scholarly journals Robust and Secured Image Steganography using Improved LSB and RC4 Cryptography with Preprocessing Operation

2019 ◽  
Vol 8 (2S9) ◽  
pp. 1049-1052

The security of the transmitted data over the internet has become one of the challenges sharing with data communication over computer network. In this paper, a new stegnography system is developed using Improved Least Significant Bit (ILSB) with preprocessing operation for concealing data. The system mixes several technological rules to enhance the performance of concealing scheme. The original secret image is divided into several segments then rearranged to even and odd. Rivest Cipher 4 (RC4) algorithm is applied on preprocessed image before concealing it on the cover image using ILSB. The proposed systems are simulated using MATLAB software package. The experimental results show that our suggested method successes of concealing data according to PSNR ratio, correlation and elapsed time. Preprocessing operation provides flexibility and robustness to the overall system. Improved LSB is simple and strong method for concealing images. Finally, the proposed system is very active to hide the gray scale image inside the color image

Author(s):  
Samir Bandyopadhyay ◽  
Payal Bose ◽  
Vishal Goyel

In today’s digital media data communication over the internet increasing day by day. Therefore the data security becomes the most important issue over the internet. With the increase of data transmission, the number of intruders also increases. That’s the reason it is needed to transmit the data over the internet very securely. Steganography is a popular method in this field. This method hides the secret data with a cover medium in a way so that the intruders cannot predict the existence of the data. Here a steganography method is proposed which uses a video file as a cover medium. This method has five main steps. First, convert the video file into video frames. Then a particular frame is selected for embedded the secret data. Second, the Least Significant Bit (LSB) Coding technique is used with the double key security technique. Third, an 8 characters password verification process. Fourth, reverse the encrypted video. Fifth, signature verification process to verify the encryption and decryption process. These five steps are followed by both the encrypting and decrypting processes.


2012 ◽  
Vol 532-533 ◽  
pp. 1100-1104
Author(s):  
Lan Li

The internet of things is a network designed for connecting things together, which is established on the basis of computer network, as well as by making use of the RFID, wireless data communication technology, etc. Among all these technologies, RFID plays a crucial role in the construction of the internet of things. So far, the RFID technology has been widely used in industry, commerce, intelligent transportation system, and many other fields.


2019 ◽  
Vol 17 (1) ◽  
pp. 73
Author(s):  
Albert Christie Giovani ◽  
Yustina Retno Wahyu Utami ◽  
Teguh Susyanto

The development of internet has become one of the most popular data communication media. The ease of use and complete facilities are the advantages possessed by the internet. However, along with the development of internet media and applications that use the Internet,  crime on information system increases as well. With various illegal information-gathering techniques developing, many are trying to access information that is not their right. There are several security techniques for sending messages confidentially and securedly, one of which is known as steganography. This study combined steganography and cryptography. The message was encrypted first using base64 then inserted using the LSB Crossed method. This method was aimed at making the process of extracting messages by unauthorized ones not easy. Embedding message into images was using the last binary number of the RGB value of an image by randomizing the placement of binary numbers by integrating base64 coding so that it combined base64 messages which next the text messages would be encrypted. The measurement results in the stego image using PSNR (Peak Signal to Noise Ratio) showed that the image quality after the insertion process was > 50 db


2020 ◽  
Vol 25 (2) ◽  
pp. 117-123
Author(s):  
Waseem Akhtar Mufti

AbstractApplications of the Internet of Things (IoT) are famously known for connecting devices via the internet. The main purpose of IoT systems (wireless or wired) is to connect devices together for data collection, buffering and data gateway. The collected large size of data is often captured from remote sources for automatic data analytics or for direct decision making by its users. This paper applies the programming pattern for Big Data in IoT systems that makes use of lightweight Java methods, introduced in the recently published work on ClientNet Distributed Cluster. Considering Big Data in IoT systems means the sensing of data from different resources, the network of IoT devices collaborating in data collection and processing; and the gateways servers where the resulting big data is supposed to be directed or further processed. This mainly involves resolving the issues of Big Data, i.e., the size and the network transfer speed along with many other issues of coordination and concurrency. The computer network that connects IoT may further include techniques such as Fog and Edge computing that resolve much of the network issues. This paper provides solutions to these problems that occur in wireless and wired systems. The talk is about the ClientNet programming model and its application in IoT systems for orchestration, such as coordination, data communication, device identification and synchronization between the gateway servers and devices. These devices include sensors attached with appliances (e.g., home automations, supply chain systems, light and heavy machines, vehicles, power grids etc.) or buildings, bridges and computers running data processing applications. As described in earlier papers, the introduced ClientNet techniques prevent from big data transfers and streaming that occupy more resources (hardware and bandwidth) and time. The idea is motivated by Big Data problems that make it difficult to collect it from different resources through small devices and then redirecting it. The proposed programming model of ClientNet Distributed Cluster stores Big Data on the nearest server coordinated by the nearest coordinator. The gateways and the systems that run analytics programs communicate by running programs from other computers when it is essentially required. This makes it possible to let Big Data rarely move across a communication network and allow only the source code to move around the network. The given programming model greatly simplifies data communication overheads, communication patterns among devices, networks and servers.


2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2020 ◽  
pp. 1-12
Author(s):  
Li Bo

In today’s society, graphic design, as a popular image processing technology, plays an increasingly important role in people’s lives. In the specific operation process of graphic design, It is no longer restricted to the traditional development mode, such as file format and other factors. With the development of computer network technology, people promote the development of graphic design by constructing color management system. At the same time, the construction of color management system can help people to change colors and define colors when they process image information and output pictures. In the process of printing pictures, in order to make the colors used in the design process clearly printed out and without color difference, there are still many problems to be considered. First, we need to consider the unexpected situation and the complexity of image processing. Based on the introduction of computer learning, this paper will discuss and study the development of graphic design by SVM theory.


Author(s):  
S. Gopikrishnan ◽  
P. Priakanth ◽  
Gautam Srivastava ◽  
Giancarlo Fortino

2021 ◽  
Author(s):  
Ali Durdu ◽  
Yılmaz Uyaroğlu

Abstract Many studies have been introduced in the literature showing that two identical chaotic systems can be synchronized with different initial conditions. Secure data communication applications have also been made using synchronization methods. In the study, synchronization times of two popular synchronization methods are compared, which is an important issue for communication. Among the synchronization methods, active control, integer, and fractional-order Pecaro Carroll (P-C) method was used to synchronize the Burke-Shaw chaotic attractor. The experimental results showed that the P-C method with optimum fractional-order is synchronized in 2.35 times shorter time than the active control method. This shows that the P-C method using fractional-order creates less delay in synchronization and is more convenient to use in secure communication applications.


Author(s):  
Bojan Ljuijić

Beside the fact that the Internet was not primarily educational network (it didn’t emerge from the intention to be systematically used in the field of education), shortly after it emerged, possibilities of its application in education were recognised. This paper is dedicated to analysis of the most important chronological moments (technological and social in the first place) that were crucial in sense of comprehensive application of the Internet in service of education in general, but also in service of adult education. Having all mentioned in focus, in more details, we analysed emergence and development of the Internet observed as educational computer network in frame of general development of information and communication technologies. While realising mentioned analysis, our focus was on four historical periods of educational computer technologies. We also intended to emphasize the activities of international institutions that followed, encouraged and supported the development of the Internet use and the use of other information and communication technologies in the field of education. According to that, we distinguished the main moments referring activities of these organisations which describe in the best manner their contributions to growing application of the Internet in education in general, but also in adult education.


Sign in / Sign up

Export Citation Format

Share Document