A Secure Data Transmission By Integrating Cryptography And Video Steganography
|
|
|
- Lora Todd
- 10 years ago
- Views:
Transcription
1 A Secure Data Transmission By Integrating Cryptography And Video Steganography Shafna P K Computer Science Department KMEA Engineering College Ernakulam, India [email protected] Abstract Advances in digital content transmission have increased in past few years. Security and privacy issues of the transmitted data have become an important concern in multimedia technology. In this paper proposes a video steganography method for transmitting data securely. Steganography means covered writing it includes process of concealing information within other file and also conceals the fact that a secret message is being sent.video Steganography is to hide the existence of the message from unauthorized party using Video as cover file and hiding data in video. In this work a very simple and real time algorithm is used for the encryption of the images which are the basic building blocks of any video file. In the proposed research paper the video is distributed into the photo frames using a matlab code and all the frames are sequentially stored. Each such frame contains a combination of red, blue and green layers. If we consider a pixel as an 8 bit value than each pixel has the value in the range of 0 to 255. In this work, for each frame four pixels situated at the top left and right and the bottom left and right corner are modified so as to insert text in each image. Text data is encrypted using AES algorithm. After the completion of the pixel value changing all the images is placed in a sequential manner and then all the frames are cascaded for generation of the original video file with encryption. This new video is almost similar to the original video file with no changes visible to the naked eye. Keywords: Video steganography, AES encryption, PSNR, MSE I. INTRODUCTION Now a day s the use of internet increases. As the use of internet increases providing security to the information is also important thing. Providing security means protecting information systems from unauthorized access, use, disruption, modification and recording or destruction. There are two methods to provide security. They are cryptography and steganography. Cryptography is the way of hiding information and it is used when communicating over untrusted medium. Steganography is a kind of science and art of hiding a secret message inside the other digital files. Depending on the type of the cover object there are many suitable steganography techniques which are followed in order to obtain security. It can be shown in Figure Image Steganography: Taking the cover object as image in steganography is known as image steganography. Pixel intensities are used to hide the information in an image Network Steganography: When taking cover object as network protocol, such as TCP, ICMP, IP, UDP etc.., where protocol is used as carrier known as network protocol steganography Video Steganography: Video Steganography is a technique to hide any kind of files or information into digital video format. Video (combination of pictures) is used as carrier for hidden information. Generally discrete cosine transform (DCT) alter values (e.g., to 9) which is used to hide the information in each of the images in the video, which human eye cannot noticeable. Video steganography uses such as MPEG, H.264, AVI, Mp4 or other video formats Audio Steganography: When taking audio as a carrier for information hiding it is called audio steganography. Audio steganography uses digital audio formats such as WAVE, AVI MPEG, MIDI or etc for steganography Text Steganography: General technique in text steganography, such as white spaces, capital letters, number of tabs just like Morse code and etc.., is used to achieve hiding of information. In this work video steganography is adopted. For normal human being the ability to perceive the motions of other animated frames or video has been extensively studied and it is shown that for the movements created in the running video only the small amount of the pixels are modified and rest all the pixels remain static if we compare the pixels of any consecutive frames in a video. So by the changes made in the smaller number of pixels in a sequence of images all the movements are described perfectly in a video file. This is very simple and easy method for visualizing any process under study. Research shows that among the consecutive images having million numbers of pixels only few hundred pixels are modified for showcasing the movements happening in the particular video 1
2 Figure 1.1: Digital Medium to Achieve Steganography The video steganography uses some frames of Video files to embed the secret message. This steganography hides information in such a way that it appears like that no information is hidden. Whenever any person views that video in which data is hidden but they have no idea that any information will not be decoded by unwanted person. Steganography provide security by obscurity. Video Steganography technique will not only hide data but also hide the presence of data. The data is hidden even from receiver but receiver can decode data as they know the password that is used to embed data. The video file can hide large quantity of information because it carries large number of frames and its storage capacity is also more. Video files are larger than audio and image files, and hide more information. The video steganography involve two steps. The first step deals with embedding secret message in the video files. The second step is the extraction of secret message from video files. This video steganography have more hiding capacity (the amount of information that can be embedded) which is always an important factor when developing a steganography algorithm. The second main advantage of hiding data into video file is the added security against the attack of the third party or unintended receiver due to relative complexity of the structure of video as compared to image & audio. In video steganography technique pixel mapping method is used to hide data in video cover file. Any video is basically a combination of different frames and all the frames constituting a video has a fixed frame rate. Generally the frame rate is 25 so we can say that 25 frames are captured within one second time. For the efficient and successful implementation of this particular algorithm there is a requirement that the video needs to be segmented. For a particular case if we suppose that the video is of 5 minutes duration than this video majorly contains 7500 frames in it. These frames are the building block for the video as well as for video encryption process. In this work also the video steganography technique is used. Also the steganography technique is faster and efficient in terms of time required for marking the particular set of images. Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet. It can also define as the study of invisible communication that usually deals with the ways existence of the hiding of the communicated message. In order to achieve high security encrypted information content is embedded into the video. In this work AES encryption is used to encrypt text data. II. RELATED WORKS There are various steganography methods have been proposed in literature. Video file hides a large amount of secret data hence it is more useful. B.SUNEETHA et. al has proposed in his work Steganography and Cryptography based system for hiding data in video by encrypting it with ASCII code. Thus it provides an additional layer of security. Steganography is intended to provide secrecy of text data whereas Cryptography provides privacy [2]. In Secured data transmission Steganography technique works on compression technique which is evaluated such that the data is been embedded in the vertical and horizontal component. There are three types of images (or frames) used in video compression which is used to evaluate frames, they are : I-frames, B-frames and P-frames defined on amount of data compression. They have different characteristics: I (Intra-coded) frames don't require other video frames to decode but are least compressible. P- (Predicted) frames use data from previous frames to decompress and are more compressible than I-frames. To get the higher amount of data compression B- (Bipredictive) frames use both previous and forward frames for data reference. In which first read the input video file and fragmented into frames, then required information is read from the cover file. Using LSB method text data is embedded into the video frames. The given Secured Data Transmission Technique provides high capacity and imperceptible, for human vision of the hidden secret information. By embedding the data in the moving pictures the quality of the video is increased. The compressed video is used for the data transmission as it can hold large amount of text data. Kousik Dasgupta, J.K. Mandal and Paramartha Dutta has proposed a secured hash based LSB technique for video steganography which uses cover video files in spatial domain to hide the presence of sensitive data regardless of 2
3 its format. Performance analysis of the hash based LSB technique after comparison with LSB technique is better[3]. The Hash based Least Significant Bit (HLSB) technique for Video Steganography has been used, here the secret data is hided in the LSB of the cover frames. In HLSB method eight bits of text data to be transmitted is divided in 3, 3, 2 format and inserted into the RGB pixel values of the video frames. To select the position of insertion in LSB bits a hash function is used. A. Swathi, Dr. S.A.K Jilani Video File(Cover, Carrier) Data/Message(Text, Audio,Image,Video) Steganography algorithm Stego File(Video with secret data) has proposed in his paper the LSB substitution using polynomial equation is developed to hide the information in specific frames of the video and in specific location of the frame by LSB substitution using polynomial equation. Here the text data will be embedded based on the key and the key is in the form of polynomial equations with different coefficients. By this method the capacity of embedding bits into the cover image can be increased [4]. Mritha Ramalingam has proposed a more secured LSB method way in which video file is used as a host media to hide secret message without affecting the file structure and content of the video file. Because degradation in the video quality leads to visible change in the video which may lead to the failure of the objectives of Steganography[5] Earlier various kinds of steganography techniques are introduced for the video. In this work proposes a new video steganography method for transmitting data securely. In this technique steganographic tool is developed in MATLAB software which perform Encoding and Decoding. Figure 3.1 narrate the flowchart showing the sequence of steps to be executed for generating the encrypted video file for secured text data transmission. The algorithm is briefly described in terms of flowchart for the better understanding of the whole process. The complete algorithm is coded in a Matlab code showing the detailed process involved in the video encryption and the text insertion in the video file for secured transmission. As shown in the algorithm in figure 3.1 the complete video is segmented into number of frames using a small matlab code module and after the processing of the video by the Matlab code module the video gets divided into different frames of same size. Then the text string which is to be inserted among the images is partitioned into the group of two bits each. As we need to modify only four pixels per image so we divide the text data into the group of two bits. Each character in the text data can be represented by a specific ASCI value so each of the character occupies 1 byte or 8 bits in an image. Ashawq T. Hashim et al has proposed a Hybrid Encryption and Steganography technique where there are two methods of hiding used, the first method is the Least Significant Bit (LSB) and the second is the Haar Wavelet Transform (HWT). This work is based on a combination of steganography and cryptography techniques to increase the level of security and to make the system more complex to be defeated by attackers. R. Shanthakumari and Dr.S. Malliga in their proposed work has stated a LSB Matching Revisited algorithm (LSBMR) selects the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. LSBMR scheme addresses two problems Lack of Security and Low Embedding rate[7]. LSB Matching Revisited(LSBMR) algorithm for Video Steganography selects the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. [7] III. PROPOSED SYSTEM 3
4 layer is changed for processing the image so as to retain the original shade in the frame. The green and red layer in each of the images is unchanged. Only the blue layer pixels are modified in each of the image frames. Now we have frames as well as very well distributed text data available so the next step to be followed is to encode or map the text data into the pixels of individual frames till the end of the text data. In the proposed work, to store one character into one frame so there is a requirement of n number of frames for storing n number of characters in the text data. For a particular image frame by modifying only two pixels at top and bottom of the image file does not make any significant changes in the visual effects of the frame so they are not visible to the human eye. Next step to be followed as per the flowchart is to select the first frame from the sequence of the frames and identify the blue layer of the first pixel and overwrite the last two bits with the first two bits of the character in the text data. Similarly also over write the last two bits of the blue layer pixel by the corresponding next two bits of the character. Same process is to be done for the pixels present in the bottom section of the frame. In this way we can impose one character into one frame and the same process is to be followed for all the characters present in the text data with consecutive different frames. In this work mainly there are two modules. First module involves encryption of text message using AES algorithm. Second module involves embedding text data into selected position of video frames. Figure 3.1 : Algorithm for secure text transmission using video steganography In this particular algorithm each of the image has to be modified by two pixel value and that also only the last two bits so each of the character in the text data to be inserted is represented by its ASCI value in line. After this each of the characters represented into the group of 8bits is subdivided into the groups of 2 bits only. So now we have four groups for each of the character in the text data to be inserted into the images. In this algorithm to represent one particular character we require four pixels to store one particular character, So we store one character in one frame using its four corner pixels. As per the grassman law importance of three basic colors which are red, blue and green are different. As per grassman law the importance of the green layer is the most because it contains 59% weightage to generate any color in a particular pixel Due to this in this algorithm only the value of blue 3.1. CRYPTOGRAPHY Cryptography is an art of protecting the information by transforming it into an unreadable and untraceable format known as cipher text. Only the person who have the secret key can decipher or we can say decrypt the message into the original form. Cryptography provides a number of security goals to ensure the privacy of data, non-alteration of data and so on In this work, AES encryption algorithm used for encrypting text data. AES is an algorithm for performing encryption and decryption. AES is a symmetric block cipher. Symmetric block cypher means it uses the same key for encryption and decryption. The algorithm Rijndael allows for a variety of key and block sizes. The key and block can be chosen independently from 128, 160, 192, 224, 256 bits and no need of the same. AES standard states that the 4
5 algorithm can only accept a block size of 128 bits and a choice of three keys - 128, 192, 256 bits. It is not a feistel structure. The entire data block is processed in parallel during each round using substitutions and permutations. Each round is a uniform and parallel composition of 4 steps, SubBytes: Byte-by-byte substitution using a nonlinear S-box ShiftRows: Is a permutation, circular left-shift on the last three rows in the state MixColumns: Substitution that uses Galois Fields, i.e each column of State is replaced by another column obtained by multiplying that column with a matrix in a particular field. AddRound key : Performs a bit-by-bit XOR with an expanded key AES was designed to achieve the following characteristics: Resistance against all known attacks. To attain speed and code compactness on heterogeneous platforms. To gain design Simplicity. The decryption of AES algorithm is not same with the encryption algorithm, but uses the same key. There is also a way of implementing the decryption with an algorithm that is equivalent to the encryption algorithm (each operation replaced with its inverse), however, in this case, the key schedule must be changed STEGANOGRAPHY Stenography is the art of hiding information by embedding message within each other. It works by replacing the very useless bits by the information content to be transmitted. It works by hiding information inside a cover. The cover may be an image file or a video file as per the user requirement. Even though the cover looks very simple and unchanged but it has information contained in it. First of all the video file is converted into a series of frames of equal size. The information content which is to be transmitted by mapping onto the video file is distributed into small portion depending on the size of the frames in the video file. From each frame a smaller region is modified depending upon the private key. Due to this the selected groups looks very random to the third party who does not have the private key with them. The selected pixels are then converted into the frequency domain with the help of the discrete cosine transform. Usually a predefined portion of the pixels like we say the last two or three bits are then replaced by the spilled message portion and then the pixel portion is again converted back into the spatial domain. The conversion from the frequency domain to the spatial domain is done with the help of inverse DCT. Then that group of pixels is placed back into the particular frame. This process is followed until the end of the whole information content. The frames are then arranged into a sequential manner and the video is constructed from it. Now this video contains the information which gets transmitted along with the transmission of the video file. The Steganography encoder has to keep some control message into the video file by which the receiver can understand the data format, way of hiding the information content, type of encryption done etc. This is known as the rule list for a particular steganography process. This rule list is generated and mostly it is placed in the first frame of the video file. This rule list acts as a reference for a particular desired receiver. Without rule list the receiver may not be able to understand and retrieve the original information content hidden within the received video file. So the rule list plays a vital role at the receiver side. The main blocks in a Steganography Decryptor is as shown in figure 3.5. From the figure 3.5 it is very clear that if the private key is not known than it is impossible to extract the original information content in the received video file. There are certain methods like some steg-analysis tools by which the information can be detected without the use of the private key also. IV. RESULT ANALYSIS & DISCUSSIONS The algorithms are implemented using MATLAB version R2015a. Matlab provides easier application development and a well defined user interface Steganography technique is characterized mainly by imperceptibility and capacity. Imperceptibility means the embedded data must be perceptually invisible to the observer. In order to evaluate the performance of the stego video, there are some quality measures such as PSNR and MSE The MSE (mean square error) is defined as average squared difference between a reference image and a distorted image. It is calculated by the formula given below X Y MSE = 1/XY[ (c(i, j) e(i, j))^2 i=1 j=1 5
6 X and Y are height and width respectively of the image. The c (i, j) is the pixel value of the cover image and e (i, j) is the pixel value of the embed image The PSNR (peak signal to noise ratio) is used to determine the degradation in the embedded image with respect to the host image. It is calculated by the formula as PSNR = 10 log10 (L*L/MSE) L is the peak signal value of the cover image which is equal to 255 for 8 bit images. Steganography technique is characterized mainly by imperceptibility and capacity. Imperceptibility means the embedded data must be perceptually invisible to the observer. The performance of the proposed technique is evaluated using two different video streams (shakyc_car.avi,wildlife)and one secret text(text_to_hide.txt).the perceptual imperceptibility of the embedded data is indicated by comparing the original video with its stego_video.when we hide secret text in video there will be no loss in quality of video and even none can guess the presence of data within a video. In this section, we evaluate the performance of scheme through numerical simulations. It can be simulated using NS2 [7], network simulator. The scenarios had a deployment area of 200 x 200 meters. Wireless networks employ access technology. The simulation period can be 30 seconds and simulation model has a queue length of 50. The source transmits their data to the sink node and then suddenly a large number of nodes involves in data transfer. By using the proposed scheme we can render a drastic change in energy, throughput and efficiency with communication overhead. Video file No:of PSNR MSE characters to hide Wildlife.mp Shaky_car.avi Road.mp Stream.mp with quality of video. For different resolution this quantity shows variation. V. CONCLUSION In this paper a robust and secure video steganography method is proposed. The proposed method is efficient and good for hiding data in video. One of the important features of the proposed work is it helps to transmit data securely by embedding it in a video file and without disclosing to the unintended receiver and without any alternation in secret message. The information underlying the video is not visible to the naked eye. An efficient AES encryption algorithm is used for the encryption of the text data. Only the person having the key and the rule list can identify and decode the original information from video into its original form. With the combination of the cryptography and steganography information security can be increased. REFERENCES [1] Prabhishek Singh, R S Chadha A Survey of Digital Watermarking Techniques, Applications and Attacks, IJEIT Volume 2, Issue 9, March 2013 [2] B.SUNEETHA, CH.HIMA BINDU & S.SARATH CHANDRA SECURED DATA TRANSMISSION BASED VIDEO STEGANOGRAPHY International Journal of Mechanical and Production Engineering (IJMPE) ISSN No.: , Vol-2, Iss-1, 2013 [3] Kousik Dasgupta, J.K. Mandal and Paramartha Dutta, Hash based Least Significant Bit Technique, International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 2, April 2012 [4] A. Swathi 1, Dr. S.A.K Jilani,, Video Steganography by LSB Substitution Using Different Polynomial national Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 [5] Mritha Ramalingam: Stego Machine Video Steganography using Modified LSB Algorithm World Academy of Science, Engineering and Technology Vol: [6] Ashawq T. Hashim*, Dr.Yossra H. Ali** & Susan S. Ghazoul* Developed Method of Information Hiding in Video AVI File Based on Hybrid Encryption and Steganography Engg.and tech journal, vol 29,No.2,2011. [7] R Shanthakumaril and Dr S Malliga, - Video Steganography Using LSB Matching Revisited Algorithm,IOSR Journal of Computer Engineering e-issn: ,p-ISSN: , Volume 16, Issue 6, Ver. IV(Nov Dec. 2014), PP From above table we observed that by using Secure text transmission using video steganography technique for video steganography using MATLAB software as steganographic tool we get more PSNR and as video has large hiding capacity so more hiding capacity gives more PSNR and small MSE. It gives different values of PSNR which deals 6
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM
IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
Video compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography
502 Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography 1 Vinay Wadekar, 2 Ajinkya Jadhavrao, 3 Sharad Ghule, 4 Akshay Kapse 1,2,3,4 Computer Engineering, University Of Pune, Pune,
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
A Novel Security Scheme for Secret Data using Cryptography and Steganography
I. J. Computer Network and Information Security, 2012, 2, 36-42 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.06 A Novel Security Scheme for Secret Data using
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 Least Significant Bit algorithm for image steganography
Champakamala.B.S, Padmini.K, Radhika.D. K Asst Professors, Department of TCE, Don Bosco Institute of Technology,Bangalore, India Abstract Steganography is one of the most powerful techniques to conceal
Steganography and Visual Cryptography in Computer Forensics
2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and
Video-Conferencing System
Video-Conferencing System Evan Broder and C. Christoher Post Introductory Digital Systems Laboratory November 2, 2007 Abstract The goal of this project is to create a video/audio conferencing system. Video
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES
A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique
A Survey on Performance Analysis of, AES and RSA Algorithm along with LSB Substitution Technique B. Padmavathi 1, S. Ranjitha Kumari 2 1 Research Scholar, R.V.S College of Arts & Science (Autonomous )Sulur,
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
A Concept of Digital Picture Envelope for Internet Communication
A Concept of Digital Picture Envelope for Internet Communication Eiji Kawaguchi, Koichi Nozaki, Michiharu Niimi, Hideki Noda and Richard O. Eason Kyushu Institute of Technology 1-1 Sensui-cho, Tobata,
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Efficient Software Implementation of AES on 32-bit Platforms
Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Keywords Web Service, security, DES, cryptography.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Overview Steganography is the process of hiding secret data inside other, normally transmitted data. In other words, as defined by [40] steganography means hiding of a secret
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
International ejournals
ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY
Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar
----------------------------------------------------------------------------- An Efficient Bit Plane X-ORing Algorithm for Irreversible Image Steganography -----------------------------------------------------------------------------
Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey
Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: [email protected] RESEARCH
Parametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
Keywords: Double layered blowfish encryption, chaotic-map based pixel abstraction, image security, encryption, blowfish.
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Image Privacy
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Authentication
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR
Network Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
White paper. H.264 video compression standard. New possibilities within video surveillance.
White paper H.264 video compression standard. New possibilities within video surveillance. Table of contents 1. Introduction 3 2. Development of H.264 3 3. How video compression works 4 4. H.264 profiles
Secure Network Communication Based on Text-to-Image Encryption
Secure Network Communication Based on Text-to-Image Encryption Ahmad Abusukhon 1, Mohamad Talib 2, Issa Ottoum 3 1 IT Faculty, - Computer Network Department Al-Zaytoonah University of Jordan Amman, JORDAN
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
Hill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK
SECURE AND EFFICIENT TRANSMISSION OF MEDICAL IMAGES OVER WIRELESS NETWORK Deepika.K 1, Varshini Karthik 2 1 Post Graduate Student, Department of BME, SRM University, Tamilnadu, India 2 Assistant Professor,
DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES
DEVELOPING SECURED INTEROPERABLE CLOUD COMPUTING SERVICES Al-Khanjari, Z. Alani, A. Department of Computer Science, College of Science, Sultan Qaboos University, Muscat, Oman Abstract Developers of cloud
Hamid.A.Jalab, A.A Zaidan and B.B Zaidan
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation 108 Hamid.A.Jalab, A.A Zaidan and B.B Zaidan Abstract--- Bit Plane Complexity Segmentation (BPCS) digital
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
A Tool for Multimedia Quality Assessment in NS3: QoE Monitor
A Tool for Multimedia Quality Assessment in NS3: QoE Monitor D. Saladino, A. Paganelli, M. Casoni Department of Engineering Enzo Ferrari, University of Modena and Reggio Emilia via Vignolese 95, 41125
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University
AES Power Attack Based on Induced Cache Miss and Countermeasure
AES Power Attack Based on Induced Cache Miss and Countermeasure Guido Bertoni, Vittorio Zaccaria STMicroelectronics, Advanced System Technology Agrate Brianza - Milano, Italy, {guido.bertoni, vittorio.zaccaria}@st.com
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Real-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
Introduction to image coding
Introduction to image coding Image coding aims at reducing amount of data required for image representation, storage or transmission. This is achieved by removing redundant data from an image, i.e. by
Figure 1: Relation between codec, data containers and compression algorithms.
Video Compression Djordje Mitrovic University of Edinburgh This document deals with the issues of video compression. The algorithm, which is used by the MPEG standards, will be elucidated upon in order
SCAN-CA Based Image Security System
SCAN-CA Based Image Security System Bhagyashree.S.Anantwar 1, S.P.Sonavane 2 Student, Department of Computer Science and Engg, Walchand College of Engg, Sanli, India 1 Asso. Professor, Department of Information
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
encoding compression encryption
encoding compression encryption ASCII utf-8 utf-16 zip mpeg jpeg AES RSA diffie-hellman Expressing characters... ASCII and Unicode, conventions of how characters are expressed in bits. ASCII (7 bits) -
Secure Data Transmission by using Steganography
Abstract Secure Data Transmission by using Steganography R.M. Goudar, Prashant N. Patil, Aniket G.. Meshram*, Sanyog M. Yewale, Abhay V. Fegade Computer Engineering Department, Pune University, MAE, Alandi
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM
PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM Apurva Sinha 1, Mukesh kumar 2, A.K. Jaiswal 3, Rohini Saxena 4 Department of Electronics
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
