524 research outputs found

    Comparative Analysis Spread Spectrum and Parity Coding Steganography in E-commerce

    Get PDF
    The transaction data online has increased compared to the previous communications that mostly in the form of voice and text messaging. To improve the security, data must be protected such a way that it cannot be attacked by unauthorized parties. In this case, a good security system must be able to transmit the original information to the second party without having to know the existence and validity by a third party. One of the security systems that can be used is steganography. In this paper, we will compare the performance of Spread Spectrum and Parity Coding in e-commerce based on Android in case of processing time between insertion and retrieval information, and the changing image size during the insertion process. Our experimental results show that parity coding has better performance on client side that use low performance smart phone based on Android operating system and spread spectrum has better performance on blackberry store server that use laptop PC

    Review on DNA Cryptography

    Get PDF
    Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods. In the modern era of e-business and e-commerce the protection of confidentiality, integrity and availability (CIA triad) of stored information as well as of transmitted data is very crucial. DNA molecules, having the capacity to store, process and transmit information, inspires the idea of DNA cryptography. This combination of the chemical characteristics of biological DNA sequences and classical cryptography ensures the non-vulnerable transmission of data. In this paper we have reviewed the present state of art of DNA cryptography.Comment: 31 pages, 12 figures, 6 table

    An Efficient Video Steganography Algorithm Based on BCH Codes

    Get PDF
    © ASEE 2015In this paper, in order to improve the security and efficiency of the steganography algorithm, we propose an efficient video steganography algorithm based on the binary BCH codes. First the pixels’ positions of the video frames’ components are randomly permuted by using a private key. Moreover, the bits’ positions of the secret message are also permuted using the same private key. Then, the secret message is encoded by applying BCH codes (n, k, t), and XORed with random numbers before the embedding process in order to protect the message from being read. The selected embedding area in each Y, U, and V frame components is randomly chosen, and will differ from frame to frame. The embedding process is achieved by hiding each of the encoded blocks into the 3-2-2 least significant bit (LSB) of the selected YUV pixels. Experimental results have demonstrated that the proposed algorithm have a high embedding efficiency, high embedding payload, and resistant against hackers

    A review on structured scheme representation on data security application

    Get PDF
    With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application

    A DWT-BCH code based Video Steganography by employing Variable bit length Algorithm

    Full text link
    Due to the high speed of Internet we can easily transfer video data over the Internet, but people are worried about their data being hacked by unauthorized users. Inside the host medium (text, audio, image and video) we can embed the secret message in Steganography. Video Steganography is a significant method for data hiding. In this work, a variable bit length Video Steganography algorithm is proposed. To immune the secret data, it is first encoded using BCH codes, where the message bits of length k will be converted to a codeword of length n. Depending on the wavelet coefficient values of DWT(Discrete wavelet transform), secret data are embedded into the middle and high frequencies. The results demonstrate better results than in [1]

    Enhanced Password Processing Scheme Using Visual Cryptography And Steganography

    Get PDF
    With the rise in internet users, the need for security has increased as well. The first step in securing digital information is through the use of passwords. These text bases passwords are then converted to hash values. However, they are susceptible to attacks like man in the middle attacks and other hacks. Information leaks proves fatal in such scenarios. To combat these issues, we have proposed a new system that has lower computational requirements and utilizes visual cryptography and text steganography. We have also proposed using visual cryptography with utilizes meaningful shares to hide the intent of the images.User’s secret information is used to form an image which is divided and shared over multiples parties.This results in no single party having complete information.The benefit of this is that a hack at any one user won’t compromise user’s information. With the number of online users now in billions,this system has a huge scope and will prove important for information security when privacy and security are of paramount importance

    A Highly Secure Video Steganography using Hamming Code (7, 4)

    Get PDF
    Due to the high speed of internet and advances in technology, people are becoming more worried about information being hacked by attackers. Recently, many algorithms of steganography and data hiding have been proposed. Steganography is a process of embedding the secret information inside the host medium (text, audio, image and video). Concurrently, many of the powerful steganographic analysis software programs have been provided to unauthorized users to retrieve the valuable secret information that was embedded in the carrier files. Some steganography algorithms can be easily detected by steganalytical detectors because of the lack of security and embedding efficiency. In this paper, we propose a secure video steganography algorithm based on the principle of linear block code. Nine uncompressed video sequences are used as cover data and a binary image logo as a secret message. The pixels’ positions of both cover videos and a secret message are randomly reordered by using a private key to improve the system’s security. Then the secret message is encoded by applying Hamming code (7, 4) before the embedding process to make the message even more secure. The result of the encoded message will be added to random generated values by using XOR function. After these steps that make the message secure enough, it will be ready to be embedded into the cover video frames. In addition, the embedding area in each frame is randomly selected and it will be different from other frames to improve the steganography scheme’s robustness. Furthermore, the algorithm has high embedding efficiency as demonstrated by the experimental results that we have obtained. Regarding the system’s quality, the Pick Signal to Noise Ratio (PSNR) of stego videos are above 51 dB, which is close to the original video quality. The embedding payload is also acceptable, where in each video frame we can embed 16 Kbits and it can go up to 90 Kbits without noticeable degrading of the stego video’s quality
    • …
    corecore