=Paper= {{Paper |id=Vol-3706/Paper23 |storemode=property |title=An Innovative Crypto-Stego Technique for Secure and Privacy-Preserving on Reliable Transmission Data |pdfUrl=https://ceur-ws.org/Vol-3706/Paper23.pdf |volume=Vol-3706 |authors=Harikrishna Bommala,Seelam Sai Satyanarayana Reddy |dblpUrl=https://dblp.org/rec/conf/icaids/BommalaR23 }} ==An Innovative Crypto-Stego Technique for Secure and Privacy-Preserving on Reliable Transmission Data== https://ceur-ws.org/Vol-3706/Paper23.pdf
                                An Innovative Crypto-Stego Technique for Secure and
                                Privacy-Preserving on Reliable Transmission Data
                                Harikrishna Bommala∗,† , Seelam Sai Satyanarayana Reddy†
                                KG Reddy College of Engineering & Technology, Moinabad, Hyderabad, Telangana, India.


                                           Abstract
                                           In this day’s data communication became too much risk factor that there are so many third-party
                                           persons are getting an unauthorized access to get the details of the communication, which will affect
                                           the security and privacy. Even though we are applying so many data security techniques and privacy
                                           techniques simultaneously the unauthorized access mechanism’s also developing so secure and privacy
                                           communication became more concern and to achieve that previously vernal cipher method, it had a
                                           disadvantage that depending on number of input characters that much number of keys are need to
                                           generate. To overcome this method and to achieve the secure and privacy preserving communication
                                           without getting any unauthorized access that may lead to modification of data so we are proposed
                                           technique that provides modern methods inclusive of modified Zig-Zag, modified rail fence, crossover
                                           and XOR operations without key similarly, statistics is embedded in picture with none deformation the
                                           parameter evaluation along with MSC and PSNR displaying higher outcomes than existing algorithm. In
                                           the proposed work an efficient LSB primarily based photo steganography is provided. The proposed
                                           technique ensures there’s no fundamental adjustments are done where secret message is embedded into
                                           cover adjustments.

                                           Keywords
                                           Data security, zig-Zag, RailFence, cryptography, data transmission, stegnography




                                1. Introduction
                                To prevent unauthorized parties from deciphering private communications, cryptography
                                involves the construction and analysis of secret procedures [1]. Steganography refers to the
                                process of secretly transmitting data by embedding it in another file, message, picture, or video.
                                The expanding capabilities of modern communications call for a fresh approach to security,
                                particularly in the realm of wireless laptop networks [2]. Network protection is turning into
                                extra crucial as the amount of information being exchanged on the net is increasing safety
                                necessities are necessary both at the very last consumer level and at the organization degree,
                                mainly because of the massive utilization of non-public computer systems, networks, and the
                                internet with its worldwide availability [3]. Historically, people have prioritized the following
                                computational security features: privacy, identity, verification, no-repudiation, integrity, and
                                availability [4]. As a consequence, the industry of secret document storage has developed

                                ACI’23: Workshop on Advances in Computational Intelligence at ICAIDS 2023, December 29-30, 2023, Hyderabad, India
                                ∗
                                    Corresponding author.
                                †
                                    These authors contributed equally.
                                Envelope-Open haribommala@gmail.com (H. Bommala); saisn90@gmail.com (S. S. S. Reddy)
                                Orcid 0000-0002-9932-6152 (H. Bommala); 0000-0002-2985-3555 (S. S. S. Reddy)
                                         © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings

                                                                                                          282
dramatically. A new approach to information concealment is also necessary because of the
rapid growth of the publishing and broadcasting generation.




Figure 1: Basic flow diagram of cryptography technique


   Unauthorized duplication of music, video, and other material that is only available in digital
form raises concerns about copyright protection [5]. The music, film, book, and software
publishing businesses are particularly hard hit by the nuisance of unlawful copying. To get
around this problem, assessment remarks might be sent to the output record using hidden data
buried in the digital medium [6] no longer be easily removed unless a unique technique is
used [7]. Data security may be achieved in several ways [8] one is cryptography as shown in
fig 1. The sender uses an encryption key [9] to scramble the message, the scrambled message
is broadcast via an unsecured public channel, and the unique, unencrypted message can be
reconstructed only if the recipient has the appropriate decryption key. The second method is
called steganography, and it involves concealing a message inside another message such that
its very existence is concealed [10]. They adapt rapidly to varying levels of illumination in
photos of everyday scenes when it comes to size and variety, LPs just can’t be mistaken for
anything else in a photograph [11]. Few machine learning methods are proposed to detect
network attacks [12, 13].


2. Related Work
Data security, confidentiality, information integrity, authentication, and non-repudiation are
all relevant to modern cryptography, which is the practice and study of techniques for secure
communication in the face of adversarial behavior [14] Present-day cryptography lies at the
crossroads of the fields of mathematics, computer technology, electrical engineering, commu-
nication technology, and physics [15] packages of cryptography contain digital commerce,
chip-primarily based charge playing cards, virtual currencies, computer passwords, and military
communications [16] In times past, cryptography was almost identical with encryption, the pro-
cess by which data is transformed from a legible country into incomprehensible gibberish [17]
to prevent unauthorized parties from reading encrypted messages, the sender only provides
the decryption method to the intended recipients. Alice (”A”) is the sender, Bob (”B”) is the
intended receiver, and Eve (”eavesdropper”) is the adversary, in the cryptography literature [18].
The emergence of computers during World War II and the usage of rotor cipher machines
during World War I have both contributed to the complexity and breadth of cryptographic
techniques [19] as of late, cryptography has relied heavily on mathematical concepts and
computer technology exercises to develop cryptographic algorithms that are very difficult for
any opponent to crack in reality [? ] While it may be conceivable to disrupt a well-designed




                                              283
system in theory, doing so in reality is very unlikely to succeed. This kind of system is called
”computationally cozy” if it is well-designed; nevertheless, theoretical developments (such as
improvements in integer factorization techniques) and faster computer technology need that
such designs be constantly reevaluated and, if necessary, updated. The only-time pad and other
statistically secure but computationally insecure systems are far more difficult to employ in
reality than the best theoretically breakable but computationally comfortable techniques [20]
The proliferation of cryptography has given rise to a slew of statistical age jail issues. Because
of its potential for use in espionage and sedition, several countries have treated cryptography
like a weapon, restricting or outright banning its use and export. Some countries have passed
legislation making [21] it possible for law enforcement to demand the surrender of encryption
keys for data relevant to an investigation. Digital media copyright infringement challenges
and online rights management both rely heavily on cryptography. Steganography technique as
shown in fig 2 is a means of hiding mystery info inside (or even on top of) an in any other case
commonplace, non-secret document or other medium to stay away from discovery.




Figure 2: Basic process of steganography technique


  The fig 2 dispatches can use steganography to hide textual content, video, pics, or maybe
audio statistics. It’s a useful bit of know-how, limited handiest by the kind of medium and the
writer’s imagination.


3. Proposed System
The proposed work that concentrates on techniques which are used to overcome the existing
disadvantages [21] the existing system that uses the symmetric key cryptography to transfer
the data [22] but in the proposed work there is no keys that are used to encrypt the clear text.
The proposed work as shown in fig. 3 that performs two main phases called data encryption
and embedding process for encryption and reverse process called decryption [23].

3.1. Data Encryption
The goal of encryption in cryptography is to ensure that only authorized parties have access to a
message or piece of information. The only thing encryption does is make it so an eavesdropper
can’t understand what’s being said. The plaintext of a message or other piece of information
is encrypted using an encryption algorithm and a cipher to produce a version of the message




                                               284
Figure 3: Architecture of proposed system


known as ciphertext [21] Both public-key and symmetric-key cryptography are not required to
encrypt documents. Instead, we suggest a scheme where the document is encrypted without
the usage of a key. If you want to ensure the highest level of security, you shouldn’t use the
same passphrase to guard your private key as you do the keyless procedure that drives the
keyless cipher [24] When it is not necessary to share the password with anybody else, keyless
encryption is a great way to keep sensitive data safe. Encrypting a file using a keyless cipher
is possible by selecting this menu item. There were four stages of encryption and four stages
of decryption in the suggested technique for encrypting work files. The four-step encryption
procedure is a methodical, multi-stage scheme that employs four novel techniques. Z-scan, a
tweaked rail fence, a cross-over, and a xor operation are the new techniques.

3.2. Modified Zig-Zag
Scan In order to no uniformly quantize N*N DCT coefficients, zigzag scanning is used [25]. This
coding scheme is based on transforms. The energy is concentrated in the lower coefficients
and is dispersed in a radial pattern around the origin. The end result is a one-dimensional
sequence in which the vast majority of the coefficients are zero after a critical threshold is
passed. When encoding a non-zero coefficient, the category/run length encoding first counts
the number of consecutive zeroes in the scanned sequence. Both sym1 and sym2 are based on
the number of zeros before the nonzero coefficient, whereas sym1 is based on the magnitude of
the coded coefficient. Therefore, the DCT coefficients are ordered in an efficient fashion for the
category/run coding phase by use of zigzag scanning. The zigzag operation on binary integers
has been described up to this point.
  But in this proposed work actually perform on decimal numbers (ASCII of Plain text). The
system that uses this operation to make original text to somewhat disturbed text.Zig-zag scan
used because to group low frequency coefficients in top of vector. Zig-zag scan matrix range




                                               285
Figure 4: 8*8 zigzag scan matrix


that can defined in two ways such as 4*4 and 8*8 as shown in fig. 4. By performing this scan
method, it generates intermediate cipher text1. Maps 8*8 to a 1*64 vector Maps 4*4 to a 1*16
vector.

3.3. Modified Rail Fence
   1. Data is organized just like as wave form, in this form there exist two levels of values.
   2. Second level values are followed by first level values which creates first stage of interme-
      diate cipher2.
   3. In the next step split the intermediate cipher into two parts and align them as rail fence
      structure.
   4. Again, perform the actual rail fence process to get as usual original text.

Fig. 5 shows the basic approach of Rail Fence method.




Figure 5: Modified Rail Fence




                                              286
3.4. Modified Crossover
Reproduction and genetic crossover are likened to the crossover operator. In this more than one
parent is chosen and one or more off-springs are generated utilizing the genetic material of the
parents. It’s important to keep in mind that the GA Designer has the option of implementing
a problem-specific crossover operator in addition to these fairly general ones. To convert
an original matrix into an intermediate cipher3, the proposed work offers a novel crossover
technique as shown in fig. 6.




Figure 6: 4 x 4 matrix Crossover



3.5. XoR Operation
The only two possible numbers in a computer are zero and one, hence all computations are
performed using the binary system. Everything on a computer, including numbers, letters,
pictures, and videos, is saved and displayed in this way.We shall restrict ourselves to integers
for this exercise. All computers first transform integers supplied by the user into a binary
representation of the number before carrying out any calculations. Fig. 7 shows the basic
encryption process to convert original message into cipher message.
  Encryption Algorithm
Step 1: Read the text file.
Step 2: Convert each character in the file into corresponding ASCII value.
Step 3: Construct the corresponding data into 4*4 matrices.
Step 4: Each 4*4 block performs the following methods one by one
Step 4.1: Modified 4*4 Zig-Zag scan
Step 4.2: Modified Rail fence
Step 4.3: Crossover
Step 4.4: XOR operation
Step 5: Embed the result of XOR into individual RGB planes.




                                              287
Figure 7: Original message (left) to Cipher message (right)


3.6. Decryption Algorithm
Step 1: Extract the RGB pixels from the stegoimage.
Step 2: Convert each pixel into corresponding ASCII value.
Step 3: Construct the corresponding data into 4 x 4 matrices.
Step 4: Each 4 x 4 block performs the following methods one by one
Step 4.1: XOR operation
Step 4.2: Crossover
Step 4.3: Modified Rail fence
Step 4.4: Modified 4*4 Zig-Zag scan
Step 5: Decrypted plain.txt file will be created.


Table 1
Time complexity for existing and proposed
                                   File size   Existed   Proposed
                                     1KB        285           221
                                     5KB        370           277
                                    10KB        360           301
                                    15KB        395           318
                                    20KB        720           587



Table 2
PSNR values for existing and proposed
                                   File size   Existed   Proposed
                                     1KB       4.4881      7.297
                                     5KB        4.856     7.8978
                                    10KB       4.8787     7.6931
                                    15KB       4.7568     7.6589
                                    20KB       4.6564     7.6129




                                                 288
4. Conclusion
In an efficient LSB based image steganography is presented. The planned method ensures there
is no major changes are accomplished where secret message is embedded into cover changes.
The secret message has been generated with innovative method such as 4*4 zig-zag, crossover
and modified rail fence. When compared with existing it is taking more time for embedding
the data. In the parameter analysis PSNR values are high when compared with existing, which
means there is no major changes in cover image. Further this work may be extended for audio
and video by keeping PSNR as higher values.


References
 [1] J. Wang, C. Yang, P. Wang, X. Song, J. Lu, Payload location for JPEG image steganog-
     raphy based on co-frequency sub-image filtering, Int. J. Distrib. Sens. Netw. 16 (2020)
     155014771989956.
 [2] N. Alanizy, A. Alanizy, N. Baghoza, M. AlGhamdi, A. Gutub, 3-LAYER PC TEXT SECURI-
     TYVIA COMBININGCOMPRESSION, AES CRYPTOGRAPHY2LSB IMAGE STEGANOG-
     RAPHY, jreas 03 (2018) 118–124.
 [3] R. Biswas, I. Mukherjee, S. K. Bandyopadhyay, Image feature based high capacity stegano-
     graphic algorithm, Multimed. Tools Appl. 78 (2019) 20019–20036.
 [4] A. V. Srinivas, S. S. S. Reddy, A novel approach for excavating communication using
     taxonomy and outline mechanisms, in: 2021 Sixth International Conference on Image
     Information Processing (ICIIP), IEEE, 2021.
 [5] A. Jan, S. A. Parah, B. A. Malik, M. Rashid, Secure data transmission in IoTs based on
     CLoG edge detection, Future Gener. Comput. Syst. 121 (2021) 59–73.
 [6] W. Z. Khan, M. Y. Aalsalem, M. K. Khan, Q. Arshad, Data and privacy: Getting consumers
     to trust products enabled by the internet of things, IEEE Consum. Electron. Mag. 8 (2019)
     35–38.
 [7] A. Alsaidi, K. Al-lehaibi, H. Alzahrani, M. AlGhamdi, A. Gutub, Compression multi-level
     crypto stego security of texts utilizing colored email forwarding, J. Comput. Sci. Comput.
     Math. (2018) 33–42.
 [8] K. Hari, J. Bommala, N. Venkata Rao Yanamadni, S. Dr, Survey on machine learning with
     cloud technology preserving privacy: Risks and keys, Solid State Technology 64 (2021).
 [9] V. Madaan, D. Sethi, P. Agrawal, L. Jain, R. Kaur, Public network security by bluffing the
     intruders through encryption over encryption using public key cryptography method, in:
     Advanced Informatics for Computing Research: First International Conference, ICAICR
     2017, Jalandhar, India, March 17–18, 2017, Revised Selected Papers, Springer, 2017, pp.
     249–257.
[10] A. Kumar, I. Fister Jr, P. Gupta, J. Debayle, Z. J. Zhang, M. Usman, Artificial Intelligence and
     Data Science: First International Conference, ICAIDS 2021, Hyderabad, India, December
     17–18, 2021, Revised Selected Papers, Springer Nature, 2022.
[11] N. A. Loan, N. N. Hurrah, S. A. Parah, J. W. Lee, J. A. Sheikh, G. M. Bhat, Secure and robust




                                                289
     digital image watermarking using coefficient differencing and chaotic encryption, IEEE
     Access 6 (2018) 19876–19897.
[12] R. Shanker, P. Agrawal, A. Singh, M. W. Bhatt, Framework for identifying network attacks
     through packet inspection using machine learning, Nonlinear Engineering 12 (2023)
     20220297.
[13] R. Shanker, V. Madaan, P. Agrawal, Fss-part: Feature grouping subset model for predicting
     network attacks, SN Computer Science 5 (2023) 94.
[14] B. O. Al-Roithy, A. Gutub, Remodeling randomness prioritization to boost-up security of
     RGB image encryption, Multimed. Tools Appl. 80 (2021) 28521–28581.
[15] A. Jan, S. A. Parah, B. A. Malik, A novel laplacian of gaussian (LoG) and chaotic encryption
     based image steganography technique, in: 2020 International Conference for Emerging
     Technology (INCET), IEEE, 2020.
[16] A. K. Singh, B. Kumar, S. K. Singh, S. P. Ghrera, A. Mohan, Multiple watermarking
     technique for securing online social network contents using back propagation neural
     network, Future Gener. Comput. Syst. 86 (2018) 926–939.
[17] K. A. K. Patro, B. Acharya, A novel multi-dimensional multiple image encryption technique,
     Multimed. Tools Appl. 79 (2020) 12959–12994.
[18] N. Ayub, A. Selwal, An improved image steganography technique using edge based data
     hiding in DCT domain, J. Interdiscip. Math. 23 (2020) 357–366.
[19] M. Hussan, S. A. Parah, S. Gull, G. J. Qureshi, Tamper detection and self-recovery of
     medical imagery for smart health, Arab. J. Sci. Eng. 46 (2021) 3465–3481.
[20] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, S. W. Baik, Image steganography using
     uncorrelated color space and its application for security of visual contents in online social
     networks, Future Gener. Comput. Syst. 86 (2018) 951–960.
[21] F. S. Hassan, A. Gutub, Novel embedding secrecy within images utilizing an improved
     interpolation-based reversible data hiding scheme, J. King Saud Univ. - Comput. Inf. Sci.
     34 (2022) 2017–2030.
[22] M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. S. Ho, K.-H. Jung, Image steganography in
     spatial domain: A survey, Signal Process. Image Commun. 65 (2018) 46–66.
[23] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, S. W. Baik, Image steganography using
     uncorrelated color space and its application for security of visual contents in online social
     networks, Future Generation Computer Systems 86 (2018) 951–960.
[24] F. S. Hassan, A. Gutub, Novel embedding secrecy within images utilizing an improved
     interpolation-based reversible data hiding scheme, Journal of King Saud University-
     Computer and Information Sciences 34 (2022) 2017–2030.
[25] M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. Ho, K.-H. Jung, Image steganography in
     spatial domain: A survey, Signal Processing: Image Communication 65 (2018) 46–66.
[26] S. Sai Satyanarayana Reddy, G. Sowmya, V. B. Reddy, B. D. Kumar, A. Kumar (Eds.), Deep
     CNN Based Whale Optimization for Predicting the Rice Plant Disease in Real Time, ????




                                              290