SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1991
Confidential log-in to real user using Visual Cryptography
and upload encrypted data on Database System using
Steganography
Shah Shrenik1, Shetyanavar Shubham2,Waghmare Manoj3,Gandhi Saurabh4
Department of Computer Engineering
AISSMS College of Engineering
Shivajinagar, Pune 01
Guide: Professor A.S. Deokar
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data is an importantassetforanyindividual
or organization and must be protectedfromintrudersor
hackers. The need to hide data from hackers has existed
since ancient times, and nowadays, there are
developments in digital media, such as audio, video,
images, and so on. Tosecuresecretinformation,different
media methods are used and steganography is one. This
project presents video steganography with digital
watermarking algorithmsas an efficientandrobustway
for protection. This paper is a combination of
Cryptography, Steganography and watermarking
algorithms which provides a strong backbone for its
security and hiding data in different multimedia files.
This proposed system not only hides data but also limits
the perceivable distortion that might occur while
processing it.
Database security is provided by using image
CAPTCHA created using Visual Cryptographyalgorithm.
The data is store in database using steganography and
watermarking algorithms behind the multimedia files.
The proposed System provides the Confidential Login to
user using Visual Cryptography and upload encrypted
data, Data System using base Steganography. It has the
objective to hide data in video and provide security to
the same. Our methodology is based on Image CAPTCHA
validation scheme using visual cryptography. Visual
Cryptography is use to preserve the privacy of image
CAPTCHA.
Key Words: SCD,LSB,CaGP,AWT.
1.Introduction
Steganographic techniques have been used for
ages and they date back to ancient Greece. The aim of
steganographic communication back then and now, in
modern applications, is the same: to hidesecretdata(a
steganogram) in an innocently looking cover and send
it to the proper recipient who is aware of the
information hiding procedure. In anidealsituation,the
existence of hiddencommunicationcannotbedetected
by third parties.
What distinguishes historical steganographic
methods from the modernonesis,infact,onlytheform
of the cover (carrier) for secret data. Historical
methods relied on physical Steganography the
employed media were: human skin, game, etc. Further
advances in hiding communication based on the use of
more complex covers, e.g. with the aid of ordinary
objects, whose orientationwas assignedmeaning.This
is how semagrams were introduced. The
popularization of the written word and the increasing
literacy among people had brought about methods
which utilized text as carrier. The World Wars had
accelerated the development of Steganography by
introducing a new carrier the electromagnetic waves.
Presently, the most popular carriers include digital
images, audio and video files and communication
protocols. Thelattermayapplytonetworkprotocolsas
well as any other communication protocol (e.g.
cryptographic).
Thewaythatpeoplecommunicateevolvedover
ages and so did steganographic methods. At the same
time, the general principles remained unchanged.
1.2 Problem Statement
Globalization has led to the rapid growth of the
Internet through which consumers can send and
receive large amounts of data (e.g., text, audio, video,
and images). In modern communication systems,
securing data is of utmost importance. Yet sendingand
receiving secret files over the Internet is still insecure,
and therefore hiding data in an effective way protects
this secret information. Data is important to any
organization. They must be protected from the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1992
unauthorized access. Data should only visible to the
sender and receiver of transmitted data, and they
should be hidden from hackers. Hiding data is nothing
more than protecting the data in some medium or
encrypting the data. There are many techniques that
use the concept of hiding data; cryptography and
Steganography are among them.
The problem statement of our project is
"Confidential log in to real user using Visual
Cryptography and upload encrypted data on Database
System using Steganography".
The main focus of this project is to develop a
Confidential Login by real user using Visual
Cryptography and create encrypted data on Database
System using Steganography.
 To design an improved Login system using
Visual Cryptography to keep data secure.
 To design an application that enable the hiding
of valuable data in multimedia file by means of
Steganography.
 To test the the improved Login system and the
application used for Steganography.
1.2 Purpose
The aim of the project is to build more secure system
than previous classical security system.
2. Literature Survey
Main limitation in today’s online confidential data
accessing system is there may be possibility that this
data may be attacked by phishing websites therefore
there comes need to identify whether website is
phishing or not. Today, most applications are only as
secure as their underlyingsystem.Sincethedesignand
technology of middleware has improvedsteadily,their
detection is a difficult problem. As a result, it is nearly
impossible to be sure whether a computer that is
connected to the internet can be considered
trustworthy and secure or not. Phishingscamsarealso
becoming a problem for online banking and e-
commerce users.
Existing video watermarking tools uses visible
watermark. The main disadvantage of visible
watermarking is that it destroys the video quality and
watermark can be easily removed from video. In
contrast, invisible watermarking is imperceptible to
those viewing the video and the watermark is still
present in the multimedia data even after various
signal processing or transmission distortions.
The image hiding method, combine the cryptography
and information hiding. On the one hand, by using
information hiding does not change the visual
characteristic of cover image, On the other hand, by
using digital signature and encryption technology of
cryptography,wecanmaketheunauthorizeduserscan
not know the location of the embedded secret
information, so that the secret information cannot be
extracted. The domain of biometrics authentication
over error-prone networks has been examined. Since
Steganography by itself does not ensuresecrecy,itwas
combined with a chaotic encryption system. The
proposed procedure, except of providing results that
are imperceptible to the human visual system, it also
outputs a stegno object that can resist different signal
distortions, and steganalytic attacks.
3.Methodology
3.1 Visual cryptography:
Visual Cryptography is a cryptographic technique that
allows for the encryption of visual information such
that decryption can be performed using the human
visual system .We can achieve this by one of the
following access structure schemes.
(2,2) Threshold VCS - This is a simplest
threshold scheme that takes a secret message and
encrypts it in twodifferentsharesthatrevealthesecret
image when they are overlaid. No additional
information is required to create this kind of access
structure. In the case of (2, 2) VCS, each pixel P in the
original image is encrypted into two sub pixels called
shares. Fig denotes the shares of a white pixel and a
black pixel. The choice of shares for a white and black
pixel is randomly determined (there are two choices
available for each pixel). Neither shares provide any
clue about the original pixelsincedifferentpixelsinthe
secret image will be encrypted using independent
random choices. When the two shares are
superimposed, the value of the original pixel P can be
determined. If P is a black pixel, we get two black sub
pixels; if it is a white pixel, we get one black sub pixel
and one white subpixel.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1993
3.2 Steganography:
To perform Steganography, we areusingSceneChange
Detection Algorithm, Split Algorithm and Least
Significant Bit Algorithm .
The file in which the data is to be hide is broken
into frames and changes are detected which is
done by using Scene change detection . Now the
data which need to be hide is broken into the
chunk by Split algorithm . After this the process
of hiding the data starts with the least significant
bit.
3.2.1 Split algorithm
Input - Watermark image
Output - Watermark image broken into chunks
Steps:-
1. Take watermark as input.
2. Decide number of rows and columns to
split the watermark.
3. No. of watermark parts=rows*cols
4. Chunkwidth= imagewidth/cols
5. Chunkheight= imageheight/rows
6. For i=0 to rows do
7. for j=0 to cols do
8. imgs[Count]=new
BufferedImage(chunkwidth, chunkheight,
image.getType());
9. Count ++;
10. End for.
11. End for.
Time Complexity - O(n*m)
3.2.2 Scene change detection
Input - Video frames and chunks of watermark
Output - Encryption of watermark into frames
Steps –
1. A few least significant bits are substituted
within data to be hidden.
2. The pixels are arranged in a manner of
placing the hidden bits before the pixel of
each cover image to minimize the errors.
3. Let n LSBs be substituted in each pixel.
4. Let d= decimal value of the pixel after the
substitution.
d1 = decimal value of last n bits of the pixel.
d2 = decimal value of n bits hidden in that
pixel
5. If (d1∼ d 2) ≤ (2n )/2
then no adjustment is made in that pixel. Else
6. If(d1 <d2)
d = d - 2n. If(d1 >d2) d = d + 2n.
6. This d is converted to binary and written
back to pixel
Time Complexity - O(n)
4. Proposed System
For phishing detection and prevention, we are
proposing a new methodology to detect the phishing
website. Our methodology is based on the Anti-
Phishing Image Captchavalidationschemeusingvisual
cryptography. It prevents password and other
confidential information from the phishing websites.
We also propose the idea of embedding different parts
of a single watermark into different scenes of a video.
We then analyze the strengths of different
watermarking schemes, and apply a hybrid approach
to form a super watermarking scheme that can resist
most of the attacks. For implementing Watermarking
Technique, we are using SCD, LSB, Split algorithms.
The overall system design consists of following
modules:
a. Registration phase,
b. Login phase,
c. Steganography Phase.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1994
(a) Registration phase
To work with this application first user needs to Sign
up. In Sign-up user needs to choose the Username and
password along with this user need to enter email id
and along with that to generate the CaGP user need to
enter a special key which contains the string made of
A-Z, a-z,0-9 combinations.
At server side the key is generated by adding a random
key which is made from combinations of A-Z, a-z,0-9
and then the key is generated in the form of CAPTCHA
by using Visual cryptography. The generated CaGP is
then mail to user for further process.
(b) Login phase
When the user logs in by entering his confidential
information for using his account, then first the user is
asked to enter his username (user id) and Password.
Then the user is asked to enter his CaGP which is kept
with him.
Now the entered CaGP is verified at server site, then
user gets access to the application.
(c) Steganography Phase
Now user needs to upload the data that he wants to
hide, along with he needs to upload a file in which he
wants to hide the data. After uploading the data, the
actual process starts. Following phase shows the exact
flow. The effectiveness of this scheme is verified
through a series of experiments.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1995
Firstly, the file in which the data is to be hide is broken
into frames. This is done by using SCENE CHANGE
DETECTION ALGORITHM. Now thedatawhich needto
be hide is broken intothechunkbySPLIT ALGORITHM.
After this the process of hiding the data starts with the
Least Significant Bit(LSB).
5. Results & Discussions
Application willbeabletosuccessfullyencryptthedata
into the file with the help of data provided by user. The
data generated is not easy to detect normal human’s
eyes and it provide security from intruders and
hackers. Because of the modified Login system and
with the help of Scene Change Detection(SCD), the
system will be more secure than previous one and the
valuable data of user will not be compromised.
6. Conclusion
The application that we have built has a more secure
Login system and data is protected from intruders and
hackers. The data that user want to keep safe, secure
and preserve is done by hiding it in in another file
without destroying the file used to hide. The safety
measures, legal are all maintain without exploiting the
rules.
Thus, on the basis of literature survey and by
analyzing the existing system, we have come to a
conclusion that the proposed system will not only
provide the secured Login to system but also it will
help to keeps its data safe.
ACKNOWLEDGEMENT
We would like to thank the publishers,
researchers and Ms. A.S Deokar for their guidance. We
would also thank the college authority for providing
the required infrastructure and support. Last but not
the least we would like to extend a heartfelt gratitude
to friends and family members for their support.
REFERENCES
[1] CAPTCHA as Graphical Passwords A New Security
Primitive Based on Hard AI ProblemsBinB.Zhu,Je.
Yan, Guanbo Bao, Maowei Yang, and Ning Xu
[2] An Improved Method for LSB Based Color Image
Steganography Combined with Cryptography 1Xinyi
Zhou, 2Wei Gong, 3WenLong Fu, 4Lian-Jing Jin
1,2,4Information Engineering School, Communication
University of China, CUC 1,3Neuroscience and
Intelligent Media Institute, Communication University
of China Beijng, China xinyi
[3] Remote Authentication via Biometrics: A Robust
Video-ObjectSteganographicMechanismOverWireless
Networks KLIMIS NTALIANIS1, (Member, IEEE), AND
NICOLAS TSAPATSOULIS2, (Member, IEEE)
1Department of Marketing, Athens University of
Applied Sciences, Athens, Greece 2Department of
Communication and Internet Studies, Cyprus
University of Technology, Limassol CY-3036, Cyprus
CORRESPONDING AUTHOR: N. TSAPATSOULIS
[4] A NOVEL ANTI PHISHINGFRAMEWORKBASEDON
VISUALCRYPTOGRAPHYMounikaReddy.M1,Madhura
Vani.B2 Student, Department of CSE, MLRIT,
Hyderabad, India 1 Asst.Professor, Department ofCSE,
MLRIT, Hyderabad, India
[5] A Compressive Sensing based Secure Watermark
Detection and Privacy Preserving Storage Framework
Qia Wang, Wenjun Zeng, Fellow, IEEE, and Jun Tian,
Member, IEEE
[6] Security Enhancement in Image Steganography a
MATLAB Approach M. Kameswara Rao, K. Pradeep
Reddy and K. Eepsita Saranya Middle-East Journal of
Scientific Research 23 (2): 357-361, 2015 ISSN 1990-
9233IDOSI Publications,2015
DOI:10.5829/idosi.mejsr.2015.23.02.22127 Security
Enhancement in Image Steganography a MATLAB
Approach M.Kameswara Rao, K. Pradeep Reddy and K.
Eepsita Saranya Middle-East Journal of Scientific
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1996
Research 23 (2): 357-361, 2015 ISSN 1990-9233IDOSI
Publications, 2015
DOI:10.5829/idosi.mejsr.2015.23.02.221
[7] LSB Based Audio Steganography Using Pattern
Matching Mr. Ratul Choudhary and Prof. Samir Kumar
Bandyopadhyay Journal of Multidisciplinary
Engineering Science and Technology (JMEST) ISSN:
3159-0040Vol. 2 Issue 11, November 2011

More Related Content

What's hot

Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographyMaizatul Auni Bt Mazhar
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...ijtsrd
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
Literature review on cryptography
Literature review on cryptographyLiterature review on cryptography
Literature review on cryptographyTowsif Salauddin
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
 
Secure Data Encryption and Authentication using Visual Cryptography in the TS...
Secure Data Encryption and Authentication using Visual Cryptography in the TS...Secure Data Encryption and Authentication using Visual Cryptography in the TS...
Secure Data Encryption and Authentication using Visual Cryptography in the TS...AM Publications,India
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 

What's hot (19)

Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Secure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptographySecure video transmission using steganography and cryptography
Secure video transmission using steganography and cryptography
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
Literature review on cryptography
Literature review on cryptographyLiterature review on cryptography
Literature review on cryptography
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
Secure Data Encryption and Authentication using Visual Cryptography in the TS...
Secure Data Encryption and Authentication using Visual Cryptography in the TS...Secure Data Encryption and Authentication using Visual Cryptography in the TS...
Secure Data Encryption and Authentication using Visual Cryptography in the TS...
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 

Similar to Confidential Log-In To Real User using Visual Cryptography and Upload Encrypted Data on Database System using Steganography

Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video SteganographyIRJET Journal
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd Iaetsd
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
Steganography_ProjectReport.doc
Steganography_ProjectReport.docSteganography_ProjectReport.doc
Steganography_ProjectReport.docssusere02009
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET Journal
 

Similar to Confidential Log-In To Real User using Visual Cryptography and Upload Encrypted Data on Database System using Steganography (20)

Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
IRJET- Image Privacy Protection as a Single Share
IRJET-  	  Image Privacy Protection as a Single ShareIRJET-  	  Image Privacy Protection as a Single Share
IRJET- Image Privacy Protection as a Single Share
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
A detailed review on Video Steganography
A detailed review on Video SteganographyA detailed review on Video Steganography
A detailed review on Video Steganography
 
R04405103106
R04405103106R04405103106
R04405103106
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Steganography_ProjectReport.doc
Steganography_ProjectReport.docSteganography_ProjectReport.doc
Steganography_ProjectReport.doc
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
IRJET- A Review on Colour Image Watermarking based on Wavelet and QR Decompos...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Confidential Log-In To Real User using Visual Cryptography and Upload Encrypted Data on Database System using Steganography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1991 Confidential log-in to real user using Visual Cryptography and upload encrypted data on Database System using Steganography Shah Shrenik1, Shetyanavar Shubham2,Waghmare Manoj3,Gandhi Saurabh4 Department of Computer Engineering AISSMS College of Engineering Shivajinagar, Pune 01 Guide: Professor A.S. Deokar ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data is an importantassetforanyindividual or organization and must be protectedfromintrudersor hackers. The need to hide data from hackers has existed since ancient times, and nowadays, there are developments in digital media, such as audio, video, images, and so on. Tosecuresecretinformation,different media methods are used and steganography is one. This project presents video steganography with digital watermarking algorithmsas an efficientandrobustway for protection. This paper is a combination of Cryptography, Steganography and watermarking algorithms which provides a strong backbone for its security and hiding data in different multimedia files. This proposed system not only hides data but also limits the perceivable distortion that might occur while processing it. Database security is provided by using image CAPTCHA created using Visual Cryptographyalgorithm. The data is store in database using steganography and watermarking algorithms behind the multimedia files. The proposed System provides the Confidential Login to user using Visual Cryptography and upload encrypted data, Data System using base Steganography. It has the objective to hide data in video and provide security to the same. Our methodology is based on Image CAPTCHA validation scheme using visual cryptography. Visual Cryptography is use to preserve the privacy of image CAPTCHA. Key Words: SCD,LSB,CaGP,AWT. 1.Introduction Steganographic techniques have been used for ages and they date back to ancient Greece. The aim of steganographic communication back then and now, in modern applications, is the same: to hidesecretdata(a steganogram) in an innocently looking cover and send it to the proper recipient who is aware of the information hiding procedure. In anidealsituation,the existence of hiddencommunicationcannotbedetected by third parties. What distinguishes historical steganographic methods from the modernonesis,infact,onlytheform of the cover (carrier) for secret data. Historical methods relied on physical Steganography the employed media were: human skin, game, etc. Further advances in hiding communication based on the use of more complex covers, e.g. with the aid of ordinary objects, whose orientationwas assignedmeaning.This is how semagrams were introduced. The popularization of the written word and the increasing literacy among people had brought about methods which utilized text as carrier. The World Wars had accelerated the development of Steganography by introducing a new carrier the electromagnetic waves. Presently, the most popular carriers include digital images, audio and video files and communication protocols. Thelattermayapplytonetworkprotocolsas well as any other communication protocol (e.g. cryptographic). Thewaythatpeoplecommunicateevolvedover ages and so did steganographic methods. At the same time, the general principles remained unchanged. 1.2 Problem Statement Globalization has led to the rapid growth of the Internet through which consumers can send and receive large amounts of data (e.g., text, audio, video, and images). In modern communication systems, securing data is of utmost importance. Yet sendingand receiving secret files over the Internet is still insecure, and therefore hiding data in an effective way protects this secret information. Data is important to any organization. They must be protected from the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1992 unauthorized access. Data should only visible to the sender and receiver of transmitted data, and they should be hidden from hackers. Hiding data is nothing more than protecting the data in some medium or encrypting the data. There are many techniques that use the concept of hiding data; cryptography and Steganography are among them. The problem statement of our project is "Confidential log in to real user using Visual Cryptography and upload encrypted data on Database System using Steganography". The main focus of this project is to develop a Confidential Login by real user using Visual Cryptography and create encrypted data on Database System using Steganography.  To design an improved Login system using Visual Cryptography to keep data secure.  To design an application that enable the hiding of valuable data in multimedia file by means of Steganography.  To test the the improved Login system and the application used for Steganography. 1.2 Purpose The aim of the project is to build more secure system than previous classical security system. 2. Literature Survey Main limitation in today’s online confidential data accessing system is there may be possibility that this data may be attacked by phishing websites therefore there comes need to identify whether website is phishing or not. Today, most applications are only as secure as their underlyingsystem.Sincethedesignand technology of middleware has improvedsteadily,their detection is a difficult problem. As a result, it is nearly impossible to be sure whether a computer that is connected to the internet can be considered trustworthy and secure or not. Phishingscamsarealso becoming a problem for online banking and e- commerce users. Existing video watermarking tools uses visible watermark. The main disadvantage of visible watermarking is that it destroys the video quality and watermark can be easily removed from video. In contrast, invisible watermarking is imperceptible to those viewing the video and the watermark is still present in the multimedia data even after various signal processing or transmission distortions. The image hiding method, combine the cryptography and information hiding. On the one hand, by using information hiding does not change the visual characteristic of cover image, On the other hand, by using digital signature and encryption technology of cryptography,wecanmaketheunauthorizeduserscan not know the location of the embedded secret information, so that the secret information cannot be extracted. The domain of biometrics authentication over error-prone networks has been examined. Since Steganography by itself does not ensuresecrecy,itwas combined with a chaotic encryption system. The proposed procedure, except of providing results that are imperceptible to the human visual system, it also outputs a stegno object that can resist different signal distortions, and steganalytic attacks. 3.Methodology 3.1 Visual cryptography: Visual Cryptography is a cryptographic technique that allows for the encryption of visual information such that decryption can be performed using the human visual system .We can achieve this by one of the following access structure schemes. (2,2) Threshold VCS - This is a simplest threshold scheme that takes a secret message and encrypts it in twodifferentsharesthatrevealthesecret image when they are overlaid. No additional information is required to create this kind of access structure. In the case of (2, 2) VCS, each pixel P in the original image is encrypted into two sub pixels called shares. Fig denotes the shares of a white pixel and a black pixel. The choice of shares for a white and black pixel is randomly determined (there are two choices available for each pixel). Neither shares provide any clue about the original pixelsincedifferentpixelsinthe secret image will be encrypted using independent random choices. When the two shares are superimposed, the value of the original pixel P can be determined. If P is a black pixel, we get two black sub pixels; if it is a white pixel, we get one black sub pixel and one white subpixel.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1993 3.2 Steganography: To perform Steganography, we areusingSceneChange Detection Algorithm, Split Algorithm and Least Significant Bit Algorithm . The file in which the data is to be hide is broken into frames and changes are detected which is done by using Scene change detection . Now the data which need to be hide is broken into the chunk by Split algorithm . After this the process of hiding the data starts with the least significant bit. 3.2.1 Split algorithm Input - Watermark image Output - Watermark image broken into chunks Steps:- 1. Take watermark as input. 2. Decide number of rows and columns to split the watermark. 3. No. of watermark parts=rows*cols 4. Chunkwidth= imagewidth/cols 5. Chunkheight= imageheight/rows 6. For i=0 to rows do 7. for j=0 to cols do 8. imgs[Count]=new BufferedImage(chunkwidth, chunkheight, image.getType()); 9. Count ++; 10. End for. 11. End for. Time Complexity - O(n*m) 3.2.2 Scene change detection Input - Video frames and chunks of watermark Output - Encryption of watermark into frames Steps – 1. A few least significant bits are substituted within data to be hidden. 2. The pixels are arranged in a manner of placing the hidden bits before the pixel of each cover image to minimize the errors. 3. Let n LSBs be substituted in each pixel. 4. Let d= decimal value of the pixel after the substitution. d1 = decimal value of last n bits of the pixel. d2 = decimal value of n bits hidden in that pixel 5. If (d1∼ d 2) ≤ (2n )/2 then no adjustment is made in that pixel. Else 6. If(d1 <d2) d = d - 2n. If(d1 >d2) d = d + 2n. 6. This d is converted to binary and written back to pixel Time Complexity - O(n) 4. Proposed System For phishing detection and prevention, we are proposing a new methodology to detect the phishing website. Our methodology is based on the Anti- Phishing Image Captchavalidationschemeusingvisual cryptography. It prevents password and other confidential information from the phishing websites. We also propose the idea of embedding different parts of a single watermark into different scenes of a video. We then analyze the strengths of different watermarking schemes, and apply a hybrid approach to form a super watermarking scheme that can resist most of the attacks. For implementing Watermarking Technique, we are using SCD, LSB, Split algorithms. The overall system design consists of following modules: a. Registration phase, b. Login phase, c. Steganography Phase.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1994 (a) Registration phase To work with this application first user needs to Sign up. In Sign-up user needs to choose the Username and password along with this user need to enter email id and along with that to generate the CaGP user need to enter a special key which contains the string made of A-Z, a-z,0-9 combinations. At server side the key is generated by adding a random key which is made from combinations of A-Z, a-z,0-9 and then the key is generated in the form of CAPTCHA by using Visual cryptography. The generated CaGP is then mail to user for further process. (b) Login phase When the user logs in by entering his confidential information for using his account, then first the user is asked to enter his username (user id) and Password. Then the user is asked to enter his CaGP which is kept with him. Now the entered CaGP is verified at server site, then user gets access to the application. (c) Steganography Phase Now user needs to upload the data that he wants to hide, along with he needs to upload a file in which he wants to hide the data. After uploading the data, the actual process starts. Following phase shows the exact flow. The effectiveness of this scheme is verified through a series of experiments.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1995 Firstly, the file in which the data is to be hide is broken into frames. This is done by using SCENE CHANGE DETECTION ALGORITHM. Now thedatawhich needto be hide is broken intothechunkbySPLIT ALGORITHM. After this the process of hiding the data starts with the Least Significant Bit(LSB). 5. Results & Discussions Application willbeabletosuccessfullyencryptthedata into the file with the help of data provided by user. The data generated is not easy to detect normal human’s eyes and it provide security from intruders and hackers. Because of the modified Login system and with the help of Scene Change Detection(SCD), the system will be more secure than previous one and the valuable data of user will not be compromised. 6. Conclusion The application that we have built has a more secure Login system and data is protected from intruders and hackers. The data that user want to keep safe, secure and preserve is done by hiding it in in another file without destroying the file used to hide. The safety measures, legal are all maintain without exploiting the rules. Thus, on the basis of literature survey and by analyzing the existing system, we have come to a conclusion that the proposed system will not only provide the secured Login to system but also it will help to keeps its data safe. ACKNOWLEDGEMENT We would like to thank the publishers, researchers and Ms. A.S Deokar for their guidance. We would also thank the college authority for providing the required infrastructure and support. Last but not the least we would like to extend a heartfelt gratitude to friends and family members for their support. REFERENCES [1] CAPTCHA as Graphical Passwords A New Security Primitive Based on Hard AI ProblemsBinB.Zhu,Je. Yan, Guanbo Bao, Maowei Yang, and Ning Xu [2] An Improved Method for LSB Based Color Image Steganography Combined with Cryptography 1Xinyi Zhou, 2Wei Gong, 3WenLong Fu, 4Lian-Jing Jin 1,2,4Information Engineering School, Communication University of China, CUC 1,3Neuroscience and Intelligent Media Institute, Communication University of China Beijng, China xinyi [3] Remote Authentication via Biometrics: A Robust Video-ObjectSteganographicMechanismOverWireless Networks KLIMIS NTALIANIS1, (Member, IEEE), AND NICOLAS TSAPATSOULIS2, (Member, IEEE) 1Department of Marketing, Athens University of Applied Sciences, Athens, Greece 2Department of Communication and Internet Studies, Cyprus University of Technology, Limassol CY-3036, Cyprus CORRESPONDING AUTHOR: N. TSAPATSOULIS [4] A NOVEL ANTI PHISHINGFRAMEWORKBASEDON VISUALCRYPTOGRAPHYMounikaReddy.M1,Madhura Vani.B2 Student, Department of CSE, MLRIT, Hyderabad, India 1 Asst.Professor, Department ofCSE, MLRIT, Hyderabad, India [5] A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework Qia Wang, Wenjun Zeng, Fellow, IEEE, and Jun Tian, Member, IEEE [6] Security Enhancement in Image Steganography a MATLAB Approach M. Kameswara Rao, K. Pradeep Reddy and K. Eepsita Saranya Middle-East Journal of Scientific Research 23 (2): 357-361, 2015 ISSN 1990- 9233IDOSI Publications,2015 DOI:10.5829/idosi.mejsr.2015.23.02.22127 Security Enhancement in Image Steganography a MATLAB Approach M.Kameswara Rao, K. Pradeep Reddy and K. Eepsita Saranya Middle-East Journal of Scientific
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1996 Research 23 (2): 357-361, 2015 ISSN 1990-9233IDOSI Publications, 2015 DOI:10.5829/idosi.mejsr.2015.23.02.221 [7] LSB Based Audio Steganography Using Pattern Matching Mr. Ratul Choudhary and Prof. Samir Kumar Bandyopadhyay Journal of Multidisciplinary Engineering Science and Technology (JMEST) ISSN: 3159-0040Vol. 2 Issue 11, November 2011