SECURING DATA TRANSMISSION IN NETWORKS THROUGH DIGITAL IMAGE CRYPTOSYSTEM WITH ADAPTIVE STEGANOGRAPHY
SECURING DATA TRANSMISSION IN NETWORKS
THROUGH ADAPTIVE STEGANOGRAPHY TECHNIQUE. The problem of data hiding has been attacked from two directions. The first approach tries to overcome the Targeted Steganalytic Attacks The second approach aims at resisting Blind Steganalytic Attacks especially the Calibration based Blind Attacks which try to estimate a model of the cover image from the stego image . Comparison results show that the proposed algorithm can successfully resist the calibration based blind attacks and some non-calibration based attacks as well.
Why choice of topic and problem
The vast collection of computer networks has formed and act as a single huge network for transport of data and messages across distances which can be anywhere from the same office to anywhere in the world. By design, the Internet is an open network which facilitates the flow of information between computers. Technologies are available so the Internet may be used for secure electronic commerce transactions, but failure to review and address the inherent risk factors increases the likelihood of system or data compromise.
Network security consists of the policies adopted to
prevent and monitor authorized access, misuse, modification, or denial of a computer network and networkaccessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority 1. Purpose and Objective Purpose Secure data transfer in networks by ensuringBasic fundamentals of securirity Communicating parties can identify each other (authentication). Unintended parties cannot read information exchanged between parties (confidentiality). Unauthorized parties cannot alter data (integrity). Participating parties cannot repudiate transactions (accountability). Objective a) To produce security tool based on stenographic techniques. b) To explore techniques of hiding data using steganography
2. How you propose to solve the problem
Secure data transmission or information hiding system is to be developed to provide confidentiality security service through steganography. Steganography replaces unneeded bits in image and sound files with secret data. And it's
undetectable under traditional traffic-pattern analysis. The
important messages we can send in an image file as a carrier to hide a message and focuses on least significant bit as one of the steganography technique, it does not reveal the any difference in attributes like size, content etc. from that of the original file. It is difficult find for someone to find out that this image contains a message. Combine Cryptography and steganography to come up a datahiding technique If the hacker wants to extract the embedded message in image file he must and should the following algorithms: a) Algorithm to extract the message from the image (Stego_algorithm) b) Encryption algorithm, c) Correct password for algorithm d) Message process algorithm for check integrity of message. This is useful in a security and sensitive conditions to send message to the destination. With these increased levels of protection using encryption algorithm, making the proposed system for steganography is stronger from attacks. 3. Expected project outcome and their potential impacts A stenographic system that is able to conceal data making it secure to send sensitive data via the internet. This will help