scholarly journals Steganography Using Data Encryption

Author(s):  
Gaurav Rao ◽  
Usha Barapatre ◽  
Vishal Gahane ◽  
Yogeshwar Nagpure
Keyword(s):  
2019 ◽  
Vol 52 (27) ◽  
pp. 400-405
Author(s):  
Bruno Rodrigues ◽  
Alberto Cardoso ◽  
Jorge Bernardino ◽  
Nuno Simões ◽  
José Marques

2019 ◽  
Vol 4 (1) ◽  
pp. 19-24
Author(s):  
M. Agus Syamsul Arifin ◽  
Antoni Zulius

Abstrak Pengamanan Jaringan merupakan salah satu tindakan untuk menjaga data yang terdapat di server selain menggunakan metode enskripsi data terdapat juga salah satu Teknik yang di gunakan untuk mengamankan jaringan yaitu dengan menggunakan Teknik DMZ (Demilitarized Zone). DMZ merupakan sebuah area dalam jaringan yang di bangun untuk melindungi sistem internal dengan cara memisahkan lalulintas Data yang ada pada jaringan. Lalulintas data pada Jaringan Universitas Bina Insan Lubuklinggau tidak terfilter sehingga sistem internal yang ada  dalam hal ini adalah perangkat server tidak memiliki pengamanan selain sistem keamanan built in yang ada pada sistem operasi yang di gunakan oleh server Universitas (Firewall Sistem Operasi) pengguna yang mengakses jaringan Internet menggunakan IP Address yang biasa di gunakan mahasiswa dapat juga memasuki jaringan yang di gunakan oleh server secara langsung tanpa terfilter, dengan menggunakan Teknik DMZ lalulintas data Server yang ada akan dipisah dari Jaringan yang di gunakan oleh mahasiswa dan Jaringan Luar, sehingga mahasiswa dan pengguna hanya akan dapat mengakses port yang sudah di tentukan saja. Penggunaan Teknik DMZ nantinya akan menjadi sistem lapis pengamanan pertama dari server yang ada di Universitas Bina Insan Lubuklinggau agar beberapa port dapat terlindungi dari pengguna yang berusaha mengakses lebih dalam ke dalam Server. Kata kunci : Demilitarized Zone (DMZ), Keamanan Jaringan, Server Abstract  Network Security is one of the ways to maintain the data contained on the server besides using data encryption methods, there is also one of the techniques used to secure the network by using the DMZ (Demilitarized Zone) technique. DMZ is an area in a network that is built to protect internal systems by separating traffic data on the network. Data traffic on the Bina University Network Lubuklinggau Staff is not filtered so that the internal system in this case is that the server device has no security other than the built-in security system that is on the operating system used by the University server (Firewall Operating System) users accessing the Internet network using an IP address that is commonly used by students can also enter the network that is used directly by the server without filtering, using the DMZ technique data traffic Existing servers will be separated from the network used by students and the outside network, so students and users will only can only access the specified port. The use of the DMZ Technique will later become the first security layer system from the server at Bina University, Lubuklinggau, so that several ports can be protected from users trying to access deeper into the Server.  Keywords : Demilitarized Zone (DMZ), Network Security, Server


2013 ◽  
Vol 6 (2) ◽  
pp. 311-316 ◽  
Author(s):  
Mittapalli Indrasena Reddy ◽  
V. Uday Kumar ◽  
K. Subba Reddy ◽  
P. Venkat Vijay Kumar

Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL subband of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet transform is applied and the resultant image is transmitted to the receiver. The receiver will perform the same operations in reverse order.


Author(s):  
Lina Yang ◽  
Haiyu Deng ◽  
Ren Ping Liu ◽  
Patrick Wang ◽  
Xiaocui Dang ◽  
...  

Smart home is an emerging form of the Internet of Things (IoT), enabling people to enjoy a convenient and intelligent life. The data generated by smart home devices are transmitted through the public channel, which is not secure enough, so the secret data in smart home are easily intercepted by malicious adversaries. In order to solve this problem, this paper proposes a smart home privacy protection method combining DES encryption and the improved Least Significant Bit (LSB) information hiding algorithm, changing the practice of directly exposing smart home secret information to the Internet, first, using Data Encryption Standard (DES) encryption to encrypt the smart home information and second, the improved LSB information hiding algorithm is used to hide the ciphertext, so that the adversary cannot detect the smart home secret information. The goal of the scheme is to provide a double protection for the secure transmission of the smart home secret information. If an attacker wants to carry out an attack, it has to break through at least two defense lines, which seems impossible to do. Experiment results show that the improved LSB algorithm is more robust than the existing algorithms, and it is very safe. Therefore, the scheme proposed in this paper is very practical for protecting the smart home secret information.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 367
Author(s):  
Dr R. Bulli Babu ◽  
P Jagadeesh ◽  
S Sonia

Unique wellbeing record (PHR)1 will be kept up in the bound together server should keep up the patients near home and PHR administra-tions would outsourced should outcast pro co-ops. Those essential concerns may be around examination information. Those tolerant records ought to make if those patients Might truly control those advertising kept up with helter-skelter2 security which is more security. The securi-ty plans are used to protect that particular information from general population get. Tolerant information could make accessed Eventually Tom's perusing A large number distinctive individuals. Each power will be doled out with right reasonably for a specific situated of qualities. The entry control and protection management is an intricate assignment in the tolerant wellbeing record oversaw economy methodology. Conveyed registering may be a casual statement used to depict a combination about Different sorts about registering thoughts that incorpo-rate endless that would chortle through a continuous correspondence a. It may be an identical word to passed on preparing over an arrange-ment and methods those abilities will run a system around a number chortled Pcs meanwhile majority of the data proprietors invigorate those singular data under outcast cloud server ranches. Those novel patient-driven framework Also a suited from claiming data get will instruments will control PHR1 set far over semi-put stock Previously, servers. On finish fine-grained What's more versant majority of the data get will control to PHRs, we utilize quality built encryption (ABE) methodologies on scramble each patient's PHR1 record. Different data proprietors3 camwood get should comparable data values. Those recommended arrangement Might a chance to be arrived at out to pro-gressive quality built encryption (HABE) for get to control part. 


2014 ◽  
Vol 573 ◽  
pp. 600-604
Author(s):  
K. Latha ◽  
S. Amirthalingam

Internet is the prime vehicle to disseminate information from one place to another. Providing security to data is a major issue in transmitting data. One way of providing security to the data is encryption and decryption. Normal encryption is the way of changing the plaintext into cipher text using encryption and decryption algorithm and key. Literature reported different methods for encryption. An attempt is made in this paper to propose a modified encryption and decryption process performed with modified cellular automata rules. Cellular automata is idealized parallel processing machine which depends upon the cell value which is updated based on updating rule, which involves the cell and other cell values in a particular neighbourhood .Discrete references were made in the literature on the application of cellular automata rules. However lot more work remains to be done in this area. An attempt is made in this paper to provide encryption and decryption with cellular automata rules, using Data Encryption Standard (DES) and Advance Encryption Standard (AES) algorithms. They are operated at various stages, with the number of stages involved in sequential and cellular automata operating parallel. The major contribution of present work is, to develop methodology for identifying and application of 1D and 2D cellular automata rules and to fix the issues and challenges there in. A modified cellular automata set of rules are considered to develop 3D cellular automata rules for improved safety. Further a comparison is provided between existing 1, 2D automata rules versus the modified 3D cellular automata rules with respect to certain parameters. Keywords : Internet, Security, Cipher text, Plaintext, Cell value.


2015 ◽  
Vol 12 (2) ◽  
pp. 431-436
Author(s):  
Baghdad Science Journal

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secret message in high frequency. The proposed approach tested in different sizes of audio file and showed the success of hiding according to (PSNR) equation.


Sign in / Sign up

Export Citation Format

Share Document