Two Step Verification and Data Security through the Network
Soumyadeep Das , Vishal Rohilla, Dr. MeenuVijarania, Dr. Yojna Arora
Our project is basically a web based application that engages in security and the transmission of data through the network. As we know that security is now become a necessity in each and everyone’s life as there might be people who want to access your secret data for wrong purposes.So our system deals with the security issue by implementing steganography into our system. Steganography basically helps to hide secret messages and information embedded in a photograph or a video. This technique helps to prevent any third party user from accessing the secret message.iIn our project we are also using an encryption technique that is the “Tiny Encryption Algorithm”. Encryption also plays an important role in keeping the data from unauthorized people in real time environment such that the data is safe. After encryption, the file is implemented with steganography and is then transmitted through the network to the receiver. The receiver should have the same application to de-embed the file and then decrypt the same file to extract the original file. The goal of our project is to design a tool for providing security to the system during transmission of data through the network for the likes of military forces that have an essential need for communication for vehicle control, surveillance signal processing and is even more imperative in times of a war.
Data Transmission, Security, Steganography, Tiny Encryption Algorithm.
Mollin RA, “An introduction to cryptography”, ‘CRC Press’, 2000.
Schneier B, “Applied cryptography: protocols, algorithms, and source code in C”, ‘john wiley& sons’, 2007
Rachmawati D, Sharif A and Budiman MA,“Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm”,‘InIOP Conference Series: Materials Science and Engineering’, vol. 300, no. 1, pp. 012042, 2018
Rahim R, Adyaraka D, Sallu S, Sarimanah E, Rahman MM, Chusna NL andKurniasih N,“Tiny encryption algorithm and pixel value differencing for enhancement security message”, ‘International Journal of Engineering and Technology’, vol. 7, no. 2.9, pp. 82-5, 2018
Novelan, M.S., Husein, A.M., Harahap, M. and Aisyah, S., “SMS Security System on Mobile Devices Using Tiny Encryption Algorithm”, In ‘Journal of Physics: Conference Series’, vol. 1007, no. 1, pp. 012037, 2018
Rajesh, S., Paul, V., Menon, V.G. and Khosravi, M.R.,“A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices”, ‘Symmetry’, vol. 11, no. 2, pp.293, 2019
Sugiyanto, S.,“N-TEA (New-Text Encryption Algorithm) For Secure Chat In Android Based Application”, ‘In the proceedings of International Conference on Information Technology Applications and Systems 2018’, 2018.
Cheng,L.M and Chan,C.K.,“HidingdatainimagesbysimpleLSBsubstitution”,‘Patternrecognition’,vol.37,no.3,pp.469-474,2004
Jumaa, N.K., “Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator”, ‘International Journal of Computer Applications’, vol. 113, no. 13, pp. 20-27, 2015
Kaur, R. and Singh, T., “Hiding Data in Video Sequences using LSB with Elliptic Curve Cryptography”, ‘International Journal of Computer Applications’, vol. 117, no. 18, pp. 36-40, 2015
Shen, J.J, Wang, Y.L. and Hwang, M.S., “An Improved Dual Image-based Reversible Hiding Technique Using LSB Matching”, ‘International Journal of Network Security’, vol. 19, no. 5, pp.858-862, 2017
Lu, T.C., Tseng, C.Y. and Deng, K.M., “Reversible data hiding using local edge sensing prediction methods and adaptive thresholds”, ‘Signal Processing’, vol. 104, pp.152-166, 2014
Wu, J.H. Lu, T.C. and Tseng, C.Y.,“Dual imaging-based reversible hiding technique using LSB matching”, ‘Signal Processing’, vol. 108, pp. 77-89, 2015
Setiadi D. R. I. M.,Rachmawanto, E.H. and Sari, C.A., “Secure image steganography algorithm based on dct with otp encryption”, ‘Journal of Applied Intelligent System’, vol. 2, no. 1, pp.1-11, 2017
Sari, Wellia, Rachmawanto, Eko, Rosal, De,Setiadi, De Rosal Ignatius Moses and Sari, Atika,“A Good Performance OTP encryption image based on DCT-DWT steganography”,‘TELKOMNIKA Indonesian Journal of Electrical Engineering’, vol. 15, no. 4,pp. 1987-1995, 2017
Khalfallah A., Abdmouleh M. K. and Bouhlel M. S., “A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm”, ‘Procedia Computer Science’, vol. 112, pp. 369-376, 2017
[Soumyadeep Das , Vishal Rohilla, Dr. MeenuVijarania, Dr. Yojna Arora (2020) Two Step Verification and Data Security through the Network IJIRCST Vol-8 Issue-3 Page No-105-112] (ISSN 2347 - 5552). www.ijircst.org
Department of Computer Science and Engineering, Amity University Haryana, Gurugram, India, 9717137840 (email: firstname.lastname@example.org)