8
Springer Advances in Intelligent Systems and Computing Series . Data Encryption Using Hybrid Genetic Algorithm JOSEPH EMMANUEL a , SHASHIDHAR V b a Research Scholar, Dept of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: [email protected] b Asst.Professor, Dept. of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: [email protected] Abstract Encryption of data is the key to security in terms of the data hiding and transfer. To achieve this kind of security proposed system can all ways think of different data hiding mechanism. But once a data encryption algorithm established it is easy to crack by the hackers, for this kind of addressed problem proposed system can use genetic algorithm which can be a start to the new generation algorithm. with the help of genetic algorithm and hybrid encryption techniques the security gives the maximum to these kind of problem, which addressing a new concept of making genetic algorithm work in both image steganography and musical encryption. Keywords: Genetic Algorithm, Musical Cryptography, Hybrid Algorithm, Encryption, Decryption 1. Introduction . In this new world of digital technology, the old communication technique has been moved to digital communication with the use of Internet and its subsequent technologies. In the digital communication era, keeping data private is a serious issue that has to be addressed. To move with this task cryptography is used in data security. Thus security is the key to unlock a communication world. Branch of security, which are cryptography, information hiding, steganography and watermarking etc. provides improved role as they take part. As the skill possesses on changing its aspect with advanced features, there is necessary to get apprise. Figure 1: Shows the data encryption & decryption Generally, when a new algorithm technique is created or an existing algorithm is swotted, intruders or hackers break the algorithm. Information security means protection of data access from unauthorized users and hackers or intruders. Thus it is essential to improve algorithms more effective and indestructible. The network security is forked into cryptography and information hiding techniques. Information hiding contains steganography and watermarking methods. In cryptography, encryption of information's takes place at the transmitter and decryption at

final_Paper_springer_final

Embed Size (px)

Citation preview

Page 1: final_Paper_springer_final

Springer Advances in Intelligent Systems and Computing Series.Data Encryption Using Hybrid Genetic Algorithm

JOSEPH EMMANUEL a, SHASHIDHAR V b

aResearch Scholar, Dept of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: [email protected] Asst.Professor, Dept. of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: [email protected]

Abstract

Encryption of data is the key to security in terms of the data hiding and transfer. To achieve this kind of security proposed system can all ways think of different data hiding mechanism. But once a data encryption algorithm established it is easy to crack by the hackers, for this kind of addressed problem proposed system can use genetic algorithm which can be a start to the new generation algorithm. with the help of genetic algorithm and hybrid encryption techniques the security gives the maximum to these kind of problem, which addressing a new concept of making genetic algorithm work in both image steganography and musical encryption.

Keywords: Genetic Algorithm, Musical Cryptography, Hybrid Algorithm, Encryption, Decryption

1. Introduction

. In this new world of digital technology, the old communication technique has been moved to digital

communication with the use of Internet and its subsequent technologies. In the digital communication era, keeping data private is a serious issue that has to be addressed. To move with this task cryptography is used in data security. Thus security is the key to unlock a communication world. Branch of security, which are cryptography, information hiding, steganography and watermarking etc. provides improved role as they take part. As the skill possesses on changing its aspect with advanced features, there is necessary to get apprise.

Figure 1: Shows the data encryption & decryption

Generally, when a new algorithm technique is created or an existing algorithm is swotted, intruders or hackers break the algorithm. Information security means protection of data access from unauthorized users and hackers or intruders. Thus it is essential to improve algorithms more effective and indestructible. The network security is forked into cryptography and information hiding techniques. Information hiding contains steganography and watermarking methods. In cryptography, encryption of information's takes place at the transmitter and decryption at

Page 2: final_Paper_springer_final

the receiver unit. In cryptography, encryption of information's takes place at the transmitter and decryption at the receiver unit.

Messages rather one information to be exchanged is usually in a specific language that we people practice; anyone who knows of language can get the substance of the message without the previous knowledge of the situation. The messages to be communicated are usually called as plain text message. Cryptography is the art of altering a plain text message into meaningless or unreadable message Music and its qualities have been used in cryptography from initial days. Musical symbols and musical notes taken been used as substitution cipher.

The algorithms applied to musical cryptography custom predefined set of notes and rules for the blend of musical designs. The main task in the musical cryptography is to produce musical cryptograms which in chance are good order of musical designs peaceful to ear. Apart from cryptographic algorithms Steganography remains used in hiding messages. Unseen inks and Microdots are the samples of submission of steganography. Steganography is the skill of hiding secret messages into another message, audio and videos are generally used as cover file to hide furtive messages. By this it also conceals the reality of the message.

2. Literature Survey

The survey papers of genetic algorithm and data encryption techniques, after analysing the paper we came to conclusion that what can be done in the proposed system. The rapid developments of the communication and applications of multimedia techniques in recent years lead the researchers to focuses on the security of digital data over the internet. In this paper we have discussed the use of Elliptical Curve Cryptography for ciphering colour images. The adoption of elliptic curve cryptography in to cyphering images will make more consecutive solutions for the entire process. The main advantage of this method is that the time taken to implement the entire working system will be less and also it will take less hardware requirements to implement the entire cryptographic system. Also people with less knowledge about high end cryptographic procedures can establish the algorithm with less time which will make the entire idea more popular.

But the solitary problem is that the time taken for the process to complete the entire procedure. All the calculation part will take less time but delivering the entire key distribution process will be high and there is precise guaranty for the security of these distribution processes. It considers deploying the algorithm in small application systems, it will make the process slow which lead to more problematic cryptographic establishments. Finally, the security provided doesn’t meet high end applications like military data transfer or similar process, which needed more security. Genetic algorithm (GA) based symmetric key musical cryptography algorithm is proposed to obtain an optimal sequence of musical patterns as a cipher message. Other than all cryptographic methods it’s having the ability to deliver a new system with high security become the musical encryption will need more knowledge on musical notes which will make confusion for the hacker to decrypt the data. Without knowing the actual algorithm, it is hard to break the code as the algorithm dealing with high end musical knowledge.

But on the other hand it will have other problems like implementation of the algorithm will consume more time and also it will take more time to process data and convert in to a useful encrypted data. If beginner try to implement the algorithm it will make almost impossible implement the entire system as the knowledge needed for the process is different than others. The idea of musical encryption is like double bladed sword as it will make confusion to the hacker as well as to the person actually try to implement the algorithm. Also the implementation and hardware requirements for the system is high compared to the other algorithms.

The textual information related to the secret image is embedded into the secret image with the help of data hiding techniques before dividing it into fragments. The main advantage of this technique is that it will provide two layers of security. The first layer will be encoded the data into a single image and second layer will combine the encrypted image into another image. By giving this two-layer encryption it will be hard to crack the encryption code and having knowledge the simple image encryption will give the ability to understand the algorithm easier. But

Page 3: final_Paper_springer_final

again looking into the problem side, it will make more encryption time as well as it need more processing resources to complete the algorithm.

3. DescriptionSteganography is a division of data hiding. It allows the people to communicate secretly. As increasingly more

material becomes available electronically, the influence of steganography on our lives will continue to grow. Much confidential information was leaked to a rival firm using stenographic tools that hid the information in music and picture files. It is the process of hiding the information in to a picture and converting into a new picture with new pixel image. These images usually contain private or confidential information which are to be protected from exposure due to leakages during transmissions.

The whole system works in above mentioned manner. The system mainly consists of seven intermediate processes or modules. The following are the list of modules.

• Image steganography module• Image merging module• P2b module• Musical encryption module• RNG module• SNG module• Genetic Algorithm moduleStep by step execution of these modules produce the final encrypted file which containing the text. These

modules will process the data concurrently in order to produce the output in encryption and decryption.

3.1 Module Description Encryption is process of hiding data in the multiple files or single file to produce stronger output file which is hardly unable to understand the encryption standard is used will determine the power of hiding image. it is essential to improve algorithms more effective and indestructible. The network security is forked into cryptography and information hiding. Information hiding contains steganography and watermarking.

Whereas Decryption is process of verdict data from the multiple files or single file to produce actual data file which is easy to understand. The decryption standard is used will determine the power of accessing image. It is essential to improve algorithms more effective and indestructible. The network security is forked into cryptography and information hiding. Information hiding contains steganography and watermarking.

3.1.1Encryption

In cryptography, encryption of data's takes place at the transmitter and decryption at the receiver section. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are release of message contents and traffic analysis.

3

Page 4: final_Paper_springer_final

Figure 4: Dataflow diagram for system encryption process

Figure 4 shows the actual encryption process of all module .in this step certain individual processes to form the actual encoding. This consists of certain steps like musical encryption, data steganography, image hiding etc.

3.1.2DecryptionIn cryptography, decryption of data's takes place at the transmitter and decryption at the receiver section.

Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is hidden but as the algorithm providing high security its becomes impossible.

Figure 5: Dataflow diagram for system decryption process

Page 5: final_Paper_springer_final

Figure 5 shows the actual decryption process of all module .in this step certain individual processes to form the actual decoding. This consists of certain steps like musical encryption, data steganography, image hiding to produce the actual message.

4. System Design

Steganography is a branch of information hiding. It allows the people to communicate secretly. As increasingly more material becomes available electronically, the influence of steganography on our lives will continue to grow. Much confidential information was leaked to a rival firm using stenographic tools that hid the information in music and picture files. It is the process of hiding the information in to a picture and converting into a new picture with new pixel image. These images usually contain private or confidential information which are to be protected from exposure due to leakages during transmissions.

Image Steganography: In this particular stage data encryption will take its first step of transferring the data into a hided message. This stage is achieved by two methods called image data transform and image data merging. These two methods can be implemented one at a time or combination of both. This decision is made by the genetic algorithm in the following modules.

Musical Encryption: By implementation of this method will provide the entire data a new hiding mechanism where data from previous stage will be converted as musical data. Where data will be encrypted using musical notations and properties. RNG Pool: This method is to provide high security for the genetic algorithm to make decision among the different situations to select methods in above mentioned procedures.SNG Pool: this step is to provide validation and legitimacy of the sender and receiver by adding the system information to the data which is hidden.

5

Page 6: final_Paper_springer_final

Figure 2: Architectural diagram of conceptual system

The figure 2 represented the basic conceptual diagram of the proposed system. It’s a waterfall model it’s also having intermediate steps which follows the production of the project. This process will have done two sides, both sender sides as well as receiver side.

The idea of simple image encryption lies in the next figure 3. This explains the basic flow of bits and its conversion. This method is simpler in its procedure. But when this process embedded in to the genetic algorithm its becomes more complicated.

Figure 3: The diagram of image steganography

5. Results and discussion

The proposed system was employed in MATLAB. At first the algorithm will execute the image steganography module in which entire data which needed to code will be stored in the database in the form of bits and the it will have encoded to a grey scale image once the process finished then it will give for the encryption process as the input to musical encryption. In both modules the attributes were given by the GA to extend where it’s impossible to predict. A genetic rule will be produced in order to create this step. The hypothesis space will be calculated by the data taken from both SNG pool and RNG pool. On every time execution the hypothesis space becomes more advanced to produce the advanced encrypted output file.

Figure 6: The screenshot of the Application after Data Hiding

Figure 7: The screenshot of the application after data merging

Page 7: final_Paper_springer_final

                                     

Figure 8: The Screenshot of the Application after applying GA

Conclusion

The musical encryption techniques are attracting more attention because its ability to provide high security for the data. Once the technique is embedded with genetic algorithm its almost make the setup untraceable. Once the image file created it will convert into a normal binary to pixel conversion. This conversion will give the ability to produce a new musical file which contains the data. As the file doesn’t implement any external musical file it will be good to produce high rate encryption file. This step will avoid the ability to match and learn technique and data analysis technique type attacks.

The idea of this encryption is to provide high security towards all kinds of attacks. But even with high security taking high system resources. The encryption and Decryption will take more time than other techniques.

The future work will more focusing on decreasing the processing time and faster execution of the program.it should reflect in such a way that it will change the images without any hesitation.

References:[1]. Maryam Savari and Yeoh Eng Thiam, “Comparison of ECC and RSA in Multipurpose Smart

CardApplication”.

[2]. Elsayed Mohammed and A.E Emarah and Kh.El-Shenawwey, “Elliptic Curve Cyrptosystems on Smart Cards”.

[3]. Padma Bh, D.Chandravathi, P.prapoorna Roja: “Encoding and decoding of a message in the implementation of Elliptic Curve Cryptography using Koblitz Method”. International Journal on Computer Science and Engineering (IJCSE) Vol. 02, No. 05, 2010, 1904-1907

[4]. Hankerson, Menezes, Vanstone. “Guide to elliptic curve cryptography” Springer, 2004 ISBN 038795273X 332s_CsCr

[5] Kahn, David. "The Codebreakers: The Comprehensive History Of Secret Communication From Ancient Times To The Internet", 1996

[6] AbuTaha, M., Farajallah, M., Tahboub, R., & Odeh, M. (2011). Survey Paper: Cryptography Is The Science Of Information Security. International Journal of Computer Science and Security (IJCSS), Vol. 5, No. 3, 2011, pp.298.

[7] Davies, D. A brief history of cryptography. Information Security Technical Report, Vol. 2, No. 2, 1997, pp.14-17.

[8] Kircher, Athanasius. Musurgia universalis.: 1650. 1988

[9] Coudert, Allison P., Richard Henry Popkin, and Gordon M. Weiner, eds. Leibniz, mysticism and religion., International Archives of the History of Ideas, Vol. 158. Springer, 1998.

[10] Bourne, Joyce. The concise Oxford dictionary of music. OUP Oxford, 2004.

11] Tatlow, Ruth. “Bach and the Riddle of the Number Alphabet”. Cambridge University Press, 1991.

7

Page 8: final_Paper_springer_final

[12] Sams, Eric. "Elgar's Cipher Letter to Dorabella.", The Musical Times Vol 111, No. 1524, 1970, pp. 151- 154.

[13] Sadie, Stanley E. "The new Grove dictionary of music and musicians." (1980).

[14] Dutta S, Chakraborty S, Mahanti N.C., “A novel Method of Hiding Message Using Musical Notes”, International Journal of Computer Application , vol.1, No.16, 2010.

[15] Dutta S, Chakraborty S, Mahanti N.C., “Using Raga as a Cryptographic Tool”, Advances in Network Security and Applications, Communications in Computer and Information Science, 2011, Volume 196, CNSA 2011 (Springer).

[16] Dutta, Sandip, Chandan Kumar, and Soubhik Chakraborty. "A Symmetric Key Algorithm for Cryptography using Music." International Journal of Engineering and Technology, Vol 5, No 3, 2013, pp. 3109-3115.

[17] M. Yamuna ,Sankar A., Ravichandran S., V. Harish Encryption of a Binary String Using Music Notes and Graph theory, International Journal of Engineering and Technology , Vol 5, No 3 Jun-Jul, 2013, pp. 2920-2925.

[18] Yamamoto, Kotaro, and Munetoshi Iwakiri. "A standard MIDI file steganography based on fluctuation of duration." Availability, Reliability and Security, 2009. ARES'09. International Conference on. IEEE, 2009.

[19] Adli, Alexander, and Zensho Nakao. "Three Steganography algorithms for MIDI files." Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on. Vol. 4. IEEE, 2005.

[20] Whitley, Darrell. "A genetic algorithm tutorial." Statistics and computing, Vol. 4, No. 2, 1994, pp.65-85.

[21] Jacob, Bruce. "Composing with genetic algorithms." (1995).

[22] Gartland-Jones, Andrew, and Peter Copley. "The suitability of genetic algorithms for musical composition." Contemporary Music Review, Vol. 22, No. 3, 2003, pp.43-55.

[23] Fortier, Nathan, and Michele Van Dyne. "A Genetic Algorithm Approach to Improve Automated Music Composition.", INTERNATIONAL JOURNAL OF COMPUTERS, Vol. 5, No. 4, 2011, pp.525-532.

Authors Biography

Joseph Emmanuel Research Scholar, Dept of CSE, RajaRajeswari College of Engineering, Bangalore. He is completed his B.Tech. degree from Christ University Bangalore, He is currently pursuing his M.Tech. degree from VTU.Shashi Gowda Asst.Professor, Dept of ISE, RajaRajeswari College of Engineering, Bangalore. He is completed his B.E. degree from VTU and M.Tech. degree from University of Madras. He is currently pursuing his Ph.D degree from xxx university, vttt. He has published 5 papers in national and international journals and conferences. He is life member of ISTE, IAENG, CSI.