2-Leyer Security System for Hiding Sensitive Text Data on Personal - - PowerPoint PPT Presentation

2 leyer security system for
SMART_READER_LITE
LIVE PREVIEW

2-Leyer Security System for Hiding Sensitive Text Data on Personal - - PowerPoint PPT Presentation

2014 The 3rd International Conference on Advancements in Information Technology (ICAIT 2014) Dubai, UAE, 22-23 August 2014 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers Nouf Al-Otaibi and Adnan Gutub Umm Al-Qura


slide-1
SLIDE 1

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

1 2014 The 3rd International Conference on Advancements in Information Technology (ICAIT 2014) Dubai, UAE, 22-23 August 2014

Nouf Al-Otaibi and Adnan Gutub

Umm Al-Qura University (UQU) Makkah, Saudi Arabia

Saturday 23rd August 2014

slide-2
SLIDE 2

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Outline

  • Introduction
  • Motivation & Methods
  • Cryptography & Steganography
  • System Overview
  • System Implementation Interface
  • Testing
  • Results & Comparison

2

slide-3
SLIDE 3

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Motivation:

  • Secure Text Storge on Personal Computer (PC)
  • Use 2-layers

▫ PC independent (Cryptography Layer) ▫ PC data dependant (Steganography Layer)

3

slide-4
SLIDE 4

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Methods

  • Cryptography

▫ Converting secret data to unreadable forms... Unconverting it back to the readable form

  • Steganography

▫ Hiding existence of a secret data (from

  • bservation)
slide-5
SLIDE 5

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Cryptography

  • Encryption & decryption keys are known
  • They are usually related (if not identical)

▫ easy to derive the decryption key once the encryption key is known

  • DES, AES (Rijndael)
  • A secret must be known (agreed upon) to hide

and retrieve

▫ So can generate encryption and decryption keys

  • Key distribution and/or management problem

5

Hiding Retrieve

Secret Data

Z

Lock

Z

Key = Z Same Key = Z

Secret Data

slide-6
SLIDE 6

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Steganography model

Basic Steganography System

Communication Channel Cover Object Secret Object Steganography Algorithm (Detection Part)

Output Output

Stego Object

Input

6

Cover Object Secret Object Steganography Algorithm (Embedding Part) Communication Channel

Input Input

Stego Object

Output

slide-7
SLIDE 7

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

7

Steganography & Cryptography

  • Overlapping usages for information hiding
  • Steganography security hides the knowledge that

there is information in the cover medium

  • cryptography revels this knowledge but encodes

the data as cipher-text and disputes decoding it without permission

  • cryptography concentrate the challenge on the

decoding process while steganography adds the search of detecting if there is hidden information

  • r not.
slide-8
SLIDE 8

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Process flow graph of the 2-Layer security system

8

Storing sensitive secret text data Retrieving back secret text data

slide-9
SLIDE 9

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Overview : 2-leyer security system

9 Sensitive Secret Text Data Cover Stego Image Secret Encryption/ Decryption Key 2-Layer Security System AES Symmetric Image Base Cryptography Steganography Layer Layer Output: Stego-Image Hiding Sensitive Secret Text Data on Personal Computers

slide-10
SLIDE 10

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Cryptography: AES

10

slide-11
SLIDE 11

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Steganography: Image based

  • Hiding in LSBs
  • Example: embedding 200 => (11001000)
  • Pixel 1: 00101101

00011101 11011100

  • Pixel 2: 10100110 11000101 00001101
  • Pixel 3: 11010010 10101100 01100011

11

slide-12
SLIDE 12

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

System interface

showing: bits statistics process of hiding sensitive text: AES encryption image based steganography

12

slide-13
SLIDE 13

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

retrieve sensitive data

13

slide-14
SLIDE 14

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Image changes cannot be observed

14

Original image Stego image

slide-15
SLIDE 15

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Stego Tests: Capacity Improvement

15 Changing: 1-LSB 7-LSB

Steganography acceptable number of bits = 1-LSB & 2-LSB

slide-16
SLIDE 16

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Testing: 30 images

security relation to data dependency Compare: 1LSB and 2LSB.

16

slide-17
SLIDE 17

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

17

Testing Results: 30 images

security relation to data dependency Compare: 1LSB & 2LSB.

slide-18
SLIDE 18

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

Remarks

  • Implemented visual basic platform of 2-layer

security system ==> hiding sensitive text data on personal computers (PC)

  • AES Crypto layer: PC independent security
  • Image Based Stego layer: fully dependant on the

PC data available

  • Capacity improved by Stego layer accepting

security of 2LSB as well as 1LSB

18

slide-19
SLIDE 19

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Adnan Gutub

Saturday 23rd August 2014 ICAIT 2014, Dubai, UAE

19

slide-20
SLIDE 20

Thanks for the opportunity

Questions?

20

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Nouf Al-Otaibi and Adnan Gutub

Umm Al-Qura University (UQU), Makkah, Saudi Arabia 2014 The 3rd International Conference on Advancements in Information Technology (ICAIT 2014), Dubai, UAE, 22-23 August 2014