Two StepVerification and DataSecurity through TheNetwork
Keywords:
Data Transmission, Security, Steganography, Tiny Encryption AlgorithmAbstract
Our project is basically a web based application that engages in security and the transmission of data through the network. As we know that security is now become a necessity in each and everyone’s life as there might be people who want to access your secret data for wrong purposes.So our system deals with the security issue by implementing steganography into our system. Steganography basically helps to hide secret messages and information embedded in a photograph or a video. This technique helps to prevent any third party user from accessing the secret message. iIn our project we are also using an encryption technique that is the “Tiny Encryption Algorithm”. Encryption also plays an important role in keeping the data from unauthorized people in real time environment such that the data is safe. After encryption, the file is implemented with steganography and is then transmitted through the network to the receiver. The receiver should have the same application to de-embed the file and then decrypt the same file to extract the original file. The goal of our project is to design a tool for providing security to the system during transmission of data through the network for the likes of military forces that have an essential need for communication for vehicle control, surveillance signal processing and is even more imperative in times of a war.
Downloads
References
Mollin RA, “An introduction to cryptography”, ‘CRC Press’, 2000.
Schneier B, “Applied cryptography: protocols, algorithms, and source code in C”, ‘john wiley& sons’, 2007
Rachmawati D, Sharif A and Budiman MA,“Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm”,‘InIOP Conference Series: Materials Science and Engineering’, vol. 300, no. 1, pp. 012042, 2018
Wheeler, D.J. and Needham, R.M.,“TEA, a tiny encryption algorithm”, In the proceedings of ‘International Workshop on Fast Software Encryption’, Berlin, Heidelberg, pp. 363-366,1994
Rahim R, Adyaraka D, Sallu S, Sarimanah E, Rahman MM, Chusna NL andKurniasih N,“Tiny encryption algorithm and pixel value differencing for enhancement security message”, ‘International Journal of Engineering and Technology’, vol. 7, no. 2.9, pp. 82-5, 2018
Novelan, M.S., Husein, A.M., Harahap, M. and Aisyah, S., “SMS Security System on Mobile Devices Using Tiny Encryption Algorithm”, In ‘Journal of Physics: Conference Series’, vol. 1007, no. 1, pp. 012037, 2018
Rajesh, S., Paul, V., Menon, V.G. and Khosravi, M.R.,“A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices”, ‘Symmetry’, vol. 11, no. 2, pp.293, 2019
Sugiyanto, S.,“N-TEA (New-Text Encryption Algorithm) For Secure Chat In Android Based Application”, ‘In the proceedings of International Conference on Information Technology Applications and Systems 2018’, 2018.
Setyawan, R.A., Selo and Hantono, B.S.,“Effect of the Application of TEA Algorithm on the Development of Secure Phone Application Android Smartphones”, In the proceedings of the conference of ‘Journal of Physics’, vol. 1175, no. 1, pp. 012073, 2019
Thu, W.M., Win, T.L. and Tyar, S.M.,“Performance Comparison of File Security System using TEA and Blowfish Algorithms”, ‘International Journal of Trend in Scientific Research and Development’, vol. 3, no. 5, pp. 871-877, 2019
Chaitra, B., Kiran Kumar, V.G. and ShatharamaRai, C., “Comparative Study of cryptographic encryption algorithms”, ‘Journal of Electronics and Communication Engineering’, International organization of scientific research, vol. 12, no. 3, version 2, pp. 66-71, 2017
Walia, E., Jain, P. and Navdeep, N., “An analysis of LSB & DCT based steganography”, ‘Global Journal of Computer Science and Technology’, 2010
Rajendran, S. and Doraipandian, M.,“Chaotic Map Based Random Image Steganography Using LSB Technique”, ‘International Journal of Network Security’, vol. 19, no. 4, pp.593-598, 2017
Cheng, L.M and Chan, C.K. , “Hiding data in images by simple LSB substitution”, ‘Pattern recognition’, vol. 37, no. 3, pp.469-474, 2004
Jumaa, N.K., “Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator”, ‘International Journal of Computer Applications’, vol. 113, no. 13, pp. 20-27, 2015
Kaur, R. and Singh, T., “Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography”, ‘International Journal of Computer Applications’, vol. 117, no. 18, pp. 36-40, 2015
Shen, J.J, Wang, Y.L. and Hwang, M.S., “An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching”, ‘International Journal of Network Security’, vol. 19, no. 5, pp.858- 862, 2017
Lu, T.C., Tseng, C.Y. and Deng, K.M., “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds”, ‘Signal Processing’, vol. 104, pp.152-166, 2014
Wu, J.H. Lu, T.C. and Tseng, C.Y.,“Dual imaging based reversible hiding technique using LSB matching”, ‘Signal Processing’, vol. 108, pp. 77-89, 2015
Setiadi D. R. I. M.,Rachmawanto, E.H. and Sari, C.A., “Secure image steganography algorithm based on dct with otp encryption”, ‘Journal of Applied Intelligent System’, vol. 2, no. 1, pp.1-11, 2017
Sari, Wellia, Rachmawanto, Eko, Rosal, De,Setiadi, De Rosal Ignatius Moses and Sari, Atika,“A Good Performance OTP encryption image based on DCT DWT steganography”,‘TELKOMNIKA Indonesian Journal of Electrical Engineering’, vol. 15, no. 4,pp. 1987-1995, 2017
Dong, J., Li, J. and Duan, Y., “A robust watermarking algorithm for encrypted medical images based on dct encrypted domain”, In the proceedings of the ‘2015 International Conference on Electronic Science and Automation Control’, 2015
Khalfallah A., Abdmouleh M. K. and Bouhlel M. S., “A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm”, ‘Procedia Computer Science’, vol. 112, pp. 369-376, 2017
Shivani, J.L. and Senapati, R.K., “Robust image embedded watermarking using DCT and listless SPIHT”, ‘Future Internet’, vol. 9, no. 3, pp.33, 2017 [25]StackPath,[Online],Available:-
https://www.militaryaerospace.com/communications/ article/16706235/the-importance-of-military information-security. [Accessed: 11-May-2020].