A SECURE QUANTUM IMAGE STEGANOGRAPHY BASED ON
SCRAMBLING MATRIX GRAPHICAL CODING WITH SEMANTIC
POLYNOMIAL ELAGAMAL ALGORITHM
Abstract:-
It is well known that Heisenberg uncertainty principle, measurement collapse
principle and quantum non-cloning principle belong to three fundamental principles
of quantum mechanics. Based on these fundamental principles, quantum secure
communication plays an extremely significant role in information communication.
Embedding secret information into quantum carrier image for covert communication
is one of significant research fields of quantum secure communication. Using good
imperceptibility and high embedding efficiency of matrix coding, this paper proposes a
scrambling matrix graphical coding-based quantum steganography algorithm for
quantum color images. Firstly, the scrambling matrix graphical coding is used to
scramble the original information image. Once the scrambling can be done it can be
stored in the cloud. Then by using the semantic polynomial elagamal algorithm will
offer high range of security to the scrambled data. Initialization of the suggested
security algorithm will generate a key for the secure message. Based on time-
synchronization between the authentication server and the client the generated OTP
can valid for a particular period of time. Then the OTP can be generated for getting
the key information. After getting the security key the stored information (data and
images) can gets accessed by the user separately. On account of experimental
simulation obtained in the MATLAB environment, it shows that the suggested
algorithm has good performance in imperceptibility, security, efficiency and the
capacity.
Key Terms:- Quantum image steganography, scrambling matrix graphical coding
matrix coding, security, polynomial elagamal algorithm
1.INTRODUCTION
Data hiding is of importance in many applications. For hobbyists, secretive data
transmission, for privacy of users etc. the basic methods are: Steganography and
Cryptography. Steganography is a simple security method. Generally there are three
different methods used for hiding information: steganography, cryptography,
watermarking. In cryptography, the information to be hidden is encoded using certain
techniques; this information is generally understood to be coded as the data appears
nonsensical.
Steganography is hiding information; this generally cannot be identified because
the coded information doesn’t appear to be abnormal i.e. its presence is undetectable by
sight.
Detection of steganography is called Steganalysis.
Steganography is of different types:
1. Text steganography
2. Image steganography
3. Audio steganography
4. Video steganography
In all of these methods, the basic principle of steganography is that a secret message is to
be embedded in another cover object which may not be of any significance in such a way
that the encrypted data would finally display only the cover data. So it cannot be detected
easily to be containing hidden information unless proper decryption is used. In this
project a novel method is implemented and is discussed for image steganography. .NET
is used for coding.
2.LITERATURE SURVEY
S.no Author Algorithm Advantage Disadvantage
1 (Rachmawanto DCT with High data broken using
and Sari 2017) OTP security brute-force
search
2 (Emad, et al. 2018) integer Manage high Encryption keys
wavelet data files aren't simple
transform strings
3 (Saeed, et al. 2020) Adaptive High accuracy Slower
embedding encryption
algorithm speed
4 (Nguyen, et al. JND High secrecy High cost
2020)
5 (Al-Sanjary, et al. AES More High
2020) mathematically computation
efficient time
6 (Ansari, et al. Embedded Supports High cost
2020) security larger key sizes
algorithm
7 (ALabaichi, et al. LSB faster in both High memory
2020) hardware and
software
8 (Khaleel, et al. LSB+Zero extremely hard High memory
2021) crossing K- to find any
means major
weakness.
9. (AlKhodaidi, et al. LSB Manage high Less security
2021) security data files
10 (AbdelRaouf and Data hiding Support large Low speed of
Applications 2021) approach datas encryption
3.EXISTING METHOD0LOGY
Although security, privacy and trust problems have existed since the Internet
evolution, it is because of cloud computing that they are widely discussed today. Any
customer / small company processing the data in the cloud is subject to inherent risk
because of outsourced services bypassing the user's "physical, logical and personal
controls." Users might want to make sure that one’s data is stored correctly and retrieved
afterwards when storing data in the cloud. Since it is possible to store enormous amounts
of data in a cloud for clients, it is not practical (and could also be extremely expensive) to
recover all data, only to make sure it is properly stored. Such guarantees must therefore
be provided to a customer. It is therefore very important that both the cloud provider and
the user have mutual trust so that the cloud provider can be assured that the user isn't a
malicious hacker and that data coherence and data storage can be guaranteed. Therefore,
there is a demanding need to develop trust models / protocols.
4.FUNCTIONAL REQUIREMENTS
Functional requirements are the requirements that that specifies behavior or function of
the system.
_ Login: Login function will authenticate the sender if username and password are
correct Otherwise it will exit the system.
_ Secret Text Message File: In this you will have to write secret message to hide or you
can select any text of secret message.
_ Cover Image: Cover Image is the image is to be selected in which secret text message
can be hidden.
_ Stego Encryption implementation is performed on cover image to hide secret text
message by replacing bits of cover image by the bits of message.
_ Sender In this Sender send this stego image to intended recipient to which he does
want to communicate.
_ Receiver In this receiver receives the stego image and opens in decryption option for
getting hidden text message inside that image.
Sender and Receiver should make sure that only they are having the same software to
encrypt and decrypt data inside image. Both should take care of eavesdropping.
_ Security Requirements: We are going to develop a software in which embedding secret
text data in image. Only sender and receiver should be aware of encrypted file. User
should not unfold the message regarding sent image as well as receiver information.
_ Software Quality Attributes:
The Quality of the software is maintained in such a way that only sender and receiver
can communicate through image. There is no probability of knowing secret image.
5. IMPLEMENTATION
In scrambling matrix graphical coding matrix coding method, the most common method
used. It is a common, simple approach to scramble the information in a cover file. This
pixel information is stored in encoded format in one byte. The first bits containing this
information for every pixel can be modified to store the hidden text. For this, the
preliminary condition is that the text to be stored has to be smaller or of equal size to the
image used to hide the text. It is known that the pixels in an image are stored in the form
of modified bits. In a grayscale image, the intensity of each pixel is stored in 8 bits
(1byte). Similarly for a colour (RGB-red, green, blue) image, each pixel requires 24 bits
(8bits for each layer). The suggested security mechanism guarantees a secure and
efficient cloud-based data exchange. The ElGamal Algorithm provides an alternative to
the RSA for public key encryption. Many modern ABE strategies with only one authority
can manage private and public keys. For certain instances, system administrators share
data with consumers managed by a separate agency. Several multi-authorities have been
established to address this issue. A data holder has access control systems for updating
the ciphertext and attributes with similar status. A security algorithm for weighting cloud
storage record attributes is used in the suggested scheme. The Polynomial ELGamal
symmetric 64-bit Block cipher has a variable-long address of 32 to 448-bit (14 bytes).
The algorithm was built to encrypt 64-bit plaintext in 64-bit ciphertext accurately and
consistently.
Table scan, node, addition, and bit by bit are included in choosing the algorithm's
operations or to minimize the required 32-bit processor encryption and decryption period.
The algorithm was consciously designed to keep the code functions simple and
straightforward without affecting safety. As with DES (Data Encryption
Standard),Polynomial ELGamal has a 16 round feistel network for encryption and
decoding. However, after each Polynomial ELGamal round, 32-bit information is
modified on the left and right, compared with DES, which changes only the correct 32-bit
to the next round, which finally turns to the left. Polynomial ELGamal included a bit-
exclusive 32-bit operation on the left before the modified F function or 32-bit operation
on the right for the next round. Polynomial ELGamal is also composed of two proprietary
activities and an exchange process after 16 tests. The mechanism relies on the form of the
DES permutation.
The Polynomial ELGamal algorithms for coding, decrypting, and generating keys
are included in the proposed system layout. In turn, a code matching process is used to
authenticate the results. The program, instead, creates user weight depending on its
functionality. Usually, the Polynomial ELGamal algorithm is split into two parts viz. Key
extension and key encryption. The data is encrypted in 16 circles. Displacement and
substitution dependent on keys and data are always done every time. This add-on is made
in contrast with 32 bits (four indexed search tables). All these are shown in Polynomial
ELGamal. The CA must give the customer one user identification as a single user
connected to the network.
Nonetheless, the user ciphers the characteristics and gives them to the authority
with their signature. The characteristic of legitimacy authenticates the identity of the user.
If the new user is the right leader, secret keys and weight will be established. A secret key
is transmitted by CA and authorities to the network and individually gives the current
user a secret key. The challenger would be provided with the right keys by using setup
and software algorithms from the central authority and distributing public keys to the
attacker. The data manager logs in with a single ID and selects a symmetrical dataset key
randomly until a data file is transmitted to the server. Firstly, the computer consumer
installs cloud computing and uses a decryption algorithm to decrypt it. If the secret key
provided by the data owner has been approved, the method calculates those weights by
value. The recipient can decrypt the data file associated with the weighted text.
Algorithm 1 (Polynomial ELGamal algorithm)
Launch (& ctx, key,); Polynomial ELGamal;
printf("Plaintext string is: percent s\n, "string of plaintext");
/ * Crypt plaintext of the response list * /
printf("Crypted string is:);
Though (len of plaintext)
Left response = Wrong request = UL;
Crack the message string of 64-bit (ok, 2 truly 32-bit); zero pad, if required * / / *
For (len block = 0; len block > < 4;)
Left Message = Left Answer < minus 8;
Where (len plaintext)
+ * string++ plaintext; len — plaintext;
}
Left post + = 0;
}
(Strength block = 0; power of block < 4; strands of block + +)
message row = message row < 8; message row
When (len lens plaintext).
Right message + = * string++ plaintext;
complaints: complaints —; complaints;
}
Right to message + = 0 else;
}
/ * Encrypt and show reports * / *
Polynomial ELGamal encryption (& ctx, & wrong post, & correct post);
printf('%lx%lx,' left message, right message);
/ * Decryption performance update under * /
* ciphertext(left message)>24)(link message). * (link message).
(string++ = (uint8 t)(name > > 16);
* ciphertext string++(message left > > 8);
[122] Rd+= [108](1)capture back; back capture;
* string++= ciphertext (uint8 t)(communication > > 24);
(string++) (uint8 t)(droit>>16 message);
(uint 8 t)(message right > > 8)); * ciphertext string++
(uint8 t)message right; (1)message right;
+ = 8; ciphertext len
square("\n);
/ * Invert the cycle * / if decryption is required
}
square("\n);
return 0;
}
6.MODULES:
Admin stego module
User module
Encrypting module
Data hiding module
Decryption module
Cloud storage
Admin stego module
Once the admin module is open it will link to the database. This module is also
responsible for apply settings in the other module.Secret module consists of two
attributes secret text and cover image as well as two operations as select secret text() and
select cover image().
User module
User have the registration and login module.By the registration module students can
enroll their details,during this enrollment he/she can create unique username and
password.If they want to make data secrecy about the particular image they can use that
username and password to access the software and make the process.
Encryption module
In the Encryption module is the process of hiding secret image into text, by using
the suggested algorithm.
Data hiding module
By using the suggested algorithm the image can be hided inside the text
Decryption module
It separates the secret text from the image.
Cloud storage module
In this process the encrypted data can be store in the cloud securely.
Advantages
_ The main advantages of this system is Security that it provides security to your
messages without knowing to third party.
_ Number of bits have been replaced according to user or sender, therefore third
party can not quess password.
_ Normal network user cant guess image.
_ In steganography anyone cant jump on suspect by looking images.
_ It is Reliable.
_ Easy to use.
_ Easy Maintenance.
_ System have been secured by password authentication.
Disadvantages
_ Images can have attacks like diluting, nosing, contrast changes and so on.
_ Number bits of pixel should be replaced by equal bits of message.
_ If someone is eavesdropping then then there is probability of message get unfold.
_ If more than two people having same steganography software then hidden mas-
sage can acquire.
_ This software has been implemented by java, which is open source, therefore
code is readable so anyone with bad mentality can make software perform inverse
operation.
_ Only unintended user may know the actual working of software.
_ Intruder may penetrate suspecting images to get hidden data.
Application
i) Confidential Communication and Secret Data Storing.
ii) Protection of Data Alteration.
iii) Access Control System for Digital Content Distribution.
iv) E-Commerce.
v) Media.
vi) Database Systems.
vii) Digital Watermarking.
7.CONCLUSION AND FUTURE ENHANCEMENT
Steganography, though is still a fairly new idea. There are constant advancements in the
computer field, suggesting advancements in the field of steganography as well. It is likely
that there will soon be more efficient and more advanced techniques for Steganalysis. A
hopeful advancement is the improved sensitivity to small messages. Knowing how
difficult it is to detect the presence of a fairly large text file within an image, imagine how
difficult it is to detect even one or two sentences embedded in an image! It is like finding
a microscopic needle in the ultimate haystack. What is scary is that such a small file of
only one or two sentences may be all that is needed to commence a terrorist attack. In the
future, it is hoped that the technique of Steganalysis will advance such that it will become
much easier to detect even small messages within an image. In this work it explores only
a small part of the science of steganography. As a new displine, there is a great deal more
research and development to do. The following section describe areas for research which
were shoots of, or tangential to, our main objectives.: Can steganography be detected in
images .This is difficult question. It may be possible to detect a simple Steganographic
technique by simple analyzing the low order bits of the image bytes. If the
Steganographic algorithm is more complex, however, and spreads the embedded data
over the image is random way or encrypts the data before embedding, it may be nearly
impossible to detect.
Future scope
1.Steganography on the World Wide Web:
The world wide web(www) makes extensive use of inline images. There are literally
millions of images on various web pages worldwide. It may be possible to develop an
application to serve as a web browser to retrieve data embedded in web page images.
This stego-web could operate on top of the existing WWW and be a means of covertly
disseminating information.
2.Steganography in printed media:
If the data is embedded in an image, the image printed, then scanned and stored in
a file can the embedded data be recovered?
This would require a special form of a steganography to which could allow for in
accuracies in the printing and scanning equipment.
8.REFERENCES
1. AbdelRaouf AJMT & Applications 2021, ‘A new data hiding approach for image
steganography based on visual color sensitivity’, pp. 1-25.
2. Al-Sanjary OI, Ibrahim OA & Sathasivem K 2020, ‘A New Approach to Optimum
Steganographic Algorithm for Secure Image’, 2020 IEEE International Conference
on Automatic Control and Intelligent Systems (I2CACIS), pp. 97-102.
3. ALabaichi A, Al-Dabbas MaAAK, Salih AJIjoe & engineering c 2020, ‘Image
steganography using least significant bit and secret map techniques’, vol. 10, no. 1
4. AlKhodaidi T, Gutub AJMT & Applications 2021, ‘Refining image steganography
distribution for higher security multimedia counting-based secret-sharing’, vol. 80,
no. 1, pp. 1143-1173.
5. Ansari AS, Mohammadi MS & Parvez MTJIA 2020, ‘A multiple-format
steganography algorithm for color images’, vol. 8, pp. 83926-83939.
6. Emad E, Safey A, Refaat A, Osama Z, Sayed E, Mohamed EJJoSE, et al. 2018, ‘A
secure image steganography algorithm based on least significant bit and integer
wavelet transform’, vol. 29, no. 3, pp. 639-649.
7. Khaleel AH, Abduljaleel IQJIJoEE & Science C 2021, ‘Secure image hiding in
speech signal by steganography-mining and encryption’, vol. 21, no. 3, pp. 1692-
1703.
8. Nguyen TD, Le DHJIJoE & Engineering C 2020, ‘A secure image steganography
based on JND model’, vol. 10, no. 2, p. 2088.
9. Rachmawanto EH & Sari CAJJoAIS 2017, ‘Secure image steganography
algorithm based on dct with otp encryption’, vol. 2, no. 1, pp. 1-11.
10. Saeed A, Khan MJ, Shahid H, Naqvi SI, Riaz MA, Khan MS, et al. 2020, ‘An
Accurate Texture Complexity Estimation for Quality-Enhanced and Secure Image
Steganography’, vol. 8, pp. 21613-21630.