scholarly journals Penerapan Metode Dynamic Cell Spreading (DCS) Untuk Menyembunyikan Teks Tersandi Pada Citra

2018 ◽  
Author(s):  
Taronisokhi Zebua

Security has two techniques namely cryptography and steganography. The combination of these two techniques can be used as one of the solutions to improve the security of data and confidential information, where cryptographic techniques used to encode messages and steganography techniques used to hide messages that have been encoded before. Steganography can be seen as a continuation of cryptography. If on cryptography, the ciphertext remains available, then with steganography the ciphertext can be hidden so that the third party does not know its existence. The hidden secret data can be re-extracted exactly as it was in the original state. The combination of cryptographic and steganographic techniques will be applied in designing a data security application that can be used to improve data or information security. Applications that are ready to be designed, will be able to be used to insert a secret message into the media container so that the secret message that has been sent will arrive at the recipient intact without any damage to the message or the container media. In practice, applications that have been designed must be owned by both parties. Both sender and recipient.

Generally, in cloud computing the data is outsourced to controls of third party, which may lead to issue of securitys. The data in cloud may lost because of attacks by unknown users and nodes inside the cloud .Therefore, the data within in the cloud must be kept in secured state by using different techniques .In this paper, we propose division and replication of data within in the cloud to improve optimal performance and security .In the present work we separate a file into multiple fragment sand replicate fragments on different nodes in the cloud. Each node, should store fragment only once. Therefore, no information can be get by the attacker. The node storing the fragments within the cloud are separated using a method called T-colouring, which avoids the attacker to find the location of nodes that contain related fragments. The traditional cryptographic techniques for data security are not used in this work, so that computationally expensive methodologies are reduced. The more advanced feature in this work is an automatic update of file fragments on nodes whenever any changes are done by the third person on that particular node.


2013 ◽  
Vol 2 (2) ◽  
pp. 134 ◽  
Author(s):  
Agilandeeswari Loganathan ◽  
Brindha Krishnamoorthy ◽  
Stiffy Sunny ◽  
Muralibabu Kumaravel

Communication in digital form has become the part of day todays lifestyle, in certain moment communication is made secret to avoid others from knowing the information. By providing security to the sensitive data it is ensured that the users data is protected from viewing and accessing by others. In the current discussion about data security, Steganographic algorithm using two mediums has been discussed that involves image based encryption and converting to word file. The stage involving image based encryption uses HMAC-MD5 algorithm along with LSB steganography. LSB technique scatters the secret data which have to be protected over the entire image. Convert the embedded image in word file, so that the secret message is made unavailable to others who try to obtain the file. This method provides greater payload capacity along with higher image fidelity and thus make the proposed system is more robust against attacks.


2019 ◽  
Vol 8 (4) ◽  
pp. 3369-3373

In present world data transfer using the internet is growing. It is very easy and fast way to transfer information like confidential documents, economic transactions, business applications and other covert information over internet. With the advent and growth of internet, people are more concerned about security of information. Data Security is important while data is transferred over internet because any illegal user can access important and private data also make it worthless. Research in data security area will help government agencies, military organization and private companies to securely transmit their confidential data over internet. From past few years various steganography techniques have been developed to hide secret message using various multimedia objects having large amount of redundant data to support steganography. In this paper introduction about steganography, related concepts and implementation of commonly used spatial domain techniques like LSB(Least Significant Bit Technique) with modulus, PVD(Pixel Value Difference) with LSB replacement and adaptive data hiding over edges with LSB are considered. It is observed(while visual, statistical analysis and experiments were carried out) with benchmark cover and stego objects that embedding same amount of secret data in each pixel leads to more visible distortions in a stego image because all pixels do not bear same amount of changes and this effect is more observed in smooth area then edges. Improving stego image imperceptibility and adjusting hiding capacity adaptively are major related research challenges about spatial domain techniques.


Author(s):  
Sangeet Mishra ◽  
Asis Kumar Tripathy ◽  
Pallavi Joshi

<p>Cloud data security is one of the major and crucial concern in everyday life. Now a days cloud computing is emerging as vast and fastest growing technology depending on the usage. Cloud computing does not allow to keep data at user site and thus a data security is concerned to be a major challenging task regarding data storage. This paper overall describes the monitoring of the cloud data concerning data storage. In this paper we proposed a new methodology that can efficiently managed the security to the data and provide privacy to the consumer using the services of the cloud. Our proposed technique provides data security by using the third party monitoring system which acts as an interface between the cloud consumer and cloud owner. Basically third party monitors the each and every activity of the cloud consumer and based upon his performance he respond to the cloud owner for taking decision. Our proposed concept provides the security from consumer point of view and owner side of view making the flexibility to the cloud infrastructure. Existing work focus mainly on security from owner side of view that not well fitted into the lifecycle of data security.</p>


A technique to hide undisclosed information from third party as well, the method of investigation to conceal secret data into the cover frame like text, audio, image and video without any change in substantial results to the carrier image is nothing but Steganography. The contemporary safe and taut steganography of image represents an exigent form of transformation of the inserted secrecy for the receiver with getting undetected [1-5]. In Image steganography, image is the carrier and any secret message (audio or text or image) can be transmitted. This algorithm of LSB can be executed in embedding territory where the secret audio data is inserted into the LSB of envelope image for creating the stego image. This paper gives the hiding of audio data as secret data in an image file using LSB with secret key and an improved inverted LSB image Steganography with improved mean square error and peak signal to noise ratio.


2006 ◽  
Vol 05 (03) ◽  
pp. C02
Author(s):  
Peter Green

If Europe is to become a knowledge–based economy1 knowledge must be freely available in Europe. The results of research across Europe can not be left inside laboratories and libraries. It has to available to the citizens, young people and commerce of Europe. And the main source of information for all these groups is the mass media, yet large parts of European research do not allocate sufficient importance to media relations.


Present days, huge amount of data stored with cloud service providers. The Third- party auditors (TPAs), with support of cryptography, are frequently utilized to prove this data. Auditing will be capability for cloud clients to prove the existence &functioning of their supplier's security measures. Authentication is done by using username and password. The important point in authentication is to protect data from the access of unauthorized people. The proposed scheme is Enhanced RSA (ERSA) Algorithm. This paper presents solution to enhance the security and privacy to stored data in cloud. Result demonstrates that this scheme can progress the security of data that stored in cloud


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Sign in / Sign up

Export Citation Format

Share Document