Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE IOT EVALUATION ENCRYPTION BASED IMAGING TECHNIQUE: REVIEW
NIKHIL DANG
Research Scholar ME, Deptt. EE, JEC Jabalpur HEMANT AMHIA
Prof. Deptt. EE, JEC Jabalpur
Abstract - The Internet of Things (IOT) being a promising technology of the future is expected to connect billions of devices. The increased number of communication is expected to generate mountains of data and the security of data can be a threat. The devices in the architecture are essentially smaller in size and low powered. Conventional encryption algorithms are generally computationally expensive due to their complexity and requires many rounds to encrypt, essentially wasting the constrained energy of the gadgets. Less complex algorithm, however, may compromise the desired integrity. In this paper we propose lightweight encryption algorithm named as Secure IOT (SIT).
1.INTRODUCTION
The Internet of Things (IOT) is turning out to be an emerging discussion in the field of research and practical implementation in the recent years. IOT is a model that includes ordinary entities with the capability to sense and communicate with fellow devices using Internet [18]. As the broadband Internet is now generally accessible and its cost of connectivity is also reduced, more gadgets and sensors are getting connected to it . Such conditions are providing suitable ground for the growth of IOT. There is great deal of complexities around the IOT, since we wish to approach every object from anywhere in the world . The sophisticated chips and sensors are embedded in the physical things that surround us, each transmitting valuable data. The process of sharing such large amount of data begins with the devices themselves which must securely communicate with the IOT platform. This platform integrates the data from many devices and apply analytics to share the most valuable data with the applications. The IOT is taking the conventional internet, sensor network and mobile network to another level as every thing will be connected to the internet. A matter of concern that must be kept under consideration is to ensure the issues related to confidentiality, data integrity and authenticity that will emerge on account of security and privacy [19].
A. APPLICATIONS OF IOT:
With the passage of time, more and more devices are getting connected to the Internet. The houses are soon to be
equipped with smart locks [18], the personal computer, laptops, tablets, smart phones, smart TVs, video game consoles even the refrigerators and air conditioners have the capability to communicate over Internet. This trend is extending outwards and it is estimated that by the year 2020 there will be over 50 billion objects connected to the Internet . This estimates that for each person on earth there will be 6.6 objects online. The earth will be blanketed with millions of sensors gathering information from physical objects and will upload it to the Internet. It is suggested that application of IOT is yet in the early stage but is beginning to evolve rapidly , . An overview of IOT in building automation system is given in . It is suggested in that various industries have a growing interest towards use of IOT. Various applications of IOT in healthcare industries are discussed in and the improvement opportunities in healthcare brought in by IOT will be enormous . It has been predicted that IOT will contribute in the making the mining production safer and the forecasting of disaster will be made possible. It is expected that IoT will transform the automobile services and transportation systems . As morephysical objects will be equipped with sensors and RFID tags transportation companies will be able to track and monitor the object movement from origin to destination thus IoT shows promising behaviour in the logistics industry as well. With so many applications eyeing to adapt the
Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE technology with the intentions to
contribute in the growth of economy, 2. EVALUATION PARAMETERS
To test the security strength of the proposed algorithm, the algorithm is evaluated on the basis of the following criterion. Key sensitivity, effect of cipher on the entropy, histogram and correlation of the image. We further tested the algorithm for computational resource utilization and computational complexity.
For this we observe the memory utilization and total computational time utilized by the algorithm for the key generation, encryption and decryption.
1) Key Sensitivity: An encryption algorithm must be sensitive to the key. It means that the algorithm must not retrieve the original data if the key has even a minute difference from the original key. Avalanche test is used to evaluate the amount of alterations occurred in the cipher text by changing one bit of the key or plain text. According to Strict Avalanche Criterion SAC if 50% of the bits are changed due to one bit change, the test is considered to be perfect. To visually observe this effect, we decrypt the image with a key that has a difference of only one bit from the correct key.
2) Execution Time: One of the fundamental parameter for the evaluation of the algorithm is the amount of time it takes to encode and decode a particular data. The proposed algorithm is designed for the IoT environment must consume minimal time and offer considerable security.
3) Memory Utilization: Memory utilization is a major concern in resource constrain IOT devices. An encryption algorithm is composed of several computational rounds that may occupy significant memory making it unsuitable to be utilized in IOT. Therefore the proposed algorithm is evaluated in terms of its memory utilization. Smaller amount of memory engagement will be favorable for its deployment in IOT.
4) Image Histogram: A method to observe visual effect of the cipher is to encrypt an image with the proposed algorithm and observe the randomness it
produces in the image. To evaluate the generated randomness, histogram of the image is calculated. A uniform histogram after encryption depicts appreciable security.
5) Image Entropy: The encryption algorithm adds extra information to the data so as to make it difficult for the intruder to differentiate between the original information and the one added by the algorithm. We measure the amount of information in terms of entropy, therefore it can be said that higher the entropy better is the performance of security algorithm. To measure the entropy (H) for an image, equation is applied on the intensity (I) values P (Ii) being the probability of intensity value Ii.
6) Correlation: The correlation between two values is astatistical relationship that depicts the dependency of one valueon another. Data points that hold substantial dependency hasa significant correlation value. A good cipher is expected toremove the dependency of the cipher text from the originalmessage. Therefore no information can be extracted from thecipher alone and no relationship can be drawn between theplain text and cipher text. This criterion is best explained byShannon in his communication theory of secrecy systems .
3. CURRENT STATE OF LITERATURE Today is the era of digital communication.
Security and of digital communication.
Security and of privacy is important for communication. Cryptography process of hiding the message. Its known of hiding the message. Its known of time back.
Steganography is derived from two words, stego means secret and graphy means writing. secret writing. In this paper, In this paper, In we are discussing about only steganography using DNA Adleman is the father of DNA computation [1]. He done chemical reactions and shown how DNAs can be used for computations. We are going to discuss about the works Done using theoretical DNA computing.
Catherine Taylor [2], proposed an idea in which information is encoded into DNA strands, and then converted into microdots. A microdot is a highly reduced photograph of a typewritten page.
Developed DNA based doubly stegano
Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE graphic method. First done DNA
encryption and then reduced it to a microdot. Simple substitution cipher is used for encryption. Because of the huge possibilities of DNA nucleotides, it acts as a complex background for storing secret message. Random key is used for encryption. Disadvantage is its Expensive.
Andre Leier et.al. [3] proposed cryptography using DNA binary strands.
They proposed two different DNA based cryptographic techniques.
Jiechen [4], used the random nature of DNA for making the cryptographic system unbreakable. Here they used carbon nanotubes as a medium for message transmission.
Plaintext messages are converted to cipher text by adding message with one time pads. Here DNA sequences act as one time pads. But this method is expensive.
Pak chung wong et.al [5,, proposed an idea of DNA memory prototype. Today, we use magnetic media and silicon chips to store our data. All these storage media can easily destroyed by people or natural disasters. So they proposed an alternate storage mechanism. Here initially Encode meaningful information as artificial DNA sequences. Then transform the sequences to living organisms. Allow the organism to grow and multiply. Extract the information back from organisms.
Success of this method depends on finding good storage medium to ensure adequate protection for the encoded DNA strands. Host with embedded information must be able to grow and multiply.
Advantage is that it has enormous potential capacity. Disadvantage is that mutation of organism may affect the integrity of embedded messages. [7]
Monica Borda [8], published a paper on DNA secret writing.
Steganography using DNA hybridization has five steps, plaintext message given in ASCII is converted to binary. Evaluate required length for DNA OTP. If each bit is encoded with 10 nucleotide, OTP of length > 10*n. The encrypted message is placed between two primers and hidden in a microdot. Perform decryption using PCR.
Qiang Zhang et.al. [9], published a paper on Image encryption using DNA addition combining with chaotic maps.
Here initially encode the original image to
obtain DNA sequence matrix. Divide this matrix to equal blocks and then carry out DN A sequence addition operation.
Find the DNA sequence complement using 2D logistic maps. Decrytion done as reverse of above. Deepak Kumar [10], proposed the idea of secret data writing using DNA sequences. Here DNA OTP method is used for defining the new security algorithm. DNA coding is necessary because we cannot process the DNA molecules as in form of alphabets, so change alphabets to ASCII. Almost same as Monica Borda’s algorithm.
AmalKhalifa [11], proposed a steganography algorithm to exchange data secretly. Its implemented in mainly 2 levels. In first level, encryption is done using DNA based play fair cipher. In second level, encrypted message is hidden to some reference DNA using substitution.
The performance of presented algorithm is alsoanalysed with respect to robustness against attaks as well as hiding capacity.
Sheena Anees [12], proposed highly secure DNA based audio steganography. Here a highly secure method to hide the messages is proposed.
Prasenjit Das [14], proposed DNA based image steganography. Proposed algorithm uses images as primary cover media for message transfer between two interested parties.
Fasila K.A. et al[15], proposed the idea of multi phase crypto system. Here a hybrid cryptography based on RGB colour sis proposed. Convert the plaintext to matrix form, pass it through a number of manipulation steps. Security is further enhanced by using a strong key which is encapsulated using DNA steganography method.
Sreeja C.S et al [16], proposed a DNA symmetric algorithm based on the pseudo DNA cryptography and central dogma of molecular biology. The suggested algorithm uses splicing and padding techniques along with complementary rules which make the algorithm more secure as its an additional layer of security than conventional cryptography techniques.
Shweta et al [17], proposed paper on cascaded DNA cryptography and steganography. Initially it performs DNA
Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE cryptography and then its hidden in a random frame of video.
Table 1 Literature Survey
SN Author Name Title Limitations
1 Leonard M
Adleman. Computing with DNA 2
Catherine Taylor [2],
Hiding Messages in DNA
Microdots proposed an idea in which information is encoded into DNA strands, and then converted into microdots. A microdot is a highly reduced photograph of a typewritten page. Developed DNA based doubly stegano graphic method. First done DNA encryption and then reduced it to a microdot. Simple substitution cipher is used for encryption. Because of the huge possibilities of DNA nucleotides, it acts as a complex background for storing secret message. Random key is used for encryption.
Disadvantage is its Expensive.
3 Andre Leier Cryptography with DNA Binary Strands
4 Jie Chen A DNA-based,
biomolecular cryptography design
DNA and RNA are appealing media for data storage due
to very large amounts of data that can be stored in compact volume. They far exceed the storage capacities of
conventional electronic, magnetic and optical media. In this paper, we present a novel DNA-based cryptography technique that takes advantage of the massive parallel processing capabilities of biomolecular computation. We
secretly assemble a library of onetimepads in the form of DNA strands. Then, a modulo-2 addition method is employed for encryption whereby a large number of short message sequences can be encrypted using onetimepads. We also present an interesting example of
encrypting/decrypting a two-dimensional image.
5 Pak Chung
Wong Organic Data Memory
using DNA Approach With a careful coding scheme and arrangement, important information can be encoded as an artificial DNA strand and safely and permanently stored in a living host. In the short run, this technology can be used to identify origins and protect R&D investment in, say, agricultural products and endangered species.
It can also be used in environmental research to track generations of organisms and observe the ecological effect of pollutants. The microorganisms that survive heavy radiation exposure, high temperatures, and other extreme conditions are among the perfect protectors for the otherwise fragile DNA strands that preserve encoded information. Finally, living organisms, including weeds and cockroaches, that have lived on Earth for hundreds of millions of years represent excellent candidates for protecting critical information for future generations
6 Venkatraman
S Significance of
steganography of steganography of Information Technology:
Coding and Computing
Given the high degree of redundancy present in a digital representation of multimedia content, there has been an increased interest in using it for the purpose of steganography.
The paper suggested how a variation of
the LSB insertion algorithm can be used for achieving better security and also improved covertness.
Analyzing data in which information has been hidden is called steganalysis, and results of steganalysis can be used to change or improve embedding techniques. No technique of information hiding can ensure perfect secrecy; however, by combining steganography with other techniques, such as cryptography, a higher chance of success can be achieved. One should think of steganography, not as a replacement to cryptography but as a vital supplement to it. Even though the cousins in the spy craft family -steganography and cryptography - have their relative merits and demerits, when combined suitably can provide excellent security mechanisms that are much in need at present.
7. X.Wang and
Q. Zhang DNA computing-based
cryptography This paper proposes a new encrpytion design by the cobination of DNA computing theory with RSA algorithm.
According to the assumption, a encrpytion algorithm with DNA computing could solve parts of realistic problem. The well effectiveness of the method has been verified by
simulation. The application technology of DNA computing in cryptology is comparatively not mature enough and some DNA computing methods and models could not be used in laboratory and society, but this method of parallel computing will be a new
Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE
method of computation [13]. We believe that the application of DNA computation in cryptology will have great potential on information field in the future.
8 M. Borda and
O. Tornea DNA secret writing
techniques This paper has as main purpose to facilitate the understanding of principles and some techniques of the new born field of DNA steganography and cryptography. The presentation is illustrated with small examples using bioinformatics toolbox for parts of the algorithm not requiring DNA laboratory experiments, very expansive at this moment. Taking into account the huge advance in DNA technology, especially in microarray, the today bio- processor [3], obeying Moore’s law [5], we must expect a faster repetition of microprocessor evolution and at larger scale. The presented algorithms and simulations are developed by the authors [9], [13], [11] and represent results of our ongoing research in the field. Features and advantages of the DNA cryptography are pointed out along the presentation, but the molecular laboratory experiments will finally validate the advantages and limitation in this field. Exception is the algorithm using chromosome indexing, which is not properly a DNA cryptographic algorithm, but is using the huge potential of randomness that DNA offers. Taking into account the frontier application, requiring ackgrounds from cryptography, steganography, molecular biology and bioinformatics, basic elements of these domains are presented in the first three sections, in order to make understandable, without additional bibliography, the main ideas in the domain. Obviously, for those interested in the field some important referenced papers are found in the bibliography.
9 Qiang Zhang Image encryption using DNA addition combining with chaotic maps.
In this paper, we proposed a novel confusion/diffusion algorithmfor image encryption. First, we exchanged the pixel positions of rows and columns of the digital image according to a chaotic index based on the logistic chaoticmap to confuse the image pixels. Then, we encoded each of the pixels that had been confused into four nucleotides and obtained a onedimensional nucleotide sequence after a series of iterative computations based on Chebyshev’s chaotic map. Next, we transformed each nucleotide into its corresponding base pair a random number of time(s) according to the complementary rule. Finally, we converted the two-dimensional matrix obtained into an encrypted image. Our experimental results and security analyses show that the scheme can achieve not only good encryption results, but also a sufficiently large key space to be able to repel common attacks.
Therefore, the scheme is reliable enough to be applied in image encryption.
10 D.Kumar and S.Singh
Secret data writing using DNA sequences
In this paper, attempts have been made to remove the deficiencies in the scheme of DNA steganography and cryptography. We have designed a data hiding algorithm by using DNA sequences concept and traditional steganography technique.
Using steganography we hide the data into the DNA sequences and send encrypted DNA sequences along with a key to the receiver side. Using this key value and encrypted text the receiver easily recovers the plain text. Using this technique we send and receive the data without any deficiency. If any attempt is made to make a fake data then the receiver is able to know after applying the algorithm into fake data because it cannot gives the same results when we apply key on it. This algorithm is very efficient and easy to use. DNA computing has brighter development possibilities in field of steganography and authentication, which have a more layer protection than a single encryption. Now days the costly biological experiment has became a normal one because rapid development in field of modern biotechnology. It may be possible to achieve hugely better performance for information storage and information security by using biological sequences properties.
11 Khalifa and
A. Atito High-capacity DNA- based steganography
12 M.
Shyamasree and S. Anees
Highly secure DNA-
based audio
steganography
This paper proposed a method to hide the secret messages store in text files from unauthorized access. The method can be applied to text files. The proposed method has three levels. The first level is DNA based encryption of secret file. In level 2 the encrypted file is hidden in a randomly generated DNA sequence. This embedded DNA sequence is hidden in an audio file in level 3. The proposed
Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE
method was tested on different secret messages stored in different text files. Advantages of the proposed method are listed. In conclusion, in the proposed scheme the message is encrypted, hidden in a DNA sequence and as the third step hidden in an audio file.
13 P.Vijaya Kumar and V.Vijayalaksh mi
Enhanced level of security using DNA computing technique with hyperelliptic curve cryptography
14 P. Das and N.
Kar A DNA based image
steganography using 2d chaotic map
The proposed work concentrates on hiding secret data in
multiple layers of cover media. The DNA is attributed by the pixel properties of the image. Thus it makes it more secured than the methods using reference DNAs from public databases. The several parameters of 2D logistic map used, makes the algorithm further impenetrable. Yet the fully implemented system is required to be tested with several parameters of imperceptibility, which will be the focus of our future work.
4. CONCLUSION
In this paper we reviewed alight weight encryption algorithm named as Secure IoT (SIT). This method has various advantages like speed, minimal storage requirements and minimal power requirements. We surveyed number of research article and decide to analyze DNA based encryption imaging technique 5. REFERENCES
1. Leonard M Adleman. Computing with DNA.
Scientific American, pages 34– 41, August 1998.
2. Catherine Taylor Clelland. Hiding Messages in DNA Microdots. Nature, 399: 533–534, June 1999.
3. Andre Leier.Cryptography with DNA Binary Strands. BioSystems, 57:13–22, April 2000.
4. Jie Chen. A DNA-based, biomolecular cryptography design. In Circuits and Systems, 2003. ISCAS ’03. Proceedings of the 2003 International Symposium on, volume3, pages III–822–III–825 vol.3, May 2003.
5. Pak Chung Wong. Organic Data Memory using DNA Approach. In Communications In Communications In pages 95–98, January 2000.
6. VenkatramanS, Ajith Abraham, and Significance of steganography of steganography of Information Technology:
Coding and Computing, pages 347 – 351,April 2004.
7. X.Wang and Q. Zhang.Dna computing- based cryptography. In Fourth International Conference In Fourth International Conference In Bio-Inspired Computing,
8. M. Borda and O. Tornea.DNA secret writing techniques. In Communications (COMM), 2010 8th International In Communications (COMM), 2010 8th International In Conference on,, pages 451 – 456, June 2010.
9. Qiang Zhang. Image encryption using DNA addition combining with chaotic maps.
Elsevier, Mathematical and Computer Modelling, 52(1112):2028 The BIC- TA 2009 Special Issue International
Conference on Bio-Inspired Computing:
Theory and on Bio-Inspired Computing:
Theory and on Applications.
10. D.Kumar and S.Singh. Secret data writing using DNA sequences. In Emerging Trends In Emerging Trends In Computer Communications (ETNCC), International Conference on,, pages 2011.
11. Khalifa and A. Atito. High-capacity DNA- based steganography. In Informatics and Systems (INFOS), In Informatic 2012 8th International Conference on,, pages BIO – 76 – BIO – 80, May 2012.
12. M. Shyamasree and S. Anees. Highly secure DNA-based audio steganography.
In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on,, pages 519–524, July 2013.
13. P.VijayaKumar and V.Vijayalakshmi Enhanced level of security using DNA computing technique with hyperelliptic curve cryptography. Network Security, 4, 2013.
14. P. Das and N. Kar. A DNA based image steganography using 2d chaotic map. In Electronics and Communication Systems (ICECS), 2014 International Conference on,pages 1 – 5, Feb 2014.
15. F. K. A. and D. Antony. A multiphase cryptosystem with secure key encapsulation scheme based on principles of DNA computing. In Advances in Computing and Communications (ICACC), 2014 Fourth International Conference on, pages 1–4, Aug 2014.
16. S. C. S, M. Misbahuddin, and M. Hashim N. P. DNA for information security: A survey on DNA computing and a pseudo dna method based on central dogma of molecular biology. In Computer and Communications Technologies (ICCCT), 2014 International Conference on,, pages 1–6, Dec 2014.
17. Shweta and S. Indora. Cascaded DNA cryptography and steganography. In Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on,, pages 104–107, Oct 2015.
18. J. Gubbi, R. Buyya, S. Marusic, and M.
Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” FutureGeneration Computer
Vol.03, Issue 04, April 2018, Available Online: www.ajeee.co.in/index.php/AJEEE Systems, vol. 29, no. 7, pp. 1645–1660,
2013.
19. R. Want and S. Dustdar, “Activating the internet of things [guest editors’introduction],” Computer, vol. 48, no. 9, pp. 16–20, 2015.Fig. 6: Correlation comparison.