Professional Documents
Culture Documents
Key Words: SCD,LSB,CaGP,AWT. Globalization has led to the rapid growth of the
Internet through which consumers can send and
1.Introduction receive large amounts of data (e.g., text, audio, video,
Steganographic techniques have been used for and images). In modern communication systems,
ages and they date back to ancient Greece. The aim of securing data is of utmost importance. Yet sending and
steganographic communication back then and now, in receiving secret files over the Internet is still insecure,
modern applications, is the same: to hide secret data (a and therefore hiding data in an effective way protects
steganogram) in an innocently looking cover and send this secret information. Data is important to any
it to the proper recipient who is aware of the organization. They must be protected from the
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1991
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
unauthorized access. Data should only visible to the present in the multimedia data even after various
sender and receiver of transmitted data, and they signal processing or transmission distortions.
should be hidden from hackers. Hiding data is nothing The image hiding method, combine the cryptography
more than protecting the data in some medium or and information hiding. On the one hand, by using
encrypting the data. There are many techniques that information hiding does not change the visual
use the concept of hiding data; cryptography and characteristic of cover image, On the other hand, by
Steganography are among them. using digital signature and encryption technology of
The problem statement of our project is cryptography, we can make the unauthorized users can
"Confidential log in to real user using Visual not know the location of the embedded secret
Cryptography and upload encrypted data on Database information, so that the secret information cannot be
System using Steganography". extracted. The domain of biometrics authentication
The main focus of this project is to develop a over error-prone networks has been examined. Since
Confidential Login by real user using Visual Steganography by itself does not ensure secrecy, it was
Cryptography and create encrypted data on Database combined with a chaotic encryption system. The
System using Steganography. proposed procedure, except of providing results that
are imperceptible to the human visual system, it also
To design an improved Login system using outputs a stegno object that can resist different signal
Visual Cryptography to keep data secure. distortions, and steganalytic attacks.
To design an application that enable the hiding
of valuable data in multimedia file by means of 3.Methodology
Steganography.
To test the the improved Login system and the 3.1 Visual cryptography:
application used for Steganography.
Visual Cryptography is a cryptographic technique that
1.2 Purpose allows for the encryption of visual information such
that decryption can be performed using the human
The aim of the project is to build more secure system visual system .We can achieve this by one of the
than previous classical security system. following access structure schemes.
(2,2) Threshold VCS - This is a simplest
threshold scheme that takes a secret message and
2. Literature Survey encrypts it in two different shares that reveal the secret
image when they are overlaid. No additional
Main limitation in todays online confidential data information is required to create this kind of access
accessing system is there may be possibility that this structure. In the case of (2, 2) VCS, each pixel P in the
data may be attacked by phishing websites therefore original image is encrypted into two sub pixels called
there comes need to identify whether website is shares. Fig denotes the shares of a white pixel and a
phishing or not. Today, most applications are only as black pixel. The choice of shares for a white and black
secure as their underlying system. Since the design and pixel is randomly determined (there are two choices
technology of middleware has improved steadily, their available for each pixel). Neither shares provide any
detection is a difficult problem. As a result, it is nearly clue about the original pixel since different pixels in the
impossible to be sure whether a computer that is secret image will be encrypted using independent
connected to the internet can be considered random choices. When the two shares are
trustworthy and secure or not. Phishing scams are also superimposed, the value of the original pixel P can be
becoming a problem for online banking and e- determined. If P is a black pixel, we get two black sub
commerce users. pixels; if it is a white pixel, we get one black sub pixel
Existing video watermarking tools uses visible and one white subpixel.
watermark. The main disadvantage of visible
watermarking is that it destroys the video quality and
watermark can be easily removed from video. In
contrast, invisible watermarking is imperceptible to
those viewing the video and the watermark is still
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1992
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1993
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1994
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
ACKNOWLEDGEMENT
REFERENCES
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1996