Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
A RESEARCH PROPOSAL
BY
SUBMITTED TO:
DR. R.M ISIAKA
PG CO-ORDINATOR
1
INTRODUCTION
Any data that can be seen and understood easily without the need for further understanding is
called plain text. The means of changing the representation of such data with the purpose of
and difficult to understand representation called cipher text. Encryption is utilized to guarantee
that data escapes anybody for whom it isn't planned, even the individuals who can see the
encrypted data. The process of reverting cipher text to its original plaintext is called decryption.
Cryptography is the science of using the mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across the insecure
networks (like the internet) such that it cannot be read by anyone except the intend recipient.
number, or phrase to encrypt the plaintext. The security of encrypted data is entirely dependent
on two things; the strength of the cryptographic algorithm and the secrecy of the key.
Furthermore, in network security, cryptography has a long history of providing a way to store
sensitive information or transmit it across insecure networks (i.e. the Internet) so that it cannot
be read by anyone except the intended recipient, where the cryptosystem is a set of algorithms
combined with keys to convert the original message (Plain-text) to encrypted message (Cipher-
text) and convert it back in the intended recipient side to the original message. In computer
systems, the process consists of complex mathematical formulas that dictate the rules of
conversion process from plain text to cipher text and vice versa combined with the key.
However, some of encryption and decryption algorithms use the same key (i.e. sender, and
2
receiver). And in other encryption and decryption algorithms they use different keys but these
Steganography is the art and science of invisible communication. This is accomplished through
hiding information in other information, thus hiding the existence of the communicated
information. The word steganography is derived from the Greek words “stegos” meaning
cryptography in the sense that where cryptography focuses on keeping the contents of a
Steganography and cryptography are both ways to protect information from unwanted parties
but neither technology alone is perfect and can be compromised. Once the presence of hidden
information is revealed or even suspected, the purpose of steganography is partly defeated. The
The major issue to design any encryption and decryption algorithm is to improve the security
level. Therefore, this paper aims to propose an enhanced approach to improve the security level
and increase the performance by minimizing a significant amount of delay time to maintain the
security.
Although various approaches have been implemented towards the course of ensuring data
security, which has proved to be effective and a bit efficient. It is to be noted that all information
sent across from the sender to the receiver passes through a communication line which is
monitored by the server administrator. With the disparity that occurs between a plain text and
cipher text, the cipher text can be noticed easily by the administrator, making it accessible by
the administrator. This therefore calls for a huge task of proffering a means through which
3
cipher text can be sent across to the receiver without the knowledge of the administrator and
also if by any means such data is noticed and accessed by the administrator, the time taken to
decrypt it will be long enough for the data to be decrypted by the supposed recipient. Since
cryptography was created as a technique for securing the secrecy of communication and many
different methods have been developed to encrypt and decrypt data in order to keep the message
secret, which unfortunately has sometimes not been enough to keep the contents of a message
secret. Thus, it may also be necessary to keep the existence of the message secret.
The aim of this research is to implement an efficient information security system using residue
This research work is limited to the use of Residue Number System for the encryption and
decryption process, and lossless compression approach for the image compression.
4
1.5 Significance of the study
This scheme will allow encrypted data to be sent securely over a network without the
knowledge of an intruder. It will further increase the understanding of how residue number
The method to be adopted in the proposed work involves both data encryption and data hiding.
Firstly, the data transformed to a numeric equivalent, thereafter, the process of encrypting and
decrypting the data will be done using Residue Number System, with respect to the moduli set
{2n-1, 2n, 2n +1}. Thereafter the encrypted data is hidden inside a given image, with the image
Start
Insert Plain
Text
Stop
5
Start
Insert Encrypted
data
Decrypt Data
Stop
Figure 2: Decryption
Start
Insert Image
Compress Image
Stop
6
Start
Insert Compressed
Image
Insert Encrypted
Data
Image containing
hidden data
Stop
Figure 4: Steganography
Furthermore, for the purpose of reducing the size of the image, the lossless compression
approach will be used, which is a better option than the lossy compression since it never
removes any information from the original image, by representing the data in mathematical
formulas. The original image’s integrity is maintained and the decompressed image output is
7
1.6 Literature Review
A scheme was proposed by (Al-Hazaimeh, 2013), he introduced a new approach with the aim
of maintaining the security on the communication channels by making it difficult for attacker
to predicate a pattern as well as speed of the encryption / decryption scheme, due to the fact
that most of the proposed algorithms encountered some problems such as lack of robustness
and significant amount of time added to packet delay to maintain the security on the
The implemented algorithm for the encryption and decryption consists of combination of
public key infrastructure for hybrid system and RC6 algorithm for confusion and diffusion
operations. The RC6 algorithm play the roles of generating a private position based on the
secrete value from public key infrastructure. Plain-text 1024- bits size divided to 2 blocks. One
of these blocks used as key after performed confusion and diffusion operations using RC6
algorithm. The last step is Insert the key inside the Cipher data based on the private position.
The result obtained shows that the average time required to encrypt the data is 0.2972729 ms
in 512-bits key length using the proposed approach, and to encrypt the data using AES is
An image encryption scheme was proposed by (Shashikala Channalli, 2009) which is very
similar to image steganography and video steganography. The scheme adopted Private marking
system using symmetric key steganography technique and LSB technique for hiding the secret
information.
The main goal of this method is to hide information on the output image of the instrument (such
8
Following are the steps involved in embedding the secret information within a cover media.
a) Send the normal data that has to be displayed to the display board.
b) Using a suitable Steganography algorithm hide the secret data within the normal data before
Description of the algorithm for embedding the secret message: Algorithm for embedding the
b) Divide the image into [R x C] smaller blocks .Where R & C are the first & second bytes of
d) The LSBs of the pixel are changed depending on the pattern bits and the secret message bits.
f) If the pattern bit is 0, then the first LSB of the pixel is changed [i.e if data bit is 1 and pixel
g) If the pattern bit is 1, then the second LSB of the pixel is changed accordingly.
h) A single bit of the secret message is distributed throughout the block. This is done to have
j) If the length of the secret message is large, then it can be divided and stored in two or three
frames.
9
k) To extract the information, operations contrary to the ones carried out in embedding are
performed.
A cloud-based scheme was proposed by (P. Sathyabama Gayathri, 2014), which supports
outsourcing of dynamic data, where the owner is capable of not only archiving and accessing
the data stored by the CSP, but also updating and scaling this data on the remote servers. The
proposed scheme enables the authorized users to ensure that they are receiving the most recent
version of the outsourced data. Moreover, in case of dispute regarding data integrity/newness,
a TTPA is able to determine the dishonest party. The data owner enforces access control for
the outsourced data by combining three cryptographic techniques: broadcast encryption, lazy
revocation, and key rotation. The experimental results show that the proposed scheme is a
Cloud storage model considered in this work has four main components as depicted.
i. A data owner can be an organization, which generates sensitive data that is to be outsourced
ii. A Trusted Third Party Auditor (TTPA) who is trusted by all other components and has the
iii. A CSP who manages cloud services and provides paid storage service on its infrastructure
to the data owner, where he outsources the file and makes them available for authorized users.
iv. Authorized users – a set of owner’s clients who have the right to access the outsourced file.
framework which encrypts a file before it is uploaded on to the cloud. AES (Advanced
Encryption Standard) is one of the most secure encryption algorithms and not many attacks are
10
successful on data which is encrypted using AES. This proposal solves the problem of most, if
not all, of the threats that data stored in the cloud faces. Our framework also suggests the use
of login id and password to ensure authentic and authorized access to a user’s data. Thus, if
used securely, cloud computing provides a user with amazing benefits and overcomes its only
11
References
Al-Hazaimeh, O. M. (2013). A new approach for complex encrypting and decrypting data.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, , 95-
103.
Debajyoti Mukhopadhyay, G. S. (2014). Enhanced Security for Cloud Storage using File
Technology, 55-98.
Technology, 2137-2143.
12