Multi-Layered Security System Using Cryptography and Steganography
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2019, Vol 7, Issue 2
Abstract
—The Internet as a whole does not use secure links, thus information being transmitted may be vulnerable to interception as well. The importance of reducing the chances of information being detected during transmission is a major issue. A solution to be discussed is how passing of information can be done in a manner that the very existence of the message is unknown. This is important in order to repel attention from the potential attacker. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection of digital media. In this work, we focus on the achievement of a multi-layered security system by combining both cryptography and steganography. Encryption avoids passive attacks (reading) and by steganography, the message becomes undetectable. We make use of AES algorithm and Least Significant Bit (LSB) technique for hiding messages in an image. We have enhanced the LSB technique by randomly dispersing the bits of the message in the image and thus making it harder for an unauthorized person to extract the original message. The AES provides a good security as it takes considerably much more time to break by the brute force method for a given key length. The proposed methodology is proved good and produced expected output.
Authors and Affiliations
Mahima N, Noor Siddiqa, Tanvir Habib Sardar
Literature Review on Effects of Saturation on Soil Subgrade Strength
The remainder of the pavement system is supported by the subgrade, the soil layer on top of which the subbase or pavement is constructed. The California Bearing Ratio (CBR) value of a subgrade must be at least 10. This i...
A Study of Goodness –of- Fit Tests for Some Discrete Probability Distribution
This paper presents the goodness of fit (GOF) tests for several discrete distributions viz., Poisson, Generalized Poisson and Negative binomial distribution. Parameter estimation is performed and goodness of fit test for...
A Review on the Detection and Classification of Glaucoma Disease Based on Transfer Learning
An eye infection is a condition affecting the eyes that can be caused by a bacterium, virus, or fungus. Numerous eye infections exist, such as glaucoma, cellulitis, keratitis, and conjunctivitis. A few of the symptoms ma...
A Robust Palm Vein Authentication for Improving Safety and Security
Biometrics is a technique that analyses and measure human body characteristics such as voice patterns, DNA, eye retinas, facial patterns, irises for authentication. A palm vein authentication system uses blood vessel pat...
Computer Vision for Color Detection
Humans see the world in colors. When it comes to the aspect of just looking, all it does is please the eyes but when it comes to questioning its make, it becomes a challenge. It is much easier to be served the values wit...