Deo Brat Ojha et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 3, Issue No. 2, 155 - 158
Cryptic E-Mailing Scheme over Stymieing Channel (CESSC)
Ajay Sharma
Deo Brat Ojha
(Research Scholar Singhania University, Jhunjhunu, Rajsthan). R.K.G. Institute of Technology, 5th K.M. Stone Delhi-Meerut, Road, Gzb.U.P. (India) ajaypulast@rediffmail.com
R.K.G. Institute of Technology, 5th K.M. Stone Delhi-Meerut, Road, Gzb.U.P. (India) deobratojha@rediffmail.com
Ramveer Singh
Abhishek Shukla
(Research Scholar Singhania University, Jhunjhunu, Rajsthan). R.K.G. Institute of Technology, 5th K.M. Stone Delhi-Meerut, Road, Gzb.U.P. (India) ramveersingh_rana@yahoo.co.in
Meenu Sahni
T
(Research Scholar Singhania University, Jhunjhunu, Rajsthan). R.K.G. Institute of Technology, 5th K.M. Stone Delhi-Meerut, Road, Gzb.U.P. (India) abhishekknit@gmail.com
ES
(Research Scholar Mewar University, Chittorgarh, Rajsthan). Bhagwati Institute of Technology & Science, Ghaziabad, U.P. mnu.sahni@rediffmail.com
IJ A
Abstract— In this paper, we presented an errorless model of emailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model Alice can send a secret message even to any strange person in an anonymous way. The users of this model are assumed to be may or may not be the members of a closed organization. If any error occurred during the transmission due to teeming channel, it can also be determine & encountered by error correction function.
Keywords- Message, Transmission Error, Stegnography, Covert Mailing System, Error Correction function.
Introduction
Modern steganography has a relatively short history because people did not pay much attention to this skill until Internet security became a social concern. Most people did not know what steganography was because they did not have any means to know the meaning. Even today ordinary dictionaries do not contain the word “steganography.” Books on steganography are still very few [1], [2]. The most important feature of this steganography is that it has a very large data hiding capacity [3], [4]. Steganography can be applied to variety of information systems. Some key is used in these systems when it embeds/extracts secret data. One natural application is a secret mailing system [5], [6] that uses a symmetric key. Another application pays attention to the nature
ISSN: 2230-7818
of steganography whereby the external data (e.g., visible image data) and the internal data (any hidden information) cannot be separated by any means. We will term this nature as an “inseparability” of the two forms of data. In this current paper, we will show an anonymous and covert e-mailing system with some transmission error. Present paper is as follows. In Section 2 describes the scheme of an Anonymous Covert Mailing System (Cryptic E-Mailing Scheme over Stymieing Channel- CESSC). Section 3 we will show error correction code. How we can make it a safe system with error detection and correction in Section 4. Finally, section 5 is conclusion I.
CESSC
CESSC is a steganography application program. In the following description,
denotes a member
,
and denotes a member . An CESSC consists of the three following components. Envelope Producer (EP). Message Inserter (MI). 3. Envelope Opener (EO). We denote CESSC
’s CESSC as
by
).
So,
(i.e., customized it
is
described
as .
is a component that produces
@ 2011 http://www.ijaest.iserp.org. All rights Reserved.
Page 155
’s
Deo Brat Ojha et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 3, Issue No. 2, 155 - 158
organization when they send a secret message to
.
is produced from an original image
.
can select it according to his preference. has both the name and e-mail address of on the envelope surface (actually, the name and . It will be placed address are “printed” on image at an open site in the organization so that anyone can get it freely and use it any time. Or someone may ask to send it directly to him/her. is the component to insert (i.e., embed according to the steganographic scheme) ’s message into another member’s (e.g., )’s envelope
when
sending a secret message
to
One important function of that envelope
is
has
been
j
j
in
2.3. Definition The measurement of nearness between two code words c and c is defined by nearness (c, c) dist (c, c) / n , it is obvious that 0 nearness (c,c) 1 [9]. 2.4. Definition The fuzzy membership function for a code word c to be equal to a given c is defined as [9]. FUZZ (c) 0 if nearness(c,c) z z 1 0
z
the is a
’s “message
inserted” envelope
which
received from someone as an e-mail attachment. sender
of is not known until
envelope by using
secret
message
opens the
IJ A
ERROR CORRECTION CODE
A metric space is a set C with a distance function dist : C C R [0, ) , which obeys the usual properties(symmetric, triangle inequalities, zero distance between equal points)[7,8]. 2.1. Definition Let C{0,1}n be a code set which consists of a set of code words ci of length n. The distance metric between any two code words ci and c in C is defined by j n
dist (c , c ) j
c r 1
ir
c
jr
c , c C. This is known as i
otherwise
III.
CUSTOMIZATION OF A CESSC
Customization of an CESSC for a member
takes place in the following way. key
j
first decides a
when he installs the CESSC onto his
computer. Then he types in his name
and e-
mail address is secretly hidden (according to a steganographic procedure in his This
envelope
.
II.
the
i
i
ES
.
i
j
is called the nearest neighbour of c [7].
.
hidden
i
c f c
, and uses it when inserting a message
component that opens (extracts)
i
i
is that it detects a key
in
The
2.2. Definition An error correction function f for a code C is defined as f (c ) {c / dist (c , c ) is the minimum, over C {c }} . Here,
T
envelope . is the envelope (actually, an image file) which is used by all other members in the
is eventually
transferred to a message sender’s invisible way.
in an
and
are printed out on the envelope surface when produces
by
using
is also set to
. at the time of
installation. and are also inserted (actually, embedded) automatically by any time
inserts his message
in
another
member’s
envelope
. The embedded
and
are extracted by a message receiver by
.
Hamming distance [9].
ISSN: 2230-7818
@ 2011 http://www.ijaest.iserp.org. All rights Reserved.
Page 156
Deo Brat Ojha et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 3, Issue No. 2, 155 - 158 IV CONCLUSION
A. How it works When some member
wants to send a secret to another member
message
, whether they are acquainted or not, downloads) the
gets (e.g.,
’s envelope
, and
uses it to insert his message
by using
’s key
is transferred
automatically in an invisible manner, and is
to actually
[1]
send
[2]
directly, or ask someone else to
[3]
used.
can
as an e-mail attachment. send, it to can be anonymous because no sender’s information is seen on
.
and only
REFERENCES
tries to insert a
is hidden,
can see it by opening the envelope. It is and
not a problem for acquainted or not because envelope from an open site.
to be
[5] [6]
ES
can get anyone’s
[4]
Due to the stymieing channel, there is a chance for the
get message
occurrence of error. Let instead of
[7]
, where
denote the transmission error. Now, correction function on
apply error
and gets
[8] [9]
.
check
IJ A
that
Stefan Katzenbeisser and Fabien A.P. Petitcolas (eds), “Information hiding techniques for steganography and digital watermarking”, Artech House, 2000. Neil F. Johnson, Zoran Duric and Sushil Jajodia,“Information Hiding”, Kluwer Academic Publishers, 2001. M. Niimi, H. Noda and E. Kawaguchi,"An image embedding in image by a complexity based region segmentation method", Proceedings of International Conf. on Image Processing'97, Vol.3, pp.74-77, Santa Barbara, Oct., 1997. E. Kawaguchi and R. O. Eason,"Principle and applications of BPCSSteganography", Proceedings of SPIE: Multimeda Systems and Applications, Vol.3528, pp.464-463, 1998. E. Kawaguchi, et al, “A concept of digital picture envelope for Internet communication” in Information modeling and knowledge bases X, IOS Press, pp.343-349, 1999. Eiji Kawaguchi, Hideki Noda, Michiharu Niimi and Richard O. Eason, “A Model of Anonymous Covert Mailing System Using Steganographic Scheme, Information modelling and knowledge bases X”,IOS Press, pp.81-85,2003. J.P.Pandey, D.B.Ojha, Ajay Sharma, “Enhance Fuzzy Commitment Scheme: An Approach For Post Quantum Cryptosystem”, in Journal of Applied and Theoretical Information Technology, (pp 16-19 ) Vol. 9, No. 1, Nov. 2009. V.Pless, “ Introduction to theory of Error Correcting Codes”, Wiley , New York 1982. A.A.Al-saggaf,H.S.Acharya,“A Fuzzy Commitment Scheme”IEEE International Conference on Advances in Computer Vision and Information Technology 28-30November 2007 – India.
T
. When message,
CESSC is a very easy-to-use system because users are not bothered by any key handling, as the key is always operated automatically. As CESSC doesn’t need any authorization bureau, this system can be very low cost. All these features overcome the drawbacks of an encrypted mailing system. Our approach provides the method to remove the error due to stymieing channel through fuzzy approach
,
will realize that there is an error occur during
the transmission. function
apply the error correction
to
.
Then
.
will
compute
nearness
if nearness
otherwise.
ISSN: 2230-7818
Dr. Deo Brat Ojha, Ph.D from Department of Applied Mathematics, Institute of Technology, Banaras Hindu University, Varansi (U.P.), INDIA in 2004. His research field is Optimization Techniques, Functional Analysis & Cryptography. He has more than Six year teaching & more than eight year research experience. He is working as a Professor at Raj Kumar Goel Institute of Technology, Ghaziabad (U.P.), INDIA. Dr. Ojha is the member of Mathematical Society Banaras Hindu University, LMIAENG, LMIACSIT. He is the author/co-author of more than 50 publications in International/National journals and conferences. Ramveer Singh, Bachelor of Engineering from Dr. B.R. Ambedkar university, Agra (U.P.), INDIA in 2003. Master of Technology from V.M.R.F. Deemed University, Salem (T.N.), INDIA in 2007. Persuing Ph.D from Singhania University, Jhunjhunu, Rajsthan, INDIA. The major field of study is Cryptography and network security. He has more than eight year experience in teaching and research as ASSOCIATE PROFESSOR. He is working at Raj Kumar Goel Institute of Technology, Ghaziabad (U.P.), INDIA. The current research area is Cryptography and Network security. Mr. Singh is the member of LMCSI, LMIAENG, LMIACSIT, LMCSTA. He is the author/co-author of more than 17 publications in International/National journals and conferences.
@ 2011 http://www.ijaest.iserp.org. All rights Reserved.
Page 157
Deo Brat Ojha et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES Vol No. 3, Issue No. 2, 155 - 158 Ajay Sharma, He did his Master of Technology(CSE) from Guru Jambheswar University of Science and Technology, Hisar (Haryana), India in 2004 and pursuing Ph.D. from Singhania University, Pacheri Beri, (Rajasthan), India . His major field of study is Cryptography and network security. His current research area is cryptographic protocol, symmetric encryption, asymmetric encryption and biometric template security. He has more than six years teaching experience. He is working as Associate Professor in the Department of Information Technology, Raj Kumar Goel Institute of Technology, Ghaziabad, (U.P.) India. Mr. Sharma is the life-time member of IAENG, IACSIT and CSTA. He is the author/co-author of more than 14 publications in International/National journals and conferences.
Meenu Sahni, She did her Master of Computer Application (MCA) from Indira Gandhi National Open University, India in 2004 and pursuing Ph.D. from Mewar University, Chittorgarh, (Rajasthan), India. Her major field of study is Cryptography and network security. Her current research area is secure mailing protocol and application. She has more than three year experience. She is working in Department of mathematics, Bhagwati Institute of Technology & Science, Ghaziabad, (U.P.) India. Mrs. Sahni is the author/co-author of more than 04 publications in International/National journals and conferences.
IJ A
ES
T
Abhishek Shukla, He did his Master of Computer Application (MCA) from Dr. Ram Manohar Lohia Avadh University, Faizabad, U.P., India in 2007 and pursuing Ph.D. from Singhania University, Pacheri Beri, (Rajasthan), India. His major field of study is Cryptography and network
security. His current research area is secure mailing protocol and application. He has more than three year experience. He is working in College of Computer Application, Raj Kumar Goel Institute of Technology, Ghaziabad, (U.P.) India. Mr. Shukla is the life-time member of IAENG. He is the author/co-author of more than 04 publications in International/National journals and conferences.
ISSN: 2230-7818
@ 2011 http://www.ijaest.iserp.org. All rights Reserved.
Page 158