9 research outputs found

    Securing Data Using JPEG Image Over Mobile Phone

    Get PDF
    In recent past years, Internet and Mobile is widely used for communication. Multimedia messaging (MMS) and Short Service Messaging (SMS) are the popular services provided by the telecommunication companies. In MMS we can easily send picture with text message. In SMS we can send text only. These techniques make the communication so fast. As well as the communication became easy attention toward information security increased. Data Security is the main concern for research. Mostly used techniques for secure communication are Cryptography and Steganography. There are so many techniques for steganography and cryptography. Mostly used techniques are image steganography and there are so many algorithms for this. For the cryptography mainly AES techniques is being used. In this paper we are presenting a technique using cryptography and steganography for securing information over mobile in MMS. It is very common practice to hide data in LSB of pixel. Spatial and frequency domains are generally used for image processing. Spatial domain have so many computations comparatively frequency domain. There different transform techniques are used for transformation e.g. DCT, FFT and wavelets. Here we are using Discrete Cosine transform (DCT) for image steganography and tiny encryption algorithm for cryptography. Tiny encryption algorithm (TEA) is block cipher algorithm.It is simple and fast but best for mobile application

    Quantum Distribution of a Sudoku Key

    Get PDF

    A SURVEY PAPER ON SMS BASED STEGANOGRAPHY

    Get PDF
    ABSTRACT: After the advancement in mobile phone industry now mobile phones are available with huge variety of sensors, utility software, entertainment application and services like video conferencing and video call. Mobile phones has become ubiquitous and a general purpose device. SMS is one of the mostly used services in mobile phones throughout the world. Using this service, individuals can write and send to each other short messages and also binary pictures. On the one hand, information security is a critical issue in this digitalized world. For establishing hidden communications, a variety methods have been proposed for covert communications, among which steganography is a relatively new concept. As in mobile phones one can send text messages and binary picture messages both. In this paper, a survey work of all type of Steganographic techniques performed through mobile phone's SMS services esp. text steganography and image steganography and its future scope will be discussed. Most of these techniques are implemented on J2ME (Java 2 Micro Edition) platform

    Synthetic steganography: Methods for generating and detecting covert channels in generated media

    Get PDF
    Issues of privacy in communication are becoming increasingly important. For many people and businesses, the use of strong cryptographic protocols is sufficient to protect their communications. However, the overt use of strong cryptography may be prohibited or individual entities may be prohibited from communicating directly. In these cases, a secure alternative to the overt use of strong cryptography is required. One promising alternative is to hide the use of cryptography by transforming ciphertext into innocuous-seeming messages to be transmitted in the clear. ^ In this dissertation, we consider the problem of synthetic steganography: generating and detecting covert channels in generated media. We start by demonstrating how to generate synthetic time series data that not only mimic an authentic source of the data, but also hide data at any of several different locations in the reversible generation process. We then design a steganographic context-sensitive tiling system capable of hiding secret data in a variety of procedurally-generated multimedia objects. Next, we show how to securely hide data in the structure of a Huffman tree without affecting the length of the codes. Next, we present a method for hiding data in Sudoku puzzles, both in the solved board and the clue configuration. Finally, we present a general framework for exploiting steganographic capacity in structured interactions like online multiplayer games, network protocols, auctions, and negotiations. Recognizing that structured interactions represent a vast field of novel media for steganography, we also design and implement an open-source extensible software testbed for analyzing steganographic interactions and use it to measure the steganographic capacity of several classic games. ^ We analyze the steganographic capacity and security of each method that we present and show that existing steganalysis techniques cannot accurately detect the usage of the covert channels. We develop targeted steganalysis techniques which improve detection accuracy and then use the insights gained from those methods to improve the security of the steganographic systems. We find that secure synthetic steganography, and accurate steganalysis thereof, depends on having access to an accurate model of the cover media

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    WICC 2016 : XVIII Workshop de Investigadores en Ciencias de la Computaci贸n

    Get PDF
    Actas del XVIII Workshop de Investigadores en Ciencias de la Computaci贸n (WICC 2016), realizado en la Universidad Nacional de Entre R铆os, el 14 y 15 de abril de 2016.Red de Universidades con Carreras en Inform谩tica (RedUNCI
    corecore