Two Step Verification and Data Security through the Network

Abstract

Our project is basically a web based application that engages in security and the transmission of data through the network. As we know that security is now become a necessity in each and everyone’s life as there might be people who want to access your secret data for wrong purposes.So our system deals with the security issue by implementing steganography into our system. Steganography basically helps to hide secret messages and information embedded in a photograph or a video. This technique helps to prevent any third party user from accessing the secret message. iIn our project we are also using an encryption technique that is the “Tiny Encryption Algorithm”. Encryption also plays an important role in keeping the data from unauthorized people in real time environment such that the data is safe. After encryption, the file is implemented with steganography and is then transmitted through the network to the receiver. The receiver should have the same application to de-embed the file and then decrypt the same file to extract the original file. The goal of our project is to design a tool for providing security to the system during transmission of data through the network for the likes of military forces that have an essential need for communication for vehicle control, surveillance signal processing and is even more imperative in times of a war.

Authors and Affiliations

Soumyadeep Das, Vishal Rohilla, Dr. MeenuVijarania, Dr. Yojna Arora

Keywords

Related Articles

Permeability Behavior of Sand-Kaolin Mixtures through Laboratory Tests

Permeability or Hydraulic conductivity of soil is basic property of soil that needs to be taken into consideration when planning a Civil engineering project. In most of the Civil engineering projects a low permeable soil...

A Review Paper on Wireless Sensor Network

Security is one of the most essential things to consider if sensor networks are to reach their full potential. Even more innocuous applications, such as home health monitoring, habitat monitoring, and subsurface research...

Secure Aggregation of Data in Connection-Less Networks

Reliable Minimal Energy Cost Routing (RMECR) and Reliable Minimum Energy Routing are two ingenious dynamism- conscious routing algorithms for wireless ad hoc networks (RMER). Ad hoc network conditions for dynamism effect...

Integrating Monistic Theory, Neuro-Linguistic Programming, and AI for Developing Emotionally Healthy School Children- A Global and Indian Perspective

Emotional health plays a crucial role in the holistic development of school children, impacting their academic performance, social interactions, and overall well-being. This research article explores the potential of int...

Media Manipulation Detection System Using Passive Aggressive

Due to the extreme growing use of social media and online news media, there has been a rise in fake news recently. It has become much easier to spread fake news than it was before. This type of fake news, if widely circu...

Download PDF file
  • EP ID EP747808
  • DOI 10.21276/ijircst.2020.8.3.13
  • Views 1
  • Downloads 0

How To Cite

Soumyadeep Das, Vishal Rohilla, Dr. MeenuVijarania, Dr. Yojna Arora (2020). Two Step Verification and Data Security through the Network. International Journal of Innovative Research in Computer Science and Technology, 8(3), -. https://europub.co.uk/articles/-A-747808