scholarly journals ECC Data Hide – Using Steganoraphy and Deep Neural Network

2021 ◽  
Vol 11 (2) ◽  
pp. 396-405
Author(s):  
Dr.V. Vennila ◽  
L.I. Poomani ◽  
S. Thaaranya

In the field of computer networks, cryptography and steganography are the well-known features for best security purpose. The main idea is to transmit the data securely. So, providing acceptable level of security is essential for data transmission. Also it should reduce the time complexity of the security algorithm. Here we have employed the “Elliptic Curve Cryptography” scheme to encrypt the data and image. A “Least Significant Bit” steganography algorithm is used to insert the encrypted data to be hidden inside the image in order to send the data securely. The encrypted data from the image is then decrypted by the decryption algorithm. Finally the hidden data is taken from the decrypted data. Then the image is compressed before sending through the internet. MATLAB is utilized to mimic outcomes which show that it has great inserting limit and security.

Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


2016 ◽  
Vol 4 (3) ◽  
pp. 470 ◽  
Author(s):  
Alim Muadzani ◽  
Oky Dwi Nurhayati ◽  
Ike Pertiwi Windasari

Information has now become an  important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to  hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI). Microsoft Visual Studio used as Integrated Development Environtment (IDE) to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into  image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements. 


Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


Author(s):  
Addepalli V. N. Krishna ◽  
Balamurugan M.

In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes.


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


2021 ◽  
Vol 1 (3) ◽  
pp. 58-60
Author(s):  
Katanakal Sarada ◽  
◽  
Dr. K. Nirmalamma ◽  
◽  

Mobile commerce is the buying and selling of goods and Services through wireless handled devices such as smart phones and tablets etc. Ecommerce Users to access M-commerce enables online shopping platforms without needing to use & a desktop computer. For example, purchase and sale of products. Online like banking and paying bills. (Virtual market place apps the Amazon mobile App, Android pay, Samsung pay etc...) The main idea behind M. commerce Is to enable various applications and services available on the internet to portable devices (mobiles, laptops, tables etc.) to overcome the constraints of a desktop computer. M commerce aims Serve all information and material needs of the people in a convenient and easy way.


2011 ◽  
Vol 121-126 ◽  
pp. 1259-1263
Author(s):  
Zhong Min Yao ◽  
Xi Guang Liu ◽  
Ya Zhen Wang

With the application scale and area of the building PV power station continuous extension, data transmission and monitoring management of the building PV power station have become increasingly important.This paper introduces a kind of data delivering and distributed monitoring management system of the building PV power station based on ZigBee wireless network,this system has information transmission modules based on ZigBee wireless network, region monitoring and magement module and remote access module. ZigBee wireless network could deliver datas of the building PV power station to the center of region monitoring and management system,ultimately,the datas were deposited in the database of region monitoring and management system,The Electricity Regulatory Office and The Power Company used remote transmission and monitoring system by remote access system on the Internet, to access data reports of the building PV power station in the database of region monitoring and magement system.System test results can carry out the building PV power station’s data transmission, monitoring system’s data management and remote access by the Internet.


Expansion of internet connectivity and its usage globally has increased various demands of providing security for the data transmission. Telemedicine is a modern way of medical care that can be extended to any remote place across the globe. This medical care practice is a result of the deployment of communication systems and information technology into healthcare system. With this technology the diagnosed data can be shared with physician and take his consultation remarks and also physicians can access to diagnostic archive and share for medical practice and learning. However, this exchange of information is confined with several risks of data theft when they are shared in open networks and hence they are to be protected with high security algorithms. This paper provides a high capacitive security algorithm for protecting the images with hidden confidential information. The approach provides a two-way security by encrypting the clinical information initially and embedding it imperceptibly in the concerned image so that the user on other can obtain both the visual and text data at same instance


Sign in / Sign up

Export Citation Format

Share Document