• Nu S-Au Găsit Rezultate

View of Enhancing the Security of Data Using Digital Stemage Technique

N/A
N/A
Protected

Academic year: 2022

Share "View of Enhancing the Security of Data Using Digital Stemage Technique"

Copied!
6
0
0

Text complet

(1)

Enhancing the Security of Data Using Digital Stemage Technique

1

Vijay K, 2K. S. Jayareka, 3G. Kirubasri, 4Priya Vijay, 5Arockia Raj Y

1Assistant Professor, Department of Computer Science and Engineering Rajalakshmi Engineering College, Chennai

2,3 Assistant Professor, Department of Computer Science and Engineering Sona College of Technology, Salem.

4Associate Professor, Department of Computer Science and Engineering Rajalakshmi Engineering College, Chennai

5Assistant Proferssor, Department of Computer Science and Engineering PSNA College of Engineering and Technology, Dindigul

[email protected], [email protected], [email protected], [email protected], [email protected]

Abstract: Steganography: the science of hidden communication is one among the branches of data transfer activity. It permits secret knowledge transmission as well as hides the existence of message itself therefore on defend the transmitted data from unplanned recipient. In past decade, tons of analysis has been done on numerous Steganography schemes in spacial and rework domain. the concept to cover secret knowledge in contour let domain [security]. so as to possess secure communication within the presence of steganalyzer, we've got adopted the quilt choice criteria supported distinction measuring.

victimization distinction measuring, appropriate cowl is chosen from commonplace take a look at image information then embedding is distributed in contour let sub bands of canopy image. Embedding knowledge in appropriate cowl image can increase performance of the system and ends up in additional features in that. The potency of utilized methodology is illustrated victimization in quality metrics of the image.

Keywords: Steganography, Security, Noise, Steganography Techniques, Stego Image.

I. INTRODUCTION

Data that is changed by means of PC systems is generally spread out looking like data. It will be maintain in various arrangements. It will be a text, picture, sound, video, designs and so on. These data square measure keep in various gadgets like PCs, mobiles, moving-picture show players and so on for instance, photographic camera stores the picture information as picture bits. For putting away and recovering information, there's a craving for programming bundle and gadgets. Computerized data or programming bundle that a PC uses will be just followed that is one in the entirety of its fundamental quality additionally as its shortcoming.

The plan to cover mystery data in form let space [security]. Commonly, clients on the net got the chance to send, share or get direction . Steganography, shrouds the presence of message such persona non grata can't figure that correspondence goes on thus gives the following degree of security. The section proceed with connected work, is represented in section II followed by the projected system in section III , implementation in IV, application in V and conclusion in VI.

(2)

II. RELATEDWORK

ZaidoonKh. et al. [1], have given a general summary of sorts, general Steganography Systemand characterization of systems and categorization techniques. Rejani R et al. [2] gift a new/alternate secure info system supported steganography for information concealing. The system provides integrity a lot of confidentiality and authentication throughout access or redaction of intimated information. The planned sound unit system uses steganography technique to store a info of records. The system permits a user to form basic tables and records, that square measure hidden from others within a picture. during this paper, we have a tendency to propose Associate in Nursing design, which might be utilized by application developers to retrieve information from the created info in a straightforward manner. The planned methodology is very helpful to be used as Associate in Nursing embedded sound unit additionally in mobile computing because it will store bit of information simply. have given an overall outline of Steganography sorts, general Steganography Systemand portrayal of Steganography frameworks and arrangement of Steganography procedures. Rejani R et al. [2]

blessing another/other secure data framework upheld steganography for data disguising. The framework gives trustworthiness a ton of secrecy and confirmation all through access or redaction of suggested data. The arranged sound unit framework utilizes steganography strategy to store a data of records. The framework allows a client to shape fundamental tables and records, that square measure escaped others inside an image. during this paper, we tend to propose Associate in Nursing structure, which may be used by application engineers to recover data from the made information in a clear way. This individual Stego-key has five very surprising dark level varys of picture, range demonstrates to substitute secured scope of pieces to embed in less imperative pieces of picture. The quality of arranged system is its honesty of mystery shrouded information in Stego-picture and bigger concealed ability. The impediment is to cover further pieces of mark with shrouded message for its uprightness reason. It moreover arranged a path for shading picture basically to switch the blue channel with this topic for information covering. This system is focused to accomplish high concealed capacity and security of shrouded message. The LSB steganography procedure was created in it upheld installing the key message into the gouger edge districts of the picture to affirm its obstruction against picture steganalysis [6] upheld applied science investigation. In our arranged framework dodge the shading changes in it. [7] talks about some varying sorts of data covering methods. Bertrand Anckaert et al. [8] distinguishes the essential shortcomings of existing methodologies, resulting from the static idea of protection and furthermore the inconceivability to stop the duplication of advanced data. a spic and span subject is given that allows an a great deal of dynamic nature of safeguard and makes it more solid to shape an extra, similarly supportive duplicate. likewise, it allows a fine-grained the executives over the circulated code. Its quality depends on assorted variety each put in duplicate is elite and updates square measure custom-made to figure for one put in duplicate exclusively.

III. PROPOSED SYSTEM

In our proposed system, we use Steganography (for data hiding in the multimedia object) techniques together.

A. Steganography

Steganography is the study of means of concealing the information in order to prevent hackers from detecting the presence of the secret information. In this project, we use a JPG or

(3)

method).This method modifying the rightmost bit in each byte by replacing it with a bit from the secret message. LSB method is more significant than MSB method .In LSB method we are not seen the any difference between original image and stego image (data hidden image).

B. Algorithm of Proposed System Input: Embed the message.

Output: Message is embedded safely in an image and reconstructed properly

Begin 1. Message.

2. Encrypting message[with the key].

3. Implementing LSB Method steganography 4. Embedding data

5. Stego image/video.

6. Extraction of embedded message.

7. Encrypted message generation.

8. Decryption[with the key].

9. Original Message.

End

C. Proposed System Flow Chart

Figure 1.1 Flow Diagram

The message is sent to the encryption process which is encrypted using a 4 bit key and thereafter the embedding process takes place where the image is now converted into the Stego image. Similarly for Decryption process the image to be decrypted is taken and the same 4 bit key is given and the extraction process takes place. The result is that the original message is obtained.

D. Image Module

In Image steganography the cycle performed is concealing the content inside the picture with the utilization of encryption calculation . The content is splitted utilizing the LSB technique and is implanted into the picture that we have choosen. Same way the picture is unscrambled by utilizing the decoding calculation and the message is produced by the client. The client can likewise send the encoded picture to any IP Address.

(4)

E. Video Module

In Video steganography the process performed is hiding the text inside the video with the use of encryption algorithm. The video that is used for this experiment is flash video in the flv format. The video is now embedded with the text using the parity code encryption and LSB method. The decryption is done by giving the secret key and generating the result that is the message. The video can be sent to different IPs and also across various applications.

IV. EXPERIMENTS AND RESULTS USER INTERFACE

I IMAGE

Figure 1.2 Image User Interface II.VIDEO

Figure 1.3 Video User Interface

V APPLICATIONS

Various applications of this includes communication of secret data , protection of copyright, feature tagging, digital marketing etc.

VI CONCLUSION

Steganography particularly joined with cryptography, is an integral asset which empowers individuals to convey without potential busybodies in any event, knowing there is a type of correspondence in the first place.The extreme point of concealing the instant message inside a picture and video is accomplished. In spite of the fact that the procedures are as yet not utilized regularly, the conceivable outcomes are huge. A wide range of strategies exist and

(5)

advance quickly.Steganography when joined with encryption gives a made sure about methods for mystery correspondence between two gatherings. This proposed structure can be utilized to secure typical PC applications just as versatile applications against piracy.In the future work a similar procedure can be utilized for sound steganography.

VII REFERENCES

[1] Zaidan .et.al, “Overview: Main Fundamentals for Steganography”, Journal of Computing, pp.158-165 vol.2, March 2010.

[2] Nadeem Akhtar .et.al, “Enhancing the Security and Quality of LSB Based Image Steganography”, Proceedings of IEEE International Conference on Computational Intelligence and Communication Networks, pp.385-390 September 2013.

[3] R. Rejani .et.al, “STEGANODB-A Secure Database using Steganography”, ICTACT Journal on Communication Technology, Vol. 4, No. 3, pp. 785-789, 2013.

[4] MamtaJuneja .et.al“An improved LSB based Steganography with Enhanced Security and Embedding/ Extraction”, Proceedings of IEEE International Conference on Intelligent Computational Systems, , pp. 29-34 January 2013.

[5] H. Motameni .et.al, “Labeling Method in Steganography”, World Academy of Science, Engineering and Technology, France, (2007).

[6] Minati Mishra .et.al, “Digital Image Data Hiding Techniques: A Comparative Study”, ANSVESA, Vol. 7, No. 2, pp. 105-115, 2012.

[7] S. KanagaSubaRaja, S. Usha Kiruthika, (2015) „An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV‟, International Journal of Wireless Personal Communications, ISSN 0929-6212, Volume 83, N0. 4, pp. 2975-2997. https://doi.org/10.1007/s11277-015-2577-x.

[8] Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere Ghent University, Electronics and Information Systems DepartmentSint-Pietersnieuwstraat 41 9000 Gent, [9] Vijay, K., Vijayakumar, R., Sivaranjani, P., Logeshwari, R. “Scratch Detection in Cars

Using Mask Region Convolution Neural Networks”, Advances in Parallel Computing, 2020, 37, pp. 575–581, doi:10.3233/APC200205,

[10] Jayashree, K, Sheila Anand & Chithambaramani, R 2013, “A Fault Ontology for Managing Run-Time faults in Web Services”, Asian journal of information Technology, vol. 12, no. 2, pp. 60-69

[11] Varnikhaa.P, Dr.V.D.Ambeth Kumar, “Automated Foot-Print Based Human Identification System Using Neural Network for Image Labelling”, International Journal of Advanced Science and Technology Vol. 29, No. 5, pp. 3950 - 3958 ,(2020).

[12] Naga Malleswari T.Y.J., Senthil Kumar T., Jothi Kumar C. Resumption of virtual machines after adaptive deduplication of virtual machine images in live migration, International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 1, October 2020, pp. 654~663 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i1.pp.654-663 [13]Babu Rajendiran, Jayashree Kanniappan, “A Generic Model for Identifying QoS

Parameters Interrelations in Cloud Services Selection Ontology during Runtime”, Symmetry 2021, 13, 563. https://doi.org/10.3390/sym13040563.

(6)

[14]Usha M.,Kavitha P,Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier,Wireless Networks, Vol – 23 (8) PP: 2431-2466, DoI:

10.1007/s11276-016-1300-5, 2017

[15]Kirubasri, G., Maheswari, N. U., & Venkatesh, R. (2018). Novel energy efficient predictive link quality based reliable routing for wireless multimedia bio-sensor networks in bio-medical invention research and bionic utilities monitoring application. International Journal of Biomedical Engineering and Technology, 26(3-4), 219-236.

[16]Rajeswari C., Sathiyabhama B.,Devendiran S., Manivannan K. Bearing fault diagnosis using wavelet packet transform, hybrid PSO and support vector machine,Procedia Engineering, ,Vol.97 (1) PP:1772-1783,2014

Referințe

DOCUMENTE SIMILARE

Column 5: It gives the lift index of the best rule method for each test set using rules after pruning.. We can see that although on average its lift index is not as good as that of

maximally non-Gaussian linear combinations of the ob- served data x..

2 Referring to the constitutional regulation of Kosovo regarding the form of state regulation, we have a unitary state, but in practice the unitary state

, Convergence of the family of the deformed Euler-Halley iterations under the H¨ older condition of the second derivative, Journal of Computational and Applied Mathematics,

The averaging theory is one of the most powerfrrl tools in approaching problems governed by differential equations, The goal of this note is to present a theoretical

The evolution to globalization has been facilitated and amplified by a series of factors: capitals movements arising from the need of covering the external

De¸si ˆın ambele cazuri de mai sus (S ¸si S ′ ) algoritmul Perceptron g˘ ase¸ste un separator liniar pentru datele de intrare, acest fapt nu este garantat ˆın gazul general,

According to our previous investigations it seems that tolerance, whether regarded as a political practice or a philosophical or moral principle, is a strategy (or tactics) of one