Submit Search
Upload
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
•
0 likes
•
14 views
IRJET Journal
Follow
https://www.irjet.net/archives/V5/i10/IRJET-V5I10322.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
Implementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
Ijariie1132
Ijariie1132
IJARIIE JOURNAL
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
IJMTST Journal
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
Recommended
Implementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
Ijariie1132
Ijariie1132
IJARIIE JOURNAL
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
IJMTST Journal
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
CSCJournals
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
IRJET- Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
Alexander Decker
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
D0341829
D0341829
iosrjournals
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET Journal
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
INFOGAIN PUBLICATION
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
www.ijerd.com
www.ijerd.com
IJERD Editor
L045056469
L045056469
IJERA Editor
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
High PSNR Based Image Steganography
High PSNR Based Image Steganography
rahulmonikasharma
More Related Content
What's hot
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
IRJET Journal
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
IJECEIAES
IRJET- Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
Alexander Decker
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
D0341829
D0341829
iosrjournals
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET Journal
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
INFOGAIN PUBLICATION
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
www.ijerd.com
www.ijerd.com
IJERD Editor
What's hot
(19)
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and secret map techniques
IRJET- Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
D0341829
D0341829
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
www.ijerd.com
www.ijerd.com
Similar to IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
L045056469
L045056469
IJERA Editor
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
High PSNR Based Image Steganography
High PSNR Based Image Steganography
rahulmonikasharma
IRJET- Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
IRJET Journal
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
www.ijerd.com
www.ijerd.com
IJERD Editor
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
Editor IJCATR
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
IRJET Journal
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IRJET Journal
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
IRJET Journal
G017444651
G017444651
IOSR Journals
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
IRJET Journal
P017329498
P017329498
IOSR Journals
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
A Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Journals
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
O017429398
O017429398
IOSR Journals
Similar to IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
(20)
L045056469
L045056469
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
High PSNR Based Image Steganography
High PSNR Based Image Steganography
IRJET- Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
www.ijerd.com
www.ijerd.com
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Implementation for Data Hiding using Visual Cryptography
Implementation for Data Hiding using Visual Cryptography
G017444651
G017444651
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
P017329498
P017329498
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
A Survey of Image Based Steganography
A Survey of Image Based Steganography
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
O017429398
O017429398
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Recently uploaded
(20)
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1668 Encryption Based Approach to Find Fake Uploaders in Social Media Shereena T Abdul Rasheed 1, Sadakathulla P.K 2 1MCA student, Centre for Computer Science and Information Technology, University of Calicut, Kerala 2Assistant Professor, Centre for Computer Science and Information Technology, University of Calicut, Kerala -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - In the digital era, we can see rapid growth in digital contents through different Medias. As we know social media plays an important role for generating digital contents using modern electronic devices and sharingof dataandother digital contents. Digital images are the one of the frequently used media. In the context we have a challenge to find out the fake uploaders. In this paper we are proposing a new strategy to find out such fake uploaders by using encryption based method. The proposed system uses steganography based encryption to identify the fake uploaders in an easy way. Here we embed some personal information In to the digital image while uploading the content. By using this we can easily find the individual easily. Key Words: Encryption, Decryption, Steganography, social media security, LSB Substitution. 1. INTRODUCTION In the modern world, there exists a wide range imaging techniques for capturing, storing and modifying digital images. With the increase in consumer generated image content using handheld devices such as mobile cameras and ease of sharing, fake news via images are spreading rapidly on social media. There has been a very active research area in the last decade. Cryptography and steganography can be used to provide security for digital content. Cryptography uses mathematics to encrypt and decrypt data to provide security by transforming plaintext into ciphertext. Steganography is the art of hiding information in other information. With this paper, we mean that along with the photograph, we also have related meta-data as contact number of the person who upload that photograph firstly. Here, theperson behind the photograph can be identified easily by this application. Identifying person will eliminate the system of easily spreading the image and this will also act as bigtool to give evidence in front of justice court. Here we use an algorithm that hides the contact number of the person who uploads the image. The contact number that embeddedwith the image never loses even if it is shared among different people. Whenever a situation arises to find out the person who has uploaded the image, we can easily find out the contact number of the person by just applying the reverse algorithm. 2. LETERATURE REVIEW Besides cryptography, steganography can be used to secure information. Steganography is a technique of hiding data/information in digital media. Both Cryptography and steganography methods of digital images are widely used to protect and frustrate opponents' attacks from unauthorized access. Thus, image encryption techniques are required to protect the data [1]. There is a difference between cryptography and steganography. Cryptography scrambles messages so that they cannot be understood. On the other hand, steganography hides the actual messageinanother[2]. Over the last few years, there are many different steganographic methods areproposed.Mostofthemarevery simple techniques so that those can be broken easily by careful analysis of statistical propertiesofthechannel’snoise [3].Recently,somenewsteganographicalgorithmshavebeen proposed fortwo-color binaryimages[4].JohnsonandSushil explain what steganography is and provide a brief history of steganography, describe how steganography is applied to hide information in images, and survey a few steganography software applications [5]. TsungYuan and Wen-Hsiang proposed a new steganographic method that uses change tracking technique for hiding data in Microsoft Word documents [6]. Sinha and Singh proposed a method to encrypt an image for secure transmission [7].This method use the digital signature of the image. Digital signatures enable the recipient of a message to authenticate the sender and verify that the message isintact.Kisiketal[4]proposeda steganographic algorithm which embeds a secret message into bitmap images and palette-based images. Y.K JainandR.RAhriwalproposedLeastSignificanttechnique to hide a message in an image. This technique generates a steganographykeyafterembeddingthemessage.Thekeyhas different layers. Every layer hasa fixed number of bits.These bits are embedded in least significant of the image [8].The method proposed by Mohammad A Ahmed uses Least Significant technique to hide data in digital image. Then the digital image will be implemented in hash significant technique to get the result in hashing value[9].El-Emam proposed a method which hides message in an image inform if pixels. To retrieve the hidden message these pixels are called. Steganography is used to hide and retrieve the message [10]. Akhtar N, Johri P and Khan S implemented a variation of traditional Least Significant Bit (LSB) algorithm. It uses bit inversion method to enhance the quality of the image which the message is hidden. This method has lesser modification in pixels compared to traditional LSB method [11]. P. U. Deshmuk and T. M. Pattewar proposed the edge adaptive steganography based on LSB substitution method. They hide secret message in sharp regions of the image. This technique also improvesthe quality of stego image [12]. D. Baby, J. Thomas, G. Augustine, E. George and N.R. Michael presented “Novel DWT based image securing method using steganography”. They proposed a new steganography technique in which multiple RGB images are embedded into single RGB image using DWT steganography technique. This
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1669 method has level of PSNR (Peak signal - to - noise ratio) and structural similarity (SSIM) index values [13]. G. Prashanti and K. Sandhyarani have done survey on LSB based image steganography and also two new techniques are presented. First technique hides secret message in the cover image and second one embeds a grayscaleimageintoanothergrayscale image. These two techniques have great security because secret information is hidden on random selected location of LSBs of the image [14]. 3. LETERATURE REVIEW The proposed system aims tohidesthecontactnumberofthe person who uploads the image. The following figure shows the working of the proposed system. Fig -1: Working of proposed system Here we use the Least Significant Bit (LSB) substitution method to hide the data within the image. This method replaces the pixels of image by the secret data. The image is stored as m-by-n matrix having several pixels. Each pixel in the image is represented as RGB components and that determine color of each individual pixel. RGB images are stored as 24 bit format, where the RGB components are of 8 bits each. Here we use the contact number of the person who uploads the image and a string as a secret data. The string is used to check whether theimagealreadycontainanycontactnumber or not. This secret data is then converted into byte array. Here we use 3 bit of R, 3 bit of G and 3 bit of B to hide 1 byte of string. Here we replace first some pixels of the image and the length of the secret data determines the number of pixels to be replaced. This results only asmall changeinthevalueof RGB component, which human eyes can’t detect. Whenever any situationarises,thereversealgorithmhelpsto identify the contact number of thepersonwhofirstlyuploads the image. This secret data will not loss even if it shared by different people. 3.1 Algorithm to hide data Step 1: Load image into a variable ‘image’. Step 2: Check whether the image is already contains any contact number or not by reverse algorithm. Step 3: If the image does not contain any numberthenchecks the mode of image. Step 4: If the image is an RGB image then store the secret message into a variable ‘msg’ and set, length= len(msg) width, height= image . size index= 0 encoded= image.copy() Step 5: Repeat the following steps 6 to 8 until reachesthelast pixel Step 6: Store RGBcomponentof 1 pixel into variables r, gand b Step 7: if index < length then c= msg[index] imsg= int (ord(c)) r1= imsg & 7 imsg= imsg >> 3 g1=imsg & 7 imsg= imsg >> 3 b1=imsg & 7 r= r & 248 g= g & 248 b= b & 252 r= r | r1 g= g | g1 b= b| b1 Step 8: encode.putpixel((col,row),(r,g,b)) index= inex+1 Step 9: Stop 3.2 Algorithm to retrieve data Step 1: Load image into a variable ‘image’ Step 2: Check whether the image is already contains any contact number or not Step 3: If the image does not contain any numberthenchecks the mode of image Step 4: If the image is an RGB image then store the secret message into a variable ‘msg’ and set , width, height= image . size index= 0 Step 5: Repeat the following steps 6 to 8 until reachesthelast pixel Step 6: Store RGBcomponentof 1 pixel into variables r, gand b Step 7: if index < length then r1= r & 7 g1= (g & 7) << 3 b1= (b & 3) << 6 val = r1 | g1 | b1 msg = msg + (str ( chr ( val ) ) ) Step 8: index= inex+1 Step 9: Stop
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1670 4. CONCLUSION We have studied about the spreading of fake news through social media and this project aims to control these fraudulent activities. We have used LSB substitution algorithm to hide the secret data within the image. This method is very simple and we can easily extract contact number from the image by just applying the reverse algorithm. We have tested our solutionona samplenetwork. This method proves that it is possible to extract the contact number of the uploader even if it shared many times. REFERENCES [1] H. Zenon, V. Sviatoslav, R.Yuriy, "Cryptography and steganography of video information in modern communications," 1998, Citeseer.ist.psu.edu/hrytskiv98cryptography.html [2] M.M. Amin, M. Salleh, S. Ibrahim, M.R Katmin, M.Z.I. Shamsuddin, "Informationhidingusingsteganography," Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National [3] Elke, Fraz, "Steganography preserving statistical properties," proceeding of the 5th internationally Workshop oninformationHiding,Noordwijkerhout,The Netherlands, October 2002, LNCS 2578, Springer 2003, pp. 278-294. [4] EE. Kisik Chang, J. Changho, L. Sangjin, "High Quality Perceptual Steganographic Techniques," Springer, Vol. 2939, 2004, pp.518-531. [5] N.F. Johnson, J. Suhil, " Exploring Steganography:Seeing the Unseen," Computing practices, 2006, 2006, http://www.jjtc.com/pub/r2026.pdf [6] L. Tsung-Yuan, T. Wen-Hsiang ,"A New Steganographic Method for Data Hiding in Microsoft Word Documents by a ChangeTracking Technique," InformationForensics and Security, IEEE Transactions on Vol.2,Issue1,March 2007 Page(s):24 – 30, Digital Object Identifier 10.1109/TIFS.2006.890310. [7] A. Sinha, K. Singh, "A technique for image encryption using digital signature," Source:OpticsCommunications, vol.218, no. 4, 2003, pp.229-234. [8] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego- Keys”, International Journal of Computer Science and Security (IJCSS), vol. 4, (2010) March 1. [9] Mohammad A. Ahmad, Dr. Imad Alshaikhli, Sondos O. Alhussainan, “Achieving Security for Images by LSB and MD5”, Journal of Advanced Computer Science and Technology Research, Vol. 2, Issue No.3, Pages No. 127- 139, Sept., 2012. [10] N.N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232. [11] Akhtar, N.; Johri, P.; Khan, S., "Enhancing the Security and Quality of LSB Based Image Steganography," Computational Intelligence and Communication Networks (CICN), 2013 5th International Conferenceon , vol., no., pp.385,390, 27-29 Sept. 2013. [12] P.U. Deshmukh and T.M. Pattewar, “A Novel Approach for Edge Adaptive Steganography on LSB Insertion Technique” IEEE International Conference on Information Communication and Embedded Systems (ICICES), Feb. 2014, pp. 1-5. [13] D. Baby, J. Thomas, G. Augustine, E. George, N.R.Michael, “ A Novel DWT based Image Securing method using Steganography”, International Conference on Information and Communication Technologies (ICICT), Procedia Computer Science, April 2015, pp. 612-618. [14] G. Prashanti, K. Sandhyarani, “A New Approach for Data Hiding with LSB Steganography”, Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI, Springer 2015, pp. 423-430.
Download now