Implementation of Security in Cloud Systems Based using Encryption and Steganography

Size: px
Start display at page:

Download "Implementation of Security in Cloud Systems Based using Encryption and Steganography"

Transcription

1 Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya University, Anantapur. AP, India. 3 Department of Computer Science, Aurora s Technological and Research Institute, Hyderabad Abstract The use of cloud computing has increased rapidly in many organizations. Security is considered to be the most critical aspects in a cloud computing environment due to the sensitive information stored in the cloud for users. The goal of cloud security is mainly focused on the issues related to the data security and privacy aspects in cloud computing. Researchers have discussed many security techniques in cloud computing systems. However, since there are many malicious people who want to access secret and personal information stored in cloud servers, information security is still a serious problem to solve. To conceal and protect secret and personal information, in this paper we propose and develop a system that can encrypt secret message and embed it into an image file by using a new morphing based steganograph technique. Even if the malicious people may steal the image containing the secret information, they cannot read the secret information because this is almost impossible without the stego key. Consequently, improvement of security in cloud systems by using cloud systems based is implemented. Keywords : Encryption, Steganography, Stego Key I. INTRODUCTION In recent years, many cloud computing systems have been developed, and have been applied not only to scientific computations, but also to document sharing, web-based mail service and so on. Among them, onlinestorage service is a typical utility form of cloud computing system. Basically, each registered user has his/her own independent directory, and any user cannot access other users directories without permission. However, in some cases, files saved in cloud servers can be read and written by some third party who knows cyberattack techniques well. This is a big security issue in cloud computing. If we do not solve this problem, cloud computing may cause a tremendous social problem in near future. In this paper, we propose a prototype cloud computing system that employs a new steganograph technique for improvement of security. Our system encrypts the secret message by hiding it in a synthesized image that can be generated dynamically through image morphing. If some malicious attackers may obtain the image containing the secret message (i.e. the stego-image) via the transmission channel or server, they cannot access the entity of the information (the message) because the secret is protected by a huge Note that this kind of protection methods, which uses the steganographic image, have already been developed before. However, our system differs from the conventional ones. In our system, as we mentioned, we use the dynamically generated morphing image file for. This file is used both for embedding the message and for encrypt the message. The purpose of this paper is to build a secure prototype cloud system. This is the first step in our study. For further improvement, we will use machine learning and computer vision techniques for automatic image morphing. Using results obtained in machine learning and computer vision, we can generate cover images using any images selected or uploaded by users. It means that sets of reference images will increase, and the combinations of reference images can be increased. Therefore, we expect that this can farther improve the security. The remainder of this paper is structured as follows. Section 1.1 provides fundamental knowledge in this paper. Section 2 explains our method. Section 3 shows the design of the proposed system. Section 4 discusses results and possible problems. Finally, section 5 describes conclusion and suggests future work FUNDAMENTAL KNOWLEDGE In this study, we use two image processing techniques, namely image morphing and image based. These two techniques will be used to improve the security in cloud computing environment. A. Cloud Computing System Cloud computing system is a kind of utility form of computer resources via network. It is defined as follows by National Institute of Standards and Technology (NIST). [1] Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. Currently, there are various kinds of utility forms for cloud computing. For example, to store images uploaded from mobile devices to the server; to edit the document files on web-based application; and so on. The common point is to use stego-key. Thus, the proposed cloud system is secure. 80

2 computer resources via network, and users just pay some charges based on the services. B. Image Morphing Technique Image morphing is a technique of computer graphics. Its main purpose is to make a natural (neutral) image from two or more (reference) images. [2] Usually, image morphing provides synthesized natural images based on some feature points defined in the reference images. In our method, we use this technique with some of the images taken from a given reference image set and some of random parameters as the weight, of the images, and generate a natural morphing image. We use this generated morphing image as a key for encoding and decoding the secret message. C. Steganographic Technique Steganographic technique () is one of the techniques for information hiding. [4] [5] In this technique, some messages or data are hidden in multimedia datum. The multimedia datum, which is used in this technique, has redundancy, and therefore if we modify it slightly, we may not be aware of this difference. There is one of big difference between steganographic technique and encryption technology. First of all, the main purpose of encryption technology is to prevent datum from decryption. On the other hand, the main purpose of steganographic technique is to prevent the existence of the secret message from being detected by third party. That is, if the third party does not know where is the secret, he or she will not be able to attack the secret. This is extremely important in a cloud computing environment. II. METHOD In this section, we explain the methods of image morphing and generation of steganographic image. A. Image Morphing For convenience, we use the definitions given in Table 1. Symbol Description Defintion RI Reference image set {I 1,I 2.I n } N Size of reference nϵ N, n 2 image set SI Source image set SI RI. SI = m M Size of source image mϵ N, 2 m n set I i Reference images I i ϵ RI w i Weight for each 2 i m, 0 w i 1 source image P Accuracy of weight p ϵ Q In image morphing, we use reference image set RI and weight value for each source image wi. We generate the morphing image by the following steps. Step 1 : Create a source image set SI from RI. SI should have m images and it should have no duplicates. Step 2 : Generate m random values wi. Step 3 : Decide the accuracy of weight. Omit wi smaller than 10 p (The number of non-zero weights is larger than or equals to 2). Step 4 : Generate a morphing image with SI and wi. By using these parameters, Sizepattern = 10( ) possible morphing images can be generated. Here, we show an example. We set the size of each set as follows. RI = 1000 SI = 5 n = 1000 m = 5 p = 10 By using these parameter values, the number of possible morphing images can be calculated by 1050 ( ) Therefore, the strength(encryption strength) is about 200 bits Figures 1 and 2 shows the flowchart of message hiding and message extraction. III. DESIGN OF SYSTEM In this paper, we construct the cloud computing system in local network, and investigate about safety, security and so on. From the hardware side, this cloud system is constructed with two servers and a number of ipad. This kind of system, which constructed some of servers and a number of mobile devices, is usually used in many services. On this system, we implemented server-side and client-side applications. 81

3 storage server Create the stego-image based the message and the cover image Decode message from the stego-image. A. System Configuration In this study, we constructed a system with two servers and a number of clients (ipad). The purpose of each device is shown in Table II. B. Implementation In this section, we explain the implementation of each component. 1) Server C: In the cover data generator (Server C), we implemented the system on Linux system. Currently, the system provides only user authentication and morphing image generation for received requests. On this server, we used GNU Octave for carrying out high-speed morphing image generation function. In this phase, before the morphing generation, user authentication is required. The flowchart of Server C is shown in Fig. 3. 2) Server S: In the storage server, we implemented the system on Linux system as for the cover data generator. The system provides user authentication and file upload/download function.. 3) Client *: For each client, we implemented the system on ios as end-user client. The GUI of the implemented application is shown. In this application, we implemented the following items: User authentication for each server; Create the request of cover image generation to server C; Receive the cover image from server C; Upload/Download the stego-image to/from server S Table II : Definitions of components in the Prototype system Name Abbreviation Role name Cover data Server C Dynamic generation generator of morphing image Storage server Server S Store the steganographic image which is uploaded from client Clients Client * Input the message, hide it into morphing image and upload it to the Fig 3 : Implementation of AES algorithm with Fig 4: Implementation of DES algorithm with Fig 5: Implementation of Blow fish algorithm with Fig 6 : Implementation of RSA algorithm with 82

4 Fig 7 : Implementation of Random algorithm with Algorithm Resolution Size (Before) Size (After) Pixel count Execution time (Before) Execution time (After) ticks AES 600 x DES 600 x Blowfish 600 x RSA 600 x Random 600 x Steganography 600 x C. System Requirements We restricts the operating environment with the aim of improvement of security. The restriction and advantages are shown below. Desired operating environment is shown in Fig. 6. 1) The cover data generator (Server C) should be accessed from only the private network. By applying this restriction, we can prevent the cover images (which are also used as the stego-key) from leaking to the public network (or WWW). If there are no keys, the third person cannot decode the stego-image, and the system can be secure. 2) Server C and Server S should be independent of each other. By applying this restriction, if either server system was under attack, another system s safety can be guaranteed as much as possible. As the reason for that, we need to obtain some of data from these two of servers for decoding. Moreover, if we decode the stego-image, we need to find out the relation of the data in each server. Fig. 8 shows the desired operating environment. D. Comparison Here, we compare the proposed system with the conventional one. In conventional systems, they uses HTTPS (HTTP over SSL/TLS) for data transmission in place of normal HTTP. HTTPS is a kind of URI scheme, and it means encrypted HTTP connection with SSL (Secure Socket Layer) or TLS (Transport Layer Security). However, some of security issues of TLS are Table 3 : Shows performance of various algorithms. reported recently. Some of unknown problem may possibly hide even though this problem was already fixed by developers in the world. In other words, if the attacker, who wants to obtain the information, found the unknown problem in this kind of encryption technology, the information can be stolen. This is a very big problem in (secret) data transmission. In the proposed method, we use techniques before data transmission instead of data encryption (in fact, the data are encrypted before applying ), and this is the major difference between our system and conventional ones. In our system, we apply the techniques to data which will be sent. After this process, the morphing image covers the data. In data transmission, even if the attackers may successfully attack and obtain the stego-images, they cannot perceive if the stego-images really contain secret data or not. In the worst case, even if the attackers detected the existence of the secrets, they cannot decode the data because the stego-key is not available from the transmission network. Because, the key is the cover image, which is obtained through morphing based on some unknown reference images, and the cover image itself is not available from the public transmission network due to the restriction described previously. The cover image is generated dynamically and it is sent in private network, so it does not exist in global network, unless otherwise someone who can access this private network leaked this image. IV. RESULTS AND DISCUSSION Here, we discuss the security of our proposed method. In our proposed method, there are some advantages. 1) The attackers cannot perceive that the stego-image has the message internally. Because, the stego-image is natural and basically human can not perceive the difference between the stego-image and natural image. 2) Even if the attackers can obtain the stego-image, they cannot 83

5 decode it. Because, in global (public) network, there is no cover image which is the key for encoding and decoding. Therefore, if the attackers cannot obtain the cover image from private network, they cannot decode the data hidden in the stego image. 3) Even if the attackers can obtain the stego-image and access the cover image generator (Server C), it is nearly impossible to decode the image. Almost of all reasons are same as last explanation. In this case, the attackers can access Server C, so they can get the key from the server. However, there are no relations are described in stegoimage, so if the attackers want to get the cover image as a key for a given stego-image, they must try all possible cases for generating the image. If they try this, it can take a very long time for calculation (refer section III-A). In other words, we have the time to detect this as attack. V. CONCLUSION In this paper, we proposed a way for improvement of security in cloud system based on. In the proposed system, we used the dynamically generated morphing image for improvement of security, and this image covers the message which we want to hide. This is application of steganographic technique, and its image is natural, so human cannot perceive the image hides the message internally. Moreover, this morphing image is generated dynamically, and there are no keys for decoding it. Besides this technique, we defined some rules of operating environment for improvement of security. In the future, we should apply machine learning to morphing technique which we used in this paper. We expect that application of machine learning may improve the security further for two reasons. First, machine learning can be used for automatic morphing, so that a large number of morphing images can be generated effectively. Second, machine learning can find feature points good for morphing for any given images, and thus the reference image set can be virtually infinite, and the security strength will be very high. We expected some attacks to our implemented system, and we discussed how to cope with it in section V. In next step, we will verify the quality of security of our implemented system. REFERENCES [1] National Institute of Standards and Technology, Peter Mell and Timothy Grance, 2011, The NIST Definition of Cloud Computing, pp.2. [2] G. Wolberg, Recent advances in image morphing, Proc. Computer Graphics International (CGI96), pp , [3] M. Steyvers, Morphing techniques for manipulating face images, Behavior Research Methods, Instruments, and Computers, Vol. 31, No.2, pp , [4] S. Kondo and Q. F. Zhao, A novel steganographic technique based on image morphing, Proc. International Conference on Ubiquitous Intelligence and Computing (UIC06), Wuhan and Three Gorges, China, pp , Sept (Lecture Notes in Computer Science 4159, Springer). [5] S. Katzenbeisser and F. A. P. Peticolas, Information hiding: techniques for and digital watermarking, Artech House, [6] Jijo.S. Nair and BholaNath Roy, Data Security in Cloud, International Journal of Computational Engineering Research(IJCER) (ISSN: ), pp , [7] WAWGE P.U. AND RATHOD A.R., CLOUD COMPUTING SECURITY WITH STEGANOGRAPHY AND CRYPTOGHRAPY AES ALGORTHM TECHNOLOGY, World Research Journal of Computer Architecture Volume 1, Issue 1, 2012, pp

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

A Novel Information Security Scheme using Cryptic Steganography

A Novel Information Security Scheme using Cryptic Steganography A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in

More information

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME

PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh

More information

A Stegnographic Method For Secure Communication And Access Control Using Web Service Container

A Stegnographic Method For Secure Communication And Access Control Using Web Service Container International Journal Of Scientific Research And Education Volume 2 Issue 11 Pages-2191-2197 November-2014 ISSN (e): 2321-7545 Website: http://ijsae.in A Stegnographic Method For Secure Communication And

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Efficient integrity checking technique for securing client data in cloud computing

Efficient integrity checking technique for securing client data in cloud computing International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT: CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College

More information

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH

More information

Self Destruction Of Data On Cloud Computing

Self Destruction Of Data On Cloud Computing Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Self Destruction Of Data On Cloud Computing Pradnya Harpale 1,Mohini Korde 2, Pritam

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

Steganography using MATLAB

Steganography using MATLAB ABHIYANTRIKI Steganography using MATLAB An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 5 (May, 2016) http://www.aijet.in/ eissn: 2394-627X Srikant

More information

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

A Image Steganography based on Non-uniform Rectangular Partition

A Image Steganography based on Non-uniform Rectangular Partition 120 A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala Y. Dasradh Ram Reddy G. Srinivasa Reddy BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P Abstract

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography

More information

NETWORK SECURITY & CRYPTOGRAPHY

NETWORK SECURITY & CRYPTOGRAPHY Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter

More information

Piecewise Permutation Steganography for 3D Humanoid Mesh Models

Piecewise Permutation Steganography for 3D Humanoid Mesh Models Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud

Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the Cloud Ezz El-Din Hemdan 1, Manjaiah D.H 2 Research Scholar, Department of Computer Science, Mangalore University,

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique

More information

Secured Way of Ciphering Text Using Audio Steganography

Secured Way of Ciphering Text Using Audio Steganography Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,

More information

The Design of an Anonymous and a Fair Novel E-cash System

The Design of an Anonymous and a Fair Novel E-cash System International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of

More information

A Formula Diamond Encoding Data Hiding Scheme

A Formula Diamond Encoding Data Hiding Scheme Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo

More information

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Reversible Data Hiding in Encrypted Images with Private Key Cryptography Reversible Data Hiding in Encrypted Images with Private Key Cryptography Wajahath Hussain Razvi, Dr.Ch.Samson Abstract This project proposes a reversible scheme for cipher images which are encrypted using

More information

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic

More information

AES and DES Using Secure and Dynamic Data Storage in Cloud

AES and DES Using Secure and Dynamic Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A Image Steganography based on Non-uniform Rectangular Partition

A Image Steganography based on Non-uniform Rectangular Partition A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala 1, Y. Dasradh Ram Reddy 2, G. Srinivasa Reddy 3 Asst.Prof of CSE department BVSR, Chimakurthy, A.P, India Abstract:

More information

HTML Steganography using Relative links & Multi web-page Embedment

HTML Steganography using Relative links & Multi web-page Embedment HTML Steganography using Relative links & Multi web-page Embedment 1 Chintan Dhanani, 2 Krunal Panchal 1 Mtech Scholar, 2 Lecturer Department of computer engineering, Gujarat Technological University,

More information

CSM # 1 Secure Communication Field Session 2008

CSM # 1 Secure Communication Field Session 2008 CSM # 1 Secure Communication Field Session 2008 CLIENT: Dr. Roman Tankelevich WRITTEN BY: Kevin Kaiser Michael Keesey Phillip Woods Submitted June 19, 2008 Executive Summary Information can be passed discretely

More information

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography

More information

International Journal of Computer Engineering and Applications,

International Journal of Computer Engineering and Applications, International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Vulnerability Assessment Of Personal Cloud Server

Vulnerability Assessment Of Personal Cloud Server Vulnerability Assessment Of Personal Cloud Server Dhiraj Kumar 1,Er. Kamal Ranga 2 1 Student,Department of Computer Engineering,Ganga Institute of Technology and Management Maharshi Dayanand University,Rohtak,Haryana,

More information

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing

To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE S.Sivasankari, Arasu Engineering College, Kumbakonam-612001 Sivasankari2324@gmail.com Abstract: Watermarking is a science of hiding

More information

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE 1 Naitik P Kamdar, 2 Dipesh G. Kamdar 3 Dharmesh N.khandhar. 1 (Student of Master of Engineering in Electronics & Communication,

More information

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Neha Agrawal and Marios Savvides Carnegie Mellon University

More information

Shubha Dubey Dept. of computer science) Radharaman institute of technology and science bhopal, india

Shubha Dubey Dept. of computer science) Radharaman institute of technology and science bhopal, india International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 417 Various JPEG Image Steganography Techniques: A Review Priyanka Pal Dept. of computer science Radharaman

More information

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.

PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN. Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives

More information

Steganography: A Security Model for Open Communication

Steganography: A Security Model for Open Communication Volume: 04 Issue: 04 Pages:1690-1694 (2013) ISSN : 0975-0290 Steganography: A Security Model for Open Communication K. Chandra Sekhar, Department of Computer Applications,Madanapalle Institute of Technology

More information

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017 Department of Computer Science and Engineering CSE 3482 Introduction to Computer Security Instructor: N. Vlajic Date: Mar 1, 2017 Midterm Examination Instructions: Examination time: 75 min. Print your

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS

A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS ICIC Express Letters ICIC International c 2010 ISSN 1881-803X Volume 4, Number 1, February 2010 pp. 89 94 A WATERMARKING TECHNIQUE USING SYNONYM SUBSTITUTION FOR INTEGRITY PROTECTION OF XML DOCUMENTS Chin-Chen

More information

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators

Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding) New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

The Electronic ID and the Voting Admission using a Cell Phone

The Electronic ID and the Voting Admission using a Cell Phone The Electronic ID and the Voting Admission using a Cell Phone Tetsuji KOBAYASHI *, Jaewook KIM * and Norifumi MACHIDA * * Nippon Institute of Technology Department of Computer and Information Engineering

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals This course contains copyrighted material used by permission of Logical Operations, Inc. Slide 1 Course 01: Security Fundamentals The Information

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

The New Cell-Counting-Based Against Anonymous Proxy

The New Cell-Counting-Based Against Anonymous Proxy The New Cell-Counting-Based Against Anonymous Proxy Yadarthugalla Raju M.Tech Student, Department of CSE, Dr.K.V.S.R.I.T, Kurnool. K. Pavan Kumar Assistant Professor, Department of IT, Dr.K.V.S.R.I.T,

More information

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices

Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Volume 03 - Issue 10 October 2018 PP. 30-34 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Pranav Nair 1, Hitesh Patil 2, Tukaram Gore 3, Yogesh Jadhav 4 1 (Computer

More information

Application of Data Hiding in Audio-Video Using Advance Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Architectural Design of Multi Level Steganography System for Data Transmission

Architectural Design of Multi Level Steganography System for Data Transmission Architectural Design of Multi Level Steganography System for Data Transmission Adedayo Adeolu Adeniji, Micheal Esiefarienrhe, and Naison Gasale Abstract Recent advances in steganography systems have shown

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2 International Journal of Scientific Research and Management (IJSRM) Volume 5 Issue 06 Pages 5378-5385 2017 Website: www.ijsrm.in ISSN (e): 2321-3418 Index Copernicus value (2015): 57.47 DOI: 10.18535/ijsrm/v5i6.04

More information

A simple approach of Peer-to-Peer E-Cash system

A simple approach of Peer-to-Peer E-Cash system A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization

More information

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005 Lecture 30 Security April 11, 2005 Cryptography K A ciphertext Figure 7.3 goes here K B symmetric-key crypto: sender, receiver keys identical public-key crypto: encrypt key public, decrypt key secret Symmetric

More information

Implementation of BDEA-A DNA cryptography for securing data in cloud

Implementation of BDEA-A DNA cryptography for securing data in cloud Implementation of BDEA-A DNA cryptography for securing data in cloud Hema N 1 Sonali Ulhas Kadwadkar 2 1 Assistant Professor, Dept of Information Science Engineering, RNSIT Bangalore, Karnataka, India

More information

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5

More information

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution

More information

A Hybrid Method of Hiding The Text Information Using Stegnography

A Hybrid Method of Hiding The Text Information Using Stegnography A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

Implementing Security in QR Codes by using Blowfish Algorithm

Implementing Security in QR Codes by using Blowfish Algorithm Implementing Security in QR Codes by using Blowfish Algorithm Harpreet Sandhu 2, Kamesh Dubey 2 1 (Dept of Computer Science, CT Institute of Technology & Research, Jalandhar, Punjab, India) 2 (Dept of

More information

Assignment 9 / Cryptography

Assignment 9 / Cryptography Assignment 9 / Cryptography Michael Hauser March 2002 Tutor: Mr. Schmidt Course: M.Sc Distributed Systems Engineering Lecturer: Mr. Owens CONTENTS Contents 1 Introduction 3 2 Simple Ciphers 3 2.1 Vignère

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

CSC 5930/9010 Cloud S & P: Cloud Primitives

CSC 5930/9010 Cloud S & P: Cloud Primitives CSC 5930/9010 Cloud S & P: Cloud Primitives Professor Henry Carter Spring 2017 Methodology Section This is the most important technical portion of a research paper Methodology sections differ widely depending

More information

Tamper Detection Marking for Object Files

Tamper Detection Marking for Object Files Tamper Detection Marking for Object Files Mike Jochen and Lori L. Pollock University of Delaware Newark, DE 19716, USA Email: {jochen,pollock}@cis.udel.edu Lisa M. Marvel U.S. Army Research Laboratory

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Data Deduplication using Even or Odd Block (EOB) Checking Algorithm in Hybrid Cloud

Data Deduplication using Even or Odd Block (EOB) Checking Algorithm in Hybrid Cloud Data Deduplication using Even or Odd Block (EOB) Checking Algorithm in Hybrid Cloud Suganthi.M 1, Hemalatha.B 2 Research Scholar, Depart. Of Computer Science, Chikkanna Government Arts College, Tamilnadu,

More information

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

A Novel Algorithm for Enhancing the Data Storage Security in Cloud through Steganography

A Novel Algorithm for Enhancing the Data Storage Security in Cloud through Steganography Advances in Computational Sciences and Technology ISSN 09736107 Volume 10, Number 9 (2017) pp. 27372744 Research India Publications http://www.ripublication.com A Novel Algorithm for Enhancing the Data

More information

Security. Communication security. System Security

Security. Communication security. System Security Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security

More information

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /

More information