.
  44. 44.
    Input images available URL, "htttps://homepages.cae.wisc.edu/~ece533/images/".
  45. 45.
    Y. Wu, J. P. Noonan, S. Agaian, "NPCR and UACI Randomness Tests for Image Encryption", Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011, pp.31-38, 2011.
  46. 46.
    Rayappan, D., Pandiyan, M. Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment. Wireless Netw (2020). https://doi.org/10.1007/s11276-020-02486-x.
SCOPUS
SCImago Journal & Country Rank