SlideShare a Scribd company logo
Springer Advances in Intelligent Systems and Computing Series.
Data Encryption Using Hybrid Genetic Algorithm
JOSEPH EMMANUEL a
, SHASHIDHAR Vb
a
Research Scholar, Dept of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: joseph.emmanuel@outlook.com
b
Asst.Professor, Dept. of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: shashigowd@gmail.com
Abstract
Encryption of data is the key to security in terms of the data hiding and transfer. To achieve this kind of security
proposed system can all ways think of different data hiding mechanism. But once a data encryption algorithm
established it is easy to crack by the hackers, for this kind of addressed problem proposed system can use genetic
algorithm which can be a start to the new generation algorithm. with the help of genetic algorithm and hybrid
encryption techniques the security gives the maximum to these kind of problem, which addressing a new concept of
making genetic algorithm work in both image steganography and musical encryption.
Keywords: Genetic Algorithm, Musical Cryptography, HybridAlgorithm,Encryption, Decryption
1. Introduction
.
In this new world of digital technology, the old communication technique has been moved to digital
communication with the use of Internet and its subsequent technologies. In the digital communication era, keeping
data private is a serious issue that has to be addressed. To move with this task cryptography is used in data security.
Thus security is the key to unlock a communication world. Branch of security, which are cryptography,
information hiding, steganography and watermarking etc. provides improved role as they take part. As the skill
possesseson changing its aspect with advanced features, there is necessary to get apprise.
Figure 1: Shows the data encryption & decryption
Generally, when a new algorithm technique is created or an existing algorithm is swotted, intruders or hackers
break the algorithm. Information security means protection of data access from unauthorized users and hackers or
intruders. Thus it is essential to improve algorithms more effective and indestructible. The network security is
forked into cryptography and information hiding techniques. Information hiding con tains steganography and
watermarking methods. In cryptography, encryption of information's takes place at the transmitter and decryption at
the receiver unit. In cryptography, encryption of information's takes place at the transmitter and decryption at the
receiver unit.
Messages rather one information to be exchanged is usually in a specific language that we people practice;
anyone who knows of language can get the substance of the message without the previous knowledge of the
situation. The messages to be communicated are usually called as plain text message. Cryptography is the art of
altering a plain text message into meaningless or unreadable message Music and its qualities have been used in
cryptography from initial days.Musical symbols and musical notes taken been used as substitution cipher.
The algorithms applied to musical cryptography custompredefined set of notes and rules for the blend of musical
designs. The main task in the musical cryptography is to produce musical cryptograms which in chance are good
order of musical designs peaceful to ear. Apart from cryptographic algorithms Steganography remains used in
hiding messages. Unseen inks and Microdots are the samples of submission of steganography. Steganography is the
skill of hiding secret messages into another message, audio and videos are generally used as cover file to hide furtive
messages. By this it also conceals the reality of the message.
2. Literature Survey
The survey papers of genetic algorithm and data encryption techniques, after analysing the paper we came to
conclusion that what can be done in the proposed system.
The rapid developments of the communication and applications of multimedia techniques in recent years lead the
researchers to focuses on the security of digital data over the internet. In this paper we have discussed the use of
Elliptical Curve Cryptography for ciphering colour images. The adoption of elliptic curve cryptography in to
cyphering images will make more consecutive solutions for the entire process.The main advantage of this method is
that the time taken to implement the entire working systemwill be less and also it will take less hardware
requirements to implement the entire cryptographic system. Also people with less knowledge about high end
cryptographic procedures can establish the algorithm with less time which will make the entire idea more popular.
But the solitary problem is that the time taken for the process to complete the entire procedure. All the
calculation part will take less time but delivering the entire key distribution process will be high and there is precise
guaranty for the security of these distribution processes.It considers deploying the algorithm in small application
systems,it will make the process slowwhich lead to more problematic cryptographic establishments.Finally, the
security provided doesn’t meet high end applications like military data transfer or similar process,which needed
more security. Genetic algorithm (GA) based symmetric key musical cryptography algorithm is proposed to obtain
an optimal sequence of musical patterns as a cipher message. Other than all cryptographic methods it’s having the
ability to deliver a new systemwith high security become the musical encryption will need more knowledge on
musical notes which will make confusion for the hacker to decrypt the data.Without knowing the actual algorithm,
it is hard to break the code as the algorithm dealing with high end musical knowledge.
But on the other hand it will have other problems like implementation of the algorithm will consume more
time and also it will take more time to process data and convert in to a useful encrypted data. If beginner try to
implement the algorithm it will make almost impossible implement the entire systemas the knowledge n eeded for
the process is different than others.The idea of musical encryption is like double bladed sword as it will make
confusion to the hacker as well as to the person actually try to implement the algorithm. Also the implementation
and hardware requirements for the systemis high compared to the other algorithms.
The textual information related to the secret image is embedded into the secret image with the help of data
hiding techniques before dividing it into fragments. The main advantage of this technique is that it will provide two
layers of security. The first layer will be encoded the data into a single image and second layer will combine the
encrypted image into anotherimage. By giving this two-layer encryption it will be hard to crack the encryption code
and having knowledge the simple image encryption will give the ability to understand the algorithm easier. But
again looking into the problem side, it will make more encryption time as well as it need more processing resources
to complete the algorithm.
3. Description
Steganography is a division of data hiding. It allows the people to communicate secretly. As increasingly more
material becomes available electronically, the influence of steganography on our lives will continue to grow. Much
confidential information was leaked to a rival firm using stenographic tools that hid the information in music and
picture files. It is the process of hiding the information in to a picture and converting into a new picture with new
3
pixel image. These images usually contain private or confidential information which are to be protected from
exposure due to leakages during transmissions.
The whole system works in above mentioned manner. The system mainly consists of seven intermediate
processes ormodules. The following are the list of modules.
• Image steganography module
• Image merging module
• P2b module
• Musical encryption module
• RNG module
• SNG module
• Genetic Algorithm module
Step by step execution of these modules produce the final encrypted file which containing the text. These
modules will process the data concurrently in order to produce the output in encryption and decryption.
3.1 Module Description
Encryption is process of hiding data in the multiple files or single file to produce stronger output file which is
hardly unable to understand the encryption standard is used will determine the power of hiding image. it is essential
to improve algorithms more effective and indestructible. The network security is forked into cryptography and
information hiding. Information hiding contains steganography and watermarking.
Whereas Decryption is process of verdict data from the multiple files or single file to produce actual data
file which is easy to understand. The decryption standard is used will determine the power of accessing image. It is
essential to improve algorithms more effective and indestructible. The network security is forked into cryptography
and information hiding. Information hiding contains steganography and watermarking.
3.1.1Encryption
In cryptography,encryption of data's takes place at the transmitter and decryption at the receiver section.
Passive attacks are in the nature of eavesdropping on,or monitoring of, transmissions.The goal of the opponent is
to obtain information that is being transmitted. Two types of passive attacks are release of message contents and
traffic analysis.
Figure 4: Dataflow diagram for system encryption process
Figure 4 shows the actual encryption process of all module .in this step certain individual processes to
form the actual encoding. This consists ofcertain steps like musical encryption,data steganography,image hiding
etc.
3.1.2Decryption
In cryptography,decryption of data's takes place at the transmitter and decryption at the receiver section .
Passive attacks are in the nature of eavesdropping on,or monitoring of, transmissions.The goal of the opponent is to
obtain information that is hidden but as the algorithm providing high security its becomes impossible.
Figure 5: Dataflow diagram for system decryption process
Figure 5 shows the actual decryption process of all module .in this step certain individual processes to
form the actual decoding. This consists ofcertain steps like musical encryption,data steganography,image
hiding to produce the actual message.
4. System Design
Steganography is a branch of information hiding. It allows the people to communicate secretly. As increasingly
more material becomes available electronically, the influence of steganography on ourlives will continue to grow.
Much confidential information was leaked to a rival firm using stenographic tools that hid the information in music
and picture files. It is the process of hiding the information in to a picture and converting into a new picture with
new pixel image. These images usually contain private or confidential information which are to be protected from
exposure due to leakages during transmissions.
Image Steganography:In this particular stage data encryption will take its first step of transferring the data
into a hided message. This stage is achieved by two methods called image data transform and image data merging.
These two methods can be implemented one at a time or combination of both.This decision is made by the genetic
algorithm in the following modules.
Musical Encryption: By implementation of this method will provide the entire data a new hiding mechanism
where data from previous stage will be converted as musical data. Where data will be encrypted using musical
notations and properties. RNG Pool: This method is to provide high security for the genetic algorithm to make
decision among the different situations to select methods in above mentioned procedures.
SNG Pool: this step is to provide validation and legitimacy of the senderand receiver by adding the system
information to the data which is hidden.
5
Figure 2: Architectural diagram of conceptual system
The figure 2 represented the basic conceptual diagram of the proposed system.It’s a waterfall model it’s
also having intermediate steps which follows the production of the project. This process will have done two sides,
both sendersides as well as receiver side.
The idea of simple image encryption lies in the next figure 3. This explains the basic flow of bits and its
conversion.This method is simpler in its procedure. But when this process embedded in to the genetic algorit hm its
becomes more complicated.
Figure 3: The diagram of image steganography
5. Results and discussion
The proposed systemwas employed in MATLAB. At first the algorithm will execute the image steganography
module in which entire data which needed to code will be stored in the database in the form of bits and the it will
have encoded to a grey scale image once the process finished then it will give for the encryption process as the
input to musical encryption. In both modules the attributes were given by the GA to extend where it’s impossible to
predict. A genetic rule will be produced in order to create this step.The hypothesis space will be calculated by the
data taken from both SNG pool and RNG pool. On every time execution the hypothesis space becomes more
advanced to produce the advanced encrypted output file.
Figure 6: The screenshot of the Application after Data Hiding
Figure 7: The screenshot of theapplication after data merging
Figure 8: The Screenshot of the Application after applying GA
7
Conclusion
The musical encryption techniques are attracting more attention because its ability to provide high security
for the data.Once the technique is embedded with genetic algorithm its almost make the setup untraceable. Once
the image file created it will convert into a normal binary to pixel conversion.This conversion will give the ability
to produce a new musical file which contains the data. As the file doesn’t implement any external musical file it
will be good to produce high rate encryption file. This step will avoid the ability to match and learn technique and
data analysis technique type attacks.
The idea of this encryption is to provide high security towards all kinds of attacks. But even with high security
taking high systemresources.The encryption and Decryption will take more time than other techniques.
The future work will more focusing on decreasing the processing time and faster execution of the program.it
should reflect in such a way that it will change the images without any hesitation.
References:
[1]. Maryam Savari and Yeoh Eng Thiam, “Comparison of ECC and RSA in Multipurpose Smart
CardApplication”.
[2]. Elsayed Mohammed and A.E Emarah and Kh.El-Shenawwey, “Elliptic Curve Cyrptosystems on Smart
Cards”.
[3]. Padma Bh, D.Chandravathi, P.prapoorna Roja: “Encoding and decoding of a message in the
implementation of Elliptic Curve Cryptography using Koblitz Method”.International Journal on
Computer Science and Engineering (IJCSE) Vol. 02, No. 05, 2010, 1904-1907
[4]. Hankerson, Menezes, Vanstone. “Guide to elliptic curve cryptography” Springer, 2004 ISBN
038795273X 332s_CsCr
[5] Kahn, David. "The Codebreakers: The Comprehensive History Of Secret Communication From Ancient
Times To The Internet",1996
[6] AbuTaha,M., Farajallah, M., Tahboub,R., & Odeh, M. (2011). Survey Paper: Cryptography Is The
Science Of Information Security. International Journal of Computer Science and Security (IJCSS), Vol. 5,
No. 3, 2011, pp.298.
[7] Davies, D. A brief history of cryptography.Information Security Technical Report, Vol. 2, No. 2, 1997,
pp.14-17.
[8] Kircher, Athanasius.Musurgia universalis.: 1650. 1988
[9] Coudert, Allison P., Richard Henry Popkin, and Gordon M. Weiner, eds.Leibniz, mysticism and religion.,
International Archives of the History of Ideas, Vol. 158. Springer, 1998.
[10] Bourne, Joyce. The concise Oxford dictionary of music. OUP Oxford, 2004.
11] Tatlow, Ruth. “Bach and the Riddle of the Number Alphabet”.Cambridge University Press, 1991.
[12] Sams, Eric. "Elgar's Cipher Letter to Dorabella.", The Musical Times Vol 111, No. 1524, 1970, pp. 151-
154.
[13] Sadie, Stanley E. "The new Grove dictionary of music and musicians." (1980).
[14] Dutta S, Chakraborty S, Mahanti N.C., “A novel Method of Hiding Message Using Musical Notes”,
International Journal of Computer Application , vol.1, No.16, 2010.
[15] Dutta S, Chakraborty S, Mahanti N.C., “Using Raga as a Cryptographic Tool”, Advances in Network
Security and Applications, Communications in Computer and Information Science, 2011, Volume 196,
CNSA 2011 (Springer).
[16] Dutta, Sandip, Chandan Kumar, and Soubhik Chakraborty. "A Symmetric Key Algorithm for
Cryptography using Music." International Journal of Engineering and Technology,Vol 5, No 3, 2013, pp.
3109-3115.
[17] M. Yamuna ,Sankar A., Ravichandran S., V. Harish Encryption of a Binary String Using Music Notes and
Graph theory,International Journal of Engineering and Technology , Vol 5, No 3 Jun-Jul, 2013, pp.
2920-2925.
[18] Yamamoto, Kotaro, and MunetoshiIwakiri. "A standard MIDI file steganography based on fluctuation of
duration." Availability, Reliability and Security, 2009. ARES'09. International Conference on. IEEE,
2009.
[19] Adli, Alexander, and Zensho Nakao. "Three Steganography algorithms for MIDI files." Machine Learning
and Cybernetics, 2005. Proceedings of 2005 International Conference on. Vol. 4. IEEE, 2005.
[20] Whitley, Darrell. "A genetic algorithm tutorial." Statistics and computing, Vol. 4, No. 2, 1994, pp.65-85.
[21] Jacob, Bruce. "Composing with genetic algorithms." (1995).
[22] Gartland-Jones, Andrew, and Peter Copley. "The suitability of genetic algorithms for musical
composition." Contemporary Music Review, Vol. 22, No. 3, 2003, pp.43-55.
[23] Fortier, Nathan, and Michele Van Dyne. "A Genetic Algorithm Approach to Improve Automated Music
Composition.", INTERNATIONAL JOURNAL OF COMPUTERS, Vol. 5, No. 4, 2011, pp.525-532.
Authors Biography
Joseph Emmanuel Research Scholar, Dept of CSE, RajaRajeswari College of Engineering, Bangalore. He is
completed his B.Tech. degree from Christ University Bangalore, He is currently pursuing his M.Tech. degree from
VTU.
Shashi Gowda Asst.Professor, Dept of ISE, RajaRajeswari College of Engineering, Bangalore. He is completed his
B.E. degree from VTU and M.Tech. degree from University of Madras. He is currently pursuing his Ph.D degree
from xxx university, vttt. He has published 5 papers in national and international journals and conferences. He is life
member of ISTE, IAENG, CSI.

More Related Content

PDF
PDF
Review of Role of Digital Video in Information Security
PDF
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
PPTX
Data Security Using Steganography
PDF
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
PDF
Analysis of Different Steganography Algorithms and Security Issues
PDF
Data security using stegnography and quantum cryptography
Review of Role of Digital Video in Information Security
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
Data Security Using Steganography
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
Analysis of Different Steganography Algorithms and Security Issues
Data security using stegnography and quantum cryptography

What's hot (18)

PDF
4.content (stenography)
PDF
Steganography document
PDF
C01111519
PDF
A novel steganographic scheme based on
PDF
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
PDF
A Secure Data Communication System Using Cryptography and Steganography
PDF
Review paper on Data Security using Cryptography and Steganography
DOCX
Steganography using visual cryptography: Report
PDF
Ijmet 10 01_020
PDF
Image Steganography V2 i11 0143
PDF
N45028390
PDF
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
PDF
Hn2513581359
PDF
Stegnography Systems for Securing DataFile in Image
PDF
Review on Encrypted Image with Hidden Data Using AES Algorithm
PDF
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
PDF
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
PDF
International Journal of Engineering Research and Development (IJERD)
4.content (stenography)
Steganography document
C01111519
A novel steganographic scheme based on
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
A Secure Data Communication System Using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
Steganography using visual cryptography: Report
Ijmet 10 01_020
Image Steganography V2 i11 0143
N45028390
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
Hn2513581359
Stegnography Systems for Securing DataFile in Image
Review on Encrypted Image with Hidden Data Using AES Algorithm
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
International Journal of Engineering Research and Development (IJERD)
Ad

Viewers also liked (13)

PDF
Synchronization protection & redundancy in ng networks itsf 2015
PDF
CV Sander Ruysbroek - 2016 v1
DOC
SENCER LIS 101 presentation
PDF
Evaluación alumnos
DOCX
Rob Resume 2015 No
PDF
October 2014 presentation
PPTX
Foro Departamental de Experiencias Significativas en Inclusión Educativa.
PPTX
Trabajo historia de la odontología
PPT
2 ESO_TEMA 1: ISLAM i AL ANDALUS
PPTX
Tema 10. La Guerra Civil
PPT
Saúde bucal
PDF
Pastoral. Sant Josep de Calassanç 2016
PDF
Primer de Primària. Sortida als aiguamolls.
Synchronization protection & redundancy in ng networks itsf 2015
CV Sander Ruysbroek - 2016 v1
SENCER LIS 101 presentation
Evaluación alumnos
Rob Resume 2015 No
October 2014 presentation
Foro Departamental de Experiencias Significativas en Inclusión Educativa.
Trabajo historia de la odontología
2 ESO_TEMA 1: ISLAM i AL ANDALUS
Tema 10. La Guerra Civil
Saúde bucal
Pastoral. Sant Josep de Calassanç 2016
Primer de Primària. Sortida als aiguamolls.
Ad

Similar to final_Paper_springer_final (20)

PDF
Evolution of Cryptography and Cryptographic techniques
PDF
secure Audio Data Transfer Over Internet Using Steganography
PDF
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
PPT
Cryptography and Network Security
PDF
Cryptography
PPTX
groupWork.pptx
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PDF
H017255560
PDF
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
DOCX
Cryptography- "A Black Art"
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
PPTX
Cryptography and Network Security
PDF
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
PDF
AJMS_491_23.pdf
PDF
Computer Security Chapter III.pdf
PPTX
Image Security System using Image Processing
PDF
L017136269
PDF
Comparison of Various Encryption Algorithms and Techniques for improving secu...
PDF
Bt0088 cryptography and network security1
PPT
Securityand encryption
Evolution of Cryptography and Cryptographic techniques
secure Audio Data Transfer Over Internet Using Steganography
IRJET- A Survey on Cryptography, Encryption and Compression Techniques
Cryptography and Network Security
Cryptography
groupWork.pptx
A Survey on Generation and Evolution of Various Cryptographic Techniques
H017255560
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Cryptography- "A Black Art"
A Survey on Cryptographic Techniques for Network Security.pdf
Cryptography and Network Security
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
AJMS_491_23.pdf
Computer Security Chapter III.pdf
Image Security System using Image Processing
L017136269
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Bt0088 cryptography and network security1
Securityand encryption

final_Paper_springer_final

  • 1. Springer Advances in Intelligent Systems and Computing Series. Data Encryption Using Hybrid Genetic Algorithm JOSEPH EMMANUEL a , SHASHIDHAR Vb a Research Scholar, Dept of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: joseph.emmanuel@outlook.com b Asst.Professor, Dept. of CSE, RajaRajeswari College of Engineering, Bangalore -74, Email: shashigowd@gmail.com Abstract Encryption of data is the key to security in terms of the data hiding and transfer. To achieve this kind of security proposed system can all ways think of different data hiding mechanism. But once a data encryption algorithm established it is easy to crack by the hackers, for this kind of addressed problem proposed system can use genetic algorithm which can be a start to the new generation algorithm. with the help of genetic algorithm and hybrid encryption techniques the security gives the maximum to these kind of problem, which addressing a new concept of making genetic algorithm work in both image steganography and musical encryption. Keywords: Genetic Algorithm, Musical Cryptography, HybridAlgorithm,Encryption, Decryption 1. Introduction . In this new world of digital technology, the old communication technique has been moved to digital communication with the use of Internet and its subsequent technologies. In the digital communication era, keeping data private is a serious issue that has to be addressed. To move with this task cryptography is used in data security. Thus security is the key to unlock a communication world. Branch of security, which are cryptography, information hiding, steganography and watermarking etc. provides improved role as they take part. As the skill possesseson changing its aspect with advanced features, there is necessary to get apprise. Figure 1: Shows the data encryption & decryption Generally, when a new algorithm technique is created or an existing algorithm is swotted, intruders or hackers break the algorithm. Information security means protection of data access from unauthorized users and hackers or intruders. Thus it is essential to improve algorithms more effective and indestructible. The network security is forked into cryptography and information hiding techniques. Information hiding con tains steganography and watermarking methods. In cryptography, encryption of information's takes place at the transmitter and decryption at the receiver unit. In cryptography, encryption of information's takes place at the transmitter and decryption at the receiver unit.
  • 2. Messages rather one information to be exchanged is usually in a specific language that we people practice; anyone who knows of language can get the substance of the message without the previous knowledge of the situation. The messages to be communicated are usually called as plain text message. Cryptography is the art of altering a plain text message into meaningless or unreadable message Music and its qualities have been used in cryptography from initial days.Musical symbols and musical notes taken been used as substitution cipher. The algorithms applied to musical cryptography custompredefined set of notes and rules for the blend of musical designs. The main task in the musical cryptography is to produce musical cryptograms which in chance are good order of musical designs peaceful to ear. Apart from cryptographic algorithms Steganography remains used in hiding messages. Unseen inks and Microdots are the samples of submission of steganography. Steganography is the skill of hiding secret messages into another message, audio and videos are generally used as cover file to hide furtive messages. By this it also conceals the reality of the message. 2. Literature Survey The survey papers of genetic algorithm and data encryption techniques, after analysing the paper we came to conclusion that what can be done in the proposed system. The rapid developments of the communication and applications of multimedia techniques in recent years lead the researchers to focuses on the security of digital data over the internet. In this paper we have discussed the use of Elliptical Curve Cryptography for ciphering colour images. The adoption of elliptic curve cryptography in to cyphering images will make more consecutive solutions for the entire process.The main advantage of this method is that the time taken to implement the entire working systemwill be less and also it will take less hardware requirements to implement the entire cryptographic system. Also people with less knowledge about high end cryptographic procedures can establish the algorithm with less time which will make the entire idea more popular. But the solitary problem is that the time taken for the process to complete the entire procedure. All the calculation part will take less time but delivering the entire key distribution process will be high and there is precise guaranty for the security of these distribution processes.It considers deploying the algorithm in small application systems,it will make the process slowwhich lead to more problematic cryptographic establishments.Finally, the security provided doesn’t meet high end applications like military data transfer or similar process,which needed more security. Genetic algorithm (GA) based symmetric key musical cryptography algorithm is proposed to obtain an optimal sequence of musical patterns as a cipher message. Other than all cryptographic methods it’s having the ability to deliver a new systemwith high security become the musical encryption will need more knowledge on musical notes which will make confusion for the hacker to decrypt the data.Without knowing the actual algorithm, it is hard to break the code as the algorithm dealing with high end musical knowledge. But on the other hand it will have other problems like implementation of the algorithm will consume more time and also it will take more time to process data and convert in to a useful encrypted data. If beginner try to implement the algorithm it will make almost impossible implement the entire systemas the knowledge n eeded for the process is different than others.The idea of musical encryption is like double bladed sword as it will make confusion to the hacker as well as to the person actually try to implement the algorithm. Also the implementation and hardware requirements for the systemis high compared to the other algorithms. The textual information related to the secret image is embedded into the secret image with the help of data hiding techniques before dividing it into fragments. The main advantage of this technique is that it will provide two layers of security. The first layer will be encoded the data into a single image and second layer will combine the encrypted image into anotherimage. By giving this two-layer encryption it will be hard to crack the encryption code and having knowledge the simple image encryption will give the ability to understand the algorithm easier. But again looking into the problem side, it will make more encryption time as well as it need more processing resources to complete the algorithm. 3. Description Steganography is a division of data hiding. It allows the people to communicate secretly. As increasingly more material becomes available electronically, the influence of steganography on our lives will continue to grow. Much confidential information was leaked to a rival firm using stenographic tools that hid the information in music and picture files. It is the process of hiding the information in to a picture and converting into a new picture with new
  • 3. 3 pixel image. These images usually contain private or confidential information which are to be protected from exposure due to leakages during transmissions. The whole system works in above mentioned manner. The system mainly consists of seven intermediate processes ormodules. The following are the list of modules. • Image steganography module • Image merging module • P2b module • Musical encryption module • RNG module • SNG module • Genetic Algorithm module Step by step execution of these modules produce the final encrypted file which containing the text. These modules will process the data concurrently in order to produce the output in encryption and decryption. 3.1 Module Description Encryption is process of hiding data in the multiple files or single file to produce stronger output file which is hardly unable to understand the encryption standard is used will determine the power of hiding image. it is essential to improve algorithms more effective and indestructible. The network security is forked into cryptography and information hiding. Information hiding contains steganography and watermarking. Whereas Decryption is process of verdict data from the multiple files or single file to produce actual data file which is easy to understand. The decryption standard is used will determine the power of accessing image. It is essential to improve algorithms more effective and indestructible. The network security is forked into cryptography and information hiding. Information hiding contains steganography and watermarking. 3.1.1Encryption In cryptography,encryption of data's takes place at the transmitter and decryption at the receiver section. Passive attacks are in the nature of eavesdropping on,or monitoring of, transmissions.The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are release of message contents and traffic analysis. Figure 4: Dataflow diagram for system encryption process
  • 4. Figure 4 shows the actual encryption process of all module .in this step certain individual processes to form the actual encoding. This consists ofcertain steps like musical encryption,data steganography,image hiding etc. 3.1.2Decryption In cryptography,decryption of data's takes place at the transmitter and decryption at the receiver section . Passive attacks are in the nature of eavesdropping on,or monitoring of, transmissions.The goal of the opponent is to obtain information that is hidden but as the algorithm providing high security its becomes impossible. Figure 5: Dataflow diagram for system decryption process Figure 5 shows the actual decryption process of all module .in this step certain individual processes to form the actual decoding. This consists ofcertain steps like musical encryption,data steganography,image hiding to produce the actual message. 4. System Design Steganography is a branch of information hiding. It allows the people to communicate secretly. As increasingly more material becomes available electronically, the influence of steganography on ourlives will continue to grow. Much confidential information was leaked to a rival firm using stenographic tools that hid the information in music and picture files. It is the process of hiding the information in to a picture and converting into a new picture with new pixel image. These images usually contain private or confidential information which are to be protected from exposure due to leakages during transmissions. Image Steganography:In this particular stage data encryption will take its first step of transferring the data into a hided message. This stage is achieved by two methods called image data transform and image data merging. These two methods can be implemented one at a time or combination of both.This decision is made by the genetic algorithm in the following modules. Musical Encryption: By implementation of this method will provide the entire data a new hiding mechanism where data from previous stage will be converted as musical data. Where data will be encrypted using musical notations and properties. RNG Pool: This method is to provide high security for the genetic algorithm to make decision among the different situations to select methods in above mentioned procedures. SNG Pool: this step is to provide validation and legitimacy of the senderand receiver by adding the system information to the data which is hidden.
  • 5. 5 Figure 2: Architectural diagram of conceptual system The figure 2 represented the basic conceptual diagram of the proposed system.It’s a waterfall model it’s also having intermediate steps which follows the production of the project. This process will have done two sides, both sendersides as well as receiver side. The idea of simple image encryption lies in the next figure 3. This explains the basic flow of bits and its conversion.This method is simpler in its procedure. But when this process embedded in to the genetic algorit hm its becomes more complicated. Figure 3: The diagram of image steganography 5. Results and discussion The proposed systemwas employed in MATLAB. At first the algorithm will execute the image steganography module in which entire data which needed to code will be stored in the database in the form of bits and the it will
  • 6. have encoded to a grey scale image once the process finished then it will give for the encryption process as the input to musical encryption. In both modules the attributes were given by the GA to extend where it’s impossible to predict. A genetic rule will be produced in order to create this step.The hypothesis space will be calculated by the data taken from both SNG pool and RNG pool. On every time execution the hypothesis space becomes more advanced to produce the advanced encrypted output file. Figure 6: The screenshot of the Application after Data Hiding Figure 7: The screenshot of theapplication after data merging Figure 8: The Screenshot of the Application after applying GA
  • 7. 7 Conclusion The musical encryption techniques are attracting more attention because its ability to provide high security for the data.Once the technique is embedded with genetic algorithm its almost make the setup untraceable. Once the image file created it will convert into a normal binary to pixel conversion.This conversion will give the ability to produce a new musical file which contains the data. As the file doesn’t implement any external musical file it will be good to produce high rate encryption file. This step will avoid the ability to match and learn technique and data analysis technique type attacks. The idea of this encryption is to provide high security towards all kinds of attacks. But even with high security taking high systemresources.The encryption and Decryption will take more time than other techniques. The future work will more focusing on decreasing the processing time and faster execution of the program.it should reflect in such a way that it will change the images without any hesitation. References: [1]. Maryam Savari and Yeoh Eng Thiam, “Comparison of ECC and RSA in Multipurpose Smart CardApplication”. [2]. Elsayed Mohammed and A.E Emarah and Kh.El-Shenawwey, “Elliptic Curve Cyrptosystems on Smart Cards”. [3]. Padma Bh, D.Chandravathi, P.prapoorna Roja: “Encoding and decoding of a message in the implementation of Elliptic Curve Cryptography using Koblitz Method”.International Journal on Computer Science and Engineering (IJCSE) Vol. 02, No. 05, 2010, 1904-1907 [4]. Hankerson, Menezes, Vanstone. “Guide to elliptic curve cryptography” Springer, 2004 ISBN 038795273X 332s_CsCr [5] Kahn, David. "The Codebreakers: The Comprehensive History Of Secret Communication From Ancient Times To The Internet",1996 [6] AbuTaha,M., Farajallah, M., Tahboub,R., & Odeh, M. (2011). Survey Paper: Cryptography Is The Science Of Information Security. International Journal of Computer Science and Security (IJCSS), Vol. 5, No. 3, 2011, pp.298. [7] Davies, D. A brief history of cryptography.Information Security Technical Report, Vol. 2, No. 2, 1997, pp.14-17. [8] Kircher, Athanasius.Musurgia universalis.: 1650. 1988 [9] Coudert, Allison P., Richard Henry Popkin, and Gordon M. Weiner, eds.Leibniz, mysticism and religion., International Archives of the History of Ideas, Vol. 158. Springer, 1998. [10] Bourne, Joyce. The concise Oxford dictionary of music. OUP Oxford, 2004. 11] Tatlow, Ruth. “Bach and the Riddle of the Number Alphabet”.Cambridge University Press, 1991. [12] Sams, Eric. "Elgar's Cipher Letter to Dorabella.", The Musical Times Vol 111, No. 1524, 1970, pp. 151- 154. [13] Sadie, Stanley E. "The new Grove dictionary of music and musicians." (1980). [14] Dutta S, Chakraborty S, Mahanti N.C., “A novel Method of Hiding Message Using Musical Notes”,
  • 8. International Journal of Computer Application , vol.1, No.16, 2010. [15] Dutta S, Chakraborty S, Mahanti N.C., “Using Raga as a Cryptographic Tool”, Advances in Network Security and Applications, Communications in Computer and Information Science, 2011, Volume 196, CNSA 2011 (Springer). [16] Dutta, Sandip, Chandan Kumar, and Soubhik Chakraborty. "A Symmetric Key Algorithm for Cryptography using Music." International Journal of Engineering and Technology,Vol 5, No 3, 2013, pp. 3109-3115. [17] M. Yamuna ,Sankar A., Ravichandran S., V. Harish Encryption of a Binary String Using Music Notes and Graph theory,International Journal of Engineering and Technology , Vol 5, No 3 Jun-Jul, 2013, pp. 2920-2925. [18] Yamamoto, Kotaro, and MunetoshiIwakiri. "A standard MIDI file steganography based on fluctuation of duration." Availability, Reliability and Security, 2009. ARES'09. International Conference on. IEEE, 2009. [19] Adli, Alexander, and Zensho Nakao. "Three Steganography algorithms for MIDI files." Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on. Vol. 4. IEEE, 2005. [20] Whitley, Darrell. "A genetic algorithm tutorial." Statistics and computing, Vol. 4, No. 2, 1994, pp.65-85. [21] Jacob, Bruce. "Composing with genetic algorithms." (1995). [22] Gartland-Jones, Andrew, and Peter Copley. "The suitability of genetic algorithms for musical composition." Contemporary Music Review, Vol. 22, No. 3, 2003, pp.43-55. [23] Fortier, Nathan, and Michele Van Dyne. "A Genetic Algorithm Approach to Improve Automated Music Composition.", INTERNATIONAL JOURNAL OF COMPUTERS, Vol. 5, No. 4, 2011, pp.525-532. Authors Biography Joseph Emmanuel Research Scholar, Dept of CSE, RajaRajeswari College of Engineering, Bangalore. He is completed his B.Tech. degree from Christ University Bangalore, He is currently pursuing his M.Tech. degree from VTU. Shashi Gowda Asst.Professor, Dept of ISE, RajaRajeswari College of Engineering, Bangalore. He is completed his B.E. degree from VTU and M.Tech. degree from University of Madras. He is currently pursuing his Ph.D degree from xxx university, vttt. He has published 5 papers in national and international journals and conferences. He is life member of ISTE, IAENG, CSI.