Image File Security using Base-64 Algorithm

advertisement
ISSN:2229-6093
Pooja Guwalani et al, Int.J.Computer Technology & Applications,Vol 5 (6),1892-1895
Image File Security using Base-64 Algorithm
Pooja Guwalani [1] Maya Kala [2] Rohit Chandrashekar[3] Jayashree Shinde[4] Dashrath Mane [5]
VES Institute of Technology ,
Chembur, Mumbai
[1] guwalanipooja@yahoo.co.in
[2] maya11kala@gmail.com
[4] jayashreeshinde25@gmail.com
Abstract
[3] rohit28chandrashekar@gmail.com
[5] dashumane@gmail.com
Information security is becoming a vital component
of any data storage and transmission operations.
Since visual representation of data is gaining
importance, data in the form of images are used to
exchange and convey information between entities.
As the use of digital techniques for transmitting and
storing images are increasing, it becomes an
important issue to protect the confidentiality,
integrity and authenticity of images. There are
various techniques which are discovered to encrypt
the images to make them more secure. The primary
goal of this paper is security management. A
mechanism to provide authentication of users and
ensure integrity, accuracy and safety of images.
Moreover, an image-based data requires more effort
during encryption and decryption. In this paper, we
describe how Base64 algorithm can be used to
achieve this purpose.
Security is an important issue in communication and
storage of images, and encryption is one of the ways
to ensure security. However, images are different
from text. Although we may use the traditional
cryptosystems to encrypt images directly, it is not a
good idea for two reasons. One is that the image size
is almost always greater than that of text. Therefore,
traditional cryptosystems need much time to encrypt
the image data. The other condition is that the
decrypted text must be equal to the original text [6].
These systems consume lot of computing resources
such as battery and CPU time.
Keywords-component—
Security System.
The MIME specification lists Base64 as one of
its binary-to-text encoding feature. MIME does not
specify a fixed length for Base64-encoded lines, but
it does specify a maximum line length of 76
characters. Additionally it specifies that any extraalphabetic characters must be ignored by a compliant
decoder.
Base64,
Image
File
1. Introduction
Image encryption has applications in internet
communication, multimedia systems, medical
imaging, telemedicine, and military communication.
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
Base64 is a group of similar binary-to-text
encoding schemes that represent binary data in
an ASCII string format by translating it into a radix64 representation. The term Base64 originates from a
specific MIME
(Multipurpose
Internet
Mail
Extensions) content transfer encoding[8].
Base64 encoding schemes are commonly used when
there is a need to encode binary data that needs to be
stored and transferred over media that are designed to
deal with textual data. This is to ensure that the data
remains intact without modification during transport.
1892
ISSN:2229-6093
Pooja Guwalani et al, Int.J.Computer Technology & Applications,Vol 5 (6),1892-1895
Base64 is used in a number of applications
including email via MIME, and storing complex data
in XML [8].
images systematically. The main objective is to
provide protection of image data from unauthorized
access.
Image File Security System is based on the Data
conversion process. Data conversion is the
conversion of computer data from one format to
another. Throughout a computer environment, data is
encoded in a variety of ways [5].
Data conversions may be as simple as the conversion
of a text file from one character encoding system to
another; or more complex, such as the conversion of
office file formats, or the conversion of image and
audio file formats. The system that has been
developed converts image into text file and vice a
versa [5].
Fig1. Base64 representation
BASE64 Algorithm:
Base64 algorithm is based on ASCII conversion of 3byte, 24-bit groups is repeated until the whole
sequence of original data bytes is encoded [1].
Example
Let's say we want to convert three bytes 155, 162 and
233. The corresponding 24-bit stream is
100110111010001011101001.
155 -> 10011011
162 -> 10100010
233 -> 11101001
Splitting up these bits into 4 groups of 6bit creates
the following 4 decimal values: 38, 58, 11 and 41.
100110 -> 38
111010 -> 58
001011 -> 11
101001 -> 41
Converting these into ASCII characters using the
Base64 encoding table translates them into the ASCII
sequence "m6Lp".
38 -> m
58 -> 6
11 -> L
41 -> p
Data Conversion, as the name implies, deals with
changes required to move or convert data from one
physical environment format to that of another, like
moving data from one electronic medium or database
product onto another format.
Data conversion is technical process of changing the
bits contained in the data from one format to another
format for purpose of interoperability between
computers. The simplest example of data conversion
is a text file converted from one character encoding
to another.
Data conversion is very important for the security
purpose. For example there is a image file which
consist of very important information and that file we
have to store in secret manner. So to secure that file
we can convert image file into text file. After
converting image file will get security. We can also
convert that file form image to text. While converting
we have to give password to it.
The objective of data conversion is to maintain all of
the data, and as much of the embedded information
as possible. This can only be done if the target format
supports the same features and data structures present
in the source file. There is no loss of information
while converting the image file to text file or text file
to image file.
The scope of the system is
2. System Implementation
The aim of this section is to describe the overall
Implementation of the Image File Security System,
thereby, enabling the encryption and decryption of
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com

Image can be converted into text file and
text file can be converted into an image.

It gives security to image file.
1893
ISSN:2229-6093
Pooja Guwalani et al, Int.J.Computer Technology & Applications,Vol 5 (6),1892-1895

A comparator will distinguish between
normal text file and text file after conversion
[7].
Fig3. Form for loading the image
B. Encryption
Fig2. System’s Interaction
Image will be stored in the form of Base64 format,
i.e. combination of uppercase, lowercase, 0-9 digit
and special symbol „=‟ and „/‟.
The ASCII conversion of 3-byte, 24-bit groups is
repeated until the whole sequence of original data
bytes is encoded.
The proposed
functionalities:
system
has
the
following
A user can login and access the complete system,
Also can encrypt image format into cipher text.
User first has to load the image for the conversion
into text file. For that we have to use “Load Image
file button” .After that we have to give password for
security purpose. Afterward clicking on button
“Convert Image to text” the image file gets converted
into text file [7].
For conversion of text file to image file first we have
to load text file using “Load Text.img” button. Again
we have to give password. After clicking on button
“Convert text to image” it gets converted into text
file.
A. Login
An administrator can login and access the complete
system. For converting file user have to give
password. It is for security purpose [3].
Fig4. Open Dialog Box
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
1894
ISSN:2229-6093
Pooja Guwalani et al, Int.J.Computer Technology & Applications,Vol 5 (6),1892-1895
C. Decryption
A user can decrypt the cipher text into the image
from text file.
The system security ensures that when the convert
image to text button is clicked the user‟s password is
requested to determine who converted the image.
Only the valid password of the user who has logged
into the system is accepted if not, the image is not
converted. Similarly during the process of decryption
the system asks for the password of the user
decrypting the text file to ensure that the converted
final image is visible only to the authorized person
[7].
Since security is of privacy importance, this double
authentication mechanism further ensures the privacy
of the information sent.
This software is made according to the modern need
of conversion of data. It uses various new techniques
for conversion the data. The basic advantage of this
product is that it is not specific for a particular type of
either image or text file. The development of the
system can be done using JDK. The software can be
used on any operating system.
3. Conclusion
In this paper, an Image File Security system for
encrypting and decrypting images into a text file and
a small-scale prototype of the system was
successfully implemented. The project mainly
concentrated on embedding the data from one format
to another by designing a data conversion application
which converts image file to text file and text file to
image file. Normally, after conversion of image, the
image may lose its resolution. In the proposed
approach, the image remains unchanged in its
resolution as well in size. The speed of conversion
the data is also high in the proposed approach such
that the image is protected and the properly
converted. For the conversion of text file to image,
JAVA programming language has been used to build
the user interface and perform operations. Security
keys such as personal password for protecting the
image from unauthorized modification have also
been implemented, which improved the security
level. The aim of creating a simple application to
provide security has been achieved successfully.
References
Fig5. Confirmation for decryption
Friendly graphical user interface and documents with
the system will be sufficient to educate a user on how
to use the system effectively, without any problems
or difficulties.
[1] Koblitz, N.: A Course in Number Theory and
cryptography. 2'nd edition. Springer-Verlag (1994).
[2] Mahendra Kumar, “Steganography and Steganalysis of
JPEG Images A Statistical Approach to Information Hiding
and Detection “ 2nd Edition, Lambert Academic Publishing
[3] Herbert Schildt, Java™: “The Complete Reference
“Seventh Edition, McGraw Hill Education (India) Private
Limited
[4]
Lakhtaria K. Protecting computer network with
encryption technique: A Study. International Journal of uand e-service, Science and Technology 4(2) (2011).
[5] Komal D Patel, Sonal Belani “Image Encryption using
different Techniques”
International Journal of Emerging Technology and
Advanced Engineering Volume 1, Issue 1, November 2011
[6] Atul Kahate, Cryptography and Network Security,
Second Edition, Tata McGraw-Hill Edition 2008.
Fig6. Form for performing encryption and
decryption
IJCTA | Nov-Dec 2014
Available online@www.ijcta.com
[7] Stalling, W. (2005) “Cryptography and network
security principles and practices, 4th edition Prentice Hall”.
1895
Download