Data Privacy Review 3
Data Privacy Review 3
Review 3
`
Under the guidance of
A tiny piece of information is added to the pixels, scarcely altering the appearance of the image.
The image used for this purpose is known as the cover-image in image steganography, and the
image that results from steganography is known as the stegoimage.
The project's goal is to develop a revolutionary data-hiding method for digital images based on
edge-based algorithms and the LSB (Least Significant Bit) methodology. To further protect user
privacy, standard AES encryption, age and zip code generalization, and username
psedonymization will also be used.
Introduction
A hidden message is included in an image that is conveyed across a network while maintaining its
original appearance. The information can be kept safe and secure in this way. Users can create
their own accounts here and add the shared data—which is first compressed, then encrypted, and
then embedded in a carrier file—by adding it to their accounts. The data is protected by numerous
layers of encryption, and even if an attacker gets to bypass the first layer, the information won't
make any sense because it will only be the carrier file. Even if they are able to recover the data,
there is still another encryption layer to get beyond.
The project's goal is to develop an image embedding method that is reliable, effective, safe, and
privacy-preserving for storing files as images. This method will be based on the LSB approach
and edge-based embedding. To further secure the data, a second layer of security must be applied.
LITERATURE SURVEY
And year
(2018)
This paper discusses the privacy issue The system under consideration
4 Privacy and Data Shrikant, from an Indian point of view in relation for proposal encompasses all
Protection in Ardhapurkar to difficulties in the legal, technical, areas in three dimensions: legal,
Cyberspace in & and political domains. technical, and political. In the
Indian Srivastava, Especially data in domains: suggested system, numerous
domains have been attempted to
Environment. & Tanu, & Telecommunication be covered while keeping in
Swati, BPO mind the rapidly advancing
(2010) Sharma & e-Commerce state of technology and newly
chaurasiya, Health Sector developing fields. The
Mr & Vaish, Media suggested approach has given
Abhishek. National Security room for development so that
Tourism new domains can be introduced
without interfering with existing
ones. In order to satisfy both
current needs and future needs,
the suggested system has been
made adaptable and scalable. A
well-designed privacy
framework is crucial not only
for an individual but also for
society and a nation's economic
development.
Nils In the context of big data analysis, they This paper discussed the effects
5 Privacy Issues Gruschka go over the present state of the legal of data protection regulations on
and Data restrictions and analyze various data big data projects and examined
Protection in Big Vasileios protection and privacy-preserving how privacy-preserving
Data: Mavroeidis strategies. strategies might be used by
Additionally, they show and examine utilizing two case studies. The
Kamer two actual research projects that dealt outcomes were very different.
A Case Study
Vishi with sensitive data and actions for Participants in one experiment
Analysis under adhering to the laws governing data were required to provide
GDPR Meiko regulation. They demonstrate the sorts consent in order to address
Jensen of information that pose a privacy risk, privacy concerns around the
(2018) the privacy-preserving strategies that gathering and processing of
were used in line with the law, and biometric data. Additionally,
how these techniques affected the data there were no issues
processing stage and the research encountered throughout the data
findings. analysis stage. Data from an
existing data source were
utilized in the second project. In
this scenario, anonymization of
several data fields was
necessary, which made data
analysis more difficult and
frequently constrained.
6 Steganograph Rosziati The proposed algorithm uses binary In future they will try to
y Algorithm Ibrahim, codes and pixels inside an image. The increase the accuracy of the
to Hide Secret Teoh Suk zipped file is used before it is algorithm.
Message Kuan converted to binary codes to maximize
inside an the storage of data inside the image.
Image Various sizes of data are stored inside
the images and the PSNR (Peak signal-
(2011) to-noise ratio) is also captured for each
of the images tested.
7 Secure QR- 1. Abhijeet i)A three layer layered architecture ii) Threading can be used to reduce
Code Based Mendhe 2. First layer (RSA encryption algorithm) the encryption and decryption
Message Mr. Deepak iii) Second Layer (image time
Sharing Kumar steganography techniques to hide
System Using Gupta 3. Dr. secret message in QR code) iv) Third
Steganograph Krishna Pal Layer (QR Code image is encoded
y Sharma using mask image)
8 Hierarchical 1. Ms. i) LSB method is applied for image Future scope would be towards
Implementatio Moushmee steganography ii) RKO technique is adding user authentication using
n of RKO Kuri 2. Dr. used to split stego image into random password and/or photo.
Technique for Tanuja share and key share at the sender side.
Visual Sarode iii) key share are overlapped using
Steganograph XOR method to form single image or
y stego image iv) reverse image
steganography is applied to get back
the original image
9 Use of Yogita Patel i) Data Encryption using any i) Could be towards adding
Genetic Encryption algorithm ii) LSB public/ private key for
Algorithm and Steganography iii) Genetic algorithm is encryption.
Steganograph used to reshuffle the modified image ii) face recognition facility for
y for Data bits user to introduce more security
Hiding in
image for
Wireless
Network
10 Hiding Data Hesham F. Combining RSA and Huffman coding To increase visual quality and
Using A. Hamed, or DWT storage capacity.
Efficient Aziza I.
Combination Hussein,
of RSA Ashraf A.
Cryptography M. Khalaf,
and Osama,
Compression Fouad Abdel
Steganograph Wahab
y Techniques
12 Enhanced Jagan Raj, enhanced Least Significant Bit In future they will try to
Least Jayapandiya increase the accuracy of the
Significant Bit n, C. algorithm so that the quality of
Replacement Kavitha, K. the cover image increase.
Algorithm in Sakthivel
Spatial
Domain of
Steganograph
y Using
Character
Sequence
Optimization
13 Hiding Data Abdel The first technique used LSB with no Future work to increase the
in Images Wahab, encryption and no compression. In the accuracy of both the algos . It is
Using Aziza I. second technique, the secret message is clear that they can hide the
Steganograph Hussain, encrypted first then LSB technique is intended data in messages while
y techniques Hesham applied. minimizing its size.
with F.A. Hamed,
compression Hamdy M.
algorithms Kelash,
Ashraf A.M.
Khalaf,
Hanafy M.
Ali
15 Image Kumar
steganography gaurav, Canny edge detection, dilation operator
based on Umesh and hybrid coding
Canny edge Ghanekar
detection,
dilation
operator and
hybrid coding
18 Edge-based Saiful Islam, Threshold Selection, The Embedding, The performance of the planned
image Mangat R Extraction by retrieving secret message technique is anticipated to be
steganography Modi & improved if one uses syndrome
, (2014) Phalguni comminttal to writing to cut
Gupta back the number of distortion
that occurred thanks to
embedding.
19 Image Mehdi LSB based Methods, Pixel Value The comparison of existing
Steganograph Hussain, Differnce (PVD) based methods, EMD embedding ways in spacial
y in spatial Ainuddin based methods, MBNS based methods domain was delineate and
domain: A Wahid & PPM based methods highlighted their blessings and
survey Abdul challenges with the sort of
Wahab, tabular and graphical
Yamani Idna illustration.
Bin Idris
20 Chaos based Ratnakirti Canny’s Edge Detection, Payload The planned technique performs
Edge Roy, Scrambling Algorithm, Embedding higher LSBR and PVD in terms
Adaptive Anirban Algorithm of stego image fidelity. Future
Image Sarkar & work can specialise in
Steganomy Suvamoy extending the planned technique
Changder for higher order bits within the
image planes to make amends
for the capability shortage and
conjointly on potential
reduction of the technique’s
time quality.
Overview of the proposed work
The aim of the project is to combine traditional encryption with image steganography and
designing a robust and efficient embedding algorithm. The user credentials have to be
pseudonymized and their details have to be generalized before embedding. Text compression to
reduce the number of bits to be processed and embedded has also been planned.
Software Requirements
Hardware Requirements
Architecture Diagram
Embedding Process
➢ Firsty, the message or the plain text and the 128 bit key is taken form theuser through
the GUI built with PyQt5. The key is hashed with Secure Hash Algorithm (sha256).
➢ Now the plain-text is padded and the Random initialization vector is generated by
passing the AES block size. The cipher text is generated byencrypting the text with the
help of the key and the initialization vector through the Cipher Block Chaining Mode.
➢ After that we have two coefficients, namely the first coefficient and the second
coefficient. We fuse it together with some values of alpha and beta depending upon the
correction level we want Here we have used 5%and 95% for alpha and beta
respectively.
➢ The fused image is saved as after obtaining its inverse Discrete WaveletTransform
(Haar) as “Stego.png” which can be viewed.
➢ The user is shown the UI through which they can select the cover medium and the
steganographed image and after that the Discrete wavelettransforms of both the
images will be obtained.
➢ Using the appropriate decryption formula given below, we’ll recover theQR image
and further we’ll recover the encrypted text in the QR code. The encrypted text will
be decrypted using the key provided by the user and the plain text will be recovered
Formula used for Decryption
a = (Steganographed_Image – bβ)/α
Experimental Results
TOKEN GENERALIZED
Figure 8 : QR Recovery
Figure 9: Recovered QR Image
Evaluation Metrics
Mean Square Error: MSE is the averaged pixel-by-pixel squared difference
between the cover-image and the stego-image.
Where, f & g corresponds to pixel value of cover image and stego image
respectively and m and n represent total number of rows and columns of the
image matrix respectively.
PSNR((Peak Signal to Noise Ratio) : The PSNR is expressed in dB’s and can be
calculated using MSE as
Figure 13: DWT hidden text and LSB hidden text respectively for comparison
Conclusion:
The proposed work is successfully simulated and works as defined whichensures multi-
layered security for transmission throughout the medium.
Comparison is shown which shows a negligible amount of difference in the original image
and the steganographed image. AES being a very good encryption algorithm combined with
text hiding using steganographic algorithms will really provide a new definition to security
and is an area which further can be improved upon. Intensive research work is going on
related to QR code based message/information sharing and to generate a hybrid encryption
algorithm that is robust, efficient, flexible has higher throughput, andhas error correction
capabilities. For overall simulation process, we have utilized the system/machine on the basis
of following parameters. This simulation setup uses the provided packages from the Python
Library to simulate the performance of proposed work. This implementation was thoroughly
tested and was optimized to give the maximum performance for the algorithms. Proposed
System was coded using Python programming language.
Future Work
Further improvements can be made into the compression techniques used to reduce the distortion
and increase capacity. The mapping technique for the pseudonyms can also be further improved.
Efficiency of the embedding algorithm could also be improved to require fewer iterations with a
lower time complexity.
By this, cryptographic and steganographic techniques can be combined with anonymization
techniques to create systems that provide high privacy, security and hide it efficiently in
multimedia files.
References [1] Arshiya Sajid Ansari, Mohammed Sajid Mohammadi, Mohammed Tanvir Parvez,
‘A comparative study of recent steganography techniques for multiple image formats’,
International Journal of Computer Network and Information Security, 2019. [2] Hesham F. A.
Hamed, Aziza I. Hussein, Ashraf A. M. Khalaf, Osama, Fouad Abdel Wahab, ‘Hiding Data Using
Efficient Combination of RSA Cryptography and Compression Steganography Techniques’, IEEE
Access Vol 9, 2021. [3] Jagan Raj, Jayapandiyan, C. Kavitha, K. Sakthivel, ‘Enhanced Least
Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character
Sequence Optimization’, IEEE Access Vol 8, 2020. [4] Abdel Wahab, Aziza I. Hussain, Hesham
F.A. Hamed, Hamdy M. Kelash, Ashraf A.M. Khalaf, Hanafy M. Ali, ‘Hiding Data in Images
Using Steganography techniques with compression algorithms’, Telkomnika Vol 17, 2019. [5]
Text book: Cryptography and Network Security Sixth Edition by William Stallings.
REVIEW-1