Two StepVerification and DataSecurity through TheNetwork

Authors

  • Soumyadeep Das Department of Computer Science and Engineering, Amity University Haryana, Gurugram, India, Author
  • Vishal Rohilla Department of Computer Science and Engineering, Amity University Haryana, Gurugram, India Author
  • Meenu Vijarania Department of Computer Science and Engineering, Amity University Haryana, Gurugram,India Author
  • Yojna Arora Department of Computer Science and Engineering, Amity University Haryana, Gurugram, India Author

Keywords:

Data Transmission, Security, Steganography, Tiny Encryption Algorithm

Abstract

Our project is basically a web based application that engages in security and the transmission of data through the network. As we know that security is now become a necessity in each and everyone’s life as there might be people who want to access your secret data for wrong purposes.So our system deals with the security issue by implementing steganography into our system. Steganography basically helps to hide secret messages and  information embedded in a photograph or a video. This technique helps to prevent any third party user from accessing the secret message. iIn our project we are also using an encryption technique that is the “Tiny Encryption Algorithm”. Encryption also plays an important role in keeping the data from unauthorized people in real time environment such that the data is safe. After encryption, the file is implemented with steganography and is then transmitted through the network to the receiver. The receiver should have the same application to de-embed the file and then decrypt the same file to extract the original file. The goal of our project is to design a tool for providing security to the system during transmission of data through the network for the likes of military forces that have an essential need for communication for vehicle control, surveillance signal processing and is even more imperative in times of a war. 

Downloads

Download data is not yet available.

References

Mollin RA, “An introduction to cryptography”, ‘CRC Press’, 2000.

Schneier B, “Applied cryptography: protocols, algorithms, and source code in C”, ‘john wiley& sons’, 2007

Rachmawati D, Sharif A and Budiman MA,“Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm”,‘InIOP Conference Series: Materials Science and Engineering’, vol. 300, no. 1, pp. 012042, 2018

Wheeler, D.J. and Needham, R.M.,“TEA, a tiny encryption algorithm”, In the proceedings of ‘International Workshop on Fast Software Encryption’, Berlin, Heidelberg, pp. 363-366,1994

Rahim R, Adyaraka D, Sallu S, Sarimanah E, Rahman MM, Chusna NL andKurniasih N,“Tiny encryption algorithm and pixel value differencing for enhancement security message”, ‘International Journal of Engineering and Technology’, vol. 7, no. 2.9, pp. 82-5, 2018

Novelan, M.S., Husein, A.M., Harahap, M. and Aisyah, S., “SMS Security System on Mobile Devices Using Tiny Encryption Algorithm”, In ‘Journal of Physics: Conference Series’, vol. 1007, no. 1, pp. 012037, 2018

Rajesh, S., Paul, V., Menon, V.G. and Khosravi, M.R.,“A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices”, ‘Symmetry’, vol. 11, no. 2, pp.293, 2019

Sugiyanto, S.,“N-TEA (New-Text Encryption Algorithm) For Secure Chat In Android Based Application”, ‘In the proceedings of International Conference on Information Technology Applications and Systems 2018’, 2018.

Setyawan, R.A., Selo and Hantono, B.S.,“Effect of the Application of TEA Algorithm on the Development of Secure Phone Application Android Smartphones”, In the proceedings of the conference of ‘Journal of Physics’, vol. 1175, no. 1, pp. 012073, 2019

Thu, W.M., Win, T.L. and Tyar, S.M.,“Performance Comparison of File Security System using TEA and Blowfish Algorithms”, ‘International Journal of Trend in Scientific Research and Development’, vol. 3, no. 5, pp. 871-877, 2019

Chaitra, B., Kiran Kumar, V.G. and ShatharamaRai, C., “Comparative Study of cryptographic encryption algorithms”, ‘Journal of Electronics and Communication Engineering’, International organization of scientific research, vol. 12, no. 3, version 2, pp. 66-71, 2017

Walia, E., Jain, P. and Navdeep, N., “An analysis of LSB & DCT based steganography”, ‘Global Journal of Computer Science and Technology’, 2010

Rajendran, S. and Doraipandian, M.,“Chaotic Map Based Random Image Steganography Using LSB Technique”, ‘International Journal of Network Security’, vol. 19, no. 4, pp.593-598, 2017

Cheng, L.M and Chan, C.K. , “Hiding data in images by simple LSB substitution”, ‘Pattern recognition’, vol. 37, no. 3, pp.469-474, 2004

Jumaa, N.K., “Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator”, ‘International Journal of Computer Applications’, vol. 113, no. 13, pp. 20-27, 2015

Kaur, R. and Singh, T., “Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography”, ‘International Journal of Computer Applications’, vol. 117, no. 18, pp. 36-40, 2015

Shen, J.J, Wang, Y.L. and Hwang, M.S., “An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching”, ‘International Journal of Network Security’, vol. 19, no. 5, pp.858- 862, 2017

Lu, T.C., Tseng, C.Y. and Deng, K.M., “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds”, ‘Signal Processing’, vol. 104, pp.152-166, 2014

Wu, J.H. Lu, T.C. and Tseng, C.Y.,“Dual imaging based reversible hiding technique using LSB matching”, ‘Signal Processing’, vol. 108, pp. 77-89, 2015

Setiadi D. R. I. M.,Rachmawanto, E.H. and Sari, C.A., “Secure image steganography algorithm based on dct with otp encryption”, ‘Journal of Applied Intelligent System’, vol. 2, no. 1, pp.1-11, 2017

Sari, Wellia, Rachmawanto, Eko, Rosal, De,Setiadi, De Rosal Ignatius Moses and Sari, Atika,“A Good Performance OTP encryption image based on DCT DWT steganography”,‘TELKOMNIKA Indonesian Journal of Electrical Engineering’, vol. 15, no. 4,pp. 1987-1995, 2017

Dong, J., Li, J. and Duan, Y., “A robust watermarking algorithm for encrypted medical images based on dct encrypted domain”, In the proceedings of the ‘2015 International Conference on Electronic Science and Automation Control’, 2015

Khalfallah A., Abdmouleh M. K. and Bouhlel M. S., “A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm”, ‘Procedia Computer Science’, vol. 112, pp. 369-376, 2017

Shivani, J.L. and Senapati, R.K., “Robust image embedded watermarking using DCT and listless SPIHT”, ‘Future Internet’, vol. 9, no. 3, pp.33, 2017 [25]StackPath,[Online],Available:-

https://www.militaryaerospace.com/communications/ article/16706235/the-importance-of-military information-security. [Accessed: 11-May-2020].

Downloads

Published

2020-05-05

How to Cite

Two StepVerification and DataSecurity through TheNetwork . (2020). International Journal of Innovative Research in Computer Science & Technology, 8(3), 105–112. Retrieved from https://acspublisher.com/journals/index.php/ijircst/article/view/13277