- Version
- Download 52
- File Size 595.24 KB
- File Count 1
- Create Date 04/05/2023
- Last Updated 04/05/2023
THE ART OF SECRET COMMUNICATION AND PROTECTION
Devika Rani Roy, Kris D’Souza, Aaradhya Desai, Dhananjay Khedkar
Department of Information Technology
K.C. College of Engineering and Management Studies and Research
Thane, India
-----------------------------------------------------------***------------------------------------------------------------
Abstract: Nowadays security is a big concern when it comes to cyber space. There are multiple applications that provide security to an infrastructure and to a network yet they still somehow have loopholes through which hackers exploit the system. This happens on a large scale and also on small scale infrastructures.
Our project tries to add an extra layer of security that all kinds of infrastructures and networks can implement. It works by helping encrypt the data before being shared and hence adding a new layer to the already existing security systems. This system when combined with the already existing HTTPS protocol can help project confidentiality and authenticity and tries to minimize the risk of information leakage in an already compromised network. At the same time this system is easy to implement and is cost effective. It is very easy to learn so new employees and even employees with non-IT backgrounds can learn it within a few minutes. It is accessable and very user friendly.
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. Securely exchanging the data over the internet network is a very important issue. So, in order to transfer the data securely to the destination, there are many approaches like cryptography and steganography. In this project we propose a LSB & DCT-based steganographic method for hiding the data by applying Least Significant Bit (LSB) algorithm for embedding the data into the images which is implemented through the Microsoft .NET framework using the C#.NET.
Securing data encryption and decryption using Cryptography and Steganography techniques. Due to recent developments in stego analysis, providing security to personal contents, messages, or digital images using steganography has become difficult. By using stego analysis, one can easily reveal the existence of hidden information in carrier files. This project introduces a novel steganographic approach for communication between two private parties. The approach introduced in this project makes use of both steganographic as well as cryptographic techniques. In Cryptography we are using RSA. In Steganography we are using Image Steganography for hiding the data. And we also use the Mutual Authentication process to satisfy all services in Cryptography i.e., Access Control, Confidentiality, Integrity, Authentication. In this way we can maintain the data more securely. Since we use the RSA algorithm for securing the data and again on this we perform Steganography to hide the data in an image. Such that any other person in the network cannot access the data present in the network. Only the sender and receiver can retrieve the message from the data.
Keywords: Steganography, Encryption, Decryption, Password Strength, Breach detection.